Sciweavers

3516 search results - page 104 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ETS
2007
IEEE
91views Hardware» more  ETS 2007»
14 years 3 months ago
PPM Reduction on Embedded Memories in System on Chip
This paper summarizes advanced test patterns designed to target dynamic and time-related faults caused by new defect mechanisms in deep-submicron memory technologies. Such tests a...
Said Hamdioui, Zaid Al-Ars, Javier Jiménez,...
DAC
2008
ACM
13 years 10 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
CASES
2011
ACM
12 years 9 months ago
Enabling parametric feasibility analysis in real-time calculus driven performance evaluation
This paper advocates a rigorously formal and compositional style for obtaining key performance and/or interface metrics of systems with real-time constraints. We propose a hierarc...
Alena Simalatsar, Yusi Ramadian, Kai Lampka, Simon...
IJCAI
1989
13 years 10 months ago
Decision-Making in an Embedded Reasoning System
The developmentof reasoning systems that can reason and plan in a continuously changing environment is emerging as an important area of research in Arti cial Intelligence. Thispap...
Michael P. Georgeff, François Felix Ingrand
NBIS
2009
Springer
14 years 3 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...