default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2013
- Pekka Alho, Jouni Mattila:
Real-Time Service-Oriented Architectures: A Data-Centric Implementation for Distributed and Heterogeneous Robotic System. IESS 2013: 262-271 - Azzeddine Amiar, Mickaël Delahaye, Yliès Falcone, Lydie du Bousquet:
Compressing Microcontroller Execution Traces to Assist System Analysis. IESS 2013: 139-150 - Yuki Ando, Seiya Shibata, Shinya Honda, Hiroyuki Tomiyama, Hiroaki Takada:
Automated Identification of Performance Bottleneck on Embedded Systems for Design Space Exploration. IESS 2013: 171-180 - Takuya Azumi, Yasaman Samei Syahkal, Yuko Hara-Azumi, Hiroshi Oyama, Rainer Dömer:
TECSCE: HW/SW Codesign Framework for Data Parallelism Based on Software Component. IESS 2013: 1-13 - Che-Wei Chang, Rainer Dömer:
Formal Deadlock Analysis of SpecC Models Using Satisfiability Modulo Theories. IESS 2013: 116-127 - Maher Fakih, Kim Grüttner, Martin Fränzle, Achim Rettberg:
Exploiting Segregation in Bus-Based MPSoCs to Improve Scalability of Model-Checking-Based Performance Analysis for SDFAs. IESS 2013: 205-217 - Simon Gansel, Stephan Schnitzer, Frank Dürr, Kurt Rothermel, Christian Maihöfer:
Towards Virtualization Concepts for Novel Automotive HMI Systems. IESS 2013: 193-204 - Tayfun Gezgin, Stefan Henkler, Achim Rettberg, Ingo Stierand:
Contract-Based Compositional Scheduling Analysis for Evolving Systems. IESS 2013: 272-282 - Katharina Gilles, Stefan Groesbrink, Daniel Baldin, Timo Kerstan:
Proteus Hypervisor: Full Virtualization and Paravirtualization for Multi-core Embedded Systems. IESS 2013: 293-305 - Stefan Groesbrink:
On the Homogeneous Multiprocessor Virtual Machine Partitioning Problem. IESS 2013: 228-237 - André Heuer, Tobias Kaufmann, Thorsten Weyer:
Extending an IEEE 42010-Compliant Viewpoint-Based Engineering-Framework for Embedded Systems to Support Variant Management. IESS 2013: 283-292 - Kay Klobedanz, Jan Jatzkowski, Achim Rettberg, Wolfgang Müller:
Fault-Tolerant Deployment of Real-Time Software in AUTOSAR ECU Networks. IESS 2013: 238-249 - Gustavo Künzel, Jean Michel Winter, Ivan Müller, Carlos Eduardo Pereira, João Cesar Netto:
A Passive Monitoring Tool for Evaluation of Routing in WirelessHART Networks. IESS 2013: 159-170 - Truong Giang Le, Dmitriy Fedosov, Olivier Hermant, Matthieu Manceny, Renaud Pawlak, Renaud Rioboo:
Programming Robots with Events. IESS 2013: 14-25 - Gang Li, Søren Top:
I/O Sharing in a Multi-core Kernel for Mixed-Criticality Applications. IESS 2013: 331-342 - Sunil Malipatlolla, Ingo Stierand:
Evaluating the Impact of Integrating a Security Module on the Real-Time Properties of a System. IESS 2013: 343-352 - Artur Mariano, Dongwook Lee, Andreas Gerstlauer, Derek Chiou:
Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation. IESS 2013: 151-158 - Dirk Nowotka, Johannes Traub:
Formal Verification of Concurrent Embedded Software. IESS 2013: 218-227 - Markus Oertel, Achim Rettberg:
Reducing Re-verification Effort by Requirement-Based Change Management. IESS 2013: 104-115 - Rafael Baldiati Parizi, Ronaldo Rodrigues Ferreira, Luigi Carro, Álvaro F. Moreira:
Compiler Optimizations Do Impact the Reliability of Control-Flow Radiation Hardened Embedded Software. IESS 2013: 49-60 - Marcel Pockrandt, Paula Herber, Verena Klös, Sabine Glesner:
Model Checking Memory-Related Properties of Hardware/Software Co-designs. IESS 2013: 92-103 - Philipp Reinkemeier, Ingo Stierand:
Compositional Timing Analysis of Real-Time Systems Based on Resource Segregation Abstraction. IESS 2013: 181-192 - Douglas P. B. Renaux, Fabiana Pöttker:
Power Reduction in Embedded Systems Using a Design Methodology Based on Synchronous Finite State Machines. IESS 2013: 61-72 - Bruno Dal Bó Silva, Marcelo Götz:
A Structural Parametric Binaural 3D Sound Implementation Using Open Hardware. IESS 2013: 306-317 - Marcela Simková, Zdenek Prikryl, Zdenek Kotásek, Tomas Hruska:
Automated Functional Verification of Application Specific Instruction-set Processors. IESS 2013: 128-138 - Leonardo Steinfeld, Marcus Ritt, Fernando Silveira, Luigi Carro:
Low-Power Processors Require Effective Memory Partitioning. IESS 2013: 73-81 - Kiyofumi Tanaka:
Adaptive Total Bandwidth Server: Using Predictive Execution Time. IESS 2013: 250-261 - Frank Sill Torres:
Enhancement of System-Lifetime by Alternating Module Activation. IESS 2013: 82-91 - Marco A. Wehrmeister, Gian Ricardo Berkenbrock:
Automatic Execution of Test Cases on UML Models of Embedded Systems. IESS 2013: 39-48 - Zhenkai Zhang, Xenofon D. Koutsoukos:
Modeling Time-Triggered Ethernet in SystemC/TLM for Virtual Prototyping of Cyber-Physical Systems. IESS 2013: 318-330
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-03 10:55 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint