Gotowa bibliografia na temat „Embedded Systems”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Embedded Systems”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Embedded Systems"

1

Miková, Ľubica, Ivan Virgala i Michal Kelemen. "EMBEDDED SYSTEMS". Acta Mechatronica 3, nr 2 (30.06.2018): 1–5. http://dx.doi.org/10.22306/am.v3i2.32.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Milojicic, D. "Embedded systems". IEEE Concurrency 8, nr 4 (październik 2000): 80–90. http://dx.doi.org/10.1109/mcc.2000.895110.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Reddy, Parineeth M. "Embedded systems". Resonance 7, nr 12 (grudzień 2002): 20–30. http://dx.doi.org/10.1007/bf02834526.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Lee, B. H. "Embedded Internet Systems: Poised for Takeoff [Embedded Systems]". IEEE Internet Computing 2, nr 3 (maj 1998): 24–29. http://dx.doi.org/10.1109/mic.1998.683796.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hickey, Patrick C., Lee Pike, Trevor Elliott, James Bielman i John Launchbury. "Building embedded systems with embedded DSLs". ACM SIGPLAN Notices 49, nr 9 (26.11.2014): 3–9. http://dx.doi.org/10.1145/2692915.2628146.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Santo, S. "Embedded battle royal [embedded operating systems]". IEEE Spectrum 38, nr 12 (grudzień 2001): 36–41. http://dx.doi.org/10.1109/6.969358.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sadiku, Matthew N. O., Yonghui Wang, Suxia Cui i Sarhan M. Musa. "Embedded Computing Systems". International Journal of Scientific Engineering and Technology 6, nr 12 (2017): 361. http://dx.doi.org/10.5958/2277-1581.2017.00059.6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bergamaschi, Reinaldo A. "Embedded Systems Week". IEEE Design & Test of Computers 24, nr 1 (styczeń 2007): 102–3. http://dx.doi.org/10.1109/mdt.2007.13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sami, Mariagiovanna, Miroslaw Malek, Umberto Bondi i Francesco Regazzoni. "Embedded systems education". ACM SIGBED Review 14, nr 1 (5.01.2017): 22–28. http://dx.doi.org/10.1145/3036686.3036689.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Jackson, David Jeff, i Paul Caspi. "Embedded systems education". ACM SIGBED Review 2, nr 4 (październik 2005): 1–4. http://dx.doi.org/10.1145/1121812.1121814.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Embedded Systems"

1

Yin, Hang. "Adaptive Embedded Systems". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10590.

Pełny tekst źródła
Streszczenie:
Modern embedded systems are evolving in the direction of increased adaptivity and complexity. It is extremely important for a system with limited resource to be adaptive in order to maximize its efficiency of resource usage while guaranteeing a high level of fault tolerance and QoS. This report aims at exploring such a kind of system, i.e. Adaptive Embedded System (AES), which is featured by dynamic reconfiguration at runtime. Based on the investigation and analysis of a variety of case studies related with AES, we proposed the conceptual view and overall architecture of an AES by highlighting its predominant characteristics. We also made an incomplete but detailed summary of the most popular techniques that can be used to realize adaptivity. Those techniques are categorized into dynamic CPU/network resource re-allocation and adaptive fault tolerance. A majority of adaptive applications resort to one or more of those techniques. Besides, there is a separate discussion on dynamic reconfiguration and mode switch for AES. Finally, we classify adaptivity into different modeling problems at a higher abstraction level and build UPPAAL models for two different AESs, a smart phone and an object-tracking robot. Our UPPAAL models provide clear demonstration on how a typical AES works.
Style APA, Harvard, Vancouver, ISO itp.
2

Tosun, Suleyman. "Reliability-centric system design for embedded systems". Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2005. http://wwwlib.umi.com/cr/syr/main.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Eldh, Erik. "Cloud connectivity for embedded systems". Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118746.

Pełny tekst źródła
Streszczenie:
Deploying an embedded system to act as a controller for electronics is not new.  Today these kinds of systems are all around us and are used for a multitude of purposes. In contrast, cloud computing is a relatively new approach for computing as a whole. This thesis project explores these two technologies in order to create a bridge between these two wildly different platforms. Such a bridge should enable new ways of exposing features and doing maintenance on embedded devices. This could save companies not only time and money while dealing with maintenance tasks for embedded systems, but this should also avoid the needed to host this maintenance software on dedicated servers – rather these tasks could use cloud resources only when needed. This thesis explores such a bridge and presents techniques suitable for joining these two computing paradigms together. Exploring what is included in cloud computing by examining available technologies for deployment is important to be able to get a picture of what the market has to offer. More importantly is how such a deployment can be done and what the benefits are. How technologies such as databases, load-balancers, and computing environments have been adapted to a cloud environment and what draw-backs and new features are available in this environment are of interest and how a solution can exploit these features in a real-world scenario.  Three different cloud providers and their products have been presented in order to create an overview of the current offerings.  In order to realize a solution a way of communicating and exchanging data is presented and discussed. Again to realize the concept in a real-world scenario. This thesis presents the concept of cloud connectivity for embedded systems. Following this the thesis describes a prototype of how such a solution could be realized and utilized. The thesis evaluates current cloud providers in terms of the requirements of the prototype. A middle-ware solution drawing strengths from the services offered by cloud vendors for deployment at a vendor is proposed. This middle-ware acts in a stateless manner to provide communication and bridging of functionality between two parties with different capabilities. This approach creates a flexible common ground for end-user clients and reduces the burden of having the embedded systems themselves process and distribute information to the clients.  The solution also provides and abstraction of the embedded systems further securing the communication with the systems by it only being enabled for valid middle-ware services.
Att använda ett inbyggt system som en kontrollenhet för elektronik är inget nytt. Dessa typer av system finns idag överallt och används i vidt spridda användningsområden medans datormolnet är en ny approach för dator användning i sin helhet. Utforska och skapa en länk mellan dessa två mycket olika platformar för att facilitera nya tillvägagångs sätt att sköta underhåll sparar företag inte tid och pengar när det kommer till inbyggda system utan också när det gäller driften för servrar. Denna examensarbete utforskar denna typ av länk och presenterar för endamålet lämpliga tekniker att koppla dem samman medans lämpligheten för en sådan lösning diskuteras. Att utforska det som inkluderas i konceptet molnet genom att undersöka tillgängliga teknologier för utveckling är viktigt för att få en bild av vad marknaden har att erbjuda. Mer viktigt är hur utveckling går till och vilka fördelarna är. Hur teknologoier som databaser, last distrubutörer och server miljöer har adapterats till molnmiljön och vilka nackdelar och fördelar som kommit ut av detta är av intresse och vidare hur en lösning kan använda sig av dessa fördelar i ett verkliget scenario. Tre olika moln leverantörer och deras produkter har presenterats för att ge en bild av vad som för tillfället erbjuds. För att realisera en lösning har ett sett att kommunicera och utbyta data presenterats och diskuterats. Åter igen för att realisera konceptet i ett verkligt scenario. Denna uppsats presenterar konceptet moln anslutbarhet för inbyggda system för att kunna få en lösning realiserad och använd. En mellanprograms lösning som drar styrka ifrån de tjänster som erbjudas av molnleverantörer för driftsättning hos en leverantor föreslås. Denna mellanprogramslösnings agerar tillståndslöst för att erbjuda kommunikation och funktions sammankoppling mellan de två olika deltagarna som har olika förutsätningar. Denna approach skapar en flexibel gemensam plattform för olika klienter hos slutanvändaren och minskar bördan hos de inbyggdasystemet att behöva göra analyser och distrubuera informationen till klienterna. Denna lösning erbjuder också en abstraktion av de inbyggdasystemen för att erbjuda ytterligare säkerhet när kommunikation sker med de inbyggdasystemet genom att den endast sker med giltiga mellanprogram.
Style APA, Harvard, Vancouver, ISO itp.
4

Corteggiani, Nassim. "Towards system-wide security analysis of embedded systems". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS285.

Pełny tekst źródła
Streszczenie:
Cette thèse se consacre à l'amélioration des techniques d'analyse dynamiques permettant la vérification de logiciels conçus pour des systèmes embarqués, couramment appelé micrologiciel. Au vu de l'augmentation significative de la connectivité des appareils électroniques, les préoccupations concernant leur sécurité s'intensifient. Les conséquences d'une faille de sécurité sur ces appareils peuvent impliquer des répercussions économiques non négligeables et des difficultés techniques importantes pour appliquer un correctif. C’est le cas notamment des amorceurs de code qui sont généralement stockés sur des mémoires mortes et intégrées dans les couches physiques qui constituent le microcontrôleur. Par conséquent, l’analyse de code source spécifique aux systèmes embarqués pendant la phase de production des micro-contrôleurs est cruciale. Cette thèse présente des techniques d'analyse afin de tester la sécurité de composants logiciel et matériel à l'échelle du système. En particulier, nous nous intéressons aux techniques de test basé sur l'émulation partielle dont nous améliorons les capacités avec trois nouvelles approches. Premièrement, Inception un outil d’analyse dynamique permettant d’appliquer des méthodes de tests exhaustifs (exécution symbolique) sur le code source de micrologiciel même lorsque ce dernier dépend de code plus bas niveau (exemple, code binaire ou assembleur). Deuxièmement, une sonde haute performance basé sur le protocol USB 3.0 afin de réduire la latence lors des communications entre l'outil d'analyse et le vrai matériel. Troisièmement, HardSnap une méthode permettant de générer des instantanés des périphériques matériel afin d'augmenter le contrôle et la visibilité lors de l'exécution symbolique. Cet outil permet de réaliser une exploration concurrente de plusieurs chemins d'exécution sans inconsistance
This thesis is dedicated to the improvement of dynamic analysis techniques allowing the verification of software designed for embedded systems, commonly called firmware. It is clear that the increasing pervasiveness and connectivity of embedded devices significantly increase their exposure to attacks. The consequences of a security issue can be dramatic not least in the economical field, but on the technical stage as well. Especially because of the difficulty to patch some devices. For instance, offline devices or code stored in a mask rom which are read only memory programmed during the chip fabrication. For all these reasons, it is important to thoughtfully test firmware program before the manufacturing process. This thesis presents analysis methods for system-wide testing of security and hardware components. In particular, we propose three impvrovements for partial emulation. First, Inception a dynamic analysis tool to test the security of firmware programs even when mixing different level of semantic (e.g., C/C++ mixed with assembly). Second, Steroids a high performance USB 3.0 probe that aims at minimizing the latency between the analyzer and the real device. Finally, HardSnap a hardware snapshotting method that offers higher visibility and control over the hardware peripherals. It enables testing concurently different execution paths without corrupting the hardware peripherals state
Style APA, Harvard, Vancouver, ISO itp.
5

Carlson, Jan. "Event Pattern Detection for Embedded Systems". Doctoral thesis, Västerås : Department of Computer Science and Electronics, Mälardalen University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-231.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

von, Hacht Karl-Johan. "Garden Monitoring with Embedded Systems". Thesis, Linköpings universitet, Datorteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120706.

Pełny tekst źródła
Streszczenie:
In today’s modern society the process of handling crops in an accountable way withoutloss have become more and more important. By letting a gardener evaluate the progressof his plants from relevant data one can reduce these losses and increase effectiveness ofthe whole plantation. This work is about the construction of such a system composedfrom a developers perspective of three different platforms, from the start of data samplingwithin the context of gardening to and end user easily able to understand the data thentranslated. The first platform will be created from scratch with both hardware andsoftware, the next assembled from already finished hardware components and build withsimpler software. The last will essentially only be a software solution in an alreadyfinished hardware environment.
Style APA, Harvard, Vancouver, ISO itp.
7

Dyer, Matthias. "Distributed embedded systems : validation strategies /". Aachen : Shaker Verlag, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Lessner, Dirk. "Network security for embedded systems /". [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Tewatia, Rohit. "Security in Distributed Embedded Systems". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1379.

Pełny tekst źródła
Streszczenie:

Communication in a sensor network needs guaranteed reception of data without fail and providing security to it. The authenticity and confidentiality of the data has to be ensured as sensors have limited hardware resources as well as the bandwidth. This thesis addresses the security aspects in wireless sensor networks. The main task of the project is to identify the critical security parameters for these distributed embedded systems. The sensors have extremely limited resources: small amount of memory, low computation capability and poor bandwidth. For example, a sensor platform can have 8KB of flash memory, a 4MHz 8-bit Atmel processor, and a 900MHz radio interface. Various security threats posed to these small wireless sensor networks has been made and solutions proposed. Secure communication between these communicating partners is to be achieved using cryptography.

Style APA, Harvard, Vancouver, ISO itp.
10

Wilund, Torbjörn. "Robust Distributed Embedded Systems : Communication". Thesis, KTH, Maskinkonstruktion (Inst.), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100998.

Pełny tekst źródła
Streszczenie:
Detta examensarbete diskuterar i sin teoretiska del vad begreppet robusthet betyder för distribuerade inbyggda system. Utvecklingen går idag generellt emot att byta mekaniska och elektriska lösningar mot mekatroniska styrsystem. Det finns sedan mycket att vinna på att göra dessa inbyggda styrsystem distribuerade, bland annat beroende på oberoende mellan noder för intern övervakning och feldetektering. Delresultatet om robusthet säger att det beror på integritet för att uppnå tillgänglighet och tillförlitlighet, det vill säga att informationen är den samma i alla berörda noder. Tillförlitligheten beror på hur fel i tid och värde hanteras under systemexekvering. Informationen skyddas i samtliga undersökta protokoll genom redundans av diverse algoritmer, exempelvis CRC vilket ger möjlighet till feldetektering. Skillnad finns dock i hur tidssynkronisering hanteras om det ens finns hantering av för detta. Ur detta perspektiv är endast tidsstyrda nätverksprotokoll av nuvarande alternativ mest tekniskt lämpliga. Den praktiska delen försöker utvärdera GAST levererad hårdvara. Arbetet med att få igång någon kommunikation på TTP/C misslyckades, detta beroende på brister i den sammansatta plattformen. Mer specifikt beror detta troligtvis på konstruktionsfel i det fysiska lagret av plattformen. Med valt bakplan blir ej signalerna som förväntat vilket gör att informationen tolkas fel av externa kommunikations kretsar. Därför rekommenderas närmare analys av signalen i databussen och eventuell konstruktion av ett filter till bakplanet om nuvarande hopsättning skall användas. Plattformen har med sin öppenhet en framtid för utveckling och forskning kring distribuerade inbyggda system, dock saknas färdiga drivrutiner för de i plattformen integrerade protokollen. Detta är något som måste åtgärdas ifall plattformen skall få någon form av betydelse innan tekniken är för gammal. Undersökningen av den TTP Plan genererade koden visar att det går att extrahera information från verktyget och på så sätt utnyttja verktyget för konfiguration. För att detta skall fungera bör man tillverka någon form av verktyg för detta.
This thesis tries in its theoretical part to discuss what the term of robustness means for distributed embedded systems. Development of today generally tries to exchange mechanical and electrical solutions for embedded control systems. There are a lot of benefits to gain by designing in a distributed way, this due to internal independencies between nodes for monitoring and error detection. The outcome about robustness suggests that it depends on integrity to achieve availability and reliability, or loss of alternations of information in the different nodes in the distributed system. Reliability depends on how faults in terms of time and value are treated during execution. All studied network protocols have protection of information by different redundancy algorithms such as CRC, which gives the opportunity for fault and error detection. However there are differences in how time is handled, if there is any time handling, and possibility for time synchronization in the hardware. From this perspective the best alternatives are time triggered architectures of current technology. The experimental part tries to evaluate the GAST delivered platform. The work to achieve communication on TTP/C controllers failed due to shortage in the assembled platform. More specifically this is probably the case of bugs in the design of the physical layer of the GAST hardware (not the TTP controllers themselves). By use of recommended backplane, the sent signals are not appearing as expected, and information sent is misinterpreted by external communication devices. A suggestion and recommendation for future work is analysis of the signal in the data bus, and possible design of a filter if current assembly shall be used. The platform has a future for development and research in the field of distributed embedded systems due to its openness, however there is a lack of drivers for the platform integrated network protocols. This must be attended if the platform shall have any significance. The evaluation of TTP Plan generated code shows, that there are possibilities to extract configuration information form tool for configuration of platform. To achieve this some kind of extraction script must be developed.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Embedded Systems"

