Results 1 to 10 of about 743,199 (75)

Embedded Systems Security [PDF]

open access: yes, 2011
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these ...
Farooq-I-Azam, Muhammad   +1 more
openaire   +4 more sources

Survey of Control-Flow Integrity Techniques for Embedded and Real-Time Embedded Systems [PDF]

open access: yes, 2021
Computing systems, including real-time embedded systems, are becoming increasingly connected to allow for more advanced and safer operation. Such embedded systems are resource-constrained, such as lower processing capabilities, as compared to general purpose computing systems like desktops or servers.
arxiv   +1 more source

Embedded Vision System [PDF]

open access: yesEURASIP Journal on Embedded Systems, 2007
Video surveillance and machine vision systems are attracting growing academic and industrial interests. The market for digital CCTV systems is constantly growing because of terror attacks, crime, vandalism, and violence in public and also in business domains.
Heinrich Garn, Dietmar Dietrich
openaire   +1 more source

Modelica for Embedded Systems [PDF]

open access: yesLinköping Electronic Conference Proceedings, 2009
New language elements are introduced in Modelica 3.1 to facilitate use Modelica models in embedded systems, e.g., as controllers. Models can be conveniently configured by marking the borders of the respective controller parts and by defining the mapping of the marked parts to target processors and target tasks. This approach allows to define a “logical”
Elmqvist, Hilding   +4 more
openaire   +2 more sources

Embedded Systems Education in the 2020s: Challenges, Reflections, and Future Directions [PDF]

open access: yesarXiv, 2022
Embedded computing systems are pervasive in our everyday lives, imparting digital intelligence to a variety of electronic platforms used in our vehicles, smart appliances, wearables, mobile devices, and computers. The need to train the next generation of embedded systems designers and engineers with relevant skills across hardware, software, and their ...
arxiv  

Synchronous Paradigm in Embedded Systems [PDF]

open access: yesEURASIP Journal on Embedded Systems, 2007
No ...
Girault, Alain   +2 more
openaire   +5 more sources

Embedded Operating Systems

open access: yes, 2022
In this chapter, we will provide a description of existing open-source operating systems (OSs) which have been analyzed with the objective of providing a porting for the reference architecture described in Chapter 2. Among the various possibilities, the ERIKA Enterprise RTOS (Real-Time Operating System) and Linux with preemption patches have been ...
Scordino C.   +5 more
openaire   +2 more sources

Verifying Programs with Logic and Extended Proof Rules: Deep Embedding v.s. Shallow Embedding [PDF]

open access: yesarXiv, 2023
Many foundational program verification tools have been developed to build machine-checked program correctness proofs, a majority of which are based on Hoare logic. Their program logics, their assertion languages, and their underlying programming languages can be formalized by either a shallow embedding or a deep embedding.
arxiv  

Embedded System Hardware [PDF]

open access: yes, 2006
AbstractIn this chapter, we will present the interface between the physical environment and information processing (the cyphy-interface) together with the hardware required for processing, storing, and communicating information. Due to considering CPS, covering the cyphy-interface is indispensable. The need to cover other hardware components as well is
openaire   +2 more sources

Embedded Systems for Mobile Sensors [PDF]

open access: yesJournal of Sensors, 2016
In the era of IoT, embedded systems based on mobile sensor ideas turn into increasingly compound and need understanding in various training tools such as signal processing, artificial intelligence, and multimedia communication. After a long period of computational capacity centralization, we are facing a period where the computation capacity is ...
Marco Anisetti   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy