Sciweavers

1957 search results - page 167 / 392
» Embedded Processor Security
Sort
View
ICIP
2005
IEEE
16 years 6 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
123
Voted
DAC
1999
ACM
16 years 6 months ago
Constraint Driven Code Selection for Fixed-Point DSPs
Abstract? Fixed-point DSPs are a class of embedded processors with highly irregular architectures. This irregularity makes it difficult to generate high-quality machine code from p...
Steven Bashford, Rainer Leupers
DSD
2007
IEEE
142views Hardware» more  DSD 2007»
15 years 11 months ago
Decoupling of Computation and Communication with a Communication Assist
Abstract. In an embedded multiprocessor system the minimum throughput and maximum latency of real-time applications are usually derived given the worst-case execution time of the s...
Arno Moonen, Marco Bekooij, Rene van den Berg, Jef...
SAMOS
2007
Springer
15 years 11 months ago
Evaluating Large System-on-Chip on Multi-FPGA Platform
This paper presents a configurable base architecture tailorable for different applications. It allows simple and rapid way to evaluate and prototype large Multi-Processor System-on...
Ari Kulmala, Erno Salminen, Timo D. Hämä...
129
Voted
ASYNC
2005
IEEE
112views Hardware» more  ASYNC 2005»
15 years 10 months ago
Request-Driven GALS Technique for Wireless Communication System
A Globally Asynchronous - Locally Synchronous (GALS) technique for application in wireless communication systems is proposed and evaluated. The GALS wrappers are based on a reques...
Milos Krstic, Eckhard Grass, Christian Stahl