Sciweavers

22 search results - page 5 / 5
» A Run-Time Memory Protection Methodology
Sort
View
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
13 years 12 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
IMC
2006
ACM
14 years 7 days ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...