Sciweavers

7080 search results - page 1146 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
PADS
2009
ACM
15 years 11 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
142
Voted
ASPLOS
2006
ACM
15 years 10 months ago
Tartan: evaluating spatial computation for whole program execution
Spatial Computing (SC) has been shown to be an energy-efficient model for implementing program kernels. In this paper we explore the feasibility of using SC for more than small k...
Mahim Mishra, Timothy J. Callahan, Tiberiu Chelcea...
JSAC
2007
105views more  JSAC 2007»
15 years 3 months ago
What and how much to gain by spectrum agility?
— Static spectrum allocation prohibits radio devices from using spectral bands designated for others. As a result, some bands are under-utilized while other bands are over-popula...
Chun-Ting Chou, Sai Shankar N., Hyoil Kim, Kang G....
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 9 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
XMLSEC
2003
ACM
15 years 9 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
« Prev « First page 1146 / 1416 Last » Next »