By Topic

2008 Fifth IEEE International Symposium on Embedded Computing

6-8 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (678 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Message from the SEC 2008 Conference Chairs

    Publication Year: 2008, Page(s):x - xiii
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Dynamic Window-Constrained Scheduling Algorithm for Multiprocessor Real-Time Systems

    Publication Year: 2008, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Advances in computing applications in recent years have prompted the demand for more flexible scheduling models and multiprocessor scheduling algorithm. The DWCS (dynamic window-constrained scheduling) is a flexible scheduling algorithm. In the scheduling algorithms on multiprocessor real time systems, the heuristic algorithm is an important algorithm and a known heuristic algorithm is myopic algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Extended Petri Net EPRES for Embedded System Modeling

    Publication Year: 2008, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    An appropriate formal model should be established to perform simulation analysis in prophase of embedded system design. This paper analyzes the current Petri net models and presents an EPRES model which gives its structural definition, graphical representation and behavioral rules concretely. The places were extended to two types such as control places and data places in EPRES. Transition function... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Performance of Heuristic Searches with Judicious Initial Point Selection

    Publication Year: 2008, Page(s):14 - 19
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    In this paper we claim that local optimization can produce proper start point for genetic search. We completely test this claim on partitioning problem and on the performance of genetic search in a real problem that is finding aggregation tree in the sensor networks. The presented method (named Tendency algorithm) increases the performance of heuristic searches, and can be used in parallel with ot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-Line Placement of Real-Time Tasks on 2D Partially Run-Time Reconfigurable FPGAs

    Publication Year: 2008, Page(s):20 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Partially Runtime-Reconfigurable (PRTR) FPGAs allow hardware tasks to be placed and removed dynamically at runtime in multi-tasking systems. Such systems need to not only support sharing of the resources in space, but also guarantee timely execution of the tasks. We present a novel online task placement algorithm under real-time constraints. The proposed algorithm uses a new metric to allocate tas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization Research of PSO-PID Algorithm for the Design of Brushless Permanent Magnet Machines

    Publication Year: 2008, Page(s):26 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Aiming at a complicated coupling and non-linear brushless DC motor (BLDCM) servo system, the conventional algorithms have many disadvantages, such as less precision, lower speed response. Taking the mechanical characteristics of BLDCM into consideration, an improved particle swarm optimization algorithm is presented in this paper, which is applied in the speed control of the Brushless DC Motor (BL... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing Geometric Path from Polygon-Based Integrated Circuit Layout

    Publication Year: 2008, Page(s):31 - 36
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    As the continual decrease of the feature size, the parasitic inductance and capacitance effect play important role in IC design and verification. Previous works on layout extraction mainly concentrated on how to find out the type of devices and connections between them, few works has addressed the information of centerlines and widths of IC interconnects in a polygon-based VLSI layout, which are r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slack-Conserving Based Scheduling of Periodic Real-Time Tasks

    Publication Year: 2008, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    Real time scheduling algorithms provide a mean to schedule tasks on processor such that real time constraints are guaranteed. Fixed priority real time scheduling algorithms have low runtime complexity and their behaviour can be categorized a prior but they do not support dynamic systems very well. A transient overload in dynamic priority scheduling algorithms may cause a critical task to fail but ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Hardware/Software Partitioning in Embedded System by Improved Particle Swarm Optimization Algorithm

    Publication Year: 2008, Page(s):43 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Hardware/software partitioning is a key problem in hardware/software co-design. This paper presents a new hardware/software partitioning methodology based on improved particle swarm optimization algorithm. The model of the embedded system was constructed by directed acyclic graph to obtain the objective function. Then improvement strategies are introduced in order to overcome the problems of low p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Embedded Surveillance Platform in Severe Environment

    Publication Year: 2008, Page(s):47 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2068 KB) | HTML iconHTML

    In the coal mine, open field or a severe surveillance environment, the use of computers and data collection card to achieve surveillance task is fairly dangerous and unreliable. This paper analyzes platform selection in special surveillance environment based on such problems as the high possibility of flammability and explosion, high humidity and lots of dust in surveillance environment, and the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rapid Secret Sharing Scheme for Resource Constrained Environments

    Publication Year: 2008, Page(s):55 - 60
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    A method of rapid secret sharing scheme based on STAR codes is proposed. Due to the characteristic of array codes such as STAR codes, the computation in secret sharing scheme need only XOR operation on GF(2), which is distinguished with the modulation and other complex operation on GF(q) in the traditional schemes. Thus, it's more rapid and suitable for large capacity secret sharing, and also appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks

    Publication Year: 2008, Page(s):61 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In wireless sensor networks (WSNs), secure data aggregation is an important application. Previous works are implemented by authentication among neighboring sensors. Considering that in many cases, data aggregation is both spatial and temporal correlation, this paper proposes a distributed and localized secure data aggregation algorithm based on behavior trust (BTDA). The security and reliability o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual OS Support Peripheral Device Encapsulation

    Publication Year: 2008, Page(s):67 - 72
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    The need of extensive computing capacity is expanding all the time. Especially in company providing network service, adding servers physically requires much more cost. Also in embedded system, resource is also very limited. That is why virtulization is so popular in research and industry application. A lot of virtulization technique is raised to supply great computing capacity with multiple operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LUT-based FPGA Implementation of SMS4/AES/Camellia

    Publication Year: 2008, Page(s):73 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    The FPGA performance of ciphers mainly includes area and throughput of implementation. In this design, several cryptographic algorithms such as SMS4, AES and Camellia have been implemented to analyze their performance and study the influence of the area with two different LUT-size FPGA devices. This paper uses VHDL to describe circuit function, choose Altera Stratix II and Cyclone II devices to si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Security Middleware Based on USB Key

    Publication Year: 2008, Page(s):77 - 81
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    USB key represents one of the smallest computing platforms today. With the development of USB key chips, more and more security features will be supported by USB key. Network security middleware is a Java and HTTP-based development framework on USB key. Developers can develop and on line load network security-related programs on this framework. End users can use this USB key to establish secure ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPMOS-Based Intrusion Detection Architecture

    Publication Year: 2008, Page(s):82 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Security of embedded systems is becoming more and more important. IDS (instrusion detection system) has been designed to protect systems from being compromised by network attacks. A lot of researches have been done on it. However, most of them focus on complex and time-consuming detection methods to improve accuracy of the system, with assumption that IDS is running under control of general purpos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of ASIP Architecture Description

    Publication Year: 2008, Page(s):88 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Validation is one of the most complex and expensive tasks in current Application Specific Instruction Set Processors (ASIP) design process. Many existing approaches employ a multiple-level approach to efficiently design and verify ASIP design. This paper presents a novel extended timed Petri net model called HDPN-Hardware Design based-on Petri Net to model systems at multiple levels, and introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lightweight Video Encryption Algorithm for Wireless Application

    Publication Year: 2008, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Protecting the confidentiality and integrity of video information is one of the crucial security elements for many wireless video applications. Taking limited power, processor resource and bandwidth of mobile device into account, a lightweight luminance transform coefficients encryption (LTCE) algorithm, is proposed based on the special feature of the H.264 video coding standard. In LTCE algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Security Scheme for Video Conference System with Wireless Terminals

    Publication Year: 2008, Page(s):101 - 106
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Transmission security of media data in video conference system has been a challenging task, since those data are high volume and latency sensitive. Partial encryption and other media encryption schemes are effective approaches to encrypt those data. However, a partial disclosure of media data can leak the secret about the conference, moreover when wireless terminals joint in those systems, the lim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deeply Pipelined DSP Solution to Key Modules in H. 264

    Publication Year: 2008, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    With the rapid development of microprocessor, embedded multimedia products are gradually becoming the mainstream in the market. However, the high coding efficiency enabled by the H.264 video compression standard comes with substantially greater algorithmic complexity as compared to that of existing standards. And this additional complexity results in many difficulties in the implementation and opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.