@Preamble{"\input bibnames.sty" #
"\ifx \undefined \pkg \def \pkg #1{{{\tt #1}}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-TECS = "ACM Transactions on Embedded Computing
Systems"}
@Article{Wolf:2002:III,
author = "Wayne Wolf",
title = "Introduction to the inaugural issue",
journal = j-TECS,
volume = "1",
number = "1",
pages = "1--1",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jacob:2002:ITS,
author = "Bruce Jacob and Shuvra Bhattacharyya",
title = "Introduction to the two special issues on memory",
journal = j-TECS,
volume = "1",
number = "1",
pages = "2--5",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Avissar:2002:OMA,
author = "Oren Avissar and Rajeev Barua and Dave Stewart",
title = "An optimal memory allocation scheme for
scratch-pad-based embedded systems",
journal = j-TECS,
volume = "1",
number = "1",
pages = "6--26",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chen:2002:TGC,
author = "G. Chen and R. Shetty and M. Kandemir and N.
Vijaykrishnan and M. J. Irwin and M. Wolczko",
title = "Tuning garbage collection for reducing memory system
energy in an embedded {Java} environment",
journal = j-TECS,
volume = "1",
number = "1",
pages = "27--55",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2002:AAI,
author = "Jung-Hoon Lee and Shin-Dug Kim and Charles Weems",
title = "Application-adaptive intelligent cache memory system",
journal = j-TECS,
volume = "1",
number = "1",
pages = "56--78",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yang:2002:FVL,
author = "Jun Yang and Rajiv Gupta",
title = "Frequent value locality and its applications",
journal = j-TECS,
volume = "1",
number = "1",
pages = "79--105",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ykman-Couvreur:2002:SLE,
author = "Ch. Ykman-Couvreur and J. Lambrecht and A. {Van Der
Togt} and F. Catthoor and H. {De Man}",
title = "System-level exploration of association table
implementations in telecom network applications",
journal = j-TECS,
volume = "1",
number = "1",
pages = "106--140",
month = nov,
year = "2002",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:40 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jacob:2003:ITS,
author = "Bruce Jacob and Shuvra Bhattacharyya",
title = "Introduction to the two special issues on memory",
journal = j-TECS,
volume = "2",
number = "1",
pages = "1--4",
month = feb,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Benini:2003:EAD,
author = "Luca Benini and Alberto Macii and Massimo Poncino",
title = "Energy-aware design of embedded memories: a survey of
technologies, architectures, and optimization
techniques",
journal = j-TECS,
volume = "2",
number = "1",
pages = "5--32",
month = feb,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Grun:2003:APB,
author = "Peter Grun and Nikil Dutt and Alex Nicolau",
title = "Access pattern-based memory and connectivity
architecture exploration",
journal = j-TECS,
volume = "2",
number = "1",
pages = "33--73",
month = feb,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Qu:2003:SSS,
author = "Gang Qu and Miodrag Potkonjak",
title = "System synthesis of synchronous multimedia
applications",
journal = j-TECS,
volume = "2",
number = "1",
pages = "74--97",
month = feb,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Shim:2003:LEC,
author = "Hojun Shim and Yongsoo Joo and Yongseok Choi and Hyung
Gyu Lee and Naehyuck Chang",
title = "Low-energy off-chip {SDRAM} memory systems for
embedded applications",
journal = j-TECS,
volume = "2",
number = "1",
pages = "98--130",
month = feb,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Guang:2003:SIC,
author = "Gao Guang and Trevor Mudge",
title = "Special issue on compilers, architecture, and
synthesis for embedded systems",
journal = j-TECS,
volume = "2",
number = "2",
pages = "131--131",
month = may,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Franke:2003:ARH,
author = "Bj{\"o}rn Franke and Michael O'Boyle",
title = "Array recovery and high-level transformations for
{DSP} applications",
journal = j-TECS,
volume = "2",
number = "2",
pages = "132--162",
month = may,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2003:PIC,
author = "Soontae Kim and N. Vijaykrishnan and Mahmut Kandemir
and Anand Sivasubramaniam and Mary Jane Irwin",
title = "Partitioned instruction cache architecture for energy
efficiency",
journal = j-TECS,
volume = "2",
number = "2",
pages = "163--185",
month = may,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Rabbah:2003:DRD,
author = "Rodric M. Rabbah and Krishna V. Palem",
title = "Data remapping for design space optimization of
embedded memory systems",
journal = j-TECS,
volume = "2",
number = "2",
pages = "186--218",
month = may,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhao:2003:SRM,
author = "Qin Zhao and Bart Mesman and Twan Basten",
title = "Static resource models for code-size efficient
embedded processors",
journal = j-TECS,
volume = "2",
number = "2",
pages = "219--250",
month = may,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:41 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jacome:2003:SIP,
author = "Margarida Jacome and Francky Catthoor",
title = "Special issue on power-aware embedded computing",
journal = j-TECS,
volume = "2",
number = "3",
pages = "251--254",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Martin:2003:CSS,
author = "Thomas L. Martin and Daniel P. Siewiorek and Asim
Smailagic and Matthew Bosworth and Matthew Ettus and
Jolin Warren",
title = "A case study of a system-level approach to power-aware
computing",
journal = j-TECS,
volume = "2",
number = "3",
pages = "255--276",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Rakhmatov:2003:EMB,
author = "Daler Rakhmatov and Sarma Vrudhula",
title = "Energy management for battery-powered embedded
systems",
journal = j-TECS,
volume = "2",
number = "3",
pages = "277--324",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Irani:2003:OSD,
author = "Sandy Irani and Sandeep Shukla and Rajesh Gupta",
title = "Online strategies for dynamic power management in
systems with multiple power-saving states",
journal = j-TECS,
volume = "2",
number = "3",
pages = "325--346",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhou:2003:AMC,
author = "Huiyang Zhou and Mark C. Toburen and Eric Rotenberg
and Thomas M. Conte",
title = "Adaptive mode control: a static-power-efficient cache
design",
journal = j-TECS,
volume = "2",
number = "3",
pages = "347--372",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Unsal:2003:CCC,
author = "Osman S. Unsal and Raksit Ashok and Israel Koren and
C. Mani Krishna and Csaba Andras Moritz",
title = "{Cool-Cache}: a compiler-enabled energy efficient data
caching framework for embedded/multimedia processors",
journal = j-TECS,
volume = "2",
number = "3",
pages = "373--392",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yun:2003:EOV,
author = "Han-Saem Yun and Jihong Kim",
title = "On energy-optimal voltage scheduling for
fixed-priority hard real-time systems",
journal = j-TECS,
volume = "2",
number = "3",
pages = "393--430",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Schurgers:2003:PME,
author = "Curt Schurgers and Vijay Raghunathan and Mani B.
Srivastava",
title = "Power management for energy-aware communication
systems",
journal = j-TECS,
volume = "2",
number = "3",
pages = "431--447",
month = aug,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Aug 7 11:26:42 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gordon-Ross:2003:TIC,
author = "Ann Gordon-Ross and Susan Cotterell and Frank Vahid",
title = "Tiny instruction caches for low power embedded
systems",
journal = j-TECS,
volume = "2",
number = "4",
pages = "449--481",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lin:2003:CMC,
author = "Kelvin Lin and Chung-Ping Chung and Jean Jyh-Jiun
Shann",
title = "Compressing {MIPS} code by multiple operand
dependencies",
journal = j-TECS,
volume = "2",
number = "4",
pages = "482--508",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Musoll:2003:SRU,
author = "Enric Musoll",
title = "Speculating to reduce unnecessary power consumption",
journal = j-TECS,
volume = "2",
number = "4",
pages = "509--536",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Rusu:2003:MRR,
author = "Cosmin Rusu and Rami Melhem and Daniel Moss{\'e}",
title = "Maximizing rewards for real-time applications with
energy constraints",
journal = j-TECS,
volume = "2",
number = "4",
pages = "537--559",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Venkataramani:2003:ACC,
author = "Girish Venkataramani and Walid Najjar and Fadi Kurdahi
and Nader Bagherzadeh and Wim Bohm and Jeff Hammes",
title = "Automatic compilation to a coarse-grained
reconfigurable system-on-a-chip",
journal = j-TECS,
volume = "2",
number = "4",
pages = "560--589",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhuge:2003:CSR,
author = "Qingfeng Zhuge and Bin Xiao and Edwin H.-M. Sha",
title = "Code size reduction technique and implementation for
software-pipelined {DSP} applications",
journal = j-TECS,
volume = "2",
number = "4",
pages = "590--613",
month = nov,
year = "2003",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 22 17:52:29 MST 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gupta:2004:GES,
author = "Rajesh Gupta",
title = "Guest editorial: {Special} issue on networked embedded
systems",
journal = j-TECS,
volume = "3",
number = "1",
pages = "1--2",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Raghunathan:2004:EEW,
author = "Vijay Raghunathan and Saurabh Ganeriwal and Mani
Srivastava and Curt Schurgers",
title = "Energy efficient wireless packet scheduling and fair
queuing",
journal = j-TECS,
volume = "3",
number = "1",
pages = "3--23",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Bulusu:2004:SCL,
author = "Nirupama Bulusu and John Heidemann and Deborah Estrin
and Tommy Tran",
title = "Self-configuring localization systems: Design and
Experimental Evaluation",
journal = j-TECS,
volume = "3",
number = "1",
pages = "24--60",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zou:2004:SDT,
author = "Yi Zou and Krishnendu Chakrabarty",
title = "Sensor deployment and target localization in
distributed sensor networks",
journal = j-TECS,
volume = "3",
number = "1",
pages = "61--91",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gebotys:2004:DSC,
author = "Catherine H. Gebotys",
title = "Design of secure cryptography against the threat of
power-attacks in {DSP}-embedded processors",
journal = j-TECS,
volume = "3",
number = "1",
pages = "92--113",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mishra:2004:MVP,
author = "Prabhat Mishra and Nikil Dutt",
title = "Modeling and validation of pipeline specifications",
journal = j-TECS,
volume = "3",
number = "1",
pages = "114--139",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mishra:2004:PMC,
author = "Prabhat Mishra and Mahesh Mamidipaka and Nikil Dutt",
title = "Processor-memory coexploration using an architecture
description language",
journal = j-TECS,
volume = "3",
number = "1",
pages = "140--162",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Naik:2004:CCS,
author = "Mayur Naik and Jens Palsberg",
title = "Compiling with code-size constraints",
journal = j-TECS,
volume = "3",
number = "1",
pages = "163--181",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Schmitz:2004:ISO,
author = "Marcus T. Schmitz and Bashir M. Al-Hashimi and Petru
Eles",
title = "Iterative schedule optimization for voltage scalable
distributed embedded systems",
journal = j-TECS,
volume = "3",
number = "1",
pages = "182--217",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Stitt:2004:ESS,
author = "Greg Stitt and Frank Vahid and Shawn Nematbakhsh",
title = "Energy savings and speedups from partitioning critical
software loops to hardware in embedded systems",
journal = j-TECS,
volume = "3",
number = "1",
pages = "218--232",
month = feb,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Mar 6 07:14:21 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lach:2004:ESI,
author = "John Lach and Kia Bazargan",
title = "Editorial: {Special} issue on dynamically adaptable
embedded systems",
journal = j-TECS,
volume = "3",
number = "2",
pages = "233--236",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ghiasi:2004:OAM,
author = "Soheil Ghiasi and Ani Nahapetian and Majid
Sarrafzadeh",
title = "An optimal algorithm for minimizing run-time
reconfiguration delay",
journal = j-TECS,
volume = "3",
number = "2",
pages = "237--256",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Robertson:2004:DFP,
author = "Ian Robertson and James Irvine",
title = "A design flow for partially reconfigurable hardware",
journal = j-TECS,
volume = "3",
number = "2",
pages = "257--283",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mejia-Alvarez:2004:ASS,
author = "Pedro Mejia-Alvarez and Eugene Levner and Daniel
Moss{\'e}",
title = "Adaptive scheduling server for power-aware real-time
tasks",
journal = j-TECS,
volume = "3",
number = "2",
pages = "284--306",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2004:BAP,
author = "Fan Zhang and Samuel T. Chanson",
title = "Blocking-aware processor voltage scheduling for
real-time tasks",
journal = j-TECS,
volume = "3",
number = "2",
pages = "307--335",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2004:DAF,
author = "Ying Zhang and Krishnendu Chakrabarty",
title = "Dynamic adaptation for fault tolerance and power
management in embedded real-time systems",
journal = j-TECS,
volume = "3",
number = "2",
pages = "336--360",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huang:2004:DDR,
author = "Zhining Huang and Sharad Malik and Nahri Moreano and
Guido Araujo",
title = "The design of dynamically reconfigurable datapath
coprocessors",
journal = j-TECS,
volume = "3",
number = "2",
pages = "361--384",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Noguera:2004:MRA,
author = "Juanjo Noguera and Rosa M. Badia",
title = "Multitasking on reconfigurable architectures:
microarchitecture support and dynamic scheduling",
journal = j-TECS,
volume = "3",
number = "2",
pages = "385--406",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2004:STC,
author = "Chuanjun Zhang and Frank Vahid and Roman Lysecky",
title = "A self-tuning cache architecture for embedded
systems",
journal = j-TECS,
volume = "3",
number = "2",
pages = "407--425",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{He:2004:AAA,
author = "Tian He and Brian M. Blum and John A. Stankovic and
Tarek Abdelzaher",
title = "{AIDA}: {Adaptive} application-independent data
aggregation in wireless sensor networks",
journal = j-TECS,
volume = "3",
number = "2",
pages = "426--457",
month = may,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Serpanos:2004:GES,
author = "Dimitrios N. Serpanos and Haris Lekatsas",
title = "Guest editorial: {Special} issue on embedded systems
and security",
journal = j-TECS,
volume = "3",
number = "3",
pages = "459--460",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ravi:2004:SES,
author = "Srivaths Ravi and Anand Raghunathan and Paul Kocher
and Sunil Hattangady",
title = "Security in embedded systems: {Design} challenges",
journal = j-TECS,
volume = "3",
number = "3",
pages = "461--491",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Coron:2004:SSL,
author = "Jean-Sebastien Coron and David Naccache and Paul
Kocher",
title = "Statistics and secret leakage",
journal = j-TECS,
volume = "3",
number = "3",
pages = "492--508",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wollinger:2004:EHC,
author = "Thomas Wollinger and Jan Pelzl and Volker
Wittelsberger and Christof Paar and G{\"o}kay Saldamli
and {\c{C}}etin K. Ko{\c{c}}",
title = "Elliptic and hyperelliptic curves on embedded {$ \mu
$P}",
journal = j-TECS,
volume = "3",
number = "3",
pages = "509--533",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wollinger:2004:SFS,
author = "Thomas Wollinger and Jorge Guajardo and Christof
Paar",
title = "Security on {FPGAs}: {State-of-the-art}
implementations and attacks",
journal = j-TECS,
volume = "3",
number = "3",
pages = "534--574",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Reyhani-Masoleh:2004:EDS,
author = "Arash Reyhani-Masoleh and M. Anwar Hasan",
title = "Efficient digit-serial normal basis multipliers over
binary extension fields",
journal = j-TECS,
volume = "3",
number = "3",
pages = "575--592",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Reyhani-Masoleh:2004:TFT,
author = "Arash Reyhani-Masoleh and M. Anwar Hasan",
title = "Towards fault-tolerant cryptographic computations over
finite fields",
journal = j-TECS,
volume = "3",
number = "3",
pages = "593--613",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Liu:2004:FSM,
author = "Rong-Tai Liu and Nen-Fu Huang and Chih-Hao Chen and
Chia-Nan Kao",
title = "A fast string-matching algorithm for network
processor-based intrusion detection system",
journal = j-TECS,
volume = "3",
number = "3",
pages = "614--633",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Park:2004:LLS,
author = "Taejoon Park and Kang G. Shin",
title = "{LiSP}: a lightweight security protocol for wireless
sensor networks",
journal = j-TECS,
volume = "3",
number = "3",
pages = "634--660",
month = aug,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:47 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Harkin:2004:MOR,
author = "J. Harkin and T. M. McGinnity and L. P. Maguire",
title = "Modeling and optimizing run-time reconfiguration using
evolutionary computation",
journal = j-TECS,
volume = "3",
number = "4",
pages = "661--685",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Im:2004:DVS,
author = "Chaeseok Im and Soonhoi Ha and Huiseok Kim",
title = "Dynamic voltage scheduling with buffers in low-power
multimedia applications",
journal = j-TECS,
volume = "3",
number = "4",
pages = "686--705",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Manolache:2004:SAA,
author = "Sorin Manolache and Petru Eles and Zebo Peng",
title = "Schedulability analysis of applications with
stochastic task execution times",
journal = j-TECS,
volume = "3",
number = "4",
pages = "706--735",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Serpanos:2004:EHS,
author = "Dimitrios N. Serpanos and Poluxeni Mountrouidou and
Maria Gamvrili",
title = "Evaluation of hardware and software schedulers for
embedded switches",
journal = j-TECS,
volume = "3",
number = "4",
pages = "736--759",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lanotte:2004:IFH,
author = "Ruggero Lanotte and Andrea Maggiolo-Schettini and
Simone Tini",
title = "Information flow in hybrid systems",
journal = j-TECS,
volume = "3",
number = "4",
pages = "760--799",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Liu:2004:MBA,
author = "Donggang Liu and Peng Ning",
title = "Multilevel {$ \mu $TESLA}: {Broadcast} authentication
for distributed sensor networks",
journal = j-TECS,
volume = "3",
number = "4",
pages = "800--836",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chang:2004:RTG,
author = "Li-Pin Chang and Tei-Wei Kuo and Shi-Wu Lo",
title = "Real-time garbage collection for flash-memory storage
systems of real-time embedded systems",
journal = j-TECS,
volume = "3",
number = "4",
pages = "837--863",
month = nov,
year = "2004",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Oct 29 06:35:48 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mueller:2005:ISI,
author = "Frank Mueller and Per Stenstr{\"o}m",
title = "Introduction to the special issue",
journal = j-TECS,
volume = "4",
number = "1",
pages = "1--2",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Krishnaswamy:2005:DCB,
author = "Arvind Krishnaswamy and Rajiv Gupta",
title = "Dynamic coalescing for 16-bit instructions",
journal = j-TECS,
volume = "4",
number = "1",
pages = "3--37",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Corliss:2005:IED,
author = "Marc L. Corliss and E. Christopher Lewis and Amir
Roth",
title = "The implementation and evaluation of dynamic code
decompression using {DISE}",
journal = j-TECS,
volume = "4",
number = "1",
pages = "38--72",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dhurjati:2005:MSG,
author = "Dinakar Dhurjati and Sumant Kowshik and Vikram Adve
and Chris Lattner",
title = "Memory safety without garbage collection for embedded
applications",
journal = j-TECS,
volume = "4",
number = "1",
pages = "73--111",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Pop:2005:SDF,
author = "Paul Pop and Petru Eles and Zebo Peng",
title = "Schedulability-driven frame packing for multicluster
distributed embedded systems",
journal = j-TECS,
volume = "4",
number = "1",
pages = "112--140",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Swaminathan:2005:PBE,
author = "Vishnu Swaminathan and Krishnendu Chakrabarty",
title = "Pruning-based, energy-optimal, deterministic {I/O}
device scheduling for hard real-time systems",
journal = j-TECS,
volume = "4",
number = "1",
pages = "141--167",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chiou:2005:SAS,
author = "Lih-yih Chiou and Swarup Bhunia and Kaushik Roy",
title = "Synthesis of application-specific highly efficient
multi-mode cores for embedded systems",
journal = j-TECS,
volume = "4",
number = "1",
pages = "168--188",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zambreno:2005:SOA,
author = "Joseph Zambreno and Alok Choudhary and Rahul Simha and
Bhagi Narahari and Nasir Memon",
title = "{SAFE-OPS}: an approach to embedded software
security",
journal = j-TECS,
volume = "4",
number = "1",
pages = "189--210",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kwon:2005:OVA,
author = "Woo-Cheol Kwon and Taewhan Kim",
title = "Optimal voltage allocation techniques for dynamically
variable voltage processors",
journal = j-TECS,
volume = "4",
number = "1",
pages = "211--230",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tan:2005:EME,
author = "T. K. Tan and A. Raghunathan and N. K. Jha",
title = "Energy macromodeling of embedded operating systems",
journal = j-TECS,
volume = "4",
number = "1",
pages = "231--254",
month = feb,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Mar 24 15:48:07 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Shukla:2005:GES,
author = "Sandeep K. Shukla and Jean-Pierre Talpin",
title = "Guest editorial: {Special} issue on models and
methodologies for co-design of embedded systems",
journal = j-TECS,
volume = "4",
number = "2",
pages = "225--227",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cachera:2005:VSP,
author = "David Cachera and Katell Morin-Allory",
title = "Verification of safety properties for parameterized
regular systems",
journal = j-TECS,
volume = "4",
number = "2",
pages = "228--266",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chouali:2005:PPM,
author = "S. Chouali and J. Julliand and P.-A. Masson and F.
Bellegarde",
title = "{PLTL}-partitioned model checking for reactive systems
under fairness assumptions",
journal = j-TECS,
volume = "4",
number = "2",
pages = "267--301",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gardner:2005:CCS,
author = "William B. Gardner",
title = "Converging {CSP} specifications and {C++} programming
via selective formalism",
journal = j-TECS,
volume = "4",
number = "2",
pages = "302--330",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ziller:2005:CSS,
author = "Roberto Ziller and Klaus Schneider",
title = "Combining supervisor synthesis and model checking",
journal = j-TECS,
volume = "4",
number = "2",
pages = "331--362",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2005:HCC,
author = "Chuanjun Zhang and Frank Vahid and Walid Najjar",
title = "A highly configurable cache for low energy embedded
systems",
journal = j-TECS,
volume = "4",
number = "2",
pages = "363--387",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kadayif:2005:DSO,
author = "I. Kadayif and M. Kandemir",
title = "Data space-oriented tiling for enhancing locality",
journal = j-TECS,
volume = "4",
number = "2",
pages = "388--414",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Muresan:2005:ICM,
author = "Radu Muresan and Catherine Gebotys",
title = "Instantaneous current modeling in a complex {VLIW}
processor core",
journal = j-TECS,
volume = "4",
number = "2",
pages = "415--451",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Petrov:2005:RCF,
author = "Peter Petrov and Alex Orailoglu",
title = "A reprogrammable customization framework for efficient
branch resolution in embedded processors",
journal = j-TECS,
volume = "4",
number = "2",
pages = "452--468",
month = may,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jun 21 16:50:36 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Burns:2005:E,
author = "Alan Burns",
title = "Editorial",
journal = j-TECS,
volume = "4",
number = "3",
pages = "469--471",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Sangiovanni-Vincentelli:2005:OES,
author = "Alberto L. Sangiovanni-Vincentelli and Alessandro
Pinto",
title = "An overview of embedded system design education at
{Berkeley}",
journal = j-TECS,
volume = "4",
number = "3",
pages = "472--499",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Koopman:2005:UES,
author = "Philip Koopman and Howie Choset and Rajeev Gandhi and
Bruce Krogh and Diana Marculescu and Priya Narasimhan
and Joann M. Paul and Ragunathan Rajkumar and Daniel
Siewiorek and Asim Smailagic and Peter Steenkiste and
Donald E. Thomas and Chenxi Wang",
title = "Undergraduate embedded system education at {Carnegie
Mellon}",
journal = j-TECS,
volume = "4",
number = "3",
pages = "500--528",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Verbauwhede:2005:SES,
author = "Ingrid Verbauwhede and Patrick Schaumont",
title = "Skiing the embedded systems mountain",
journal = j-TECS,
volume = "4",
number = "3",
pages = "529--548",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Sztipanovits:2005:IES,
author = "Janos Sztipanovits and Gautam Biswas and Ken Frampton
and Aniruddha Gokhale and Larry Howard and Gabor Karsai
and T. John Koo and Xenofon Koutsoukos and Douglas C.
Schmidt",
title = "Introducing embedded software and systems education
and advanced learning technology in an engineering
curriculum",
journal = j-TECS,
volume = "4",
number = "3",
pages = "549--568",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Seviora:2005:CES,
author = "Rudolph E. Seviora",
title = "A curriculum for embedded system engineering",
journal = j-TECS,
volume = "4",
number = "3",
pages = "569--586",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Caspi:2005:GGC,
author = "P. Caspi and A. Sangiovanni-Vincentelli and L. Almeida
and A. Benveniste and B. Bouyssounouse and G. Buttazzo
and I. Crnkovic and W. Damm and J. Engblom and G.
Folher and M. Garcia-Valls and H. Kopetz and Y.
Lakhnech and F. Laroussinie and L. Lavagno and G.
Lipari and F. Maraninchi and Ph. Peti and J. de la
Puente and N. Scaife and J. Sifakis and R. de Simone
and M. Torngren and P. Ver{\'\i}ssimo and A. J.
Wellings and R. Wilhelm and T. Willemse and W. Yi",
title = "Guidelines for a graduate curriculum on embedded
software and systems",
journal = j-TECS,
volume = "4",
number = "3",
pages = "587--611",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huang:2005:ESC,
author = "Tai-Yi Huang and Chung-Ta King and Youn-Long Steve Lin
and Yin-Tsung Hwang",
title = "The embedded software consortium of {Taiwan}",
journal = j-TECS,
volume = "4",
number = "3",
pages = "612--632",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Grimheden:2005:WES,
author = "Martin Grimheden and Martin T{\"o}rngren",
title = "What is embedded systems and how should it be
taught?---results from a didactic analysis",
journal = j-TECS,
volume = "4",
number = "3",
pages = "633--651",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2005:RDC,
author = "Wei Zhang and Mahmut Kandemir and Mustafa Karakoy and
Guangyu Chen",
title = "Reducing data cache leakage energy using a
compiler-based approach",
journal = j-TECS,
volume = "4",
number = "3",
pages = "652--678",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2005:DDC,
author = "Hyung Seok Kim and Tarek F. Abdelzaher and Wook Hyun
Kwon",
title = "Dynamic delay-constrained minimum-energy dissemination
in wireless sensor networks",
journal = j-TECS,
volume = "4",
number = "3",
pages = "679--706",
month = aug,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Sat Sep 17 15:05:12 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Alur:2005:P,
author = "Rajeev Alur and Insup Lee",
title = "Preface",
journal = j-TECS,
volume = "4",
number = "4",
pages = "707--707",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tardieu:2005:LE,
author = "Olivier Tardieu and Robert de Simone",
title = "Loops in {ESTEREL}",
journal = j-TECS,
volume = "4",
number = "4",
pages = "708--750",
month = nov,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1145/1113830.1113832",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Regehr:2005:ESO,
author = "John Regehr and Alastair Reid and Kirk Webb",
title = "Eliminating stack overflow by abstract
interpretation",
journal = j-TECS,
volume = "4",
number = "4",
pages = "751--778",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tripakis:2005:TDT,
author = "Stavros Tripakis and Christos Sofronis and Paul Caspi
and Adrian Curic",
title = "Translating discrete-time {Simulink} to {Lustre}",
journal = j-TECS,
volume = "4",
number = "4",
pages = "779--818",
month = nov,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1145/1113830.1113834",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kadayif:2005:CDH,
author = "I. Kadayif and M. Kandemir and G. Chen and N.
Vijaykrishnan and M. J. Irwin and A. Sivasubramaniam",
title = "Compiler-directed high-level energy estimation and
optimization",
journal = j-TECS,
volume = "4",
number = "4",
pages = "819--850",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hu:2005:ADR,
author = "J. Hu and M. Kandemir and N. Vijaykrishnan and M. J.
Irwin",
title = "Analyzing data reuse for cache reconfiguration",
journal = j-TECS,
volume = "4",
number = "4",
pages = "851--876",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{He:2005:RFL,
author = "Tian He and Chengdu Huang and Brian M. Blum and John
A. Stankovic and Tarek F. Abdelzaher",
title = "Range-free localization and its impact on large scale
sensor networks",
journal = j-TECS,
volume = "4",
number = "4",
pages = "877--906",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gaujal:2005:SPA,
author = "Bruno Gaujal and Nicolas Navet and Cormac Walsh",
title = "Shortest-path algorithms for real-time scheduling of
{FIFO} tasks with minimal energy use",
journal = j-TECS,
volume = "4",
number = "4",
pages = "907--933",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Bartolini:2005:OIC,
author = "S. Bartolini and C. A. Prete",
title = "Optimizing instruction cache performance of embedded
systems",
journal = j-TECS,
volume = "4",
number = "4",
pages = "934--965",
month = nov,
year = "2005",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 16 10:59:18 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2006:RDL,
author = "W. Zhang and Y.-F. Tsai and D. Duarte and N.
Vijaykrishnan and M. Kandemir and M. J. Irwin",
title = "Reducing dynamic and leakage energy in {VLIW}
architectures",
journal = j-TECS,
volume = "5",
number = "1",
pages = "1--28",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Coussy:2006:FMH,
author = "Philippe Coussy and Emmanuel Casseau and Pierre Bomel
and Adel Baganne and Eric Martin",
title = "A formal method for hardware {IP} design and
integration under {I/O} and timing constraints",
journal = j-TECS,
volume = "5",
number = "1",
pages = "29--53",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Varea:2006:DFN,
author = "Mauricio Varea and Bashir M. Al-Hashimi and Luis A.
Cort{\'e}S and Petru Eles and Zebo Peng",
title = "{Dual Flow Nets}: {Modeling} the control\slash
data-flow relation in embedded systems",
journal = j-TECS,
volume = "5",
number = "1",
pages = "54--81",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{AbouGhazaleh:2006:COS,
author = "Nevine AbouGhazaleh and Daniel Moss{\'e} and Bruce R.
Childers and Rami Melhem",
title = "Collaborative operating system and compiler power
management for real-time applications",
journal = j-TECS,
volume = "5",
number = "1",
pages = "82--115",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dean:2006:STI,
author = "Alexander G. Dean",
title = "Software thread integration for embedded system
display applications",
journal = j-TECS,
volume = "5",
number = "1",
pages = "116--151",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Alur:2006:PAR,
author = "Rajeev Alur and Thao Dang and Franjo
Ivan{\v{c}}i{\'c}",
title = "Predicate abstraction for reachability analysis of
hybrid systems",
journal = j-TECS,
volume = "5",
number = "1",
pages = "152--199",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Seth:2006:FFA,
author = "Kiran Seth and Aravindh Anantaraman and Frank Mueller
and Eric Rotenberg",
title = "{FAST}: {Frequency-Aware Static Timing} analysis",
journal = j-TECS,
volume = "5",
number = "1",
pages = "200--224",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chen:2006:RCS,
author = "G. Chen and M. Kandemir and M. J. Irwin and J.
Ramanujam",
title = "Reducing code size through address register
assignment",
journal = j-TECS,
volume = "5",
number = "1",
pages = "225--258",
month = feb,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu May 18 08:17:05 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jerraya:2006:GEC,
author = "Ahmed Jerraya and Trevor Mudge",
title = "Guest editorial: {Concurrent} hardware and software
design for multiprocessor {SoC}",
journal = j-TECS,
volume = "5",
number = "2",
pages = "259--262",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Xu:2006:DMA,
author = "Jiang Xu and Wayne Wolf and Joerg Henkel and Srimat
Chakradhar",
title = "A design methodology for application-specific
networks-on-chip",
journal = j-TECS,
volume = "5",
number = "2",
pages = "263--280",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kangas:2006:UBM,
author = "Tero Kangas and Petri Kukkala and Heikki Orsila and
Erno Salminen and Marko H{\"a}nnik{\"a}inen and Timo D.
H{\"a}m{\"a}l{\"a}inen and Jouni Riihim{\"a}ki and
Kimmo Kuusilinna",
title = "{UML}-based multiprocessor {SoC} design framework",
journal = j-TECS,
volume = "5",
number = "2",
pages = "281--320",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hua:2006:EEE,
author = "Shaoxiong Hua and Gang Qu and Shuvra S.
Bhattacharyya",
title = "Energy-efficient embedded software implementation on
multiprocessor system-on-chip with multiple voltages",
journal = j-TECS,
volume = "5",
number = "2",
pages = "321--341",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hessel:2006:SRA,
author = "Fabiano Hessel and Vitor M. {Da Rosa} and Carlos
Eduardo Reif and C{\'e}sar Marcon and Tatiana {Gadelha
Serra Dos Santos}",
title = "Scheduling refinement in abstract {RTOS} models",
journal = j-TECS,
volume = "5",
number = "2",
pages = "342--354",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ou:2006:DSE,
author = "Jingzhao Ou and Viktor K. Prasanna",
title = "Design space exploration using arithmetic-level
hardware--software cosimulation for configurable
multiprocessor platforms",
journal = j-TECS,
volume = "5",
number = "2",
pages = "355--382",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Loghi:2006:CCT,
author = "Mirko Loghi and Massimo Poncino and Luca Benini",
title = "Cache coherence tradeoffs in shared-memory {MPSoCs}",
journal = j-TECS,
volume = "5",
number = "2",
pages = "383--407",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lapalme:2006:NEE,
author = "James Lapalme and El Mostapha Aboulhamid and Gabriela
Nicolescu",
title = "A new efficient {EDA} tool design methodology",
journal = j-TECS,
volume = "5",
number = "2",
pages = "408--430",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Reshadi:2006:RFI,
author = "Mehrdad Reshadi and Nikil Dutt and Prabhat Mishra",
title = "A retargetable framework for instruction-set
architecture simulation",
journal = j-TECS,
volume = "5",
number = "2",
pages = "431--452",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Memik:2006:ENP,
author = "Gokhan Memik and William H. Mangione-Smith",
title = "Evaluating {Network Processors} using {NetBench}",
journal = j-TECS,
volume = "5",
number = "2",
pages = "453--471",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Udayakumaran:2006:DAS,
author = "Sumesh Udayakumaran and Angel Dominguez and Rajeev
Barua",
title = "Dynamic allocation for scratch-pad memory using
compile-time decisions",
journal = j-TECS,
volume = "5",
number = "2",
pages = "472--511",
month = may,
year = "2006",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Aug 23 05:26:43 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wu:2006:EEU,
author = "Haisang Wu and Binoy Ravindran and E. Douglas Jensen
and Peng Li",
title = "Energy-efficient, utility accrual scheduling under
resource constraints for mobile embedded systems",
journal = j-TECS,
volume = "5",
number = "3",
pages = "513--542",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165781",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present an energy-efficient, utility accrual,
real-time scheduling algorithm called ReUA. ReUA
considers an application model where activities are
subject to time/utility function time constraints,
mutual exclusion constraints on shared non-CPU
resources, and statistical performance requirements on
individual activity timeliness behavior. The algorithm
targets mobile embedded systems where {\em
system-level\/} energy consumption is also a major
concern. For such a model, we consider the scheduling
objectives of (1) satisfying the statistical
performance requirements and (2) maximizing the
system-level energy efficiency, while respecting
resource constraints. Since the problem is NP-hard,
ReUA allocates CPU cycles using statistical properties
of application cycle demands, and heuristically
computes schedules with a polynomial time cost. We
analytically establish several timeliness and
nontimeliness properties of the algorithm. Further, our
simulation experiments illustrate ReUA's effectiveness
and superiority.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Luo:2006:EEI,
author = "Liqian Luo and Tarek F. Abdelzaher and Tian He and
John A. Stankovic",
title = "{EnviroSuite}: an environmentally immersive
programming framework for sensor networks",
journal = j-TECS,
volume = "5",
number = "3",
pages = "543--576",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165782",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Sensor networks open a new frontier for
embedded-distributed computing. Paradigms for sensor
network programming-in-the-large have been identified
as a significant challenge toward developing
large-scale applications. Classical programming
languages are too low-level. This paper presents the
design, implementation, and evaluation of EnviroSuite,
a programming framework that introduces a new paradigm,
called environmentally immersive programming, to
abstract distributed interactions with the environment.
Environmentally immersive programming refers to an
object-based programming model in which individual
objects represent physical elements in the external
environment. It allows the programmer to think directly
in terms of environmental abstractions. EnviroSuite
provides language primitives for environmentally
immersive programming that map transparently into a
support library of distributed algorithms for tracking
and environmental monitoring. We show how nesC code of
realistic applications is significantly simplified
using EnviroSuite and demonstrate the resulting system
performance on Mica2 and XSM platforms.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gebotys:2006:SMC,
author = "Catherine H. Gebotys",
title = "A split-mask countermeasure for low-energy secure
embedded systems",
journal = j-TECS,
volume = "5",
number = "3",
pages = "577--612",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165783",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Future wireless embedded devices will be increasingly
powerful, supporting many more applications, including
one of the most crucial---security. Although many
embedded devices offer more resistance to bus---probing
attacks because of their compact size, susceptibility
to power or electromagnetic analysis attacks must be
analyzed. This paper presents a new split-mask
countermeasure to thwart low-order differential power
analysis (DPA) and differential EM analysis (DEMA). For
the first time, real-power and EM measurements are used
to analyze the difficulty of launching new third-order
DPA and DEMA attacks on a popular low-energy 32-bit
embedded ARM processor. Results show that the new
split-mask countermeasure provides increased security
without large overheads of energy dissipation, compared
to previous research. With the emergence of security
applications in PDAs, cell phones, and other embedded
devices, low-energy countermeasures for resistance to
low-order DPA/DEMA is crucial for supporting future
enabled wireless internet.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhuang:2006:PLS,
author = "Xiaotong Zhuang and Santosh Pande",
title = "Parallelizing load\slash stores on dual-bank memory
embedded processors",
journal = j-TECS,
volume = "5",
number = "3",
pages = "613--657",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165784",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many modern embedded processors such as DSPs support
partitioned memory banks (also called X--Y memory or
dual-bank memory) along with parallel load/store
instructions to achieve higher code density and
performance. In order to effectively utilize the
parallel load/store instructions, the compiler must
partition the memory-resident values and assign them to
X or Y bank. This paper gives a postregister allocation
solution to merge the generated load/store instructions
into their parallel counterparts. Simultaneously, our
framework performs allocation of values to X or Y
memory banks. We first remove as many load/stores and
register--register moves as possible through an
excellent iterated coalescing based register allocator
by Appel and George [1996]. We then attempt to
parallelize the generated load/stores using a multipass
approach. The basic phase of our approach attempts the
merger of load/stores without duplication and web
splitting. We model this problem as a graph-coloring
problem in which each value is colored as either X or
Y. We then construct a motion scheduling graph (MSG),
based on the range of motion for each load/store
instruction. MSG reflects potential instructions that
could be merged. We propose a notion of pseudofixed
boundaries so that the load/store movement is less
affected by register dependencies. We prove that the
coloring problem for MSG is NP-complete and solve it
with two different heuristic algorithms with different
complexity. We then propose a two-level iterative
process to attempt instruction duplication, variable
duplication, web splitting, and local conflict
elimination to effectively merge the remaining
load/stores. Finally, we clean up some multiple-aliased
load/stores. To improve the performance, we combine
profiling information with each stage coupled with some
modifications to the algorithm. We show that our
framework results in parallelization of a large number
of load/stores without much growth in data and code
segments. The average speedup for our optimization pass
reaches roughly 13\% if no profile information is
available and 17\% with profile information. The
average code and data segment growth is controlled
within 13\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jones:2006:RPW,
author = "Alex K. Jones and Raymond Hoare and Dara Kusic and
Gayatri Mehta and Josh Fazekas and John Foster",
title = "Reducing power while increasing performance with
{SuperCISC}",
journal = j-TECS,
volume = "5",
number = "3",
pages = "658--686",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165785",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Multiprocessor Systems on Chips (MPSoCs) have become a
popular architectural technique to increase
performance. However, MPSoCs may lead to undesirable
power consumption characteristics for computing systems
that have strict power budgets, such as PDAs, mobile
phones, and notebook computers. This paper presents the
super-complex instruction-set computing (SuperCISC)
Embedded Processor Architecture and, in particular,
investigates performance and power consumption of this
device compared to traditional processor
architecture-based execution. SuperCISC is a
heterogeneous, multicore processor architecture
designed to exceed performance of traditional embedded
processors while maintaining a reduced power budget
compared to low-power embedded processors. At the heart
of the SuperCISC processor is a multicore VLIW (Very
Large Instruction Word) containing several homogeneous
execution cores/functional units. In addition, complex
and heterogeneous combinational hardware function cores
are tightly integrated to the core VLIW engine
providing an opportunity for improved performance and
reduced energy consumption. Our SuperCISC processor
core has been synthesized for both a 90-nm Stratix II
Field Programmable Gate Aray (FPGA) and a 160-nm
standard cell Application-Specific Integrated Circuit
(ASIC) fabrication process from OKI, each operating at
approximately 167 MHz for the VLIW core. We examine
several reasons for speedup and power improvement
through the SuperCISC architecture, including
predicated control flow, cycle compression, and a
reduction in arithmetic power consumption, which we
call power compression. Finally, testing our SuperCISC
processor with multimedia and signal-processing
benchmarks, we show how the SuperCISC processor can
provide performance improvements ranging from 7X to
160X with an average of 60X, while also providing
orders of magnitude of power improvements for the
computational kernels. The power improvements for our
benchmark kernels range from just over 40X to over
400X, with an average savings exceeding 130X. By
combining these power and performance improvements, our
total energy improvements all exceed 1000X. As these
savings are limited to the computational kernels of the
applications, which often consume approximately 90\% of
the execution time, we expect our savings to approach
the ideal application improvement of 10X.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Girault:2006:ARD,
author = "Alain Girault and Xavier Nicollin and Marc Pouzet",
title = "Automatic rate desynchronization of embedded reactive
programs",
journal = j-TECS,
volume = "5",
number = "3",
pages = "687--717",
month = aug,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1165780.1165786",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Wed Oct 11 06:45:18 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many embedded reactive programs perform computations
at different rates, while still requiring the overall
application to satisfy very tight temporal constraints.
We propose a method to automatically distribute
programs such that the obtained parts can be run at
different rates, which we call rate desynchronization.
We consider general programs whose control structure is
a finite state automaton and with a DAG of actions in
each state. The motivation is to take into account
long-duration tasks inside the programs: these are
tasks whose execution time is long compared to the
other computations in the application, and whose
maximal execution rate is known and bounded. Merely
scheduling such a long duration task at a slow rate
would not work since the whole program would be slowed
down if compiled into sequential code. It would thus be
impossible to meet the temporal constraints, unless
such long duration tasks could be desynchronized from
the remaining computations. This is precisely what our
method achieves: it distributes the initial program
into several parts, so that the parts performing the
slow computations can be run at an appropriate rate,
therefore not impairing the global reaction time of the
program. We present in detail our method, all the
involved algorithms, and a small running example. We
also compare our method with the related work.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Biswas:2006:MOP,
author = "Surupa Biswas and Thomas Carley and Matthew Simpson
and Bhuvan Middha and Rajeev Barua",
title = "Memory overflow protection for embedded systems using
run-time checks, reuse, and compression",
journal = j-TECS,
volume = "5",
number = "4",
pages = "719--752",
month = nov,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1196636.1196637",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:45 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded systems usually lack virtual memory and are
vulnerable to memory overflow since they lack a
mechanism to detect overflow or use swap space
thereafter. We present a method to detect memory
overflows using compiler-inserted software run-time
checks. Its overheads in run-time and energy are 1.35
and 1.12\%, respectively. Detection of overflow allows
system-specific remedial action. We also present
techniques to grow the stack or heap segment after they
overflow, into previously unutilized space, such as
dead variables, free holes in the heap, and space freed
by compressing live variables. These may avoid the
out-of-memory error if the space recovered is enough to
complete execution. The reuse methods are able to grow
the stack or heap beyond its overflow by an amount that
varies widely by application---the amount of recovered
space ranges from 0.7 to 93.5\% of the combined stack
and heap size.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "data compression; heap overflow; out-of-memory errors;
reliability; reuse; run-time checks; stack overflow",
}
@Article{Higuera-Toledano:2006:HSD,
author = "M. Teresa Higuera-Toledano",
title = "Hardware support for detecting illegal references in a
multiapplication real-time {Java} environment",
journal = j-TECS,
volume = "5",
number = "4",
pages = "753--772",
month = nov,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1196636.1196638",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:45 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Our objective is to adapt the Java memory management
to an embedded system, e.g., a wireless PDA executing
concurrent multimedia applications within a single JVM.
This paper provides software, and hardware-based
solutions detecting both illegal references across the
application memory spaces and dangling pointers within
an application space. We give an approach to
divide/share the memory among the applications
executing concurrently in the system. We introduce and
define application-specific memory, building upon the
real-time specification for Java (RTSJ) from the
real-time Java expert group. The memory model used in
RTSJ imposes strict rules for assignment between memory
areas, preventing the creation of dangling pointers,
and thus maintaining the pointer safety of Java. Our
implementation solution to ensure the checking of these
rules before each assignment inserts write barriers
that use a stack-based algorithm. This solution
adversely affects both the performance and
predictability of the RTSJ applications, which can be
improved by using an existing hardware support.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "garbage collection; memory management; write
barriers",
}
@Article{Winter:2006:TPC,
author = "Victor L. Winter and Jason Beranek and Fares Fraij and
Steve Roach and Greg Wickstrom",
title = "A transformational perspective into the core of an
abstract class loader for the {SSP}",
journal = j-TECS,
volume = "5",
number = "4",
pages = "773--818",
month = nov,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1196636.1196639",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:45 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The SSP is a hardware implementation of a subset of
the JVM for use in high-consequence embedded
applications. In this context, a majority of the
activities belonging to class loading, as it is defined
in the specification of the JVM, can be performed
statically. Static class loading has the net result of
dramatically simplifying the design of the SSP, as well
as increasing its performance. Because of the high
consequence nature of its applications, strong evidence
must be provided that all aspects of the SSP have been
implemented correctly. This includes the class loader.
This article explores the possibility of formally
verifying a class loader for the SSP implemented in the
strategic programming language TL. Specifically, an
implementation of the core activities of an abstract
class loader is presented and its verification in ACL2
is considered.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "HATS; higher-order rewriting; SSP; strategic
programming; TL",
}
@Article{Kulkarni:2006:VVI,
author = "Prasad Kulkarni and Wankang Zhao and Stephen Hines and
David Whalley and Xin Yuan and Robert van Engelen and
Kyle Gallivan and Jason Hiser and Jack Davidson and
Baosheng Cai and Mark Bailey and Hwashin Moon and
Kyunghwan Cho and Yunheung Paek",
title = "{VISTA}: {VPO} interactive system for tuning
applications",
journal = j-TECS,
volume = "5",
number = "4",
pages = "819--863",
month = nov,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1196636.1196640",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:45 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Software designers face many challenges when
developing applications for embedded systems. One major
challenge is meeting the conflicting constraints of
speed, code size, and power consumption. Embedded
application developers often resort to hand-coded
assembly language to meet these constraints since
traditional optimizing compiler technology is usually
of little help in addressing this challenge. The
results are software systems that are not portable,
less robust, and more costly to develop and maintain.
Another limitation is that compilers traditionally
apply the optimizations to a program in a fixed order.
However, it has long been known that a single ordering
of optimization phases will not produce the best code
for every application. In fact, the smallest unit of
compilation in most compilers is typically a function
and the programmer has no control over the code
improvement process other than setting flags to enable
or disable certain optimization phases. This paper
describes a new code improvement paradigm implemented
in a system called VISTA that can help achieve the
cost/performance trade-offs that embedded applications
demand. The VISTA system opens the code improvement
process and gives the application programmer, when
necessary, the ability to finely control it. VISTA also
provides support for finding effective sequences of
optimization phases. This support includes the ability
to interactively get static and dynamic performance
information, which can be used by the developer to
steer the code improvement process. This performance
information is also internally used by VISTA for
automatically selecting the best optimization sequence
from several attempted. One such feature is the use of
a genetic algorithm to search for the most efficient
sequence based on specified fitness criteria. We
include a number of experimental results that evaluate
the effectiveness of using a genetic algorithm in VISTA
to find effective optimization phase sequences.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "genetic algorithms; interactive compilation; phase
ordering; user-directed code improvement",
}
@Article{Ottoni:2006:OAU,
author = "Desiree Ottoni and Guilherme Ottoni and Guido Araujo
and Rainer Leupers",
title = "Offset assignment using simultaneous variable
coalescing",
journal = j-TECS,
volume = "5",
number = "4",
pages = "864--883",
month = nov,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1196636.1196641",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:45 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The generation of efficient addressing code is a
central problem in compiling for processors with
restricted addressing modes, like digital signal
processors (DSPs). Offset assignment (OA) is the
problem of allocating scalar variables to memory, so as
to minimize the need of addressing instructions. This
problem is called simple offset assignment (SOA) when a
single address register is available, and general
offset assignment (GOA) when more address registers are
used. This paper shows how variables' liveness
information can be used to dramatically reduce the
addressing instructions required to access local
variables on the program stack. Two techniques that
make effective use of variable coalescing to solve SOA
and GOA are described, namely coalescing SOA (CSOA) and
coalescing GOA (CGOA). In addition, a thorough
comparison between these algorithms and others
described in the literature is presented. The
experimental results, when compiling MediaBench
benchmark programs with the LANCE compiler, reveal a
very significant improvement of the proposed techniques
over the other available solutions to the problem.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "address registers; autoincrement addressing modes;
DSPs; register allocation; stack offset assignment;
variable coalescing",
}
@Article{Whalley:2007:GE,
author = "David Whalley",
title = "Guest {Editorial}",
journal = j-TECS,
volume = "6",
number = "1",
pages = "1:1--1:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1216577",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kumar:2007:ESI,
author = "Nagendra J. Kumar and Vasanth Asokan and Siddhartha
Shivshankar and Alexander G. Dean",
title = "Efficient software implementation of embedded
communication protocol controllers using asynchronous
software thread integration with time- and
space-efficient procedure calls",
journal = j-TECS,
volume = "6",
number = "1",
pages = "2:1--2:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210270",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The overhead of context switching limits efficient
scheduling of multiple concurrent threads on a
uniprocessor when real-time requirements exist. A
software-implemented protocol controller may be
crippled by this problem. The available idle time may
be too short to recover through context switching, so
only the primary thread can execute during message
activity, slowing the secondary threads and potentially
missing deadlines. Asynchronous software thread
integration (ASTI) uses coroutine calls and
integration, letting threads make independent progress
efficiently, and reducing the needed context switches.
We demonstrate the methods with a software
implementation of an automotive communication protocol
(J1850) and several secondary threads.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "asynchronous software thread integration; fine-grain
concurrency; hardware to software migration; J1850;
software-implemented communication protocol
controllers",
}
@Article{Zhuang:2007:PEP,
author = "Xiaotong Zhuang and Santosh Pande",
title = "Power-efficient prefetching for embedded processors",
journal = j-TECS,
volume = "6",
number = "1",
pages = "3:1--3:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210271",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Because of stringent power constraints, aggressive
latency-hiding approaches, such as prefetching, are
absent in the state-of-the-art embedded processors.
There are two main reasons that make prefetching power
inefficient. First, compiler-inserted prefetch
instructions increase code size and, therefore, could
increase I-cache power. Second, inaccurate prefetching
(especially for hardware prefetching) leads to high
D-cache power consumption because of useless accesses.
In this work, we show that it is possible to support
power-efficient prefetching through bit-differential
offset assignment. We target the prefetching of
relocatable stack variables with a high degree of
precision. By assigning the offsets of stack variables
in such a way that most consecutive addresses differ by
1 bit, we can prefetch them with compact prefetch
instructions to save I-cache power. The compiler first
generates an access graph of consecutive memory
references and then attempts a layout of the memory
locations in the smallest hypercube. Each dimension of
the hypercube represents a 1-bit differential
addressing. The embedding is carried out in as compact
a hypercube as possible in order to save memory space.
Each load/store instruction carries a hint regarding
prefetching the next memory reference by encoding its
differential address with respect to the current one.
To reduce D-cache power cost, we further attempt to
assign offsets so that most of the consecutive accesses
map to the same cache line. Our prefetching is done
using a one entry line buffer [Wilson et al. 1996].
Consequently, many look-ups in D-cache reduce to
incremental ones. This results in D-cache activity
reduction and power savings. Our prefetcher requires
both compiler and hardware support. In this paper, we
provide implementation on the processor model close to
ARM with small modification to the ISA. We tackle
issues such as out-of-order commit, predication, and
speculation through simple modifications to the
processor pipeline on noncritical paths. Our goal in
this work is to boost performance while
maintaining/lowering power consumption. Our results
show 12\% speedup and slight power reduction. The
runtime virtual space loss for stack and static data is
about 11.8\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "bit-differential addressing; data prefetching;
embedded processors; offset assignment",
}
@Article{Contreras:2007:XPP,
author = "Gilberto Contreras and Margaret Martonosi and Jinzhang
Peng and Guei-Yuan Lueh and Roy Ju",
title = "The {XTREM} power and performance simulator for the
{Intel XScale} core: {Design} and experiences",
journal = j-TECS,
volume = "6",
number = "1",
pages = "4:1--4:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210272",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Managing power concerns in microprocessors has become
a pressing research problem across the domains of
computer architecture, CAD, and compilers. As a result,
several parameterized cycle-level power simulators have
been introduced. While these simulators can be quite
useful for microarchitectural studies, their generality
limits how accurate they can be for any one chip
family. Furthermore, their hardware focus means that
they do not explicitly enable studying the interaction
of different software layers, such as Java applications
and their underlying runtime system software. This
paper describes and evaluates XTREM, a power-simulation
tool tailored for the Intel XScale microarchitecture.
In building XTREM, our goals were to develop a
microarchitecture simulator that, while still offering
size parameterizations for cache and other structures,
more accurately reflected a realistic processor
pipeline. We present a detailed set of validations
based on multimeter power measurements and hardware
performance counter sampling. XTREM exhibits an average
performance error of only 6.5\% and an even smaller
average power error: 4\%. The paper goes on to present
an application study enabled by the simulator. Namely,
we use XTREM to produce an energy consumption breakdown
for Java CDC and CLDC applications. Our simulator
measurements indicate that a large percentage of the
total energy consumption (up to 35\%) is devoted to the
virtual machine's support functions.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Intel XScale technology; Java; power measurements;
power modeling",
}
@Article{DeSutter:2007:LTC,
author = "Bjorn {De Sutter} and Ludo {Van Put} and Dominique
Chanet and Bruno {De Bus} and Koen {De Bosschere}",
title = "Link-time compaction and optimization of {ARM}
executables",
journal = j-TECS,
volume = "6",
number = "1",
pages = "5:1--5:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210273",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The overhead in terms of code size, power consumption,
and execution time caused by the use of precompiled
libraries and separate compilation is often
unacceptable in the embedded world, where real-time
constraints, battery life-time, and production costs
are of critical importance. In this paper, we present
our link-time optimizer for the ARM architecture. We
discuss how we can deal with the peculiarities of the
ARM architecture related to its visible program counter
and how the introduced overhead can to a large extent
be eliminated. Our link-time optimizer is evaluated
with four tool chains, two proprietary ones from ARM
and two open ones based on GNU GCC. When used with
proprietary tool chains from ARM Ltd., our link-time
optimizer achieved average code size reductions of 16.0
and 18.5\%, while the programs have become 12.8 and
12.3\% faster, and 10.7 to 10.1\% more energy
efficient. Finally, we show how the incorporation of
link-time optimization in tool chains may influence
library interface design.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compaction; linker; optimization; performance",
}
@Article{Panainte:2007:MCR,
author = "Elena Moscu Panainte and Koen Bertels and Stamatis
Vassiliadis",
title = "The {Molen} compiler for reconfigurable processors",
journal = j-TECS,
volume = "6",
number = "1",
pages = "6:1--6:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210274",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this paper, we describe the compiler developed to
target the Molen reconfigurable processor and
programming paradigm. The compiler automatically
generates optimized binary code for C applications,
based on pragma annotation of the code executed on the
reconfigurable hardware. For the IBM PowerPC 405
processor included in the Virtex II Pro platform FPGA,
we implemented code generation, register, and stack
frame allocation following the PowerPC EABI (embedded
application binary interface). The PowerPC backend has
been extended to generate the appropriate instructions
for the reconfigurable hardware and data transfer,
taking into account the information of the specific
hardware implementations and system. Starting with an
annotated C application, a complete design flow has
been integrated to generate the executable bitstream
for the reconfigurable processor. The flexible design
of the proposed infrastructure allows to consider the
special features of the reconfigurable architectures.
In order to hide the reconfiguration latencies, we
implemented an instruction-scheduling algorithm for the
dynamic hardware configuration instructions. The
algorithm schedules, in advance, the hardware
configuration instructions, taking into account the
conflicts for the reconfigurable hardware resources
(FPGA area) between the hardware operations. To verify
the Molen compiler, we used the multimedia video frame
M-JPEG encoder of which the extended discrete cosine
transform (DCT*) function was mapped on the FPGA. We
obtained an overall speedup of 2.5 (about 84\%
efficiency over the maximal theoretical speedup of
2.96). The performance efficiency is achieved using
automatically generated nonoptimized DCT* hardware
implementation. The instruction-scheduling algorithm
has been tested for DCT, quantization, and VLC
operations. Based on simulation results, we determine
that, while a simple scheduling produces a significant
performance decrease, our proposed scheduling
contributes for up to $ 16 \times $ M-JPEG encoder
speedup.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "FPGA; instruction scheduling; reconfigurable
computing",
}
@Article{Tan:2007:TAP,
author = "Yudong Tan and Vincent Mooney",
title = "Timing analysis for preemptive multitasking real-time
systems with caches",
journal = j-TECS,
volume = "6",
number = "1",
pages = "7:1--7:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210275",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this paper, we propose an approach to estimate the
worst-case response time (WCRT) of each task in a
preemptive multitasking single-processor real-time
system utilizing an L1 cache. The approach combines
intertask cache-eviction analysis and intratask
cache-access analysis to estimate the number of cache
lines that can possibly be evicted by the preempting
task and also be accessed again by the preempted task
after preemptions (thus requiring the preempted task to
reload the cache line(s)). This cache-reload delay
caused by preempting task(s) is then incorporated into
WCRT analysis. Three sets of applications with up to
six concurrent tasks running are used to test our
approach. The experimental results show that our
approach can tighten the WCRT estimate by up to 32\% ($
1.4 \times $) over prior state-of-the-art.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "real-time; worst-case response time",
}
@Article{Ratschan:2007:SVH,
author = "Stefan Ratschan and Zhikun She",
title = "Safety verification of hybrid systems by constraint
propagation-based abstraction refinement",
journal = j-TECS,
volume = "6",
number = "1",
pages = "8:1--8:??",
month = feb,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1210268.1210276",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:20:58 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This paper deals with the problem of safety
verification of nonlinear hybrid systems. We start from
a classical method that uses interval arithmetic to
check whether trajectories can move over the boundaries
in a rectangular grid. We put this method into an
abstraction refinement framework and improve it by
developing an additional refinement step that employs
interval-constraint propagation to add information to
the abstraction without introducing new grid elements.
Moreover, the resulting method allows switching
conditions, initial states, and unsafe states to be
described by complex constraints, instead of sets that
correspond to grid elements. Nevertheless, the method
can be easily implemented, since it is based on a
well-defined set of constraints, on which one can run
any constraint propagation-based solver. Tests of such
an implementation are promising.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "constraint propagation; hybrid systems; intervals",
}
@Article{Schepers:2007:GEI,
author = "Henk Schepers",
title = "Guest editorial: {Introduction} to the special issue
on software and compilers for embedded systems",
journal = j-TECS,
volume = "6",
number = "2",
pages = "9:1--9:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234676",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2007:SCT,
author = "Sheayun Lee and Jaejin Lee and Chang Yun Park and Sang
Lyul Min",
title = "Selective code transformation for dual instruction set
processors",
journal = j-TECS,
volume = "6",
number = "2",
pages = "10:1--10:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234677",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded systems are often constrained in terms of
both code size and execution time, because of a limited
amount of available memory and real-time nature of
applications. A dual instruction set processor, which
supports a reduced instruction set (16
bits/instruction), in addition to a full instruction
set (32 bits/instruction), allows an opportunity for a
tradeoff between these two design criteria.
Specifically, while the reduced instruction set can be
used to reduce code size by providing smaller
instructions, a program compiled into the reduced
instruction set typically runs slower than the same
program compiled into the full instruction set.
Motivated by this observation, we propose a code
generation technique that exploits this tradeoff
relationship by selectively using the two instruction
sets for different sections in the program. The
proposed technique, called selective code
transformation, not only provides a mechanism to enable
a flexible tradeoff between a program's code size and
its execution time, but also facilitates program
optimization toward enhancing its worst case
performance. The results from our experiments show that
our proposed technique can be effectively used to
fine-tune an application program on a spectrum of code
size and execution performance, which, in turn, enables
a system-wide optimization on memory space and
execution speed involving multiple applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "dual instruction set processors; mixed-width
instruction set architecture; reduced bid-width
instruction set architecture",
}
@Article{Zhang:2007:RBP,
author = "Wei Zhang and Bramha Allu",
title = "Reducing branch predictor leakage energy by exploiting
loops",
journal = j-TECS,
volume = "6",
number = "2",
pages = "11:1--11:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234678",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "With the scaling of technology, leakage energy will
become the dominant source of energy consumption.
Besides cache memories, branch predictors are among the
largest on-chip array structures and consume nontrivial
leakage energy. This paper proposes two cost-effective
loop-based strategies to reduce the branch predictor
leakage without impacting prediction accuracy or
performance. The loop-based approaches exploit the fact
that loops usually only contain a small number of
instructions and, hence, even fewer branch instructions
while taking a significant fraction of the execution
time. Consequently, all the nonactive entries of branch
predictors can be placed into the low leakage mode
during the loop execution in order to reduce leakage
energy. Compiler and circuit supports are discussed to
implement the proposed leakage-reduction strategies.
Compared to the recently proposed decay-based approach,
our experimental results show that the loop-based
approach can extract 16.2\% more dead time of the
branch predictor, on average, leading to more leakage
energy savings without impacting the branch prediction
accuracy and performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "branch prediction; compiler; leakage energy",
}
@Article{Scharwaechter:2007:AAE,
author = "Hanno Scharwaechter and David Kammler and Andreas
Wieferink and Manuel Hohenauer and Kingshuk Karuri and
Jianjiang Ceng and Rainer Leupers and Gerd Ascheid and
Heinrich Meyr",
title = "{ASIP} architecture exploration for efficient {IPSec}
encryption: a case study",
journal = j-TECS,
volume = "6",
number = "2",
pages = "12:1--12:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234679",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Application-Specific Instruction-Set Processors
(ASIPs) are becoming increasingly popular in the world
of customized, application-driven System-on-Chip (SoC)
designs. Efficient ASIP design requires an iterative
architecture exploration loop---gradual refinement of
the processor architecture starting from an initial
template. To accomplish this task, design automation
tools are used to detect bottlenecks in embedded
applications, to implement application-specific
processor instructions, and to automatically generate
the required software tools (such as instruction-set
simulator, C-compiler, assembler, and profiler), as
well as to synthesize the hardware. This paper
describes an architecture exploration loop for an ASIP
coprocessor that implements common encryption
functionality used in symmetric block cipher algorithms
for internet protocol security (IPSec). The coprocessor
is accessed via shared memory and, as a consequence,
our approach is easily adaptable to arbitrary main
processor architectures. This paper presents the
extended version of our case study that has been
already published on the SCOPES conference in 2004. In
both papers, a MIPS architecture is used as the main
processor and Blowfish as encryption algorithm.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ADL; ASIP; computer-aided design; IPSec",
}
@Article{Turjan:2007:CIC,
author = "Alexandru Turjan and Bart Kienhuis and Ed Deprettere",
title = "Classifying interprocess communication in process
network representation of nested-loop programs",
journal = j-TECS,
volume = "6",
number = "2",
pages = "13:1--13:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234680",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "New embedded signal-processing architectures are
emerging that are composed of loosely coupled
heterogeneous components like CPUs or DSPs, specialized
IP cores, reconfigurable units, or memories. We believe
that these architectures should be programmed using the
process network model of computation. To ease the
mapping of applications, we are developing the Compaan
compiler that automatically derives a process network
(PN) description from an application written in Matlab
or C. In this paper, we investigate a particular
problem in nested loop programs, which is about
classifying the interprocess communication in the PN
representation of the nested loop program. The global
memory arrays present in the code have to be replaced
by a distributed communication structure used for
communicating data between the network processes. We
show that four types of communication exist, each
exhibiting different requirements when realizing them
in hardware or software. We first present two compile
time tests that are based on integer linear programming
to decide the type of the communication. In the second
part of this paper, we present alternative
classification techniques that have polynomial
complexity. However, in some cases, those techniques do
not give a definitive answer and the ILP tests have to
be applied. All present tests are combined in a hybrid
classification scheme that correctly classifies the
interprocess communication. In only 5\% of the cases to
classify, we have to rely on integer linear programming
while, in the remaining 95\%, the alternative
techniques presented in this paper are able to
correctly classify each case. The hybrid classification
scheme has become an important part of our Compaan
compiler.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "hybrid classification approach; integer linear
programming; matrix manipulations; static analysis",
}
@Article{Ko:2007:BSA,
author = "Ming-Yung Ko and Praveen K. Murthy and Shuvra S.
Bhattacharyya",
title = "Beyond single-appearance schedules: {Efficient DSP}
software synthesis using nested procedure calls",
journal = j-TECS,
volume = "6",
number = "2",
pages = "14:1--14:??",
month = may,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1234675.1234681",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:17 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Synthesis of digital signal-processing (DSP) software
from dataflow-based formal models is an effective
approach for tackling the complexity of modern DSP
applications. In this paper, an efficient method is
proposed for applying subroutine call instantiation of
module functionality when synthesizing embedded
software from a dataflow specification. The technique
is based on a novel recursive decomposition of
subgraphs in a cluster hierarchy that is optimized for
low buffer size. Applying this technique, one can
achieve significantly lower buffer sizes than what is
available for minimum code size inlined schedules,
which have been the emphasis of prior work on software
synthesis. Furthermore, it is guaranteed that the
number of procedure calls in the synthesized program is
polynomially bounded in the size of the input dataflow
graph, even though the number of module invocations may
increase exponentially. This recursive decomposition
approach provides an efficient means for integrating
subroutine-based module instantiation into the design
space of DSP software synthesis. The experimental
results demonstrate a significant improvement in buffer
cost, especially for more irregular multirate DSP
applications, with moderate code and execution time
overhead.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "block diagram compiler; design methodology; embedded
systems; hierarchical graph decomposition; memory
optimization; procedural implementation; synchronous
dataflow",
}
@Article{Hua:2007:PDM,
author = "Shaoxiong Hua and Gang Qu and Shuvra S.
Bhattacharyya",
title = "Probabilistic design of multimedia embedded systems",
journal = j-TECS,
volume = "6",
number = "3",
pages = "15:1--15:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275987",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this paper, we propose the novel concept of
probabilistic design for multimedia embedded systems,
which is motivated by the challenge of how to design,
but not overdesign, such systems while systematically
incorporating performance requirements of multimedia
application, uncertainties in execution time, and
tolerance for reasonable execution failures. Unlike
most present techniques that are based on either worst-
or average-case execution times of application tasks,
where the former guarantees the completion of each
execution, but often leads to overdesigned systems, and
the latter fails to provide any completion guarantees,
the proposed probabilistic design method takes
advantage of unique features mentioned above of
multimedia systems to relax the rigid hardware
requirements for software implementation and avoid
overdesigning the system. In essence, this relaxation
expands the design space and we further develop an
off-line on-line minimum effort algorithm for quick
exploration of the enlarged design space at early
design stages. This is the first step toward our goal
of bridging the gap between real-time analysis and
embedded software implementation for rapid and economic
multimedia system design. It is our belief that the
proposed method has great potential in reducing system
resource while meeting performance requirements. The
experimental results confirm this as we achieve
significant saving in system's energy consumption to
provide a statistical completion ratio guarantee (i.e.,
the expected number of completions over a large number
of iterations is greater than a given value).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "completion ratio; energy minimization;
hardware/software codesign; multiple voltage;
probabilistic design; soft real-time system",
}
@Article{Koushanfar:2007:TMC,
author = "Farinaz Koushanfar and Abhijit Davare and David T.
Nguyen and Alberto Sangiovanni-Vincentelli and Miodrag
Potkonjak",
title = "Techniques for maintaining connectivity in wireless
ad-hoc networks under energy constraints",
journal = j-TECS,
volume = "6",
number = "3",
pages = "16:1--16:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275988",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Distributed wireless systems (DWSs) are emerging as
the enabler for next-generation wireless applications.
There is a consensus that DWS-based applications, such
as pervasive computing, sensor networks, wireless
information networks, and speech and data communication
networks, will form the backbone of the next
technological revolution. Simultaneously, with great
economic, industrial, consumer, and scientific
potential, DWSs pose numerous technical challenges.
Among them, two are widely considered as crucial:
autonomous localized operation and minimization of
energy consumption. We address the fundamental problem
of how to maximize the lifetime of the network using
only local information, while preserving network
connectivity. We start by introducing the care-free
sleep (CS) Theorem that provides provably optimal
conditions for a node to go into sleep mode while
ensuring that global connectivity is not affected. The
CS theorem is the basis for an efficient localized
algorithm that decides which nodes will go to into
sleep mode and for how long. We have also developed
mechanisms for collecting neighborhood information and
for the coordination of distributed energy minimization
protocols. The effectiveness of the approach is
demonstrated using a comprehensive study of the
performance of the algorithm over a wide range of
network parameters. Another important highlight is the
first mathematical and Monte Carlo analysis that
establishes the importance of considering nodes within
a small number of hops in order to preserve energy.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ad-hoc networks; connectivity; energy management; low
power; power management; sleeping coordination",
}
@Article{Wagner:2007:HSI,
author = "Fl{\'a}vio R. Wagner and Wander Ces{\'a}rio and Ahmed
A. Jerraya",
title = "Hardware\slash software {IP} integration using the
{ROSES} design environment",
journal = j-TECS,
volume = "6",
number = "3",
pages = "17:1--17:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275989",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Considering current time-to-market pressures, IP reuse
is mandatory for the design of complex embedded
systems-on-chip (SoC). The integration of IP components
into a given design is the most complex task in the
whole reuse process. This paper describes the IP
integration approach implemented in the ROSES design
environment, which presents a unique combination of
features that enhance IP reuse: automatic assembly of
interfaces between heterogeneous software and hardware
IP components; easy adaptation to different on-chip
communication structures and bus and core standards;
generation of customized and minimal OSs for
programmable components; and an
architecture-independent high-level API embedded into
SystemC that makes application software independent
from system implementation. Application code is written
by using communication functions available in this API.
ROSES automatically assembles wrappers that implement
these functions, such that the application code does
not need to be modified in order to run in the final
synthesized system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "IP integration; systems-on-chip",
}
@Article{Lee:2007:LBB,
author = "Sang-Won Lee and Dong-Joo Park and Tae-Sun Chung and
Dong-Ho Lee and Sangwon Park and Ha-Joo Song",
title = "A log buffer-based flash translation layer using
fully-associative sector translation",
journal = j-TECS,
volume = "6",
number = "3",
pages = "18:1--18:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275990",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Flash memory is being rapidly deployed as data storage
for mobile devices such as PDAs, MP3 players, mobile
phones, and digital cameras, mainly because of its low
electronic power, nonvolatile storage, high
performance, physical stability, and portability. One
disadvantage of flash memory is that prewritten data
cannot be dynamically overwritten. Before overwriting
prewritten data, a time-consuming erase operation on
the used blocks must precede, which significantly
degrades the overall write performance of flash memory.
In order to solve this ``erase-before-write'' problem,
the flash memory controller can be integrated with a
software module, called ``flash translation layer
(FTL).'' Among many FTL schemes available, the log
block buffer scheme is considered to be optimum. With
this scheme, a small number of log blocks, a kind of
write buffer, can improve the performance of write
operations by reducing the number of erase operations.
However, this scheme can suffer from low space
utilization of log blocks. In this paper, we show that
there is much room for performance improvement in the
log buffer block scheme, and propose an enhanced log
block buffer scheme, called FAST (full associative
sector translation). Our FAST scheme improves the space
utilization of log blocks using fully-associative
sector translations for the log block sectors. We also
show empirically that our FAST scheme outperforms the
pure log block buffer scheme.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "address translation; associative mapping; flash
memory; FTL; log blocks",
}
@Article{Wu:2007:EBT,
author = "Chin-Hsien Wu and Tei-Wei Kuo and Li Ping Chang",
title = "An efficient {B-tree} layer implementation for
flash-memory storage systems",
journal = j-TECS,
volume = "6",
number = "3",
pages = "19:1--19:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275991",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "With the significant growth of the markets for
consumer electronics and various embedded systems,
flash memory is now an economic solution for storage
systems design. Because index structures require
intensively fine-grained updates/modifications,
block-oriented access over flash memory could introduce
a significant number of redundant writes. This might
not only severely degrade the overall performance, but
also damage the reliability of flash memory. In this
paper, we propose a very different approach, which can
efficiently handle fine-grained updates/modifications
caused by B-tree index access over flash memory. The
implementation is done directly over the flash
translation layer (FTL); hence, no modifications to
existing application systems are needed. We demonstrate
that when index structures are adopted over flash
memory, the proposed methodology can significantly
improve the system performance and, at the same time,
reduce both the overhead of flash-memory management and
the energy dissipation. The average response time of
record insertions and deletions was also significantly
reduced.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "B-tree; database systems; embedded systems; flash
memory; storage systems",
}
@Article{Xie:2007:ISP,
author = "Tao Xie and Xiao Qin",
title = "Improving security for periodic tasks in embedded
systems through scheduling",
journal = j-TECS,
volume = "6",
number = "3",
pages = "20:1--20:??",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1275986.1275992",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:49:41 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "While many scheduling algorithms for periodic tasks
ignore security requirements posed by sensitive
applications and are, consequently, unable to perform
properly in embedded systems with security constraints,
in this paper, we present an approach to scheduling
periodic tasks in embedded systems subject to security
and timing constraints. We design a necessary and
sufficient feasibility check for a set of periodic
tasks with security requirements. With the feasibility
test in place, we propose a scheduling algorithm, or
SASES (security-aware scheduling for embedded systems),
which accounts for both security and timing
requirements. SASES judiciously distributes slack times
among a variety of security services for a set of
periodic tasks, thereby optimizing security for
embedded systems without sacrificing schedulability. To
demonstrate the effectiveness of SASES, we apply the
proposed SASES to real-world embedded systems such as
an automated flight control system. We show, through
extensive simulations, that SASES is able to maximize
security for embedded systems while guaranteeing
timeliness. In particular, SASES significantly improves
security over three baseline algorithms by up to
107\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded systems; periodic tasks; real-time systems;
scheduling; security-sensitive applications",
}
@Article{Gupta:2007:ISL,
author = "Rajiv Gupta and Yunheung Paek",
title = "Introduction to the special {LCTES'05} issue",
journal = j-TECS,
volume = "6",
number = "4",
pages = "21:1--21:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274859",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gay:2007:SDP,
author = "David Gay and Philip Levis and David Culler",
title = "Software design patterns for {TinyOS}",
journal = j-TECS,
volume = "6",
number = "4",
pages = "22:1--22:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274860",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present design patterns used by software components
in the TinyOS sensor network operating system. They
differ significantly from traditional software design
patterns because of the constraints of sensor networks
and to TinyOS's focus on static allocation and
whole-program composition. We describe how nesC has
evolved to support these design patterns by including a
few simple language primitives and optimizations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "design patterns; embedded systems; nesC; TinyOS",
}
@Article{Chanet:2007:ARM,
author = "Dominique Chanet and Bjorn {De Sutter} and Bruno {De
Bus} and Ludo {Van Put} and Koen {De Bosschere}",
title = "Automated reduction of the memory footprint of the
{Linux} kernel",
journal = j-TECS,
volume = "6",
number = "4",
pages = "23:1--23:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274861",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The limited built-in configurability of Linux can lead
to expensive code size overhead when it is used in the
embedded market. To overcome this problem, we propose
the application of link-time compaction and
specialization techniques that exploit the a priori
known, fixed runtime environment of many embedded
systems. In experimental setups based on the ARM XScale
and i386 platforms, the proposed techniques are able to
reduce the kernel memory footprint with over 16\%. We
also show how relatively simple additions to existing
binary rewriters can implement the proposed techniques
for a complex, very unconventional program, such as the
Linux kernel. We note that even after specialization, a
lot of seemingly unnecessary code remains in the kernel
and propose to reduce the footprint of this code by
applying code-compression techniques. This technique,
combined with the previous ones, reduces the memory
footprint with over 23\% for the i386 platform and 28\%
for the ARM platform. Finally, we pinpoint an important
code size growth problem when compaction and
compression techniques are combined on the ARM
platform.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compaction; compression; Linux kernel; operating
system; specialization; system calls",
}
@Article{Sassone:2007:SSS,
author = "Peter G. Sassone and D. Scott Wills and Gabriel H.
Loh",
title = "Static strands: {Safely} exposing dependence chains
for increasing embedded power efficiency",
journal = j-TECS,
volume = "6",
number = "4",
pages = "24:1--24:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274862",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Modern embedded processors are designed to maximize
execution efficiency---the amount of performance
achieved per unit of energy dissipated while meeting
minimum performance levels. To increase this
efficiency, we propose utilizing static strands,
dependence chains without fan-out, which are exposed by
a compiler pass. These dependent instructions are
resequenced to be sequential and annotated to
communicate their location to the hardware.
Importantly, this modified application is binary
compatible and functionally identical to the original,
allowing transparent execution on a baseline processor.
However, these static strands can be easily collapsed
and optimized by simple processor modifications,
significantly reducing the workload energy. Results
show that over 30\% of MediaBench and Spec2000int
dynamic instructions can be collapsed, reducing issue
logic energy by 20\%, bypass energy 19\%, and register
file energy 14\%. In addition, by increasing the
effective capacity of pipeline resources by almost a
third, average IPC can be improved up to 15\%. This
performance gain can then be traded in for a lower
clock frequency to maintain a basline level of
performance, further reducing energy.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "architecture; dependency collapsing; energy;
sequentiality",
}
@Article{Staschulat:2007:SPC,
author = "Jan Staschulat and Rolf Ernst",
title = "Scalable precision cache analysis for real-time
software",
journal = j-TECS,
volume = "6",
number = "4",
pages = "25:1--25:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274863",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Caches are needed to increase the processor
performance, but the temporal behavior is difficult to
predict, especially in embedded systems with preemptive
scheduling. Current approaches use simplified
assumptions or propose complex analysis algorithms to
bound the cache-related preemption delay. In this
paper, a scalable preemption delay analysis for
associative instruction caches to control the analysis
precision and the time-complexity is proposed. An
accurate preemption delay calculation is integrated
into a cache-aware schedulability analysis. The
framework is evaluated in several experiments.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "cache; embedded systems; preemptive scheduling;
worst-case execution time analysis",
}
@Article{Varma:2007:AFS,
author = "Ankush Varma and Bruce Jacob and Eric Debes and Igor
Kozintsev and Paul Klein",
title = "Accurate and fast system-level power modeling: an
{XScale}-based case study",
journal = j-TECS,
volume = "6",
number = "4",
pages = "26:1--26:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274864",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Accurate and fast system modeling is central to the
rapid design space exploration needed for
embedded-system design. With fast, complex SoCs playing
a central role in such systems, system designers have
come to require MIPS-range simulation speeds and
near-cycle accuracy. The sophisticated simulation
frameworks that have been developed for high-speed
system performance modeling do not address power
consumption, although it is a key design constraint. In
this paper, we define a simulation-based methodology
for extending system performance-modeling frameworks to
also include power modeling. We demonstrate the use of
this methodology with a case study of a real, complex
embedded system, comprising the Intel XScale{\reg}g
embedded microprocessor, its WMMX{\trademark} SIMD
coprocessor, L1 caches, SDRAM and the on-board address
and data buses. We describe detailed power models for
each of these components and validate them against
physical measurements from hardware, demonstrating that
such frameworks enable designers to model both power
and performance at high speeds without sacrificing
accuracy. Our results indicate that the power estimates
obtained are accurate within 5\% of physical
measurements from hardware, while simulation speeds
consistently exceed a million instructions per second
(MIPS).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded systems; power modeling; SystemC",
}
@Article{Carta:2007:CTA,
author = "Salvatore Carta and Andrea Alimonda and Alessandro
Pisano and Andrea Acquaviva and Luca Benini",
title = "A control theoretic approach to energy-efficient
pipelined computation in {MPSoCs}",
journal = j-TECS,
volume = "6",
number = "4",
pages = "27:1--27:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274865",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this work, we describe a control theoretic approach
to dynamic voltage/frequency scaling (DVFS) in a
pipelined MPSoC architecture with soft real-time
constraints, aimed at minimizing energy consumption
with throughput guarantees. Theoretical analysis and
experiments carried out on a cycle-accurate,
energy-aware, and multiprocessor simulation platform
are provided. We give a dynamic model of the system
behavior which allows to synthesize linear and
nonlinear feedback control schemes for the run-time
adjustment of the core frequencies. We study the
characteristics of the proposed techniques in both
transient and steady-state conditions. Finally, we
compare the proposed feedback approaches and local DVFS
policies from an energy consumption viewpoint.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "DVFS; feedback-control techniques; MPSoC; parallel
systems",
}
@Article{Crenshaw:2007:RIE,
author = "Tanya L. Crenshaw and Spencer Hoke and Ajay Tirumala
and Marco Caccamo",
title = "Robust implicit {EDF}: a wireless {MAC} protocol for
collaborative real-time systems",
journal = j-TECS,
volume = "6",
number = "4",
pages = "28:1--28:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274866",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Advances in wireless technology have brought us closer
to extensive deployment of distributed real-time
embedded systems connected through a wireless channel.
The medium-access control (MAC) layer protocol is
critical in providing a real-time guarantee. We have
devised a real-time wireless MAC protocol, robust
implicit earliest deadline first, or RI-EDF. Packets
are transmitted according to EDF scheduling rules,
offering a protocol that implicitly avoids contention.
In the event of a packet loss or a node failure, every
node has the opportunity to recover the schedule based
on a static recovery priority, offering a protocol that
is robust with no central point of failure. We
demonstrate in simulations that RI-EDF provides better
goodput and lower packet loss than existing protocols
like 802.11 PCF and EDCF. In our implementation and
distributed control test-bed, we show that RI-EDF
provides better throughput than the TinyOS MAC-layer
protocol. Overall, RI-EDF provides predictable temporal
behavior with minimal impact on node failures, packet
losses, and noise in the channel.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "earliest deadline first; medium-access control; real
time; wireless",
}
@Article{Quan:2007:EED,
author = "Gang Quan and Xiaobo Sharon Hu",
title = "Energy efficient {DVS} schedule for fixed-priority
real-time systems",
journal = j-TECS,
volume = "6",
number = "4",
pages = "29:1--29:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274867",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Energy consumption has become an increasingly
important consideration in designing many real-time
embedded systems. Variable voltage processors, if used
properly, can dramatically reduce such system energy
consumption. In this paper, we present a technique to
determine voltage settings for a variable voltage
processor that utilizes a fixed-priority assignment to
schedule jobs. By exploiting more efficiently the
processor slack time, our approach can be more
effective in reducing the execution speed for real-time
tasks when necessary. Our approach also produces the
minimum constant voltage needed to feasibly schedule
the entire job set. With both randomly generated and
practical examples, our heuristic approach can achieve
the dynamic energy reduction very close to the
theoretically optimal one (within 2\%) with much less
computation cost.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "dynamic voltage scaling; fixed-priority scheduling;
low power; real time",
}
@Article{Rao:2007:EOS,
author = "Ravishankar Rao and Sarma Vrudhula",
title = "Energy optimal speed control of a producer--consumer
device pair",
journal = j-TECS,
volume = "6",
number = "4",
pages = "30:1--30:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274868",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We propose a modular approach for minimizing the total
energy consumed by a pair of generic communicating
devices (producer--consumer scenario) by jointly
controlling their speed profiles. Each device (like a
CPU, or disk drive) is assumed to have a controllable
variable called its speed (e.g., a CPU's clock
frequency, a disk drive's spindle motor speed) that
affects its power consumption and performance (e.g.,
throughput, data transfer rate). The device and task
models we analyzed were inspired by applications like
CD recording (hard drive to CD drive data transfer) and
data processing (disk drive to CPU data transfer). The
proposed solution can be used for any pair of devices
with convex (for continuous speed sets) or W-convex (a
discrete version of a convex function for discrete
speed sets) power--speed relationships. For discrete
speed sets, the method operates directly on the
power--speed values and does not require an analytical
relationship between power and speed. The key to
solving the two-device optimization problem was the
observation that it could be split into two single
device parametric optimization problems, where the
parameters correspond to the common task that both the
devices must execute. The following divide-and-conquer
approach is proposed: [divide] the optimal speed policy
and energy consumption of each device is derived as an
analytical function of its task parameters; [conquer]
the optimal values of these parameters are found by
minimizing the sum of the parameterized energy
functions and plugged back into the parameterized speed
profiles. The main advantage of this approach is that
each device can be characterized independently and this
allows system designers to mix and match
manufacturer-supplied device energy curves to evaluate
and optimize different application scenarios. We
demonstrate our approach using three device
characterization examples (for a CD drive, hard drive,
and a CPU) and two application scenarios (CD recording,
MD5 checksum computation).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "disk drive; energy optimization; joint optimization;
processor; speed control",
}
@Article{Loghi:2007:PMM,
author = "Mirko Loghi and Luca Benini and Massimo Poncino",
title = "Power macromodeling of {MPSoC} message passing
primitives",
journal = j-TECS,
volume = "6",
number = "4",
pages = "31:1--31:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274869",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Estimating the energy consumption of software in
multiprocessor systems-on-chip (MPSoCs) is crucial for
enabling quick evaluations of both software and
hardware optimizations. However, high-level estimations
should be applicable at software level, possibly
constructing effective power models depending on
parameters that can be extracted directly from the
application characteristics. We propose a methodology
for accurate analysis of power consumption of
message-passing primitives in a MPSoC, and, in
particular, an energy model which, in spite of its
simplicity, allows to model the traffic-dependent
nature of energy consumption through the use of a
single, abstract parameter, namely, the size of the
message exchanged.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "communication primitives; macromodeling;
multiprocessor; system-on-chip",
}
@Article{Kansal:2007:PME,
author = "Aman Kansal and Jason Hsu and Sadaf Zahedi and Mani B.
Srivastava",
title = "Power management in energy harvesting sensor
networks",
journal = j-TECS,
volume = "6",
number = "4",
pages = "32:1--32:??",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1274858.1274870",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Power management is an important concern in sensor
networks, because a tethered energy infrastructure is
usually not available and an obvious concern is to use
the available battery energy efficiently. However, in
some of the sensor networking applications, an
additional facility is available to ameliorate the
energy problem: harvesting energy from the environment.
Certain considerations in using an energy harvesting
source are fundamentally different from that in using a
battery, because, rather than a limit on the maximum
energy, it has a limit on the maximum rate at which the
energy can be used. Further, the harvested energy
availability typically varies with time in a
nondeterministic manner. While a deterministic metric,
such as residual battery, suffices to characterize the
energy availability in the case of batteries, a more
sophisticated characterization may be required for a
harvesting source. Another issue that becomes important
in networked systems with multiple harvesting nodes is
that different nodes may have different harvesting
opportunity. In a distributed application, the same
end-user performance may be achieved using different
workload allocations, and resultant energy consumptions
at multiple nodes. In this case, it is important to
align the workload allocation with the energy
availability at the harvesting nodes. We consider the
above issues in power management for energy-harvesting
sensor networks. We develop abstractions to
characterize the complex time varying nature of such
sources with analytically tractable models and use them
to address key design issues. We also develop
distributed methods to efficiently use harvested energy
and test these both in simulation and experimentally on
an energy-harvesting sensor network, prototyped for
this work.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "adaptive duty cycling; energy neutrality; Heliomote;
lifetime; power management",
}
@Article{Bueno:2007:RRP,
author = "David Bueno and Chris Conger and Alan D. George and
Ian Troxel and Adam Leko",
title = "{RapidIO} for radar processing in advanced space
systems",
journal = j-TECS,
volume = "7",
number = "1",
pages = "1:1--1:38",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324970",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Space-based radar is a suite of applications that
presents many unique system design challenges. In this
paper, we investigate use of RapidIO, a new
high-performance embedded systems interconnect, in
addressing issues associated with the high network
bandwidth requirements of real-time ground moving
target indicator (GMTI), and synthetic aperture Radar
(SAR) applications in satellite systems. Using
validated simulation, we study several critical issues
related to the RapidIO network and algorithms under
study. The results show that RapidIO is a promising
platform for space-based radar using emerging
technology, providing network bandwidth to enable
parallel computation previously unattainable in an
embedded satellite system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ground-moving target indicator; RapidIO; space-based
radar; synthetic aperture radar",
}
@Article{Fei:2007:EOS,
author = "Yunsi Fei and Srivaths Ravi and Anand Raghunathan and
Niraj K. Jha",
title = "Energy-optimizing source code transformations for
operating system-driven embedded software",
journal = j-TECS,
volume = "7",
number = "1",
pages = "2:1--2:26",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324971",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This paper proposes four types of source code
transformations for operating system (OS)-driven
embedded software programs to reduce their energy
consumption. Their key features include spanning of
process boundaries and minimization of the energy
consumed in the execution of OS
services---opportunities which are beyond the reach of
conventional compiler optimizations and source code
transformations. We have applied the proposed
transformations to several multiprocess benchmark
programs in the context of an embedded Linux OS running
on an Intel StrongARM processor. They achieve up to
37.9\% (23.8\%, on average) energy reduction compared
to highly compiler-optimized implementations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "energy consumption; Linux; source code
transformations",
}
@Article{Zhu:2007:ESA,
author = "Yifan Zhu and Frank Mueller",
title = "Exploiting synchronous and asynchronous {DVS} for
feedback {EDF} scheduling on an embedded platform",
journal = j-TECS,
volume = "7",
number = "1",
pages = "3:1--3:26",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324972",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Contemporary processors support dynamic voltage
scaling (DVS) to reduce power consumption by varying
processor voltage/frequency dynamically. We develop
power-aware feedback--DVS algorithms for hard real-time
systems that adapt to dynamically changing workloads.
The algorithms lower execution speed while guaranteeing
timing constraints. We study energy consumption for
synchronous and asynchronous DVS switching on a PowerPC
board. Energy, measured via data acquisition, is
reduced up to 70\% over na{\"\i}ve DVS for our feedback
scheme with 24\% peak savings over previous algorithms.
These results, albeit differing in quantity, confirm
trends observed under simulation. They are the first of
their kind on an embedded board.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "dynamic voltage scaling; feedback control; real-time
systems; scheduling",
}
@Article{Vera:2007:DCL,
author = "Xavier Vera and Bj{\"o}rn Lisper and Jingling Xue",
title = "Data cache locking for tight timing calculations",
journal = j-TECS,
volume = "7",
number = "1",
pages = "4:1--4:38",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324973",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Caches have become increasingly important with the
widening gap between main memory and processor speeds.
Small and fast cache memories are designed to bridge
this discrepancy. However, they are only effective when
programs exhibit sufficient data locality. In addition,
caches are a source of unpredictability, resulting in
programs sometimes behaving in a different way than
expected. Detailed information about the number of
cache misses and their causes allows us to predict
cache behavior and to detect bottlenecks. Small
modifications in the source code may change memory
patterns, thereby altering the cache behavior. Code
transformations, which take the cache behavior into
account, might result in a high cache performance
improvement. However, cache memory behavior is very
hard to predict, thus making the task of optimizing and
timing cache behavior very difficult. This article
proposes and evaluates a new compiler framework that
times cache behavior for multitasking systems. Our
method explores the use of cache partitioning and
dynamic cache locking to provide worst-case performance
estimates in a safe and tight way for multitasking
systems. We use cache partitioning, which divides the
cache among tasks to eliminate intertask cache
interferences. We combine static cache analysis and
cache-locking mechanisms to ensure that all intratask
conflicts, and consequently, memory access times, are
exactly predictable. The results of our experiments
demonstrate the capability of our framework to describe
cache behavior at compile time. We compare our timing
approach with a system equipped with a nonpartitioned,
but statically, locked data cache. Our method
outperforms static cache locking for all analyzed task
sets under various cache architectures, demonstrating
that our fully predictable scheme does not compromise
the performance of the transformed programs.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "data cache analysis; embedded systems; safety critical
systems; worst-case execution time",
}
@Article{Armbruster:2007:RTJ,
author = "Austin Armbruster and Jason Baker and Antonio Cunei
and Chapman Flack and David Holmes and Filip Pizlo and
Edward Pla and Marek Prochazka and Jan Vitek",
title = "A real-time {Java} virtual machine with applications
in avionics",
journal = j-TECS,
volume = "7",
number = "1",
pages = "5:1--5:49",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324974",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This paper reports on our experience with the
implementation of the Real-time Specification for Java
on the Ovm open source Java virtual machine. We
describe the architecture and main design decisions
involved in implementing real-time Java on Ovm. We
present the first use of Real-time Java in avionics in
the context of control software for a ScanEagle
Unmanned Aerial Vehicle.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "avionics; memory management; Real-Time Java; virtual
machines",
}
@Article{Mangeruca:2007:USU,
author = "Leonardo Mangeruca and Massimo Baleani and Alberto
Ferrari and Alberto Sangiovanni-Vincentelli",
title = "Uniprocessor scheduling under precedence constraints
for embedded systems design",
journal = j-TECS,
volume = "7",
number = "1",
pages = "6:1--6:30",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324975",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this paper, we present a novel approach to the
constrained scheduling problem, while addressing a more
general class of constraints that arise from the timing
requirements on real-time embedded controllers. We
provide general necessary and sufficient conditions for
scheduling under precedence constraints and derive
sufficient conditions for two well-known scheduling
policies. We define mathematical problems that provide
optimum priority and deadline assignments, while
ensuring both precedence constraints and system's
schedulability. We show how these problems can be
relaxed to corresponding integer linear programming
(ILP) formulations leveraging on available solvers. The
results are demonstrated on a real design case.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "design of embedded systems; embedded software;
precedence constraints; real-time scheduling",
}
@Article{Bordoloi:2007:ISA,
author = "Unmesh D. Bordoloi and Samarjit Chakraborty",
title = "Interactive schedulability analysis",
journal = j-TECS,
volume = "7",
number = "1",
pages = "7:1--7:27",
month = dec,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1324969.1324976",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:21:48 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A typical design process for real-time embedded
systems involves choosing the values of certain system
parameters and performing a schedulability analysis to
determine whether all deadline constraints can be
satisfied. If such an analysis returns a negative
answer, then some of the parameters are modified and
the analysis is invoked once again. This iteration is
repeated until a schedulable design is obtained.
However, the schedulability analysis problem for most
task models is intractable (usually co-NP hard) and,
hence, such an iterative design process is often very
expensive. To get around this problem, we introduce the
concept of ``interactive'' schedulability analysis. It
is based on the observation that if only a small number
of system parameters are changed, then it is not
necessary to rerun the full schedulability analysis
algorithm, thereby making the iterative design process
considerably faster. We refer to this analysis as being
``interactive'' because it is supposed to be run in an
interactive mode. This concept is fairly general and
can be applied to a wide variety of task models. In
this paper, we have chosen the recurring real-time task
model, because it can be used to represent realistic
applications from the embedded systems domain
(containing conditional branches and fine-grained
deadline constraints). Our experimental results show
that using our scheme can lead to more than 20{\times}
speedup for each invocation of the schedulability
analysis algorithm, compared to the case where the full
algorithm is run.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "interactive design; nonfunctional constraints;
performance debugging; recurring real-time task model;
schedulability analysis",
}
@Article{Ha:2008:IES,
author = "Soonhoi Ha and Kiyoung Choi and Taewhan Kim and
Krisztian Flautner and Sanglyul Min and Wang Yi",
title = "Introduction to embedded systems week 2006 special
issue",
journal = j-TECS,
volume = "7",
number = "2",
pages = "8:1--8:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331332",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2008:EAC,
author = "Minyoung Kim and Sudarshan Banerjee and Nikil Dutt and
Nalini Venkatasubramanian",
title = "Energy-aware cosynthesis of real-time multimedia
applications on {MPSoCs} using heterogeneous scheduling
policies",
journal = j-TECS,
volume = "7",
number = "2",
pages = "9:1--9:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331333",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Real-time multimedia applications are increasingly
being mapped onto MPSoC (multiprocessor system-on-chip)
platforms containing hardware--software IPs
(intellectual property), along with a library of common
scheduling policies such as EDF, RM. The choice of a
scheduling policy for each IP is a key decision that
greatly affects the design's ability to meet real-time
constraints, and also directly affects the energy
consumed by the design. We present a cosynthesis
framework for design space exploration that considers
heterogeneous scheduling while mapping multimedia
applications onto such MPSoCs. In our approach, we
select a suitable scheduling policy for each IP such
that system energy is minimized---our framework also
includes energy-reduction techniques utilizing dynamic
power management. Experimental results on a realistic
multimode multimedia terminal application demonstrate
that our approach enables us to select design points
with up to 60.5\% reduced energy for a given area
constraint, while meeting all real-time requirements.
More importantly, our approach generates a tradeoff
space between energy and cost allowing designers to
comparatively evaluate multiple system level
mappings.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "cosynthesis; energy; MPSoC; real-time scheduling",
}
@Article{Raman:2008:ASW,
author = "Balaji Raman and Samarjit Chakraborty",
title = "Application-specific workload shaping in
multimedia-enabled personal mobile devices",
journal = j-TECS,
volume = "7",
number = "2",
pages = "10:1--10:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331334",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Today, most personal mobile devices (e.g., cell phones
and PDAs) are multimedia-enabled and support a variety
of concurrently running applications, such as
audio/video players, word processors, and web browsers.
Media-processing applications are often computationally
expensive and most of these devices typically have
100--400-MHz processors. As a result, the
user-perceived application response times are often
poor when multiple applications are concurrently fired.
In this paper, we show that by using
application-specific dynamic buffering techniques, the
workload of these applications can be suitably
``shaped'' to fit the available processor bandwidth.
Our techniques are analogous to traffic shaping, which
is widely used in communication networks to optimally
utilize network bandwidth. Such shaping techniques have
recently attracted a lot of attention in the context of
embedded systems design (e.g., for dynamic voltage
scaling). However, they have not been exploited for
enhanced schedulability of multiple applications, as we
do in this paper.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "mobile devices; multimedia systems; schedulability
analysis",
}
@Article{Egger:2008:DSM,
author = "Bernhard Egger and Jaejin Lee and Heonshik Shin",
title = "Dynamic scratchpad memory management for code in
portable systems with an {MMU}",
journal = j-TECS,
volume = "7",
number = "2",
pages = "11:1--11:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331335",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this work, we present a dynamic memory allocation
technique for a novel, horizontally partitioned memory
subsystem targeting contemporary embedded processors
with a memory management unit (MMU). We propose to
replace the on-chip instruction cache with a scratchpad
memory (SPM) and a small minicache. Serializing the
address translation with the actual memory access
enables the memory system to access either only the SPM
or the minicache. Independent of the SPM size and based
solely on profiling information, a postpass optimizer
classifies the code of an application binary into a
pageable and a cacheable code region. The latter is
placed at a fixed location in the external memory and
cached by the minicache. The former, the pageable code
region, is copied on demand to the SPM before
execution. Both the pageable code region and the SPM
are logically divided into pages the size of an MMU
memory page. Using the MMU's pagefault exception
mechanism, a runtime scratchpad memory manager (SPMM)
tracks page accesses and copies frequently executed
code pages to the SPM before they get executed. In
order to minimize the number of page transfers from the
external memory to the SPM, good code placement
techniques become more important with increasing sizes
of the MMU pages. We discuss code-grouping techniques
and provide an analysis of the effect of the MMU's page
size on execution time, energy consumption, and
external memory accesses. We show that by using the
data cache as a victim buffer for the SPM, significant
energy savings are possible. We evaluate our SPM
allocation strategy with fifteen applications,
including H.264, MP3, MPEG-4, and PGP. The proposed
memory system requires 8\% less die are compared to a
fully-cached configuration. On average, we achieve a
31\% improvement in runtime performance and a 35\%
reduction in energy consumption with an MMU page size
of 256 bytes.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "code placement; compilers; heterogeneous memory;
paging; portable systems; postpass optimization;
scratchpad; victim cache; virtual memory",
}
@Article{Scholz:2008:MPB,
author = "Bernhard Scholz and Bernd Burgstaller and Jingling
Xue",
title = "Minimal placement of bank selection instructions for
partitioned memory architectures",
journal = j-TECS,
volume = "7",
number = "2",
pages = "12:1--12:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331336",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We have devised an algorithm for minimal placement of
bank selections in partitioned memory architectures.
This algorithm is parameterizable for a chosen metric,
such as speed, space, or energy. Bank switching is a
technique that increases the code and data memory in
microcontrollers without extending the address buses.
Given a program in which variables have been assigned
to data banks, we present a novel optimization
technique that minimizes the overhead of bank switching
through cost-effective placement of bank selection
instructions. The placement is controlled by a number
of different objectives, such as runtime, low power,
small code size or a combination of these parameters.
We have formulated the minimal placement of bank
selection instructions as a discrete optimization
problem that is mapped to a partitioned boolean
quadratic programming (PBQP) problem. We implemented
the optimization as part of a PIC Microchip backend and
evaluated the approach for several optimization
objectives. Our benchmark suite comprises programs from
MiBench and DSPStone plus a microcontroller real-time
kernel and drivers for microcontroller hardware
devices. Our optimization achieved a reduction in
program memory space of between 2.7 and 18.2\%, and an
overall improvement with respect to instruction cycles
between 5.0 and 28.8\%. Our optimization achieved the
minimal solution for all benchmark programs. We
investigated the scalability of our approach toward the
requirements of future generations of microcontrollers.
This study was conducted as a worst-case analysis on
the entire MiBench suite. Our results show that our
optimization (1) scales well to larger numbers of
memory banks, (2) scales well to the larger problem
sizes that will become feasible with future
microcontrollers, and (3) achieves minimal placement
for more than 72\% of all functions from MiBench.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "bank selection; partitioned Boolean quadratic
programming; partitioned memory architectures",
}
@Article{Choi:2008:SHM,
author = "Yoonseo Choi and Hwansoo Han",
title = "Shared heap management for memory-limited {Java}
virtual machines",
journal = j-TECS,
volume = "7",
number = "2",
pages = "13:1--13:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331337",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "One scarce resource in embedded systems is memory.
Multitasking makes the lack of memory problem even
worse. Most current embedded systems, which do not
provide virtual memory, simply divide physical memory
and evenly assign contiguous memory chunks to multiple
applications. Such simple memory management can
frequently cause the lack of available memory for some
applications, while others are not using the full
amount of assigned memory. To overcome inefficiency in
current memory management, we present an efficient heap
management scheme that allows multiple applications to
share heap space. To reduce overall heap memory usage,
applications adaptively acquire subheaps out of shared
pool of memory and release surplus subheaps to shared
pool. As a result, applications see noncontiguous
multiple subheaps as a heap in their address space. We
target Java applications to implement our heap-sharing
scheme in the KVM from Sun Microsystems. To protect
fragmented heap space with a limited number of regions
in memory protection unit (MPU), we maintain only a
limited number of subheaps. We experimentally evaluate
our heap management scheme with J2ME MIDP applications.
Our static and dynamic schemes reduce heap memory
usage, on average, by 30 and 27\%, respectively. For
both schemes, overheads are kept low. The execution
times in our schemes are increased only by 0.01\% for
static scheme and 0.35\% for dynamic scheme, on
average.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "dynamic memory management; garbage collection; heap
sharing; memory protection unit",
}
@Article{So:2008:UHS,
author = "Hayden Kwok-Hay So and Robert Brodersen",
title = "A unified hardware\slash software runtime environment
for {FPGA}-based reconfigurable computers using
{BORPH}",
journal = j-TECS,
volume = "7",
number = "2",
pages = "14:1--14:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331338",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This paper explores the design and implementation of
BORPH, an operating system designed for FPGA-based
reconfigurable computers. Hardware designs execute as
normal UNIX processes under BORPH, having access to
standard OS services, such as file system support.
Hardware and software components of user designs may,
therefore, run as communicating processes within
BORPH's runtime environment. The familiar language
independent UNIX kernel interface facilitates easy
design reuse and rapid application development. To
develop hardware designs, a Simulink-based design flow
that integrates with BORPH is employed. Performances of
BORPH on two on-chip systems implemented on a BEE2
platform are compared.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "BORPH; FPGA; hardware process; reconfigurable
computers",
}
@Article{Caspi:2008:SPM,
author = "Paul Caspi and Norman Scaife and Christos Sofronis and
Stavros Tripakis",
title = "Semantics-preserving multitask implementation of
synchronous programs",
journal = j-TECS,
volume = "7",
number = "2",
pages = "15:1--15:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331339",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We study the implementation of a synchronous program
as a set of multiple tasks running on the same
computer, and scheduled by a real-time operating system
using some preemptive scheduling policy, such as fixed
priority or earliest-deadline first. Multitask
implementations are necessary, for instance, in
multiperiodic applications, when the worst-case
execution time of the program is larger than its
smallest period. In this case, a single-task
implementation violates the schedulability assumption
and, therefore, the synchrony hypothesis does not hold.
We are aiming at semantics-preserving implementations,
where, for a given input sequence, the output sequence
produced by the implementation is the same as that
produced by the original synchronous program, and this
under all possible executions of the implementation.
Straightforward implementation techniques are not
semantics-preserving. We present an intertask
communication protocol, called DBP, that is
semantics-preserving and memory-optimal. DBP guarantees
semantical preservation under all possible triggering
patterns of the synchronous program: thus, it is
applicable not only to time-, but also event-triggered
applications. DBP works under both fixed priority and
earliest-deadline first scheduling. DBP is a
nonblocking protocol based on the use of intermediate
buffers and manipulations of write-to/read-from
pointers to these buffers: these manipulations happen
upon arrivals, rather than executions of tasks, which
is a distinguishing feature of DBP. DBP is
memory-optimal in the sense that it uses as few buffers
as needed, for any given triggering pattern. In the
worst case, DBP requires, at most, $ N + 2 $ buffers
for each writer, where $N$ is the number of readers for
this writer.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded software; model-based design; optimality;
preemptive scheduling; process communication;
semantical preservation; synchronous programming",
}
@Article{Liu:2008:HPP,
author = "Duo Liu and Zheng Chen and Bei Hua and Nenghai Yu and
Xinan Tang",
title = "High-performance packet classification algorithm for
multithreaded {IXP} network processor",
journal = j-TECS,
volume = "7",
number = "2",
pages = "16:1--16:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331340",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Packet classification is crucial for the Internet to
provide more value-added services and guaranteed
quality of service. Besides hardware-based solutions,
many software-based classification algorithms have been
proposed. However, classifying at 10 Gbps speed or
higher is a challenging problem and it is still one of
the performance bottlenecks in core routers. In
general, classification algorithms face the same
challenge of balancing between high classification
speed and low memory requirements. This paper proposes
a modified recursive flow classification (RFC)
algorithm, Bitmap-RFC, which significantly reduces the
memory requirements of RFC by applying a bitmap
compression technique. To speed up classifying speed,
we exploit the multithreaded architectural features in
various algorithm development stages from algorithm
design to algorithm implementation. As a result,
Bitmap-RFC strikes a good balance between speed and
space. It can significantly keep both high
classification speed and reduce memory space
consumption. This paper investigates the main NPU
software design aspects that have dramatic performance
impacts on any NPU-based implementations: memory space
reduction, instruction selection, data allocation, task
partitioning, and latency hiding. We experiment with an
architecture-aware design principle to guarantee the
high performance of the classification algorithm on an
NPU implementation. The experimental results show that
the Bitmap-RFC algorithm achieves 10 Gbps speed or
higher and has a good scalability on Intel IXP2800
NPU.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "architecture; embedded system design; multithreading;
network processor; packet classification; thread-level
parallelism",
}
@Article{Zhuo:2008:EED,
author = "Jianli Zhuo and Chaitali Chakrabarti",
title = "Energy-efficient dynamic task scheduling algorithms
for {DVS} systems",
journal = j-TECS,
volume = "7",
number = "2",
pages = "17:1--17:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331341",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Dynamic voltage scaling (DVS) is a well-known
low-power design technique that reduces the processor
energy by slowing down the DVS processor and stretching
the task execution time. However, in a DVS system
consisting of a DVS processor and multiple devices,
slowing down the processor increases the device energy
consumption and thereby the system-level energy
consumption. In this paper, we first use system-level
energy consideration to derive the ``optimal '' scaling
factor by which a task should be scaled if there are no
deadline constraints. Next, we develop dynamic
task-scheduling algorithms that make use of dynamic
processor utilization and optimal scaling factor to
determine the speed setting of a task. We present
algorithm duEDF, which reduces the CPU energy
consumption and algorithm duSYS and its reduced
preemption version, duSYS\_PC, which reduce the
system-level energy. Experimental results on the
video-phone task set show that when the CPU power is
dominant, algorithm duEDF results in up to 45\% energy
savings compared to the non-DVS case. When the CPU
power and device power are comparable, algorithms duSYS
and duSYS\_PC achieve up to 25\% energy saving compared
to CPU energy-efficient algorithm duEDF, and up to 12\%
energy saving over the non-DVS scheduling algorithm.
However, if the device power is large compared to the
CPU power, then we show that a DVS scheme does not
result in lowest energy. Finally, a comparison of the
performance of algorithms duSYS and duSYS\_PC show that
preemption control has minimal effect on system-level
energy reduction.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "DVS system; dynamic task scheduling; energy
minimization; optimal scaling factor; real time",
}
@Article{Lee:2008:DFR,
author = "Sheayun Lee and Insik Shin and Woonseok Kim and Insup
Lee and Sang Lyul Min",
title = "A design framework for real-time embedded systems with
code size and energy constraints",
journal = j-TECS,
volume = "7",
number = "2",
pages = "18:1--18:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331342",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Real-time embedded systems are typically constrained
in terms of three system performance criteria: space,
time, and energy. The performance requirements are
directly translated into constraints imposed on the
system's resources, such as code size, execution time,
and energy consumption. These resource constraints
often interact or even conflict with each other in a
complex manner, making it difficult for a system
developer to apply a well-defined design methodology in
developing a real-time embedded system. Motivated by
this observation, we propose a design framework that
can flexibly balance the tradeoff involving the
system's code size, execution time, and energy
consumption. Given a system specification and an
optimization criteria, the proposed technique generates
a set of design parameters in such a way that a system
cost function is minimized while the given resource
constraints are satisfied. Specifically, the technique
derives code generation decision for each task so that
a specific version of code is selected among a number
of different ones that have distinct characteristics in
terms of code size and execution time. In addition, the
design framework determines the voltage/frequency
setting for a variable voltage processor whose supply
voltage can be adjusted at runtime in order to minimize
the energy consumption while execution performance is
degraded accordingly. The proposed technique formulates
this design process as a constrained optimization
problem. We show that this optimization problem is
NP-hard and then provide a heuristic solution to it. We
show that these seemingly conflicting design goals can
be pursued by using a simple optimization algorithm
that works with a single optimization criteria.
Moreover, the optimization is driven by an abstract
system specification given by the system developer, so
that the system development process can be automated.
The results from our simulation show that the proposed
algorithm finds a solution that is close to the optimal
one with the average error smaller than 1.0\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "code size; embedded; energy; real-time; scheduling",
}
@Article{Manolache:2008:TMP,
author = "Sorin Manolache and Petru Eles and Zebo Peng",
title = "Task mapping and priority assignment for soft
real-time applications under deadline miss ratio
constraints",
journal = j-TECS,
volume = "7",
number = "2",
pages = "19:1--19:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331343",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Both analysis and design optimisation of real-time
systems has predominantly concentrated on considering
hard real-time constraints. For a large class of
applications, however, this is both unrealistic and
leads to unnecessarily expensive implementations. This
paper addresses the problem of task priority assignment
and task mapping in the context of multiprocessor
applications with stochastic execution times and in the
presence of constraints on the percentage of missed
deadlines. We propose a design space exploration
strategy together with a fast method for system
performance analysis. Experiments emphasize the
efficiency of the proposed analysis method and
optimisation heuristic in generating high-quality
implementations of soft real-time systems with
stochastic task execution times and constraints on
deadline miss ratios.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "mapping; priority assignment; schedulability analysis;
soft real-time systems; stochastic task execution
times",
}
@Article{Park:2008:SRB,
author = "Taejoon Park and Kang G. Shin",
title = "Secure routing based on distributed key sharing in
large-scale sensor networks",
journal = j-TECS,
volume = "7",
number = "2",
pages = "20:1--20:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331344",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Sensor networks, usually built with a large number of
small, low-cost sensor nodes, are characterized by
their large-scale and unattended deployment,
necessitating ``secure'' communications between nearby,
as well as remote, sensor nodes for their intended
applications and services. Key setup/sharing is crucial
to the protection of such applications/services from
attacks, but existing (public-key, cluster-based, or
pairwise) solutions become too expensive (hence,
inefficient) when the underlying applications/services
require communications between distant sensor nodes. To
remedy this inefficiency, we propose a novel
distributed key-sharing scheme, in which each
participating sensor node shares unique keys with a
small number of other sensor nodes---called distributed
key servers (DKSs)---chosen according to their
geographic distance and communication direction. Using
DKSs, we develop two secure routing protocols: (1)
secure geographic forwarding that delivers packets by
using a chain of DKS lookups, each secured with its own
key and forwarded geographically; and (2) key
establishment that creates a secure session between two
distant sensor nodes based solely on symmetric-ciphers.
These protocols enable low-cost, low-power sensors to
provide high-level security at a very low cost.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "attack tolerance; distributed key sharing and servers;
key establishment; large-scale sensor networks; secure
geographic forwarding",
}
@Article{Cho:2008:DNP,
author = "Young H. Cho and William H. Mangione-Smith",
title = "Deep network packet filter design for reconfigurable
devices",
journal = j-TECS,
volume = "7",
number = "2",
pages = "21:1--21:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331345",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Most network routers and switches provide some
protection against the network attacks. However, the
rapidly increasing amount of damages reported over the
past few years indicates the urgent need for tougher
security. Deep-packet inspection is one of the
solutions to capture packets that can not be identified
using the traditional methods. It uses a list of
signatures to scan the entire content of the packet,
providing the means to filter harmful packets out of
the network. Since one signature does not depend on the
other, the filtering process has a high degree of
parallelism. Most software and hardware deep-packet
filters that are in use today execute the tasks under
Von Neuman architecture. Such architecture can not
fully take advantage of the parallelism. For instance,
one of the most widely used network intrusion-detection
systems, Snort, configured with 845 patterns, running
on a dual 1-GHz Pentium III system, can sustain a
throughput of only 50 Mbps. The poor performance is
because of the fact that the processor is programmed to
execute several tasks sequentially instead of
simultaneously. We designed scalable deep-packet
filters on field-programmable gate arrays (FPGAs) to
search for all data-independent patterns
simultaneously. With FPGAs, we have the ability to
reprogram the filter when there are any changes to the
signature set. The smallest full-pattern matcher
implementation for the latest Snort NIDS fits in a
single 400k Xilinx FPGA (Spartan 3-XC3S400) with a
sustained throughput of 1.6 Gbps. Given a larger FPGA,
the design can scale linearly to support a greater
number of patterns, as well as higher data
throughput.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "firewall; network intrusion detection; string filter;
virus; worm",
}
@Article{Pasricha:2008:FEB,
author = "Sudeep Pasricha and Nikil Dutt and Mohamed
Ben-Romdhane",
title = "Fast exploration of bus-based communication
architectures at the {CCATB} abstraction",
journal = j-TECS,
volume = "7",
number = "2",
pages = "22:1--22:??",
month = feb,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1331331.1331346",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:00 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Currently, system-on-chip (SoC) designs are becoming
increasingly complex, with more and more components
being integrated into a single SoC design.
Communication between these components is increasingly
dominating critical system paths and frequently becomes
the source of performance bottlenecks. It, therefore,
becomes imperative for designers to explore the
communication space early in the design flow.
Traditionally, system designers have used Pin-Accurate
Bus Cycle Accurate (PA-BCA) models for early
communication space exploration. These models capture
all of the bus signals and strictly maintain cycle
accuracy, which is useful for reliable performance
exploration but results in slow simulation speeds for
complex, designs, even when they are modeled using
high-level languages. Recently, there have been several
efforts to use the Transaction-Level Modeling (TLM)
paradigm for improving simulation performance in BCA
models. However, these transaction-based BCA (T-BCA)
models capture a lot of details that can be eliminated
when exploring communication architectures. In this
paper, we extend the TLM approach and propose a new
transaction-based modeling abstraction level (CCATB) to
explore the communication design space. Our abstraction
level bridges the gap between the TLM and BCA levels,
and yields an average performance speedup of 120\% over
PA-BCA and 67\% over T-BCA models, on average. The
CCATB models are not only faster to simulate, but also
extremely accurate and take less time to model compared
to both T-BCA and PA-BCA models. We describe the
mechanisms that produce the speedup in CCATB models and
also analyze how the achieved simulation speedup scales
with design complexity. To demonstrate the
effectiveness of using CCATB for exploration, we
present communication space exploration case studies
from the broadband communication and multimedia
application domains.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "communication architecture; on-chip bus; performance
exploration; system-on-chip; transaction-level
modeling",
}
@Article{DiNatale:2008:BOM,
author = "Marco {Di Natale} and Valerio Pappalardo",
title = "Buffer optimization in multitask implementations of
{Simulink} models",
journal = j-TECS,
volume = "7",
number = "3",
pages = "23:1--23:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347376",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Automatic generation of a controller implementation
from a synchronous reactive model is among the best
practices for software development in the automotive
and aeronautics industry, because of the possibility of
simulation, model checking, and error-free
implementation. This paper discusses an algorithm for
optimizing the single-processor multitask
implementation of Simulink models with real-time
execution constraints, derived from the sampling rates
of the functional blocks. Existing code generation
tools enforce the addition of extra buffering and
latencies whenever there is a rate transition among
functional blocks. This work shows how timing analysis
can be used to find the cases in which additional
buffering and latency can be avoided, improving the
space and time performance of the application. The
proposed search algorithm allows finding a solution
with reduced and possibly minimal use of buffering even
for very high values of processor utilization.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "code generation; real-time programming;
schedulability; software models",
}
@Article{Trajkovic:2008:ISA,
author = "Jelena Trajkovic and Alexander V. Veidenbaum and Arun
Kejariwal",
title = "Improving {SDRAM} access energy efficiency for
low-power embedded systems",
journal = j-TECS,
volume = "7",
number = "3",
pages = "24:1--24:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347377",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "DRAM (dynamic random-access memory) energy consumption
in low-power embedded systems can be very high,
exceeding that of the data cache or even that of the
processor. This paper presents and evaluates a scheme
for reducing the energy consumption of SDRAM
(synchronous DRAM) memory access by a combination of
techniques that take advantage of SDRAM energy
efficiencies in bank and row access. This is achieved
by using small, cachelike structures in the memory
controller to prefetch an additional cache block(s) on
SDRAM reads and to combine block writes to the same
SDRAM row. The results quantify the SDRAM energy
consumption of MiBench applications and demonstrate
significant savings in SDRAM energy consumption, 23\%,
on average, and reduction in the energy-delay product,
44\%, on average. The approach also improves
performance: the CPI is reduced by 26\%, on average.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded processors and low power; fetch buffer;
SDRAM; write-combining buffer",
}
@Article{Varma:2008:AFS,
author = "Ankush Varma and Eric Debes and Igor Kozintsev and
Paul Klein and Bruce Jacob",
title = "Accurate and fast system-level power modeling: an
{XScale}-based case study",
journal = j-TECS,
volume = "7",
number = "3",
pages = "25:1--25:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347378",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Accurate and fast system modeling is central to the
rapid design space exploration needed for
embedded-system design. With fast, complex SoCs playing
a central role in such systems, system designers have
come to require MIPS-range simulation speeds and
near-cycle accuracy. The sophisticated simulation
frameworks that have been developed for high-speed
system performance modeling do not address power
consumption, although it is a key design constraint. In
this paper, we define a simulation-based methodology
for extending system performance modeling frameworks to
also include power modeling. We demonstrate the use of
this methodology with a case study of a real, complex
embedded system, comprising the Intel XScale embedded
microprocessor, its WMMX SIMD co processor, L1 caches,
SDRAM, and the on-board address and data buses. We
describe detailed power models for each of these
components and validate them against physical
measurements from hardware, demonstrating that such
frameworks enable designers to model both power and
performance at high speeds without sacrificing
accuracy. Our results indicate that the power estimates
obtained are accurate within 5\% of physical
measurements from hardware, while simulation speeds
consistently exceed a million instructions per second
(MIPS).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded systems; power modeling; SystemC",
}
@Article{Aamodt:2008:CTI,
author = "Tor M. Aamodt and Paul Chow",
title = "Compile-time and instruction-set methods for improving
floating- to fixed-point conversion accuracy",
journal = j-TECS,
volume = "7",
number = "3",
pages = "26:1--26:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347379",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This paper proposes and evaluates compile time and
instruction-set techniques for improving the accuracy
of signal-processing algorithms run on fixed-point
embedded processors. These techniques are proposed in
the context of a profile guided floating- to
fixed-point compiler-based conversion process. A novel
fixed-point scaling algorithm (IRP) is introduced that
exploits correlations between values in a program by
applying fixed-point scaling, retaining as much
precision as possible without causing overflow. This
approach is extended into a more aggressive scaling
algorithm (IRP-SA) by leveraging the modulo nature of
2's complement addition and subtraction to discard most
significant bits that may not be redundant
sign-extension bits. A complementary scaling technique
(IDS) is then proposed that enables the fixed-point
scaling of a variable to be parameterized, depending
upon the context of its definitions and uses. Finally,
a novel instruction-set enhancement--- fractional
multiplication with internal left shift (FMLS)---is
proposed to further leverage interoperand correlations
uncovered by the IRP-SA scaling algorithm. FMLS
preserves a different subset of the full product's bits
than traditional fractional fixed-point or integer
multiplication. On average, FMLS combined with IRP-SA
improves accuracy on processors with uniform bitwidth
register architectures by the equivalent of 0.61 bits
of additional precision for a set of signal-processing
benchmarks (up to 2 bits). Even without employing FMLS,
the IRP-SA scaling algorithm achieves additional
accuracy over two previous fixed-point scaling
algorithms by averages of 1.71 and 0.49 bits.
Furthermore, as FMLS combines multiplication with a
scaling shift, it reduces execution time by an average
of 9.8\%. An implementation of IDS, specialized to
single-nested loops, is found to improve accuracy of a
lattice filter benchmark by the equivalent of more than
16-bits of precision.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compilation; digital signal processing; fixed-point;
fractional multiplication; scaling; signal-to-noise
ratio",
}
@Article{Fei:2008:EAF,
author = "Yunsi Fei and Lin Zhong and Niraj K. Jha",
title = "An energy-aware framework for dynamic software
management in mobile computing systems",
journal = j-TECS,
volume = "7",
number = "3",
pages = "27:1--27:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347380",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Energy efficiency has become a very important and
challenging issue for resource-constrained mobile
computers. In this article, we propose a novel dynamic
software management (DSOM) framework to improve battery
utilization. We have designed and implemented a DSOM
module in user space, independent of the operating
system (OS), which explores quality-of-service (QoS)
adaptation to reduce system energy and employs a
priority-based preemption policy for multiple
applications to avoid competition for limited energy
resources. Software energy macromodels for mobile
applications are employed to predict energy demand at
each QoS level, so that the DSOM module is able to
select the best possible trade-off between energy
conservation and application QoS; it also honors the
priority desired by the user. Our experimental results
for some mobile applications (video player, speech
recognizer, voice-over-IP) show that this approach can
meet user-specified task-oriented goals and
significantly improve battery utilization.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "energy macromodel; runtime coordination; software
adaptation",
}
@Article{Zhong:2008:SWE,
author = "Xiliang Zhong and Cheng-Zhong Xu",
title = "System-wide energy minimization for real-time tasks:
{Lower} bound and approximation",
journal = j-TECS,
volume = "7",
number = "3",
pages = "28:1--28:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347381",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present a dynamic voltage scaling (DVS) technique
that minimizes system-wide energy consumption for both
periodic and sporadic tasks. It is known that a system
consists of processors and a number of other
components. Energy-aware processors can be run in
different speed levels; components like memory and I/O
subsystems and network interface cards can be in a
standby state when they are active, but idle. Processor
energy optimization solutions are not necessarily
efficient from the perspective of systems. Current
system-wide energy optimization studies are often
limited to periodic tasks with heuristics in getting
approximated solutions. In this paper, we develop an
exact dynamic programming algorithm for periodic tasks
on processors with practical discrete speed levels. The
algorithm determines the lower bound of energy
expenditure in pseudopolynomial time. An approximation
algorithm is proposed to provide performance guarantee
with a given bound in polynomial running time. Because
of their time efficiency, both the optimization and
approximation algorithms can be adapted for online
scheduling of sporadic tasks with irregular task
releases. We prove that system-wide energy optimization
for sporadic tasks is NP-hard in the strong sense. We
develop (pseudo-) polynomial-time solutions by
exploiting its inherent properties.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "dynamic power management; dynamic voltage scaling;
power-aware scheduling; real-time systems",
}
@Article{Zhou:2008:CIA,
author = "Ye Zhou and Edward A. Lee",
title = "Causality interfaces for actor networks",
journal = j-TECS,
volume = "7",
number = "3",
pages = "29:1--29:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347382",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We consider concurrent models of computation where
``actors'' (components that are in charge of their own
actions) communicate by exchanging messages. The
interfaces of actors principally consist of ``ports,''
which mediate the exchange of messages. Actor-oriented
architectures contrast with and complement
object-oriented models by emphasizing the exchange of
data between concurrent components rather than
transformation of state. Examples of such models of
computation include the classical actor model,
synchronous languages, data-flow models, process
networks, and discrete-event models. Many experimental
and production languages used to design embedded
systems are actor oriented and based on one of these
models of computation. Many of these models of
computation benefit considerably from having access to
causality information about the components. This paper
augments the interfaces of such components to include
such causality information. It shows how this causality
information can be algebraically composed so that
compositions of components acquire causality interfaces
that are inferred from their components and the
interconnections. We illustrate the use of these
causality interfaces to statically analyze timed models
and synchronous language compositions for causality
loops and data-flow models for deadlock. We also show
that causality analysis for each communication cycle
can be performed independently and in parallel, and it
is only necessary to analyze one port for each cycle.
Finally, we give a conservative approximation technique
for handling dynamically changing causality
properties.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "actors; behavioral types; causality; data flow;
deadlock; discrete-event models; interfaces;
synchronous languages; timed systems",
}
@Article{Shin:2008:CRT,
author = "Insik Shin and Insup Lee",
title = "Compositional real-time scheduling framework with
periodic model",
journal = j-TECS,
volume = "7",
number = "3",
pages = "30:1--30:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347383",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "It is desirable to develop large complex systems using
components based on systematic abstraction and
composition. Our goal is to develop a compositional
real-time scheduling framework to support abstraction
and composition techniques for real-time aspects of
components. In this paper, we present a formal
description of compositional real-time scheduling
problems, which are the component abstraction and
composition problems. We identify issues that need be
addressed by solutions and provide our framework for
the solutions, which is based on the periodic
interface. Specifically, we introduce the periodic
resource model to characterize resource allocations
provided to a single component. We present exact
schedulability conditions for the standard Liu and
Layland periodic task model and the proposed periodic
resource model under EDF and RM scheduling, and we show
that the component abstraction and composition problems
can be addressed with periodic interfaces through the
exact schedulability conditions. We also provide the
utilization bounds of a periodic task set over the
periodic resource model and the abstraction bounds of
periodic interfaces for a periodic task set under EDF
and RM scheduling. We finally present the analytical
bounds of overheads that our solution incurs in terms
of resource utilization increase and evaluate the
overheads through simulations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "abstract; component; composition; hierarchical;
interface; real-time; scheduling",
}
@Article{Voyiatzis:2008:SFS,
author = "Artemios G. Voyiatzis and Dimitrios N. Serpanos",
title = "The security of the {Fiat--Shamir} scheme in the
presence of transient hardware faults",
journal = j-TECS,
volume = "7",
number = "3",
pages = "31:1--31:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347384",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Implementation cryptanalysis has emerged as a
realistic threat for cryptographic systems. It consists
of two classes of attacks: fault-injection and
side-channel attacks. In this work, we examine the
resistance of the Fiat--Shamir scheme to
fault-injection attacks, since Fiat--Shamir is a
popular scheme for ``light'' consumer devices, such as
smartcards, in a wide range of consumer services. We
prove that an existing attack, known as the Bellcore
attack, is incomplete. We propose an extension to the
protocol that proactively secures Fiat--Shamir systems
from the Bellcore attack and we prove its strength.
Finally, we introduce a new attack model, which, under
stronger assumptions, can derive the secret keys from
both the original Fiat--Shamir scheme as well as its
proposed extension. Our approach demonstrates that
countermeasures for implementation cryptanalysis must
be carefully designed and that deployed systems must
include appropriate protection mechanisms for all known
attacks and be flexible enough to incorporate
countermeasures for new ones.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Bellcore attack; cryptography; Fiat--Shamir
identification scheme; side-channel attacks;
smartcards",
}
@Article{Gurun:2008:NGP,
author = "Selim Gurun and Chandra Krintz and Rich Wolski",
title = "{NWSLite}: a general-purpose, nonparametric prediction
utility for embedded systems",
journal = j-TECS,
volume = "7",
number = "3",
pages = "32:1--32:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347385",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Time series-based prediction methods have a wide range
of uses in embedded systems. Many OS algorithms and
applications require accurate prediction of demand and
supply of resources. However, configuring prediction
algorithms is not easy, since the dynamics of the
underlying data requires continuous observation of the
prediction error and dynamic adaptation of the
parameters to achieve high accuracy. Current prediction
methods are either too costly to implement on
resource-constrained devices or their parameterization
is static, making them inappropriate and inaccurate for
a wide range of datasets. This paper presents NWSLite,
a prediction utility that addresses these shortcomings
on resource-restricted platforms.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "computation offloading; CPU availability estimation;
embedded systems; network performance estimation;
prediction algorithms",
}
@Article{Yan:2008:DOD,
author = "Ting Yan and Yu Gu and Tian He and John A. Stankovic",
title = "Design and optimization of distributed sensing
coverage in wireless sensor networks",
journal = j-TECS,
volume = "7",
number = "3",
pages = "33:1--33:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347386",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "For many sensor network applications, such as military
surveillance, it is necessary to provide full sensing
coverage to a security-sensitive area while, at the
same time, minimizing energy consumption and extending
system lifetime by leveraging the redundant deployment
of sensor nodes. In this paper, we propose a
surveillance service for sensor networks based on a
distributed energy-efficient sensing coverage protocol.
In the protocol, each node is able to dynamically
decide a schedule for itself to guarantee a certain
degree-of-coverage (DOC) with average energy
consumption inversely proportional to the node density.
Several optimizations and extensions are proposed to
enhance the basic design with a better load-balance
feature and a longer network lifetime. We consider and
address the impact of the target size and the
unbalanced initial energy capacity of individual nodes
to the network lifetime. Several practical issues such
as the localization error, irregular sensing range, and
unreliable communication links are addressed as well.
Simulation shows that our protocol extends system
lift-time significantly with low energy consumption. It
outperforms other state-of-the-art schemes by as much
as 50\% reduction in energy consumption and as much as
130\% increase in the half-life of the network.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "33",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "energy conservation; sensing coverage; sensor
networks",
}
@Article{Ozer:2008:SBE,
author = "Emre {\"O}zer and Andy P. Nisbet and David Gregg",
title = "A stochastic bitwidth estimation technique for compact
and low-power custom processors",
journal = j-TECS,
volume = "7",
number = "3",
pages = "34:1--34:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347387",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "There is an increasing trend toward compiling from C
to custom hardware for designing embedded systems in
which the area and power consumption of
application-specific functional units, registers, and
memory blocks are heavily dependent on the bit-widths
of integer operands used in computations. The actual
bit-width required to store the values assigned to an
integer variable during the execution of a program will
not, in general, match the built-in C data types. Thus,
precious area is wasted if the built-in data type sizes
are used to declare the size of integer operands. In
this paper, we introduce stochastic bit-width
estimation that follows a simulation-based
probabilistic approach to estimate the bit-widths of
integer variables using extreme value theory. The
estimation technique is also empirically compared to
two compile-time integer bit-width analysis techniques.
Our experimental results show that the stochastic
bit-width estimation technique dramatically reduces
integer bit-widths and, therefore, enables more compact
and power-efficient custom hardware designs than the
compile-time integer bit-width analysis techniques. Up
to 37\% reduction in custom hardware area and 30\%
reduction in logic power consumption using stochastic
bit-width estimation can be attained over ten integer
applications implemented on an FPGA chip.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "34",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "bit-width analysis; custom hardware; extreme value
theory; FPGA; statistical estimation",
}
@Article{Kumar:2008:CCP,
author = "Rajeev Kumar and Dipankar Das",
title = "Code compression for performance enhancement of
variable-length embedded processors",
journal = j-TECS,
volume = "7",
number = "3",
pages = "35:1--35:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347388",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Most of the work done in the field of code compression
pertains to processors with fixed-length instruction
encoding. The design of a code-compression scheme for
variable-length instruction encodings poses newer
design challenges. In this work, we first investigate
the scope for code compression on variable-length
instruction-set processors whose encodings are already
optimized to a certain extent with respect to their
usage. For such ISAs instruction boundaries are not
known prior to decoding. Another challenging task of
designing a code-compression scheme for such ISAs is
designing the decompression hardware, which must
decompress code postcache so that we gain in
performance. We present two dictionary-based code
compression schemes. The first algorithm uses a
bit-vector; the second one uses reserved instructions
to identify code words. We design additional logic for
each of the schemes to decompress the code on-the-fly.
We test the two algorithms with a variable-length RISC
processor. We provide a detailed experimental analysis
of the empirical results obtained by extensive
simulation-based design space exploration for this
system. The optimized decompressor can now execute
compressed program faster than the native program. The
experiments demonstrate reduction in code size (up to
30\%), speed-up (up to 15\%), and bus-switching
activity (up to 20\%). We also implement one
decompressor in a hardware description language and
synthesize it to illustrate the small overheads
associated with the proposed approach.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "35",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "bus switching; code compression; code decompression;
embedded systems; instruction memory; RISC processor;
variable-length ISAs",
}
@Article{Wilhelm:2008:WCE,
author = "Reinhard Wilhelm and Jakob Engblom and Andreas
Ermedahl and Niklas Holsti and Stephan Thesing and
David Whalley and Guillem Bernat and Christian
Ferdinand and Reinhold Heckmann and Tulika Mitra and
Frank Mueller and Isabelle Puaut and Peter Puschner and
Jan Staschulat and Per Stenstr{\"o}m",
title = "The worst-case execution-time problem---overview of
methods and survey of tools",
journal = j-TECS,
volume = "7",
number = "3",
pages = "36:1--36:??",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1347375.1347389",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 12 15:22:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The determination of upper bounds on execution times,
commonly called worst-case execution times (WCETs), is
a necessary step in the development and validation
process for hard real-time systems. This problem is
hard if the underlying processor architecture has
components, such as caches, pipelines, branch
prediction, and other speculative components. This
article describes different approaches to this problem
and surveys several commercially available tools 1 and
research prototypes.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "36",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "hard real time; worst-case execution times",
}
@Article{Hessell:2008:EES,
author = "Fabiano Hessell and Kenneth Kent and Dionisios
Pnevmatikatos",
title = "Editorial: {Embedded} systems --- new challenges and
future directions",
journal = j-TECS,
volume = "7",
number = "4",
pages = "37:1--37:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376805",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "37",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Park:2008:RFF,
author = "Chanik Park and Wonmoon Cheon and Jeonguk Kang and
Kangho Roh and Wonhee Cho and Jin-Soo Kim",
title = "A reconfigurable {FTL} (flash translation layer)
architecture for {NAND} flash-based applications",
journal = j-TECS,
volume = "7",
number = "4",
pages = "38:1--38:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376806",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, a novel FTL (flash translation layer)
architecture is proposed for NAND flash-based
applications such as MP3 players, DSCs (digital still
cameras) and SSDs (solid-state drives). Although the
basic function of an FTL is to translate a logical
sector address to a physical sector address in flash
memory, efficient algorithms of an FTL have a
significant impact on performance as well as the
lifetime. After the dominant parameters that affect the
performance and endurance are categorized, the design
space of the FTL architecture is explored based on a
diverse workload analysis. With the proposed FTL
architectural framework, it is possible to decide which
configuration of FTL mapping parameters yields the best
performance, depending on the differing characteristics
of various NAND flash-based applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "38",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Flash memory; FTL; performance analysis;
reconfigurable architecture",
}
@Article{Popovici:2008:PBS,
author = "Katalin Popovici and Xavier Guerin and Frederic
Rousseau and Pier Stanislao Paolucci and Ahmed Amine
Jerraya",
title = "Platform-based software design flow for heterogeneous
{MPSoC}",
journal = j-TECS,
volume = "7",
number = "4",
pages = "39:1--39:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376807",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Current multimedia applications demand complex
heterogeneous multiprocessor architectures with
specific communication infrastructure in order to
achieve the required performances. Programming these
architectures usually results in writing separate
low-level code for the different processors (DSP,
microcontroller), implying late global validation of
the overall application with the hardware platform. We
propose a platform-based software design flow able to
efficiently use the resources of the architecture and
allowing easy experimentation of several mappings of
the application onto the platform resources. We use a
high-level environment to capture both application and
architecture initial representations. An executable
software stack is generated automatically for each
processor from the initial model. The software
generation and validation is performed gradually
corresponding to different software abstraction levels.
Specific software development platforms (abstract
models of the architecture) are generated and used to
allow debugging of the different software components
with explicit hardware-software interaction. We applied
this approach on a multimedia platform, involving a
high performance DSP and a RISC processor, to explore
communication architecture and generate an efficient
executable code for a multimedia application. Based on
automatic tools, the proposed flow increases
productivity and preserves design quality.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "39",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "multimedia; Multiprocessor system-on chip; programming
environment; Simulink; software design; SystemC;
transaction level modeling",
}
@Article{Chattopadhyay:2008:PPA,
author = "A. Chattopadhyay and H. Ishebabi and X. Chen and Z.
Rakosi and K. Karuri and D. Kammler and R. Leupers and
G. Ascheid and H. Meyr",
title = "Prefabrication and postfabrication architecture
exploration for partially reconfigurable {VLIW}
processors",
journal = j-TECS,
volume = "7",
number = "4",
pages = "40:1--40:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376808",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Modern application-specific instruction-set processors
(ASIPs) face the daunting task of delivering high
performance for a wide range of applications. For
enhancing the performance, architectural features, for
example, pipelining, VLIW, are often employed in ASIPs,
leading to high design complexity. Integrated ASIP
design environments, like template-based approaches and
language-driven approaches, provide an answer to this
growing design complexity. At the same time, increasing
hardware design costs have motivated the processor
designers to introduce high flexibility in the
processor. Flexibility, in its most effective form, can
be introduced to the ASIP by coupling a reconfigurable
unit to the base processor. Because of its obvious
benefits, several reconfigurable ASIPs (rASIPs) have
been designed for years. This design paradigm gained
momentum with the advent of coarse-grained FPGAs, where
the lack of domain-specific performance common in
general-purpose FPGAs are largely overcome by choosing
application-dependent basic functional units. These
rASIP designs lack a generic flow from high-level
specification, resulting in intuitive design decisions
and hard-to-retarget processor design tools. Although
partial, template-based approaches for rASIP design is
existent, a clear design methodology especially for the
prefabrication architecture exploration is not present.
In order to address this issue, a high-level
specification and design methodology for partially
reconfigurable VLIW processors is proposed in this
article. To show the benefit of this approach, a
commercial VLIW processor is used as the base
architecture and two domains of applications are
studied for potential performance gain.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "40",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ASIP; coarse-grained FPGA; VLIW",
}
@Article{Lin:2008:MAC,
author = "Yi-Neng Lin and Ying-Dar Lin and Yuan-Cheng Lai and
Kuo-Kun Tseng",
title = "Modeling and analysis of core-centric network
processors",
journal = j-TECS,
volume = "7",
number = "4",
pages = "41:1--41:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376809",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Network processors can be categorized into two types,
the coprocessors-centric model in which data-plane is
handled by coprocessors, and the core-centric model in
which the core processes most of the data-plane packets
yet offloading some tasks to coprocessors. While the
former has been properly explored over various
applications, research regarding the latter remain
limited. Based on the previous experience of
prototyping the virtual private network (VPN) over the
IXP425 network processor, this work aims to derive
design implications for the core-centric model
performing computational intensive applications. From
system and IC vendors' perspectives, the
continuous-time Markov chain and Petri net simulations
are adopted to explore this architecture. Analytical
results prove to be quite inline with those of the
simulation and implementation. With subsequent
investigation, we find that appropriate process run
lengths can improve the effective core utilization by
2.26 times, and by offloading the throughput boosts 7.5
times. The results also suggest single-process
programming, since context-switch overhead impacts
considerably on the performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "41",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "core-centric; embedded system; modeling; Network
processor; simulation",
}
@Article{Get:2008:PFE,
author = "Jerome Hugues Get and Bechir Zalila Get and Laurent
Pautet Get and Fabrice Kordon",
title = "From the prototype to the final embedded system using
the {Ocarina AADL} tool suite",
journal = j-TECS,
volume = "7",
number = "4",
pages = "42:1--42:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376810",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Building distributed deal-time embedded systems
requires a stringent methodology, from early
requirement capture to full implementation. However,
there is a strong link between the requirements and the
final implementation (e.g., scheduling and resource
dimensioning). Therefore, a rapid prototyping process
based on automation of tedious and error-prone tasks
(analysis and code generation) is required to speed up
the development cycle. In this article, we show how the
AADL ({\em Architecture Analysis and Design
Language\/}), which appeared in late 2004, helps solve
these issues thanks to a dedicated tool suite. We then
detail the prototyping process and its current
implementation: Ocarina.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "42",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "AADL; distributed; DRE; embedded; Ocarina; PolyORB-HI;
real-time",
}
@Article{Benveniste:2008:CHR,
author = "Albert Benveniste and Beno{\^\i}t Caillaud and Luca P.
Carloni and Paul Caspi and Alberto L.
Sangiovanni-Vincentelli",
title = "Composing heterogeneous reactive systems",
journal = j-TECS,
volume = "7",
number = "4",
pages = "43:1--43:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376811",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present a compositional theory of heterogeneous
reactive systems. The approach is based on the concept
of tags marking the events of the signals of a system.
Tags can be used for multiple purposes from indexing
evolution in time (time stamping) to expressing
relations among signals, like coordination (e.g.,
synchrony and asynchrony) and causal dependencies. The
theory provides flexibility in system modeling because
it can be used both as a unifying mathematical
framework to relate heterogeneous models of
computations and as a formal vehicle to implement
complex systems by combining heterogeneous components.
In particular, we introduce an algebra of tag
structures to define heterogeneous parallel composition
formally. Morphisms between tag structures are used to
define relationships between heterogeneous models at
different levels of abstraction. In particular, they
can be used to represent design transformations from
tightly synchronized specifications to
loosely-synchronized implementations. The theory has an
important application in the correct-by-construction
deployment of synchronous design on distributed
architectures.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "43",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Compositionality; correct-by-construction design;
GALS; models of computation; reactive systems",
}
@Article{Gebotys:2008:EAW,
author = "Catherine H. Gebotys and Brian A. White",
title = "{EM} analysis of a wireless {Java}-based {PDA}",
journal = j-TECS,
volume = "7",
number = "4",
pages = "44:1--44:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376812",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The susceptibility of wireless portable devices to
electromagnetic (EM) attacks is largely unknown. If
analysis of electromagnetic (EM) waves emanating from
the wireless device during a cryptographic computation
do leak sufficient information, it may be possible for
an attacker to reconstruct the secret key. Possession
of the secret cryptographic key would render all future
wireless communications insecure and cause further
potential problems, such as identity theft. Despite the
complexities of a PDA wireless device, such as
operating system events, interrupts, cache misses, and
other interfering events, this article demonstrates
that, for the first time, repeatable EM differential
attacks are possible. The proposed differential
analysis methodology involves precharacterization of
the PDA device (thresholding and pattern recognition),
and a new frequency-based differential analysis. Unlike
previous research, the new methodology does not require
perfect alignment of EM frames and is repeatable in the
presence of a complex embedded system (including cache
misses, operating system events, etc), thus supporting
attacks on real embedded systems. This research is
important for future wireless embedded systems, which
will increasingly demand higher levels of security.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "44",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "countermeasures; EM analysis; power attacks;
Side-channel analysis",
}
@Article{Ayav:2008:IFT,
author = "Tolga Ayav and Pascal Fradet and Alain Girault",
title = "Implementing fault-tolerance in real-time programs by
automatic program transformations",
journal = j-TECS,
volume = "7",
number = "4",
pages = "45:1--45:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376813",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present a formal approach to implement
fault-tolerance in real-time embedded systems. The
initial fault-intolerant system consists of a set of
independent periodic tasks scheduled onto a set of
fail-silent processors connected by a reliable
communication network. We transform the tasks such
that, assuming the availability of an additional spare
processor, the system tolerates one failure at a time
(transient or permanent). Failure detection is
implemented using heartbeating, and failure masking
using checkpointing and rollback. These techniques are
described and implemented by automatic program
transformations on the tasks' programs. The proposed
formal approach to fault-tolerance by program
transformations highlights the benefits of separation
of concerns. It allows us to establish correctness
properties and to compute optimal values of parameters
to minimize fault-tolerance overhead. We also present
an implementation of our method, to demonstrate its
feasibility and its efficiency.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "45",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "checkpointing; correctness proofs; Fault-tolerance;
heartbeating; program transformations",
}
@Article{Middha:2008:MMS,
author = "Bhuvan Middha and Matthew Simpson and Rajeev Barua",
title = "{MTSS}: {Multitask} stack sharing for embedded
systems",
journal = j-TECS,
volume = "7",
number = "4",
pages = "46:1--46:??",
month = jul,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1376804.1376814",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Aug 5 19:32:59 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Out-of-memory errors are a serious source of
unreliability in most embedded systems. Applications
run out of main memory because of the frequent
difficulty of estimating the memory requirement before
deployment, either because it depends on input data, or
because certain language features prevent estimation.
The typical lack of disks and virtual memory in
embedded systems has a serious consequence when an
out-of-memory error occurs. Without swap space, the
system crashes if its memory footprint exceeds the
available memory by even 1 byte. This work improves
reliability for multitasking embedded systems by
proposing MTSS, a multitask stack sharing technique. If
a task attempts to overflow the bounds of its allocated
stack space, MTSS grows its stack into the stack memory
space allocated for other tasks. This technique can
avoid the out-of-memory error if the extra space
recovered is sufficient to complete execution.
Experiments show that MTSS is able to recover an
average of 54\% of the stack space allocated to the
overflowing task in the free space of other tasks. In
addition, unlike conventional systems, MTSS detects
memory overflows, allowing the possibility of remedial
action or a graceful exit if the recovered space is not
enough. Alternatively, MTSS can be used for decreasing
the required physical memory of an embedded system by
reducing the initial memory allocated to each of the
tasks and recovering the deficit by sharing stack with
other tasks. The overheads of MTSS are low: the runtime
and energy overheads are 3.1\% and 3.2\%, on average.
These are tolerable given that reliability is the most
important concern in virtually all systems, ahead of
other concerns, such as runtime and energy.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "46",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "cactus stack; data compression; heap overflow; meshed
stack; Out-of-memory errors; reliability; reuse;
runtime checks; stack overflow; virtual memory",
}
@Article{Inoue:2008:FAC,
author = "Hiroaki Inoue and Junji Sakai and Sunao Torii and
Masato Edahiro",
title = "{FIDES}: an advanced chip multiprocessor platform for
secure next generation mobile terminals",
journal = j-TECS,
volume = "8",
number = "1",
pages = "1:1--1:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457247",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We propose a secure platform on a chip multiprocessor,
FIDES, in order to enable next generation mobile
terminals to execute downloaded native applications for
Linux. Its most important feature is the higher
security based on multigrained separation mechanisms.
Four new technologies support the FIDES platform: bus
filter logic, XIP kernels, policy separation, and
dynamic access control. With these technologies, the
FIDES platform can tolerate both application-level and
kernel-level bugs on an actual download subsystem.
Thus, the best-suited platform to secure next
generation mobile terminals is FIDES.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "chip multiprocessor; Secure mobile terminal; SELinux",
}
@Article{Park:2008:ATL,
author = "Taejoon Park and Kang G. Shin",
title = "Attack-tolerant localization via iterative
verification of locations in sensor networks",
journal = j-TECS,
volume = "8",
number = "1",
pages = "2:1--2:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457248",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In sensor networks, secure localization ---
determining sensors' locations in a hostile, untrusted
environment --- is a challenging, but very important,
problem that has not yet been addressed effectively.
This paper presents an attack-tolerant localization
protocol, called {\em Verification for Iterative
Localization\/} (VeIL), under which sensors
cooperatively safeguard the localization service. By
exploiting the high spatiotemporal correlation existing
between adjacent nodes, VeIL realizes (a) adaptive
management of a profile for normal localization
behavior, and (b) distributed detection of false
locations advertised by attackers by comparing them
against the profile of normal behavior. Our analysis
and simulation results show that VeIL achieves
high-level tolerance to many critical attacks, and is
computationally feasible on resource-limited sensors.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Anomaly detection; attack-tolerance; localization;
recursive least squares; sensor networks",
}
@Article{Mitra:2008:VAD,
author = "Sayan Mitra and Daniel Liberzon and Nancy Lynch",
title = "Verifying average dwell time of hybrid systems",
journal = j-TECS,
volume = "8",
number = "1",
pages = "3:1--3:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457249",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Average dwell time (ADT) properties characterize the
rate at which a hybrid system performs mode switches.
In this article, we present a set of techniques for
verifying ADT properties. The stability of a hybrid
system A can be verified by combining these techniques
with standard methods for checking stability of the
individual modes of A.\par
We introduce a new type of simulation relation for
hybrid automata --- {\em switching simulation\/} ---
for establishing that a given automaton A switches more
rapidly than another automaton B. We show that the
question of whether a given hybrid automaton has ADT
{\tau}$_{{\em a \/ }}$ can be answered either by
checking an invariant or by solving an optimization
problem. For classes of hybrid automata for which
invariants can be checked automatically, the
invariant-based method yields an automatic method for
verifying ADT; for automata that are outside this
class, the invariant has to be checked using inductive
techniques. The optimization-based method is automatic
and is applicable to a restricted class of initialized
hybrid automata. A solution of the optimization problem
either gives a counterexample execution that violates
the ADT property, or it confirms that the automaton
indeed satisfies the property. The optimization and the
invariant-based methods can be used in combination to
find the unknown ADT of a given hybrid automaton.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Hybrid systems; optimization-based verification;
simulation relation",
}
@Article{Schirner:2008:QAS,
author = "Gunar Schirner and Rainer D{\"o}mer",
title = "Quantitative analysis of the speed\slash accuracy
trade-off in transaction level modeling",
journal = j-TECS,
volume = "8",
number = "1",
pages = "4:1--4:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457250",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The increasing complexity of embedded systems requires
modeling at higher levels of abstraction. Transaction
level modeling (TLM) has been proposed to abstract
communication for high-speed system simulation and
rapid design space exploration. Although being widely
accepted for its high performance and efficiency, TLM
often exhibits a significant loss in model
accuracy.\par
In this article, we systematically analyze and quantify
the speed/accuracy trade-off in TLM. To this end, we
provide a classification of TLM abstraction levels
based on model granularity and define appropriate
metrics and test setups to quantitatively measure and
compare the performance and accuracy of such
models.\par
Addressing several classes of embedded communication
protocols, we apply our analysis to three common bus
architectures, the industry-standard AMBA advanced
high-performance bus (AHB) as an on-chip parallel bus,
the controller area network (CAN) as an off-chip serial
bus, and the Motorola ColdFire Master Bus as an example
for a custom embedded processor bus.\par
Based on the analysis of these individual busses, we
then generalize our results for a broader conclusion.
The general TLM trade-off offers gains of up to four
orders of magnitude in simulation speed, generally
however, at the price of low accuracy. We conclude
further that model granularity is the key to efficient
TLM abstraction, and we identify conditions for
accuracy of abstract models. As a result, this article
provides general guidelines that allow the system
designer to navigate the TLM trade-off effectively and
choose the most suitable model for the given
application with fast and accurate results.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "System level design; system-on-chip; transaction level
modeling",
}
@Article{Zhou:2008:DAT,
author = "Xiangrong Zhou and Peter Petrov",
title = "Direct address translation for virtual memory in
energy-efficient embedded systems",
journal = j-TECS,
volume = "8",
number = "1",
pages = "5:1--5:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457251",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a methodology for virtual memory
support in energy-efficient embedded systems. A
holistic approach is proposed, where the combined
efforts of compiler, operating system, and hardware
architecture achieve a significant system power
reductions. The application information extracted and
analyzed by the compiler is utilized dynamically by the
microarchitecture and the operating system to perform
energy-efficient and, for many memory references,
time-deterministic address translations. We demonstrate
that by using application information regarding virtual
memory layout, an efficient and conflict-free
translation process can be implemented through the
utilization of a small hardware direct translation
table (DTT) accessed in an application-specific manner.
The set of virtual pages is partitioned into groups,
such that for each group only a few of the least
significant bits are used as an index to obtain the
physical page number. We outline an efficient
compile-time algorithm for identifying these groups and
allocate their translation entries optimally into the
DTT. The introduced hardware is minimal in terms of
area, performance, and power overhead, while offering
the flexibility of software programmability. This is
achieved through a small set of registers and tables,
which are made software accessible. We have
quantitatively evaluated the proposed methodology on a
number of embedded applications, including voice,
image, and video processing.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "address translation; Low-power embedded systems;
virtual memory",
}
@Article{Park:2008:QSL,
author = "Jiyong Park and Jaesoo Lee and Saehwa Kim and Seongsoo
Hong",
title = "Quasistatic shared libraries and {XIP} for memory
footprint reduction in {MMU}-less embedded systems",
journal = j-TECS,
volume = "8",
number = "1",
pages = "6:1--6:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457252",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Despite a rapid decrease in the price of solid state
memory devices, system memory is still a very precious
resource in embedded systems. The use of shared
libraries and execution-in-place (XIP) is known to be
effective in significantly reducing memory usage.
Unfortunately, many resource-constrained embedded
systems lack an MMU, making it extremely difficult to
support these techniques. To address this problem, we
propose a novel shared library technique called a
quasi-static shared library and an XIP, both based on
our enhanced position independent code technique. In
our quasistatic shared libraries, global symbols are
bound to pseudoaddresses at linking time and actual
physical addresses are bound at loading time. Unlike
conventional shared libraries, they do not require
symbol tables that take up valuable memory space and,
therefore, allow for expedited address translation at
runtime. Our XIP technique is facilitated by our
enhanced position independent code where a data section
can be arbitrarily located. Both the shared library and
XIP techniques are made possible by emulating an MMU's
memory mapping feature with a data section base
register (DSBR) and a data section base table
(DSBT).\par
We have implemented these proposed techniques in a
commercial ADSL (Asymmetric Digital Subscriber Line)
home network gateway equipped with an MMU-less ARM7TDMI
processor core, 2MB flash memory, and 16MB RAM. We
measured its memory usage and evaluated its performance
overhead by conducting a series of experiments. These
experiments clearly demonstrate the effectiveness of
our techniques in reducing memory usage. The results
are impressive: 35\% reduction in flash memory usage
when using only the shared library and 30\% reduction
in RAM usage when using the shared library and XIP
together. These results were achieved with only a
negligible performance penalty of less than 4\%. Even
though these techniques were applied to uClinux-based
embedded systems, they can be used for any MMU-less
real-time operating system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Embedded systems; memory footprint reduction;
MMU-less; quasi-static linking; shared library",
}
@Article{Yan:2008:AWC,
author = "Jun Yan and Wei Zhang",
title = "Analyzing the worst-case execution time for
instruction caches with prefetching",
journal = j-TECS,
volume = "8",
number = "1",
pages = "7:1--7:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457253",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Time predictability is one of the most important
design considerations for real-time systems. In this
article, we study the impact of instruction prefetching
on the worst-case performance of instruction caches. We
extend the static cache simulation technique to model
and compute the worst-case instruction cache
performance with prefetching. The evaluation results
show that instruction prefetching can benefit both the
average-case and worst-case performance; however, the
degree of the worst-case performance improvement due to
instruction prefetching is less than that of the
average-case performance. As a result, the time
variation of computing is increased by instruction
prefetching. Also, our experimental results indicate
that the prefetching distance can significantly impact
the worst-case performance of instruction caches with
instruction prefetching. Specifically, when the
prefetching distance is equal to the L1 miss penalty,
the worst-case execution time with instruction
prefetching is minimized.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "hard real-time; instruction caches; instruction
prefetching; Worst-case execution time analysis",
}
@Article{Aaraj:2008:ADH,
author = "Najwa Aaraj and Anand Raghunathan and Niraj K. Jha",
title = "Analysis and design of a hardware\slash software
trusted platform module for embedded systems",
journal = j-TECS,
volume = "8",
number = "1",
pages = "8:1--8:??",
month = dec,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457246.1457254",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Jan 6 14:36:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Trusted platforms have been proposed as a promising
approach to enhance the security of general-purpose
computing systems. However, for many
resource-constrained embedded systems, the size and
cost overheads of a separate Trusted Platform Module
(TPM) chip are not acceptable. One alternative is to
use a software-based TPM, which implements TPM
functions using software that executes in a protected
execution domain on the embedded processor itself.
However, since many embedded systems have limited
processing capabilities and are battery-powered, it is
also important to ensure that the computational and
energy requirements for SW-TPMs are acceptable.\par
In this article, we perform an evaluation of the energy
and execution time overheads for a SW-TPM
implementation on a handheld appliance (Sharp Zaurus
PDA). We characterize the execution time and energy
required by each TPM command through actual
measurements on the target platform. We observe that
for most commands, overheads are primarily due to the
use of 2,048-bit RSA operations that are performed
within the SW-TPM. In order to alleviate SW-TPM
overheads, we evaluate the use of Elliptic Curve
Cryptography (ECC) as a replacement for the RSA
algorithm specified in the Trusted Computing Group
(TCG) standards. In addition, we also evaluate the
overheads of using the SW-TPM in the context of various
end applications, including trusted boot of the Linux
operating system (OS), a secure VoIP client, and a
secure Web browser. Furthermore, we analyze the
computational workload involved in running SW-TPM
commands using ECC. We then present a suite of hardware
and software enhancements to accelerate these commands
--- generic custom instructions and exploitation of
parallel processing capabilities in multiprocessor
systems-on-chip (SoCs). We report results of evaluating
the proposed architectures on a commercial embedded
processor (Xtensa from Tensilica). Through uniprocessor
and multiprocessor optimizations, we could achieve
speed-ups of up to 5.71X for individual TPM commands.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Custom instructions; embedded systems; multiprocessor
systems",
}
@Article{Suresh:2009:EEE,
author = "Dinesh C. Suresh and Banit Agrawal and Jun Yang and
Walid Najjar",
title = "Energy-efficient encoding techniques for off-chip data
buses",
journal = j-TECS,
volume = "8",
number = "2",
pages = "9:1--9:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457256",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Reducing the power consumption of computing devices
has gained a lot of attention recently. Many research
works have focused on reducing power consumption in the
off-chip buses as they consume a significant amount of
total power. Since the bus power consumption is
proportional to the switching activity, reducing the
bus switching is an effective way to reduce bus power.
While numerous techniques exist for reducing bus power
in address buses, only a handful of techniques have
been proposed for data-bus power reduction, where
frequent value encoding (FVE) is the best existing
scheme to reduce the transition activity on the data
buses.\par
In this article, we propose improved frequent value
data bus-encoding techniques aimed at reducing more
switching activity and, hence, power consumption. We
propose three new schemes and five new variations to
exploit bit-wise temporal and spatial locality in the
data-bus values. Our techniques just use one external
control signal and capture bit-wise locality to
efficiently encode data values. For all the embedded
and SPEC applications we tested, the overall average
switching reduction is 53\% over unencoded data and
10\% more than the conventional FVE scheme.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "bus switching; encoding; internal capacitances;
Low-power data buses",
}
@Article{Kejariwal:2009:ELL,
author = "Arun Kejariwal and Alexander V. Veidenbaum and
Alexandru Nicolau and Milind Girkar and Xinmin Tian and
Hideki Saito",
title = "On the exploitation of loop-level parallelism in
embedded applications",
journal = j-TECS,
volume = "8",
number = "2",
pages = "10:1--10:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457257",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Advances in the silicon technology have enabled
increasing support for hardware parallelism in embedded
processors. Vector units, multiple processors/cores,
multithreading, special-purpose accelerators such as
DSPs or cryptographic engines, or a combination of the
above have appeared in a number of processors. They
serve to address the increasing performance
requirements of modern embedded applications. To what
extent the available hardware parallelism can be
exploited is directly dependent on the amount of
parallelism inherent in the given application and the
congruence between the granularity of hardware and
application parallelism. This paper discusses how
loop-level parallelism in embedded applications can be
exploited in hardware and software. Specifically, it
evaluates the efficacy of automatic loop
parallelization and the performance potential of
different types of parallelism, viz., true thread-level
parallelism (TLP), speculative thread-level parallelism
and vector parallelism, when executing loops.
Additionally, it discusses the interaction between
parallelization and vectorization. Applications from
both the industry-standard EEMBC{\reg},$^1$ 1.1, EEMBC
2.0 and the academic MiBench embedded benchmark suites
are analyzed using the Intel{\reg}$^2$ C compiler. The
results show the performance that can be achieved today
on real hardware and using a production compiler,
provide upper bounds on the performance potential of
the different types of thread-level parallelism, and
point out a number of issues that need to be addressed
to improve performance. The latter include
parallelization of libraries such as libc and design of
parallel algorithms to allow maximal exploitation of
parallelism. The results also point to the need for
developing new benchmark suites more suitable to
parallel compilation and execution.\par
$^1$ Other names and brands may be claimed as the
property of others.\par
$^2$ Intel is a trademark of Intel Corporation or its
subsidiaries in the United States and other
countries.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "libraries; Multi-cores; multithreading; parallel
loops; programming models; system-on-chip (Soc);
thread-level speculation; vectorization",
}
@Article{Hashemi:2009:TDS,
author = "Matin Hashemi and Soheil Ghiasi",
title = "Throughput-driven synthesis of embedded software for
pipelined execution on multicore architectures",
journal = j-TECS,
volume = "8",
number = "2",
pages = "11:1--11:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457258",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present a methodology for pipelined software
synthesis of streaming applications. First, we develop
a versatile task assignment algorithm capable of
optimizing realistically-arbitrary cost functions for
two cores. The algorithm is exact (i.e., theoretically
optimal) contrary to existing heuristics. Second, our
approximation technique provides an adjustable knob to
trade solution quality with algorithm runtime and
memory. Third, we develop a recursive heuristic for
more cores. FPGA-based emulated experiments validate
our theoretical results. The exact algorithm yields 1.7
\times throughput improvement. The approximation method
offers a range of tradeoff points (e.g., 3 \times
faster with 20 \times less memory) while degrading the
throughput only 1\% to 5\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Embedded software; graph partitioning; multi-core
hardware; streaming applications; task assignment",
}
@Article{Chattopadhyay:2009:PPA,
author = "A. Chattopadhyay and H. Ishebabi and X. Chen and Z.
Rakosi and K. Karuri and D. Kammler and R. Leupers and
G. Ascheid and H. Meyr",
title = "Pre- and postfabrication architecture exploration for
partially reconfigurable {VLIW} processors",
journal = j-TECS,
volume = "8",
number = "2",
pages = "12:1--12:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457259",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Modern application-specific instruction-set processors
(ASIPs) face the daunting task of delivering high
performance for a wide range of applications. For
enhancing the performance, architectural features
(e.g., pipelining, VLIW) are often employed in ASIPs,
leading to high design complexity. Integrated ASIP
design environments like template-based approaches and
language-driven approaches provide an answer to this
growing design complexity. At the same time, increasing
hardware design costs have motivated the processor
designers to introduce high flexibility in the
processor. Flexibility, in its most effective form, can
be introduced to the ASIP by coupling a reconfigurable
unit to the base processor. Due to its obvious
benefits, several reconfigurable ASIPs (rASIPs) have
been designed for years. This design paradigm gained
momentum with the advent of coarse-grained FPGAs, where
the lack of domain-specific performance common in
general-purpose FPGAs are largely overcome by choosing
application-dependent basic functional units. These
rASIP designs lack a generic flow from high-level
specification, resulting into intuitive design
decisions and hard-to-retarget processor design tools.
Although partial, template-based approaches for rASIP
design is existent, a clear design methodology
especially for the prefabrication architecture
exploration is not present. In order to address this
issue, a high-level specification and design
methodology for partially reconfigurable VLIW
processors is proposed in this article. To show the
benefit of this approach a commercial VLIW processor is
used as the base architecture and two domains of
applications are studied for potential performance
gain.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ASIP; coarse-grained FPGA; VLIW",
}
@Article{Lin:2009:MAC,
author = "Yi-Neng Lin and Ying-Dar Lin and Kuo-Kun Tseng and
Yuan-Cheng Lai",
title = "Modeling and analysis of core-centric network
processors",
journal = j-TECS,
volume = "8",
number = "2",
pages = "13:1--13:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457260",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Network processors can be categorized into two types,
the coprocessors-centric model in which the data-plane
is handled by coprocessors, and the core-centric model
in which the core processes most of the data-plane
packets yet offloading some tasks to coprocessors.
While the former has been properly explored over
various applications, researches regarding the latter
remain limited. Based on the previous experience of
prototyping the virtual private network (VPN) over the
IXP425 network processor, this work aims to derive
design implications for the core-centric model
performing computational intensive applications. From
system and IC vendors' perspectives, the
continuous-time Markov chain and Petri net simulations
are adopted to explore this architecture. Analytical
results prove to be quite inline with those of the
simulation and implementation. With subsequent
investigation we find that appropriate process run
lengths can improve the effective core utilization by
2.26 times, and by offloading the throughput boosts 7.5
times. The results also suggest single process
programming since context switch overhead impacts
considerably on the performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "core-centric; embedded system; modeling; Network
processor; simulation",
}
@Article{Zhou:2009:CLC,
author = "Xiangrong Zhou and Peter Petrov",
title = "Cross-layer customization for rapid and low-cost task
preemption in multitasked embedded systems",
journal = j-TECS,
volume = "8",
number = "2",
pages = "14:1--14:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457261",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Preemptive multitasking is widely used in many
low-cost and real-time embedded applications for its
superior hardware utilization. The frequent and
asynchronous context switches, however, require the
preservation and restoration of the task state, thus
resulting in a large number of memory transfer
instructions. As a consequence, task responsiveness and
application throughput can be significantly
deteriorated. To address this problem we propose a
cross-layer customization framework which through the
close cooperation of compiler, OS, and hardware
architecture achieves rapid and low-cost task switch.
Application information extracted during compile-time
regarding state liveness is exploited in order to
preserve a minimal amount of task state on task
preemption. We introduce two complementary techniques
to implement the application-aware state preservation.
