Sciweavers

11603 search results - page 165 / 2321
» Embedded System Security
Sort
View
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
15 years 11 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
166
Voted
ACL2
2006
ACM
15 years 11 months ago
An embedding of the ACL2 logic in HOL
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...
DAC
2005
ACM
16 years 6 months ago
Memory access optimization through combined code scheduling, memory allocation, and array binding in embedded system design
In many of embedded systems, particularly for those with high data computations, the delay of memory access is one of the major bottlenecks in the system's performance. It ha...
Jungeun Kim, Taewhan Kim
DAC
2002
ACM
16 years 6 months ago
Schedulability of event-driven code blocks in real-time embedded systems
Many real-time embedded systems involve a collection of independently executing event-driven code blocks, having hard real-time constraints. Tasks in many such systems, like netwo...
Samarjit Chakraborty, Thomas Erlebach, Simon K&uum...
WORDS
2005
IEEE
15 years 10 months ago
Functional and Non-Functional Properties in a Family of Embedded Operating Systems
The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings u...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...