Sciweavers

3730 search results - page 676 / 746
» Robust design of embedded systems
Sort
View
RTAS
2006
IEEE
15 years 6 months ago
Zygaria: Storage Performance as a Managed Resource
Large-scale storage systems often hold data for multiple applications and users. A problem in such systems is isolating applications and users from each other to prevent their wor...
Theodore M. Wong, Richard A. Golding, Caixue Lin, ...
119
Voted
MOBISYS
2008
ACM
16 years 7 days ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...
118
Voted
CCS
2009
ACM
15 years 7 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
94
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
SENSYS
2006
ACM
15 years 6 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...