Sciweavers

7080 search results - page 990 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
VLDB
1997
ACM
117views Database» more  VLDB 1997»
15 years 9 months ago
Optimizing Queries Across Diverse Data Sources
Businesses today need to interrelate data stored in diverse systems with differing capabilities, ideally via a single high-level query interface. We present the design of a query ...
Laura M. Haas, Donald Kossmann, Edward L. Wimmers,...
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 7 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 5 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
142
Voted
IPMI
2003
Springer
15 years 10 months ago
Ideal-Observer Performance under Signal and Background Uncertainty
We use the performance of the Bayesian ideal observer as a figure of merit for hardware optimization because this observer makes optimal use of signal-detection information. Due t...
Subok Park, Matthew A. Kupinski, Eric Clarkson, Ha...
174
Voted
ICS
2004
Tsinghua U.
15 years 10 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang