搜索结果: 1-15 共查到“计算机科学技术 embedded”相关记录19条 . 查询时间(0.107 秒)
2017国际华人交互大会工作坊八:《举重若轻—嵌入式产品体验设计》(Workshop 8:Embedded Product Experience Design)
2017 国际华人 交互大会 工作坊 八 举重若轻 嵌入式产品体验设计
2017/5/23
在移动产品类型中,基于WebView框架下开发的H5轻应用甚至各类小程序大量出现在日常生活中,它们轻简,免安装,易于分享,迭代速度快,占用空间小,但完全可以满足用户的场景需求,甚至替代了原生的应用程序,我们将这类产品叫做嵌入式产品。嵌入式产品的体验层级,信息规模,界面规范,都要受到所属大产品和平台的深刻影响乃至约束,如何把握设计尺度并反哺平台体验称得上是举重若轻,在这种要求下,进一步探讨平台基础能...
2017第12届IEEE国际工业嵌入式系统研讨会(2017 12th IEEE International Symposium on Industrial Embedded Systems)
2017 第12届 IEEE 国际工业 嵌入式系统 研讨会
2017/5/22
Application domains have had a considerable impact on the evolution of embedded systems, in terms of required methodologies and supporting tools and resulting technologies. SoCs are making inroads in ...
2017IEEE实时嵌入式技术与应用研讨会(2017 IEEE Real-Time and Embedded Technology and Applications Symposium) (RTAS)
实时嵌入式技术与应用 研讨会
2017/3/27
RTAS’17, the 23rd in a series of annual conferences sponsored by the IEEE, will be held in Pittsburgh, PA, USA, as part of the Cyber-Physical Systems Week (CPSWeek) in April, 2017. CPS Week 2017 will ...
2017普适和嵌入式计算国际会议(2017 International Conference on Pervasive and Embedded Computing)
普适和嵌入式计算国际 会议
2017/3/21
Pervasive and embedded computing is a paradigm that aims at providing trustworthy computing techniques, technologies and services with high availability and ubiquously. This entails the need for an in...
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Physical Security Small Embedded Devices COMP128-1 Implementations SIM Cards
2016/1/23
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
CVXGEN: A Code Generator for Embedded Convex Optimization
Convex optimization Code generation Embedded optimization
2015/8/7
CVXGEN is a software tool that takes a high level description of a convex optimization problem family, and automatically generates custom C code that compiles into a reliable, high speed solver for th...
Code generation for embedded second-order cone programming
The validation code convex optimization embedded applications the second-order cone programming
2015/8/7
This paper describes a framework for generating easily verifiable code to solve convex optimization problems in embedded applications by transforming them into equivalent second-order cone programs. I...
ECOS: An SOCP solver for embedded systems
Embedded cone solver second-order cone programming solver embedded applications
2015/8/7
In this paper, we describe the embedded conic solver (ECOS), an interior-point solver for second-order cone programming (SOCP) designed specifically for embedded applications. ECOS is written in low f...
Unstructured Algorithms for Inviscid and Viscous Flows Embedded in a Unified Solver Architecture: Flo3xx
Unstructured Algorithms Inviscid Viscous Flows Embedded Unifi ed Solver Architecture
2015/7/2
This paper reports recent progress towards a new platform for computational aero dynamics on arbitrary meshes, tentatively designated Flo3xx. This tool is designed for maximum flixibility to ser...
3D EM/MPM MEDICAL IMAGE SEGMENTATION USING AN FPGA EMBEDDED DESIGN IMPLEMENTATION
FPGA 3D image
2015/1/20
This thesis presents a Field Programmable Gate Array (FPGA) based embedded system which is used to achieve high speed segmentation of 3D images. Segmenta- tion is performed using Expectation-Maximizat...
Exploiting Energy Harvesting for Passive Embedded Computing Systems
Embedded Systems Energy Harvesting NFC RFID
2014/11/7
The key limitation in mobile computing systems is energy - without a stable power supply, these systems cannot process, store, or communicate data. This problem is of particular interest since the sto...
Intentional and Unintentional Side-Channels in Embedded Systems
Hardware Trojans IP Protection Physical Unconable Functions Side-Channel Analysis Watermarking
2014/11/7
Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementations that can be exploited by an attack...
Security Issues in Networked Embedded Devices
Embedded devices intelligent household networks industrial automation the traditional embedded computing
2014/11/7
Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, automobiles, health care, telephony, industrial automation, networking etc. Embedded systems are wel...
Adaptive explicitly parallel instruction computing for embedded systems
adaptive EPIC instruction synthesis dynamic reconfiguration
2009/10/29
Reconfigurable hardware offers the embedded system s the potential for significant performance improvements by providing support for application—specific operations.Adaptive Explicitly Parallel Instru...