Results 241 to 250 of about 1,552,847 (293)
Colorimetric Analysis of Transmitted Light Through Plasmonic Paper for Next-Generation Point-of-Care (PoC) Devices. [PDF]
Serafinelli C+3 more
europepmc +1 more source
ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects. [PDF]
Zhao J, Wu Y, Fu Y, Liu S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Computer, 2010
Embedded systems pose special challenges to system evolution: they're embedded in a changing environment, often interacting with evolving processes of human organizations, and thus must be verified because of their critical nature. Complicating the situation, the analyses and testing regimens used to verify them must evolve as well.
G. Karsai+3 more
openaire +4 more sources
Embedded systems pose special challenges to system evolution: they're embedded in a changing environment, often interacting with evolving processes of human organizations, and thus must be verified because of their critical nature. Complicating the situation, the analyses and testing regimens used to verify them must evolve as well.
G. Karsai+3 more
openaire +4 more sources
Up to now we have not paid much attention to the overall environment in which the expert system operates. Essentially, we have relied upon the dialog-oriented features of Prolog itself. This is certainly adequate for a prototype system, where one’s interest is more the demonstration and verification of the functionality of a given system concept ...
Lawrence W. Bernhard+2 more
openaire +1 more source
Building embedded systems with embedded DSLs
Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, 2014We report on our experiences in synthesizing a fully-featured autopilot from embedded domain-specific languages (EDSLs) hosted in Haskell. The autopilot is approximately 50k lines of C code generated from 10k lines of EDSL code and includes control laws, mode logic, encrypted communications system, and device drivers.
Lee Pike+4 more
openaire +2 more sources
Embedding security in wireless embedded systems
16th International Conference on VLSI Design, 2003. Proceedings., 2003We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers.
Anand Raghunathan+2 more
openaire +2 more sources
Dependability of embedded systems
Proceedings of the 24th International Conference on Software Engineering. ICSE 2002, 2002Almost all modem, engineered systems depend on computers for their correct operation. The cost, size, and power requirements of microprocessors have dropped to a point where it is both feasible and desirable to embed computers into everything from people to toasters.
openaire +2 more sources
Introduction to Embedded Systems
2020This chapter introduces the general concept of an embedded system. The goal is to provide a high-level understanding of what an embedded computer is, their role in modern society, and motivation to learn more about them.
openaire +2 more sources
Embedded system security [PDF]
From cars to cell phones, video equipment to MP3 players, and dishwashers to home thermostats - embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing.
openaire +1 more source