Sciweavers

11603 search results - page 95 / 2321
» Securing Embedded Systems
Sort
View
SEUS
2005
IEEE
14 years 2 months ago
A Case Study on Partial Evaluation in Embedded Software Design
Source code generators are often applied in embedded systems design to combine the flexibility necessary for reusability with the performance of highly specialized software. Howe...
Michael Jung, Ralf Laue 0002, Sorin A. Huss
CASES
2008
ACM
13 years 11 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
SMC
2007
IEEE
14 years 3 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
ICSE
2003
IEEE-ACM
14 years 9 months ago
Embedded Architect: A Tool for Early Performance Evaluation of Embedded Software
Embedded Architect is a design automation tool that embodies a static performance evaluation technique to support early, architecture-level design space exploration for component-...
Jeffry T. Russell, Margarida F. Jacome
ISSS
1995
IEEE
116views Hardware» more  ISSS 1995»
14 years 12 days ago
The Chinook hardware/software co-synthesis system
Designers of embedded systems are facing ever tighter constraintson design time, but computer aided design tools for embedded systems have not kept pace with these trends. The Chi...
Pai H. Chou, Ross B. Ortega, Gaetano Borriello