2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications 2012
DOI: 10.1109/rtcsa.2012.64
|View full text |Cite
|
Sign up to set email alerts
|

Separated Linux Process Logging Mechanism for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…In this work, the Linux kernel is the unmodified Linux kernel, and predictability and reliability are achieved by a nonpatched real-time scheduler module. Praween Amontamavut et al proposed a separate Linux process logging model for embedded systems [29] that can be used to log the behavior of Linux processes in Android. To capture the traffic from a large number of CAN buses in industrial automation systems, Michal Sojka et al studied in depth the performance evaluation of Linux CAN-related system calls [30].…”
Section: Embedded Systems In Smart Applicationsmentioning
confidence: 99%
“…In this work, the Linux kernel is the unmodified Linux kernel, and predictability and reliability are achieved by a nonpatched real-time scheduler module. Praween Amontamavut et al proposed a separate Linux process logging model for embedded systems [29] that can be used to log the behavior of Linux processes in Android. To capture the traffic from a large number of CAN buses in industrial automation systems, Michal Sojka et al studied in depth the performance evaluation of Linux CAN-related system calls [30].…”
Section: Embedded Systems In Smart Applicationsmentioning
confidence: 99%
“…Anomaly detection using limited hardware has also been explored, using remote processing [21], look-up tables [22] and model-based comparison [23]. These solutions, however, do not readily account for systems dynamics and hence are unsuitable for gas turbine system anomaly detection.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection using limited hardware has also been explored, using remote processing [22], look-up tables [23], model-based comparison [24], and in other heavily band-limited system [25]. These solutions, however, are not suited to gas turbine anomaly detection due to the complexity of modelling the highly non-linear asset behaviours.…”
Section: Introductionmentioning
confidence: 99%