Capability based tagged architectures Lopriore IEEE transactions on computers 100 (9), 786-803, 1984 | 23 | 1984 |
A programmable debugging aid for real-time software development B Lazzerini, L Lopriore, CA Prete IEEE MICRO 6 (3), 34-42, 1986 | 20 | 1986 |
Key propagation in wireless sensor networks G Dini, L Lopriore Computers & Electrical Engineering 41, 426-433, 2015 | 18 | 2015 |
Abstraction mechanisms for event control in program debugging B Lazzerini, L Lopriore IEEE transactions on software engineering 15 (7), 890-901, 1989 | 17 | 1989 |
Line fetch/prefetch in a stack cache memory L Lopriore Microprocessors and Microsystems 17 (9), 547-555, 1993 | 16 | 1993 |
Encrypted pointers in protection system design L Lopriore The Computer Journal 55 (4), 497-507, 2012 | 14 | 2012 |
Access control mechanisms in a distributed, persistent memory system L Lopriore IEEE Transactions on Parallel and Distributed Systems 13 (10), 1066-1083, 2002 | 13 | 2002 |
Password capabilities revisited L Lopriore The Computer Journal 58 (4), 782-791, 2015 | 12 | 2015 |
Single address space implementation in distributed systems A Bartoli, G Dini, L Lopriore Concurrency: Practice and Experience 12 (4), 251-280, 2000 | 11 | 2000 |
Distributing and revoking access authorizations on abstract objecs: A capability approch P Corsini, G Frosini, L Lopriore Software: Practice and Experience 14 (10), 931-943, 1984 | 11 | 1984 |
Password management: distribution, review and revocation L Lopriore The Computer Journal 58 (10), 2557-2566, 2015 | 10 | 2015 |
Caching and prefetching algorithms for programs with looping reference patterns G Dini, G Lettieri, L Lopriore The Computer Journal 49 (1), 42-61, 2006 | 10 | 2006 |
The implementation of abstract objects in a capability based addressing architecture P Corsini, G Frosini, L Lopriore The Computer Journal 27 (2), 127-134, 1984 | 10 | 1984 |
Memory protection in embedded systems L Lopriore Journal of Systems Architecture 63, 61-69, 2016 | 9 | 2016 |
An implementation of storage management in capability environments P Corsini, L Lopriore Software: Practice and Experience 25 (5), 501-520, 1995 | 9 | 1995 |
The architecture of a capability-based microprocessor system P Corsini, L Lopriore IEEE Micro 7 (3), 35-51, 1987 | 9 | 1987 |
Distributed storage protection in wireless sensor networks G Dini, L Lopriore Journal of Systems Architecture 61 (5-6), 256-266, 2015 | 8 | 2015 |
Object and process migration in a single-address-space distributed system L Lopriore Microprocessors and Microsystems 23 (10), 587-595, 2000 | 8 | 2000 |
Program Debugging Environments, Design and Utilization B Lazzerini, L Lopriore Ellis Horwood/Simon & Schuster, 1992 | 8 | 1992 |
Hardware/compiler memory protection in sensor nodes L Lopriore International Journal of Communications, Network and System Sciences 1 (3), 235, 2008 | 7 | 2008 |