Sciweavers

2945 search results - page 42 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISCAS
2006
IEEE
107views Hardware» more  ISCAS 2006»
15 years 10 months ago
Design and implementation of content-adaptive background skipping for wireless video
—This work presents a low-complexity system implementation of a novel content-adaptive background skipping scheme for region-of-interest (ROI) video coding in mobile video phone ...
Yi Liang, Haohong Wang, Khaled El-Maleh
ICSE
2000
IEEE-ACM
15 years 7 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
MSS
2003
IEEE
95views Hardware» more  MSS 2003»
15 years 9 months ago
Design and Implementation of a Block Storage Multi-Protocol Converter
We present the Block Storage Multi-Protocol Converter (BSMC) software architecture, which is able to translate and manage SCSI commands carried by different SCSI transport protoco...
Irina Gerasimov, Alexey Zhuravlev, Mikhail Pershin...
133
Voted
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
15 years 8 months ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli
IPPS
2006
IEEE
15 years 10 months ago
FPGA implementation of a license plate recognition SoC using automatically generated streaming accelerators
Modern FPGA platforms provide the hardware and software infrastructure for building a bus-based System on Chip (SoC) that meet the applications requirements. The designer can cust...
Nikolaos Bellas, Sek M. Chai, Malcolm Dwyer, Dan L...