Sciweavers

3516 search results - page 261 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ESTIMEDIA
2006
Springer
15 years 7 months ago
A Mixed-level Co-simulation Method for System-level Design Space Exploration
The Sesame modeling and simulation framework aims at efficient system-level design space exploration of embedded multimedia systems. A primary objective of Sesame is the ion at mu...
Mark Thompson, Andy D. Pimentel, Simon Polstra, Ca...
140
Voted
DAC
2006
ACM
15 years 9 months ago
SystemC transaction level models and RTL verification
This paper describes how systems companies are adopting SystemC transaction level models for system on chip design and verification, and how these transaction level models are bei...
Stuart Swan
ACSAC
2009
IEEE
15 years 10 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
161
Voted
ATAL
2008
Springer
15 years 5 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ISLPED
2010
ACM
158views Hardware» more  ISLPED 2010»
15 years 4 months ago
Temperature- and energy-constrained scheduling in multitasking systems: a model checking approach
The ongoing scaling of semiconductor technology is causing severe increase of on-chip power density and temperature in microprocessors. This has raised urgent requirement for both...
Weixun Wang, Xiaoke Qin, Prabhat Mishra