Browse All Reviews
Computer Systems Organization (C)
Special-Purpose And Application-Based Systems (C.3)
> Real-Time And Embedded Systems (C.3...)
All Media Types
1-10 of 368 Reviews about "
Real-Time And Embedded Systems (C.3...)
Simplicity is best: addressing the computational cost of machine learning classifiers in constrained edge devices
Gómez-Carmona O., Casado-Mansilla D., López-de-Ipiña D., García-Zubia J. IoT 2019 (Proceedings of the 9th International Conference on the Internet of Things, Bilbao, Spain, Oct 22-25, 2019) 1-8, 2019. Type: Proceedings
Implementing data processing toward the edge of the Internet of Things (IoT) is an important requirement in order to produce real-time feedback according to some decision-based approach....
Jul 7 2021
Dependable visual light-based indoor localization with automatic anomaly detection for location-based service of mobile cyber-physical systems
Liu Y., Chen X., Kadambi D., Bari A., Li X., Hu S., Zhou P. ACM Transactions on Cyber-Physical Systems 3(1): 1-17, 2018. Type: Article
Indoor localization for mobile devices can employ beacons inserted in known positions in the environment. Light-emitting diodes (LEDs) are becoming popular beacons because of their simplicity; however, using the light for localization presents pro...
Jul 2 2021
Distributed real-time systems: theory and practice
Erciyes K., Springer Publishing Company, Incorporated, New York, NY, 2019. 341 pp. Type: Book (978-3-030225-69-8)
This textbook summarizes contemporary knowledge and paradigms of real-time systems in a monographic way. It fits an undergraduate-level course since it starts with basic hardware and low-level real-time system characteristics....
Jun 18 2021
A survey on gait recognition
Wan C., Wang L., Phoha V. ACM Computing Surveys 51(5): 1-35, 2018. Type: Article
Gait recognition is a biometric method that uses sensor data to recognize people based on body shape and walking styles. Gait data is acquired from video images, inertial sensors, or sensors in the environment. The possible uses are diagnostic, bu...
Jun 8 2021
SOD: making smartphone smart on demand with radio interface management
Brocanelli M., Wang X. ACM Transactions on Autonomous and Adaptive Systems 13(3): 1-24, 2019. Type: Article
Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display, which is the most power-hungry service, all tasks related to the radio interface consume...
Apr 20 2021
Microcontroller programming and interfacing with Texas Instruments MSP430FR2433 and MSP430FR5994 (2nd ed.)
Barrett S., Pack D., Morgan&Claypool Publishers, San Rafael, CA, 2019. 584 pp. Type: Book (978-1-681736-24-2)
This book discusses programming and interfacing with two specific members of the Texas Instruments MSP430 family of mixed-signal microcontrollers, namely MSP430FR2433 and MSP430FR5994. It has 12 chapters and is part of Morgan & Claypool’...
Mar 30 2021
Bi-level thresholding: analyzing the effect of repeated errors in gesture input
Katsuragawa K., Kamal A., Liu Q., Negulescu M., Lank E. ACM Transactions on Interactive Intelligent Systems 9(2-3): 1-30, 2019. Type: Article
Ensuring a proper, easy, and convenient interface between human and machine has been one of the most challenging issues since the first machines were developed. In the beginning, when simple machines responded to direct human hand interaction with...
Mar 24 2021
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B. BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY, Nov 10, 2019) 28-29, 2019. Type: Proceedings
Sensor systems and Internet of Things (IoT) environments raise a new major challenge to security. Some of these issues can be solved with blockchain protocols, for example, distributed ledger technologies (DLTs); however, “it is still not cl...
Mar 15 2021
Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019. Type: Article
Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart risky employees...
Mar 8 2021
Orchestrating big data analysis workflows in the cloud: research challenges, survey, and future directions
Barika M., Garg S., Zomaya A., Wang L., Moorsel A., Ranjan R. ACM Computing Surveys 52(5): 1-41, 2019. Type: Article
When processing different big data workflows, many new and (so far) unknown patterns and performance requirements are visible. We are forced to search new processing models and management techniques that can support the design of different aspects...
Mar 2 2021
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.