咨询与建议

限定检索结果

文献类型

  • 344 篇 会议
  • 16 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 361 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 287 篇 工学
    • 262 篇 计算机科学与技术...
    • 153 篇 软件工程
    • 70 篇 信息与通信工程
    • 39 篇 电子科学与技术(可...
    • 37 篇 电气工程
    • 27 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 71 篇 理学
    • 54 篇 数学
    • 15 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 4 篇 生物学
    • 2 篇 化学
  • 25 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
  • 2 篇 教育学
    • 2 篇 教育学

主题

  • 44 篇 embedded systems
  • 38 篇 computer archite...
  • 29 篇 computational mo...
  • 11 篇 data communicati...
  • 11 篇 hardware
  • 8 篇 computer simulat...
  • 8 篇 simulation
  • 8 篇 system-on-chip
  • 7 篇 program processo...
  • 7 篇 integrated circu...
  • 7 篇 wireless telecom...
  • 6 篇 analytical model...
  • 6 篇 embedded system
  • 6 篇 field programmab...
  • 5 篇 circuit simulati...
  • 5 篇 computer hardwar...
  • 5 篇 application soft...
  • 5 篇 throughput
  • 5 篇 electronic mail
  • 5 篇 load modeling

机构

  • 3 篇 politecnico di t...
  • 3 篇 univ victoria de...
  • 2 篇 katholieke univ ...
  • 2 篇 beijing institut...
  • 2 篇 univ aachen rhei...
  • 2 篇 federal universi...
  • 2 篇 seoul natl univ ...
  • 2 篇 vrije univ bruss...
  • 2 篇 univ amsterdam i...
  • 2 篇 beijing institut...
  • 2 篇 tampere univ tec...
  • 2 篇 computer enginee...
  • 2 篇 intel corp mobil...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 univ wisconsin d...
  • 2 篇 vienna univ tech...
  • 2 篇 tampere univ tec...
  • 2 篇 sandbridge techn...
  • 2 篇 rhein westfal th...

作者

  • 6 篇 pimentel andy d.
  • 6 篇 hamalainen timo ...
  • 5 篇 catthoor francky
  • 5 篇 vassiliadis stam...
  • 4 篇 thompson mark
  • 4 篇 berekovic mladen
  • 4 篇 polstra simon
  • 4 篇 takala jarmo
  • 4 篇 hannikainen mark...
  • 3 篇 erbas cagkan
  • 3 篇 dutt nikil
  • 3 篇 blume holger
  • 3 篇 kohvakka mikko
  • 3 篇 bertels koen
  • 3 篇 vassiliadis s
  • 2 篇 salminen erno
  • 2 篇 herber paula
  • 2 篇 gurun selim
  • 2 篇 wong stephan
  • 2 篇 jhon chu shik

语言

  • 360 篇 英文
  • 1 篇 中文
检索条件"任意字段=6th International Workshop on Embedded Computer Systems - Architectures, Modeling and Simulation"
361 条 记 录,以下是21-30 订阅
排序:
Relaxed Subgraph Execution Model for the throughput Evaluation of IBSDF Graphs  17
Relaxed Subgraph Execution Model for the Throughput Evaluati...
收藏 引用
17th Annual international Conference on embedded computer systems - architectures, modeling, and simulation (SAMOS)
作者: Deroui, Hamza Desnos, Karol Nezan, Jean-Francois Munier-Kordon, Alix IETR INSA Rennes CNRS UMR 6164 Rennes France Sorbonne Univ UPMC UMR 7606 LIP6 Paris France
the Interface-Based Synchronous Dataflow (IBSDF) Model of Computation (MoC) is a hierarchical extension of the well-known Synchronous Dataflow (SDF) MoC. the IBSDF model extends the semantics of the SDF model by intro... 详细信息
来源: 评论
Balanced Application-Specific Processor System for Efficient SIFT-Feature Detection  17
Balanced Application-Specific Processor System for Efficient...
收藏 引用
17th Annual international Conference on embedded computer systems - architectures, modeling, and simulation (SAMOS)
作者: Hartig, Julian Paya-Vaya, Guillermo Mentzer, Nico Blume, Holger Leibniz Univ Hannover Inst Microelect Syst Appelstr 4 D-30167 Hannover Germany
Due to its computational complexity, the Scale-Invariant Feature Transform (SIFT) algorithm poses a challenge for use in embedded applications. To meet real-time at low power, hardware acceleration is necessary. this ... 详细信息
来源: 评论
Attack modeling for system security analysis: (position paper)
Attack modeling for system security analysis: (position pape...
收藏 引用
international Conference on computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for Software-Intensive systems, ASSURE 2017, 12th workshop on Dependable embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of System Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Altawairqi, Abdullah Maarek, Manuel Heriot-Watt University Edinburgh United Kingdom
Approaches to the safety analysis of software-intensive systems are being adapted to also provide security assurance. Extensions have been proposed to reflect the specific nature of security analysis by introducing in... 详细信息
来源: 评论
System-Level Design and Virtual Prototyping of a Telecommunication Application on a NUMA Platform
System-Level Design and Virtual Prototyping of a Telecommuni...
收藏 引用
international workshop on Reconfigurable Communication-Centric systems-on-Chip (ReCoSoC)
作者: Daniela Genius Ludovic Apvrille LIP6 Sorbonne Université LTCI Université Paris-Saclay
the use of model-driven approaches for embedded system design has become a common practice. Among these model-driven approaches, only a few of them include the generation of a full-system simulation comprising operati... 详细信息
来源: 评论
A survey of hardware technologies for mixed-critical integration explored in the project EMC2
A survey of hardware technologies for mixed-critical integra...
收藏 引用
international Conference on computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for Software-Intensive systems, ASSURE 2017, 12th workshop on Dependable embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of System Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Isakovic, Haris Grosu, Radu Ratasich, Denise Kadlec, Jiri Pohl, Zdenek Kerrison, Steve Georgiou, Kyriakos Eder, Kerstin Druml, Norbert Tadros, Lillian Christensen, Flemming Wheatley, Emilie Farkas, Bastian Meyer, Rolf Berekovic, Mladen Institute of Computer Engineering Vienna University of Technology Vienna Austria Institute of Information Theory and Automation Prag Czech Republic Department of Computer Science University of Bristol Bristol United Kingdom Infineon Technologies Austria AG Graz Austria Technische Universität Dortmund Dotrmund Germany Sundance Multiprocessor Technology Chesham United Kingdom Technische Universität Braunschweig Braunschweig Germany
In the sandbox world of cyber-physical systems and internet-of-things a number of applications is only eclipsed by a number of products that provide solutions for specific problem or set of problems. Initiatives like ... 详细信息
来源: 评论
Closed-Loop verification approach for the identification of motion-based action potentials in neural bundles using a continuous symbiotic system  6
Closed-Loop verification approach for the identification of ...
收藏 引用
6th international workshop on Innovative simulation for Health Care, IWISH 2017
作者: Klinger, Volkhard Bohlmann, Sebastian Department of Embedded Systems University of Applied Science Hannover HannoverD-30173 Germany Institute of Applied Mathematics Gottfried Wilhelm Leibniz University HannoverD-30167 Germany
the identification and the corresponding verification of motion- A nd sensory feedback-based action potentials in peripheral nerves are prerequisites for applications like prosthesis control or limb stimulation in med... 详细信息
来源: 评论
Safe implementation of mixed-criticality applications in multicore platforms: A model-based design approach
Safe implementation of mixed-criticality applications in mul...
收藏 引用
international Conference on computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for Software-Intensive systems, ASSURE 2017, 12th workshop on Dependable embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of System Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Antonante, Pasquale Valverde-Alcalá, Juan Basagiannis, Stylianos Di Natale, Marco United Technologies Research Center Cork Ireland Scuola Superiore Sant’Anna Pisa Italy
Application complexity in safety-critical systems is currently creating an immediate need to employ new model-based approaches to ensure system’s safe operation in high performances. At the same time, hardware evolut... 详细信息
来源: 评论
Fast estimation of privacy risk in human mobility data
Fast estimation of privacy risk in human mobility data
收藏 引用
international Conference on computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for Software-Intensive systems, ASSURE 2017, 12th workshop on Dependable embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of System Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Pellungrini, Roberto Pappalardo, Luca Pratesi, Francesca Monreale, Anna Department of Computer Science University of Pisa Pisa Italy ISTI-CNR Pisa Italy
Mobility data are an important proxy to understand the patterns of human movements, develop analytical services and design models for simulation and prediction of human dynamics. Unfortunately mobility data are also v... 详细信息
来源: 评论
Digital Proceedings of the 24th EG-ICE international workshop on Intelligent Computing in Engineering 2017
Digital Proceedings of the 24th EG-ICE International Worksho...
收藏 引用
24th EG-ICE international workshop on Intelligent Computing in Engineering 2017
the proceedings contain 34 papers. the topics discussed include: impact of zoning strategies for building performance simulation;towards energy efficient operational patterns in air handling units in highly sensed bui...
来源: 评论
ExplicitCase: Integrated model-based development of system and safety cases
ExplicitCase: Integrated model-based development of system a...
收藏 引用
international Conference on computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th international workshop on Assurance Cases for Software-Intensive systems, ASSURE 2017, 12th workshop on Dependable embedded and Cyber-physical systems and systems-of systems, DECSoS 2017, 6th international workshop on Next Generation of System Assurance Approaches for Safety Critical systems, SASSUR 2017, 3rd international workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd international workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Cârlan, Carmen Barner, Simon Diewald, Alexander Tsalidis, Alexandros Voss, Sebastian fortiss GmbH Munich Germany
Tools for creating safety cases currently on the market target safety experts, whose main concern is the management of safety cases. However, for safety assurance, safety experts should collaborate with technical expe... 详细信息
来源: 评论