Sciweavers

1957 search results - page 10 / 392
» Embedded Processor Security
Sort
View
ICCAD
2000
IEEE
135views Hardware» more  ICCAD 2000»
15 years 6 months ago
Power Optimization of Real-Time Embedded Systems on Variable Speed Processors
Power efficient design of real-time embedded systems based on programmable processors becomes more important as system functionality is increasingly realized through software. Th...
Youngsoo Shin, Kiyoung Choi, Takayasu Sakurai
119
Voted
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
15 years 8 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
96
Voted
HOST
2008
IEEE
15 years 8 months ago
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
Johann Großschädl, Tobias Vejda, Dan Pa...
125
Voted
DATE
2006
IEEE
120views Hardware» more  DATE 2006»
15 years 5 months ago
Battery-aware code partitioning for a text to speech system
The advent of multi-core embedded processors has brought along new challenges for embedded system design. This paper presents an efficient, battery aware, code partitioning techni...
Anirban Lahiri, Anupam Basu, Monojit Choudhury, Sr...
114
Voted
ASPDAC
1999
ACM
98views Hardware» more  ASPDAC 1999»
15 years 6 months ago
Generation of Interpretive and Compiled Instruction Set Simulators
Abstract Due to the large variety of di erent embedded processor types, retargetable software development tools, such as compilers and simulators, have received attention recently....
Rainer Leupers, Johann Elste, Birger Landwehr