Sciweavers

1541 search results - page 185 / 309
» Software Hardware Co-Scheduling for Reconfigurable Computing...
Sort
View
SIGOPS
2008
120views more  SIGOPS 2008»
15 years 3 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
DAC
2005
ACM
16 years 5 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
146
Voted
EIT
2008
IEEE
15 years 5 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
DAC
2000
ACM
16 years 5 months ago
Interactive co-design of high throughput embedded multimedia
The idea of Force-Directed Scheduling (FDS) was first introduced by Paulin and Knight to minimize the number of resources required in the high-level synthesis of high-throughput A...
Thierry J.-F. Omnés, Thierry Franzetti, Fra...
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 4 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng