Sciweavers

1144 search results - page 131 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
14 years 7 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
JITECH
2007
220views more  JITECH 2007»
14 years 9 months ago
Fixing the payment system at Alvalade XXI: a case on IT project risk management
This case describes the implementation and subsequent failure of an innovative system installed in the bars of Alvalade XXI, the recently built football stadium in Lisbon, Portuga...
Ramon O'Callaghan
WMRD
1990
15 years 1 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...
COMPUTER
2002
103views more  COMPUTER 2002»
14 years 9 months ago
SimpleScalar: An Infrastructure for Computer System Modeling
tail defines the level of abstraction used to implement the model's components. A highly detailed model will faithfully simulate all aspects of machine operation, whether or n...
Todd M. Austin, Eric Larson, Dan Ernst