Searched for keywords.author.keyword:"resource-constrained devices" OR acmdlCCS:"resource-constrained devices"  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 569,850 records   [Expand your search to The ACM Guide to Computing Literature: 2,871,578 records] Help: ACM vs. Guide
18 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
2004
Result 1 – 18 of 18
Sort by:

1 published by ACM
March 2006 ACM Transactions on Architecture and Code Optimization (TACO): Volume 3 Issue 1, March 2006
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 3,   Downloads (12 Months): 12,   Downloads (Overall): 617

Full text available: PDFPDF
The widespread use of ubiquitous, mobile, and continuously connected computing agents has inspired software developers to change the way they test, debug, and optimize software. Users now play an active role in the software evolution cycle by dynamically providing valuable feedback about the execution of a program to developers. Software ...
Keywords: Profiling, phased behavior, resource-constrained devices, sampling
[result highlights]

2 published by ACM
September 2005 EMSOFT '05: Proceedings of the 5th ACM international conference on Embedded software
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 287

Full text available: PDFPDF
We present AutoDVS, a dynamic voltage scaling (DVS) system for hand-held computers. Unlike extant DVS systems, AutoDVS distinguishes common, course-grain, program behavior and couples forecasting techniques to make accurate predictions of future behavior. AutoDVS uses these predictions in combination to guide dynamic voltage scaling. AutoDVS estimates periods of user interactivity, ...
Keywords: power consumption, prediction, resource-constrained devices, voltage scaling
[result highlights]

3 published by ACM
June 2004 LCTES '04: Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 173

Full text available: PdfPdf
Compile-only JVMs for resource-constrained embedded systems have the potential for using device resources more efficiently than interpreter-only systems since compilers can produce significantly higher quality code and code can be stored and reused for future invocations. However, this additional storage requirement for reuse of native code bodies, introduces memory overhead ...
Keywords: JIT, JVM, code unloading, code-size reduction, resource-constrained devices
Also published in:
July 2004  ACM SIGPLAN Notices - LCTES '04: Volume 39 Issue 7, July 2004
[result highlights]

4 published by ACM
June 2005 ACM Transactions on Architecture and Code Optimization (TACO): Volume 2 Issue 2, June 2005
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4,   Downloads (12 Months): 8,   Downloads (Overall): 482

Full text available: PDFPDF
Java Virtual Machines (JVMs) for resource-constrained devices, e.g., hand-helds and cell phones, commonly employ interpretation for program translation. However, compilers are able to produce significantly better code quality, and, hence, use device resources more efficiently than interpreters, since compilers can consider large sections of code concurrently and exploit optimization opportunities. ...
Keywords: Code unloading, JIT, JVM, code-size reduction, resource-constrained devices
[result highlights]

5 published by ACM
March 2007 EuroSys '07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Publisher: ACM
Bibliometrics:
Citation Count: 35
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 426

Full text available: PDFPDF
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a business standard for the life cycle management of Java software components. It is based on a service oriented architecture where functional units are ...
Keywords: OSGi, service oriented architecture, average bundle, resource-constrained devices, concierge
Also published in:
June 2007  ACM SIGOPS Operating Systems Review - EuroSys'07 Conference Proceedings: Volume 41 Issue 3, June 2007
[result highlights]

6 published by ACM
September 2009 MobiCom '09: Proceedings of the 15th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 2,   Downloads (12 Months): 13,   Downloads (Overall): 862

Full text available: PDFPDF
Wireless mesh networks are being used to provide Internet access in a cost efficient manner. Typically, consumer-level wireless access points with modified software are used to route traffic to potentially multiple back-haul points. Malware infected computers generate malicious traffic, which uses valuable network resources and puts other systems at risk. ...
Keywords: wireless mesh network, intrusion detection, resource constrained devices, performance
[result highlights]

7
December 2008 HiPC'08: Proceedings of the 15th international conference on High performance computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Parallel Pervasive Systems ( P 2 S ) comprise an ad hoc networkof pervasive devices such as cell phones, handheld computers, laptops,sensors and other devices that essentially form a parallel system.Most of the current work in pervasive computing and mobile adhoc networksexploit resources on remote devices to execute compute intensivetasks. ...
Keywords: parallel processing, pervasive computing, resource constrained devices, task scheduling
[result highlights]

8 published by ACM
October 2018 ICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 0

Full text available: PDFPDF
A secure lightweight block cipher is an effective security solution for applications running on resource-constrained devices. The SPECK family of lightweight block ciphers is designed for low-end devices that need data security. The randomness of the keystream produced by this algorithm is a good indicator of its security strength. Nevertheless, ...
Keywords: NIST STS, Resource - constrained devices, dieharder, lightweight block cipher, statistical analysis
[result highlights]

9 published by ACM
November 2011 MM '11: Proceedings of the 19th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 2,   Downloads (12 Months): 4,   Downloads (Overall): 231

Full text available: PDFPDF
This paper introduces a new technique, called peer-assisted rendering, that aims to enable interactive navigation in a 3D networked virtual environment using a resource-constrained device, by speeding up the rendering. A resource-constrained client requests part of the rendered scenes from other peers with similar viewpoints within the virtual environment, and ...
Keywords: networked virtual environments, peer-assisted rendering, image-based rendering, resource-constrained devices
[result highlights]

