Search results
Create the page "Hardware security" on this wiki! See also the search results found.
- | Field = Computer security and reliability ...d experiences throughout the entire product development cycle in software, hardware, and systems are encouraged. The conference will bridge theory, application3 KB (337 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability2 KB (262 words) - 23:20, 14 October 2008
- - Multimedia security and content protection - Hardware and software for multimedia systems3 KB (425 words) - 23:20, 14 October 2008
- *Multimedia security and content protection *Hardware and software for multimedia systems2 KB (296 words) - 23:20, 14 October 2008
- Information Security and Cryptography Computer Hardware3 KB (412 words) - 19:34, 12 November 2020
- ...menting, testing, validating and maintaining various kinds of software and hardware systems. Several tracks are proposed to treat the topics from theory to pra ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design11 KB (1,492 words) - 23:26, 14 October 2008
- ...menting, testing, validating and maintaining various kinds of software and hardware systems. Several tracks are proposed to treat the topics from theory to pra ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design6 KB (765 words) - 23:26, 14 October 2008
- | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel opportunities to improve performance and at the5 KB (598 words) - 01:12, 31 May 2012
- ...a multi-disciplinary conference for research that spans the boundaries of hardware, computer research is increasingly important as boundaries between hardware/software and local/network3 KB (406 words) - 17:39, 30 September 2016
- * Hardware support for parallel programming * Hardware support for debugging and program correctness2 KB (259 words) - 10:14, 29 May 2016
- ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. ...e computing systems. All kinds of faults are of interest, from traditional hardware and software faults to accidental and malicious human interactions.4 KB (528 words) - 23:27, 14 October 2008
- ...changing new ideas and experiences in this area and to discuss and explore hardware/software techniques and tools for efficient multi-core computation. ...P architectures for solving problems, e.g. using multiple cores to enhance security, reliability, improve single-thread performance, reduce power, etc.4 KB (575 words) - 23:27, 14 October 2008
- ...y fields, from wireless communication and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cros Security and privacy6 KB (771 words) - 16:09, 16 September 2019
- Hardware/Software Codesign and System Synthesis event in design and implementation of embedded systems hardware,11 KB (1,352 words) - 00:33, 15 October 2008
- creating and exploiting new hardware architectures, and scaling up to o Language features to enhance reliability and security5 KB (673 words) - 23:30, 14 October 2008
- INFRASTRUCTURE AND HARDWARE: communication networks; embedded devices; hardware/software co-design; power-aware and other7 KB (870 words) - 23:30, 14 October 2008
- ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API ...sms and optimization techniques supporting the efficient implementation of security protection models, reliability and energy efficiency3 KB (342 words) - 23:32, 14 October 2008
- ...presentation and discussion of new ideas in microarchitecture, compilers, hardware/software interfaces, and design of advanced computing and communication sys ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser5 KB (580 words) - 10:32, 12 May 2020
- * Hardware verification techniques * Formal models and methods for security2 KB (291 words) - 11:09, 20 November 2020
- * Hardware/software interactions/interface * Security3 KB (327 words) - 13:11, 11 May 2020