Sciweavers

1784 search results - page 113 / 357
» Comparing designs for computer simulation experiments
Sort
View
DAC
2008
ACM
13 years 10 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
CCS
2005
ACM
14 years 2 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
ICNSC
2007
IEEE
14 years 3 months ago
Unstable Object Stabilization and Control Using a DD Robot Manipulator
— This paper addresses the issue of robotic manipulation of multi-DOF inverted pendulums. A control scheme is designed using Lyaponov stability theory for both the robot position...
Zhao-Hui Jiang, Kouya Kamise
IPPS
2006
IEEE
14 years 3 months ago
An integrated approach for density control and routing in wireless sensor networks
Wireless Sensor Networks (WSNs) are characterized by having scarce resources. The usual way of designing network functions is to consider them isolatedly, a strategy which may not...
Isabela G. Siqueira, Carlos Mauricio S. Figueiredo...
RTCSA
2006
IEEE
14 years 3 months ago
Hardware-Software Codesign of Multimedia Embedded Systems: the PeaCE
Hardware/software codesign involves various design problems including system specification, design space exploration, hardware/software co-verification, and system synthesis. A co...
Soonhoi Ha, Choonseung Lee, Youngmin Yi, Seongnam ...