Sciweavers

8493 search results - page 1568 / 1699
» Implementing a distributed firewall
Sort
View
144
Voted
EUROSYS
2006
ACM
16 years 21 days ago
Solving the starting problem: device drivers as self-describing artifacts
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interac...
Michael F. Spear, Tom Roeder, Orion Hodson, Galen ...
ICCAD
2008
IEEE
133views Hardware» more  ICCAD 2008»
16 years 15 days ago
Module locking in biochemical synthesis
—We are developing a framework for computation with biochemical reactions with a focus on synthesizing specific logical functionality, a task analogous to technology-independent...
Brian Fett, Marc D. Riedel
159
Voted
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
16 years 15 days ago
Fast and robust quadratic placement combined with an exact linear net model
— This paper presents a robust quadratic placement approach, which offers both high-quality placements and excellent computational efficiency. The additional force which distrib...
Peter Spindler, Frank M. Johannes
149
Voted
SOSP
2003
ACM
16 years 15 days ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
124
Voted
SOSP
2005
ACM
16 years 15 days ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
« Prev « First page 1568 / 1699 Last » Next »