By Topic

Embedded Software and Systems, 2009. ICESS '09. International Conference on

Date 25-27 May 2009

Filter Results

Displaying Results 1 - 25 of 100
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1069 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Symposium Co-chairs

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Keynote: Endurance Barriers and Solutions for Flash Memory

    Publication Year: 2009, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB)

    Flash memory has penetrated many facets of consumer technology in recent years. Within one decade after its invention, we had witnessed the tremendous growth of the flash market. As flash memory gains its momentum, new challenges also emerge. In this talk, we will address endurance issues in the designs of flash-memory storage/file systems. Challenges on the design methodologies will also be prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Event Driven Software Quality

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB)

    Summary form only given. Event-driven programming has found pervasive acceptance, from high-performance servers to embedded systems, as an efficient method for interacting with a complex world. The fastest research Web servers are event- driven, as is the most common operating system for sensor nodes. An event-driven program handles concurrent logical tasks using a cooperative, application-level s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote: Wireless Sensor Network in Industrial Automation

    Publication Year: 2009, Page(s): xxii
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB)

    Although reports on actual implementations are rare, and potential applications in the projected areas are still under consideration, the wireless sensor networks are in the deployment stage by the manufacturing industry. The use of wireless links with field devices, such as sensors and actuators, allow for flexible installation and maintenance, mobile operation required in case of mobile robots, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial: Multi-stage Programming for Circuit Generation

    Publication Year: 2009, Page(s): xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    Multi-stage programming is a paradigm for writing generic programs that do not pay a runtime overhead. The key underlying technology is program generation. In addition, languages designed to support this paradigm (such as MetaOCaml) help the programmer avoid many of the difficulties that are traditionally encountered in developing program generators. This tutorial will introduce you to the basics ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Design of Embedded Control Systems by Means of a Synchronous Intermediate Model

    Publication Year: 2009, Page(s):3 - 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    Model-based design (MBD) involves designing a model of a control system, simulating and debugging it with dedicated tools, and finally generating automatically code corresponding to this model. In the domain of embedded systems, it offers the huge advantage of avoiding the time-consuming and error-prone final coding phase. The main issue raised by MBD is the faithfulness of the generated code with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Model-Checking for Real-Time Task Networks

    Publication Year: 2009, Page(s):11 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB) | HTML iconHTML

    Formal methods play an important role in the development of safety-critical systems. Their well-defined semantics can be employed for automatic formal system verification. Model-checking, a well-established formal verification technique, is however often restricted to an abstract level due to complexity reasons. For example, checking temporal system behavior with respect to hardware architectures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Model for Component-Based Embedded Software Development

    Publication Year: 2009, Page(s):19 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    This paper presents a formal model for specification, verification, and composition of component-based embedded software. We describe how components are specified from the syntactical view, functional view, QoS view and synchronization view. The refinement rules for functionality, QoS, and synchronous behavior are defined for the verification purpose. And a lightweight composition method is provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAM-Based Reconfigurable Implementation of the MD6 Hash Function

    Publication Year: 2009, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The MD6 hash function is developed by a team led by Professor Ronald L. Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the National Institute of Standards and Technology. The hardware performance evaluation of hash chip design mainly include... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parallel Reconfigurable Architecture for Real-Time Stereo Vision

    Publication Year: 2009, Page(s):32 - 39
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1772 KB) | HTML iconHTML

    In this paper, a parallel reconfigurable architecture is proposed for real-time stereo vision computation. The architecture is divided into four components: input port, output port, memory and processor. We use task partition methods to achieve the maximum parallel and full pipeline processing of the algorithm implementation. We also adopt memory management to decrease the latency of memory access... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Code Generation for Synchronous Reactive Communication

    Publication Year: 2009, Page(s):40 - 47
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Synchronous reactive models are used in model-based design to define embedded control applications. The advantage of model-based design is that system properties can be verified on the model and applied to its software implementation if the translation of the model into code preserves its semantics. In this paper, we present an automatic code generation framework for the semantics-preserving imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scheduling Algorithm for Hybrid Distributed Real-Time Systems

    Publication Year: 2009, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    Real-time systems that support only a finite set of discrete configurations can be referred to as hybrid systems. However, recent feedback control scheduling (FCS) algorithms for hybrid real-time systems are only applicable to single processor systems. And existing FCS algorithms for distributed systems often assume that the systems have continuous control inputs. This paper proposes a FCS algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Earliest Deadline Scheduling for Continuous Queries over Data Streams

    Publication Year: 2009, Page(s):57 - 64
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB) | HTML iconHTML

    Many stream-based applications have real-time performance requirements for continuous queries over time varying data streams. In order to address this challenge, a real-time continuous query model is presented to process multiple queries with timing constraints. In this model, the execution of one tuple passing through an operator path is modeled as a real-time task instance. A fine-grained schedu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of WCET Analysis of Real-Time Operating Systems

    Publication Year: 2009, Page(s):65 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Timing correctness of hard real-time systems is guaranteed by schedulability analysis and worst-case execution time (WCET) analysis of programs. Traditional WCET analysis mainly deals with application programs and has achieved success in industry. Timing analysis of application programs along cannot guarantee correctness of complete systems consisting RTOS. WCET tools designed for application prog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study on Controller Synthesis for Data-Intensive Embedded Systems

    Publication Year: 2009, Page(s):75 - 82
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1560 KB) | HTML iconHTML

    This paper presents an approach for the safe design of data-intensive embedded systems. A multimedia application module of last generation cellular phones is considered as a case study. The OMG standard profile MARTE is used to adequately model the application. The resulting model is then transformed into a synchronous program from which a controller is synthesized by using a formal technique, in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstract Simulation: A Static Analysis of Simulink Models

    Publication Year: 2009, Page(s):83 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1383 KB) | HTML iconHTML

    Simulink is one of the most widely used industrial tools to design embedded systems. Applying formal methods sooner in the cycle of development is an important industrial challenge in order to reduce the cost of bug fixing. In this article, we introduce a new method, called abstract simulation and based on abstract interpretation of Simulink models. Abstract simulation uses several numerical domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.