Sciweavers

3516 search results - page 349 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SAMOS
2004
Springer
15 years 9 months ago
High-Level Energy Estimation for ARM-Based SOCs
In recent years, power consumption has become a critical concern for many VLSI systems. Whereas several case studies demonstrate that technology-, layout-, and gate-level technique...
Dan Crisu, Sorin Cotofana, Stamatis Vassiliadis, P...
EUROSEC
2009
ACM
15 years 11 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
ACSAC
2004
IEEE
15 years 8 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
JSW
2007
116views more  JSW 2007»
15 years 4 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
PG
2007
IEEE
15 years 10 months ago
Fogshop: Real-Time Design and Rendering of Inhomogeneous, Single-Scattering Media
We describe a new, analytic approximation to the airlight integral from scattering media whose density is modeled as a sum of Gaussians. The approximation supports real-time rende...
Kun Zhou, Qiming Hou, Minmin Gong, John Snyder, Ba...