Sciweavers

2056 search results - page 200 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
CISIS
2009
IEEE
15 years 11 months ago
A Parameter-Based Scheme for Service Composition in Pervasive Computing Environment
Pervasive computing, the new computing paradigm aiming at providing services anywhere at anytime, poses great challenges on dynamic service composition. Existing service compositi...
Zhenghui Wang, Tianyin Xu, Zhuzhong Qian, Sanglu L...
ADAEUROPE
2005
Springer
15 years 10 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
121
Voted
EUROSYS
2007
ACM
16 years 1 months ago
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Hypervisors, popularized by Xen and VMware, are quickly becoming commodity. They are appropriate for many usage scenarios, but there are scenarios that require system virtualizatio...
Stephen Soltesz, Herbert Pötzl, Marc E. Fiucz...
MOBIHOC
2008
ACM
16 years 4 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 1 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...