Sciweavers

11603 search results - page 183 / 2321
» Embedded System Security
Sort
View
CODES
2001
IEEE
15 years 8 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
CODES
2001
IEEE
15 years 8 months ago
Hardware/software partitioning of embedded system in OCAPI-xl
The implementation of embedded networked appliances requires a mix of processor cores and HW accelerators on a single chip. When designing such complex and heterogeneous SoCs, the...
Geert Vanmeerbeeck, Patrick Schaumont, Serge Verna...
ISCAPDCS
2008
15 years 6 months ago
QoS for Networked Heterogeneous Real-Time Embedded Systems
--With the development of networked real-time embedded systems, the ability to guarantee traffic throughput rates and to decrease delay, energy, and loss rates, is particularly imp...
Meikang Qiu, Jiande Wu, Chun Jason Xue, Jingtong H...
TC
2008
15 years 5 months ago
A Dynamic Slack Management Technique for Real-Time Distributed Embedded Systems
This work presents a novel slack management technique, the Service-Rate-Proportionate (SRP) Slack Distribution, for real-time distributed embedded systems to reduce energy consumpt...
Subrata Acharya, Rabi N. Mahapatra
IFM
2010
Springer
204views Formal Methods» more  IFM 2010»
15 years 3 months ago
Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems
This paper presents initial results of research aimed at developing methods and tools for multidisciplinary collaborative development of dependable embedded systems. We focus on th...
John S. Fitzgerald, Peter Gorm Larsen, Ken Pierce,...