{"id":"https://openalex.org/W4283379924","doi":"https://doi.org/10.1145/3522784","title":"System Engineering for constrained embedded systems","display_name":"System Engineering for constrained embedded systems","publication_year":2022,"publication_date":"2022-01-17","ids":{"openalex":"https://openalex.org/W4283379924","doi":"https://doi.org/10.1145/3522784"},"language":"en","primary_location":{"id":"doi:10.1145/3522784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3522784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9376000165939331,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12810","display_name":"Real-time simulation and control systems","score":0.9208999872207642,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8950024843215942},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6336429715156555},{"id":"https://openalex.org/keywords/ranging","display_name":"Ranging","score":0.5123239755630493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4481642246246338},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.35638606548309326},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15613290667533875},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09323999285697937}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8950024843215942},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6336429715156555},{"id":"https://openalex.org/C115051666","wikidata":"https://www.wikidata.org/wiki/Q6522493","display_name":"Ranging","level":2,"score":0.5123239755630493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4481642246246338},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.35638606548309326},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15613290667533875},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09323999285697937},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3522784","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3522784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4229448053","https://openalex.org/W4384112194","https://openalex.org/W2783354812","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4247925126","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281"],"abstract_inverted_index":{"In":[0,25],"a":[1],"number":[2],"of":[3,22],"applications":[4],"ranging":[5],"from":[6],"warehouse":[7],"management":[8],"to":[9,17],"people":[10],"search":[11],"and":[12,29],"rescue,":[13],"drones":[14,34],"will":[15],"need":[16],"evolve":[18],"in":[19],"the":[20],"vicinity":[21],"human":[23,31,39],"agents.":[24],"those":[26],"situations,":[27],"robust":[28],"fail-safe":[30],"detection":[32],"by":[33],"must":[35],"be":[36],"provided.":[37],"However,":[38],"...":[40]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
