Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Ratazzi, Paul"'
Many design companies have gone fabless and rely on external fabrication facilities to produce chips due to increasing cost of semiconductor manufacturing. However, not all of these facilities can be considered trustworthy; some may inject hardware T
Externí odkaz:
http://arxiv.org/abs/2409.20486
Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open archite
Externí odkaz:
http://arxiv.org/abs/1901.07732
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Along with the development of wireless communication technology, a mass of mobile devices are gaining stronger sensing capability, which brings a novel paradigm to light: participatory sensing networks (PSNs). PSNs can greatly reduce the cost of wire
Externí odkaz:
http://arxiv.org/abs/1811.03238
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs. Although schemes are proposed to secure the IMD access, some issues ar
Externí odkaz:
http://arxiv.org/abs/1804.02447
Like many desktop operating systems in the 1990s, Android is now in the process of including support for multi-user scenarios. Because these scenarios introduce new threats to the system, we should have an understanding of how well the system design
Externí odkaz:
http://arxiv.org/abs/1410.7752
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2009, Iss 1, p 879812 (2009)
Cognitive Radio (CR), a hierarchical Dynamic Spectrum Access (DSA) model, has been considered as a strong candidate for future communication systems improving spectrum efficiency utilizing unused spectrum of opportunity. However, to ensure the effect
Externí odkaz:
https://doaj.org/article/65667ce27eb947998e675811b9196e2f
Autor:
Hong Zhao, Ratazzi, Paul
Publikováno v:
Journal of Computing & Information Technology; Jun2021, Vol. 29 Issue 2, p89-111, 23p
Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open archite
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e6fd5a59f14c6790e8fb7ed23b89050f
Publikováno v:
2012 26th International Conference on Advanced Information Networking & Applications Workshops; 1/ 1/2012, p1252-1257, 6p