Sciweavers

1737 search results - page 270 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
167
Voted
EUROPAR
2003
Springer
15 years 9 months ago
A Coordination Model for ad hoc Mobile Systems
The growing success of wireless ad hoc networks and portable hardware devices presents many interesting problems to software engineers. Particular, coordination is a challenging t...
Marco Tulio de Oliveira Valente, Fernando Magno Qu...
UIST
2000
ACM
15 years 8 months ago
System lag tests for augmented and virtual environments
We describe a simple technique for accurately calibrating the temporal lag in augmented and virtual environments within the Enhanced Virtual Hand Lab (EVHL), a collection of hardw...
Colin Swindells, John Dill, Kellogg S. Booth
HT
1996
ACM
15 years 8 months ago
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering
HyPursuit is a new hierarchical network search engine that clusters hypertext documents to structure a given information space for browsing and search activities. Our content-link...
Ron Weiss, Bienvenido Vélez, Mark A. Sheldo...
FDL
2003
IEEE
15 years 9 months ago
Object-Oriented ASIP Design and Synthesis
SystemC-Plus from the ODETTE project provides the ability to simulate and synthesise object-oriented specifications into hardware. The current ODETTE compiler translates each obj...
Maziar Goudarzi, Shaahin Hessabi, Alan Mycroft
SIN
2010
ACM
15 years 1 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch