Sciweavers

6796 search results - page 1028 / 1360
» Java for Embedded Systems
Sort
View
122
Voted
IH
2009
Springer
15 years 11 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
ASPDAC
2009
ACM
111views Hardware» more  ASPDAC 2009»
15 years 11 months ago
A UML-based approach for heterogeneous IP integration
- With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ...
Zhenxin Sun, Weng-Fai Wong
UIST
2009
ACM
15 years 11 months ago
Optically sensing tongue gestures for computer input
Many patients with paralyzing injuries or medical conditions retain the use of their cranial nerves, which control the eyes, jaw, and tongue. While researchers have explored eye-t...
T. Scott Saponas, Daniel Kelly, Babak A. Parviz, D...
141
Voted
DATE
2008
IEEE
115views Hardware» more  DATE 2008»
15 years 11 months ago
Improving the Efficiency of Run Time Reconfigurable Devices by Configuration Locking
Run-time reconfigurable logic is a very attractive alterative in the design of SoC. However, configuration overhead can largely decrease the system performance. In this work, we p...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
15 years 11 months ago
Modeling Event Stream Hierarchies with Hierarchical Event Models
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
Jonas Rox, Rolf Ernst
« Prev « First page 1028 / 1360 Last » Next »