Sciweavers

3516 search results - page 221 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICSE
2005
IEEE-ACM
16 years 3 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
120
Voted
EMSOFT
2009
Springer
15 years 10 months ago
NANDFS: a flexible flash file system for RAM-constrained systems
NANDFS is a flash file system that exposes a memory-performance tradeoff to system integrators. The file system can be configured to use a large amount of RAM, in which case i...
Aviad Zuck, Ohad Barzilay, Sivan Toledo
149
Voted
CF
2004
ACM
15 years 9 months ago
The happy marriage of architecture and application in next-generation reconfigurable systems
New applications and standards are first conceived only for functional correctness and without concerns for the target architecture. The next challenge is to map them onto an arch...
Ingrid Verbauwhede, Patrick Schaumont
104
Voted
USS
2008
15 years 6 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
CSREAESA
2006
15 years 5 months ago
A Dual-core Embedded System-on-Chip Architecture for Multimedia Signal Processing Applications
- This paper presents a dual-core embedded System-on-Chip for a wide range of application fields with particularly high processing demands, including general signal processing, vid...
Hong Yue, Kui Dai, Zhiying Wang