Sciweavers

3516 search results - page 63 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 8 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
CODES
2006
IEEE
14 years 2 months ago
Integrated analysis of communicating tasks in MPSoCs
Predicting timing behavior is key to efficient embedded real-time system design and verification. Especially memory accesses and co-processor calls over shared communication net...
Simon Schliecker, Matthias Ivers, Rolf Ernst
APSEC
2006
IEEE
13 years 10 months ago
Using Operational Architecture to Model Embedded Software
Almost methods in embedded software modeling take software architecture as one of the crucial parts of the design process. Since a principal role of embedded software is the inter...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae
CODES
2005
IEEE
14 years 2 months ago
A power estimation methodology for systemC transaction level models
Majority of existing works on system level power estimation have focused on the processor, while there are very few that address power consumption of peripherals in a SoC. With th...
Nagu R. Dhanwada, Ing-Chao Lin, Vijay Narayanan
DATE
2006
IEEE
126views Hardware» more  DATE 2006»
14 years 2 months ago
Communication and co-simulation infrastructure for heterogeneous system integration
With the increasing complexity and heterogeneity of embedded electronic systems, a unified design methodology at evels of abstraction becomes a necessity. Meanwhile, it is also i...
Guang Yang 0004, Xi Chen, Felice Balarin, Harry Hs...