1

service), SpringerLink (Online, red. Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems. Dordrecht: Springer Science+Business Media B.V., 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kordon, Fabrice, Jérôme Hugues, Agusti Canals i Alain Dohet, red. Embedded Systems. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118569535.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kündig, A., R. E. Bührer i J. Dähler, red. Embedded Systems. Berlin/Heidelberg: Springer-Verlag, 1987. http://dx.doi.org/10.1007/bfb0016343.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Iniewski, Krzysztof, red. Embedded Systems. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118468654.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Richard, Zurawski, red. Embedded systems handbook: Embedded systems design and verification. Wyd. 2. Boca Raton, FL: Taylor & Francis Group, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Odette, Louis L. Intelligent embedded systems. Reading, Mass: Addison-Wesley Pub. Co., 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kathiresh, M., i R. Neelaveni, red. Automotive Embedded Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-59897-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Bi, Yuanguo, Gang Chen, Qingxu Deng i Yi Wang, red. Embedded Systems Technology. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1026-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Gu, Changyi. Building Embedded Systems. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1919-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Agrawal, Dharma Prakash. Embedded Sensor Systems. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3038-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Embedded Systems"

1

Maskrey, Molly K. "Embedded Systems". W App Development Recipes for iOS and watchOS, 201–23. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1820-4_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Komatsu, Naohisa, i Manabu Nakano. "Embedded Systems". W Encyclopedia of Biometrics, 255–59. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Komatsu, Naohisa, i Manabu Nakano. "Embedded Systems". W Encyclopedia of Biometrics, 397–401. Boston, MA: Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Evers, Sander, Arjen Hommersom, Peter Lucas, Carmen Cochior i Paul van den Bosch. "Reasoning with Uncertainty about System Behaviour: Making Printing Systems Adaptive". W Embedded Systems, 125–58. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-4821-1_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bräunl, Thomas. "Automotive Systems". W Embedded Robotics, 357–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-0804-9_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Marwedel, Peter. "System Software". W Embedded Systems, 203–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60910-8_4.

Pełny tekst źródła
Streszczenie:
AbstractIn order to cope with the complexity of applications of embedded systems, reuse of components is a key technique. As pointed out by Sangiovanni-Vincentelli (The context for platform-based design. IEEE Design and Test of Computers, 2002), software and hardware components must be reused in the platform-based design methosdology (see p. 296). These components comprise knowledge from earlier design efforts and constitute intellectual property (IP). Standard software components that can be reused include system software components such as embedded operating systems (OSs) and middleware. The last term denotes software that provides an intermediate layer between the OS and application software. This chapter starts with a description of general requirements for embedded operating systems. This includes real-time capabilities as well as adaptation techniques to provide just the required functionality. Mutually exclusive access to resources can result in priority inversion, which is a serious problem for real-time systems. Priority inversion can be circumvented with resource access protocols. We will present three such protocols: the priority inheritance, priority ceiling, and stack resource protocols. A separate section covers the ERIKA real-time system kernel. Furthermore, we will explain how Linux can be adapted to systems with tight resource constraints. Finally, we will provide pointers for additional reusable software components, like hardware abstraction layers (HALs), communication software, and real-time data bases. Our description of embedded operating systems and of middleware in this chapter is consistent with the overall design flow.
Style APA, Harvard, Vancouver, ISO itp.
7

Bräunl, Thomas. "Behavior-Based Systems". W Embedded Robotics, 323–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-05099-6_22.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Leone, Andrew. "Interoperability in Electronic Systems". W Embedded Systems, 259–72. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118468654.ch11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Baruah, Sanjoy, Marko Bertogna i Giorgio Buttazzo. "Introduction: Background, Scope, and Context". W Embedded Systems, 1–12. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08696-5_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Baruah, Sanjoy, Marko Bertogna i Giorgio Buttazzo. "The Three-Parameter Sporadic Tasks Model". W Embedded Systems, 95–102. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08696-5_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Embedded Systems"

1

Islam, Sifat, Ravi Shankar, Ankur Agarwal, Andrew Katan i Cyril-Daniel Iskander. "Concurrency Compliant Embedded System Modeling Methodology". W 2008 2nd Annual IEEE Systems Conference. IEEE, 2008. http://dx.doi.org/10.1109/systems.2008.4519019.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Issa, Omneya, Jean-Charles Gregoire, Yacine Belala i James Wong. "3G Embedded Communication System for Medical Applications". W 2008 2nd Annual IEEE Systems Conference. IEEE, 2008. http://dx.doi.org/10.1109/systems.2008.4518991.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Dagli, Cihan, i Mark S. Anderson. "Systems Architecting Heuristics for Systems Engineering Management and Embedded Systems Engineering". W 2007 1st Annual IEEE Systems Conference. IEEE, 2007. http://dx.doi.org/10.1109/systems.2007.374683.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

"Embedded systems". W 2011 IEEE International Conference on Industrial Technology (ICIT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icit.2011.5754352.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

"Embedded systems". W 2011 IEEE 43rd Southeastern Symposium on System Theory (SSST 2011). IEEE, 2011. http://dx.doi.org/10.1109/ssst.2011.5753768.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

"Embedded Systems". W 2018 25th International Conference "Mixed Design of Integrated Circuits and System" (MIXDES). IEEE, 2018. http://dx.doi.org/10.23919/mixdes.2018.8436778.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

"Embedded systems". W 2017 MIXDES - 24th International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2017. http://dx.doi.org/10.23919/mixdes.2017.8005272.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

"Embedded Systems". W 2019 MIXDES - 26th International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2019. http://dx.doi.org/10.23919/mixdes.2019.8787045.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

"Embedded Systems". W 2020 27th International Conference on Mixed Design of Integrated Circuits and System (MIXDES). IEEE, 2020. http://dx.doi.org/10.23919/mixdes49814.2020.9155723.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

"Embedded systems". W 2016 MIXDES - 23rd International Conference "Mixed Design of Integrated Circuits and Systems". IEEE, 2016. http://dx.doi.org/10.1109/mixdes.2016.7529780.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Embedded Systems"

1

Andronick, June, i Gerwin Klein. Formal System Verification for Trustworthy Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2011. http://dx.doi.org/10.21236/ada541318.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Welderman, Nelson H., Neal Altman, Mark Borger, Patrick Donohoe, William E. Hefley, Mark H. Klein, Stephan F. Landherr, Hans Mumm i John A. Slusrz. Ada Embedded Systems Testbed Project. Fort Belvoir, VA: Defense Technical Information Center, grudzień 1987. http://dx.doi.org/10.21236/ada200609.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cooper, Keith D., Devika Subramanian i Linda Torczon. Code Optimization for Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2003. http://dx.doi.org/10.21236/ada417472.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sprinkle, Jonathan. Modeling of Embedded Human Systems. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2013. http://dx.doi.org/10.21236/ada589568.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Fisher, David A. Principles of Trust for Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, marzec 2012. http://dx.doi.org/10.21236/ada611117.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ortega, Ross B., i Gaetano Borriello. Communication Synthesis for Distributed Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1998. http://dx.doi.org/10.21236/ada416530.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Satterthwaite, Charles P. Technologies for Avionics Embedded Computer Systems. Fort Belvoir, VA: Defense Technical Information Center, luty 1994. http://dx.doi.org/10.21236/ada276364.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Becker, Marcel, i Douglas R. Smith. ACES: Aspect-Oriented Composition of Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, luty 2004. http://dx.doi.org/10.21236/ada440726.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ellis, Brian J., i John A. Stankovic. Aspect Suite Automation for Embedded Mission Systems. Fort Belvoir, VA: Defense Technical Information Center, marzec 2005. http://dx.doi.org/10.21236/ada435021.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Liuzzi, Raymond A., i Panos Antsaklis. Real-Time Configuration of Networked Embedded Systems. Fort Belvoir, VA: Defense Technical Information Center, maj 2005. http://dx.doi.org/10.21236/ada435123.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii