Gotowa bibliografia na temat „Hardware isolation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Hardware isolation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Hardware isolation"
Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.
Pełny tekst źródłaHu, Nianhang, Mengmei Ye, and Sheng Wei. "Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation." IEEE Transactions on Emerging Topics in Computing 7, no. 2 (2019): 253–61. http://dx.doi.org/10.1109/tetc.2017.2648739.
Pełny tekst źródłaHooker, Sara. "The hardware lottery." Communications of the ACM 64, no. 12 (2021): 58–65. http://dx.doi.org/10.1145/3467017.
Pełny tekst źródłaKaplan, David. "Hardware VM Isolation in the Cloud." Queue 21, no. 4 (2023): 49–67. http://dx.doi.org/10.1145/3623392.
Pełny tekst źródłaKaplan, David. "Hardware VM Isolation in the Cloud." Communications of the ACM 67, no. 1 (2023): 54–59. http://dx.doi.org/10.1145/3624576.
Pełny tekst źródłaZeng, Qiang Hong, Shi Jian Zhu, Jing Jun Lou, and Shui Qing Xie. "Hardware Design for Active Vibration Isolation Controller." Advanced Materials Research 211-212 (February 2011): 1061–65. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.1061.
Pełny tekst źródłaChen, Sui, Lu Peng, and Samuel Irving. "Accelerating GPU Hardware Transactional Memory with Snapshot Isolation." ACM SIGARCH Computer Architecture News 45, no. 2 (2017): 282–94. http://dx.doi.org/10.1145/3140659.3080204.
Pełny tekst źródłaOmar, Hamza, and Omer Khan. "PRISM." ACM Transactions on Architecture and Code Optimization 18, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3450523.
Pełny tekst źródłaCho, Yeongpil. "Fine-Grained Isolation to Protect Data against In-Process Attacks on AArch64." Electronics 9, no. 2 (2020): 236. http://dx.doi.org/10.3390/electronics9020236.
Pełny tekst źródłaVerghese, Ben, Anoop Gupta, and Mendel Rosenblum. "Performance isolation." ACM SIGOPS Operating Systems Review 32, no. 5 (1998): 181–92. http://dx.doi.org/10.1145/384265.291044.
Pełny tekst źródłaRozprawy doktorskie na temat "Hardware isolation"
Vilanova, García Lluís. "Code-Centric Domain Isolation : a hardware/software co-design for efficient program isolation." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/385746.
Pełny tekst źródłaGoonasekera, Nuwan Abhayawardena. "Program-level support for protecting an application from untrustworthy components." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/60851/1/Nuwan_Goonasekera_Thesis.pdf.
Pełny tekst źródłaMaisuradze, Giorgi [Verfasser], and Christian [Akademischer Betreuer] Rossow. "Assessing the security of hardware-assisted isolation techniques / Giorgi Maisuradze ; Betreuer: Christian Rossow." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2019. http://d-nb.info/120658873X/34.
Pełny tekst źródłaBehrens, Diogo. "Error isolation in distributed systems." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-203428.
Pełny tekst źródłaBehrens, Diogo, Marco Serafini, Sergei Arnautov, Flavio Junqueira, and Christof Fetzer. "Scalable error isolation for distributed systems: modeling, correctness proofs, and additional experiments." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-203622.
Pełny tekst źródłaBehrens, Diogo, Marco Serafini, Sergei Arnautov, Flavio Junqueira, and Christof Fetzer. "Scalable error isolation for distributed systems: modeling, correctness proofs, and additional experiments." Technische Universität Dresden, 2015. https://tud.qucosa.de/id/qucosa%3A29539.
Pełny tekst źródłaSensaoui, Abderrahmane. "Etude et implémentation de mécanismes de protection d'exécution d'applications embarquées." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM002.
Pełny tekst źródłaDucasse, Quentin. "Sécurisation matérielle de la compilation à la volée des machines virtuelles langage." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2024. http://www.theses.fr/2024ENTA0003.
Pełny tekst źródłaWang, Shuo. "Control of a Uni-Axial Magnetorheological Vibration Isolator." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1302200947.
Pełny tekst źródłaBenhani, El mehdi. "Sécurité des systèmes sur puce complexes hétérogènes." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES016.
Pełny tekst źródłaKsiążki na temat "Hardware isolation"
Patterson, Christopher B. Open World Empire. NYU Press, 2020. http://dx.doi.org/10.18574/nyu/9781479802043.001.0001.
Pełny tekst źródłaCzęści książek na temat "Hardware isolation"
Passaretti, Daniele, Felix Boehm, Martin Wilhelm, and Thilo Pionteck. "Hardware Isolation Support for Low-Cost SoC-FPGAs." In Architecture of Computing Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21867-5_10.
Pełny tekst źródłaZhang, Kening, Ronald F. DeMara, and Carthik A. Sharma. "Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration." In Evolvable Systems: From Biology to Hardware. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11549703_2.
