Sciweavers

3516 search results - page 539 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
VLDB
1998
ACM
139views Database» more  VLDB 1998»
15 years 8 months ago
Experiences in Federated Databases: From IRO-DB to MIRO-Web
From beginning of 1994 to the end of 1996, the IRO-DB ESPRIT project has developed tools for accessing relational and object-oriented databases in an integrated way. The system is...
Peter Fankhauser, Georges Gardarin, M. Lopez, J. M...
137
Voted
FPGA
2009
ACM
159views FPGA» more  FPGA 2009»
15 years 11 months ago
Choose-your-own-adventure routing: lightweight load-time defect avoidance
Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the inte...
Raphael Rubin, André DeHon
TITB
2010
128views Education» more  TITB 2010»
14 years 11 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
DAC
2010
ACM
15 years 4 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
MSWIM
2006
ACM
15 years 10 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda