default search action
16th EMSOFT 2016: Pittsburgh, Pennsylvania, USA
- Petru Eles, Rahul Mangharam:
2016 International Conference on Embedded Software, EMSOFT 2016, Pittsburgh, Pennsylvania, USA, October 1-7, 2016. ACM 2016, ISBN 978-1-4503-4485-2 - Jia Jie Wang, Partha S. Roop, Alain Girault:
Energy and timing aware synchronous programming. 1:1-1:10 - Guy Martin Tchamgoue, Sebastian Fischmeister:
Lessons learned on assumptions and scalability with time-aware instrumentation. 2:1-2:7 - Arnd Hartmanns, Holger Hermanns, Michael Bungert:
Flexible support for time and costs in scenario-aware dataflow. 3:1-3:10 - Hyon-Young Choi, Andrew L. King, Insup Lee:
Making DDS really real-time with openflow. 4:1-4:10 - Yuya Maruyama, Shinpei Kato, Takuya Azumi:
Exploring the performance of ROS2. 5:1-5:10 - Chuchu Fan, James Kapinski, Xiaoqing Jin, Sayan Mitra:
Locally optimal reach set over-approximation for nonlinear systems. 6:1-6:10 - Ayca Balkan, Paulo Tabuada, Jyotirmoy V. Deshmukh, Xiaoqing Jin, James Kapinski:
Underminer: a framework for automatically identifying non-converging behaviors in black box system models. 7:1-7:10 - Hadi Ravanbakhsh, Sriram Sankaranarayanan:
Robust controller synthesis of switched systems using counterexample guided framework. 8:1-8:10 - Pavithra Prabhakar, Miriam Garcia Soto:
An algorithmic approach to global asymptotic stability verification of hybrid systems. 9:1-9:10 - Stanley Bak, Sagar Chaki:
Verifying cyber-physical systems by combining software model checking with hybrid systems reachability. 10:1-10:10 - Xia Zeng, Wang Lin, Zhengfeng Yang, Xin Chen, Lilei Wang:
Darboux-type barrier certificates for safety verification of nonlinear hybrid systems. 11:1-11:10 - Michael Drescher, Vincent Legout, Antonio Barbalace, Binoy Ravindran:
A flattened hierarchical scheduler for real-time virtualization. 12:1-12:10 - Jinsu Park, Eunbi Cho, Woongki Baek:
RMC: an integrated runtime system for adaptive many-core computing. 13:1-13:10 - Merten Popp, Orlando Moreira, Wim Yedema, Menno Lindwer:
Automatic HAL generation for embedded multiprocessor systems. 14:1-14:10 - Hyoseung Kim, Ragunathan Rajkumar:
Real-time cache management for multi-core virtualization. 15:1-15:10 - Zhenkai Zhang, Xenofon D. Koutsoukos:
Cache-related preemption delay analysis for multi-level inclusive caches. 16:1-16:10 - Daniel Ricketts, Gregory Malecha, Sorin Lerner:
Modular deductive verification of sampled-data systems. 17:1-17:10 - BaekGyu Kim, Akshay Jarandikar, Jonathan Shum, Shinichi Shiraishi, Masahiro Yamaura:
The SMT-based automatic road network generation in vehicle simulation environment. 18:1-18:10 - Jiaqi Tan, Hui Jun Tay, Utsav Drolia, Rajeev Gandhi, Priya Narasimhan:
PCFIRE: towards provable <u>p</u>reventative <u>c</u>ontrol-<u>f</u>low <u>i</u>ntegrity enforcement for <u>r</u>ealistic <u>e</u>mbedded software. 19:1-19:10 - Joost P. H. M. Hausmans, Marco Jan Gerrit Bekooij:
A refinement theory for timed-dataflow analysis with support for reordering. 20:1-20:10 - Cheng Ji, Chao Wu, Li-Pin Chang, Liang Shi, Chun Jason Xue:
I/O scheduling with mapping cache awareness for flash based storage systems. 21:1-21:10 - Xianzhang Chen, Edwin Hsing-Mean Sha, Weiwen Jiang, Qingfeng Zhuge, Junxi Chen, Jiejie Qin, Yuansong Zeng:
The design of an efficient swap mechanism for hybrid DRAM-NVM systems. 22:1-22:10 - Biswajit Mazumder, Jason O. Hallstrom:
A fast, lightweight, and reliable file system for wireless sensor networks. 23:1-23:10 - Sanjoy K. Baruah:
Schedulability analysis of mixed-criticality systems with multiple frequency specifications. 24:1-24:10 - Biao Hu, Kai Huang, Pengcheng Huang, Lothar Thiele, Alois C. Knoll:
On-the-fly fast overrun budgeting for mixed-criticality systems. 25:1-25:10 - Guy Avni, Shibashis Guha, Guillermo Rodríguez-Navas:
Synthesizing time-triggered schedules for switched networks with faulty links. 26:1-26:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.