Pełny tekst źródłaYe, Mengmei, Myra B. Cohen, Witawas Srisa-an, and Sheng Wei. "EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security." In Search-Based Software Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99241-9_24.
Pełny tekst źródłaDowsley, Rafael, Jörn Müuller-Quade, and Tobias Nilges. "Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17470-9_12.
Pełny tekst źródłaDing, Baozeng, Fufeng Yao, Yanjun Wu, and Yeping He. "Improving Flask Implementation Using Hardware Assisted In-VM Isolation." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30436-1_10.
Pełny tekst źródłaTople, Shruti, Soyeon Park, Min Suk Kang, and Prateek Saxena. "VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation." In Applied Cryptography and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93387-0_34.
Pełny tekst źródłaShi, Bin, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, and Haiying Shen. "ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation." In Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00470-5_31.
Pełny tekst źródłaWang, Zhuoyue, Zhiqiang Wang, Jinyang Zhao, and Yaping Chi. "PCCP: A Private Container Cloud Platform Supporting Domestic Hardware and Software." In Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2456-9_41.
Pełny tekst źródłaYuan, Shenghao, Frédéric Besson, Jean-Pierre Talpin, Samuel Hym, Koen Zandberg, and Emmanuel Baccelli. "End-to-End Mechanized Proof of an eBPF Virtual Machine for Micro-controllers." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13188-2_15.
Pełny tekst źródłaMalipatlolla, Sunil. "A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40576-1_1.
Pełny tekst źródłaStreszczenia konferencji na temat "Hardware isolation"
Ekberg, Jan-Erik. "Hardware Isolation for Trusted Execution." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2994459.2994460.
Pełny tekst źródłaSong, Chengyu, Hyungon Moon, Monjur Alam, et al. "HDFI: Hardware-Assisted Data-Flow Isolation." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.9.
Pełny tekst źródłaYe, Mengmei, Nianhang Hu, and Sheng Wei. "Lightweight secure sensing using hardware isolation." In 2016 IEEE SENSORS. IEEE, 2016. http://dx.doi.org/10.1109/icsens.2016.7808904.
Pełny tekst źródłaAthalye, Anish, Frans Kaashoek, Nickolai Zeldovich, and Joseph Tassarotti. "The K2 Architecture for Trustworthy Hardware Security Modules." In KISV '23: 1st Workshop on Kernel Isolation, Safety and Verification. ACM, 2023. http://dx.doi.org/10.1145/3625275.3625402.
Pełny tekst źródłaKumar Saha, Sujan, and Christophe Bobda. "FPGA Accelerated Embedded System Security Through Hardware Isolation." In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2020. http://dx.doi.org/10.1109/asianhost51057.2020.9358258.
Pełny tekst źródłaJang, Jinsoo, and Brent Byunghoon Kang. "In-process Memory Isolation Using Hardware Watchpoint." In DAC '19: The 56th Annual Design Automation Conference 2019. ACM, 2019. http://dx.doi.org/10.1145/3316781.3317843.
Pełny tekst źródłaIbn Ziad, M. Tarek, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, and Hassan Bedour. "Homomorphic Data Isolation for Hardware Trojan Protection." In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.66.
Pełny tekst źródłaChen, Sui, Lu Peng, and Samuel Irving. "Accelerating GPU Hardware Transactional Memory with Snapshot Isolation." In ISCA '17: The 44th Annual International Symposium on Computer Architecture. ACM, 2017. http://dx.doi.org/10.1145/3079856.3080204.
Pełny tekst źródłaLeontie, Eugen, Gedare Bloom, Bhagirath Narahari, Rahul Simha, and Joseph Zambreno. "Hardware-enforced fine-grained isolation of untrusted code." In the first ACM workshop. ACM Press, 2009. http://dx.doi.org/10.1145/1655077.1655082.
Pełny tekst źródłaGarcia R., Ferreiro, Perez Castelo J., Pinon Pazos A., and Calvo Rolle J.L. "On Fault Isolation by Functional and Hardware Redundancy." In World Automation Congress (WAC) 2006. IEEE, 2006. http://dx.doi.org/10.1109/wac.2006.375955.
Pełny tekst źródłaRaporty organizacyjne na temat "Hardware isolation"
Author, Not Given. Characteristics of spent fuel, high-level waste, and other radioactive wastes which may require long-term isolation: Appendix 2E, Physical descriptions of LWR nonfuel assembly hardware, Appendix 2F, User's guide to the LWR nonfuel assembly data base. Office of Scientific and Technical Information (OSTI), 1987. http://dx.doi.org/10.2172/5294562.
Pełny tekst źródłaWu, Yingjie, Selim Gunay, and Khalid Mosalam. Hybrid Simulations for the Seismic Evaluation of Resilient Highway Bridge Systems. Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2020. http://dx.doi.org/10.55461/ytgv8834.
Pełny tekst źródła