Sciweavers

3516 search results - page 173 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
146
Voted
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 7 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
131
Voted
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
15 years 7 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
132
Voted
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
15 years 9 months ago
Optimal design of a 6-dof parallel measurement mechanism integrated in a 3-dof parallel machine-tool
Abstract— This paper presents the design and the optimization of a parallel machine-tool composed of (i) an 3-dof actuated parallel mechanism (a linear Delta) and (ii) a 6-dof me...
David Corbel, Olivier Company, François Pie...
118
Voted
CAD
2002
Springer
15 years 3 months ago
Integrating part and assembly modelling
Current modelling systems adequately support either modelling of parts or modelling of assemblies, whereas ideal modelling systems should adequately support both. To achieve this,...
Alex Noort, Geoffry F. M. Hoek, Willem F. Bronsvoo...
141
Voted
CODES
2006
IEEE
15 years 9 months ago
Creation and utilization of a virtual platform for embedded software optimization: : an industrial case study
Virtual platform (ViP), or ESL (Electronic System Level) simulation model, is one of the most widely renowned system level design techniques. In this paper, we present a case stud...
Sungpack Hong, Sungjoo Yoo, Sheayun Lee, Sangwoo L...