Sciweavers

385 search results - page 45 / 77
» Verified Code Generation for Embedded Systems
Sort
View
IUI
2012
ACM
14 years 9 days ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 8 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
ICIP
2004
IEEE
16 years 6 months ago
Systematic lossy forward error protection for error-resilient digital video broadcasting -a wyner-ziv coding approach
We present a practical scheme for error-resilient digital video broadcasting, using the Wyner-Ziv coding paradigm. We apply the general framework of systematic lossy source-channe...
Shantanu Rane, Anne Aaron, Bernd Girod
CBSE
2011
Springer
14 years 4 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
SIGSOFT
2006
ACM
15 years 10 months ago
Bit level types for high level reasoning
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
Ranjit Jhala, Rupak Majumdar