Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Software Technologies for Future Embedded Systems, 2003. IEEE Workshop on

Date 15-16 May 2003

Filter Results

Displaying Results 1 - 25 of 25
  • SCA-based component framework for software defined radio

    Publication Year: 2003 , Page(s): 3 - 6
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    SCA (Software Communication Architecture), which has been adopted as a SDR (Software Defined Radio) Forum standard, provides a framework that successfully exploits common design patterns of embedded systems software. However, the SCA is inadequate as a component framework since it does not explicitly specify (1) a component model that defines how to express a component interface and how to implement it, (2) a package model that defines what and how to package in deployment units, and (3) a deployment model that defines the deployment environment and deployment process. We propose a SCA-based component framework for SDR. Specifically, we present: (1) a component model that defines a component as a specialized CORBA object that implements object management functionality, (2) a package model exploiting the existing XML descriptors of the SCA, and (3) a deployment model that defines a SCA-based deployment environment with a boot-up process to restore the deployment state and a deployment process supporting lazy application instantiation and dynamic component replacement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware/software co-configuration for multiprocessor SoPC (work-in-progress report)

    Publication Year: 2003 , Page(s): 7 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    Real-time operating systems (RTOS) for multiprocessor systems built on a single FPGA should be configurable to a wide rage of architecture. Because the configuration of RTOS depends on hardware architecture, it is advantageous to co-configure multiprocessor architecture and RTOS simultaneously. The paper is a work-in-progress report of our research on configurable RTOS and co-configuration technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • uBlocks: enabling hand-made distributed application among ubiquitous embedded devices

    Publication Year: 2003 , Page(s): 57 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2466 KB)  

    Increase of future appliances in the home environment causes confusion with less computer-skilled users. Consequently, embedded-hardware could prevent us from recognizing all of them by ourselves. Furthermore, wireless connection among embedded devices also makes users not have a clear grasp of which kind of application is running among them. This kind of user unawareness should make the rate of embedded ubiquitous systems into the home slow. To overcome the abovementioned issues, we have developed uBlocks which enables visual hand-made composition of software component applications among heterogeneous devices by users themselves. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for a component framework of future ubiquitous computing

    Publication Year: 2003 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    System software for future computing environments is becoming more complex and heterogeneous. Portability is becoming one of the important properties of future system software. Component-based systems contribute to the portability issues. However component behaviors cause dependencies among components and thus prevent consistent system compositions. We have built a component-based Java virtual machine and tried three configurations with components in order to investigate the inter-component dependencies and the effect of the component behaviors. Also, this paper proposes requirements for a component framework for future ubiquitous computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A power-aware, best-effort real-time task scheduling algorithm

    Publication Year: 2003 , Page(s): 21 - 28
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    In this paper, we present a power-aware, best-effort real-time task scheduling algorithm called PA-BTA that optimizes real-time performance and power consumption. The algorithm considers a timeliness model where task timing constraints are described using Jensen's (1992) benefit functions and a system-level power model. We propose a metric called "energy and real-time performance grade" (ERG) to measure real-time performance and power consumption in a unified way. Since the scheduling problem is NP-hard, PA-BTA heuristically computes schedules to maximize ERG, incurring a worst-case computational cost of O(n2). Our simulation results indicate that the algorithm performs close to the optimal algorithm and better than other algorithms considered in the study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible group protocol for distributed systems

    Publication Year: 2003 , Page(s): 97 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (305 KB) |  | HTML iconHTML  

    The group protocol has to support applications with enough quality (QoS) of service in change of QoS supported by the underlying network and QoS requirements of applications. A flexible group service is supported for applications by cooperation of multiple autonomous agents. Each agent dynamically and autonomously takes a class of each protocol function like retransmission in change of QoS supported by networks and required by applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new defining approach for software requirement specifications

    Publication Year: 2003 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (463 KB)  

