標(biāo)題: Titlebook: Embedded and Ubiquitous Computing; International Confer Laurence T. Yang,Minyi Guo,Niraj K. Jha Conference proceedings 2004 Springer-Verlag [打印本頁] 作者: Iodine 時(shí)間: 2025-3-21 19:42
書目名稱Embedded and Ubiquitous Computing影響因子(影響力)
書目名稱Embedded and Ubiquitous Computing影響因子(影響力)學(xué)科排名
書目名稱Embedded and Ubiquitous Computing網(wǎng)絡(luò)公開度
書目名稱Embedded and Ubiquitous Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Embedded and Ubiquitous Computing被引頻次
書目名稱Embedded and Ubiquitous Computing被引頻次學(xué)科排名
書目名稱Embedded and Ubiquitous Computing年度引用
書目名稱Embedded and Ubiquitous Computing年度引用學(xué)科排名
書目名稱Embedded and Ubiquitous Computing讀者反饋
書目名稱Embedded and Ubiquitous Computing讀者反饋學(xué)科排名
作者: 宇宙你 時(shí)間: 2025-3-21 21:55
Micro Newton Thruster Developmenton-functional requirements. In this work, we reveal the internal architecture and design flow of a newly proposed framework called . (VERTAF), which integrates software component-based reuse, formal synthesis, and formal verification. Component reuse is based on a formal UML real-time embedded objec作者: enchant 時(shí)間: 2025-3-22 00:24
https://doi.org/10.1007/978-3-642-45678-7P oriented mobile protocols. In particular, we evaluate by simulation the integration of RSVP and HMIP protocols over a typical wireless private WAN scenario. Experimental results confirm the feasibility of our proposal.作者: armistice 時(shí)間: 2025-3-22 07:44
,μTAS for Biochemical Analysis,ated-in-place. To solve this limitation, the data is stored inside of the proper file. The solution was to construct a reverse-tree. This would be impracticable with the current systems, because it would not be possible to locate a file directly, from root directory. This schema would break the navi作者: 起皺紋 時(shí)間: 2025-3-22 09:43 作者: Spartan 時(shí)間: 2025-3-22 14:35 作者: Spartan 時(shí)間: 2025-3-22 18:53 作者: 軟弱 時(shí)間: 2025-3-23 00:44 作者: jabber 時(shí)間: 2025-3-23 02:35
Micro Total Analysis Systems ’98s to be solved. Especially, in development of the embedded software which controls embedded machines, as debugging the embedded software cannot be developed until the system (hardware and mechanism) is completed, loss of time in development arises and the progress of the whole product development wi作者: 機(jī)密 時(shí)間: 2025-3-23 08:21 作者: Ingredient 時(shí)間: 2025-3-24 02:41
Principles of Micro- and Nanofabrication,otection domains because of the limitations of their target platforms. The requirements for embedded OS kernels are, however, changing. The current and future embedded systems software is becoming larger and more complex. In order to accommodate such large and complex software systems, embedded OS k作者: 惡心 時(shí)間: 2025-3-24 07:00 作者: insurrection 時(shí)間: 2025-3-24 11:43 作者: inferno 時(shí)間: 2025-3-24 18:52 作者: 土產(chǎn) 時(shí)間: 2025-3-24 19:23
https://doi.org/10.1007/978-94-017-2270-4deadlines on a set of heterogeneous multiprocessors. We employ a priority-based scheme in which the hard subtasks are always allotted a higher priority as compared to the soft subtasks. IDSA utilizes selective subtask duplication that enables some subtasks to have earlier start times, which results 作者: Frequency 時(shí)間: 2025-3-25 00:05
978-3-540-22906-3Springer-Verlag Berlin Heidelberg 2004作者: 使入迷 時(shí)間: 2025-3-25 07:04 作者: Arable 時(shí)間: 2025-3-25 07:33 作者: cruise 時(shí)間: 2025-3-25 13:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/307976.jpg作者: harbinger 時(shí)間: 2025-3-25 16:18 作者: 不能逃避 時(shí)間: 2025-3-25 23:33 作者: CAMP 時(shí)間: 2025-3-26 02:19
Integration of Protocols in Order to Provide Quality of Service in IP Mobile NetworksP oriented mobile protocols. In particular, we evaluate by simulation the integration of RSVP and HMIP protocols over a typical wireless private WAN scenario. Experimental results confirm the feasibility of our proposal.作者: 嚴(yán)重傷害 時(shí)間: 2025-3-26 06:48
Authentication and Autoconfiguration for MANET Nodestion and Distribution Protocol (DCDP) in order to extend the protocol functionalities to include security-aware node identification and authentication services. The overall security is also enforced with intrusion detection techniques.作者: sigmoid-colon 時(shí)間: 2025-3-26 10:54 作者: 改革運(yùn)動(dòng) 時(shí)間: 2025-3-26 15:39 作者: DAMP 時(shí)間: 2025-3-26 20:15
,μTAS for Biochemical Analysis,gability of the system, and then a direct tree need to be constructed in RAM memory. This article shows the reverse-tree management schema to solve the limitations of flash memories. This solution helped to minimize extreme updates and write operations, increasing flash life-time.作者: mastoid-bone 時(shí)間: 2025-3-26 22:00
Micro Total Analysis Systems ’98ll be inhibited greatly. In this research, we build a virtual machine in virtual space, and create an interface between an embedded software and virtual machine. It is considered that embedding the software embedded in the real system into a virtual machine, and working the virtual machine.作者: 蹣跚 時(shí)間: 2025-3-27 02:37 作者: moribund 時(shí)間: 2025-3-27 08:55
Micro Total Analysis Systems 2000tion and Distribution Protocol (DCDP) in order to extend the protocol functionalities to include security-aware node identification and authentication services. The overall security is also enforced with intrusion detection techniques.作者: 極深 時(shí)間: 2025-3-27 09:47
https://doi.org/10.1007/978-3-319-09674-2 In this paper, we suggest and compare several tie-breaking policies for deadline-based schedule algorithms on multiprocessor. An effective tie-breaking policy for different scheduling algorithm is identified by simulation.作者: enormous 時(shí)間: 2025-3-27 16:46
Adaptive Block Management for Victim Cache by Exploiting L1 Cache History Informationtly by selecting the blocks to be loaded into it based on the L1 cache history information. According to our simulations, proposed schemes show better performance than the conventional victim cache scheme and also reduce the power consumption.作者: 厭食癥 時(shí)間: 2025-3-27 20:09 作者: 吝嗇性 時(shí)間: 2025-3-28 01:18 作者: interrogate 時(shí)間: 2025-3-28 03:14 作者: 狼群 時(shí)間: 2025-3-28 09:57 作者: 喃喃訴苦 時(shí)間: 2025-3-28 13:07
https://doi.org/10.1007/978-981-13-3247-0erve that changes in the design parameters exert a varying degree of influence over the system performance depending on OS services: In the best case, performance improvement reaches 100% while ranging from 34% to 36% on average.作者: Fibrin 時(shí)間: 2025-3-28 16:04
https://doi.org/10.1007/978-3-031-21195-9near temporal logic over probabilistic timed transition systems. As our proposed probabilistic timed transition system is a general computational model, we have developed general verification methods.作者: Iatrogenic 時(shí)間: 2025-3-28 22:06
https://doi.org/10.1007/978-94-017-2270-4uired number of processors. Based on extensive simulation results, we observe that IDSA offers better success ratio as compared to the existing algorithms in the literature when communication is a dominant factor in the system.作者: debris 時(shí)間: 2025-3-29 01:31
Automatic Synthesis and Verification of Real-Time Embedded Software kernel from SGM, by adapting it for embedded software. Application examples developed using VERTAF demonstrate significantly reduced design efforts as compared to that without VERTAF, which shows how high-level reuse of software components with automatic synthesis and verification increase design productivity.作者: Euphonious 時(shí)間: 2025-3-29 05:39
Optimizing Address Assignment for Scheduling Embedded DSPs advantage of the address assignment during scheduling, code size and schedule length can be significantly reduced. We propose a multiple-functional-unit algorithm to do both address assignment and scheduling. The experimental results show that our algorithm can greatly reduce code size and schedule length compared to the previous work.作者: 天文臺(tái) 時(shí)間: 2025-3-29 09:30 作者: CON 時(shí)間: 2025-3-29 14:28
Deductive Probabilistic Verification Methods for Embedded and Ubiquitous Computingnear temporal logic over probabilistic timed transition systems. As our proposed probabilistic timed transition system is a general computational model, we have developed general verification methods.作者: inundate 時(shí)間: 2025-3-29 16:28
An Integrated Scheduling Algorithm for Precedence Constrained Hard and Soft Real-Time Tasks on Heteruired number of processors. Based on extensive simulation results, we observe that IDSA offers better success ratio as compared to the existing algorithms in the literature when communication is a dominant factor in the system.作者: Toxoid-Vaccines 時(shí)間: 2025-3-29 22:33 作者: 里程碑 時(shí)間: 2025-3-30 00:56
Haidou Wang,Binshi Xu,Jiajun Liuur toolset was applied to the PBX system to model scenarios, as well as to generate a scenario-based multithreaded executable. The study clearly shows that our method can handle large-scale, complex models and that scenario-based multithreading achieves the performance improvements for a real-world model.作者: ALIEN 時(shí)間: 2025-3-30 07:53 作者: FAWN 時(shí)間: 2025-3-30 10:37
Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Arccheduling the nodes with schedule length and switching activities minimization based on rotation scheduling and bipartite matching. The experimental results show our algorithm can greatly reduce both schedule length and switching activities compared with the previous work.作者: 該得 時(shí)間: 2025-3-30 13:03
Experimental Assessment of Scenario-Based Multithreading for Real-Time Object-Oriented Models: A Casur toolset was applied to the PBX system to model scenarios, as well as to generate a scenario-based multithreaded executable. The study clearly shows that our method can handle large-scale, complex models and that scenario-based multithreading achieves the performance improvements for a real-world model.作者: Ostrich 時(shí)間: 2025-3-30 18:58
A Virtual Reality Based System for Remote Maintenance of Rotating Machineryrated methodology to remotely monitor and diagnose distant machines by a robot hand. Using a virtual reality environment and a tele-operation system, the vibration data are collected from different checking points. In order to pinpoint the faults, the collected data are analyzed and then using a fuzzy system the features extraction was performed.作者: Crohns-disease 時(shí)間: 2025-3-30 22:28
Conference proceedings 2004 Japan, 25–27 August 2004. Embedded and ubiquitous computing are emerging rapidly as exciting new paradigms and disciplines to provide computing and communication services all the time, everywhere. Its systems are now invading every aspect of life to the point that they are disappearing inside all s作者: Inflammation 時(shí)間: 2025-3-31 01:17 作者: 演講 時(shí)間: 2025-3-31 07:04
Automatic Synthesis and Verification of Real-Time Embedded Softwareon-functional requirements. In this work, we reveal the internal architecture and design flow of a newly proposed framework called . (VERTAF), which integrates software component-based reuse, formal synthesis, and formal verification. Component reuse is based on a formal UML real-time embedded objec作者: Amorous 時(shí)間: 2025-3-31 11:50 作者: 不舒服 時(shí)間: 2025-3-31 15:21
RIFFS: Reverse Indirect Flash File Systemated-in-place. To solve this limitation, the data is stored inside of the proper file. The solution was to construct a reverse-tree. This would be impracticable with the current systems, because it would not be possible to locate a file directly, from root directory. This schema would break the navi作者: PRO 時(shí)間: 2025-3-31 20:58 作者: 可卡 時(shí)間: 2025-3-31 21:49
Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Arcnal-unit architectures. We formally prove that to find a schedule that has the minimal switching activities among all minimum-latency schedules with or without resource constraints is NP-complete. An algorithm, SAMLS (Switching-Activity Minimization Loop Scheduling), is proposed to minimize both sch作者: 軍械庫(kù) 時(shí)間: 2025-4-1 03:28
Optimizing Address Assignment for Scheduling Embedded DSPsment and auto-decrement modes improves the size and performance of generated code. A lot of previous work has been done on address assignment optimization to achieve code size reduction by minimizing address operations for single functional unit processors. However, minimizing address operations alo作者: conjunctivitis 時(shí)間: 2025-4-1 09:58 作者: 沐浴 時(shí)間: 2025-4-1 13:35
The Virtual Debugging System for Developing Embedded Software Using Virtual Machinerys to be solved. Especially, in development of the embedded software which controls embedded machines, as debugging the embedded software cannot be developed until the system (hardware and mechanism) is completed, loss of time in development arises and the progress of the whole product development wi作者: ADORE 時(shí)間: 2025-4-1 17:43
Embedded System Design for Network Time Synchronizationprocess in CPU utilization, disk I/O, and so on, so that the corresponding user can be charged properly. In a distributed system, an application may have processes that concurrently run on multiple nodes of the system. For correct results, several such distributed applications require that the clock作者: 運(yùn)動(dòng)的我 時(shí)間: 2025-4-1 19:47
Component Composition Tools: Process Call Scheduling According to the Priority in Connectorware architecture represents the specification and operation technique for composition. But the existing component composition techniques handle the request of linked component with FIFO method. The method such as FIFO that handles the request of the component just according to the requested order c作者: Urologist 時(shí)間: 2025-4-2 01:31
Experimental Performance Evaluation of Embedded Linux Using Alternative CPU Core Organizationsrformance to help with more power-aware and efficient computing. For this purpose, we attempt to evaluate the major Linux subsystems: process management, memory management, inter-process communication (IPC), and networking, while changing the organization of the core components of the CPU such as ca作者: 密碼 時(shí)間: 2025-4-2 05:37 作者: 詩(shī)集 時(shí)間: 2025-4-2 08:02 作者: 不近人情 時(shí)間: 2025-4-2 12:03
Providing Protected Execution Environments for Embedded Operating Systems Using a ,-Kernelotection domains because of the limitations of their target platforms. The requirements for embedded OS kernels are, however, changing. The current and future embedded systems software is becoming larger and more complex. In order to accommodate such large and complex software systems, embedded OS k作者: Gene408 時(shí)間: 2025-4-2 16:24
A Virtual Reality Based System for Remote Maintenance of Rotating Machinerym a lot of research is being done in different fields of maintenance and computer science. An evident and classical solution is the use of the tele-operation and tele-robotics. If the tele-operation helped to solve several real and technical problems, it still remains insufficient to assure an appro