Sciweavers

330 search results - page 34 / 66
» Instruction Set Limitation in Support of Software Diversity
Sort
View
DAC
2005
ACM
14 years 8 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
TCAD
2010
90views more  TCAD 2010»
13 years 2 months ago
Fast, Nearly Optimal ISE Identification With I/O Serialization Through Maximal Clique Enumeration
The last decade has witnessed the emergence of the application-specific instruction-set processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
ASPLOS
1996
ACM
13 years 12 months ago
An Integrated Compile-Time/Run-Time Software Distributed Shared Memory System
On a distributed memory machine, hand-coded message passing leads to the most efficient execution, but it is difficult to use. Parallelizing compilers can approach the performance...
Sandhya Dwarkadas, Alan L. Cox, Willy Zwaenepoel
CODES
2002
IEEE
14 years 20 days ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
ICEIS
2003
IEEE
14 years 29 days ago
Knowledge Construction in E-Learning - Designing an E-Learning Environment
: In the traditional classroom, students learned to depend on tutors for their motivation, direction, goal setting, progress monitoring, self-assessment, and achievement. A fundame...
Kecheng Liu, Shirley Williams, Lily Sun