Results 311 to 320 of about 1,295,202 (338)
Some of the next articles are maybe not open access.
Embedding security in wireless embedded systems
16th International Conference on VLSI Design, 2003. Proceedings., 2003We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers.
Anand Raghunathan+2 more
openaire +2 more sources
From Embedded Test to Embedded Diagnosis
European Test Symposium (ETS'05), 2005Testing integrated circuits with millions of transistors puts strong requirements on test volume, test application time, test speed, and test resolution. To overcome these challenges, it is widely accepted to partition test resources between the automatic test equipment (ATE) and the circuit under test (CUT). These strategies may reach from simple test
openaire +2 more sources
2012
In this chapter we set the stage for our study of embedded computing system design. To understand design processes, we first need to understand how and why microprocessors are used for control, user interface, signal processing, and many other tasks.
openaire +4 more sources
In this chapter we set the stage for our study of embedded computing system design. To understand design processes, we first need to understand how and why microprocessors are used for control, user interface, signal processing, and many other tasks.
openaire +4 more sources
2006
Publisher Summary The development of a modern embedded system—such as a digital camera—presents many daunting challenges. With a combination of the right skills and tools and a software-component-based development strategy, success is attainable.
openaire +3 more sources
Publisher Summary The development of a modern embedded system—such as a digital camera—presents many daunting challenges. With a combination of the right skills and tools and a software-component-based development strategy, success is attainable.
openaire +3 more sources
2006
Publisher Summary This chapter begins with the fundamental network interface—the socket—and then examines how common application-level network protocols can be used in embedded devices. The socket interface forms the basis for most network programming in UNIX systems.
openaire +3 more sources
Publisher Summary This chapter begins with the fundamental network interface—the socket—and then examines how common application-level network protocols can be used in embedded devices. The socket interface forms the basis for most network programming in UNIX systems.
openaire +3 more sources
T-EDGE: Temporal WEighted MultiDiGraph Embedding for Ethereum Transaction Network Analysis
Frontiers in Physics, 2020Dan Lin, Jiajing Wu, Zibin Zheng
exaly
A unified enhanced particle swarm optimization‐based virtual network embedding algorithm
International Journal of Communication Systems, 2013Kai Shuang, Yan Luo
exaly