Sciweavers

14515 search results - page 190 / 2903
» Efficient Embedded Computing
Sort
View
116
Voted
ESORICS
2010
Springer
15 years 3 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
TVLSI
2008
144views more  TVLSI 2008»
15 years 2 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 8 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
DFT
2003
IEEE
100views VLSI» more  DFT 2003»
15 years 7 months ago
Scan-Based BIST Diagnosis Using an Embedded Processor
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Kedarnath J. Balakrishnan, Nur A. Touba
RTAS
2003
IEEE
15 years 7 months ago
Evaluation of Application-aware Heterogeneous Embedded Systems for Performance and Energy Consumption
In this work, we first present an application-initiated strategy that aims to control the energy consumption, while simultaneously enhancing the performance of a heterogeneous emb...
Jayaprakash Pisharath, Nan Jiang, Alok N. Choudhar...