An example of the developer's documentation for an embedded computer system written in Ada

1986 ◽  
Vol VI (6) ◽  
pp. 61-71 ◽  
Author(s):  
T J Wheeler
2010 ◽  
Vol 20-23 ◽  
pp. 774-778
Author(s):  
Rui Ding ◽  
Yong Qin Hu ◽  
Wei Gong Zhang ◽  
Bo Yang

The characteristics and limitations of the buses, which are widely used nowadays, are analyzed in this paper. Because these buses don’t adapt to the high-reliability embedded computer system, a novel bus is proposed which is characterized by its high-reliability. And its capacity is reached through its unique datum’s dynamic reconfiguration mechanism. The basic architecture and communication protocol are presented in this paper. And then the key points during realization of this bus are discussed. Finally, the probably application scope and prospects are indicated.


Computer ◽  
1985 ◽  
Vol 18 (4) ◽  
pp. 67-70 ◽  
Author(s):  
White ◽  
Lavi

2012 ◽  
Vol 178-181 ◽  
pp. 2673-2679
Author(s):  
Xiao Qing Zeng ◽  
Jing Zhu ◽  
Tian Sheng Xiong ◽  
Tuo Shen ◽  
Le Xiang Wei

Train-Ground communication system is mainly used to complete the communication between the train and the ground, the data which is produced by security computer system is vital to safe operation. The paper focus on the reliability and security technologies of embedded computer system and evaluates the reliability of TMR (Triple Modular Redundancy), which is based on the existing research of security computer and aimed on the equipment of CBTC Train-Ground communication system. The technology of CBTC Train-Ground communication is studied and the structure of the TMR for Train-Ground communication system is designed in the paper. Furthermore, the fault - safety circuits,electromagnetic compatibility technology and rail traffic-related safety standards are analyzed. Finally, the Train-Ground infrared communication security transponder system based TMR is applied to Shanghai People's Square Line 8 subway train’s double-door control system.


2010 ◽  
Vol 61 (3) ◽  
pp. 183-188
Author(s):  
Juraj Michalák ◽  
Ladislav Hudec

Transparent Proxy for Secure E-MailThe paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.


Sign in / Sign up

Export Citation Format

Share Document