Sciweavers

11603 search results - page 95 / 2321
» Securing Embedded Systems
Sort
View
120
Voted
SEUS
2005
IEEE
15 years 7 months ago
A Case Study on Partial Evaluation in Embedded Software Design
Source code generators are often applied in embedded systems design to combine the flexibility necessary for reusability with the performance of highly specialized software. Howe...
Michael Jung, Ralf Laue 0002, Sorin A. Huss
148
Voted
CASES
2008
ACM
15 years 4 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
80
Voted
SMC
2007
IEEE
15 years 8 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
106
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Embedded Architect: A Tool for Early Performance Evaluation of Embedded Software
Embedded Architect is a design automation tool that embodies a static performance evaluation technique to support early, architecture-level design space exploration for component-...
Jeffry T. Russell, Margarida F. Jacome
ISSS
1995
IEEE
116views Hardware» more  ISSS 1995»
15 years 5 months ago
The Chinook hardware/software co-synthesis system
Designers of embedded systems are facing ever tighter constraintson design time, but computer aided design tools for embedded systems have not kept pace with these trends. The Chi...
Pai H. Chou, Ross B. Ortega, Gaetano Borriello