Towards decentralized system-level security for MPSoC-based embedded applications
With the increasing connectivity and complexity of embedded systems, security issues have
become a key consideration in design. In this paper, we propose a decentralized system …
become a key consideration in design. In this paper, we propose a decentralized system …
*‐Predictable MPSoC execution of real‐time control applications using invasive computing
M Brand, M Witterauf, É Sousa… - Concurrency and …, 2021 - Wiley Online Library
The fulfillment of non‐functional requirements like timing or energy consumption is of utmost
importance in many embedded systems and respective applications. Especially, with the …
importance in many embedded systems and respective applications. Especially, with the …
Invasive Computing for predictability of multiple non-functional properties: A cyber-physical system case study
É Sousa, M Witterauf, M Brand… - 2018 IEEE 29th …, 2018 - ieeexplore.ieee.org
The predictability of non-functional execution qualities is of utmost importance for the
successful introduction of multi-core architectures in embedded systems requiring …
successful introduction of multi-core architectures in embedded systems requiring …
Operating-System Support for Efficient Fine-Grained Concurrency in Applications
C Erhardt - 2020 - informatik.uni-erlangen.de
Ph.D. theses Friedrich-Alexander-Universität Univis Search Deutsch FAU-Logo Techn. Fakultät
Willkommen am Department Informatik FAU-Logo Logo I4 Department of Computer Science 4 …
Willkommen am Department Informatik FAU-Logo Logo I4 Department of Computer Science 4 …
[PDF][PDF] 10 Invasive Run-Time Support System (iRTSS)
Invasive programs, as well as hardware designed specifically to run them, need an
operating system that does not make applications pay for resources, functions or features …
operating system that does not make applications pay for resources, functions or features …
Invasive Computing
As this book originates in the context of invasive computing, this chapter gives an overview
of the invasive computing paradigm and its realization in software and hardware. It starts …
of the invasive computing paradigm and its realization in software and hardware. It starts …
Hybrid Mapping for Increased Security
In this chapter, it is shown that the introduced hybrid application mapping can also be
utilized to increase security in heterogeneous many-core systems. In the case of security, it …
utilized to increase security in heterogeneous many-core systems. In the case of security, it …
[引用][C] Trusted Systems in Untrusted Environments: Protecting against Strong Attackers
S vor starken Angreifern, J Götzfried