By Topic

2009 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications

Date 24-26 Aug. 2009

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (282 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization Committee

    Publication Year: 2009, Page(s):xi - xiii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Branch Target Buffers: WCET Analysis Framework and Timing Predictability

    Publication Year: 2009, Page(s):3 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    One step in the verification of hard real-time systems is to determine upper bounds on the worst-case execution times (WCET) of tasks. To obtain tight bounds, a WCET analysis has to consider microarchitectural features like caches, branch prediction, and branch target buffers (BTB). We propose a modular WCET analysis framework for branch target buffers (BTB), which allows for easy adaptability to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Parametric WCET Calculation

    Publication Year: 2009, Page(s):13 - 21
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Static WCET analysis is a process dedicated to derive a safe upper bound of the worst-case execution time of a program. In many real-time systems, however, a constant global WCET estimate is not always so useful since a program may behave very differently depending on its configuration or mode. A parametric WCET analysis derives the upper bound as formula rather than a constant. This paper present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow Analysis on Intermediate Source Code for WCET Estimation of Compiler-Optimized Programs

    Publication Year: 2009, Page(s):22 - 27
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Many WCET analysis tools developed in academia integrate WCET analysis into program compilation, either to transform flow information extracted from the source code level to the object code level, or to perform flow analysis on a special intermediate representation. This integration increases analysis complexity, forces software developers to use a special compiler, and thus, strongly limits the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Hinting: Real-Time Resource Management in Wireless Sensor/Actor Networks

    Publication Year: 2009, Page(s):31 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB) | HTML iconHTML

    Increasing complexity of today's WSAN applications can rapidly result in reduced real-time capabilities of the underlying sensor nodes. Using preemptive operating systems is one way to retain acceptable reactivity within highly dynamic environments but commonly leads to severe resource management problems. We present the dynamic hinting approach for maintaining good system reactivity by efficient ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-path Planning for Mobile Element to Prolong the Lifetime of Wireless Sensor Networks

    Publication Year: 2009, Page(s):41 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Mobile elements, which can traverse the deployment area and convey the observed data from static sensor nodes to a base station, have been introduced for energy efficient data collection in wireless sensor networks (WSNs). However, most existing solutions only plan a single path for the mobile element, which may lead to quick energy depletion for the sensor nodes that are far away from the path. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PLL Based Time Synchronization in Wireless Sensor Networks

    Publication Year: 2009, Page(s):51 - 56
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Time synchronization is a key component in numerous wireless sensor network applications. Most of the current software based time synchronization approaches suffer from communication overhead and lack of scalability. In this paper, we propose a hardware based approach based on voltage controlled crystal oscillator and phase locked loop techniques to achieve and maintain sub microsecond level time ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Service Allocation in Hardware Using Credit-Controlled Static-Priority Arbitration

    Publication Year: 2009, Page(s):59 - 68
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    Resources in contemporary systems-on-chip (SoC) are shared between applications to reduce cost. Access to shared resources is provided by arbiters that require a small hardware implementation and must run at high speed. To manage heavily loaded resources, such as memory channels, it is also important that the arbiter minimizes over allocation. A Credit-Controlled Static-Priority (CCSP) arbiter com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero-Buffer Inter-core Process Communication Protocol for Heterogeneous Multi-core Platforms

    Publication Year: 2009, Page(s):69 - 78
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Executing functional components in pipeline on heterogeneous multi-core platforms can greatly improve the parallelism but require great amount of data communication among processes and threads. Our studies showed that existing inter-process/thread communication protocols consist of many unnecessary memory copies and prolong the execution of the applications on heterogeneous multi-core platforms. N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Component-Based Development and High-Integrity Real-Time Systems

    Publication Year: 2009, Page(s):79 - 84
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Component-based development approaches are becoming commonplace in business applications: they must therefore have some merit. In striking contrast to that, their penetration in the industrial practice of high-integrity real-time systems is virtually nil. This oddity needs explaining. In this paper we reflect on the presumed reasons of this situation and elaborate on possible systematic remedies. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Hardware Support for Common Sensor Processing Tasks

    Publication Year: 2009, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Sensor processing is a common task within many embedded system domains, such as in control systems, the sensor feedback is used for actuator control. In this paper we have surveyed several embedded system domains, and extracted kernels of computation that are common across applications within a given domain, or across domains. We have shown that adding architectural support for executing these com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • F-Model: Model of Modular Robot Based on Functional Component

    Publication Year: 2009, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5197 KB) | HTML iconHTML

    With the rapid development of robot technology, It is becoming increasingly difficult to design and maintain robot systems. This makes it necessary to reuse hardware and software modules to lower the difficulty and the cost for the robot system design. In this paper we present a model of modular robot-F-Model. It uses functional component modules to construct function-oriented robot applications. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component Replication Based on Failover Units

    Publication Year: 2009, Page(s):99 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Although component middleware is increasingly used to develop distributed, real-time and embedded (DRE) systems, it poses new fault tolerance challenges, such as the need for efficient synchronization of internal component state, failure correlation across groups of components, and configuration of fault-tolerance properties at the component granularity level. This paper makes two contributions to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Assignment of Real-Time Systems into Multi-context Dynamically Reconfigurable Processors

    Publication Year: 2009, Page(s):109 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    In this paper, we focus on the problem of implementing a periodic concurrent system with timing constraints into multi-context dynamically reconfigurable processors (DRP). A concurrent system has multiple tasks that can be executed in parallel. Moreover, some tasks in a specific set of processes might be required to synchronize each other. We propose a method for assigning tasks into a multi-conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Processing of Real-Time Multi-item Requests with Network Coding in On-demand Broadcast Environments

    Publication Year: 2009, Page(s):119 - 128
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    On-demand broadcast is an effective wireless data dissemination technique to enhance system scalability and capability to handle dynamic user access patterns. Traditional on-demand broadcast is under the assumption that only one data item can be retrieved by mobile clients in each time unit. However, the above constraint limits bandwidth utilization and throughput of broadcast systems. In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Model-Based Optimisations of Real-Time Systems, an Application with the AADL

    Publication Year: 2009, Page(s):129 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Model driven engineering provides facilities to tackle complexity in real-time systems, from early requirements capture to validation & verification down to code generation. We note that models are built from a system perspective, and resources are allocated to meet communication, energy or scheduling constraints. Yet, it is seldom optimal. In this paper, we explore transformations applied at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Periodic and Aperiodic Communication Techniques for Responsive Link

    Publication Year: 2009, Page(s):135 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Responsive Link, an ISO/IEC communication standard, provides many functional capabilities for distributed realtime systems. This paper is focused on periodic and aperiodic communication techniques for Responsive Link. In periodic communication, the priority is assigned to each packet so that the network utilization is improved. A schedulability test for connection establishments is also derived to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.