default search action
Michael J. Pont
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j21]Amir Muhammad, Michael J. Pont:
Improving flexibility and fault-management in CAN-based "Shared-Clock" architectures. Microprocess. Microsystems 37(1): 9-23 (2013) - 2012
- [c23]Farah N. Lakhani, Michael J. Pont:
Applying Design Patterns to Improve the Reliability of Embedded Systems through a Process of Architecture Migration. HPCC-ICESS 2012: 1563-1570 - 2011
- [j20]Amir Muhammad, Michael J. Pont:
Comments on: "Two novel shared-clock scheduling algorithms for use with 'Controller Area Network' and related protocols". Microprocess. Microsystems 35(1): 81-82 (2011) - 2010
- [c22]Kam L. Chan, Michael J. Pont:
Real-time Non-invasive Detection of Timing-constraint Violations in Time-triggered Embedded Systems. CIT 2010: 1978-1986 - [c21]Amir Muhammad, Michael J. Pont:
A Time-Triggered Communication Protocol for CAN-based Networks with a Fault-Tolerant Star Topology. CIT 2010: 2347-2354 - [c20]Farah N. Lakhani, Anjali Das, Michael J. Pont:
Improving the reliability of embedded systems as complexity increases: supporting the migration between event-triggered and time-triggered software architectures. EuroPLoP 2010: 22 - [c19]Keith Florence Athaide, Michael J. Pont:
Ameliorating problems in system integration with time-triggered scheduling. SoSE 2010: 1-6 - [c18]Farah N. Lakhani, Michael J. Pont:
Using design patterns to support migration between different system architectures. SoSE 2010: 1-6 - [c17]Amir Muhammad, Devaraj Ayavoo, Michael J. Pont:
A novel Shared-Clock scheduling protocol for fault-confinement in CAN-based distributed systems. SoSE 2010: 1-6
2000 – 2009
- 2009
- [j19]Mouaaz Nahas, Michael J. Pont, Michael Short:
Reducing message-length variations in resource-constrained embedded systems implemented using the Controller Area Network (CAN) protocol. J. Syst. Archit. 55(5-6): 344-354 (2009) - [j18]Michael J. Pont, Susan Kurian, Ricardo Bautista-Quintero:
Meeting Real-Time Constraints Using "Sandwich Delays". Trans. Pattern Lang. Program. 1: 94-102 (2009) - [c16]Anjali Das, Farah N. Lakhani, Ayman K. Gendy, Michael J. Pont:
Two Simple Patterns to Support the Development of Reliable, Real-time Embedded Systems (not submitted for proceedings). EuroPLoP 2009 - [c15]Michael J. Pont, Farah N. Lakhani, Anjali Das:
Towards a Pattern Language which Supports the Migration of Systems from an ET/P to a TTC Software Architecture. EuroPLoP 2009 - 2008
- [j17]Michael J. Pont:
Applying time-triggered architectures in reliable embedded systems: challenges and solutions. Elektrotech. Informationstechnik 125(11): 401-405 (2008) - [j16]Michael Short, Michael J. Pont:
Assessment of high-integrity embedded automotive control systems using hardware in the loop simulation. J. Syst. Softw. 81(7): 1163-1183 (2008) - [j15]Ayman K. Gendy, Michael J. Pont:
Automatically Configuring Time-Triggered Schedulers for Use With Resource-Constrained, Single-Processor Embedded Systems. IEEE Trans. Ind. Informatics 4(1): 37-46 (2008) - [j14]Ricardo Bautista-Quintero, Michael J. Pont:
Implementation of H-Infinity Control Algorithms for Sensor-Constrained Mechatronic Systems Using Low-Cost Microcontrollers. IEEE Trans. Ind. Informatics 4(3): 175-184 (2008) - [c14]Michael Short, Michael J. Pont, Jianzhong Fang:
Exploring the Impact of Task Preemption on Dependability in Time-Triggered Embedded Systems: A Pilot Study. ECRTS 2008: 83-91 - [c13]Ayman K. Gendy, Michael J. Pont:
Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. SAFECOMP 2008: 440-453 - [c12]Keith Florence Athaide, Michael J. Pont, Devaraj Ayavoo:
Shared-Clock Methodology for Time-Triggered Multi-Cores. CPA 2008: 149-162 - 2007
- [j13]Susan Kurian, Michael J. Pont:
The maintenance and evolution of resource-constrained embedded systems created using design patterns. J. Syst. Softw. 80(1): 32-41 (2007) - [j12]Devaraj Ayavoo, Michael J. Pont, Michael Short, Stephen Parker:
