Search results

Jump to: navigation, search
  • • Cluster Architecture and Hardware Systems ◦ Hardware Architecture
    4 KB (452 words) - 16:47, 7 April 2021
  • Computing systems including hardware, software, communication, and networks are growing towards an ever increasi ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc.
    9 KB (1,216 words) - 16:32, 14 October 2008
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Evolvable and Adaptive Hardware (WEAH 2009)
    3 KB (376 words) - 16:47, 14 October 2008
  • .Embedded Hardware and Architectures .Hardware/Software Co-Design
    3 KB (375 words) - 16:48, 14 October 2008
  • ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or ...o WCET analysis o compilation for real-time or embedded systems o novel hardware or system architectures for real-time or
    8 KB (939 words) - 16:48, 14 October 2008
  • The high cost of creating and maintaining software and hardware + Security and information assurance
    7 KB (907 words) - 20:51, 14 October 2008
  • Hardware and Software Platforms, Middleware • Security, Survivability and Fault Tolerance
    2 KB (244 words) - 19:05, 14 October 2008
  • Hardware Architectures for AI Intelligent Networks and Security
    3 KB (359 words) - 19:06, 14 October 2008
  • * Sensor networks and sensor node hardware/software platforms * Error tolerance, security and robustness
    2 KB (316 words) - 22:05, 14 October 2008
  • - Performance and scalability (e.g., indexing, hardware accelerators) - Other aspects of modern information systems such as security, privacy,
    7 KB (851 words) - 04:29, 15 October 2008
  • The advent of commodity (COTS) hardware platforms has opened up numerous * Security, reliability and availability in distributed storage systems,
    5 KB (644 words) - 22:10, 14 October 2008
  • * Data analysis for network traffic estimation and security * Query evaluation using network hardware
    3 KB (332 words) - 22:10, 14 October 2008
  • ...e many interconnection problems which may occur at different levels in the hardware and software design of communicating entities and communication networks. T Network Security and Privacy
    7 KB (990 words) - 22:11, 14 October 2008
  • 5. Multimedia security (data hiding, authentication, and access control) ...a systems, real time and non-real-time systems; implementation; multimedia hardware and software)
    4 KB (443 words) - 16:06, 24 February 2016
  • G. Hardware Implementation for Signal Processing V. Signal Processing for Security
    2 KB (226 words) - 22:17, 14 October 2008
  • Security ...signed for networked embedded sensors. Submission should refer to specific hardware, software, and system design and implementation, focusing on new architectu
    4 KB (570 words) - 22:17, 14 October 2008
  • * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security
    5 KB (660 words) - 15:46, 27 December 2015
  • Models are used also to verify the dependability of hardware and software. Hardware models are more oriented towards probability of failures (e.g. Stochastic P Formal methods for security
    18 KB (2,714 words) - 22:23, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 22:19, 14 October 2008
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 22:19, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)