Sciweavers

385 search results - page 42 / 77
» Verified Code Generation for Embedded Systems
Sort
View
ICESS
2007
Springer
15 years 8 months ago
Memory Offset Assignment for DSPs
Compact code generation is very important for an embedded system that has to be implemented on a chip with a severely limited amount of size. Even though on-chip data memory optimi...
Jinpyo Hong, J. Ramanujam
CSMR
1998
IEEE
15 years 6 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
WORDS
2005
IEEE
15 years 7 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
15 years 8 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
SCOPES
2005
Springer
15 years 7 months ago
Generic Software Pipelining at the Assembly Level
Software used in embedded systems is subject to strict timing and space constraints. The growing software complexity creates an urgent need for fast program execution under the co...
Daniel Kästner, Markus Pister