Sciweavers

3516 search results - page 54 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 10 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
DAC
2005
ACM
14 years 9 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim
ECBS
2000
IEEE
115views Hardware» more  ECBS 2000»
14 years 1 months ago
Discrete Event System Specification (DEVS) and StateMate StateCharts Equivalence for Embedded Systems Modeling
Recently, modeling has received a lot of attention in the design of embedded computing systems. StateCharts is one of the modeling specifications which has been successfully imple...
Stephan Schulz II, T. C. Ewing, Jerzy W. Rozenblit
CODES
2000
IEEE
14 years 1 months ago
A method to derive application-specific embedded processing cores
The concept of system-on-a-chip is becoming increasingly popular for the integration of complex systems. New types of processor cores are now available that enable the designer to...
Olivier Hébert, Ivan C. Kraljic, Yvon Savar...
AGENTS
1997
Springer
14 years 1 months ago
Integrating Communicative Action, Conversations and Decision Theory to Coordinate Agents
The coordination problem in multi-agent systems is the problem of managing dependencies between the activities of autonomous agents, in conditions of incomplete knowledge about th...
Mihai Barbuceanu, Mark S. Fox