Sciweavers

853 search results - page 90 / 171
» New test approach for embedded applications
Sort
View
ICCAD
2002
IEEE
82views Hardware» more  ICCAD 2002»
15 years 6 months ago
Hardware/software partitioning of software binaries
Partitioning an embedded system application among a microprocessor and custom hardware has been shown to improve the performance, power or energy of numerous examples. The advent ...
Greg Stitt, Frank Vahid
WCNC
2010
IEEE
15 years 5 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
115
Voted
DRM
2003
Springer
15 years 6 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
MICRO
1997
IEEE
82views Hardware» more  MICRO 1997»
15 years 5 months ago
Procedure Based Program Compression
Cost and power consumption are two of the most important design factors for many embedded systems, particularly consumer devices. Products such as Personal Digital Assistants, pag...
Darko Kirovski, Johnson Kin, William H. Mangione-S...
CCS
2010
ACM
15 years 1 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...