Sciweavers

1744 search results - page 240 / 349
» A Proof-Carrying File System
Sort
View
SIGOPSE
1994
ACM
15 years 8 months ago
New Directions for Integrated Circuit Cards Operating Systems
Integrated circuit cards or smart cards are now well-known. Applications such as electronic purses (cash units stored in cards), subscriber identification cards used in cellular te...
Pierre Paradinas, Jean-Jacques Vandewalle
EMSOFT
2007
Springer
15 years 10 months ago
Block recycling schemes and their cost-based optimization in nand flash memory based storage system
Flash memory has many merits such as light weight, shock resistance, and low power consumption, but also has limitations like the erase-before-write property. To overcome such lim...
Jongmin Lee, Sunghoon Kim, Hunki Kwon, Choulseung ...
TPDS
2010
117views more  TPDS 2010»
14 years 11 months ago
Reputation-Based Resource Allocation in P2P Systems of Rational Users
In this paper, we study p2p systems, where peers have to share their available resources between their own and other peers' needs. One such example is a system of peers who us...
Anna Satsiou, Leandros Tassiulas
DGO
2011
302views Education» more  DGO 2011»
14 years 4 months ago
An ontology-based interactive tool to search documents in the U.S. patent system
The past few years have seen an explosive growth in scientific and regulatory documents related to the patent system. Relevant information is siloed into many heterogeneous and di...
Siddharth Taduri, Gloria T. Lau, Kincho H. Law, Ha...
IACR
2011
86views more  IACR 2011»
14 years 4 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf