Sciweavers

447 search results - page 24 / 90
» Embedded Software Analysis with MOTOR
Sort
View
CODES
2001
IEEE
13 years 11 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
RTAS
2008
IEEE
14 years 2 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
IWNAS
2008
IEEE
14 years 2 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
SAC
2008
ACM
13 years 7 months ago
Toward quality requirements analysis based on domain specific quality spectrum
It is difficult to identify whether quality requirements are defined adequately or not, but there are few methods to support this kind of requirements analysis. In this paper, we ...
Haruhiko Kaiya, Tomonori Sato, Akira Osada, Naoyuk...
CASES
2005
ACM
13 years 9 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...