By Topic

Embedded Software and Systems Symposia, 2008. ICESS Symposia '08. International Conference on

Date 29-31 July 2008

Filter Results

Displaying Results 1 - 25 of 102
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (493 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Message from ICESS-08 Symposia Chairs

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • A 3-D Encryption Technique Using Computer-Generated Hologram

    Publication Year: 2008, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    The techniques of hologram for encryption and decryption have been widely researched and applied. Almost all the information of encryption is 2-D image. Parameters (wave length, recording distance, incidence angle, etc.) are regarded as the encoded keys for encryption and decryption. In the paper a novel way to encrypt 3-D information is proposed, which is based on technique of virtual optics. A n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High-Accuracy Parameter Estimation PSO Algorithm

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    A preferable value for parameters proved to be crucial in enhancing the performance and efficiency of particle swarm optimization (PSO) algorithm. To provide good solution for reasonable choice of parameter values within fairly wide range for particle swarm optimization, this paper presents a novel parameter optimizing configuration strategy based on multi-order rhombus thought (MRT), which depend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Distributed Garbage Collection of Active Objects

    Publication Year: 2008, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Different from traditional garbage collection (GC), in actor system GC identifying whether the object is garbage or not depends on not only its references but also its processing state. It makes garbage collection more complicate. In previous work tracing algorithms such as mark-sweep are utilized which lead to GC too complicated to be suitable for large-scale distributed system. We present in thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Receipt-Free Voting Scheme Based on Linkable Ring Signature for Designated Verifiers

    Publication Year: 2008, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Receipt-freeness is an essential security property in electronic voting to prevent vote buying or coercion. In this paper, we propose a new approach to construct receipt-free electronic voting schemes. We first introduce the notion of linkable ring signature for designated verifiers which preserves all properties of a normal linkable ring signature while only the designated verifiers can verify th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Embedded Maintenance Unit of Hydro Generator Excitation System

    Publication Year: 2008, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Hydro generator excitation system is one of the most maintenance intensive subsystem in hydro power plants. A novel embedded maintenance unit of the excitation system is studied. A knowledge bank, which summarizes both the expert knowledge and the analytical knowledge on the failure modes and their manifestations as well as their effects, is established. An expert system is developed to optimize t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Radar Display Terminal Based on a Partial-Screen-Updating Method

    Publication Year: 2008, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    According to the theory of radar detector, a new advanced plane radar display terminal is presented in this paper. Based on the technologies of DSP and FPGA, the terminal possesses the functions of radar data acquisition, radar signal processing, the detected aims displaying, etc. The innovation of this paper locates that a high efficiency display method, named partial-screen-updating method, is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Server Side Caching System for Efficient Web Map Services

    Publication Year: 2008, Page(s):32 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    In this paper, we propose a new server side caching system that supports efficient storage and retrieval of cached map image tiles. The efficiency is achieved by organizing the map image tiles of the same layer in the same file with the relationships between corresponding map image tiles on different zoom levels, combined with the use of a main memory resident data structure and hard disc indices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Test Scheduling Scheme for Core-Based SoCs Using Genetic Algorithm

    Publication Year: 2008, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    We present a test scheduling scheme for core-based system-on-chips based on genetic algorithm. Given a set of tasks (test sets for the cores), a set of test resources(e.g., test buses) and a test access architecture, test scheduling is determined for the cores such that the total test application time is minimized. A genetic algorithm model for optimal test scheduling is proposed. To make the solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trusted Architecture for ESCS with MLS

    Publication Year: 2008, Page(s):44 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Past attempts at designing and implementing high trusted systems for embedded safety-critical systems (ESCS) have centered on the concept of a monolithic security kernel and safety kernel. These approaches lead to inflexible, overly complex operating systems that are too large to evaluate at the higher assurance levels. This paper provides an overview of trusted architecture named Hades, which con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adopting CMM In Embedded Software Design and Development

    Publication Year: 2008, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of software process of embedded hardware is discussed, so is the necessity and the present significance of using CMM. A simple software development flow for embedded software is proposed. According to CMM2, each key process of such flow in embedd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Authentication RFID Reader with FPGA

    Publication Year: 2008, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Currently, the illegal activity about counterfeit commodity is increasingly, this brings huge economic loss for consumer and enterprise. So it is a critical problem for us to protect our commodity from counterfeit. The analysis of current anti-counterfeit technique is given first, and then combining the information security with RFID technique theory get the anti-forge RFID reader which conforms t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AWHD for License Plate Character

    Publication Year: 2008, Page(s):60 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    In the paper a new method for the license plate character image matching is presented. There are many available methods for image matching, e.g., Hausdorff distance and wavelet transform based matching. We proposed an adaptive weighted Hausdorff (AWHD) distance matching algorithm, the results of our experiment showed that AWHD is time efficient, robust, and high recognition rate method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets

    Publication Year: 2008, Page(s):63 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB) | HTML iconHTML

    Timed factors are usually simplified or even omitted in model checking of cryptographic protocols, but they do have effects on implementations of security protocols. In this paper, we concentrate on the suitability of applying CPN Tools to considering time in the formal analysis of two kinds of protocols, time-sensitive and non-time-sensitive cryptographic protocols. We also propose two kinds of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of an Embedded Fingerprint Identification System for the Bank Staff Identity Authentication

    Publication Year: 2008, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    The embedded fingerprint identification system for the bank staff identity authentication is presented, in the same time, the structure of the system and working principle are stated in details, and the implementation of both hardware and software are discussed. The system overcomes the fake ID happened in traditional method, and either security or reliability is proven. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Equipment Remote Monitoring System Based on Embedded Web

    Publication Year: 2008, Page(s):73 - 78
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In this paper, we combine the mature technology of Web with the embedded and fully utilize the advantages of both. Applied the embedded Web technology in the field of equipment condition monitoring, the equipment remote monitoring system is designed based on embedded Web. Firstly, the function and structure of the system are designed. Based on ARM9 technology, the hardware part of system is design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DVFS Aware Techniques on Parallel Architecture Core (PAC) Platform

    Publication Year: 2008, Page(s):79 - 84
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Rapid developments of multimedia and communication technologies enrich the applications of portable devices. However, design flexibility and low power are two important criteria for real-time system development. In this paper, a DVFS-aware implementation is introduced to demonstrate intelligent dynamic voltage and frequency scaling (DVFS) technique on dual-core PAC Platform. The power management o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault-Tolerant Design of a Microcontroller-Based Monitoring System for a Mine Drainage Pump

    Publication Year: 2008, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    This paper describes hybrid-redundant design of monitoring systems with proprietary industrial-control computer boards. Input channels use three-mode redundancy, host controllers two-mode redundancy and output channels use warm redundancy. Experiments and analysis of system reliability by the Markov model indicate that the reliability of normal operation for 5 years is above 0.9. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine-Grained Energy Estimation and Optimization of Embedded Operating Systems

    Publication Year: 2008, Page(s):90 - 95
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Embedded operating systems (EOS) manage the resources of the system and control device operations, and play an important role on optimizing system energy consumption. This paper proposes a new approach to estimate and optimize the energy consumption of the EOS and the applications at a fine-grained level. The approach is based on a micro-architectural power model and a new estimation model for ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.