Academic literature on the topic 'Embedded Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Embedded Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Embedded Systems"

1

Miková, Ľubica, Ivan Virgala, and Michal Kelemen. "EMBEDDED SYSTEMS." Acta Mechatronica 3, no. 2 (June 30, 2018): 1–5. http://dx.doi.org/10.22306/am.v3i2.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Milojicic, D. "Embedded systems." IEEE Concurrency 8, no. 4 (October 2000): 80–90. http://dx.doi.org/10.1109/mcc.2000.895110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reddy, Parineeth M. "Embedded systems." Resonance 7, no. 12 (December 2002): 20–30. http://dx.doi.org/10.1007/bf02834526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, B. H. "Embedded Internet Systems: Poised for Takeoff [Embedded Systems]." IEEE Internet Computing 2, no. 3 (May 1998): 24–29. http://dx.doi.org/10.1109/mic.1998.683796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hickey, Patrick C., Lee Pike, Trevor Elliott, James Bielman, and John Launchbury. "Building embedded systems with embedded DSLs." ACM SIGPLAN Notices 49, no. 9 (November 26, 2014): 3–9. http://dx.doi.org/10.1145/2692915.2628146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Santo, S. "Embedded battle royal [embedded operating systems]." IEEE Spectrum 38, no. 12 (December 2001): 36–41. http://dx.doi.org/10.1109/6.969358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sadiku, Matthew N. O., Yonghui Wang, Suxia Cui, and Sarhan M. Musa. "Embedded Computing Systems." International Journal of Scientific Engineering and Technology 6, no. 12 (2017): 361. http://dx.doi.org/10.5958/2277-1581.2017.00059.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bergamaschi, Reinaldo A. "Embedded Systems Week." IEEE Design & Test of Computers 24, no. 1 (January 2007): 102–3. http://dx.doi.org/10.1109/mdt.2007.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sami, Mariagiovanna, Miroslaw Malek, Umberto Bondi, and Francesco Regazzoni. "Embedded systems education." ACM SIGBED Review 14, no. 1 (January 5, 2017): 22–28. http://dx.doi.org/10.1145/3036686.3036689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jackson, David Jeff, and Paul Caspi. "Embedded systems education." ACM SIGBED Review 2, no. 4 (October 2005): 1–4. http://dx.doi.org/10.1145/1121812.1121814.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Embedded Systems"

1

Yin, Hang. "Adaptive Embedded Systems." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10590.

Full text
Abstract:
Modern embedded systems are evolving in the direction of increased adaptivity and complexity. It is extremely important for a system with limited resource to be adaptive in order to maximize its efficiency of resource usage while guaranteeing a high level of fault tolerance and QoS. This report aims at exploring such a kind of system, i.e. Adaptive Embedded System (AES), which is featured by dynamic reconfiguration at runtime. Based on the investigation and analysis of a variety of case studies related with AES, we proposed the conceptual view and overall architecture of an AES by highlighting its predominant characteristics. We also made an incomplete but detailed summary of the most popular techniques that can be used to realize adaptivity. Those techniques are categorized into dynamic CPU/network resource re-allocation and adaptive fault tolerance. A majority of adaptive applications resort to one or more of those techniques. Besides, there is a separate discussion on dynamic reconfiguration and mode switch for AES. Finally, we classify adaptivity into different modeling problems at a higher abstraction level and build UPPAAL models for two different AESs, a smart phone and an object-tracking robot. Our UPPAAL models provide clear demonstration on how a typical AES works.
APA, Harvard, Vancouver, ISO, and other styles
2

Tosun, Suleyman. "Reliability-centric system design for embedded systems." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eldh, Erik. "Cloud connectivity for embedded systems." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118746.

Full text
Abstract:
Deploying an embedded system to act as a controller for electronics is not new.  Today these kinds of systems are all around us and are used for a multitude of purposes. In contrast, cloud computing is a relatively new approach for computing as a whole. This thesis project explores these two technologies in order to create a bridge between these two wildly different platforms. Such a bridge should enable new ways of exposing features and doing maintenance on embedded devices. This could save companies not only time and money while dealing with maintenance tasks for embedded systems, but this should also avoid the needed to host this maintenance software on dedicated servers – rather these tasks could use cloud resources only when needed. This thesis explores such a bridge and presents techniques suitable for joining these two computing paradigms together. Exploring what is included in cloud computing by examining available technologies for deployment is important to be able to get a picture of what the market has to offer. More importantly is how such a deployment can be done and what the benefits are. How technologies such as databases, load-balancers, and computing environments have been adapted to a cloud environment and what draw-backs and new features are available in this environment are of interest and how a solution can exploit these features in a real-world scenario.  Three different cloud providers and their products have been presented in order to create an overview of the current offerings.  In order to realize a solution a way of communicating and exchanging data is presented and discussed. Again to realize the concept in a real-world scenario. This thesis presents the concept of cloud connectivity for embedded systems. Following this the thesis describes a prototype of how such a solution could be realized and utilized. The thesis evaluates current cloud providers in terms of the requirements of the prototype. A middle-ware solution drawing strengths from the services offered by cloud vendors for deployment at a vendor is proposed. This middle-ware acts in a stateless manner to provide communication and bridging of functionality between two parties with different capabilities. This approach creates a flexible common ground for end-user clients and reduces the burden of having the embedded systems themselves process and distribute information to the clients.  The solution also provides and abstraction of the embedded systems further securing the communication with the systems by it only being enabled for valid middle-ware services.
Att använda ett inbyggt system som en kontrollenhet för elektronik är inget nytt. Dessa typer av system finns idag överallt och används i vidt spridda användningsområden medans datormolnet är en ny approach för dator användning i sin helhet. Utforska och skapa en länk mellan dessa två mycket olika platformar för att facilitera nya tillvägagångs sätt att sköta underhåll sparar företag inte tid och pengar när det kommer till inbyggda system utan också när det gäller driften för servrar. Denna examensarbete utforskar denna typ av länk och presenterar för endamålet lämpliga tekniker att koppla dem samman medans lämpligheten för en sådan lösning diskuteras. Att utforska det som inkluderas i konceptet molnet genom att undersöka tillgängliga teknologier för utveckling är viktigt för att få en bild av vad marknaden har att erbjuda. Mer viktigt är hur utveckling går till och vilka fördelarna är. Hur teknologoier som databaser, last distrubutörer och server miljöer har adapterats till molnmiljön och vilka nackdelar och fördelar som kommit ut av detta är av intresse och vidare hur en lösning kan använda sig av dessa fördelar i ett verkliget scenario. Tre olika moln leverantörer och deras produkter har presenterats för att ge en bild av vad som för tillfället erbjuds. För att realisera en lösning har ett sett att kommunicera och utbyta data presenterats och diskuterats. Åter igen för att realisera konceptet i ett verkligt scenario. Denna uppsats presenterar konceptet moln anslutbarhet för inbyggda system för att kunna få en lösning realiserad och använd. En mellanprograms lösning som drar styrka ifrån de tjänster som erbjudas av molnleverantörer för driftsättning hos en leverantor föreslås. Denna mellanprogramslösnings agerar tillståndslöst för att erbjuda kommunikation och funktions sammankoppling mellan de två olika deltagarna som har olika förutsätningar. Denna approach skapar en flexibel gemensam plattform för olika klienter hos slutanvändaren och minskar bördan hos de inbyggdasystemet att behöva göra analyser och distrubuera informationen till klienterna. Denna lösning erbjuder också en abstraktion av de inbyggdasystemen för att erbjuda ytterligare säkerhet när kommunikation sker med de inbyggdasystemet genom att den endast sker med giltiga mellanprogram.
APA, Harvard, Vancouver, ISO, and other styles
4

Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.

