Results 11 - 20
of
977
Efficient remote profiling for resource-constrained devices
- ACM Trans. Archit. Code Optim. (TACO
"... The widespread use of ubiquitous, mobile, and continuously-connected computing agents has inspired software developers to change the way they test, debug, and optimize software. Users now play an active role in the software evolution cycle by dynamically providing valuable feedback about the executi ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
be performed without degrading a user’s experience with, or consuming the severely restricted resources of the mobile device. At the same time, the resource constraints of embedded devices prohibit the use of extant software profiling solutions. To achieve efficient remote profiling of embedded devices, we
Hummingbird: Ultra-Lightweight Cryptography for Resource- Constrained Devices
- the proceedings of The 14th International Conference on Financial Cryptography and Data Security - FC
, 2010
"... Abstract. Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryp-tographic primitives for many security applications. Motivated by the design of the well-know ..."
Abstract
-
Cited by 19 (9 self)
- Add to MetaCart
-known Enigma machine, we present a novel ultra-lightweight cryptographic algorithm, referred to as Hummingbird, for resource-constrained devices in this paper. Hummingbird can provide the designed security with small block size and is resistant to the most com-mon attacks such as linear and differential
HotPathVM: An Effective JIT Compiler for Resource-Constrained Devices
- Proceedings of the 2nd international conference on Virtual execution environments
, 2006
"... We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet is surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods) and compiles ..."
Abstract
-
Cited by 43 (8 self)
- Add to MetaCart
We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet is surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods
Localising Speech, Footsteps and Other Sounds using Resource-Constrained Devices
"... While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and workstation-class processing, or have been developed to detect a very specific type of sound in a particular scenario. However ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
a number of human-generated sounds. Drawing from signal processing literature, we identify methods for resource-constrained devices in a sensor network to detect, classify and locate acoustic events such as speech, footsteps and objects being placed onto tables. We evaluate the classification
Summary THE OPTIMIZATION OF GESTURE RECOGNITION TECHNIQUES FOR RESOURCE-CONSTRAINED DEVICES
, 2008
"... Gesture recognition is becoming increasingly popular as an input mechanism for human-computer interfaces. The availability of MEMS (Micro-Electromechanical System) 3-axis linear accelerometers allows for the design of an inexpensive mobile gesture recognition system. Wearable inertial sensors are a ..."
Abstract
- Add to MetaCart
of memory. In the cases where a gesture recognition algorithm has been implemented on a resource-constrained device, only the simplest algorithms were imple-mented to recognize only a small set of gestures. Current gesture recognition technology can be improved by making algorithms faster, i more robust
The Design, Implementation, and Evaluation of Adaptive Code Unloading for Resource-Constrained Devices
"... Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and hence, use device resources more efficiently than interpreters, since ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and hence, use device resources more efficiently than interpreters
High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices
"... While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonom ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent
A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices
, 2004
"... Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate infras ..."
Abstract
-
Cited by 45 (3 self)
- Add to MetaCart
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate
A mobile GIS application for heavily resource-constrained devices
- In Proceedings of Asia GIS 2003 Conference
, 2003
"... GIS applications for mobile devices are becoming increasingly popular, utilizing a di-verse range of devices. Many of these devices suffer from serious constraints in three main areas: processor speed, memory space, and screen size. This paper presents a GIS applica-tion, called “MacauMap”, that is ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
Map”, that is intended for heavily resource-constrained handheld devices. MacauMap is a tourism-oriented map application of the Macau territory for PalmOS and Pocket PC personal digital assistants. It was designed to perform satisfactorily on devices with as little as 16 MHz processor speed, and requires only 500 KB
A Genetic Algorithm to Improve Linux Kernel Performance on Resource-Constrained Devices
"... As computers become increasingly mobile, users demand more functionality, longer battery-life, and better perfor-mance from mobile devices. In response, chipset fabrica-tors are focusing on elegant architectures to provide solu-tions that are both low-power and high-performance. Since these architec ..."
Abstract
- Add to MetaCart
As computers become increasingly mobile, users demand more functionality, longer battery-life, and better perfor-mance from mobile devices. In response, chipset fabrica-tors are focusing on elegant architectures to provide solu-tions that are both low-power and high-performance. Since
Results 11 - 20
of
977