Sciweavers

1005 search results - page 62 / 201
» Agile Methods for Embedded Systems
Sort
View
226
Voted
POPL
2006
ACM
16 years 2 months ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
LCTRTS
2010
Springer
15 years 7 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
123
Voted
ICIP
2008
IEEE
16 years 4 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
117
Voted
JDCTA
2010
148views more  JDCTA 2010»
14 years 9 months ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang
106
Voted
ECRTS
1999
IEEE
15 years 6 months ago
Performance of algorithms for scheduling real-time systems with overrun and overload
This paper compares the performance of three classes of scheduling algorithms for real-time systems in which jobs may overrun their allocated processor time potentially causing th...
Mark K. Gardner, Jane W.-S. Liu