Sciweavers

5790 search results - page 667 / 1158
» Distributed programming with distributed authorization
Sort
View
HPCA
2003
IEEE
16 years 4 months ago
Caches and Hash Trees for Efficient Memory Integrity
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...
ISORC
2009
IEEE
15 years 11 months ago
Resource Scopes: Toward Language Support for Compositional Determinism
Complex real-time embedded systems should be compositional and deterministic in the resource, time, and value domains. Determinism eases the engineering of correct systems and com...
Madhukar Anand, Sebastian Fischmeister, Insup Lee
ISORC
2009
IEEE
15 years 11 months ago
Fault-Tolerance for Component-Based Systems - An Automated Middleware Specialization Approach
General-purpose middleware, by definition, cannot readily support domain-specific semantics without significant manual efforts in specializing the middleware. This paper prese...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
ISORC
2008
IEEE
15 years 10 months ago
Obstacles in Worst-Case Execution Time Analysis
The analysis of the worst-case execution time (WCET) requires detailed knowledge of the program behavior. In practice it is still not possible to obtain all needed information aut...
Raimund Kirner, Peter P. Puschner
EUROPAR
2007
Springer
15 years 10 months ago
Parallelization of Bulk Operations for STL Dictionaries
STL dictionaries like map and set are commonly used in C++ programs. We consider parallelizing two of their bulk operations, namely the construction from many elements, and the ins...
Leonor Frias, Johannes Singler