We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. General Purpose Embedded Operating Systems

    This chapter describes the design and implementation of a general purpose operating system, denoted by EOS, for ARM uniprocessor-based embedded...
    Chapter 2023
  2. Performance evaluation of all intra Kvazaar and x265 HEVC encoders on embedded system Nvidia Jetson platform

    The growing demand for high-quality video requires complex coding techniques that cost resource consumption and increase encoding time which...

    R. James, Mohammed Abo-Zahhad, ... Mohammed S. Sayed in Journal of Real-Time Image Processing
    Article 02 April 2024
  3. Process Management in Embedded Systems

    This chapter covers process management. It introduces the concept of processes and demonstrates the basic technique of multitasking by context...
    Chapter 2023
  4. An interview study about the use of logs in embedded software engineering

    Context

    Execution logs capture the run-time behavior of software systems. To assist developers in their maintenance tasks, many studies have proposed...

    Nan Yang, Pieter Cuijpers, ... Alexander Serebrenik in Empirical Software Engineering
    Article 11 February 2023
  5. Embedded 3D reconstruction of dynamic objects in real time for maritime situational awareness pictures

    Assessing the security status of maritime infrastructures is a key factor for maritime safety and security. Facilities such as ports and harbors are...

    Felix Sattler, Borja Carrillo-Perez, ... Gregor Lux in The Visual Computer
    Article Open access 10 March 2023
  6. Recommendation for a Holistic Secure Embedded ISA Extension

    Embedded systems are a cornerstone of the ongoing digitization of our society, ranging from expanding markets around IoT and smart-X devices over to...
    Florian Stolz, Marc Fyrbiak, ... Tim Güneysu in Applied Cryptography and Network Security
    Conference paper 2023
  7. Embedded Edge and Cloud Intelligence

    The number of connected edge or internet-of-things (IoT) devices is expected to cross over 20 billion by the 2021. These devices include basic sensor...
    Koushik A. Manjunatha, Sumathi Lakshmiranganatha in Security and Risk Analysis for Intelligent Edge Computing
    Chapter 2023
  8. Gesture recognition with a 2D low-resolution embedded camera to minimise intrusion in robot-led training of children with autism spectrum disorder

    Abstract

    Growing evidence shows the potential benefits of robot-assisted therapy for children with Autism Spectrum Disorder (ASD). However, when...

    Giovanni Ercolano, Silvia Rossi, ... Alessandro Di Nuovo in Applied Intelligence
    Article Open access 01 April 2024
  9. Deep Learning-Based Personalized Course Content Push Algorithm for Embedded Professional Teaching

    This paper explores and studies the embedded system teaching reform from four aspects: the construction of embedded system curriculum system, the...
    Conference paper 2024
  10. Designing Modern Embedded Systems: Software, Hardware, and Applications 7th IFIP TC 10 International Embedded Systems Symposium, IESS 2022, Lippstadt, Germany, November 3–4, 2022, Proceedings

    This book constitutes the refereed proceedings of the 7th IFIP TC 10 International Embedded Systems Symposium, IESS 2022, held in Lippstadt, Germany,...

    Stefan Henkler, Márcio Kreutz, ... Achim Rettberg in IFIP Advances in Information and Communication Technology
    Conference proceedings 2023
  11. Effect of Data Sampling on Cone Shaped Embedded Normalization in Just in Time Software Defect Prediction

    Just-in-Time (JIT) defect prediction represents a software engineering approach that seeks to detect potential defects in software code at the...

    Lipika Goel, Sonam Gupta, ... Vinay Pathak in SN Computer Science
    Article 27 March 2024
  12. Embedded mutual learning: A novel online distillation method integrating diverse knowledge sources

    Knowledge distillation (KD) is a feasible and effective way to obtain small networks with outstanding properties that can be deployed on...

    Chuanxiu Li, Guangli Li, ... Donghong Ji in Applied Intelligence
    Article 07 September 2022
  13. A novel lightweight CNN for chest X-ray-based lung disease identification on heterogeneous embedded system

    The global spread of epidemic lung diseases, including COVID-19, underscores the need for efficient diagnostic methods. Addressing this, we developed...

    Theodora Sanida, Minas Dasygenis in Applied Intelligence
    Article Open access 01 March 2024
  14. EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks

    The Internet of Things (IoT) has shown incredible adaptability in recent years and has become an integral part of human life. The proliferation of...

    Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil in Cluster Computing
    Article 23 May 2023
  15. Multi-label learning of missing labels using label-specific features: an embedded packaging method

    Learning label-specific features is an effective strategy for multi-label classification. Existing multi-label classification methods for learning...

    Dawei Zhao, Yi Tan, ... De Zhu in Applied Intelligence
    Article 20 December 2023
  16. Embedded Real-Time Operating Systems

    This chapter covers embedded real-time operating systems (RTOS). It introduces the concepts and requirements of real-time systems. It covers the...
    Chapter 2023
  17. Realtime Sitting Posture Recognition on Embedded Device

    It is difficult to maintain a standard sitting posture for long periods of time, and a non-standard sitting posture can damage human health....
    **gsen Fang, Shoudong Shi, ... Zheng Huo in MultiMedia Modeling
    Conference paper 2023
  18. Embedded Systems and Architectures

    Computers have been around us for many years. Even though most of us think of computers as boxes attached to a keyboard, a mouse, and a display, most...
    Alexandru Radovici, Ioana Culic in Getting Started with Secure Embedded Systems
    Chapter 2022
  19. Breaking Embedded Software Homogeneity with Protocol Mutations

    Network-connected embedded devices suffer from easy-to-exploit security issues. Due to code and platform reuse the same vulnerability oftentimes ends...
    Tongwei Ren, Ryan Williams, ... Long Lu in Security and Privacy in Communication Networks
    Conference paper 2023
Did you find what you were looking for? Share feedback.