Sciweavers

385 search results - page 45 / 77
» Verified Code Generation for Embedded Systems
Sort
View
IUI
2012
ACM
13 years 9 months ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 5 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
ICIP
2004
IEEE
16 years 3 months ago
Systematic lossy forward error protection for error-resilient digital video broadcasting -a wyner-ziv coding approach
We present a practical scheme for error-resilient digital video broadcasting, using the Wyner-Ziv coding paradigm. We apply the general framework of systematic lossy source-channe...
Shantanu Rane, Anne Aaron, Bernd Girod
CBSE
2011
Springer
14 years 1 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
SIGSOFT
2006
ACM
15 years 7 months ago
Bit level types for high level reasoning
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about s...
Ranjit Jhala, Rupak Majumdar