Sciweavers

3516 search results - page 628 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
126
Voted
ECLIPSE
2004
ACM
15 years 9 months ago
Eclipse as a platform for research on interruption management in software development
Automated tools for mediating incoming interruptions are necessary in order to balance the concentration required for software development with the need to collaborate and absorb ...
Uri Dekel, Steven Ross
124
Voted
SOSP
2005
ACM
16 years 15 days ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
143
Voted
OOPSLA
2009
Springer
15 years 10 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
MINENET
2006
ACM
15 years 9 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
129
Voted
CODES
2007
IEEE
15 years 10 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...