The first technique utilizes compiler-generated custom
routines which preserve/restore an extremely small live
context at judiciously selected points in the
application code. The second technique requires more
sophisticated hardware support. It employs an
OS-controlled register file mapping to achieve a rapid
context switch. By mapping a small fraction of the
register file in a single clock cycle, a context switch
is achieved requiring no memory transfers for the
majority of cases to preserve/restore the live state.
The effect of aggressively replicated register files,
where each task is given its own replica, is achieved
with the hardware cost of only adding from 25\% to 50\%
extra physical registers. Through the utilization of
these novel mechanisms, a significant improvement on
task response time is achieved as the context-switch
cost is minimized.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Auerbach:2009:LLT,
author = "Joshua Auerbach and David F. Bacon and Daniel Iercan
and Christoph M. Kirsch and V. T. Rajan and Harald
R{\"o}ck and Rainer Trummer",
title = "Low-latency time-portable real-time programming with
{Exotasks}",
journal = j-TECS,
volume = "8",
number = "2",
pages = "15:1--15:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457262",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "{\em Exotasks\/} are a novel Java programming
construct that achieve three important goals. They
achieve low latency while allowing the fullest use of
Java language features, compared to previous attempts
to restrict the Java language for use in the
submillisecond domain. They support pluggable
schedulers, allowing easy implementation of new
scheduling paradigms in a real-time Java system. They
can achieve deterministic timing, even in the presence
of other Java threads, and across changes of hardware
and software platform. To achieve these goals, the
program is divided into tasks with private heaps. Tasks
may be strongly isolated, communicating only with each
other and guaranteeing determinism, or weakly isolated,
allowing some communication with the rest of the Java
application. Scheduling of the tasks' execution,
garbage collection, and value passing is accomplished
by the pluggable scheduler. Schedulers that we have
written employ logical execution time (LET) in
association with strong isolation to achieve time
portability. We have also built a quad-rotor model
helicopter, the JAviator, which we use to evaluate our
implementation of Exotasks in an experimental embedded
version of IBM's J9 real-time virtual machine. Our
experiments show that we are able to maintain very low
scheduling jitter and deterministic behavior in the
face of variations in both software load and hardware
platform. We also show that Exotasks perform nearly as
well as Eventrons on a benchmark audio application.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Real-time scheduling; time portability; UAVs; virtual
machine",
}
@Article{Ahn:2009:RCT,
author = "Minwook Ahn and Yunheung Paek",
title = "Register coalescing techniques for heterogeneous
register architecture with copy sifting",
journal = j-TECS,
volume = "8",
number = "2",
pages = "16:1--16:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457263",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Optimistic coalescing has been proven as an elegant
and effective technique that provides better chances of
safely coloring more registers in register allocation
than other coalescing techniques. Its algorithm
originally assumes homogeneous registers, which are all
gathered in the same register file. Although this
register architecture is still common in most
general-purpose processors, embedded processors often
contain heterogeneous registers, which are scattered in
physically different register files dedicated for each
dissimilar purpose and use. In this work, we show that
optimistic coalescing is also useful for an embedded
processor to better handle such heterogeneity of the
register architecture, and developed a modified
algorithm for optimal coalescing that helps a register
allocator. In the experiment, an existing register
allocator was able to achieve up to 13.0\% reduction in
code size through our coalescing, and avoid many spills
that would have been generated without our scheme.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compiler; embedded processors; heterogeneous register
architecture; Register allocation; register
coalescing",
}
@Article{Mozumdar:2009:CSP,
author = "Mohammad Mostafizur Rahman Mozumdar and Luciano
Lavagno and Laura Vanzago",
title = "A comparison of software platforms for wireless sensor
networks: {MANTIS}, {TinyOS}, and {ZigBee}",
journal = j-TECS,
volume = "8",
number = "2",
pages = "17:1--17:??",
month = jan,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1457255.1457264",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Feb 5 19:15:05 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wireless sensor networks are characterized by very
tight code size and power constraints and by a lack of
well-established standard software development
platforms such as Posix. In this article, we present a
comparative study between a few fairly different such
platforms, namely MANTIS, TinyOS, and ZigBee, when
considering them from the application developer's
perspective, that is, by focusing mostly on functional
aspects, rather than on performance or code size. In
other words, we compare both the tasking model used by
these platforms and the API libraries they offer.
Sensor network applications are basically event based,
so most of the software platforms are also built on
considering event handling mechanism, however some use
a more traditional thread based model. In this article,
we consider implementations of a simple generic
application in MANTIS, TinyOS, and the Ember ZigBee
development framework, with the goal of depicting major
differences between these platforms, and suggesting a
programming style aimed at maximizing portability
between them.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "application porting; software platform; Wireless
sensor networks",
}
@Article{Unnikrishnan:2009:RMR,
author = "P. Unnikrishnan and G. Chen and M. Kandemir and M.
Karakoy and I. Kolcu",
title = "Reducing memory requirements of resource-constrained
applications",
journal = j-TECS,
volume = "8",
number = "3",
pages = "17:1--17:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509289",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded computing platforms are often resource
constrained, requiring great design and implementation
attention to memory-power-, and heat-related
parameters. An important task for a compiler in such
platforms is to simplify the process of developing
applications for limited memory devices and
resource-constrained clients. Focusing on
array-intensive embedded applications to be executed on
single CPU-based architectures, this work explores how
loop-based compiler optimizations can be used for
increasing memory location reuse. Our goal is to
transform a given application in such a way that the
resulting code has fewer cases (as compared to the
original code), where the lifetimes of array elements
overlap. The reduction in lifetimes of array elements
can then be exploited by reusing memory locations as
much as possible. Our experimental results indicate
that the proposed strategy reduces data space
requirements of 15 resource constrained applications by
more than 40\%, on average. We also demonstrate how
this strategy can be combined with data locality (cache
behavior)--enhancing techniques so that a compiler can
take advantage of both, that is, reduce data memory
requirements and improve data locality at the same
time.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compilers; embedded system; lifetime; Memory; reuse",
}
@Article{Weng:2009:AMN,
author = "Ning Weng and Tilman Wolf",
title = "Analytic modeling of network processors for parallel
workload mapping",
journal = j-TECS,
volume = "8",
number = "3",
pages = "18:1--18:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509290",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Network processors are heterogeneous system-on-chip
multiprocessors that are optimized to perform packet
forwarding and processing tasks at Gigabit data rates.
To meet the performance demands of increasing link
speeds and complex network applications, network
processors are implemented with several dozen embedded
processor cores and hardware accelerators that run
multiple packet processing applications in parallel.
The parallel nature of the processing system makes it
increasingly difficult for application developers to
understand and manage resources and map processing
tasks to the hardware. To address this problem, we
present a methodology for profiling and analyzing
network processor applications, mapping processing
tasks to a generalized network processor architecture,
and analytically determining the expected throughput
performance. The key novelty of this work is not only
the adaptation of application analysis and mapping
algorithms to heterogeneous network processors, but
also that the entire process can be automated and
hidden from the application developer. Starting with
the analysis of a uniprocessor implementation of the
application, the process yields a mapping of the
partitioned application that shows best performance for
a given network processor system. The simplicity of the
proposed randomized mapping algorithm allows the use of
this methodology in network processor runtime systems
where dynamic reallocation of tasks is necessary but
processing power is limited. We present results that
show the effectiveness of the analysis and mapping
methodology as well as its application to design space
exploration.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Application profiling; embedded systems;
multiprocessor scheduling; network processors",
}
@Article{Tseng:2009:FSA,
author = "Kuo-Kun Tseng and Yuan-Cheng Lai and Ying-Dar Lin and
Tsern-Huei Lee",
title = "A fast scalable automaton-matching accelerator for
embedded content processors",
journal = j-TECS,
volume = "8",
number = "3",
pages = "19:1--19:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509291",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Home and office network gateways often employ a
cost-effective embedded network processor to handle
their network services. Such network gateways have
received strong demand for applications dealing with
intrusion detection, keyword blocking, antivirus and
antispam. Accordingly, we were motivated to propose an
appropriate fast scalable automaton-matching (FSAM)
hardware to accelerate the embedded network processors.
Although automaton matching algorithms are robust with
deterministic matching time, there is still plenty of
room for improving their average-case performance. FSAM
employs novel prehash and root-index techniques to
accelerate the matching for the nonroot states and the
root state, respectively, in automation based hardware.
The prehash approach uses some hashing functions to
pretest the input substring for the nonroot states
while the root-index approach handles multiple bytes in
one single matching for the root state. Also, FSAM is
applied in a prevalent automaton algorithm,
Aho--Corasick (AC), which is often used in many
content-filtering applications. When implemented in
FPGA, FSAM can perform at the rate of 11.1Gbps with the
pattern set of 32,634 bytes, demonstrating that our
proposed approach can use a small logic circuit to
achieve a competitive performance, although a larger
memory is used. Furthermore, the amount of patterns in
FSAM is not limited by the amount of internal circuits
and memories. If the high-speed external memories are
employed, FSAM can support up to 21,302 patterns while
maintaining similar high performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Aho--Corasick; automaton; Bloom filter; content
filtering; String matching",
}
@Article{Reshadi:2009:HCS,
author = "Mehrdad Reshadi and Prabhat Mishra and Nikil Dutt",
title = "Hybrid-compiled simulation: an efficient technique for
instruction-set architecture simulation",
journal = j-TECS,
volume = "8",
number = "3",
pages = "20:1--20:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509292",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Instruction-set simulators are critical tools for the
exploration and validation of new processor
architectures. Due to the increasing complexity of
architectures and time-to-market pressure, performance
is the most important feature of an instruction-set
simulator. Interpretive simulators are flexible but
slow, whereas compiled simulators deliver speed at the
cost of flexibility and compilation overhead. This
article presents a hybrid instruction-set-compiled
simulation (HISCS) technique for generation of fast
instruction-set simulators that combines the benefit of
both compiled and interpretive simulation. This article
makes two important contributions: (i) it improves the
interpretive simulation performance by applying
compiled simulation at the instruction level using a
novel template-customization technique to generate
optimized decoded instructions during compile time; and
(ii) it reduces the compile-time overhead by combining
the benefits of both static and dynamic-compiled
simulation. Our experimental results using two
contemporary processors (ARM7 and SPARC) demonstrate an
order-of-magnitude reduction in compilation time as
well as a 70\% performance improvement, on average,
over the best-known published result in instruction-set
simulation.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Compiled simulation; instruction set architecture;
interpretive simulation; partial evaluation",
}
@Article{Nguyen:2009:MAE,
author = "Nghi Nguyen and Angel Dominguez and Rajeev Barua",
title = "Memory allocation for embedded systems with a
compile-time-unknown scratch-pad size",
journal = j-TECS,
volume = "8",
number = "3",
pages = "21:1--21:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509293",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents the first memory allocation
scheme for embedded systems having a scratch-pad memory
whose size is unknown at compile time. A scratch-pad
memory (SPM) is a fast compiler-managed SRAM that
replaces the hardware-managed cache. All existing
memory allocation schemes for SPM require the SPM size
to be known at compile time. Unfortunately, because of
this constraint, the resulting executable is tied to
that size of SPM and is not portable to other processor
implementations having a different SPM size.
Size-portable code is valuable when programs are
downloaded during deployment either via a network or
portable media. Code downloads are used for fixing bugs
or for enhancing functionality. The presence of
different SPM sizes in different devices is common
because of the evolution in VLSI technology across
years. The result is that SPM cannot be used in such
situations with downloaded codes.\par
To overcome this limitation, our work presents a
compiler method whose resulting executable is portable
across SPMs of any size. Our technique is to employ a
customized installer software, which decides the SPM
allocation just before the program's first run, since
the SPM size can be discovered at that time. The
installer then, based on the decided allocation,
modifies the program executable accordingly. The
resulting executable places frequently used objects in
SPM, considering both code and data for placement. To
keep the overhead low, much of the preprocessing for
the allocation is done at compile time. Results show
that our benchmarks average a 41\% speedup versus an
all-DRAM allocation, while the optimal static
allocation scheme, which knows the SPM size at compile
time and is thus an unachievable upper-bound and is
only slightly faster (45\% faster than all-DRAM).
Results also show that the overhead from our customized
installer averages about 1.5\% in code size, 2\% in
runtime, and 3\% in compile time for our benchmarks.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compiler; data linked list; downloadable codes;
embedded loading; embedded systems; Memory allocation;
scratch-pad",
}
@Article{Lysecky:2009:DIM,
author = "Roman Lysecky and Frank Vahid",
title = "Design and implementation of a {MicroBlaze}-based warp
processor",
journal = j-TECS,
volume = "8",
number = "3",
pages = "22:1--22:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509294",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "While soft processor cores provided by FPGA vendors
offer designers with increased flexibility, such
processors typically incur penalties in performance and
energy consumption compared to hard processor core
alternatives. The recently developed technology of warp
processing can help reduce those penalties. Warp
processing is the dynamic and transparent
transformation of critical software regions from
microprocessor execution to much faster circuit
execution on an FPGA. In this article, we describe an
implementation of a warp processor on a Xilinx
Virtex-II Pro and Spartan3 FPGAs incorporating one or
more MicroBlaze soft processor cores. We further
provide a detailed analysis of the energy overhead of
dynamically partitioning an application's kernels to
hardware executing within an FPGA. Considering an
implementation that periodically partitions the
executing application once every minute, a
MicroBlaze-based warp processor implemented on a
Spartan3 FPGA achieves average speedups of 5.8\times
and energy reductions of 49\% compared to the
MicroBlaze soft processor core alone --- providing
competitive performance and energy consumption compared
to existing hard processor cores.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "configurable logic; dynamic optimization; FPGA;
hardware/software partitioning; just-in-time (JIT)
compilation; soft processor cores; Warp processors",
}
@Article{Bai:2009:MME,
author = "Lan S. Bai and Lei Yang and Robert P. Dick",
title = "{MEMMU}: {Memory} expansion for {MMU}-less embedded
systems",
journal = j-TECS,
volume = "8",
number = "3",
pages = "23:1--23:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509295",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Random access memory (RAM) is tightly constrained in
the least expensive, lowest-power embedded systems such
as sensor network nodes and portable consumer
electronics. The most widely used sensor network nodes
have only 4 to 10KB of RAM and do not contain memory
management units (MMUs). It is difficult to implement
complex applications under such tight memory
constraints. Nonetheless, price and power-consumption
constraints make it unlikely that increases in RAM in
these systems will keep pace with the increasing memory
requirements of applications.\par
We propose the use of automated compile-time and
runtime techniques to increase the amount of usable
memory in MMU-less embedded systems. The proposed
techniques do not increase hardware cost, and require
few or no changes to existing applications. We have
developed runtime library routines and compiler
transformations to control and optimize the automatic
migration of application data between compressed and
uncompressed memory regions, as well as a fast
compression algorithm well suited to this application.
These techniques were experimentally evaluated on
Crossbow TelosB sensor network nodes running a number
of data-collection and signal-processing applications.
Our results indicate that available memory can be
increased by up to 50\% with less than 10\% performance
degradation for most benchmarks.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Data compression; embedded system; wireless sensor
network",
}
@Article{Doblander:2009:NSF,
author = "Andreas Doblander and Andreas Zoufal and Bernhard
Rinner",
title = "A novel software framework for embedded multiprocessor
smart cameras",
journal = j-TECS,
volume = "8",
number = "3",
pages = "24:1--24:??",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1509288.1509296",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Apr 21 16:29:24 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Distributed smart cameras (DSC) are an emerging
technology for a broad range of important applications
including smart rooms, surveillance, entertainment,
tracking, and motion analysis. By having access to many
views and through cooperation among the individual
cameras, these DSCs have the potential to realize many
more complex and challenging applications than
single-camera systems.\par
This article focuses on the system-level software
required for efficient streaming applications on single
smart cameras as well as on networks of DSCs. Embedded
platforms with limited resources do not provide
middleware services well known on general-purpose
platforms. Our software framework supports transparent
intra- and interprocessor communication while keeping
the memory and computation overhead very low. The
software framework is based on a publisher--subscriber
architecture and provides mechanisms for dynamically
loading and unloading software components as well as
for graceful degradation in case of software- and
hardware-related faults. The software framework has
been completely implemented and tested on our embedded
smart cameras consisting of an ARM-based network
processor and several digital signal processors. Two
case studies demonstrate the feasibility of our
approach.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "distributed embedded systems; fault tolerance;
publisher--subscriber; Smart cameras; video
surveillance",
}
@Article{Li:2009:ELC,
author = "Zhiyuan Li and Santosh Pande",
title = "Editorial: {Languages}, compilers, and tools for
embedded systems",
journal = j-TECS,
volume = "8",
number = "4",
pages = "25:1--25:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550988",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Murray:2009:CTI,
author = "Alastair C. Murray and Richard V. Bennett and
Bj{\"o}rn Franke and Nigel Topham",
title = "Code transformation and instruction set extension",
journal = j-TECS,
volume = "8",
number = "4",
pages = "26:1--26:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550989",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The demand for flexible embedded solutions and short
time-to-market has led to the development of extensible
processors that allow for customization through
user-defined instruction set extensions (ISEs). These
are usually identified from plain C sources. In this
article, we propose a combined exploration of code
transformations and ISE identification. The resulting
performance of such a combination has been measured on
two benchmark suites. Our results demonstrate that
combined code transformations and ISEs can yield
average performance improvements of 49\%. This
outperforms ISEs when applied in isolation, and in
extreme cases yields a speed-up of 2.85.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ASIPs; compilers; Customizable processors; design
space exploration; instruction set extension;
source-level transformations",
}
@Article{Hu:2009:CAS,
author = "Jie Hu and Feihui Li and Vijay Degalahal and Mahmut
Kandemir and N. Vijaykrishnan and Mary J. Irwin",
title = "Compiler-assisted soft error detection under
performance and energy constraints in embedded
systems",
journal = j-TECS,
volume = "8",
number = "4",
pages = "27:1--27:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550990",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Soft errors induced by terrestrial radiation are
becoming a significant concern in architectures
designed in newer technologies. If left undetected,
these errors can result in catastrophic consequences or
costly maintenance problems in different embedded
applications. In this article, we focus on utilizing
the compiler's help in duplicating instructions for
error detection in VLIW datapaths. The instruction
duplication mechanism is further supported by a
hardware enhancement for efficient result verification,
which avoids the need of additional comparison
instructions. In the proposed approach, the compiler
determines the instruction schedule by balancing the
permissible performance degradation and the energy
constraint with the required degree of duplication. Our
experimental results show that our algorithms allow the
designer to perform trade-off analysis between
performance, reliability, and energy consumption.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compilers; Embedded systems; energy consumption;
instruction duplication; reliability; soft errors",
}
@Article{Jafari:2009:EPR,
author = "Roozbeh Jafari and Hassan Ghasemzadeh and Foad Dabiri
and Ani Nahapetian and Majid Sarrafzadeh",
title = "An efficient placement and routing technique for
fault-tolerant distributed embedded computing",
journal = j-TECS,
volume = "8",
number = "4",
pages = "28:1--28:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550991",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents an efficient technique for
placement and routing of sensors/actuators and
processing units in a grid network. The driver
application that we present is a medical jacket, which
requires an extremely high level of robustness and
fault tolerance. The power consumption of such jacket
is another key technological constraint. Our proposed
interconnection network is a mesh of wires. A jacket
made of fabric and wires would be susceptible to
accidental damage via tears. By modeling the tears, we
evaluate the probability of having failures on every
segment of wires in our mesh interconnection network.
Then, we study two problems of placement and routing in
the sensor networks such that the fault tolerance is
maximized while the power consumption is minimized. We
develop efficient integer linear programming (ILP)
formulations to address these problems and perform both
placement and routing, simultaneously. This ensures
that the solution is a lower bound for both problems.
We evaluate the effectiveness of our proposed
techniques on a variety of benchmarks.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Distributed embedded system; fault tolerance;
placement; routing; sensor networks",
}
@Article{Lee:2009:CIA,
author = "Edward A. Lee and Xiaojun Liu and Stephen
Neuendorffer",
title = "Classes and inheritance in actor-oriented design",
journal = j-TECS,
volume = "8",
number = "4",
pages = "29:1--29:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550992",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Actor-oriented components emphasize concurrency and
temporal semantics and are used for modeling and
designing embedded software and hardware. Actors
interact with one another through ports via a messaging
schema that can follow any of several concurrent
semantics. Domain-specific actor-oriented languages and
frameworks are common (Simulink, LabVIEW, SystemC,
etc.). However, they lack many modularity and
abstraction mechanisms that programmers have become
accustomed to in object-oriented components, such as
classes, inheritance, interfaces, and polymorphism,
except as inherited from the host language. This
article shows a form that such mechanisms can take in
actor-oriented components, gives a formal structure,
and describes a prototype implementation. The
mechanisms support actor-oriented class definitions,
subclassing, inheritance, and overriding. The formal
structure imposes structural constraints on a model
(mainly the ``derivation invariant'') that lead to a
policy to govern inheritance. In particular, the
structural constraints permit a disciplined form of
multiple inheritance with unambiguous inheritance and
overriding behavior. The policy is based formally on a
generalized ultrametric space with some remarkable
properties. In this space, inheritance is favored when
actors are ``closer'' (in the generalized ultrametric),
and we show that when inheritance can occur from
multiple sources, one source is always unambiguously
closer than the other.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Actors; components; generalized ultrametric;
inheritance; interfaces; overriding; type systems",
}
@Article{Riccobene:2009:SCB,
author = "Elvinia Riccobene and Patrizia Scandurra and Sara
Bocchio and Alberto Rosti and Luigi Lavazza and Luigi
Mantellini",
title = "{SystemC\slash C-based} model-driven design for
embedded systems",
journal = j-TECS,
volume = "8",
number = "4",
pages = "30:1--30:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550993",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article summarizes our effort, since 2004 up to
the present time, for improving the current industrial
Systems-on-Chip and Embedded Systems design by joining
the capabilities of the unified modeling language (UML)
and SystemC/C programming languages to operate at
system-level. The proposed approach exploits the OMG
model-driven architecture --- a framework for
Model-driven Engineering --- capabilities of reducing
abstract, coarse-grained and platform-independent
system models to fine-grained and platform-specific
models. We first defined a design methodology and a
development flow for the hardware, based on a SystemC
UML profile and encompassing different levels of
abstraction. We then included a multithread C UML
profile for modelling software applications. Both
SystemC/C profiles are consistent sets of modelling
constructs designed to lift the programming features
(both structural and behavioral) of the two coding
languages to the UML modeling level. The new codesign
flow is supported by an environment, which allows
system modeling at higher abstraction levels (from a
functional executable level to a register transfer
level) and supports automatic
code-generation/back-annotation from/to UML models.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "C; ES; MDE; SoC; SystemC; UML",
}
@Article{Bini:2009:MCE,
author = "Enrico Bini and Giorgio Buttazzo and Giuseppe Lipari",
title = "Minimizing {CPU} energy in real-time systems with
discrete speed management",
journal = j-TECS,
volume = "8",
number = "4",
pages = "31:1--31:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550994",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a general framework to analyze
and design embedded systems minimizing the energy
consumption without violating timing requirements. A
set of realistic assumptions is considered in the model
in order to apply the results in practical real-time
applications. The processor is assumed to have as a set
of discrete operating modes, each characterized by
speed and power consumption. The energy overhead and
the transition delay incurred during mode switches are
considered. Task computation times are modeled with a
part that scales with the speed and a part having a
fixed duration, to take I/O operations into
account.\par
The proposed method allows to compute the optimal
sequence of voltage/speed changes that approximates the
minimum continuous speed, which guarantees the
feasibility of a given set of real-time tasks, without
violating the deadline constraints. The analysis is
performed both under fixed and dynamic priority
assignments.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "CPU energy; Real-time systems",
}
@Article{Koo:2009:FTG,
author = "Heon-Mo Koo and Prabhat Mishra",
title = "Functional test generation using design and property
decomposition techniques",
journal = j-TECS,
volume = "8",
number = "4",
pages = "32:1--32:??",
month = jul,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1145/1550987.1550995",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jul 23 12:32:49 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Functional verification of microprocessors is one of
the most complex and expensive tasks in the current
system-on-chip design methodology. Simulation using
functional test vectors is the most widely used form of
processor validation. A significant bottleneck in the
validation of such systems is the lack of automated
techniques for directed test generation. While existing
model checking--based approaches have proposed several
promising ideas for automated test generation, many
challenges remain in applying them to industrial
microprocessors. The time and resources required for
test generation using existing model checking--based
techniques can be prohibitively large. This article
presents an efficient test generation technique using
decompositional model checking. The contribution of the
article is the development of both property and design
decomposition procedures for efficient test generation
of pipelined processors. Our experimental results using
a multi-issue MIPS processor and an industrial
processor based on Power Architecture\TM{} Technology
demonstrate several orders-of-magnitude reduction in
validation effort by drastically reducing both test
generation time and test program length.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "design decomposition; functional validation; Model
checking; pipelined processor; property decomposition;
test generation",
}
@Article{Plaks:2009:GECa,
author = "Toomas P. Plaks and Neil Bergmann and Bernard
Pottier",
title = "Guest editorial {CAPA'08} configurable computing:
{Configuring} algorithms, processes, and architecture
issue {I}: {Configuring} algorithms and processes",
journal = j-TECS,
volume = "9",
number = "1",
pages = "1:1--1:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ferri:2009:RIF,
author = "B. H. Ferri and A. A. Ferri",
title = "Reconfiguration of {IIR} filters in response to
computer resource availability",
journal = j-TECS,
volume = "9",
number = "1",
pages = "2:1--2:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wang:2009:TTD,
author = "Xiaojun Wang and Miriam Leeser",
title = "A truly two-dimensional systolic array {FPGA}
implementation of {QR} decomposition",
journal = j-TECS,
volume = "9",
number = "1",
pages = "3:1--3:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{DoCarmoLucas:2009:ADF,
author = "Amilcar {Do Carmo Lucas} and Henning Sahlbach and Sean
Whitty and Sven Heithecker and Rolf Ernst",
title = "Application development with the {FlexWAFE} real-time
stream processing architecture for {FPGAs}",
journal = j-TECS,
volume = "9",
number = "1",
pages = "4:1--4:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nahapetian:2009:AAS,
author = "Ani Nahapetian and Philip Brisk and Soheil Ghiasi and
Majid Sarrafzadeh",
title = "An approximation algorithm for scheduling on
heterogeneous reconfigurable resources",
journal = j-TECS,
volume = "9",
number = "1",
pages = "5:1--5:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Patterson:2009:SMB,
author = "C. Patterson and P. Athanas and M. Shelburne and J.
