Sciweavers

40 search results - page 2 / 8
» Safe execution of untrusted applications on embedded network...
Sort
View
WCET
2010
13 years 3 months ago
WCET Analysis of a Parallel 3D Multigrid Solver Executed on the MERASA Multi-Core
To meet performance requirements as well as constraints on cost and power consumption, future embedded systems will be designed with multi-core processors. However, the question o...
Christine Rochange, Armelle Bonenfant, Pascal Sain...
JVM
2004
118views Education» more  JVM 2004»
13 years 7 months ago
Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing
The increased popularity of grid systems and cycle sharing across organizations leads to the need for scalable systems that provide facilities to locate resources, to be fair in t...
Ali Raza Butt, Xing Fang, Y. Charlie Hu, Samuel P....
ACSAC
2001
IEEE
13 years 9 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
RTAS
2009
IEEE
14 years 14 days ago
Execution Strategies for PTIDES, a Programming Model for Distributed Embedded Systems
—We define a family of execution policies for a programming model called PTIDES (Programming Temporally Integrated Distributed Embedded Systems). A PTIDES application (factory a...
Jia Zou, Slobodan Matic, Edward A. Lee, Thomas Hui...
OSDI
1996
ACM
13 years 7 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee