Sciweavers

1957 search results - page 105 / 392
» Embedded Processor Security
Sort
View
SUTC
2008
IEEE
15 years 9 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han
ETFA
2008
IEEE
15 years 9 months ago
Towards migrating legacy real-time systems to multi-core platforms
Power consumption and thermal problems limit the single-core processors to be faster. Processor architects are therefore moving toward multi-core processors. Developers of embedde...
Farhang Nemati, Johan Kraft, Thomas Nolte
124
Voted
ANCS
2006
ACM
15 years 6 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
136
Voted
DAC
2004
ACM
16 years 3 months ago
Leakage aware dynamic voltage scaling for real-time embedded systems
A five-fold increase in leakage current is predicted with each technology generation. While Dynamic Voltage Scaling (DVS) is known to reduce dynamic power consumption, it also cau...
Ravindra Jejurikar, Cristiano Pereira, Rajesh K. G...
115
Voted
IOLTS
2006
IEEE
102views Hardware» more  IOLTS 2006»
15 years 8 months ago
Emulation-based Fault Injection in Circuits with Embedded Memories
FPGA emulation has proven to be a performance effective method to analyse the behaviour of digital circuits in the presence of soft errors due to SEU effects. In particular, the r...
Mario García-Valderas, Marta Portela-Garc&i...