Browse All Reviews
Operating Systems (D.4)
Organization And Design (D.4.7)
> Real-Time Systems And Embedded Systems (D.4.7...)
All Media Types
1-10 of 172 Reviews about "
Real-Time Systems And Embedded Systems (D.4.7...)
Securing the device drivers of your embedded systems: framework and prototype
Li Z., Wang J., Sun M., Lui J. ARES 2019 (Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, Aug 26-29, 2019) 1-10, 2019. Type: Proceedings
Device drivers in embedded systems are often filled with defects and security issues, which occur at any stage. During either buildtime or runtime, logical errors can have a significant impact. Although there is no single tool or method for secure...
Jan 19 2021
Embedded software for the IoT (3rd ed.)
Elk K., DE GRUYTER, Boston, MA, 2019. 294 pp. Type: Book (978-1-547417-15-5)
An in-depth study of embedded software for the Internet of Things (IoT), this book explains various topics, from selecting an operating system (OS) to code maintenance. Due to the resource-constrained nature of IoT, it is always a challenge to uti...
Nov 30 2020
Smart network inspired paradigm and approaches in IoT applications
Elhoseny M., Singh A., Springer International Publishing, New York, NY, 2019. 253 pp. Type: Book
There is no question that today’s world moves via billions and billions of bits exchanging data and information among millions or billions of emitters and receivers. One important aspect of this known challenge is that those emitters and rec...
Nov 25 2020
Systematically ensuring the confidence of real-time home automation IoT systems
Bu L., Xiong W., Liang C., Han S., Zhang D., Lin S., Li X. ACM Transactions on Cyber-Physical Systems 2(3): 1-23, 2018. Type: Article
The quick expansion of computing technology in many areas leads to different new paradigms; among them is the paradigm of cyber-physical systems (CPS) with commonly acquired sensor data that can be processed in real time. One of the manifestations...
Oct 13 2020
Trustworthy cyber-physical systems: a systematic framework towards design and evaluation of trust and trustworthiness
Mohammadi N., Springer International Publishing, New York, NY, 2019. 344 pp. Type: Book (978-3-658274-87-0)
Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and water purificat...
Jul 1 2020
Schedulability analysis of tasks with corunner-dependent execution times
Andersson B., Kim H., de Niz D., Klein M., Rajkumar R., Lehoczky J. ACM Transactions on Embedded Computing Systems 17(3): 1-29, 2018. Type: Article
Scarce computer memory and processor core resources create crucial challenges to the real-time execution of concurrent software. How should a multicore processor be efficiently programmed to process concurrent software with different execution spe...
Nov 22 2019
Introduction to embedded systems: a cyber-physical systems approach (2nd ed.)
Lee E., Seshia S., The MIT Press, Cambridge, MA, 2017. 568 pp. Type: Book (978-0-262533-81-2)
The design of embedded computing systems has become more important as wireless systems, smart appliances, automotive systems, and many other cyber-physical systems are built upon an embedded system. This book introduces many concepts related to mo...
Mar 1 2018
Data-driven synchronization for Internet-of-Things systems
Bennett T., Gans N., Jafari R. ACM Transactions on Embedded Computing Systems 16(3): 1-24, 2017. Type: Article
Time synchronization has been an active issue for decades. Stricter timing, energy considerations, external influences, and so on have spurred new studies. Two variants can be found: synchronize the clocks of distributed devices or provide a formu...
Feb 13 2018
Practical LXC and LXD: Linux containers for virtualization and orchestration
Kumaran S. S., Apress, New York, NY, 2017. 159 pp. Type: Book (978-1-484230-23-7)
Virtualized environments, both virtual machines (VMs) and containers, have become the essential technologies of elastic cloud computing services. System administrators of such services frequently encounter Linux-based virtualization, in particular...
Jan 3 2018
Incremental bounded model checking for embedded software
Schrammel P., Kroening D., Brain M., Martins R., Teige T., Bienmüller T. Formal Aspects of Computing 29(5): 911-931, 2017. Type: Article
Bounded model checking is employed in tools for the formal verification of C programs such as the C bounded model checker (CBMC). The key idea of this technique is to unwind unbounded program loops to a fixed depth and to translate the resulting p...
Dec 4 2017
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.