Sciweavers

11603 search results - page 91 / 2321
» Embedded System Security
Sort
View
AGILEDC
2004
IEEE
15 years 8 months ago
Taming the Embedded Tiger - Agile Test Techniques for Embedded Software
Strong unit testing is the foundation of agile software development but embedded systems present special problems. Test of embedded software is bound up with test of hardware, cro...
Nancy Van Schooenderwoert, Ron Morsicato
EUSFLAT
2007
183views Fuzzy Logic» more  EUSFLAT 2007»
15 years 6 months ago
Soft Computing in Wireless Sensors Networks
The embedded soft computing approach in wireless sensor networks is suggested. This approach means a combination of embedded fuzzy logic and neural networks models for information...
Alexey N. Averkin, A. G. Belenki
CCS
2008
ACM
15 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ICIP
2005
IEEE
16 years 6 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong