IEEE Embedded Systems Letters

Issue 1 • March 2017

Filter Results

Displaying Results 1 - 10 of 10
  • Table of contents

    Publication Year: 2017, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (373 KB)
    Freely Available from IEEE
  • IEEE Embedded Systems Letters publication information

    Publication Year: 2017, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (769 KB) | HTML iconHTML

    Computational complexity of public key cryptography over sensor nodes is not anymore a blocking concern in modern devices which natively (and efficiently) support elliptic curve cryptography. The problem has rather shifted toward the significant airtime consumption required to exchange multiple messages and certificates so as to perform authentication and key agreement. This letter addresses such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Autonomous Vehicle Software in the Virtual Prototyping Environment

    Publication Year: 2017, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    Modern vehicle is equipped with autonomous features, such as precollision system or adaptive cruise control to help people perform driving in a safer and more convenient way. The software complexity of those autonomous features is growing to accommodate various needs from users, which makes it more difficult to test their correctness. Virtual prototyping allows one to test the vehicle software in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Faster Algorithm for Enumerating Connected Convex Subgraphs in Acyclic Digraphs

    Publication Year: 2017, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    Subgraph enumeration is one of the most crucial steps involved in the custom instruction identification for application-specific instruction set processors. Generating all connected convex subgraphs from an acyclic digraph is a computationally difficult problem. In this letter, we propose a simple and fast algorithm for enumerating all connected convex subgraphs in acyclic digraphs. Experimental r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspective Paper—Can AC Computing Be an Alternative for Wirelessly Powered IoT Devices?

    Publication Year: 2017, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (961 KB) | HTML iconHTML

    An alternative computing paradigm is explored in this letter with application to wirelessly powered Internet of Things (IoT) devices. Contrary to existing methods that rely on DC computing, the wirelessly harvested AC power is directly used for computation by leveraging charge-recycling theory. The proposed approach has the potential to significantly reduce the energy cost, one of the primary barr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate Measurement of Small Execution Times—Getting Around Measurement Errors

    Publication Year: 2017, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Engineers and researchers often require accurate measurements of small execution times or duration of events in a program. Errors in the measurement facility can introduce important challenges, especially when measuring small intervals. Mitigating approaches commonly used exhibit several issues; in particular, they only reduce the effect of the error, and never eliminate it. In this letter, we pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synergistic Approximation of Computation and Memory Subsystems for Error-Resilient Applications

    Publication Year: 2017, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (671 KB) | HTML iconHTML

    Approximate computing is a new design paradigm that exploits the intrinsic error resilience exhibited by emerging applications to significantly improve their energy efficiency and performance. Prior work in this domain has proposed approximation techniques targeting either the computational subsystem or the memory subsystem. For the first time, this letter proposes a methodology to perform synergi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Embedded Systems Letters information for authors

    Publication Year: 2017, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Blank page

    Publication Year: 2017, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Embedded Systems Letters (ESL), provides a forum for rapid dissemination of latest technical advances in embedded systems and related areas in embedded software.

Full Aims & Scope

Meet Our Editors

EDITOR-IN-CHIEF
Sri Parameswaran
School of Computer Science and Engineering
University of New South Wales

DEPUTY EDITOR-IN-CHIEF
Tulika Mitra
School of Computing
National University of Singapore