Sciweavers

1209 search results - page 96 / 242
» Security as a new dimension in embedded system design
Sort
View
CASES
2010
ACM
14 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
NBIS
2007
Springer
15 years 4 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
ISLPED
2000
ACM
77views Hardware» more  ISLPED 2000»
15 years 2 months ago
A recursive algorithm for low-power memory partitioning
Memory-processor integration o ers new opportunities for reducing the energy of a system. In the case of embedded systems, one solution consists of mapping the most frequently acc...
Luca Benini, Alberto Macii, Massimo Poncino
CCGRID
2005
IEEE
15 years 3 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
TWC
2008
106views more  TWC 2008»
14 years 9 months ago
Analysis of Handoff Interference and Outage along Arbitrary Trajectories in Cellular Networks
We introduce a new system performance measure due to handoff called handoff interference, which characterizes the additional interference noise induced by the handoff process. The ...
A. Leu, B. Mark, S. Tang