2010 10th International Conference on Application of Concurrency to System Design

21-25 June 2010

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (111 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organisation

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Programme Committee

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Automated Synthesis of Instruction Codes in the Context of Micro-architecture Design

    Publication Year: 2010, Page(s):3 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (973 KB) | HTML iconHTML

    There is a critical need for design automation in micro architectural modelling and synthesis. One of the areas which lacks the necessary automation support is synthesis of instruction codes targeting various design optimality criteria. This paper aims to fill this gap by providing a formal method and software tool for synthesis of instruction codes given the description of a processor as a set of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STG Decomposition: Internal Communication for SI Implementability

    Publication Year: 2010, Page(s):13 - 23
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Logic synthesis of speed independent circuits based on STG decomposition is a promising approach to tackle complexity problems like state-space explosion. Unfortunately, decomposition can result in components that in isolation have irreducible CSC conflicts. Generalising earlier work, we show how to resolve such conflicts by introducing internal communication between the components. The new algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Complete Synthesis Method for Block-Level Relaxation in Self-Timed Datapaths

    Publication Year: 2010, Page(s):24 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3584 KB) | HTML iconHTML

    Self-timed circuits present an attractive solution to the problem of process variation. However, implementing self-timed combinational logic can be complex and expensive. This paper presents a complete synthesis flow that generates self-timed combinational networks from conventional Boolean networks. The Boolean network is partitioned into small function blocks which are then synthesised using sel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wagging Logic: Implicit Parallelism Extraction Using Asynchronous Methodologies

    Publication Year: 2010, Page(s):35 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Asynchronous circuits have a number of potential performance advantages over their synchronous equivalents due to the ability to exploit average case performance. These advantages are offset by the loss of performance caused by the handshaking overheads which causes designs to be throughput bound. This paper investigates the nature of the throughput problem and proposes a novel automatic approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From POOSL to UPPAAL: Transformation and Quantitative Analysis

    Publication Year: 2010, Page(s):47 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    POOSL (Parallel Object-Oriented Specification Language) is a powerful general purpose system-level modeling language. In research on design space exploration of motion control systems, POOSL has been used to construct models for performance analysis. The considered motion control algorithms are characterized by periodic execution. They are executed by multiple processors, which are interconnected ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach

    Publication Year: 2010, Page(s):57 - 66
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asynchronous Routing Algorithm for Clos Networks

    Publication Year: 2010, Page(s):67 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    Clos networks provide the theoretically optimal solution to build high-radix switches. This paper proposes a novel asynchronous routing algorithm for general asynchronous three-stage Clos networks. As the major sub-algorithm controlling the first two stages, the asynchronous dispatching algorithm outperforms the synchronous concurrent round-robin dispatching algorithm in behaviour level simulation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness of Sequential Circuits

    Publication Year: 2010, Page(s):77 - 84
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environment. This environment cannot be entirely captured and can provide inaccurate input data to the component. It is thus important for digital components to have a robust behavior, i.e. the presence of a small change in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Performance Evaluation of Mobile Ad Hoc Network Protocols

    Publication Year: 2010, Page(s):85 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network layers, and the underlying dynamic topology. The link connectivity model, which implicitly models node mobility, specifies link up and down lifetimes. We use so-called constrained labeled multi-transition systems (CLMSs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Model Checking of PSL Safety Properties

    Publication Year: 2010, Page(s):95 - 104
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language. The approach can also be used as a sound bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cut-Offs with Network Invariants

    Publication Year: 2010, Page(s):105 - 114
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    We consider the multi-parameterised process algebraic verification of safety properties. There is a cut-off result for such verification tasks, but it cannot be naturally applied to systems involving linear parts. We show how the limitation can be overcome by computing a network invariant for each linear part and including all the processes obtained during the computation in the system model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Order-Independence of Vector-Based Transition Systems

    Publication Year: 2010, Page(s):115 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Semantics of many specification languages, particularly those used in the domain of hardware, is described in terms of vector-based transition systems. In such a transition system, each macro-step transition is labeled by a vector of inputs. When performing a macro-step, several inputs may potentially change. Each macro-step can thus be decomposed in a number of micro-steps, taking one input chang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • polyDD: Towards a Framework Generalizing Decision Diagrams

    Publication Year: 2010, Page(s):124 - 133
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Decision Diagrams are now widely used in model checking as extremely compact representations of state spaces. Many Decision Diagram categories have been developed over the past twenty years based on the same principles. Each one targets a specific domain with its own characteristics. Moreover, each one provides its own definition. It prevents sharing concepts and techniques between these structure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment

    Publication Year: 2010, Page(s):137 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    The ANR project SPaCIFY develops a domain-specific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based modeling environment which supports all aspects of aerospace software design. As such, it is a domain-specific environment consisting of heterogeneous modeling and programming principles defined in collaboration with the industrial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster Software Synthesis Using Actor Elimination Techniques for Polychronous Formalism

    Publication Year: 2010, Page(s):147 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    A visual polychronous formalism called Multi-Rate Instantaneous Channel Connected Data Flow (MRICDF)was developed in. In, a visual environment called EmCodeSyn was introduced which performs software synthesis from MRICDF models. The synthesis technique replaced clock calculus technique germane to previous polychronous approaches such as SIGNAL with a top down technique based on computing the Prime... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formal Semantics of Clock Refinement in Imperative Synchronous Languages

    Publication Year: 2010, Page(s):157 - 168
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    The synchronous model of computation divides the execution of a program into an infinite sequence of so-called macro steps, which are further divided into finitely many micro steps. Since all threads of a program are forced to run in lockstep, programmers have no means to express the independence of parallel threads, which leads to a phenomenon called over-synchronization. In this paper, we theref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.