Sciweavers

1957 search results - page 122 / 392
» Embedded Processor Security
Sort
View
IPPS
2006
IEEE
15 years 11 months ago
Automatic application-specific microarchitecture reconfiguration
Applications for constrained embedded systems are subject to strict time constraints and restrictive resource utilization. With soft core processors, application developers can cu...
Shobana Padmanabhan, Ron K. Cytron, Roger D. Chamb...
ACSD
2007
IEEE
136views Hardware» more  ACSD 2007»
15 years 11 months ago
Mapping Applications to Tiled Multiprocessor Embedded Systems
Modern multiprocessor embedded systems execute a large number of tasks on shared processors and handle their complex communications on shared communication networks. Traditional m...
Lothar Thiele, Iuliana Bacivarov, Wolfgang Haid, K...
VLSID
2007
IEEE
97views VLSI» more  VLSID 2007»
15 years 11 months ago
Embedded Support Vector Machine : Architectural Enhancements and Evaluation
In recent years, research and development in the field of machine learning and classification techniques have gained paramount importance. The future generation of intelligent e...
Soumyajit Dey, Monu Kedia, Niket Agarwal, Anupam B...
DATE
2005
IEEE
169views Hardware» more  DATE 2005»
15 years 10 months ago
Design Optimization of Time-and Cost-Constrained Fault-Tolerant Distributed Embedded Systems
In this paper we present an approach to the design optimization of faulttolerant embedded systems for safety-critical applications. Processes are statically scheduled and communic...
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Pe...
RTCSA
2005
IEEE
15 years 10 months ago
Run-Time Power Consumption Modeling for Embedded Multimedia Systems
The run-time power consumption model for multimedia application routines in an embedded system is developed in this work. A wide range of benchmarks for these routines such as ima...
Yu Hu, Qing Li, C. C. Jay Kuo