Sciweavers

987 search results - page 175 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
COOPIS
2002
IEEE
15 years 2 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
15 years 1 months ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
LCN
2002
IEEE
15 years 2 months ago
A User Level Framework for Ad Hoc Routing
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many appl...
Jérémie Allard, Paul Gonin, Minoo Si...
PPOPP
2003
ACM
15 years 3 months ago
Improving server software support for simultaneous multithreaded processors
Simultaneous multithreading (SMT) represents a fundamental shift in processor capability. SMT's ability to execute multiple threads simultaneously within a single CPU offers ...
Luke McDowell, Susan J. Eggers, Steven D. Gribble
VEE
2009
ACM
613views Virtualization» more  VEE 2009»
15 years 4 months ago
BitVisor: a thin hypervisor for enforcing i/o device security
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous compon...
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimot...