Sciweavers

767 search results - page 115 / 154
» Evolving Software Architecture Descriptions of Critical Syst...
Sort
View
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 5 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
DAC
2005
ACM
16 years 23 days ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
DSOM
2003
Springer
15 years 5 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
DATE
2006
IEEE
118views Hardware» more  DATE 2006»
15 years 5 months ago
Design and implementation of a modular and portable IEEE 754 compliant floating-point unit
Multimedia and communication algorithms from embedded system domain often make extensive use of floating-point arithmetic. Due to the complexity and expense of the floating-poin...
Kingshuk Karuri, Rainer Leupers, Gerd Ascheid, Hei...
SSR
2001
146views more  SSR 2001»
15 years 1 months ago
Implementing product line variabilities
Software product lines have numerous members. Thus, a product line infrastructure must cover various systems. This is the significant difference to usual software systems and the ...
Cristina Gacek, Michalis Anastasopoules