


default search action
13th SIES 2018: Graz, Austria
- 13th IEEE International Symposium on Industrial Embedded Systems, SIES 2018, Graz, Austria, June 6-8, 2018. IEEE 2018, ISBN 978-1-5386-4155-2

- Tristan Fautrel, Laurent George

, Joël Goossens, Damien Masson, Paul Rodríguez:
APractical Sub-Optimal Solution for the Dual Priority Scheduling Problem. 1-10 - Qingqiang He

, Nan Guan
, Mingsong Lv
, Wang Yi:
On the Consensus Mechanisms of Blockchain/DLT for Internet of Things. 1-10 - Johannes Schlatow

, Mischa Möstl
, Sebastian Tobuschat, Tasuku Ishigooka, Rolf Ernst:
Data-Age Analysis and Optimisation for Cause-Effect Chains in Automotive Control Systems. 1-9 - Daniele Fontanelli

, Luigi Palopoli:
On Soft Real-Time Implementation of LQG Controllers. 1-8 - Philipp Jungklass, Mladen Berekovic

:
Effects of Concurrent Access to Embedded Multicore Microcontrollers with Hard Real-Time Demands. 1-9 - Anaïs Finzi, Ahlem Mifdaoui

, Fabrice Frances, Emmanuel Lochin
:
Network Calculus-based Timing Analysis of AFDX networks with Strict Priority and TSN/BLS Shapers. 1-10 - Thorsten Schulz, Caspar Gries, Frank Golatowski

, Dirk Timmermann
:
Strategy for Security Certification of High Assurance Industrial Automation and Control Systems. 1-4 - Saverio Iacovelli, Raimund Kirner

, Catherine Menon
:
ATMP: An Adaptive Tolerance-based Mixed-criticality Protocol for Multi-core Systems. 1-9 - Ahmet Batur, Ece Guran Schmidt

, Klaus Werner Schmidt:
Computation of Response Time Distributions for Messages on the Controller Area Network. 1-10 - Heather King, Keith E. Nolan, Mark Y. Kelly:

Interoperability Between DSRC and LTE for VANETs. 1-8 - Rathinamala Vijay, Harshpal Singh, T. V. Prabhakar, Vinod Hegde, Pavan Shigehalli:

Air Cargo Monitoring: A Robust Tamper Detection and Reliable Communication System. 1-4 - Imanol Mugarza, Jorge Parra

, Eduardo Jacob
:
Cetratus: Towards a live patching supported runtime for mixed-criticality safe and secure systems. 1-8 - Fabian Mauroner, Marcel Baunach:

EventQueue: An Event based and Priority aware Interprocess Communication for Embedded Systems. 1-7 - Alexander Menshchikov

, Andrey Somov:
Mixed Reality Glasses: Low-Power IoT System for Digital Augmentation of Video Stream in Visual Recognition Applications. 1-8 - Caroline Brandberg, Marco Di Natale:

A SimEvents Model for the Analysis of Scheduling and Memory Access Delays in Multicores. 1-10 - Max J. Friese, Thorsten Ehlers, Dirk Nowotka

:
Estimating Latencies of Task Sequences in Multi-Core Automotive ECUs. 1-10 - Birte Friesel

, Markus Buschhoff, Olaf Spinczyk:
Parameter-Aware Energy Models for Embedded-System Peripherals. 1-4 - Julian Vetter, Jeremy Fanguede, Kevin Chappuis, Daniel Raho:

VOSYSVirtualNet: Low-latency Inter-world Network Channel for Mixed-Criticality Systems. 1-9 - Manos Koutsoubelias, Spyros Lalis

:
Fault- Tolerance Support for Mobile Robotic Applications. 1-10 - Filip Markovic, Jan Carlson, Radu Dobrin, Björn Lisper, Abhilash Thekkilakattil:

Probabilistic Response Time Analysis for Fixed Preemption Point Selection. 1-10 - Christian Fibich

, Stefan Tauner, Peter Rössler, Martin Horauer, Herbert Taucher, Martin Matschnig:
Preliminary Evaluation of High-level Synthesis Tools - Xilinx Vivado and PandA Bambu. 1-4 - Alá F. Khalifeh

, Dhiah el Diehn I. Abou-Tair
, Sahel Alouneh
, Roman Obermaisser, Michael Schmidt:
Admission Control and Resource Allocation for Distributed Services in System-of-Systems: Challenges and Potential Solutions. 1-4 - Mohammed Abuteir, Zaher Owda, Hamidreza Ahmadian, Roman Obermaisser:

Simulation Model and Environment for Mixed-Criticality Networked Multi-Core Chips. 1-8 - Kai Beckman, Jonas Reininger:

Adaptation of the DDS Security Standard for Resource-Constrained Sensor Networks. 1-4 - Amer Kajmakovic, Robert Zupanc, Simon Mayer, Nermin Kajtazovic, Martin Höffernig, Herwig Vogl:

Predictive Fail-Safe Improving the Safety of Industrial Environments through Model-based Analytics on hidden Data Sources. 1-4 - Boguslaw Jablkowski, Michael Müller, Olaf Spinczyk:

High Availability in Cyber-physical Systems by Self-determined Virtual Machine Replication. 1-10 - Thomas Ulz, Thomas Pieber, Christian Steger, Andrea Höller, Sarah Haas, Rainer Matischek:

Automated Authentication Credential Derivation for the Secured Configuration of IoT Devices. 1-8 - Andreas Rechberger, Eugen Brenner:

Generalized Execution Time Estimation. 1-4 - Petar Jokic

, Stéphane Emery
, Luca Benini
:
BinaryEye: A 20 kfps Streaming Camera System on FPGA with Real-Time On-Device Image Recognition Using Binary Neural Networks. 1-7 - Georgios Vrettos, Evangelos Logaras, Emmanouil Kalligeros:

Towards Standardization of MQTT-Alert-based Sensor Networks: Protocol Structures Formalization and Low-End Node Security. 1-4 - Oh-Chul Kwon, Wonjae Jang, Giyeon Kim, Chang-Gun Lee:

Accurate Thermal Prediction for NANS (N-App N-Screen) Services on a Smart Phone. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














