Academic literature on the topic 'Firmware and software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firmware and software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firmware and software"

1

Yang, Le Kang, Di Chen, Ju Mei, and Liang Xue. "Research on Malicious Behavior of Firmware Based on Hardware Resources Access Control." Applied Mechanics and Materials 340 (July 2013): 737–43. http://dx.doi.org/10.4028/www.scientific.net/amm.340.737.

Full text
Abstract:
As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.
APA, Harvard, Vancouver, ISO, and other styles
2

Weisi Lin. "On fast firmware/software-based video coding." IEEE Transactions on Consumer Electronics 48, no. 2 (May 2002): 209–19. http://dx.doi.org/10.1109/tce.2002.1010124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

ZHANG, TIELING, MIN XIE, LOON CHING TANG, and SZU HUI NG. "RELIABILITY AND MODELING OF SYSTEMS INTEGRATED WITH FIRMWARE AND HARDWARE." International Journal of Reliability, Quality and Safety Engineering 12, no. 03 (June 2005): 227–39. http://dx.doi.org/10.1142/s021853930500180x.

Full text
Abstract:
Firmware is embedded software in hardware devices and they play important role for many critical systems' function. Firmware failure rate in operation should be quite lower than the application software which is operating on it. Most of the study on software reliability deals with systems during development, and it is also important to study the integrated system during operation. Complex systems usually have a bathtub-shaped failure rate over the lifecycle of the product. This paper discusses the parametric analysis of model given by Haupt and Schäbe (1992), exponentiated Weibull distribution and models generated from Pareto and Weibull distribution, as well as their possible application to modeling firmware system failure. In addition, the Safety Integrity Levels (SIL) stipulated in IEC 61508 are taken into account in the modeling since the safety-critical systems in general are firmware-dominated.
APA, Harvard, Vancouver, ISO, and other styles
4

Iuganson, Andrei, and Danil Zakoldaev. "Approach to assessment of firmware security under fuzzy input data." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (January 27, 2020): 50–56. http://dx.doi.org/10.24143/2072-9502-2020-1-50-56.

Full text
Abstract:
The article highlights the issues of security and software security, which turn to be secondary in the design and development of software tools in order to please the speedy launch of the software product on the market. Due to the fact that the cost of eliminating security defects is higher in the late stages of design, the scientific problem of assessing software security under high uncertainty has been considered. The functional requirements for security of the firmware are given. A new approach is proposed for assessing the firmware security. The subject of research is a firmware designed to control various devices and microcontrollers. Based on GOST R 56939-2016 “Information security. Secure software development. General requirements” there have been developed the security requirements (qualitative and quantitative) for the embedded software, the assessment of which allows determining the level of security of the firmware as a whole. The fuzzy logic apparatus was used to optimize the assessment process in conditions of possible uncertainty, inconsistency, incompleteness and qualitative nature of the input data. The proposed method will help minimize the economic risks at the stages of operation and maintenance of embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Dasgupta, S., P. A. Wilsey, and J. Heinanen. "Axiomatic Specifications in Firmware Development Systems." IEEE Software 3, no. 4 (July 1986): 49–58. http://dx.doi.org/10.1109/ms.1986.234068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pott, Claudius, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert. "Firmware Security Module." Journal of Hardware and Systems Security 5, no. 2 (April 30, 2021): 103–13. http://dx.doi.org/10.1007/s41635-021-00114-4.

Full text
Abstract:
AbstractNew services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile. To provide a secure environment for the calculation and verification of cryptographic material, automotive microcontrollers now frequently integrate Hardware Security Modules (HSM), special well-protected co-processors, which are protected against manipulation and external access. HSMs use special hardware accelerators to provide the required cryptographic services. While these accelerators provide good performance, they limit flexibility and updatability. In addition, as more services require cryptographic protection, the amount of key material that needs to be managed by the HSM also increases, turning the limited protected memory of the HSM into a bottleneck. This paper presents a framework that uses the safety mechanisms of a microcontroller to achieve both HSM-equivalent security through software solutions, while providing an equivalent level of functionality. Furthermore, the proposed framework provides crypto-agility, as the security stack can be updated if desired. In order to verify the functionality, the presented framework is implemented and evaluated on an Infineon AURIX TC399 and compared with the integrated HSM.
APA, Harvard, Vancouver, ISO, and other styles
7

Eckert, Brad. "Firmware factory & forth." ACM SIGPLAN Notices 34, no. 12 (December 1999): 30–33. http://dx.doi.org/10.1145/344283.344290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Witanto, Elizabeth Nathania, Yustus Eko Oktian, Sang-Gon Lee, and Jin-Heung Lee. "A Blockchain-Based OCF Firmware Update for IoT Devices." Applied Sciences 10, no. 19 (September 26, 2020): 6744. http://dx.doi.org/10.3390/app10196744.

Full text
Abstract:
As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end when the manufacturer sells the devices to the market. It still needs to be kept updated to prevent cyber-attacks. The commonly used firmware update process, over-the-air (OTA), mostly happens in a centralized way, in which the IoT devices directly download the firmware update from the manufacturer’s server. This central architecture makes the manufacturer’s server vulnerable to single-point-of-failure and latency issues that can delay critical patches from being applied to vulnerable devices. The Open Connectivity Foundation (OCF) is one organization contributing to providing interoperability services for IoT devices. In one of their subject areas, they provide a firmware update protocol for IoT devices. However, their firmware update process does not ensure the integrity and security of the patches. In this paper, we propose a blockchain-based OCF firmware update for IoT devices. Specifically, we introduce two types of firmware update protocol, direct and peer-to-peer updates, integrated into OCF firmware update specifications. In the direct scenario, the device, through the IoT gateway, can download the new firmware update from the manufacturer’s server. Meanwhile, in the peer-to-peer scheme, the device can query the update from the nearby gateways. We implemented our protocol using Raspberry Pi hardware and Ethereum-based blockchain with the smart contracts to record metadata of the manufacturer’s firmware updates. We evaluated the proposed system’s performance by measuring the average throughput, the latency, and the firmware update distribution’s duration. The analysis results indicate that our proposal can deliver firmware updates in a reasonable duration, with the peer-to-peer version having a faster completion time than the direct one.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghanathe, N. P., A. Madorsky, H. Lam, D. E. Acosta, A. D. George, M. R. Carver, Y. Xia, A. Jyothishwara, and M. Hansen. "Software and firmware co-development using high-level synthesis." Journal of Instrumentation 12, no. 01 (January 27, 2017): C01083. http://dx.doi.org/10.1088/1748-0221/12/01/c01083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abu-Nimeh, Faisal T., Jennifer Ito, William W. Moses, Qiyu Peng, and Woon-Seng Choong. "Architecture and Implementation of OpenPET Firmware and Embedded Software." IEEE Transactions on Nuclear Science 63, no. 2 (April 2016): 620–29. http://dx.doi.org/10.1109/tns.2015.2499600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Firmware and software"

1

Nilsson, Daniel. "System for firmware verification." Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-2372.

Full text
Abstract:

Software verification is an important part of software development and themost practical way to do this today is through dynamic testing. This reportexplains concepts connected to verification and testing and also presents thetesting-framework Trassel developed during the writing of this report.Constructing domain specific languages and tools by using an existinglanguage as a starting ground can be a good strategy for solving certainproblems, this was tried with Trassel where the description-language forwriting test-cases was written as a DSL using Python as the host-language.

APA, Harvard, Vancouver, ISO, and other styles
2

Webster, David D. "Hardware, software, firmware allocation of functions in systems development." Diss., Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/49907.

Full text
Abstract:
The top-down development methodology is, for the most part, a well defined subject. There is, however, one area of top-down development that lacks structure and definition. The undefined topic is the hardware, software, and firmware allocation of functions. This research addresses this deficiency in top-down system development. The key objective is the restructuring of the hardware, software, and firmware process from a subjective, qualitative decision process to a structured, quantitative one. Factors that affect the hardware, software, and firmware allocation process are identified. Qualitative data on the influence of the factors on the allocation process are systematized into quantitative information. This information is used to develop a model to provide a recommendation for implementing a function in hardware, software, or firmware. The model applies three analytical methods: 1) the analytic hierarchy process, 2) the general linear model, and 3) the second order regression technique. These three methods are applied to the quantified information of the hardware, software, firmware allocation process. A computer-based software tool is developed by this research to aid in the evaluation of the hardware, software, and firmware allocation process. The software support tool assists in data collection. Future application of the support tool will enable the capture and documentation of expert knowledge on the hardware, software, and firmware allocation process. The improved knowledge base can be used to improve the model which in tum will improve the system development process, and resulting system.
Ph. D.
incomplete_metadata
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Daniel Y. "A systematic software, firmware, and hardware codesign methodology for digital signal processing." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41358.

Full text
Abstract:
Approved for public release; distribution is unlimited.
Creating an embedded system that meets its functional, performance, cost, and schedule goals is a software-and-hardware codesign problem, since the design of the software and hardware components influence each other. The traditional design methodology is sequential, with hardware designed first and then software. The lack of a unified and unbiased approach can lead to suboptimal design and incompatibilities across the software and hardware boundary. To solve these problems, we propose a new software/firmware/hardware codesign methodology to systematically build correct designs efficiently. This codesign methodology includes requirements development, architecture forming, software/ firmware/hardware partitioning, design-pattern mapping, new-design pattern synthesis, integration, and testing. We tested our methods on three application areas. One was a digitizer-filter architecture for ultra-high frequency signals for which we synthesized design patterns in firmware to meet high-frequency requirements. Another was a digitizer-filter architecture for low-frequency signals. A third was a hidden Markov model using dynamic programming. We implemented and tested the first application on a Tektronix/Synopsys embedded system and the second on a Pentek embedded system based on the requirements provided by the stakeholders
APA, Harvard, Vancouver, ISO, and other styles
4

Bayendang, Nganyang Paul. "Nano-satellite GPS receiver design and Implementation : a software-to-firmware approach." Thesis, Cape Peninsula University of Technology, 2015. http://hdl.handle.net/20.500.11838/1176.

Full text
Abstract:
Thesis submitted in partial fulfilment of the requirements for the degree Master of Technology: Electrical Engineering in the Faculty of Engineering at the Cape Peninsula University of Technology 2015
Space-borne GPS receivers designed for nano-satellites are faced with various challenges. This research is undertaken to address the problems of inefficiency and high-costs associated with space-borne GPS receivers. The problem of inefficiency relates to poor performances of the GPS receiver in terms of the algorithmic models, execution speed, memory usage and errors proness. The problem of high-costs relates to the spacegrade hardware cost, implementation complexity, development time, as well as the manufacturing, production and the testing processes involved. The research objectives are to i) establish an efficient high-dynamics software-defined GPS receiver, ii) demonstrate a firmware approach and then iii) postulate a low-cost hardware implementation roadmap. The research methodology employed to address the problems and to attain the objectives is based-on using Matlab computing platform to i) implement a software-defined GPS receiver using free open-source GPS receiver algorithms, ii) further develop the software GPS receiver and lastly iii) convert the improved GPS receiver algorithms to firmware. The GPS receiver was successfully implemented in Matlab floating-point algorithms with a ±100kHz Doppler search bins and was used to post-process a pre-captured real GPS L1 C/A signal dataset. The pre-captured GPS signal was acquired, tracked, decoded and post-processed to extract the navigation message; use to compute the GPS receiver position, UTC date and time. Attempt to convert the entire Matlab floating-point GPS receiver algorithms to equivalent VHDL implementations failed; however, three of the Matlab floating-point algorithms (check_t.m, deg2dms.m and findUtmZone.m), were successfully converted to equivalent fixed-point formats in Matlab, Simulink and finally VHDL. These three algorithms, now created and optimised to fixed-point formats (efficient and enable implementation unto a low-cost microcontroller), set the basis for the firmware implementation. They were simulated and verified in Matlab, Simulink and VHDL using the Matlab HDL Coder workflow. Altera Quartus II software was then used to compile (synthesise, place & route and generate programming files) the three converted generic VHDL algorithms to embedded firmware, suitable for a FPGA programming. The Matlab HDL Coder workflow used in this research is feasible and can be used to accurately design and implement an improved GPS receiver and furthermore achieve it in three equivalent algorithms. This conclusion was drawn and the proposed recommendations are to address the conversion issues in the other Matlab floating-point GPS receiver algorithms that failed in the conversion process and to further develop and implement the GPS receiver as a fully functional unit, based-on the Xilinx space-grade, radiation hardened and low-cost Virtex 5QV FPGA.
APA, Harvard, Vancouver, ISO, and other styles
5

Pastore, Cesare. "Progetto software/firmware di un’interfaccia per acquisizione dati da un nodo sensore basato su microcontrollore." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/12957/.

Full text
Abstract:
L'elaborato descrive le modalità di progettazione e programmazione di un firmware per il microcontrollore PIC16F1823 che implementa lo scambio di dati tra un nodo sensore e un personal computer, tramite i protocolli UART e SPI.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaczmarczyk, Václav. "Diagnostika komunikačního protokolu ARION." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217256.

Full text
Abstract:
The main goal of this thesis is creating diagnostic software for analyse communication via protocol ARION. That software would record and store communication data which can be analyzed late and also allows direct communication analysis in real time. Except that there will be visualization functions, for effective representation of data (stored or real-time recorded). This software can be used either by net developers or by end-users like easy visualization software. Next point is describing communication protocol ARION and create developer’s handbook. The practical part of this thesis consists of two points. The first one is developing simple device which allows communicating via protocol ARION. In second communication firmware for that device is written and tested.
APA, Harvard, Vancouver, ISO, and other styles
7

Cellarosi, Francesco Giuseppe. "Progetto software/firmware di un'interfaccia grafica per acquisizione dati da un nodo sensore basato su microcontrollore." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/12438/.

Full text
Abstract:
Nell’ambito della progettazione di circuiti elettronici assume un ruolo fondamentale la possibilità di contare su ambienti di verifica stabili e integrati, che riescano ad interfacciare il dispositivo con sistemi a più alto livello, ad esempio un calcolatore. Questo vale in maniera ancora più significativa se consideriamo dispositivi come sensori per acquisizioni a basso consumo, che richiedono tensioni di funzionamento relativamente basse e risultano molto sensibili al rumore indotto dalla scheda di test. L'obbiettivo di questo elaborato è quello di sviluppare un'interfaccia grafica, in linguaggio Java, che permetta l’acquisizione dati da un nodo sensore collegato ad un microcontrollore. Il microcontrollore da un lato è collegato al sensore tramite interfaccia seriale SPI e da esso riceve dati, dall’altro lato è collegato tramite interfaccia seriale UART ad un calcolatore su cui viene eseguita l’applicazione oggetto della tesi, che comunica col sensore e rende disponibili all'utente i dati acquisiti attraverso un'apposita interfaccia grafica. I requisiti richiesti per l’interfaccia grafica sono i seguenti: permettere all’utente di selezionare la porta seriale con cui voler comunicare e i parametri della porta seriale scelta (baud rate, numero di bit di dato, numero di bit di stop), permettere all’utente tramite la pressione di un pulsante di inizializzare la porta seriale scelta, permettere all’utente di effettuare scrittura e lettura di dati dal sensore. L’interfaccia di comunicazione del sensore può essere vista come una memoria costituita da una serie di registri ad 8 bit accessibili in lettura e scrittura; è quindi necessario, sia in fase di lettura che scrittura, sapere a quale dei registri del sensore l’utente voglia accedere.
APA, Harvard, Vancouver, ISO, and other styles
8

Gora, Michael Arthur. "Securing Software Intellectual Property on Commodity and Legacy Embedded Systems." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/33473.

Full text
Abstract:
The proliferation of embedded systems into nearly every aspect of modern infrastructure and society has seen their deployment in such diverse roles as monitoring the power grid and processing commercial payments. Software intellectual property (SWIP) is a critical component of these increasingly complex systems and represents a significant investment to its developers. However, deeply immersed in their environment, embedded systems are difficult to secure. As a result, developers want to ensure that their SWIP is protected from being reverse engineered or stolen by unauthorized parties. Many techniques have been proposed to address the issue of SWIP protection for embedded systems. These range from secure memory components to complete shifts in processor architectures. While powerful, these approaches often require the development of systems from the ground up or the application of specialized and often expensive hardware components. As a result they are poorly suited to address the security concerns of legacy embedded systems or systems based on commodity components. This work explores the protection of SWIP on heavily constrained, legacy and commodity embedded systems. We accomplish this by evaluating a generic embedded system to identify the security concerns in the context of SWIP protection. The evaluation is applied to determine the limitations of a software only approach on a real world legacy embedded system that lacks any specialized security hardware features. We improve upon this system by developing a prototype system using only commodity components. Finally we propose a Portable Embedded Software Intellectual Property Security (PESIPS) system that can easily be deployed as a framework on both legacy and commodity systems.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Nappier, Jennifer M. "An FPGA Abstraction Layer for the Space Telecommunications Radio System." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1227033556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Persson, Marcus. "Software Development and Qualification Testing of a CubeSat X-ray Monitor." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76843.

Full text
Abstract:
The CUBES (CUbesat x-ray Background Explorer using Scintillators) is a payload on the KTH student satellite MIST (MIniature STudent satellite) to evaluate Silicon Photo-multiplier technology and new scintillators such as GAGG (Gadolinium Aluminium Gallium Garnet, Gd3Al2Ga3O12) for future use in hard X-ray polarisation studies of Gamma-Ray Bursts. CUBES itself is designed to study the MIST in-orbit radiation environment by using a detector which is comprised of a silicon photomultiplier coupled to different scintillator materials. Three of these detectors will be mounted on the payload platform and then coupled to inputs of an Application Specific Integrated Circuit (ASIC) and connected to a Field-programmable Gate Array (FPGA) which will store and send data through the downlink on the MIST satellite to ground. This thesis covers the software development for the FPGA, together with two radiation tests of components and the preparation of these.
CUBES
MIST
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Firmware and software"

1

Buckley, Fletcher J. Configuration management: Hardware, software, and firmware. New York: Institute of Electrical and Electronic Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buckley, Fletcher J. Implementing configuration management: Hardware, software, and firmware. 2nd ed. Los Alamitos, Calif: IEEE Computer Society Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Third party protection of software and firmware: Direct protection of zeros and ones. Amsterdam: North-Holland, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ellison, Karen S. Developing real-time embedded software in a market-driven company. New York: John Wiley, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allocco, Michael. Safety analyses of complex systems: Considerations of software, firmware, hardware, human, and the environment. Hoboken, N.J: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Allocco, Michael. Safety analyses of complex systems: Considerations of software, firmware, hardware, human, and the environment. Hoboken, N.J: Wiley, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

(Illustrator), M. Damon Greene, ed. Software/Firmware Configuration Management. RayAnn Enterprise Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

G, Ganssle Jack, ed. The firmware handbook. Amsterdam: Elsevier, Newnes, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Learn Hardware Firmware and Software Design. Corollary Theorems, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Popa, O. G. Learn Hardware Firmware and Software Design. Corollary Theorems Ltd, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Firmware and software"

1

Beningo, Jacob. "Testing Portable Embedded Software." In Reusable Firmware Development, 257–75. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3297-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

M’RaÏhi, David, David Naccache, Jacques Stern, and Serge Vaudenay. "XMX: A firmware-oriented block cipher based on modular multiplications." In Fast Software Encryption, 166–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haak, N., and K. Kittmann. "Ein Hardware/Software/Firmware-Monitor für das Rechnernetz MICON." In Messung, Modellierung und Bewertung von Rechensystemen, 99–114. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-642-87472-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahn, Sunha, and Sharad Malik. "Modeling Firmware as Service Functions and Its Application to Test Generation." In Hardware and Software: Verification and Testing, 61–77. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03077-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Jianzhuang, Cheng Chang, Dongyuan Shi, Wei Xia, and Lin Chen. "A New Firmware Upgrade Mechanism Designed for Software Defined Radio Based System." In Lecture Notes in Electrical Engineering, 277–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34531-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Software and Firmware." In Telecommunications System Reliability Engineering, Theory, and Practice, 213–26. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118423165.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gajjar, Manish J. "Software, firmware, and drivers." In Mobile Sensors and Context-Aware Computing, 157–89. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-801660-2.00006-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Firmware/Software Design Guidelines." In Electrostatic Discharge and Electronic Equipment. IEEE, 2009. http://dx.doi.org/10.1109/9780470544549.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vears, RE. "Microprocessor hardware, firmware and software." In Microelectronic Systems 1 Checkbook, 56–77. Elsevier, 1986. http://dx.doi.org/10.1016/b978-0-434-92193-5.50010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"HALT Benefits for Software/Firmware Performance and Reliability." In Next Generation HALT and HASS, 190–206. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118700228.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firmware and software"

1

Cerabona, Michael A., and Wesley P. Millard. "A happy firmware/software development medium." In 2018 IEEE Aerospace Conference. IEEE, 2018. http://dx.doi.org/10.1109/aero.2018.8396410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tröger, Peter, Felix Salfner, and Steffen Tschirpke. "Software-Implemented Fault Injection at Firmware Level." In 2010 Third International Conference on Dependability (DEPEND). IEEE, 2010. http://dx.doi.org/10.1109/depend.2010.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Magro, Alessio, Riccardo Chiello, Cristian Albanese, Jeremy Baker, Gianni Comoretto, Andrea DeMarco, Alessio Gravina, Rob Halsall, Matthew Roberts, and Kristian Zarb Adami. "A software infrastructure for firmware-software interaction: The case of TPMs." In 2017 International Conference on Signals and Systems (ICSigSys). IEEE, 2017. http://dx.doi.org/10.1109/icsigsys.2017.7967039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sehestedt, Stephan, Georgia Giannopoulou, Aurelien Monot, and Michael Wahler. "Virtualizing Embedded Firmware to Boost Innovation Cycles." In 2019 IEEE International Conference on Software Architecture Companion (ICSA-C). IEEE, 2019. http://dx.doi.org/10.1109/icsa-c.2019.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Young, Peter J., Peter McGregor, Jan van Harmelen, and Benoît Neichel. "Using ODGWs with GSAOI: software and firmware implementation challenges." In SPIE Astronomical Telescopes + Instrumentation, edited by Nicole M. Radziwill and Gianluca Chiozzi. SPIE, 2012. http://dx.doi.org/10.1117/12.925273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mealey, Thomas C., and Andrew J. Duly. "BEEMER: A firmware-tuned, software-defined MIMO radar testbed." In 2016 IEEE International Symposium on Phased Array Systems and Technology (PAST). IEEE, 2016. http://dx.doi.org/10.1109/array.2016.7832582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wright, P. S. "The use of software in AC measurements at NPL." In IEE Colloquium on The Use of Software and Firmware in Measuring Instruments. IEE, 1996. http://dx.doi.org/10.1049/ic:19960016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Visoottiviseth, Vasaka, Pongnapat Jutadhammakorn, Natthamon Pongchanchai, and Pongjarun Kosolyudhthasarn. "Firmaster: Analysis Tool for Home Router Firmware." In 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE). IEEE, 2018. http://dx.doi.org/10.1109/jcsse.2018.8457340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Seoksu, Joon-Young Paik, Rize Jin, and Eun-Sun Cho. "Toward Machine Learning Based Analyses on Compressed Firmware." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Seoksu, and Eun-Sun Cho. "Toward Firmware-Type Analysis Using Machine Learning Techniques." In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.00172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography