Sciweavers

883 search results - page 59 / 177
» Getting the right design and the design right
Sort
View
TC
2008
13 years 8 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
DLT
2009
13 years 6 months ago
On Stateless Multihead Finite Automata and Multihead Pushdown Automata
A stateless k-head two-way deterministic finite automaton (k-head 2DFA), has only one state, hence the designation stateless. Its transitions depends solely on the symbols currentl...
Pierluigi Frisco, Oscar H. Ibarra
DAC
1998
ACM
14 years 10 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
DEXA
2004
Springer
94views Database» more  DEXA 2004»
14 years 2 months ago
Visualization Process of Temporal Data
Abstract. Temporal data are abundantly present in many application domains such as banking, financial, clinical, geographical applications and so on. Temporal data have been extens...
Chaouki Daassi, Laurence Nigay, Marie-Christine Fa...
PFE
2001
Springer
14 years 1 months ago
Introducing Product Lines in Small Embedded Systems
: How do you introduce product lines into a hardware dominated organization that has increasing software architecture awareness and products with extremely limited memory resources...
Christoph Stoermer, Markus Roeddiger