Sciweavers

3276 search results - page 256 / 656
» Data Management for Pervasive Computing
Sort
View
RTSS
2007
IEEE
15 years 11 months ago
I/O-Aware Deadline Miss Ratio Management in Real-Time Embedded Databases
Recently, cheap and large capacity non-volatile memory such as flash memory is rapidly replacing disks not only in embedded systems, but also in high performance servers. Unlike ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic, Me...
DSOM
2003
Springer
15 years 10 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
VLDB
1995
ACM
112views Database» more  VLDB 1995»
15 years 8 months ago
OPOSSUM: Desk-Top Schema Management through Customizable Visualization
Several recent trends have changed the usage and users of schemas beyond those of a database administrator’s tool for describing database contents. Distribution of computing pow...
Eben M. Haber, Yannis E. Ioannidis, Miron Livny
ICCS
2003
Springer
15 years 9 months ago
DDEMA: A Data Driven Environment for Multiphysics Applications
In this paper we present the design of a multidisciplined problem solving environment (MPSE) for supporting an efficient prediction capability for the response of multiscale interd...
John Michopoulos, Panagiota Tsompanopoulou, Elias ...
IH
1998
Springer
15 years 8 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson