Sciweavers

469 search results - page 20 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
SIGCOMM
1995
ACM
15 years 7 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
ICDCS
2002
IEEE
15 years 8 months ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...
135
Voted
DATE
2008
IEEE
75views Hardware» more  DATE 2008»
15 years 10 months ago
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization
With technology advances, the number of cores integrated on a chip and their speed of operation is increasing. This, in turn is leading to a significant increase in chip temperat...
Srinivasan Murali, Almir Mutapcic, David Atienza, ...
143
Voted
USS
2010
15 years 1 months ago
Securing Script-Based Extensibility in Web Browsers
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
Vladan Djeric, Ashvin Goel
109
Voted
ISSTA
2006
ACM
15 years 9 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...