10 published by ACM
September 2014 MSWiM '14: Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 6,   Downloads (Overall): 76

Full text available: PDFPDF
Sensor devices and the emergent networks that they enable are capable of transmitting information between data sources.Since these devices have low-power and intermittent connectivity, latency of delivery for certain classes of data may be tolerated in an effort to save energy. The BUBBLE routing algorithm, proposed by Hui it et ...
Keywords: pocket-switched networks, clustering, delay-tolerant networks, resource-constrained devices, social-based routing
[result highlights]

11 published by ACM
January 2019 ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Resource constrained devices such as sensors and RFIDs are utilized in many application areas to sense, store and transmit the sensitive data. This data must be encrypted to achieve confidentiality. The implementation of traditional public key encryption (PKE) techniques by these devices is always challenging as they possess very limited ...
Keywords: bilinear pairing, certificate-less public key encryption algorithm, lightweight, resource constrained devices
[result highlights]

12 published by ACM
October 2018 INTESA '18: Proceedings of the Workshop on INTelligent Embedded Systems Architectures and Applications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 54,   Downloads (Overall): 54

Full text available: PDFPDF
In this paper, we try to address the question "is it worth processing a data stream on the device that collected it or should we send it somewhere else?". As it is often the case in Computer Science, the response is "it depends". To find out the cases where it ...
Keywords: IoT, cloud computing, fog computing, platform modeling, processing cost trade-off, resource-constrained devices
[result highlights]

13 published by ACM
August 2009 IWST '09: Proceedings of the International Workshop on Smalltalk Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 95

Full text available: PdfPdf
Dynamic programming languages offer high expressiveness and flexibility, improving programmer productivity. Still, making dynamic programming languages available for embedded systems is challenging because such environments are often constrained in terms of memory or computational power. For this, it is necessary to reduce the size of language implementations (virtual machines, VMs) ...
Keywords: dynamic programming language, resource-constrained device, Lego Mindstorms NXT, Squeak, virtual machine, embedded system, Smalltalk
[result highlights]

14 published by ACM
April 2019 ICPE '19: Proceedings of the 2019 ACM/SPEC International Conference on Performance Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 74,   Downloads (Overall): 74

Full text available: PDFPDF
The OPC UA communication architecture is currently becoming an integral part of industrial automation systems, which control complex production processes, such as electric power generation or paper production. With a recently released extension for pub/sub communication, OPC UA can now also support fast cyclic control applications, but the bottlenecks of ...
Keywords: bottleneck identification, client/server, dynamic multicast filtering, m2m communication, opc ua, performance evaluation, performance modeling, pub/sub, resource-constrained devices
[result highlights]

15 published by ACM
May 2010 SESENA '10: Proceedings of the 2010 ICSE Workshop on Software Engineering for Sensor Network Applications
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 1,   Downloads (12 Months): 14,   Downloads (Overall): 372

Full text available: PDFPDF
In the Internet of Things, all kinds of devices will extend the Internet to the physical world. In that vision, even extremely resource constrained sensor nodes can be triggered by as well as trigger business processes and are not limited to sense-and-send anymore. Despite the large potential, due to the ...
Keywords: internet of things, model driven software development, state machine for resource constrained devices, web service, sensor network, service oriented architecture
[result highlights]

16 published by ACM
October 2018 IOT '18: Proceedings of the 8th International Conference on the Internet of Things
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 66,   Downloads (Overall): 66

Full text available: PDFPDF
The number of heterogeneous Internet-of-Things (IoT) objects continues to grow, estimated to pass 50 billion by 2020. IoT objects are smart heterogeneous devices that are required to communicate and exchange data autonomously. For example, in a smart home, different devices such as sensors, cameras, actuators and control systems need to ...
Keywords: CAN bus, IoT gateway, bluetooth, BLE, cloud connection, database, heterogeneous, resource-constrained devices, internet-of-things (IoT), modbus, query, semantics, smart homes, wifi, wireless sensor networks
[result highlights]

17 published by ACM
December 2017 ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Autonomous Battery-Free Sensing and Communication, Special Issue on ESWEEK 2016 and Regular Papers: Volume 17 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 26,   Downloads (Overall): 79

Full text available: PDFPDF
In this article, we present Distributed Computing for Constrained Devices (DC4CD), a novel software architecture that supports symbolic distributed computing on wireless sensor networks. DC4CD integrates the functionalities of a high-level symbolic interpreter, a compiler, and an operating system, and includes networking abstractions to exchange high-level symbolic code among peer ...
Keywords: Distributed symbolic processing, Forth, high-level event handling, interpretation and compilation of symbolic code on resource-constrained devices, wireless programming of sensor network nodes
[result highlights]

18 published by ACM
August 2019 ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 24,   Downloads (12 Months): 24,   Downloads (Overall): 24

Full text available: PDFPDF
Recent studies have proposed that traditional security technology -- involving pattern-matching algorithms that check predefined pattern sets of intrusion signatures -- should be replaced with sophisticated adaptive approaches that combine machine learning and behavioural analytics. However, machine learning is performance driven, and the high computational cost is incompatible with the ...
Keywords: IoT, Security mobility applications, deep learning, feature engineering, lightweight intrusion detection, mutual information, security of resource constrained devices, white-box modelling
[result highlights]

Result 1 – 18 of 18


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us