Sciweavers

1042 search results - page 93 / 209
» Synthesis of Software Programs for Embedded Control Applicat...
Sort
View
CL
2010
Springer
13 years 8 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CCS
2009
ACM
13 years 12 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
RSP
2003
IEEE
111views Control Systems» more  RSP 2003»
14 years 1 months ago
Exploring the Probabilistic Design Space of Multimedia Systems
In this paper, we propose the novel concept of probabilistic design for multimedia systems and a methodology to quickly explore such design space at an early design stage. The pro...
Shaoxiong Hua, Gang Qu, Shuvra S. Bhattacharyya
EMSOFT
2007
Springer
14 years 2 months ago
Proving the absence of run-time errors in safety-critical avionics code
We explain the design of the interpretation-based static analyzer Astr´ee and its use to prove the absence of run-time errors in safety-critical codes. Categories and Subject Des...
Patrick Cousot
EDOC
2006
IEEE
14 years 1 months ago
Services and Networks management through embedded devices and SOA
In this paper we present an embedded device able to manage the remote boot of network nodes by means of Wake on LAN (WoL) through Internet and Wide Area Network, presenting it as ...
Virgilio Gilart-Iglesias, Francisco Maciá P...