Sciweavers

6768 search results - page 1191 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
138
Voted
ICS
2003
Tsinghua U.
15 years 8 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 8 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
ERCIMDL
2001
Springer
178views Education» more  ERCIMDL 2001»
15 years 8 months ago
Customizable Retrieval Functions Based on User Tasks in the Cultural Heritage Domain
The cultural heritage domain dealing with digital surrogates of rare and fragile historic artifacts is one of the most promising areas for establishing collaboratories, i.e. shared...
Holger Brocks, Ulrich Thiel, Adelheit Stein, Andre...
TCS
2008
15 years 3 months ago
GemCell: A generic platform for modeling multi-cellular biological systems
The mass and complexity of biological information requires computer-aided simulation and analysis to help scientists achieve understanding and guide experimentation. Although livi...
Hila Amir-Kroll, Avital Sadot, Irun R. Cohen, Davi...
143
Voted
CASES
2010
ACM
15 years 1 months ago
Balancing memory and performance through selective flushing of software code caches
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
Apala Guha, Kim M. Hazelwood, Mary Lou Soffa
« Prev « First page 1191 / 1354 Last » Next »