Sciweavers

127 search results - page 12 / 26
» Making embedded software reuse practical and safe
Sort
View
ICFEM
2009
Springer
14 years 2 months ago
Circular Coinduction with Special Contexts
Coinductive proofs of behavioral equivalence often require human ingenuity, in that one is expected to provide a “good” relation extending one’s goal with additional lemmas, ...
Dorel Lucanu, Grigore Rosu
ISPW
2007
IEEE
14 years 1 months ago
Coping with the Cone of Uncertainty: An Empirical Study of the SAIV Process Model
There is large uncertainty with the software cost in the early stages of software development due to requirement volatility, incomplete understanding of product domain, reuse oppor...
Da Yang, Barry W. Boehm, Ye Yang, Qing Wang, Mings...
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
ICCAD
2002
IEEE
82views Hardware» more  ICCAD 2002»
14 years 17 days ago
Hardware/software partitioning of software binaries
Partitioning an embedded system application among a microprocessor and custom hardware has been shown to improve the performance, power or energy of numerous examples. The advent ...
Greg Stitt, Frank Vahid
CBSE
2008
Springer
13 years 9 months ago
Component-Level Energy Consumption Estimation for Distributed Java-Based Software Systems
Efficiency with respect to energy consumption has increasingly been recognized as an important quality attribute for distributed software systems in embedded and pervasive environm...
Chiyoung Seo, Sam Malek, Nenad Medvidovic