Sciweavers

1072 search results - page 86 / 215
» Fuzzy decision making in embedded system design
Sort
View
114
Voted
CAV
2010
Springer
185views Hardware» more  CAV 2010»
15 years 1 months ago
Achieving Distributed Control through Model Checking
Abstract. We apply model checking of knowledge properties to the design of distributed controllers that enforce global constraints on concurrent systems. We calculate when processe...
Susanne Graf, Doron Peled, Sophie Quinton
HIPEAC
2007
Springer
15 years 7 months ago
Compiler-Assisted Memory Encryption for Embedded Processors
A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of ...
Vijay Nagarajan, Rajiv Gupta, Arvind Krishnaswamy
CASES
2010
ACM
14 years 11 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
ICDIM
2010
IEEE
14 years 11 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
MVA
1994
104views Computer Vision» more  MVA 1994»
15 years 2 months ago
Represent and Acquire Knowledge for the Development of Autonomous Vision System
The visual perceptional ability of computer systems to understand the environment is desirable in engineering design and manufacturing where automation is anticipated. I n order t...
Xiaobu Yuan