Sciweavers

1957 search results - page 120 / 392
» Embedded Processor Security
Sort
View
NOSSDAV
2005
Springer
15 years 10 months ago
Meeting CPU constraints by delaying playout of multimedia tasks
Multimedia applications today constitute a significant fraction of the workload running on portable devices such as mobile phones, PDAs and MP3 players. However, the processors i...
Balaji Raman, Samarjit Chakraborty, Wei Tsang Ooi
SAMOS
2005
Springer
15 years 10 months ago
Sandbridge Software Tools
—We describe the generation of the simulation environment for the Sandbridge Sandblaster multithreaded processor. The processor model is described using the Sandblaster architect...
C. John Glossner, Sean Dorward, Sanjay Jinturkar, ...
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 5 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
JPDC
2006
141views more  JPDC 2006»
15 years 4 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
ASPDAC
2010
ACM
129views Hardware» more  ASPDAC 2010»
15 years 2 months ago
System-level development of embedded software
Abstract-- Embedded software plays an increasingly important role in implementing modern embedded systems. Development of embedded software, and of Hardware-dependent Software in p...
Gunar Schirner, Andreas Gerstlauer, Rainer Dö...