Sciweavers

3516 search results - page 25 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ISLPED
2000
ACM
68views Hardware» more  ISLPED 2000»
13 years 12 months ago
Speeding up power estimation of embedded software
Power is increasingly becoming a design constraint for embedded systems. A processor is responsible for energy consumption on account of the software component of the embedded sys...
Akshaye Sama, J. F. M. Theeuwen, M. Balakrishnan
VLSID
2009
IEEE
110views VLSI» more  VLSID 2009»
14 years 8 months ago
Security and Dependability of Embedded Systems: A Computer Architects' Perspective
Jörg Henkel, Roshan G. Ragel, Sri Parameswara...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 1 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
CODES
1996
IEEE
13 years 11 months ago
Embedded Architecture Co-Synthesis and System Integration
Abstract
Bill Lin, Steven Vercauteren, Hugo De Man