Sciweavers

1957 search results - page 236 / 392
» Embedded Processor Security
Sort
View
JVCA
2007
78views more  JVCA 2007»
15 years 5 months ago
Stable advection-reaction-diffusion with arbitrary anisotropy
Turing first theorized that many biological patterns arise through the processes of reaction and diffusion [1]. Subsequently, reaction-diffusion systems have been studied in ma...
Theodore Kim, Ming C. Lin
ICIP
2008
IEEE
16 years 6 months ago
Principal Component Analysis of spectral coefficients for mesh watermarking
This paper proposes a new robust 3-D object blind watermarking method using constraints in the spectral domain. Mesh watermarking in spectral domain has the property of spreading ...
Ming Luo, Adrian G. Bors
CODES
2008
IEEE
15 years 11 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
142
Voted
CODES
2003
IEEE
15 years 10 months ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid
WSNA
2003
ACM
15 years 10 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...