Sciweavers

482 search results - page 75 / 97
» A bitmask-based code compression technique for embedded syst...
Sort
View
114
Voted
COMPSAC
1996
IEEE
15 years 4 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
106
Voted
COOPIS
2004
IEEE
15 years 4 months ago
Enabling Rapid Feature Deployment on Embedded Platforms with JeCOM Bridge
A new class of embedded devices is emerging that has a mixture of traditional firmware (written in C/C++) with an embedded virtual machine (e.g., Java). For these devices, the main...
Jun Li, Keith Moore
LCTRTS
2004
Springer
15 years 5 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai
CODES
2007
IEEE
15 years 6 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
102
Voted
LCTRTS
2010
Springer
15 years 7 months ago
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture
A large number of embedded systems include 8-bit microcontrollers for their energy efficiency and low cost. Multi-bank memory architecture is commonly applied in 8-bit microcontr...
Minming Li, Chun Jason Xue, Tiantian Liu, Yingchao...