Sciweavers

11603 search results - page 123 / 2321
» Securing Embedded Systems
Sort
View
MMSEC
2004
ACM
209views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology t...
Emir Ganic, Ahmet M. Eskicioglu
ICCAD
1998
IEEE
109views Hardware» more  ICCAD 1998»
14 years 1 months ago
CORDS: hardware-software co-synthesis of reconfigurable real-time distributed embedded systems
Field programmable gate arrays (FPGAs) are commonly used in embedded systems. Although it is possible to reconfigure some FPGAs while an embedded system is operational, this featu...
Robert P. Dick, Niraj K. Jha
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 9 months ago
Stable Takens' Embeddings for Linear Dynamical Systems
Takens' Embedding Theorem remarkably established that concatenating M previous outputs of a dynamical system into a vector (called a delay coordinate map) can be a one-to-one...
Han Lun Yap, Christopher J. Rozell
ACSAC
2003
IEEE
14 years 2 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
DATE
2000
IEEE
88views Hardware» more  DATE 2000»
14 years 1 months ago
Free MDD-Based Software Optimization Techniques for Embedded Systems
Embedded systems make a heavy use of software to perform Real-Time embedded control tasks. Embedded software is characterized by a relatively long lifetime and by tight cost, perf...
Chunghee Kim, Luciano Lavagno, Alberto L. Sangiova...