Sciweavers

11603 search results - page 194 / 2321
» Securing Embedded Systems
Sort
View
126
Voted
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 8 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
106
Voted
IJES
2007
79views more  IJES 2007»
15 years 2 months ago
Energy-aware compilation and hardware design for VLIW embedded systems
Abstract: Tomorrow’s embedded devices need to run high-resolution multimedia applications which need an enormous computational complexity with a very low energy consumption const...
José L. Ayala, Marisa López-Vallejo,...
152
Voted
FDL
2007
IEEE
15 years 9 months ago
Automatic High Level Assertion Generation and Synthesis for Embedded System Design
SystemVerilog encapsulates both design description and verification properties in one language and provides a unified environment for engineers who have the formidable challenge o...
Lun Li, Frank P. Coyle, Mitchell A. Thornton
118
Voted
SETP
2007
15 years 4 months ago
A Generic Software Architecture for a Domain Specific Distributed Embedded System
—In this paper, we have evolved a generic software architecture for a domain specific distributed embedded system. The system under consideration belongs to the Command, Control ...
G. Santhosh Kumar, K. Rameetha, K. Poulose Jacob
131
Voted
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
16 years 3 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron