Acceso abierto

Research on Storage Structure Design and Performance Optimization Strategy of Embedded System for Low-Capacity Storage Units

 y   
04 oct 2024

Cite
Descargar portada

Meribout, M., Baobaid, A., Khaoua, M. O., Tiwari, V. K., & Pena, J. P. (2022). State of art IoT and Edge embedded systems for real-time machine vision applications. IEEE Access, 10, 58287-58301. Search in Google Scholar

Nicolescu, G., & Mosterman, P. J. (2018). Model-based design for embedded systems. Crc Press. Search in Google Scholar

Marwedel, P. (2021). Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things (p. 433). Springer Nature. Search in Google Scholar

Eceiza, M., Flores, J. L., & Iturbe, M. (2021). Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems. IEEE Internet of Things Journal, 8(13), 10390-10411. Search in Google Scholar

Amrouch, H., Krishnamurthy, P., Patel, N., Henkel, J., Karri, R., & Khorrami, F. (2017, October). Emerging (un-) reliability based security threats and mitigations for embedded systems: Special session. In Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion (pp. 1-10). Search in Google Scholar

Pimentel, A. D. (2020). A case for security-aware design-space exploration of embedded systems. Journal of Low Power Electronics and Applications, 10(3), 22. Search in Google Scholar

ALshukri, D., Sumesh, E. P., & Krishnan, P. (2019, January). Intelligent border security intrusion detection using IoT and embedded systems. In 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC) (pp. 1-3). IEEE. Search in Google Scholar

Ali, S., Al Balushi, T., Nadir, Z., Hussain, O. K., Ali, S., Al Balushi, T., ... & Hussain, O. K. (2018). Embedded systems security for cyber-physical systems. Cyber Security for Cyber Physical Systems, 115-140. Search in Google Scholar

Gorospe, J., Mulero, R., Arbelaitz, O., Muguerza, J., & Antón, M. Á. (2021). A generalization performance study using deep learning networks in embedded systems. Sensors, 21(4), 1031. Search in Google Scholar

Cassimon, A., Vanneste, S., Bosmans, S., Mercelis, S., & Hellinckx, P. (2020). Designing resource-constrained neural networks using neural architecture search targeting embedded devices. Internet of Things, 12, 100234. Search in Google Scholar

THATI, V., Vankeirsbilck, J., Boydens, J., & Pissoort, D. (2017). Data error detection and recovery in embedded systems: a literature review. Advances in Science, Technology and Engineering Systems Journal, 2(3), 623-633. Search in Google Scholar

Colin, A., Ruppel, E., & Lucia, B. (2018, March). A reconfigurable energy storage architecture for energy-harvesting devices. In Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 767-781). Search in Google Scholar

Paulino, N., Ferreira, J. C., & Cardoso, J. M. (2020). Improving performance and energy consumption in embedded systems via binary acceleration: A survey. ACM Computing Surveys (CSUR), 53(1), 1-36. Search in Google Scholar

Verschueren, R., Frison, G., Kouzoupis, D., Frey, J., Duijkeren, N. V., Zanelli, A., ... & Diehl, M. (2022). acados—a modular open-source framework for fast embedded optimal control. Mathematical Programming Computation, 14(1), 147-183. Search in Google Scholar

Paolo Bernardi,Augusto Maria Guerriero,Giorgio Insinga,Giovanni Paganini,Giambattista Carnevale, Matteo Coppetta... & Rudolf Ullmann. (2024). Built-In Self-Test Architecture Enabling Diagnosis for Massive Embedded Memory Banks in Large SoCs. Electronics(2). Search in Google Scholar

Qiang Hao,Dongdong Xu,Yusen Qin,Ruyin Li,Zongxuan Zhang,Yunyan You & Xiang Wang. (2024). A Hardware Security Protection Method for Conditional Branches of Embedded Systems. Micromachines(6), 760-760. Search in Google Scholar

XuHao Chen,Li Shen,ZhiYing Wang,Zhong Zheng & Wei Chen. (2014). Binary compatibility for embedded systems using greedy subgraph mapping. Science China Information Sciences(7),1-16. Search in Google Scholar

Tomar V.K. & Sachdeva Ashish. (2022). Design of a soft error hardened SRAM cell with improved access time for embedded systems. Microprocessors and Microsystems. Search in Google Scholar