Search results

Jump to: navigation, search
  • | Field = Computer security and reliability ...d experiences throughout the entire product development cycle in software, hardware, and systems are encouraged. The conference will bridge theory, application
    3 KB (337 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Hardware and software for multimedia systems
    3 KB (425 words) - 23:20, 14 October 2008
  • *Multimedia security and content protection *Hardware and software for multimedia systems
    2 KB (296 words) - 23:20, 14 October 2008
  • Information Security and Cryptography Computer Hardware
    3 KB (412 words) - 19:34, 12 November 2020
  • ...menting, testing, validating and maintaining various kinds of software and hardware systems. Several tracks are proposed to treat the topics from theory to pra ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    11 KB (1,492 words) - 23:26, 14 October 2008
  • ...menting, testing, validating and maintaining various kinds of software and hardware systems. Several tracks are proposed to treat the topics from theory to pra ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design
    6 KB (765 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel opportunities to improve performance and at the
    5 KB (598 words) - 01:12, 31 May 2012
  • ...a multi-disciplinary conference for research that spans the boundaries of hardware, computer research is increasingly important as boundaries between hardware/software and local/network
    3 KB (406 words) - 17:39, 30 September 2016
  • * Hardware support for parallel programming * Hardware support for debugging and program correctness
    2 KB (259 words) - 10:14, 29 May 2016
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. ...e computing systems. All kinds of faults are of interest, from traditional hardware and software faults to accidental and malicious human interactions.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...changing new ideas and experiences in this area and to discuss and explore hardware/software techniques and tools for efficient multi-core computation. ...P architectures for solving problems, e.g. using multiple cores to enhance security, reliability, improve single-thread performance, reduce power, etc.
    4 KB (575 words) - 23:27, 14 October 2008
  • ...y fields, from wireless communication and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cros Security and privacy
    6 KB (771 words) - 16:09, 16 September 2019
  • Hardware/Software Codesign and System Synthesis event in design and implementation of embedded systems hardware,
    11 KB (1,352 words) - 00:33, 15 October 2008
  • creating and exploiting new hardware architectures, and scaling up to o Language features to enhance reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • INFRASTRUCTURE AND HARDWARE: communication networks; embedded devices; hardware/software co-design; power-aware and other
    7 KB (870 words) - 23:30, 14 October 2008
  • ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API ...sms and optimization techniques supporting the efficient implementation of security protection models, reliability and energy efficiency
    3 KB (342 words) - 23:32, 14 October 2008
  • ...presentation and discussion of new ideas in microarchitecture, compilers, hardware/software interfaces, and design of advanced computing and communication sys ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser
    5 KB (580 words) - 10:32, 12 May 2020
  • * Hardware verification techniques * Formal models and methods for security
    2 KB (291 words) - 11:09, 20 November 2020
  • * Hardware/software interactions/interface * Security
    3 KB (327 words) - 13:11, 11 May 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)