Software designed for computational processes that interact with the physical processes.
Event
ISORC 2017
20th IEEE International Symposium on Real-Time Computing (ISORC 2017) May 16-18, 2017 | The Fields Institute, Toronto, Canada | http://isorc2017.org/
Submitted by Anonymous on December 15th, 2016
IEEE International Conference on Industrial Technology (ICIT 2017) It is an immense pleasure to extend a warm welcome to all the academic scholars, professors, industry experts, managers, and business partners to the Annual IEEE Industrial Electronics Society’s 18th International Conf. on Industrial Technology (ICIT). 2017 will be held in North America’s 3rd largest city, Toronto, which lies within the Province of Ontario, Canada.
Submitted by Anonymous on December 5th, 2016
Event
WFCS 2017
13th IEEE International Workshop - Factory Communication Systems  Sponsors: IEEE Industrial Electronics Society (requested), Norwegian University of Science and Technology, Norway, and SINTEF, Norway The WFCS workshop is the largest IEEE technical event specially dedicated to industrial communication systems. The aim of this workshop is to provide a forum for researchers, practitioners and developers to review current trends in this area and to present and discuss new ideas and new research directions. Focus
Submitted by Anonymous on December 1st, 2016
Event
LASSY 2017
CALL FOR PAPERS
Submitted by Anonymous on December 1st, 2016
Event
MobiSPC '17
The 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC) Mobile Systems and Pervasive Computing (MobiSPC) have evolved into an active area of research and development. This is due to the tremendous advances in a broad spectrum of technologies and topics, including wireless networking, mobile and distributed computing, sensor systems, RFID technology, and the ubiquitous mobile phone. MobiSPC-2017 solicits papers that focus on the theory, systems, practices and challenges of providing users with a successful mobile or wireless experience.
Submitted by Anonymous on November 17th, 2016
Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.
xavier bellekens Submitted by xavier bellekens on November 17th, 2016
Event
SIES 2017
12th IEEE International Symposium on Industrial Embedded Systems (SIES 2017) June 7-9, 2017 | Toulouse, France | Web site: http://sies2017.onera.fr
Submitted by Anonymous on November 9th, 2016
Event
ANT 2017
The 8th International Conference on Ambient Systems, Networks and Technologies (ANT-2017) in conjunction with the 7th International Conference on Sustainable Energy Information Technology (SEIT 2017) The 8th International Conference on Ambient Systems, Networks and Technologies (ANT-2017) is a leading international conference for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all Ambient Systems, Networks and Technologies related areas.
Submitted by Anonymous on October 17th, 2016
Event
CF'17
ACM International Conference on Computing Frontiers 2017 (CF'17) Computing Frontiers is an eclectic, collaborative community of researchers who investigate emerging technologies in the broad field of computing: our common goal is to drive the scientific breakthroughs that transform society.
Submitted by Anonymous on October 12th, 2016
Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards. Internet threats tomorrow will disable home security systems, flood fields, and disrupt hospitals. The root problem is that these applications consist of software on tiny low-power devices and cloud servers, have difficult networking, and collect sensitive data that deserves strong cryptography, but usually written by developers who have expertise in none of these areas. The goal of the research is to make it possible for two developers to build a complete, secure, Internet of Things applications in three months. The research focuses on four important principles. The first is "distributed model view controller." A developer writes an application as a distributed pipeline of model-view-controller systems. A model specifies what data the application generates and stores, while a new abstraction called a transform specifies how data moves from one model to another. The second is "embedded-gateway-cloud." A common architecture dominates Internet of Things applications. Embedded devices communicate with a gateway over low-power wireless. The gateway processes data and communicates with cloud systems in the broader Internet. Focusing distributed model view controller on this dominant architecture constrains the problem sufficiently to make problems, such as system security, tractable. The third is "end-to-end security." Data emerges encrypted from embedded devices and can only be decrypted by end user applications. Servers can compute on encrypted data, and many parties can collaboratively compute results without learning the input. Analysis of the data processing pipeline allows the system and runtime to assert and verify security properties of the whole application. The final principle is "software-defined hardware." Because designing new embedded device hardware is time consuming, developers rely on general, overkill solutions and ignore the resulting security implications. The data processing pipeline can be compiled into a prototype hardware design and supporting software as well as test cases, diagnostics, and a debugging methodology for a developer to bring up the new device. These principles are grounded in Ravel, a software framework that the team collaborates on, jointly contributes to, and integrates into their courses and curricula on cyberphysical systems.
Off
Stanford University
-
National Science Foundation
Submitted by Philip Levis on September 23rd, 2016
Subscribe to Embedded Software