Full text
Abstract:
Cette thèse se consacre à l'amélioration des techniques d'analyse dynamiques permettant la vérification de logiciels conçus pour des systèmes embarqués, couramment appelé micrologiciel. Au vu de l'augmentation significative de la connectivité des appareils électroniques, les préoccupations concernant leur sécurité s'intensifient. Les conséquences d'une faille de sécurité sur ces appareils peuvent impliquer des répercussions économiques non négligeables et des difficultés techniques importantes pour appliquer un correctif. C’est le cas notamment des amorceurs de code qui sont généralement stockés sur des mémoires mortes et intégrées dans les couches physiques qui constituent le microcontrôleur. Par conséquent, l’analyse de code source spécifique aux systèmes embarqués pendant la phase de production des micro-contrôleurs est cruciale. Cette thèse présente des techniques d'analyse afin de tester la sécurité de composants logiciel et matériel à l'échelle du système. En particulier, nous nous intéressons aux techniques de test basé sur l'émulation partielle dont nous améliorons les capacités avec trois nouvelles approches. Premièrement, Inception un outil d’analyse dynamique permettant d’appliquer des méthodes de tests exhaustifs (exécution symbolique) sur le code source de micrologiciel même lorsque ce dernier dépend de code plus bas niveau (exemple, code binaire ou assembleur). Deuxièmement, une sonde haute performance basé sur le protocol USB 3.0 afin de réduire la latence lors des communications entre l'outil d'analyse et le vrai matériel. Troisièmement, HardSnap une méthode permettant de générer des instantanés des périphériques matériel afin d'augmenter le contrôle et la visibilité lors de l'exécution symbolique. Cet outil permet de réaliser une exploration concurrente de plusieurs chemins d'exécution sans inconsistance
This thesis is dedicated to the improvement of dynamic analysis techniques allowing the verification of software designed for embedded systems, commonly called firmware. It is clear that the increasing pervasiveness and connectivity of embedded devices significantly increase their exposure to attacks. The consequences of a security issue can be dramatic not least in the economical field, but on the technical stage as well. Especially because of the difficulty to patch some devices. For instance, offline devices or code stored in a mask rom which are read only memory programmed during the chip fabrication. For all these reasons, it is important to thoughtfully test firmware program before the manufacturing process. This thesis presents analysis methods for system-wide testing of security and hardware components. In particular, we propose three impvrovements for partial emulation. First, Inception a dynamic analysis tool to test the security of firmware programs even when mixing different level of semantic (e.g., C/C++ mixed with assembly). Second, Steroids a high performance USB 3.0 probe that aims at minimizing the latency between the analyzer and the real device. Finally, HardSnap a hardware snapshotting method that offers higher visibility and control over the hardware peripherals. It enables testing concurently different execution paths without corrupting the hardware peripherals state
APA, Harvard, Vancouver, ISO, and other styles
5

Carlson, Jan. "Event Pattern Detection for Embedded Systems." Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

von, Hacht Karl-Johan. "Garden Monitoring with Embedded Systems." Thesis, Linköpings universitet, Datorteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120706.

Full text
Abstract:
In today’s modern society the process of handling crops in an accountable way withoutloss have become more and more important. By letting a gardener evaluate the progressof his plants from relevant data one can reduce these losses and increase effectiveness ofthe whole plantation. This work is about the construction of such a system composedfrom a developers perspective of three different platforms, from the start of data samplingwithin the context of gardening to and end user easily able to understand the data thentranslated. The first platform will be created from scratch with both hardware andsoftware, the next assembled from already finished hardware components and build withsimpler software. The last will essentially only be a software solution in an alreadyfinished hardware environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Dyer, Matthias. "Distributed embedded systems : validation strategies /." Aachen : Shaker Verlag, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tewatia, Rohit. "Security in Distributed Embedded Systems." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1379.

Full text
Abstract:

Communication in a sensor network needs guaranteed reception of data without fail and providing security to it. The authenticity and confidentiality of the data has to be ensured as sensors have limited hardware resources as well as the bandwidth. This thesis addresses the security aspects in wireless sensor networks. The main task of the project is to identify the critical security parameters for these distributed embedded systems. The sensors have extremely limited resources: small amount of memory, low computation capability and poor bandwidth. For example, a sensor platform can have 8KB of flash memory, a 4MHz 8-bit Atmel processor, and a 900MHz radio interface. Various security threats posed to these small wireless sensor networks has been made and solutions proposed. Secure communication between these communicating partners is to be achieved using cryptography.

APA, Harvard, Vancouver, ISO, and other styles
10

Wilund, Torbjörn. "Robust Distributed Embedded Systems : Communication." Thesis, KTH, Maskinkonstruktion (Inst.), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100998.

