Sciweavers

6796 search results - page 95 / 1360
» Java for Embedded Systems
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 2 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
CORR
2011
Springer
259views Education» more  CORR 2011»
14 years 9 months ago
Automatic Optimization for MapReduce Programs
The MapReduce distributed programming framework has become popular, despite evidence that current implementations are inefficient, requiring far more hardware than a traditional r...
Eaman Jahani, Michael J. Cafarella, Christopher R&...
DASIP
2010
14 years 9 months ago
Hardware code generation from dataflow programs
The elaboration of new systems on embedded targets is becoming more and more complex. In particular, multimedia devices are now implemented using mixed hardware and software archi...
Nicolas Siret, Matthieu Wipliez, Jean-Franç...
ICSE
2005
IEEE-ACM
15 years 7 months ago
Component-based software engineering for embedded systems
Although attractive, CBD has not been widely adopted in domains of embedded systems. The main reason is inability of these technologies to cope with the important concerns of embe...
Ivica Crnkovic
LCTRTS
1999
Springer
15 years 6 months ago
Why SpecInt95 Should Not Be Used to Benchmark Embedded Systems Tools
The SpecInt95 benchmark suite is often used to evaluate the performance of programming tools, including those used for embedded systems programming. Embedded applications, however...
Jakob Engblom