2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST) 2021
DOI: 10.1109/icest52640.2021.9483469
|View full text |Cite
|
Sign up to set email alerts
|

Operating Systems for IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…TinyOS [63,64] implemented with the programming language nesC, Contiki [65] and FreeRTOS [66], are very famous RTOSes. They all offer preemptive priority-driven task schedulers, so as to develop the IoT applications [67]. However, such RTOSes, even if suitable for battery-operated sensors, do not yet integrate clairvoyant and idling schedulers such as ED-H to accommodate the energy neutrality.…”
Section: Implementation Considerations With Operating Systemmentioning
confidence: 99%
“…TinyOS [63,64] implemented with the programming language nesC, Contiki [65] and FreeRTOS [66], are very famous RTOSes. They all offer preemptive priority-driven task schedulers, so as to develop the IoT applications [67]. However, such RTOSes, even if suitable for battery-operated sensors, do not yet integrate clairvoyant and idling schedulers such as ED-H to accommodate the energy neutrality.…”
Section: Implementation Considerations With Operating Systemmentioning
confidence: 99%
“…Memory of computer is important because a computer cannot do anything unless it has enough memory to do it. The memory [46] is where data and instructions for performing specific computer system tasks are kept. Data can be stored and retrieved from the computer's memory.…”
Section: ) What Is Memory Of Computers?mentioning
confidence: 99%
“…The sustainability and operational efficiency of PT. PLN is highly dependent on the availability, integrity, and confidentiality of their network systems [15,16].…”
Section: Introductionmentioning
confidence: 99%