Sciweavers

3516 search results - page 400 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DAC
2006
ACM
16 years 5 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
146
Voted
IROS
2009
IEEE
121views Robotics» more  IROS 2009»
15 years 11 months ago
Understanding of positioning skill based on feedforward / feedback switched dynamical model
— To realize the harmonious cooperation with the operator, the man-machine cooperative system must be designed so as to accommodate with the characteristics of the operator’s s...
Hiroyuki Okuda, Hidenori Takeuchi, Shinkichi Inaga...
AINA
2007
IEEE
15 years 11 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
IEEEHPCS
2010
14 years 11 months ago
XPSoC: A reconfigurable solution for multimedia contents protection
Network Multimedia data also need to be encrypted to protect private content and access control. Considering performance constraints and embedded system issues, many hardware solu...
Linfeng Ye, Jean-Philippe Diguet, Guy Gogniat
OOIS
2001
Springer
15 years 9 months ago
Towards a Model-Driven Approach to Reuse
A model-driven reuse approach that is based on an organization’s Enterprise Architecture (EA) and on the Unified Modeling Language (UML) is proposed. The framework embodying th...
Robert B. France, Sudipto Ghosh, Daniel E. Turk