Sciweavers

3893 search results - page 211 / 779
» Execution Architectures and Compilation
Sort
View
MOBISEC
2009
Springer
15 years 10 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
123
Voted
CSREAESA
2004
15 years 5 months ago
Language Selection for Mobile Systems: Java, C, or Both?
For many years, C has been known as a fast, yet unfriendly language. Similarly, Java presents its own trade-offs, including more advanced language features at the cost of slower ex...
Keith S. Vallerio, Niraj K. Jha
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 3 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
CATA
2004
15 years 5 months ago
Functionally Distributed Control Architecture for Robot Systems
This paper describes the design and implementation of functionally distributed control architecture for real-time control of robot systems. Robot systems must control several func...
Tetsuya Taira, Nobuyuki Yamasaki
DAC
2002
ACM
16 years 5 months ago
Compiler-directed scratch pad memory hierarchy design and management
One of the primary challenges in embedded system design is designing the memory hierarchy and restructuring the application to take advantage of it. This task is particularly impo...
Mahmut T. Kandemir, Alok N. Choudhary