Sciweavers

1209 search results - page 78 / 242
» Security as a new dimension in embedded system design
Sort
View
DAC
2008
ACM
15 years 10 months ago
Run-time instruction set selection in a transmutable embedded processor
We are presenting a new concept of an application-specific processor that is capable of transmuting its instruction set according to non-predictive application behavior during run...
Jörg Henkel, Lars Bauer, Muhammad Shafique
CODES
2003
IEEE
15 years 3 months ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid
CBSE
2010
Springer
15 years 2 months ago
A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks
Abstract. Many component models and frameworks have been proabstract and capture concerns from Real-Time and Embedded application domains, based on high-level component-based appro...
Frédéric Loiret, Lionel Seinturier, ...
IEEESP
2007
98views more  IEEESP 2007»
14 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
LISA
2004
14 years 11 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty