Sciweavers

1748 search results - page 33 / 350
» Security Models for Heterogeneous Networking
Sort
View
FLAIRS
2006
15 years 4 months ago
Towards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance
In today's IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partn...
Alfred Ka Yiu Wong, Nandan Paramesh, Pradeep Kumar...
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
15 years 8 months ago
Cost modeling and cycle-accurate co-simulation of heterogeneous multiprocessor systems
—In this paper, we present a method to analyze different implementations of stream-based applications on heterogeneous multiprocessor systems. We take both resource usage and per...
Sven van Haastregt, Eyal Halm, Bart Kienhuis
EMSOFT
2005
Springer
15 years 8 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu
COCOON
2005
Springer
15 years 8 months ago
Radio Networks with Reliable Communication
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...
Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, H...
SP
2002
IEEE
226views Security Privacy» more  SP 2002»
15 years 2 months ago
Dynamic load balancing of SAMR applications on distributed systems
Dynamic load balancing(DLB) for parallel systems has been studied extensively; however, DLB for distributed systems is relatively new. To efficiently utilize computing resources p...
Zhiling Lan, Valerie E. Taylor, Greg Bryan