    Due to business demands including cost cutting and schedule shortening, we see many software development projects that directly make software specifications without writing requirement specification. Such projects have many problems. This paper describes the ZC method which defines the requirement specification by visualizing the requirement features. In the ZC method, the objects to be developed are circled, and the relation among the objects are defined by lines: our empirical study discovered that a single A4 paper represents approximately 10 KLOC. We confirmed that the ZC method allows software engineers to easily and precisely define the user requirement. The ZC method is at the experimental stage, and we attempt it in the actual projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for development of multimedia applications based on the TMO structuring scheme

    Publication Year: 2003 , Page(s): 35 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2382 KB)  

    The multimedia streaming technology is a computing technology that can transport and process time-based media such as audio and video on a network. Particularly, in order to support high quality streaming services, stream synchronization that includes inter-media, intra-media, and lip synchronizations should be guaranteed. In this paper, we present a framework for development of multimedia applications based on the TMO (Time-triggered Message-triggered Object) structuring scheme. The purpose of this framework is twofold. Firstly, the framework helps developers to design complex distributed real-time multimedia applications. Secondly, it provides timely streaming facilities. In order to achieve these goals, MMStream TMO, a special form of a TMO, is designed. MMStream TMO which performs stream I/O and transformation is used to guarantee stream synchronization and easily abstract a complex distributed multimedia system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization scheme for streaming service using coordination agent in Multimedia Messaging Service Environment

    Publication Year: 2003 , Page(s): 43 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB)  

    The legacy Multimedia Messaging Service (MMS) Environment does not consider transmitting streaming data when many users demand simultaneously. The MMS relay/server and streaming server overload when transmitting streaming data continuously to users simultaneously. Therefore its networks and MMS relay performance may go down and additional delay of streaming data occurs. Consequently, uninterrupted delivery cannot be provided to users requiring high-quality service. In order to provide streaming service efficiently, we propose the optimal connection mechanism using the MMS proxy and the coordination agent (CA) in the MMS environment. MMS proxies are responsible for user requests and the CA is used to select the optimal MMS proxy among all the proxies. So, the CA has the list table about the state of proxies and updates it to keep accurate state information about proxies. On the client side, retransmission should take place before the starvation occurs. So, the client regards retransmission as a fault in the proxy when streaming data is not received from the MMS proxy before the starvation. The client should request the CA information on another MMS proxy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded software architecture for connected multimedia services in ubiquitous network environment

    Publication Year: 2003 , Page(s): 61 - 64
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    In this paper, we present a novel software architecture providing the connected multimedia services through networked embedded systems. The connected multimedia service means that a multimedia session is preserved even though an end-user moves from one computing environment to others. For getting the immediate multimedia services, all that he has to do is to carry a small mobile pad, such as PDA or cellular telephone, which shows a list of devices that he can use as I/O devices of the on-going multimedia session. He does not have to re-setup the session. When he clicks and selects the proper devices among the devices listed on the pad, the session is immediately migrated to the selected device. We, in this paper, present our novel mechanism using well-developed and commercialized protocols such as SIP and X.10 to support this new paradigm of ubiquitous multimedia services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A development of remote tracepoint debugger for run-time monitoring and debugging of timing constraints on Qplus-P RTOS

    Publication Year: 2003 , Page(s): 93 - 96
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    In this paper, we present a new tracepoint debugging tool for microcomputer embedded systems, e.g., information appliances, which facilitates the instrumentation of the Qplus-P RTOS applications with timing constraints. Compared with traditional breakpoint debugger, our tracepoint debugger provides the ability to dynamically collect and record application data for online examination and for further off-line analysis. And, each tracepoint can provide the means for assigning new values to the running application's variables, without either halting its execution or interfering with its natural execution flow. In particular, our tracepoint debugger is different from previous ones in that we can specify and detect the timing violations using RTL (Real-Time Logic) trace experiments. Using our tracepoint debugger, the user is able to place the RTL tracepoints in his program. For each tracepoint, the user can specify the data to be collected or monitored using C in-line statements as well as RTL-expressions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOLPHIN: an autonomous indoor positioning system in ubiquitous computing environment

