Sciweavers

287 search results - page 26 / 58
» Grand challenges in embedded software
Sort
View
EMSOFT
2009
Springer
14 years 4 months ago
Handling mixed-criticality in SoC-based real-time embedded systems
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In ...
Rodolfo Pellizzoni, Patrick O'Neil Meredith, Min-Y...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
14 years 10 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CEC
2010
IEEE
13 years 7 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben
SWSTE
2010
IEEE
14 years 1 months ago
Agility in a Large-Scale System Engineering Project: A Case-Study of an Advanced Communication System Project
—In this paper we describe the application of the agile software development approach in system engineering projects. We describe the main characteristics of system projects, hig...
Amir Shatil, Orit Hazzan, Yael Dubinsky
ESORICS
2010
Springer
13 years 10 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik