Sciweavers

1737 search results - page 185 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
149
Voted
NDSS
2000
IEEE
15 years 9 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
138
Voted
ACIVS
2005
Springer
15 years 10 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...
ESTIMEDIA
2003
Springer
15 years 9 months ago
Run-Time Scheduling for Multimedia Applications on Dynamically Reconfigurable Systems
Current multimedia applications are characterized by highly dynamic and non-deterministic behavior as well as high-performance requirements. In addition, portable devices demand a...
Javier Resano, Diederik Verkest, Daniel Mozos, Ser...
CASES
2000
ACM
15 years 9 months ago
A code generation framework for Java component-based designs
In this paper, we describe a software architecture supporting code generation from within Ptolemy II. Ptolemy II is a componentbased design tool intended for embedded and real-tim...
Jeff Tsay, Christopher Hylands, Edward Lee