Full text
Abstract:
Detta examensarbete diskuterar i sin teoretiska del vad begreppet robusthet betyder för distribuerade inbyggda system. Utvecklingen går idag generellt emot att byta mekaniska och elektriska lösningar mot mekatroniska styrsystem. Det finns sedan mycket att vinna på att göra dessa inbyggda styrsystem distribuerade, bland annat beroende på oberoende mellan noder för intern övervakning och feldetektering. Delresultatet om robusthet säger att det beror på integritet för att uppnå tillgänglighet och tillförlitlighet, det vill säga att informationen är den samma i alla berörda noder. Tillförlitligheten beror på hur fel i tid och värde hanteras under systemexekvering. Informationen skyddas i samtliga undersökta protokoll genom redundans av diverse algoritmer, exempelvis CRC vilket ger möjlighet till feldetektering. Skillnad finns dock i hur tidssynkronisering hanteras om det ens finns hantering av för detta. Ur detta perspektiv är endast tidsstyrda nätverksprotokoll av nuvarande alternativ mest tekniskt lämpliga. Den praktiska delen försöker utvärdera GAST levererad hårdvara. Arbetet med att få igång någon kommunikation på TTP/C misslyckades, detta beroende på brister i den sammansatta plattformen. Mer specifikt beror detta troligtvis på konstruktionsfel i det fysiska lagret av plattformen. Med valt bakplan blir ej signalerna som förväntat vilket gör att informationen tolkas fel av externa kommunikations kretsar. Därför rekommenderas närmare analys av signalen i databussen och eventuell konstruktion av ett filter till bakplanet om nuvarande hopsättning skall användas. Plattformen har med sin öppenhet en framtid för utveckling och forskning kring distribuerade inbyggda system, dock saknas färdiga drivrutiner för de i plattformen integrerade protokollen. Detta är något som måste åtgärdas ifall plattformen skall få någon form av betydelse innan tekniken är för gammal. Undersökningen av den TTP Plan genererade koden visar att det går att extrahera information från verktyget och på så sätt utnyttja verktyget för konfiguration. För att detta skall fungera bör man tillverka någon form av verktyg för detta.
This thesis tries in its theoretical part to discuss what the term of robustness means for distributed embedded systems. Development of today generally tries to exchange mechanical and electrical solutions for embedded control systems. There are a lot of benefits to gain by designing in a distributed way, this due to internal independencies between nodes for monitoring and error detection. The outcome about robustness suggests that it depends on integrity to achieve availability and reliability, or loss of alternations of information in the different nodes in the distributed system. Reliability depends on how faults in terms of time and value are treated during execution. All studied network protocols have protection of information by different redundancy algorithms such as CRC, which gives the opportunity for fault and error detection. However there are differences in how time is handled, if there is any time handling, and possibility for time synchronization in the hardware. From this perspective the best alternatives are time triggered architectures of current technology. The experimental part tries to evaluate the GAST delivered platform. The work to achieve communication on TTP/C controllers failed due to shortage in the assembled platform. More specifically this is probably the case of bugs in the design of the physical layer of the GAST hardware (not the TTP controllers themselves). By use of recommended backplane, the sent signals are not appearing as expected, and information sent is misinterpreted by external communication devices. A suggestion and recommendation for future work is analysis of the signal in the data bus, and possible design of a filter if current assembly shall be used. The platform has a future for development and research in the field of distributed embedded systems due to its openness, however there is a lack of drivers for the platform integrated network protocols. This must be attended if the platform shall have any significance. The evaluation of TTP Plan generated code shows, that there are possibilities to extract configuration information form tool for configuration of platform. To achieve this some kind of extraction script must be developed.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Embedded Systems"

1

service), SpringerLink (Online, ed. Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems. Dordrecht: Springer Science+Business Media B.V., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kordon, Fabrice, Jérôme Hugues, Agusti Canals, and Alain Dohet, eds. Embedded Systems. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118569535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kündig, A., R. E. Bührer, and J. Dähler, eds. Embedded Systems. Berlin/Heidelberg: Springer-Verlag, 1987. http://dx.doi.org/10.1007/bfb0016343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Iniewski, Krzysztof, ed. Embedded Systems. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118468654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Richard, Zurawski, ed. Embedded systems handbook: Embedded systems design and verification. 2nd ed. Boca Raton, FL: Taylor & Francis Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Odette, Louis L. Intelligent embedded systems. Reading, Mass: Addison-Wesley Pub. Co., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kathiresh, M., and R. Neelaveni, eds. Automotive Embedded Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-59897-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bi, Yuanguo, Gang Chen, Qingxu Deng, and Yi Wang, eds. Embedded Systems Technology. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1026-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gu, Changyi. Building Embedded Systems. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1919-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agrawal, Dharma Prakash. Embedded Sensor Systems. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3038-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Embedded Systems"

1

Maskrey, Molly K. "Embedded Systems." In App Development Recipes for iOS and watchOS, 201–23. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1820-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Komatsu, Naohisa, and Manabu Nakano. "Embedded Systems." In Encyclopedia of Biometrics, 255–59. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Komatsu, Naohisa, and Manabu Nakano. "Embedded Systems." In Encyclopedia of Biometrics, 397–401. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Evers, Sander, Arjen Hommersom, Peter Lucas, Carmen Cochior, and Paul van den Bosch. "Reasoning with Uncertainty about System Behaviour: Making Printing Systems Adaptive." In Embedded Systems, 125–58. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4821-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bräunl, Thomas. "Automotive Systems." In Embedded Robotics, 357–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-0804-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marwedel, Peter. "System Software." In Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Full text
Abstract:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
APA, Harvard, Vancouver, ISO, and other styles
7

