Sciweavers

1737 search results - page 204 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
ISCA
2005
IEEE
101views Hardware» more  ISCA 2005»
15 years 10 months ago
Virtualizing Transactional Memory
Writing concurrent programs is difficult because of the complexity of ensuring proper synchronization. Conventional lock-based synchronization suffers from wellknown limitations, ...
Ravi Rajwar, Maurice Herlihy, Konrad K. Lai
TISSEC
2010
119views more  TISSEC 2010»
14 years 11 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
PDPTA
2008
15 years 6 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
ECBS
2005
IEEE
88views Hardware» more  ECBS 2005»
15 years 10 months ago
Integrative Architecture Elicitation for Large Computer Based Systems
Large and complex computer based systems are the result of an evolution process which may take many years. Heterogeneity is an important characteristic of such systems: During the...
Peter Tabeling, Bernhard Gröne
WSC
2001
15 years 5 months ago
JWARS output analysis
The Joint Warfare System (JWARS) is being equipped with a growing set of tools for microanalysis of single replications and for macro-analysis across multiple replications. These ...
H. Ric Blacksten, James W. Jones, Michael L. Pouma...