Sciweavers

987 search results - page 84 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
CCS
2006
ACM
15 years 5 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
CEEMAS
2007
Springer
15 years 7 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DATE
2000
IEEE
103views Hardware» more  DATE 2000»
15 years 6 months ago
Protocol Stack-Based Telecom-Emulator
The paper describes the concept and implementation of a telecom emulator that features both recon gurability and high-speed processing. The emulator can be easily transmuted into ...
Takahiro Murooka, Toshiaki Miyazaki
ACSD
2003
IEEE
95views Hardware» more  ACSD 2003»
15 years 6 months ago
Quasi-Static Scheduling for Concurrent Architectures
This paper presents a synthesis approach for reactive systems that aims at minimizing the overhead introduced by the operating system and the interaction among the concurrent task...
Jordi Cortadella, Alex Kondratyev, Luciano Lavagno...
ISMVL
2008
IEEE
134views Hardware» more  ISMVL 2008»
15 years 8 months ago
Multiple-Valued Logic Memory System Design Using Nanoscale Electrochemical Cells
Nanoscale multiple-valued logic systems require the development of nanometer scale integrated circuits and components. Due to limits in device physics, new components must be deve...
Theodore W. Manikas, Dale Teeters