Abstract:-Computer Systems used in Military and other challenging applications, are often exposed to increased levels of electromagnetic radiation. Embedded systems falling in this category often suffer from this exposure due to the operation of the device to which they belong. Consequently data communications within such devices need to be protected against transmission errors. Current general purpose encoding schemes that are used in other communication applications are prohibitively complex for this application. In this paper an innovative extension to the well known checksum concept is proposed that is capable of controlling errors in intra device data transfers. The new technique is shown to be simple enough for implementation and to i...
Call number: LD2668 .T4 CMSC 1989 V37Master of ScienceComputing and Information Science
Abstract — Nowadays, memories we use are cheap, easily available in market, compact, have high progr...
Abstract: For embedded systems, the use of software-based error detection and correction approaches ...
Abstract:-In this paper the technological aspects are presented concerning the error detection durin...
<p>This report explores the characteristics of checksums and cyclic redundancy codes (CRCs) in an av...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Computer...
Embedded control networks commonly use checksums to detect data transmission errors. However, design...
We present a hardware-based approach to improve the resilience of a computer system against the erro...
Embedded software systems are increasingly used in safety-critical applications. When developing saf...
Abstract: New communications paradigms such as wireless communications for handheld devices have inc...
This Master´s thesis discuses the protection of data transmission against long error bursts. The dat...
As technology scaling increases computer memory’s bit-cell density and reduces the voltage of semico...
The analytical dependences of the complexity in the algebraic coding procedure of RC-codes upon the ...
Abstract Decimal codes are used everywhere in modern societies to identify things such as credit ca...
Abstract: Embedded systems have been almost invisibly pervading our daily lives for several decades....
Call number: LD2668 .T4 CMSC 1989 V37Master of ScienceComputing and Information Science
Abstract — Nowadays, memories we use are cheap, easily available in market, compact, have high progr...
Abstract: For embedded systems, the use of software-based error detection and correction approaches ...
Abstract:-In this paper the technological aspects are presented concerning the error detection durin...
<p>This report explores the characteristics of checksums and cyclic redundancy codes (CRCs) in an av...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Computer...
Embedded control networks commonly use checksums to detect data transmission errors. However, design...
We present a hardware-based approach to improve the resilience of a computer system against the erro...
Embedded software systems are increasingly used in safety-critical applications. When developing saf...
Abstract: New communications paradigms such as wireless communications for handheld devices have inc...
This Master´s thesis discuses the protection of data transmission against long error bursts. The dat...
As technology scaling increases computer memory’s bit-cell density and reduces the voltage of semico...
The analytical dependences of the complexity in the algebraic coding procedure of RC-codes upon the ...
Abstract Decimal codes are used everywhere in modern societies to identify things such as credit ca...
Abstract: Embedded systems have been almost invisibly pervading our daily lives for several decades....
Call number: LD2668 .T4 CMSC 1989 V37Master of ScienceComputing and Information Science
Abstract — Nowadays, memories we use are cheap, easily available in market, compact, have high progr...
Abstract: For embedded systems, the use of software-based error detection and correction approaches ...