Sciweavers

2056 search results - page 181 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
SAC
2008
ACM
15 years 4 months ago
A service architecture for sensor data provisioning for context-aware mobile applications
One of the main issues that inhibit the development of contextaware mobile applications is the lack of systematic methods for sensor data acquisition. This lack, however, is a res...
Bernardo Gonçalves, José Gonç...
DAC
2007
ACM
16 years 5 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
ICSM
2005
IEEE
15 years 10 months ago
A Reference Architecture for Web Browsers
A reference architecture for a domain captures the fundamental subsystems common to systems of that domain as well as the relationships between these subsystems. Having a referenc...
Alan Grosskurth, Michael W. Godfrey
139
Voted
CCECE
2006
IEEE
15 years 10 months ago
Reconfigurable Implementation of Wavelet Transform on an Fpga-Augmented NIOS Processor
The wavelet transform is a very popular tool in engineering for signal analysis. With respect to image compression, the new JPEG 2000 image standard incorporates wavelet transform...
Eugene Hyun, Mihai Sima, Michael McGuire
CODES
2011
IEEE
14 years 4 months ago
Dynamic, multi-core cache coherence architecture for power-sensitive mobile processors
Today, mobile smartphones are expected to be able to run the same complex, memory-intensive applications that were originally designed and coded for general-purpose processors. Ho...
Garo Bournoutian, Alex Orailoglu