Bräunl, Thomas. "Behavior-Based Systems." In Embedded Robotics, 323–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05099-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Leone, Andrew. "Interoperability in Electronic Systems." In Embedded Systems, 259–72. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118468654.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baruah, Sanjoy, Marko Bertogna, and Giorgio Buttazzo. "Introduction: Background, Scope, and Context." In Embedded Systems, 1–12. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08696-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baruah, Sanjoy, Marko Bertogna, and Giorgio Buttazzo. "The Three-Parameter Sporadic Tasks Model." In Embedded Systems, 95–102. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08696-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Embedded Systems"

1

Islam, Sifat, Ravi Shankar, Ankur Agarwal, Andrew Katan, and Cyril-Daniel Iskander. "Concurrency Compliant Embedded System Modeling Methodology." In 2008 2nd Annual IEEE Systems Conference. IEEE, 2008. http://dx.doi.org/10.1109/systems.2008.4519019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Issa, Omneya, Jean-Charles Gregoire, Yacine Belala, and James Wong. "3G Embedded Communication System for Medical Applications." In 2008 2nd Annual IEEE Systems Conference. IEEE, 2008. http://dx.doi.org/10.1109/systems.2008.4518991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dagli, Cihan, and Mark S. Anderson. "Systems Architecting Heuristics for Systems Engineering Management and Embedded Systems Engineering." In 2007 1st Annual IEEE Systems Conference. IEEE, 2007. http://dx.doi.org/10.1109/systems.2007.374683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Embedded systems." In 2011 IEEE International Conference on Industrial Technology (ICIT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icit.2011.5754352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Embedded systems." In 2011 IEEE 43rd Southeastern Symposium on System Theory (SSST 2011). IEEE, 2011. http://dx.doi.org/10.1109/ssst.2011.5753768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Embedded Systems." In 2018 25th International Conference "Mixed Design of Integrated Circuits and System" (MIXDES). IEEE, 2018. http://dx.doi.org/10.23919/mixdes.2018.8436778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Embedded systems." In 2017 MIXDES - 24th International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2017. http://dx.doi.org/10.23919/mixdes.2017.8005272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Embedded Systems." In 2019 MIXDES - 26th International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2019. http://dx.doi.org/10.23919/mixdes.2019.8787045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Embedded Systems." In 2020 27th International Conference on Mixed Design of Integrated Circuits and System (MIXDES). IEEE, 2020. http://dx.doi.org/10.23919/mixdes49814.2020.9155723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Embedded systems." In 2016 MIXDES - 23rd International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2016. http://dx.doi.org/10.1109/mixdes.2016.7529780.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Embedded Systems"

1

Andronick, June, and Gerwin Klein. Formal System Verification for Trustworthy Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2011. http://dx.doi.org/10.21236/ada541318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Welderman, Nelson H., Neal Altman, Mark Borger, Patrick Donohoe, William E. Hefley, Mark H. Klein, Stephan F. Landherr, Hans Mumm, and John A. Slusrz. Ada Embedded Systems Testbed Project. Fort Belvoir, VA: Defense Technical Information Center, December 1987. http://dx.doi.org/10.21236/ada200609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cooper, Keith D., Devika Subramanian, and Linda Torczon. Code Optimization for Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada417472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sprinkle, Jonathan. Modeling of Embedded Human Systems. Fort Belvoir, VA: Defense Technical Information Center, July 2013. http://dx.doi.org/10.21236/ada589568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fisher, David A. Principles of Trust for Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, March 2012. http://dx.doi.org/10.21236/ada611117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ortega, Ross B., and Gaetano Borriello. Communication Synthesis for Distributed Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada416530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Satterthwaite, Charles P. Technologies for Avionics Embedded Computer Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1994. http://dx.doi.org/10.21236/ada276364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Becker, Marcel, and Douglas R. Smith. ACES: Aspect-Oriented Composition of Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada440726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ellis, Brian J., and John A. Stankovic. Aspect Suite Automation for Embedded Mission Systems. Fort Belvoir, VA: Defense Technical Information Center, March 2005. http://dx.doi.org/10.21236/ada435021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liuzzi, Raymond A., and Panos Antsaklis. Real-Time Configuration of Networked Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, May 2005. http://dx.doi.org/10.21236/ada435123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography