Sciweavers

1737 search results - page 121 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
CSREASAM
2007
15 years 5 months ago
Security Based Heuristic SAX for XML Parsing
- XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks i...
Wei Wang
SAMOS
2009
Springer
15 years 10 months ago
Runtime Adaptive Extensible Embedded Processors - A Survey
Current generation embedded applications demand the computation engine to offer high performance similar to custom hardware circuits while preserving the flexibility of software s...
Huynh Phung Huynh, Tulika Mitra
ICECCS
1995
IEEE
100views Hardware» more  ICECCS 1995»
15 years 7 months ago
POSD-a notation for presenting complex systems of processes
When trying to describe the behaviour of large systems, such as the business processes of large enterprises, we often adopt diagramming techniques based on derivatives of data flo...
Peter Henderson, Graham D. Pratten
ISCA
1993
IEEE
137views Hardware» more  ISCA 1993»
15 years 8 months ago
Architectural Support for Translation Table Management in Large Address Space Machines
Virtual memoy page translation tables provide mappings from virtual to physical addresses. When the hardware controlled Tratmlation L.ookaside Buffers (TLBs) do not contain a tran...
Jerome C. Huck, Jim Hays
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 9 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...