Sciweavers

33 search results - page 6 / 7
» Impact of function inlining on resource-constrained embedded...
Sort
View
POS
2000
Springer
13 years 9 months ago
Hyper-Code Revisited: Unifying Program Source, Executable, and Data
Abstract. The technique of hyper-programming allows program representations held in a persistent store to contain embedded links to persistent code and data. In 1994, Connor et al ...
Evangelos Zirintsis, Graham N. C. Kirby, Ronald Mo...
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
13 years 7 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
NOSSDAV
2010
Springer
13 years 10 months ago
Towards understanding the external links of video sharing sites: measurement and analysis
Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Kunfeng Lai, Dan Wang
EMSOFT
2005
Springer
13 years 11 months ago
Compiler-guided register reliability improvement against soft errors
With the scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely ...
Jun Yan, Wei Zhang
RTCSA
2003
IEEE
13 years 11 months ago
Introducing Temporal Analyzability Late in the Lifecycle of Complex Real-Time Systems
Many industrial real-time systems have evolved over a long period of time and were initially so simple that it was possible to predict consequences of adding new functionality by c...
Anders Wall, Johan Andersson, Jonas Neander, Chris...