Sciweavers

987 search results - page 58 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
CCS
1994
ACM
15 years 5 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
DSD
2007
IEEE
133views Hardware» more  DSD 2007»
15 years 7 months ago
A Serial Logarithmic Number System ALU
Serial arithmetic uses less hardware than parallel arithmetic. Serial floating point (FP) is slower than parallel FP. The Logarithmic Number System (LNS) simplifies operations, ...
Mark G. Arnold, Panagiotis D. Vouzis
IWNAS
2008
IEEE
15 years 7 months ago
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel
To protect data and recover data in case of failures, Linux operating system has built-in MD device that implements RAID architectures. Such device can recover data in case of sin...
Xu Li, Changsheng Xie, Qing Yang
AICCSA
2001
IEEE
112views Hardware» more  AICCSA 2001»
15 years 5 months ago
Implementation of DDARC: Software Architecture for Debugging Distributed Programs
Debugging and testing is a larger part of the effort spent in a software development cycle. Debugging a program is time consuming and is a continuous cycle of code modification an...
Sushma Rai, D. Sampath, Srivathsa N. S.
FPL
2006
Springer
208views Hardware» more  FPL 2006»
15 years 5 months ago
Implementation in Fpgas of Jacobi Method to Solve the Eigenvalue and Eigenvector Problem
This work shows a modular architecture based on FPGA's to solve the eigenvalue problem according to the Jacobi method. This method is able to solve the eigenvalues and eigenv...
Ignacio Bravo, Pedro Jiménez, Manuel Mazo, ...