Sciweavers

1209 search results - page 98 / 242
» Security as a new dimension in embedded system design
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
14 years 11 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
SIES
2007
IEEE
15 years 4 months ago
Novel Genome Coding of Genetic Algorithms for the System Partitioning Problem
— The research field of partitioning for electronic systems started to attract significant attention of scientists about fifteen years ago. Gaining ever more importance due to...
Bastian Knerr, Martin Holzer 0002, Markus Rupp
DBPL
1997
Springer
94views Database» more  DBPL 1997»
15 years 2 months ago
Querying Multidimensional Databases
Abstract. Multidimensional databases are large collections of data, often historical, used for sophisticated analysis oriented to decision making. This activity is supported by an ...
Luca Cabibbo, Riccardo Torlone
PLDI
2011
ACM
14 years 22 days ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...
CCS
2007
ACM
15 years 4 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin