Sciweavers

1737 search results - page 215 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
CASES
2006
ACM
15 years 10 months ago
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations
Rising interest in the applications of wireless sensor networks has spurred research in the development of computing systems for lowthroughput, energy-constrained applications. Un...
Mark Hempstead, Gu-Yeon Wei, David Brooks
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
PERCOM
2006
ACM
15 years 10 months ago
Sensor Networks For Smart Roads
This paper proposes the use of a wireless sensor network of “cat’s eye” augmented with embedded processing, communication, and sensing capabilities to monitor vehicle behavi...
Marcin Karpinski, Aline Senart, Vinny Cahill
AINA
2009
IEEE
15 years 9 months ago
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks
Nowadays more and more devices of daily life are connected to each other and are integrated into massively distributed networks of embedded devices. These devices range from consu...
Christian Buckl, Stephan Sommer, Andreas Scholz, A...
IEEEPACT
2005
IEEE
15 years 10 months ago
A Distributed Control Path Architecture for VLIW Processors
VLIW architectures are popular in embedded systems because they offer high-performance processing at low cost and energy. The major problem with traditional VLIW designs is that t...
Hongtao Zhong, Kevin Fan, Scott A. Mahlke, Michael...