Sciweavers

3516 search results - page 430 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
CODES
1998
IEEE
15 years 9 months ago
Combining multiple models of computation for scheduling and allocation
Many applications include a variety off unctions from different domains. Therefore, they are best modeled with a combination of different modeling languages. For a sound design pr...
Dirk Ziegenbein, Rolf Ernst, Kai Richter, Jür...
GLVLSI
2005
IEEE
144views VLSI» more  GLVLSI 2005»
15 years 10 months ago
On-chip power distribution grids with multiple supply voltages for high performance integrated circuits
—On-chip power distribution grids with multiple supply voltages are discussed in this paper. Two types of interdigitated and paired power distribution grids with multiple supply ...
Mikhail Popovich, Eby G. Friedman, Michael Sotman,...
ACSAC
2004
IEEE
15 years 8 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
EMSOFT
2005
Springer
15 years 10 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
WORDS
2003
IEEE
15 years 10 months ago
Asynchrony and Real-Time Dependable Computing
We examine how computer system problems can be derived from real application problems, with a particular focus on the relevance of some assumptions, especially those related to co...
Gérard Le Lann