default search action
International Journal of Embedded Systems, Volume 10
Volume 10, Number 1, 2018
- Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:
A language-based intrusion detection approach for automotive embedded networks. 1-12 - Zhimin Liu, Weijia Jia, Guojun Wang:
Area coverage estimation model for directional sensor networks. 13-21 - Ryutaro Doi, Masanori Hashimoto, Takao Onoye:
An analytic evaluation on soft error immunity enhancement due to temporal triplication. 22-31 - Yadong Wan, Xinqiang Luo, Yue Qi, Jie He, Qin Wang:
Access-driven cache attack resistant and fast AES implementation. 32-40 - Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir, Rabah Attia:
A modified Q-learning algorithm to solve cognitive radio jamming attack. 41-51 - Shuguang Dai, Zhengjun Jiang, Fangguo Zhang:
Efficient leakage-resilient blind and partially blind signatures. 52-61 - Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu:
GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption. 62-70 - Sourour Trab, Eddy Bajic, Ahmed Zouinkhi, Mohamed Naceur Abdelkrim, Hassen Chekir:
RFID IoT-enabled warehouse for safety management using product class-based storage and potential fields methods. 71-88
Volume 10, Number 2, 2018
- Hsung-Pin Chang, Tsung-Yu Yeh:
An autonomous fault resistant system for mission-critical embedded sensor nodes. 89-103 - Shuanggen Liu, Guanglu Qi, Xu An Wang:
Fast elliptic curve algorithm using deformed Fibonacci-type series. 104-112 - Lili Pan, Tiane Wang, Jiaohua Qin, Xuyu Xiang:
A dynamic test prioritisation based on DU-chain coverage for regression testing. 113-119 - Jianming Zhang, Qianqian Huang, Honglin Wu, Yangchun Liu:
Effective traffic signs recognition via kernel PCA network. 120-125 - Qiuhui Zhu, Min Zhu, Mingzhao Li, Min Fu, Zhibiao Huang, Qihong Gan, Zhenghao Zhou:
Transportation modes behaviour analysis based on raw GPS dataset. 126-136 - Hyoungjong Kim, Jaehyeon Jang, Moonju Park:
Dynamic frequency scaling for embedded systems with memory intensive applications. 137-147 - Mokhtar Aboelaze, Mohamed Ghazy Shehata, Sumaia Atiwa:
A hardware in the loop emulator for a satellite control system. 148-160 - Lin Guo, Zhigang Chen, Ling Huang:
A novel cognitive radio spectrum allocation scheme with chaotic gravitational search algorithm. 161-167 - He Yu, Guihe Qin, Minghui Sun, Xin Yan, Xing-chen Wu:
A study of IP-based vehicular gateway with IPv6. 168-179
Volume 10, Number 3, 2018
- Lingzhi Yang, Xiaojuan Ban, Yitong Li, Guang Yang:
Multiple features fusion for facial expression recognition based on ELM. 181-187 - Huyin Zhang, Kan Wang:
Research of dynamic load balancing based on stimulated annealing algorithm. 188-195 - Yanqin Chen, Wenying Zhang:
Differential-linear cryptanalysis of SIMON32/64. 196-202 - Kamil Kluczniak, Lucjan Hanzlik, Jianfeng Wang:
Efficient VLR group signatures for smart cards. 203-216 - Long Gao, Jianping Yin, En Zhu, Tianhang Liu, Wei Chen, Minghui Qiu:
Mechanical amelioration to improve hexapod robot speed. 217-224 - Guangfu Wu, Keke Wang, Jinjun Zhang, Jiguang He:
A lightweight and efficient encryption scheme based on LFSR. 225-232 - Li Di, Zheng Zheng, Song Wang, Ruidong Zhang, Min Xia, Kai Hu:
Electric power communication bandwidth prediction based on adaptive extreme learning machine. 233-240 - Yunlong Wang, Zhili Zhou:
Spatial descriptor embedding for near-duplicate image retrieval. 241-247 - Qi Liu, Shengjun Li, Xiaodong Liu, Nigel Linge:
A method for electric load data verification and repair in home environment. 248-256
Volume 10, Number 4, 2018
- Maheswari Arumugam, Arun Kumar Sangaiah:
An intelligent paradigm for denoising motion artefacts in ECG preprocessing: smart filters. 260-272 - Vaishali R. Thakare, John Singh K:
An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing. 273-286 - P. G. Shynu, John Singh K:
Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing. 287-300 - Xiupeng Chen, Rongzeng Mu, Yuepeng Yan:
Automated identification of callbacks in Android framework using machine learning techniques. 301-312 - Yameng Li, Jingsha He, Na Huang, Gongzheng Liu:
Recovering multiple versions of YAFFS2 files based on Hash and timestamps. 313-322 - Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh:
A framework and a process for digital forensic analysis on smart phones with multiple data logs. 323-333 - Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almiani, Syed Rizvi, Akshat Hans:
Token security for internet of things. 334-343
Volume 10, Number 5, 2018
- Yongxing Liu, Kenli Li, Zhuo Tang, Keqin Li:
Energy aware list-based scheduling for parallel applications in cloud. 345-355 - Zhenxing Xu, Ling Chen, Haodong Guo, Mingqi Lv, Gencai Chen:
User similarity-based gender-aware travel location recommendation by mining geotagged photos. 356-365 - Alessandro Cilardo, Nicola Mazzocca, Paolo Prinetto:
An abstraction layer enabling pervasive hardware-reconfigurable systems. 366-377 - Chaokun Yan, Huimin Luo, Zhigang Hu:
Scheduling deadline-constrained scientific workflow using chemical reaction optimisation algorithm in clouds. 378-393 - Rasmus Ulslev Pedersen, Martin Schoeberl:
Direct garbage collection: two-fold speedup for managed language embedded systems. 394-405 - Nour El-Houda Benalia, Noureddine Djedi, Salim Bitam, Nesrine Ouannes, Yves Duthen:
An improved CUDA-based hybrid metaheuristic for fast controller of an evolutionary robot. 406-422 - Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static compliance checking beyond separation of duty constraints. 423-436 - ShanGuo Lv, YiQin Cao:
An algorithm of video network transmission based on unbalanced multiple description coding. 437-444
Volume 10, Number 6, 2018
- Yingwei Yan, Yu Du, Wenan Zhou:
Study on the local path planning for intelligent vehicles based on an improved VFH method. 445-452 - Salim Djaaboub, Elhillali Kerkouche, Allaoua Chaoui:
Generating verifiable LOTOS specifications from UML models: a graph transformation-based approach. 453-469 - Yunn-Lin Hwang, Thi-Na Ta, Kun-Nan Chen:
Using zero moment point preview control formulation to generate nonlinear trajectories of walking patterns on humanoid robots. 470-483 - Xuehui Wu, Xiaobo Lu, Xue Han, Chunxue Liu:
An adaptive denoising method for colour images of mobile phone based on bivariate shrinkage function. 484-493 - Mohammad Fraiwan, Ahmad Alsaleem, Hashem Abandeh, Omar M. Al-Jarrah:
A system for application development using aerial robots. 494-502 - Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Brij B. Gupta:
Petri net-based verification of security protocol implementation in software evolution. 503-517 - Jieren Cheng, Boyi Liu, Xiangyan Tang, Zhuhua Hu, Jianping Yin:
Traffic flow detection method based on vertical virtual road induction line. 518-525 - Yali Chen, Kaixin Ren, Naijie Gu:
Router-shared-pair mesh: a reconfigurable fault-tolerant network-on-chip architecture. 526-536 - Mahmoud Naghibzadeh:
Handling startling circumstances with IRM scheduler of real-time systems. 537-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.