Sciweavers

3516 search results - page 159 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 7 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
SAMOS
2010
Springer
15 years 1 months ago
A trace-based scenario database for high-level simulation of multimedia MP-SoCs
—High-level simulation and design space exploration nowadays are key ingredients for system-level design of modern multimedia embedded systems. The majority of the work in this a...
Peter van Stralen, Andy D. Pimentel
IEEECIT
2005
IEEE
15 years 9 months ago
A Performance and Power Co-optimization Approach for Modern Processors
In embedded systems, performance and power are important inter-related issues that cannot be decoupled. Expensive and extensive simulations in a processor design space are usually...
Yongxin Zhu, Weng-Fai Wong, Cheng-Kok Koh
SACMAT
2006
ACM
15 years 9 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
RTAS
2010
IEEE
15 years 1 months ago
DARTS: Techniques and Tools for Predictably Fast Memory Using Integrated Data Allocation and Real-Time Task Scheduling
—Hardware-managed caches introduce large amounts of timing variability, complicating real-time system design. One alternative is a memory system with scratchpad memories which im...
Sangyeol Kang, Alexander G. Dean