    Publication Year: 2003 , Page(s): 53 - 56
    Cited by:  Papers (38)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2318 KB)  

    Determining physical location of indoor objects is one of the key issues in development of context-aware applications in ubiquitous computing environments. This is mainly because context information obtained from sensor networks is meaningful only when the physical location of the context information source is determined. Recently, several indoor location information systems, such as Active Bat and Cricket, have been developed for precise indoor object localization. However, to provide accurate physical location tracking in large-scale space, those systems requires a lot of manual configuration for all the ultrasonic sensor nodes. To reduce configuration costs, we developed a new indoor positioning system called DOLPHIN. The DOLPHIN system consists of distributed wireless sensor nodes which are capable of sending and receiving RF and ultrasonic signals. These nodes are attached to various indoor objects. And using a novel distributed positioning algorithm in the nodes, DOLPHIN enables autonomous positioning of the objects with minimal manual configuration. This paper describes the design and implementation of the DOLPHIN system, and evaluates basic performance through several experiments in an indoor environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal probabilistic refinement verification of embedded real-time systems

    Publication Year: 2003 , Page(s): 79 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (357 KB) |  | HTML iconHTML  

    Generally, real-time systems have been specified using timed automata, and moreover model-checking methods of timed automata have been developed. On the other hand, recently, probabilistic timed automata have been developed in order to express the relative likelihood of the system exhibiting certain behavior. In this paper, we develop a verification method of the simulation relation of probabilistic timed automata, and apply this method into stepwise refinement developments of real-time systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of transactional agents

    Publication Year: 2003 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    Mobile agents move around object servers to locally manipulate objects. A transactional agent is an agent which manipulates objects in one or more than one object server so as to satisfy some constraints. There are some types of constraints depending on applications like traditional atomicity. There are other constraints like at-least-one constraint where a transaction can commit if at least one object server is successfully manipulated. We discuss how transactional agents with types of constraints can commit. We discuss the way in which to implement transactional agents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS management in multimedia networking for telemedicine applications

    Publication Year: 2003 , Page(s): 39 - 42
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (346 KB) |  | HTML iconHTML  

    Networked multimedia information systems will play a critical role for the emerging telemedicine applications. Innovations in hardware and software technologies are feeding this revolution. In this paper, the notion of quality of service (QoS) for communication of telemedicine multimedia data is presented. Key multimedia data synchronization requirements are elaborated upon and several synchronization protocols are discussed. We also elaborate the issues of managing pre-orchestrated as well as live videoconference multimedia data for telemedicine applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error resilient video transmission over wireless networks

    Publication Year: 2003 , Page(s): 31 - 34
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (535 KB)  

    An error resilient architecture for video transmission over mobile wireless networks is presented. Radio link layer, transport layer, and application layer are combined to deal with high error rate in wireless environments. The algorithms for both sender and receiver are given. An adaptive algorithm is presented to automatically adjust parity data length in error control. The performance of the proposed algorithm is analyzed through experimental studies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software infrastructure for sentient materials

    Publication Year: 2003 , Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (517 KB)  

    In the future, every material will contain a computer and become smart. We call these materials sentient materials. Sentient materials can communicate with each other and change behavior according to their surrounding environments. However, current infrastructures such as the Internet are not suitable for building the infrastructure for supporting sentient materials. The paper especially describes two issues for building software infrastructures for supporting sentient materials. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clock synchronization in wireless distributed embedded applications

    Publication Year: 2003 , Page(s): 101 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (291 KB) |  | HTML iconHTML  