Two novel shared-clock scheduling algorithms for use with 'Controller Area Network' and related protocols. Microprocess. Microsystems 31(5): 326-334 (2007) - [j11]Michael Short, Michael J. Pont:
Fault-Tolerant Time-Triggered Communication Using CAN. IEEE Trans. Ind. Informatics 3(2): 131-142 (2007) - [c11]Michael J. Pont, Susan Kurian, Huiyan Wang:
Selecting an appropriate scheduler for use with time-triggered embedded systems. EuroPLoP 2007: 595-618 - [c10]Huiyan Wang, Michael J. Pont, Susan Kurian:
Patterns which help to avoid conflicts over shared resources in time-triggered embedded systems which employ a pre-emptive scheduler. EuroPLoP 2007: 619-642 - 2006
- [j10]Teera Phatrapornnant, Michael J. Pont:
Reducing Jitter in Embedded Systems Employing a Time-Triggered Software Architecture and Dynamic Voltage Scaling. IEEE Trans. Computers 55(2): 113-124 (2006) - [c9]Michael J. Pont, Susan Kurian, Ricardo Bautista-Quintero:
Meeting real-time constraints using "Sandwich Delays". EuroPLoP 2006: 67-78 - [c8]Peter J. Vidler, Michael J. Pont:
Computer Assisted Source-Code Parallelisation. ICCSA (5) 2006: 22-31 - 2005
- [c7]Devaraj Ayavoo, Michael J. Pont, Stephen Parker:
Observing the Development of a Reliable Embedded System. Ada-Europe 2005: 167-179 - 2004
- [j9]Michael J. Pont, Mark P. Banner:
Designing embedded systems using patterns: A case study. J. Syst. Softw. 71(3): 201-213 (2004) - 2003
- [j8]Michael J. Pont:
Supporting the Development of Time-Triggered Co-Operatively Scheduled (TTCS) Embedded Software Using Design Patterns. Informatica (Slovenia) 27(1): 81-88 (2003) - [c6]Simon Key, Michael J. Pont, Simon Edwards:
Implementing Low-cost TTCS Systems using Assembly Language. EuroPLoP 2003: 667-690 - [c5]Michael J. Pont, Andrew J. Norman, Chisanga Mwelwa, Tim Edwards:
Prototyping Time-triggered Embedded Systems using PC Hardware. EuroPLoP 2003: 691-716 - 2002
- [j7]Royan H. L. Ong, Michael J. Pont:
The impact of instruction pointer corruption on program flow: A computational modelling study. Microprocess. Microsystems 25(9-10): 409-419 (2002) - [j6]Yuhua Li, Michael J. Pont, N. Barrie Jones:
Improving the performance of radial basis function classifiers in condition monitoring and fault diagnosis applications where 'unknown' faults may occur. Pattern Recognit. Lett. 23(5): 569-577 (2002) - 2001
- [j5]Royan H. L. Ong, Michael J. Pont, William Peasgood:
A comparison of software-based techniques intended to increase the reliability of embedded applications in the presence of EMI. Microprocess. Microsystems 24(10): 481-491 (2001) - [j4]Chinmay R. Parikh, Michael J. Pont, N. Barrie Jones:
Application of Dempster-Shafer theory in condition monitoring applications: a case study. Pattern Recognit. Lett. 22(6/7): 777-785 (2001) - [c4]Royan H. L. Ong, Michael J. Pont:
Empirical comparison of software-based error detection and correction techniques for embedded systems. CODES 2001: 230-235
1990 – 1999
- 1999
- [c3]Michael J. Pont:
Designing and Implementing Reliable Embedded Systems Using Patterns. EuroPLoP 1999: 257-290 - 1998
- [j3]Michael J. Pont:
Soapbox: Why Java is Dangerous. IEEE Softw. 15(1): 20-22 (1998) - 1993
- [c2]Trupti Vyas, Michael J. Pont, Seyed J. Mashari:
Speech recognition using auditory models and neural networks. EUROSPEECH 1993: 705-708 - [c1]Michael J. Pont:
Simulation of short-latency auditory evoked potentials: a pilot study. EUROSPEECH 1993: 727-730 - 1990
- [j2]Michael J. Pont:
The role of the dorsal cochlear nucleus in the perception of voicing contrasts in initial english stop consonants: A computational modelling study. Speech Commun. 9(1): 95 (1990)
1980 – 1989
- 1988
- [j1]Michael J. Pont:
A neural model of the mechanisms underlying infant perception of voice-onset time. Neural Networks 1(Supplement-1): 270 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint