16-18 Dec. 2005
Filter Results
-
Second International Conference on Embedded Software and Systems - Cover
Publication Year: 2005, Page(s): c1
|
PDF (160 KB)
-
ICESS 2005. Second International Conference on Embedded Software and Systems
Publication Year: 2005
|
PDF (108 KB)
-
Second International Conference on Embedded Software and Systems - Copyright
Publication Year: 2005, Page(s): iv
|
PDF (95 KB)
-
Second International Conference on Embedded Software and Systems - Table of contents
Publication Year: 2005, Page(s):v - xii
|
PDF (116 KB)
-
Keynote speakers
Publication Year: 2005, Page(s):xiii - xviiProvides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»
-
-
Organizers
Publication Year: 2005, Page(s): xix
|
PDF (67 KB)
-
Program/Technical Committee
Publication Year: 2005, Page(s):xx - xxii
|
PDF (62 KB)
-
-
Reducing conflicts in SMT VLIW processor for higher throughput
Publication Year: 2005
Cited by: Patents (4)Cache misses and insufficient instruction-level parallelism (ILP) in a single program make functional units of VLIW (very long instruction word) processor underused. Simultaneous multithreading (SMT) technology is one of the best choices to improve the utilization of functional units in processors, since it can convert thread-level parallelism (TLP) to ILP. Previous work investigate how to incorpo... View full abstract»
-
An embedded system architecture for acoustic signal capturing and orientation
Publication Year: 2005
Cited by: Papers (1)For the light weight acoustic reconnaissance applications, an embedded architecture design including hardware and software is proposed in this paper. The novel architecture model is based on dual-DSP in which master DSP cooperates with slave DSP to speed up the data processing while keeping low power consumption. This paper especially focuses on the hard and software implementations of this model.... View full abstract»
-
Design of data-path for a VLIW media coprocessor
Publication Year: 2005A design study of data-path for a VLIW media coprocessor is presented. The VLIW coprocessor executes the kernels in media applications, and has great impact on the performance of the media processor. To explore the architecture tradeoff at early stage, we proposed three architecture models, and hand scheduled three typical kernels onto the models, with the instruction set simulator, we evaluated a... View full abstract»
-
The design and analysis of a high performance embedded external memory interface
Publication Year: 2005
Cited by: Papers (3)This paper introduces several important methods to design the embedded external memory interface (EMIF) for a high performance DSP (digital signal processor). Starting with the design specification of the EMIF, this paper introduces four important new design methods, i.e. width-scalable accessing, data buffers based on asynchronous FIFOs, token cycle method for priority arbitration, and preferenti... View full abstract»
-
Hybrid RAID-tape-library storage system for backup
Publication Year: 2005
Cited by: Papers (1) | Patents (2)Traditional tape back-up systems have begun to wear out their welcomes in some businesses, which are turning to the virtual tape technologies. The virtual tape technologies combine the traditional backup methodology with the disk drive technology to create a disk-based library that acts as a tape library. In concert with the traditional backup software from vendors, the virtual tape libraries writ... View full abstract»
-
A unified architecture for crypto-processing in embedded systems
Publication Year: 2005
Cited by: Papers (2)Security is an emerging concern in the design of embedded systems. Various side channel attacks must be tackled by the implementation of secure embedded system. This paper proposes a unified architecture of crypto-processor that can resist probing attacks of internal bus and memory. Private keys are maintained within the execution unit to reduce the possibility of leakage during cryptographic oper... View full abstract»
-
Supports for components loading and binding at boot-time for component-based embedded operating systems
Publication Year: 2005This paper presents the process of boot-time components loading and binding for TICK, a component-based embedded operating system targeted at resource-constrained devices. Based on the memory configuration information exported from the hardware abstraction layer, service components are loaded one-by-one through a configurable tunnel between the target and a hosting machine. Since the relocation in... View full abstract»
-
A remote wire/wireless video monitor system using HW/SW co-scheduling RTOS
Publication Year: 2005The remote wire/wireless video monitor system (RWVMS) is a video monitor and control system developed successfully by NEUINFO. RWVMS consists of several sub-systems each of them forming a complex independent component. RWVMS covers the task controlling, configuring and monitoring of the system. Since the experiment will be running in a radiation environment, fault tolerance, error correction and s... View full abstract»
-
An embedded firewall based on network processor
Publication Year: 2005
Cited by: Patents (8)A design of firewall system using Intel IXP425 network processor (NP) based embedded platform is proposed in this paper. Intel IXP425 network processor is a highly integrated processor. It has three network processor engines (NPEs), which offload most of the computational intensive network data operations, and one of its NPE is designed with hardware support for some of the widely used encryption ... View full abstract»
-
Architecturally reconfigurable development of mobile games
Publication Year: 2005
Cited by: Papers (3)Mobile game development must face the problem of multiple hardware and software platforms, which will bring large number of variants. To cut the development and maintenance efforts, in this paper, we present an architecturally reconfigurable software product line approach to develop mobile games. Mobile game domain variants could be handled uniformly and traced across all kinds of software assets.... View full abstract»
-
Design and implementation of an agile kernel component runtime
Publication Year: 2005In this paper, we describe ARMOR, an Agile keRnel coMpOnent Runtime which seeks to greatly enhance operating system reliability and performance at the same time. ARMOR is made up of AKE, Agile Kernel Engine which is implemented in kernel, and system servers which are user processes. In ARMOR, the kernel functions are encapsulated through component and can be loaded both into kernel address space f... View full abstract»
-
Software architecture for a multi-protocol RFID reader on mobile devices
Publication Year: 2005
Cited by: Papers (5)In RFID (radio frequency identification) systems, a tag reader or a tag interrogator communicates with tags, reads their identification codes, and accesses their related database through a network infrastructure. There are many research activities in RFID hardware systems, but there is few in software infrastructure, especially on mobile devices. This paper presents software architecture and imple... View full abstract»
-
A new embedded car theft detection system
Publication Year: 2005
Cited by: Papers (1)A new embedded car theft detecting system has been introduced in this paper. This system is based upon machine vision technology, acids a new level of car theft detecting, and it is no intrusive on the drivers. This system uses face detecting and recognition technology. When the unauthorized driver is driving the car, it will detect him and alarm by sending his image to police or car owner. View full abstract»
-
Efficiency metrics model for component-based embedded application software
Publication Year: 2005
Cited by: Papers (2)This paper develops efficiency metrics model to support application-level evaluation of embedded system resource utilization. In particular, we address the efficiency metrics of embedded application software running on a component-based embedded system. Efficiency analysis and estimate are, therefore, essential and critical during the design and integration of embedded application software, to est... View full abstract»
-
A micro-component architecture approach for next generation embedded browsers
Publication Year: 2005
Cited by: Papers (3)The mobile Internet adds the new multi-media features and takes a convergence to the wired Internet. The emerging diversity of the content languages adds a new challenge as well as the sustained challenge from the diversity of the execution environments. The author describes the mobile Internet evolution from the browser viewpoint in the three-stage model. After describing the focus shift during t... View full abstract»
-
Design of wireless gateway communication protocol for distributed monitoring systems
Publication Year: 2005
Cited by: Papers (1)This paper is concerned with the problems of the wireless gateway communication protocol for distributed monitoring systems. For large-scale monitoring systems, the wireless gateway is needed to improve the communicating ability. We present the framework of the wireless gateway protocol stacks, which can be used in embedded systems. By introducing the mechanism of segment caching and local retrans... View full abstract»
Abstract