Sciweavers

2523 search results - page 289 / 505
» Correct Development of Embedded Systems
Sort
View
104
Voted
ARCS
2004
Springer
15 years 8 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
104
Voted
EUROMICRO
2004
IEEE
15 years 6 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
141
Voted
SOSP
2007
ACM
15 years 11 months ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
107
Voted
GIS
2002
ACM
15 years 2 months ago
Mapping Dilution of Precision (MDOP) and map-matched GPS
A novel method of map matching using the Global Positioning System (GPS) has been developed which uses digital mapping and height data to augment point position computation. This m...
Geoffrey Blewitt, George E. Taylor
93
Voted
CSL
2009
Springer
15 years 9 months ago
On the Relation between Sized-Types Based Termination and Semantic Labelling
We investigate the relationship between two independently developed termination techniques for rst and higher-order rewrite systems. On the one hand, sized-types based termination...
Frédéric Blanqui, Cody Roux