Sciweavers

1301 search results - page 211 / 261
» Design and architectures for dependable embedded systems
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 4 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CASES
2006
ACM
15 years 5 months ago
High-level power analysis for multi-core chips
Technology trends have led to the advent of multi-core chips in the form of both general-purpose chip multiprocessors (CMPs) and embedded multi-processor systems-on-a-chip (MPSoCs...
Noel Eisley, Vassos Soteriou, Li-Shiuan Peh
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
15 years 5 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
DAC
2006
ACM
16 years 24 days ago
Extending the lifetime of fuel cell based hybrid systems
Fuel cells are clean power sources that have much higher energy densities and lifetimes compared to batteries. However, fuel cells have limited load following capabilities and can...
Jianli Zhuo, Chaitali Chakrabarti, Naehyuck Chang,...
ADBIS
2006
Springer
93views Database» more  ADBIS 2006»
15 years 5 months ago
An On-Line Reorganization Framework for SAN File Systems
While the cost per megabyte of magnetic disk storage is economical, organizations are alarmed by the increasing cost of managing storage. Storage Area Network (SAN) architectures ...
Shahram Ghandeharizadeh, Shan Gao, Chris Gahagan, ...