    Keeping distributed clocks closely synchronized is one of the basic requirements in wireless embedded applications. In the context of wireless applications, a clock synchronization protocol must tolerate message losses and should have a low communication overhead. The purpose of this paper is to present a clock synchronization protocol for distributed embedded systems in wireless environments. Our protocol adopts the master/slave structure based on a time transmission protocol and uses a drift correction algorithm for clock synchronization. The master node broadcasts synchronization messages through access point. The slave node estimates the master clock using the time transmission protocol and adjusts its virtual clock based on the continuous clock synchronization. Another advantage of the proposed protocol is that it uses a linear number of messages by transmitting one synchronization message in each resynchronization round and tolerates message losses. The protocol is implemented and tested in a Windows NT and a WinCE. Its measurements indicate that the PC node and PDAs can be kept synchronized within the deviation bound of 8 milliseconds. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMO-structured cluster-based real-time management of location data on massive volume of moving items

    Publication Year: 2003 , Page(s): 89 - 92
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (585 KB)  

    A major challenge in the field of location based service (LBS) system engineering, is to establish a highly scalable system architecture which can be instantiated in moderate-size configurations handling thousands of moving items as well as in upper-end configurations handling millions of moving items. We are exploring an approach of using a cluster of database server nodes and effecting efficient distributed and parallel computing in both real-time update of location records of moving items and processing of location-related queries. The approach of developing efficient middleware which is layered on a cluster of nodes running commercial off-the-shelf database servers, has been adopted. The middleware design is substantially based on the TMO scheme for real-time distributed object programming and real-time distributed computing system design, which enables low-overhead coordination of distributed computations and highly abstract distributed programming styles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding timing problems in real-time software

    Publication Year: 2003 , Page(s): 75 - 78
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    To safely establish the correct timing of a real-time processing node, adequate architectural structures have to be used. This refers to the hardware architecture of the processing node as well as the software architecture of its operating system and application software. This paper presents architectures that allow for a well structured and simple timing analysis. First, it presents solutions for cleanly splitting the overall timing analysis into schedulability analysis and task worst-case execution time analysis. Second, it presents a programming strategy that yields software that is highly temporally predictable and easy to analyze for its worst-case execution time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing priority inheritance semaphore on uC/OS real-time kernel

    Publication Year: 2003 , Page(s): 83 - 86
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    In a preemptive priority based RTOS, the priority inversion problem is among the major sources of deadline violations. The priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS cannot support the priority inheritance protocol since it does not allow the kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as the priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement the priority inheritance semaphore on the modified kernel. As a result, we port the new kernel with the priority inheritance semaphore to an evaluation board, and evaluate the execution time of each kernel service as well as verifying the operation of our implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new architecture for home computing

    Publication Year: 2003 , Page(s): 71 - 74
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2705 KB)  

    Currently, many companies have been working to build home servers that manage home appliances in our houses. However, the approach is not appropriate for future ubiquitous computing environments because it is very difficult to allow us to use home appliances in a seamless way when we move at several places. We propose a new architecture called personal home server. In our approach, each user has a home server and customizes the way to use these appliances according to his preferences and situations. The approach is very helpful for building future domestic environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a specification scheme for context-aware security policies for networked appliances

    Publication Year: 2003 , Page(s): 65 - 68
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    This paper describes a secure execution scheme for mobile programs running in networked appliances. The potential threat we are considering is the malicious behaviour of the mobile programs. Our security architecture, called Taurus-1, adopts monitored execution as a basic mechanism for enforcing security policies at runtime. To describe a policy for this architecture, we designed an algebraic policy description language Polaris, in which we can specify a policy as a process consisting of abstract events in a monitored program. The program is modified beforehand for effective detection of its malicious behaviour We discuss how Taurus-1 can provide a security enhancement mechanism for context-aware systems such as networked appliances, and discuss how to specify security policies for them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings IEEE Workshop on Software Technologies for Future Embedded Systems. WSTFES 2003

    Publication Year: 2003
    Save to Project icon | Request Permissions | PDF file iconPDF (312 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2003 , Page(s): 105
    Save to Project icon | Request Permissions | PDF file iconPDF (152 KB)  
    Freely Available from IEEE