Sciweavers

11603 search results - page 107 / 2321
» Securing Embedded Systems
Sort
View
ASIACRYPT
2001
Springer
14 years 1 months ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra
ICMCS
1999
IEEE
127views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Achievable Performance of Digital Watermarking Systems
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
Brian Chen, Gregory W. Wornell
ISORC
2008
IEEE
14 years 3 months ago
The Complexity Challenge in Embedded System Design
The specific constraints that must be satisfied by embedded systems, such as timeliness, energy efficiency of battery-operated devices, dependable operation in safety-relevant sce...
Hermann Kopetz
AINA
2007
IEEE
14 years 3 months ago
A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems
Embedded signal processing system is a typical type of application in embedded domain. Such systems typically have requirements on high real-time responsiveness and large buffer c...
Nan Guan, Mingsong Lv, Qingxu Deng, Ge Yu
CASES
2001
ACM
14 years 17 days ago
The performance and energy consumption of three embedded real-time operating systems
This paper presents the modeling of embedded systems with SimBed, an execution-driven simulation testbed that measures the execution behavior and power consumption of embedded app...
Kathleen Baynes, Chris Collins, Eric Fiterman, Bri...