Sciweavers

943 search results - page 110 / 189
» Simulation based deadlock analysis for system level designs
Sort
View
PERCOM
2008
ACM
13 years 8 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
PROMS
2001
Springer
109views Multimedia» more  PROMS 2001»
14 years 1 months ago
Model-Based Service Creation in the Friends Project
—This paper presents a model-based approach to service creation. We observe that the complexity of software services increases. To manage this complexity, and to quickly create s...
Wouter B. Teeuw, Dick A. C. Quartel
COOPIS
2002
IEEE
14 years 1 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 2 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
DAC
2010
ACM
13 years 9 months ago
A correlation-based design space exploration methodology for multi-processor systems-on-chip
Given the increasing complexity of multi-processor systems-onchip, a wide range of parameters must be tuned to find the best trade-offs in terms of the selected system figures of ...
Giovanni Mariani, Aleksandar Brankovic, Gianluca P...