Sciweavers

823 search results - page 39 / 165
» Embedded Robustness Ips
Sort
View
111
Voted
ACSAC
2010
IEEE
14 years 3 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
15 years 4 months ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken
DT
2006
180views more  DT 2006»
14 years 11 months ago
A SystemC Refinement Methodology for Embedded Software
process: Designers must define higher abstraction levels that allow system modeling. They must use description languages that handle both hardware and software components to descri...
Jérôme Chevalier, Maxime de Nanclas, ...
GECCO
2008
Springer
239views Optimization» more  GECCO 2008»
15 years 20 days ago
Multiobjective design of operators that detect points of interest in images
In this paper, a multiobjective (MO) learning approach to image feature extraction is described, where Pareto-optimal interest point (IP) detectors are synthesized using genetic p...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
VLSID
2004
IEEE
170views VLSI» more  VLSID 2004»
15 years 12 months ago
On-chip networks: A scalable, communication-centric embedded system design paradigm
As chip complexity grows, design productivity boost is expected from reuse of large parts and blocks of previous designs with the design effort largely invested into the new parts...
Jörg Henkel, Srimat T. Chakradhar, Wayne Wolf