Sciweavers

1209 search results - page 72 / 242
» Security as a new dimension in embedded system design
Sort
View
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 3 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek
SISW
2005
IEEE
15 years 3 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 2 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
SIROCCO
2008
14 years 11 months ago
Sharpness: A Tight Condition for Scalability
: A distributed system is scalable if the rate at which it completes its computation and communication tasks does not depend on its size. As an example, the scalability of a peer-t...
Augustin Chaintreau
CVPR
2008
IEEE
15 years 12 months ago
Sketching in the air: A vision-based system for 3D object design
3D object design has many applications including flexible 3D sketch input in CAD, computer game, webpage content design, image based object modeling, and 3D object retrieval. Most...
Yu Chen, Jianzhuang Liu, Xiaoou Tang