We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
The speedup over a microprocessor that can be achieved by implementing some programs on an FPGA has been extensively reported. This paper presents an analysis, both quantitative a...
Zhi Guo, Walid A. Najjar, Frank Vahid, Kees A. Vis...
This paper analyzes and quantifies the locality characteristics of numerical loop nests in order to suggest future directions for architecture and software cache optimizations. Si...
—Architecture-based software reliability analysis methods shall help software architects to identify critical software components and to quantify their influence on the system r...