Sciweavers

987 search results - page 78 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
AHS
2006
IEEE
142views Hardware» more  AHS 2006»
15 years 7 months ago
On-Chip Evolution Using a Soft Processor Core Applied to Image Recognition
To increase the flexibility of single-chip evolvable hardware systems, we explore possibilities of systems with the evolutionary algorithm implemented in software on an onchip pr...
Kyrre Glette, Jim Torresen, Moritoshi Yasunaga, Yo...
DATE
2002
IEEE
75views Hardware» more  DATE 2002»
15 years 6 months ago
System Design for Flexibility
With the term flexibility, we introduce a new design dimension of an embedded system that quantitatively characterizes its feasibility in implementing not only one, but possibly ...
Christian Haubelt, Jürgen Teich, Kai Richter,...
LCPC
2007
Springer
15 years 7 months ago
Pillar: A Parallel Implementation Language
Abstract. As parallelism in microprocessors becomes mainstream, new programming languages and environments are emerging to meet the challenges of parallel programming. To support r...
Todd Anderson, Neal Glew, Peng Guo, Brian T. Lewis...
MSS
2000
IEEE
79views Hardware» more  MSS 2000»
15 years 5 months ago
A Scalable Architecture for Maximizing Concurrency
This paper describes a design that addresses limitations inherent in the initial implementation of the Archive for the Earth Observing Systems (EOS). The design consists of two el...
Jonathan Crawford
IEEEIAS
2009
IEEE
15 years 8 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof