

Period of time: 2013年4期
Publisher: Inderscience Publishers
Founded in: 2005
Total resources: 13
ISSN: 1741-1068
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Embedded Systems,volume 3,issue 4
Menu

Application-specific permutation networks
By Drager Thorsten,Fettweis Gerhard P. in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
On-chip implementation of multiprocessor networks and switch fabrics
By Ye Terry Tao,Micheli Giovanni De in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier
By Ors Berna,Batina Lejla,Preneel Bart,Vandewalle Joos in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
A cryptographic processor for arbitrary elliptic curves over GF(2m)
By Eberle Hans,Gura Nils,Shantz Sheueling Chang,Gupta Vipul in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
Code compression in DSP processor systems
By Saastamoinen Piia,Saastamoinen Ilkka,Nurmi Jari in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
An efficient disk-array-based server design for a multicast video streaming system
By Chan P.H.,Lee Jack Y.B. in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
Hardware synthesis for systems of recurrence equations with multidimensional schedule
By Guillou Anne-Claire,Quinton Patrice,Risset Tanguy in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
A hardware mechanism to reduce the energy consumption of the register file of in-order architectures
By Ayala Jose L.,Lopez-Vallejo Marisa,Lopez-Barrio Carlos A.,Veidenbaum Alexander in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.
Safe execution of untrusted applications on embedded network processors
By Bos Herbert,Samwel Bart,Cristea Mihai,Anagnostakis Kostas in (2009)
International Journal of Embedded Systems,volume 3,issue 4 , Vol. 3, Iss. 4, 2009-01 , pp.