Sciweavers

2960 search results - page 384 / 592
» A vision for embedded software
Sort
View
ARCS
2004
Springer
15 years 9 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
CC
2004
Springer
15 years 9 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 9 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
IEEEINTERACT
2003
IEEE
15 years 9 months ago
High Performance Code Generation through Lazy Activation Records
For call intensive programs, function calls are major bottlenecks during program execution since they usually force register contents to be spilled into memory. Such register to m...
Manoranjan Satpathy, Rabi N. Mahapatra, Siddharth ...
ITC
2003
IEEE
168views Hardware» more  ITC 2003»
15 years 9 months ago
Agent Based DBIST/DBISR And Its Web/Wireless Management
This paper presents an attempt of using intelligent agents for testing and repairing a distributed system, whose elements may or may not have embedded BIST (Built-In Self-Test) an...
Liviu Miclea, Szilárd Enyedi, Gavril Todere...