Sciweavers

2361 search results - page 151 / 473
» Embedded Systems - Challenges and Work Directions
Sort
View
CASES
2006
ACM
15 years 4 months ago
Scalable subgraph mapping for acyclic computation accelerators
Computer architects are constantly faced with the need to improve performance and increase the efficiency of computation in their designs. To this end, it is increasingly common ...
Nathan Clark, Amir Hormati, Scott A. Mahlke, Sami ...
DATE
2007
IEEE
173views Hardware» more  DATE 2007»
15 years 4 months ago
Architectural leakage-aware management of partitioned scratchpad memories
Partitioning a memory into multiple blocks that can be independently accessed is a widely used technique to reduce its dynamic power. For embedded systems, its benefits can be ev...
Olga Golubeva, Mirko Loghi, Massimo Poncino, Enric...
JTRES
2009
ACM
15 years 4 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
15 years 4 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
DATE
2002
IEEE
136views Hardware» more  DATE 2002»
15 years 3 months ago
Beyond UML to an End-of-Line Functional Test Engine
In this paper, we analyze the use of UML as a starting point to go from design issues to end of production testing of complex embedded systems. The first point is the analysis of ...
Andrea Baldini, Alfredo Benso, Paolo Prinetto, Ser...