• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 977
Next 10 →

Efficient remote profiling for resource-constrained devices

by Priya Nagpurkar, Hussam Mousa, Ra Krintz, Timothy Sherwood - ACM Trans. Archit. Code Optim. (TACO
"... The widespread use of ubiquitous, mobile, and continuously-connected computing agents has inspired software developers to change the way they test, debug, and optimize software. Users now play an active role in the software evolution cycle by dynamically providing valuable feedback about the executi ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
be performed without degrading a user’s experience with, or consuming the severely restricted resources of the mobile device. At the same time, the resource constraints of embedded devices prohibit the use of extant software profiling solutions. To achieve efficient remote profiling of embedded devices, we

Hummingbird: Ultra-Lightweight Cryptography for Resource- Constrained Devices

by Daniel Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith - the proceedings of The 14th International Conference on Financial Cryptography and Data Security - FC , 2010
"... Abstract. Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryp-tographic primitives for many security applications. Motivated by the design of the well-know ..."
Abstract - Cited by 19 (9 self) - Add to MetaCart
-known Enigma machine, we present a novel ultra-lightweight cryptographic algorithm, referred to as Hummingbird, for resource-constrained devices in this paper. Hummingbird can provide the designed security with small block size and is resistant to the most com-mon attacks such as linear and differential

HotPathVM: An Effective JIT Compiler for Resource-Constrained Devices

by Andreas Gal, Christian W. Probst - Proceedings of the 2nd international conference on Virtual execution environments , 2006
"... We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet is surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods) and compiles ..."
Abstract - Cited by 43 (8 self) - Add to MetaCart
We present a just-in-time compiler for a Java VM that is small enough to fit on resource-constrained devices, yet is surprisingly effective. Our system dynamically identifies traces of frequently executed bytecode instructions (which may span several basic blocks across several methods

Localising Speech, Footsteps and Other Sounds using Resource-Constrained Devices

by Yukang Guo, Mike Hazas
"... While a number of acoustic localisation systems have been proposed over the last few decades, these have typically either relied on expensive dedicated microphone arrays and workstation-class processing, or have been developed to detect a very specific type of sound in a particular scenario. However ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
a number of human-generated sounds. Drawing from signal processing literature, we identify methods for resource-constrained devices in a sensor network to detect, classify and locate acoustic events such as speech, footsteps and objects being placed onto tables. We evaluate the classification

Summary THE OPTIMIZATION OF GESTURE RECOGNITION TECHNIQUES FOR RESOURCE-CONSTRAINED DEVICES

by Gerrit Niezen, Gerrit Niezen, Supervisor Prof, G. P. Hancke , 2008
"... Gesture recognition is becoming increasingly popular as an input mechanism for human-computer interfaces. The availability of MEMS (Micro-Electromechanical System) 3-axis linear accelerometers allows for the design of an inexpensive mobile gesture recognition system. Wearable inertial sensors are a ..."
Abstract - Add to MetaCart
of memory. In the cases where a gesture recognition algorithm has been implemented on a resource-constrained device, only the simplest algorithms were imple-mented to recognize only a small set of gestures. Current gesture recognition technology can be improved by making algorithms faster, i more robust

The Design, Implementation, and Evaluation of Adaptive Code Unloading for Resource-Constrained Devices

by Lingli Zhang, Chandra Krintz
"... Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and hence, use device resources more efficiently than interpreters, since ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and hence, use device resources more efficiently than interpreters

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

by Salvatore Gaglio, Gloria Martorella, Daniele Peri
"... While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonom ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent

A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices

by Sachin Goyal, John Carter , 2004
"... Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate infras ..."
Abstract - Cited by 45 (3 self) - Add to MetaCart
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resourceconstrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate

A mobile GIS application for heavily resource-constrained devices

by Robert P. Biuk-aghai - In Proceedings of Asia GIS 2003 Conference , 2003
"... GIS applications for mobile devices are becoming increasingly popular, utilizing a di-verse range of devices. Many of these devices suffer from serious constraints in three main areas: processor speed, memory space, and screen size. This paper presents a GIS applica-tion, called “MacauMap”, that is ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Map”, that is intended for heavily resource-constrained handheld devices. MacauMap is a tourism-oriented map application of the Macau territory for PalmOS and Pocket PC personal digital assistants. It was designed to perform satisfactorily on devices with as little as 16 MHz processor speed, and requires only 500 KB

A Genetic Algorithm to Improve Linux Kernel Performance on Resource-Constrained Devices

by Robert D, Gregory M. Kapfhammer
"... As computers become increasingly mobile, users demand more functionality, longer battery-life, and better perfor-mance from mobile devices. In response, chipset fabrica-tors are focusing on elegant architectures to provide solu-tions that are both low-power and high-performance. Since these architec ..."
Abstract - Add to MetaCart
As computers become increasingly mobile, users demand more functionality, longer battery-life, and better perfor-mance from mobile devices. In response, chipset fabrica-tors are focusing on elegant architectures to provide solu-tions that are both low-power and high-performance. Since
Next 10 →
Results 11 - 20 of 977
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University