


default search action
International Journal of Embedded Systems, Volume 10
Volume 10, Number 1, 2018
- Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi:

A language-based intrusion detection approach for automotive embedded networks. 1-12 - Zhimin Liu, Weijia Jia, Guojun Wang:

Area coverage estimation model for directional sensor networks. 13-21 - Ryutaro Doi, Masanori Hashimoto, Takao Onoye:

An analytic evaluation on soft error immunity enhancement due to temporal triplication. 22-31 - Yadong Wan, Xinqiang Luo, Yue Qi, Jie He, Qin Wang:

Access-driven cache attack resistant and fast AES implementation. 32-40 - Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir, Rabah Attia:

A modified Q-learning algorithm to solve cognitive radio jamming attack. 41-51 - Shuguang Dai, Zhengjun Jiang, Fangguo Zhang:

Efficient leakage-resilient blind and partially blind signatures. 52-61 - Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu:

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption. 62-70 - Sourour Trab, Eddy Bajic, Ahmed Zouinkhi

, Mohamed Naceur Abdelkrim, Hassen Chekir:
RFID IoT-enabled warehouse for safety management using product class-based storage and potential fields methods. 71-88
Volume 10, Number 2, 2018
- Hsung-Pin Chang, Tsung-Yu Yeh:

An autonomous fault resistant system for mission-critical embedded sensor nodes. 89-103 - Shuanggen Liu, Guanglu Qi, Xu An Wang

:
Fast elliptic curve algorithm using deformed Fibonacci-type series. 104-112 - Lili Pan, Tiane Wang, Jiaohua Qin, Xuyu Xiang:

A dynamic test prioritisation based on DU-chain coverage for regression testing. 113-119 - Jianming Zhang, Qianqian Huang, Honglin Wu, Yangchun Liu:

Effective traffic signs recognition via kernel PCA network. 120-125 - Qiuhui Zhu, Min Zhu, Mingzhao Li, Min Fu, Zhibiao Huang, Qihong Gan, Zhenghao Zhou:

Transportation modes behaviour analysis based on raw GPS dataset. 126-136 - Hyoungjong Kim, Jaehyeon Jang, Moonju Park:

Dynamic frequency scaling for embedded systems with memory intensive applications. 137-147 - Mokhtar Aboelaze, Mohamed Ghazy Shehata, Sumaia Atiwa:

A hardware in the loop emulator for a satellite control system. 148-160 - Lin Guo, Zhigang Chen, Ling Huang:

A novel cognitive radio spectrum allocation scheme with chaotic gravitational search algorithm. 161-167 - He Yu, Guihe Qin, Minghui Sun, Xin Yan, Xing-chen Wu:

A study of IP-based vehicular gateway with IPv6. 168-179
Volume 10, Number 3, 2018
- Lingzhi Yang, Xiaojuan Ban, Yitong Li, Guang Yang:

Multiple features fusion for facial expression recognition based on ELM. 181-187 - Huyin Zhang, Kan Wang:

Research of dynamic load balancing based on stimulated annealing algorithm. 188-195 - Yanqin Chen, Wenying Zhang:

Differential-linear cryptanalysis of SIMON32/64. 196-202 - Kamil Kluczniak, Lucjan Hanzlik, Jianfeng Wang:

Efficient VLR group signatures for smart cards. 203-216 - Long Gao, Jianping Yin, En Zhu, Tianhang Liu, Wei Chen, Minghui Qiu:

Mechanical amelioration to improve hexapod robot speed. 217-224 - Guangfu Wu, Keke Wang, Jinjun Zhang, Jiguang He

:
A lightweight and efficient encryption scheme based on LFSR. 225-232 - Li Di, Zheng Zheng, Song Wang, Ruidong Zhang, Min Xia, Kai Hu:

Electric power communication bandwidth prediction based on adaptive extreme learning machine. 233-240 - Yunlong Wang, Zhili Zhou:

Spatial descriptor embedding for near-duplicate image retrieval. 241-247 - Qi Liu, Shengjun Li, Xiaodong Liu, Nigel Linge:

A method for electric load data verification and repair in home environment. 248-256
Volume 10, Number 4, 2018
- Maheswari Arumugam, Arun Kumar Sangaiah:

An intelligent paradigm for denoising motion artefacts in ECG preprocessing: smart filters. 260-272 - Vaishali R. Thakare, John Singh K:

An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing. 273-286 - P. G. Shynu, John Singh K:

Privacy preserving secret key extraction protocol for multi-authority attribute-based encryption techniques in cloud computing. 287-300 - Xiupeng Chen, Rongzeng Mu, Yuepeng Yan:

Automated identification of callbacks in Android framework using machine learning techniques. 301-312 - Yameng Li, Jingsha He, Na Huang, Gongzheng Liu:

Recovering multiple versions of YAFFS2 files based on Hash and timestamps. 313-322 - Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh:

A framework and a process for digital forensic analysis on smart phones with multiple data logs. 323-333 - Sudha Narendrakumar, Abdul Razaque

, Varil Patel, Muder Almiani, Syed Rizvi, Akshat Hans:
Token security for internet of things. 334-343
Volume 10, Number 5, 2018
- Yongxing Liu, Kenli Li, Zhuo Tang, Keqin Li:

Energy aware list-based scheduling for parallel applications in cloud. 345-355 - Zhenxing Xu, Ling Chen, Haodong Guo, Mingqi Lv, Gencai Chen:

User similarity-based gender-aware travel location recommendation by mining geotagged photos. 356-365 - Alessandro Cilardo, Nicola Mazzocca, Paolo Prinetto:

An abstraction layer enabling pervasive hardware-reconfigurable systems. 366-377 - Chaokun Yan, Huimin Luo, Zhigang Hu:

Scheduling deadline-constrained scientific workflow using chemical reaction optimisation algorithm in clouds. 378-393 - Rasmus Ulslev Pedersen, Martin Schoeberl:

Direct garbage collection: two-fold speedup for managed language embedded systems. 394-405 - Nour El-Houda Benalia, Noureddine Djedi, Salim Bitam, Nesrine Ouannes, Yves Duthen:

An improved CUDA-based hybrid metaheuristic for fast controller of an evolutionary robot. 406-422 - Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:

Static compliance checking beyond separation of duty constraints. 423-436 - ShanGuo Lv, YiQin Cao:

An algorithm of video network transmission based on unbalanced multiple description coding. 437-444
Volume 10, Number 6, 2018
- Yingwei Yan, Yu Du, Wenan Zhou:

Study on the local path planning for intelligent vehicles based on an improved VFH method. 445-452 - Salim Djaaboub, Elhillali Kerkouche, Allaoua Chaoui:

Generating verifiable LOTOS specifications from UML models: a graph transformation-based approach. 453-469 - Yunn-Lin Hwang, Thi-Na Ta, Kun-Nan Chen:

Using zero moment point preview control formulation to generate nonlinear trajectories of walking patterns on humanoid robots. 470-483 - Xuehui Wu, Xiaobo Lu, Xue Han, Chunxue Liu:

An adaptive denoising method for colour images of mobile phone based on bivariate shrinkage function. 484-493 - Mohammad Fraiwan, Ahmad Alsaleem, Hashem Abandeh, Omar M. Al-Jarrah:

A system for application development using aerial robots. 494-502 - Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Brij B. Gupta:

Petri net-based verification of security protocol implementation in software evolution. 503-517 - Jieren Cheng, Boyi Liu, Xiangyan Tang, Zhuhua Hu, Jianping Yin:

Traffic flow detection method based on vertical virtual road induction line. 518-525 - Yali Chen, Kaixin Ren, Naijie Gu:

Router-shared-pair mesh: a reconfigurable fault-tolerant network-on-chip architecture. 526-536 - Mahmoud Naghibzadeh:

Handling startling circumstances with IRM scheduler of real-time systems. 537-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














