Sciweavers

11603 search results - page 73 / 2321
» Securing Embedded Systems
Sort
View
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 3 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 3 months ago
A Novel Concept: Message Driven Frequency Hopping (MDFH)
—Frequency hopping systems have been widely used in military communications to prevent hostile jamming, interception and detection. In traditional frequency hopping (FH) systems,...
Qi Ling, Tongtong Li, Zhi Ding
INDOCRYPT
2010
Springer
13 years 6 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
IESS
2007
Springer
138views Hardware» more  IESS 2007»
14 years 3 months ago
Medical Embedded Systems
Roozbeh Jafari, Soheil Ghiasi, Majid Sarrafzadeh
ECBS
2006
IEEE
175views Hardware» more  ECBS 2006»
14 years 2 months ago
Correct-ed through Construction: A Model-based Approach to Embedded Systems Reality
We present a design methodology for specifying embedded systems that addresses the complex nature of embedded systems design. Our approach uses modern model-based techniques to co...
Ethan K. Jackson, Janos Sztipanovits