IEEE Embedded Systems Letters

Issue 1 • March 2015

Filter Results

Displaying Results 1 - 15 of 15
  • Table of contents

    Publication Year: 2015, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • IEEE Embedded Systems Letters publication information

    Publication Year: 2015, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Guest Editorial: Special Section on Embedded System Security

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (617 KB) | HTML iconHTML
    Freely Available from IEEE
  • Design and Operation of Secure Cyber-Physical Systems

    Publication Year: 2015, Page(s):3 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    This letter proposes a holistic framework for the design and operation of secure and reliable resource-constrained cyber-physical systems. The proposed framework combines control-theoretic methods, information security notions and computational models to characterize tradeoffs among different design and operation objectives. We quantify the intricate relation among control performance, system secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NoC-Based Protection for SoC Time-Driven Attacks

    Publication Year: 2015, Page(s):7 - 10
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    Systems-on-chip (SoCs) based on many core architectures can be attacked. Malicious processes can infer secrets from on-chip sensible traffic by evaluating the degradation on their communication performance. Such a threat rises from the resource sharing. In order to avoid such time-driven attacks, the network-on-chip (NoC) can integrate mechanisms to isolate different communication flows. In this l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems

    Publication Year: 2015, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Security has become a critical issue for automotive electronic systems. To protect against attacks, security mechanisms have to be applied, but the overhead of those mechanisms may impede system performance and cause violations of design constraints. To remedy this problem, we proposed an integrated mixed integer linear programming (MILP) formulation that is the first to address both security and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hibernus: Sustaining Computation During Intermittent Supply for Energy-Harvesting Systems

    Publication Year: 2015, Page(s):15 - 18
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (903 KB) | HTML iconHTML

    A key challenge to the future of energy-harvesting systems is the discontinuous power supply that is often generated. We propose a new approach, Hibernus, which enables computation to be sustained during intermittent supply. The approach has a low energy and time overhead which is achieved by reactively hibernating: saving system state only once, when power is about to be lost, and then sleeping u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Partially-Forgetful Memories for Approximate Computing

    Publication Year: 2015, Page(s):19 - 22
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    While the memory subsystem is already a major contributor to energy consumption of embedded systems, the guard-banding required for masking the effects of ever increasing manufacturing variations in memories imposes even more energy overhead. In this letter, we explore how partially-forgetful memories can be used by exploiting the intrinsic tolerance of a vast class of applications to some level o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling Dynamic Hard Real-Time Task Sets on Fully and Partially Reconfigurable Platforms

    Publication Year: 2015, Page(s):23 - 26
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    Reconfigurable systems are increasingly being employed in a large class of today's heterogeneous real-time embedded systems which often demand satisfaction of stringent timeliness constraints. However, executing a set of hard real-time applications on reconfigurable systems such that all timing constraints are satisfied while also allowing efficient resource utilization requires effective scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task-Aware Interrupt Controller: Priority Space Unification in Real-Time Systems

    Publication Year: 2015, Page(s):27 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    In the development of real-time systems, predictability is often hindered by technological factors which break the timing abstractions offered by real time operating systems (RTOSs); namely, the priority space separation between threads and interrupts induces the rate-monotonic problem. Software approaches have tackled this issue, attempting to unify the priority space with varying degrees of succ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of On-chip Communications in Zynq-7000 All Programmable Systems-on-Chip

    Publication Year: 2015, Page(s):31 - 34
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (791 KB) | HTML iconHTML

    This letter analyses and compares on-chip interfaces for hardware/software communications in the Zynq-7000 all programmable systems-on-chip. Many experiments were carried out to evaluate the exchange of data between the processing system and the programmable logic through general-purpose and high-performance ports; the experiments were conducted for both standalone and Linux applications. The resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE membership can help you reach your personal goals

    Publication Year: 2015, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (2607 KB)
    Freely Available from IEEE
  • Expand your professional network with IEEE

    Publication Year: 2015, Page(s): 36
    Request permission for commercial reuse | PDF file iconPDF (2237 KB)
    Freely Available from IEEE
  • IEEE Embedded Systems Letters information for authors

    Publication Year: 2015, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • [Blank page - back cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Embedded Systems Letters (ESL), provides a forum for rapid dissemination of latest technical advances in embedded systems and related areas in embedded software.

Full Aims & Scope

Meet Our Editors

EDITOR-IN-CHIEF
Sri Parameswaran
School of Computer Science and Engineering
University of New South Wales

DEPUTY EDITOR-IN-CHIEF
Tulika Mitra
School of Computing
National University of Singapore