Search results
Create the page "Hardware security" on this wiki! See also the search results found.
- • Cluster Architecture and Hardware Systems ◦ Hardware Architecture4 KB (452 words) - 16:47, 7 April 2021
- Computing systems including hardware, software, communication, and networks are growing towards an ever increasi ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc.9 KB (1,216 words) - 16:32, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Evolvable and Adaptive Hardware (WEAH 2009)3 KB (376 words) - 16:47, 14 October 2008
- .Embedded Hardware and Architectures .Hardware/Software Co-Design3 KB (375 words) - 16:48, 14 October 2008
- ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or ...o WCET analysis o compilation for real-time or embedded systems o novel hardware or system architectures for real-time or8 KB (939 words) - 16:48, 14 October 2008
- The high cost of creating and maintaining software and hardware + Security and information assurance7 KB (907 words) - 20:51, 14 October 2008
- • Hardware and Software Platforms, Middleware • Security, Survivability and Fault Tolerance2 KB (244 words) - 19:05, 14 October 2008
- Hardware Architectures for AI Intelligent Networks and Security3 KB (359 words) - 19:06, 14 October 2008
- * Sensor networks and sensor node hardware/software platforms * Error tolerance, security and robustness2 KB (316 words) - 22:05, 14 October 2008
- - Performance and scalability (e.g., indexing, hardware accelerators) - Other aspects of modern information systems such as security, privacy,7 KB (851 words) - 04:29, 15 October 2008
- The advent of commodity (COTS) hardware platforms has opened up numerous * Security, reliability and availability in distributed storage systems,5 KB (644 words) - 22:10, 14 October 2008
- * Data analysis for network traffic estimation and security * Query evaluation using network hardware3 KB (332 words) - 22:10, 14 October 2008
- ...e many interconnection problems which may occur at different levels in the hardware and software design of communicating entities and communication networks. T Network Security and Privacy7 KB (990 words) - 22:11, 14 October 2008
- 5. Multimedia security (data hiding, authentication, and access control) ...a systems, real time and non-real-time systems; implementation; multimedia hardware and software)4 KB (443 words) - 16:06, 24 February 2016
- G. Hardware Implementation for Signal Processing V. Signal Processing for Security2 KB (226 words) - 22:17, 14 October 2008
- Security ...signed for networked embedded sensors. Submission should refer to specific hardware, software, and system design and implementation, focusing on new architectu4 KB (570 words) - 22:17, 14 October 2008
- * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security5 KB (660 words) - 15:46, 27 December 2015
- Models are used also to verify the dependability of hardware and software. Hardware models are more oriented towards probability of failures (e.g. Stochastic P Formal methods for security18 KB (2,714 words) - 22:23, 14 October 2008
- | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability6 KB (697 words) - 22:19, 14 October 2008
- | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability5 KB (619 words) - 22:19, 14 October 2008