Sciweavers

385 search results - page 21 / 77
» Verified Code Generation for Embedded Systems
Sort
View
136
Voted
ADHOCNETS
2009
Springer
15 years 4 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 7 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
EMSOFT
2005
Springer
15 years 7 months ago
From statecharts to ESP: programming with events, states and predicates for embedded systems
Statecharts are probably the most popular mechanism for behavior modeling of embedded system components. Modeling a component involves using a mainstream language for features tha...
Vugranam C. Sreedhar, Maria-Cristina V. Marinescu
IASTEDSEA
2004
15 years 3 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
135
Voted
BIRTHDAY
1999
Springer
15 years 6 months ago
Compilation and Synthesis for Real-Time Embedded Controllers
Abstract. This article provides an overview over two constructive approaches to provably correct hard real-time code generation where hard real-time code is generated from abstract...
Martin Fränzle, Markus Müller-Olm