Bowen and J. Sur{\'\i}s and T. Dunham and J. Rice",
title = "Slotless module-based reconfiguration of embedded
{FPGAs}",
journal = j-TECS,
volume = "9",
number = "1",
pages = "6:1--6:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lloyd:2009:PSN,
author = "Scott Lloyd and Quinn Snell",
title = "A packet-switched network architecture for
reconfigurable computing",
journal = j-TECS,
volume = "9",
number = "1",
pages = "7:1--7:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lubbers:2009:RMP,
author = "Enno L{\"u}bbers and Marco Platzner",
title = "{ReconOS}: {Multithreaded} programming for
reconfigurable computers",
journal = j-TECS,
volume = "9",
number = "1",
pages = "8:1--8:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huang:2009:SFB,
author = "Jian Huang and Matthew Parris and Jooheung Lee and
Ronald F. Demara",
title = "Scalable {FPGA}-based architecture for {DCT}
computation using dynamic partial reconfiguration",
journal = j-TECS,
volume = "9",
number = "1",
pages = "9:1--9:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:40:57 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Plaks:2009:GECb,
author = "Toomas P. Plaks and Neil Bergmann and Bernard
Pottier",
title = "Guest editorial {CAPA'08 Configurable} computing:
{Configuring} algorithms, processes, and architecture
{Issue II}: {Configuring} hardware architecture",
journal = j-TECS,
volume = "9",
number = "2",
pages = "10:1--10:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:00 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Alle:2009:RRR,
author = "Mythri Alle and Keshavan Varadarajan and Alexander
Fell and Ramesh Reddy C. and Nimmy Joseph and Saptarsi
Das and Prasenjit Biswas and Jugantor Chetia and Adarsh
Rao and S. K. Nandy and Ranjani Narayan",
title = "{REDEFINE}: {Runtime} reconfigurable polymorphic
{ASIC}",
journal = j-TECS,
volume = "9",
number = "2",
pages = "11:1--11:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:00 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Banerjee:2009:FPU,
author = "Pritha Banerjee and Susmita Sur-Kolay and Arijit
Bishnu and Sandip Das and Subhas C. Nandy and Subhasis
Bhattacharjee",
title = "{FPGA} placement using space-filling curves: {Theory}
meets practice",
journal = j-TECS,
volume = "9",
number = "2",
pages = "12:1--12:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:00 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Beckett:2009:PSM,
author = "Paul Beckett",
title = "Power scalability in a mesh-connected reconfigurable
architecture",
journal = j-TECS,
volume = "9",
number = "2",
pages = "13:1--13:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:00 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhao:2009:STT,
author = "Weisheng Zhao and Eric Belhaire and Claude Chappert
and Pascale Mazoyer",
title = "Spin transfer torque {(STT)-MRAM--based} runtime
reconfiguration {FPGA} circuit",
journal = j-TECS,
volume = "9",
number = "2",
pages = "14:1--14:??",
month = oct,
year = "2009",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:00 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2010:CPV,
author = "Hyung Sun Lee and Byung Kook Kim",
title = "Coscheduling of processor voltage and control task
period for energy-efficient control systems",
journal = j-TECS,
volume = "9",
number = "3",
pages = "15:1--15:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Reddy:2010:CPE,
author = "Rakesh Reddy and Peter Petrov",
title = "Cache partitioning for energy-efficient and
interference-free embedded multitasking",
journal = j-TECS,
volume = "9",
number = "3",
pages = "16:1--16:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Geelen:2010:MES,
author = "Bert Geelen and Vissarion Ferentinos and Francky
Catthoor and Gauthier Lafruit and Diederik Verkest and
Rudy Lauwereins and Thanos Stouraitis",
title = "Modeling and exploiting spatial locality trade-offs in
wavelet-based applications under varying resource
requirements",
journal = j-TECS,
volume = "9",
number = "3",
pages = "17:1--17:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Bueno:2010:ORA,
author = "David Bueno and Chris Conger and Alan D. George",
title = "Optimizing {rapidIO} architectures for onboard
processing",
journal = j-TECS,
volume = "9",
number = "3",
pages = "18:1--18:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Inoue:2010:RSC,
author = "Hiroaki Inoue and Junji Sakai and Masato Edahiro",
title = "A robust seamless communication architecture for
next-generation mobile terminals on multi-{CPU}
{SoCs}",
journal = j-TECS,
volume = "9",
number = "3",
pages = "19:1--19:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Manzanares:2010:CER,
author = "Adam Manzanares and Xiaojun Ruan and Shu Yin and Xiao
Qin and Adam Roth and Mais Najim",
title = "Conserving energy in real-time storage systems with
{I/O} burstiness",
journal = j-TECS,
volume = "9",
number = "3",
pages = "20:1--20:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Courbot:2010:EBD,
author = "Alexandre Courbot and Gilles Grimaud and Jean-Jacques
Vandewalle",
title = "Efficient off-board deployment and customization of
virtual machine-based embedded systems",
journal = j-TECS,
volume = "9",
number = "3",
pages = "21:1--21:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Xue:2010:IRP,
author = "Chun Jason Xue and Jingtong Hu and Zili Shao and Edwin
Sha",
title = "Iterational retiming with partitioning: {Loop}
scheduling with complete memory latency hiding",
journal = j-TECS,
volume = "9",
number = "3",
pages = "22:1--22:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cho:2010:LFS,
author = "Hyeonjoong Cho and Binoy Ravindran and E. Douglas
Jensen",
title = "Lock-free synchronization for dynamic embedded
real-time systems",
journal = j-TECS,
volume = "9",
number = "3",
pages = "23:1--23:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Musoll:2010:CEL,
author = "Enric Musoll",
title = "A cost-effective load-balancing policy for tile-based,
massive multi-core packet processors",
journal = j-TECS,
volume = "9",
number = "3",
pages = "24:1--24:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Guang:2010:HAM,
author = "Liang Guang and Ethiopia Nigussie and Pekka Rantala
and Jouni Isoaho and Hannu Tenhunen",
title = "Hierarchical agent monitoring design approach towards
self-aware parallel systems-on-chip",
journal = j-TECS,
volume = "9",
number = "3",
pages = "25:1--25:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{McLoughlin:2010:RTR,
author = "Ian Vince McLoughlin and Timo Rolf Bretschneider",
title = "Reliability through redundant parallelism for
micro-satellite computing",
journal = j-TECS,
volume = "9",
number = "3",
pages = "26:1--26:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yang:2010:OMC,
author = "Lei Yang and Robert P. Dick and Haris Lekatsas and
Srimat Chakradhar",
title = "Online memory compression for embedded systems",
journal = j-TECS,
volume = "9",
number = "3",
pages = "27:1--27:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cesana:2010:MBM,
author = "Ulpian Cesana and Zhen He",
title = "Multi-buffer manager: {Energy-efficient} buffer
manager for databases on flash memory",
journal = j-TECS,
volume = "9",
number = "3",
pages = "28:1--28:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tichy:2010:GAF,
author = "Milan Tichy and Jan Schier and David Gregg",
title = "{GSFAP} adaptive filtering using log arithmetic for
resource-constrained embedded systems",
journal = j-TECS,
volume = "9",
number = "3",
pages = "29:1--29:??",
month = feb,
year = "2010",
CODEN = "????",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Mar 15 18:41:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yang:2010:HPO,
author = "Lei Yang and Robert P. Dick and Haris Lekatsas and
Srimat Chakradhar",
title = "High-performance operating system controlled online
memory compression",
journal = j-TECS,
volume = "9",
number = "4",
pages = "30:1--30:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721696",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Online memory compression is a technology that
increases the amount of memory available to
applications by dynamically compressing and
decompressing their working datasets on demand. It has
proven extremely useful in embedded systems with tight
physical RAM constraints. The technology can be used to
increase functionality, reduce size, and reduce cost,
without modifying applications or hardware. This
article presents a new software-based online memory
compression algorithm for embedded systems. In
comparison with the best algorithms used in online
memory compression, our new algorithm has a competitive
compression ratio but is twice as fast. In addition, we
describe several practical problems encountered in
developing an online memory compression infrastructure
and present solutions. We present a method of
adaptively managing the uncompressed and compressed
memory regions during application execution. This
memory management scheme adapts to the predicted memory
requirements of applications. It permits efficient
compression for a wide range of applications. We have
evaluated our techniques on a portable embedded device
and have found that the memory available to
applications can be increased by 2.5\times with
negligible performance and power consumption penalties,
and with no changes to hardware or applications. Our
techniques allow existing applications to execute with
less physical memory. They also allow applications with
larger working datasets to execute on unchanged
embedded system hardware, thereby increasing
functionality.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "compression; Embedded system; memory",
}
@Article{Wu:2010:SAF,
author = "Chin-Hsien Wu",
title = "A self-adjusting flash translation layer for
resource-limited embedded systems",
journal = j-TECS,
volume = "9",
number = "4",
pages = "31:1--31:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721697",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The capacity of flash memory storage systems has been
growing at a speed similar to many other storage
systems. In order to properly manage the product cost,
vendors face serious challenges in resource-limited
embedded systems. In this article, a self-adjusting
flash translation layer is proposed with low memory
requirements. The objective of the design is to provide
efficient address mapping and low garbage collection
overhead, while controlling main memory usage of the
flash translation layer. The capability of the design
is evaluated over realistic workloads and benchmarks.
System performance is also guaranteed under low memory
requirements.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "embedded systems; Flash memory; flash translation
layer; storage systems",
}
@Article{Irturk:2010:GAG,
author = "Ali Irturk and Bridget Benson and Shahnam Mirzaei and
Ryan Kastner",
title = "{GUSTO}: an automatic generation and optimization tool
for matrix inversion architectures",
journal = j-TECS,
volume = "9",
number = "4",
pages = "32:1--32:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721698",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Matrix inversion is a common function found in many
algorithms used in wireless communication systems. As
FPGAs become an increasingly attractive platform for
wireless communication, it is important to understand
the trade-offs in designing a matrix inversion core on
an FPGA. This article describes a matrix inversion core
generator tool, GUSTO, that we developed to ease the
design space exploration across different matrix
inversion architectures. GUSTO is the first tool of its
kind to provide automatic generation of a variety of
general-purpose matrix inversion architectures with
different parameterization options. GUSTO also provides
an optimized application-specific architecture with an
average of 59\% area decrease and 3X throughput
increase over its general-purpose architecture. The
optimized architectures generated by GUSTO provide
comparable results to published matrix inversion
architecture implementations, but offer the advantage
of providing the designer the ability to study the
trade-offs between architectures with different design
parameters.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "design space exploration; Field programmable gate
arrays (FPGAs); matrix inversion",
}
@Article{Yu:2010:FSB,
author = "Yue Yu and Shangping Ren and Ophir Frieder",
title = "Feasibility of semiring-based timing constraints",
journal = j-TECS,
volume = "9",
number = "4",
pages = "33:1--33:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721699",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Real-time and embedded applications often involve
different types of timing constraints, such as
precedence constraints and real-time constraints. As
real-time and embedded applications further advance,
new timing constraint types are emerging as well.
Recent research on interval-based timing constraints is
an example. Thus, it is important to have a uniformed
timing constraint representation so that a generalized
approach can be developed to analyze the variant
constraint types.\par
A semiring-based timing constraint model is introduced
to generalize the representations of different
constraint types. Under this model, we develop an
algorithm to check the satisfaction feasibility for a
given set of semiring-based timing constraints. This
algorithm provides better performance in the average
case as compared to applying the Bellman-Ford algorithm
directly on the constraint set.\par
In addition, for a set of feasible semiring-based
timing constraints, event occurrence points that
satisfy the constraint set form a (hyperdimension)
feasible region. For the given two sets of timing
constraints, we develop a necessary and sufficient
condition to testify whether the two constraint sets'
feasible regions have an inclusion relation. If one
feasible region is included in the other, we know that
the real-time event occurrences that satisfy the
included constraint set will necessarily satisfy the
including set.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "33",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "timing constraint feasibility analysis; Timing
constraints",
}
@Article{Tahaee:2010:PAP,
author = "Seyed-Abdoreza Tahaee and Amir Hossein Jahangir",
title = "A polynomial algorithm for partitioning problems",
journal = j-TECS,
volume = "9",
number = "4",
pages = "34:1--34:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721700",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article takes a theoretical approach to focus on
the algorithmic properties of hardware/software
partitioning. It proposes a method with polynomial
complexity to find the global optimum of an NP-hard
model partitioning problem for 75\% of occurrences
under some practical conditions. The global optimum is
approached with a lower bound distance for the
remaining 25\%. Furthermore, this approach ensures
finding the 2-approximate of the global optimum
partition in 97\% of instances where technical
assumptions exist. The strategy is based on
intelligently changing the parameters of the polynomial
model of the partitioning problem to force it to
produce (or approach) the exact solution to the NP-hard
model.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "34",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "hardware/software codesign; maximum flow minimum cut
problem; NP-hard problems; Partitioning problem",
}
@Article{Peng:2010:OWZ,
author = "Huan-Kai Peng and Youn-Long Lin",
title = "An optimal warning-zone-length assignment algorithm
for real-time and multiple-{QoS} on-chip bus
arbitration",
journal = j-TECS,
volume = "9",
number = "4",
pages = "35:1--35:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721701",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In an advanced System-on-Chip (SoC) for real-time
applications, the arbiter of its on-chip communication
subsystem needs to support multiple QoS criteria while
providing a hard real-time guarantee. To fulfill both
objectives, the arbitration algorithm must dynamically
switch between NonReal-Time (NRT) and Real-Time (RT)
modes such that use of the RT mode is minimized to best
accommodate the overall QoS criteria. In this article,
we define a model for this problem, and propose optimal
solutions to its associated problems with static and
dynamic warning-zone-length assignment. Compared with
previous works, the proposed approach enables a bus
arbiter to use much less RT mode in providing a
Real-Time (RT) guarantee and, therefore, gives the
arbiter more opportunity to employ non-RT modes to
achieve better overall QoS. Experimental results show
that the proposed approach reduces RT mode usage by as
much as 37.1\%. Moreover, that reduction in RT mode
usage helps cut the execution time by 27.0\% when
applying our approach to an industrial DRAM controller.
Another case study on an AMBA-compliant
ultra-high-resolution H.264 decoder IP shows that the
proposed approach reduces RT mode usage by 26.4\%,
which leads to an average reduction of 10.4\% in
decoding time. Finally, when implementing a 16 master
arbiter, it costs only 6.9K and 9.5K gates of overhead
using the proposed static and dynamic approach,
respectively. Therefore, the proposed approach is
suitable for real-time SoC applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "35",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "on-chip communication; QoS; real-time scheduling;
System-on-Chip",
}
@Article{Schlich:2010:MCS,
author = "Bastian Schlich",
title = "Model checking of software for microcontrollers",
journal = j-TECS,
volume = "9",
number = "4",
pages = "36:1--36:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721702",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The interest of industries in model checking software
for microcontrollers is increasing. However, there are
currently no appropriate tools that can be applied by
embedded systems developers for the direct verification
of software for microcontrollers without the need for
manual modeling. This article describes a new approach
to model checking software for microcontrollers, which
verifies the assembly code of the software. The state
space is built using a tailored simulator, which
abstracts from time, handles nondeterminism, and
creates an overapproximation of the behavior shown by
the real microcontroller. Within this simulator, we
apply abstraction techniques to tackle the
state-explosion problem. In our approach, we combine
different formal methods, namely, model checking,
static analysis, and abstract interpretation. We also
combine explicit and symbolic model checking
techniques. This article presents a case study using
several programs to demonstrate the efficiency of the
applied abstraction techniques and to show the
applicability of this approach.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "36",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Assembly code; formal verification; microcontroller;
model checking; static analysis",
}
@Article{Bombieri:2010:SND,
author = "Nicola Bombieri and Franco Fummi and Davide Quaglia",
title = "System\slash network design-space exploration based on
{TLM} for networked embedded systems",
journal = j-TECS,
volume = "9",
number = "4",
pages = "37:1--37:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721703",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a methodology for the design of
Networked Embedded Systems (NESs), which extends
Transaction Level Modeling (TLM) to perform
system/network design-space exploration. As a result, a
new design dimension is added to the traditional TLM
refinement process to represent network configuration
alternatives. Each network configuration can be used to
drive both architecture exploration and system
validation after each refinement step. A system/network
simulation taxonomy is investigated aiming at precisely
identifying the role of cosimulation in system/network
design-space exploration. Furthermore, a general
criterion to map functionalities to system and network
models is presented. As a case study, the proposed
methodology is applied to the design of a Voice-over-IP
client.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "37",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "networked embedded systems; Transaction level
modeling",
}
@Article{Lin:2010:SSA,
author = "Chang Hong Lin and Marilyn Wolf and Xenefon Koutsoukos
and Sandeep Neema and Janos Sztipanovits",
title = "System and software architectures of distributed smart
cameras",
journal = j-TECS,
volume = "9",
number = "4",
pages = "38:1--38:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721704",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we describe a distributed,
peer-to-peer gesture recognition system along with a
software architecture modeling technique and authority
control protocol for ubiquitous cameras. This system
performs gesture recognition in real time by combining
imagery from multiple cameras without using a central
server. We propose a system architecture that uses a
network of inexpensive cameras to perform in-network
video processing. A methodology for transforming
well-designed single-node algorithm to distributed
system is also proposed. Applications for ubiquitous
cameras can be modeled as the composition of a
finite-state machine of the system, functional
services, and middleware. A service-oriented software
architecture is proposed to dynamically reconfigure
services when system state changes. By exchanging data
and control messages between neighboring sensors, each
node can maintain broader view of the environment with
integrated video-processing results. Our prototype
system is built on Windows machines, and uses standard
video cameras as sensors and local network as a
communication channel.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "38",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Distributed cameras; smart camera; software
architecture",
}
@Article{Zhou:2010:MMS,
author = "Gang Zhou and Yafeng Wu and Ting Yan and Tian He and
Chengdu Huang and John A. Stankovic and Tarek F.
Abdelzaher",
title = "A multifrequency {MAC} specially designed for wireless
sensor network applications",
journal = j-TECS,
volume = "9",
number = "4",
pages = "39:1--39:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721705",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Multifrequency media access control has been well
understood in general wireless ad hoc networks, while
in wireless sensor networks, researchers still focus on
single frequency solutions. In wireless sensor
networks, each device is typically equipped with a
single radio transceiver and applications adopt much
smaller packet sizes compared to those in general
wireless ad hoc networks. Hence, the multifrequency MAC
protocols proposed for general wireless ad hoc networks
are not suitable for wireless sensor network
applications, which we further demonstrate through our
simulation experiments. In this article, we propose
MMSN, which takes advantage of multifrequency
availability while, at the same time, takes into
consideration the restrictions of wireless sensor
networks. In MMSN, four frequency assignment options
are provided to meet different application
requirements. A scalable media access is designed with
efficient broadcast support. Also, an optimal
nonuniform back-off algorithm is derived and its
lightweight approximation is implemented in MMSN, which
significantly reduces congestion in the time
synchronized media access design. Through extensive
experiments, MMSN exhibits the prominent ability to
utilize parallel transmissions among neighboring nodes.
When multiple physical frequencies are available, it
also achieves increased energy efficiency,
demonstrating the ability to work against radio
interference and the tolerance to a wide range of
measured time synchronization errors.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "39",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "media access control; multi-channel; radio
interference; time synchronization; Wireless sensor
networks",
}
@Article{Jung:2010:SFS,
author = "Dawoon Jung and Jeong-Uk Kang and Heeseung Jo and
Jin-Soo Kim and Joonwon Lee",
title = "Superblock {FTL}: a superblock-based {Flash
Translation Layer} with a hybrid address translation
scheme",
journal = j-TECS,
volume = "9",
number = "4",
pages = "40:1--40:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721706",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In NAND flash-based storage systems, an intermediate
software layer called a Flash Translation Layer (FTL)
is usually employed to hide the erase-before-write
characteristics of NAND flash memory. We propose a
novel superblock-based FTL scheme, which combines a set
of adjacent logical blocks into a superblock. In the
proposed Superblock FTL, superblocks are mapped at
coarse granularity, while pages inside the superblock
are mapped freely at fine granularity to any location
in several physical blocks. To reduce extra storage and
flash memory operations, the fine-grain mapping
information is stored in the spare area of NAND flash
memory. This hybrid address translation scheme has the
flexibility provided by fine-grain address translation,
while reducing the memory overhead to the level of
coarse-grain address translation. Our experimental
results show that the proposed FTL scheme significantly
outperforms previous block-mapped FTL schemes with
roughly the same memory overhead.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "40",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "FTL; hybrid address translation; NAND flash memory;
storage system",
}
@Article{Klues:2010:LLD,
author = "Kevin Klues and Guoliang Xing and Chenyang Lu",
title = "Link layer driver architecture for unified radio power
management in wireless sensor networks",
journal = j-TECS,
volume = "9",
number = "4",
pages = "41:1--41:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721707",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wireless Sensor Networks (WSNs) represent a new
generation of networked embedded systems that must
achieve long lifetimes on scarce amounts of energy.
Since radio communication accounts for the primary
source of power drain in these networks, a large number
of different radio power management protocols have been
proposed. However, the lack of operating system support
for flexibly integrating them with a diverse set of
applications and network platforms has made them
difficult to use. This article focuses on providing
link layer support toward realizing a unified power
management architecture (UPMA) for WSNs. In contrast to
existing monolithic approaches, we provide (i) a set of
standard interfaces that separate link layer power
management protocols from common MAC level
functionality, (ii) an architectural framework that
allows applications to easily swap out different
power-management protocols depending on its needs, and
(iii) a mechanism for coordinating multiple
applications with different power management
requirements. We have implemented our approach on both
the Mica2 and Telosb radio drivers in TinyOS-2.0, the
second generation of the de facto standard operating
system for WSNs. Microbenchmark results show that our
approach can coordinate the power-management
requirements of multiple applications in a platform
independent fashion while incurring negligible
overhead.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "41",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "architecture; framework; radio power management;
Wireless sensor networks",
}
@Article{Lee:2010:IHM,
author = "Jupyung Lee and Kyu Ho Park",
title = "Interrupt handler migration and direct interrupt
scheduling for rapid scheduling of interrupt-driven
tasks",
journal = j-TECS,
volume = "9",
number = "4",
pages = "42:1--42:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721708",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we propose two techniques that aim to
minimize the scheduling latency of high-priority
interrupt-driven tasks, named the Interrupt Handler
Migration (IHM) and Direct Interrupt Scheduling (DIS).
The IHM allows the interrupt handler to be migrated
from the interrupt handler thread to the corresponding
target process so that additional context switch can be
avoided and the cache hit ratio with respect to the
data generated by the interrupt handler can be
improved. In addition, the DIS allows the shortest path
reserved for urgent interrupt-process pairs to be laid
between the interrupt arrival and target process by
dividing a series of interrupt-driven operations into
nondeferrable and deferrable operations. Both the IHM
and DIS can be combined in a natural way and can
operate concurrently. These techniques can be applied
to all kinds of interrupt handlers with no modification
to them. The proposed techniques not only reduce the
scheduling latency, but also resolve the
interrupt-driven priority inversion problem.\par
We implemented a prototype in the Linux 2.6.19 kernel
after adding real-time patches. Experimental results
show that the scheduling latency is significantly
reduced by up to 84.2\% when both techniques are
applied together. When the Linux OS runs on an
ARM-based embedded CPU running at 200MHz, the
scheduling latency can become as low as 30$ \mu $ s,
which is much closer to the hardware-specific
limitations. By lowering the scheduling latency, the
limited CPU cycles can be consumed more for user-level
processes and less for system-level tasks, such as
interrupt handling and scheduling.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "42",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "interrupt handling; latency; Linux; Real-time
operating system; responsiveness; scheduling",
}
@Article{Tan:2010:MSE,
author = "Chiu C. Tan and Bo Sheng and Haodong Wang and Qun Li",
title = "{Microsearch}: a search engine for embedded devices
used in pervasive computing",
journal = j-TECS,
volume = "9",
number = "4",
pages = "43:1--43:??",
month = mar,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1721695.1721709",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Apr 2 17:12:34 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we present Microsearch, a search
system suitable for embedded devices used in ubiquitous
computing environments. Akin to a desktop search
engine, Microsearch indexes the information inside a
small device, and accurately resolves a user's queries.
Given the limited hardware, conventional search engine
design and algorithms cannot be used. We adopt
Information Retrieval (IR) techniques for query
resolution, and proposed a new space-efficient top-$k$
query resolution algorithm. A theoretical model of
Microsearch is given to better understand the
trade-offs in design parameters. Evaluation is done via
actual implementation on off-the-shelf hardware.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "43",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Embedded search engine; information retrieval;
pervasive computing",
}
@Article{Higuera-Toledano:2010:ISI,
author = "M. Teresa Higuera-Toledano and Doug Locke and Angelo
Corsaro",
title = "Introduction to special issue on {Java} technologies
for real-time and embedded systems",
journal = j-TECS,
volume = "10",
number = "1",
pages = "1:1--1:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814540",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{DosSantos:2010:MPB,
author = "Osmar Marchi {Dos Santos} and Andy Wellings",
title = "Measuring and policing blocking times in real-time
systems",
journal = j-TECS,
volume = "10",
number = "1",
pages = "2:1--2:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814541",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In real-time systems, the execution-time overrun of a
thread may lead to a deadline being missed by the
thread or even others threads in the system. From a
fault tolerance perspective, both execution time
overruns and deadline misses can be considered timing
errors that could potentially cause a failure in the
system's ability to deliver its services in a timely
manner. In this context, the ideal is to detect the
error in the system as soon as possible, so that the
propagation of the error can be limited and error
recovery strategies can take place with more accurate
information. The run-time support mechanism usually
deployed for monitoring the timing requirements of
real-time systems is based on deadline monitoring, that
is, the system calls specific application code whenever
a deadline is violated. Recognizing that deadline
monitoring may not be enough for providing an adequate
level of fault tolerance for timing errors, major
real-time programming standards, like Ada, POSIX and
the Real-Time Specification for Java (RTSJ), have
proposed different mechanisms for monitoring the
execution time of threads. Nevertheless, in order to
provide a complete fault tolerance approach for timing
errors, the potential blocking time of threads also has
to be monitored. In this article, we propose mechanisms
for measuring and policing the blocking time of threads
in the context of both {\em basic priority
inheritance\/} and {\em priority ceiling protocols}.
The notion of {\em blocking-time clocks and timers\/}
for the POSIX standard is proposed, implemented and
evaluated in the open-source real-time operating system
MaRTE OS. Also, a {\em blocking time monitoring
model\/} for measuring and policing blocking times in
the RTSJ framework is specified. This model is
implemented and evaluated in the (RTSJ-compliant)
open-source middleware jRate, running on top of MaRTE
OS.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "error detection; POSIX standard; Real-time
specification for Java; timing errors",
}
@Article{Zerzelidis:2010:FFS,
author = "Alexandros Zerzelidis and Andy Wellings",
title = "A framework for flexible scheduling in the {RTSJ}",
journal = j-TECS,
volume = "10",
number = "1",
pages = "3:1--3:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814542",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a viable solution to introducing
flexible scheduling in the Real-Time specification for
Java (RTSJ), in the form of a flexible scheduling
framework. The framework allows the concurrent use of
multiple application-defined scheduling policies, each
scheduling a subset of the total set of threads.
Moreover, all threads, regardless of the policy under
which they are scheduled, are permitted to share common
resources. Thus, the framework can accommodate a
variety of interworking applications (soft, firm, and
hard) running under the RTSJ. The proposed approach is
a two-level scheduling framework, where the first level
is the RTSJ priority scheduler and the second level is
under application control. This article describes the
framework's protocol, examines the different types of
scheduling policies that can be supported, and
evaluates the proposed framework by measuring its
execution cost. A description of an application-defined
Earliest-Deadline-First (EDF) scheduler illustrates how
the interface can be used. Minimum backward-compatible
changes to the RTSJ specification are discussed to
motivate the required interface. The only assumptions
made about the underlying real-time operating system is
that it supports preemptive priority-based dispatching
of threads and that changes to priorities have
immediate effect.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "flexible scheduling; RTSJ; Scheduling framework",
}
@Article{Spring:2010:RAI,
author = "Jesper Honig Spring and Filip Pizlo and Jean Privat
and Rachid Guerraoui and Jan Vitek",
title = "{Reflexes}: {Abstractions} for integrating highly
responsive tasks into {Java} applications",
journal = j-TECS,
volume = "10",
number = "1",
pages = "4:1--4:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814543",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/csharp.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Achieving submillisecond response times in a managed
language environment such as Java or C\# requires
overcoming significant challenges. In this article, we
propose Reflexes, a programming model and runtime
system infrastructure that lets developers seamlessly
mix highly responsive tasks and timing-oblivious Java
applications. Thus enabling gradual addition of
real-time features, to a non-real-time application
without having to resort to recoding the real-time
parts in a different language such as C or Ada.
Experiments with the Reflex prototype implementation
show that it is possible to run a real-time task with a
period of 45$ \mu $s with an accuracy of 99.996\%
(only 0.001\% worse than the corresponding C
implementation) in the presence of garbage collection
and heavy load ordinary Java threads.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Java virtual machine; memory management; Real-time
systems",
}
@Article{Kim:2010:EAE,
author = "Minseong Kim and Andy Wellings",
title = "Efficient asynchronous event handling in the real-time
specification for {Java}",
journal = j-TECS,
volume = "10",
number = "1",
pages = "5:1--5:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814544",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The Real-Time Specification for Java (RTSJ) is
becoming mature. It has been implemented, formed the
basis for research and used in serious applications.
Some strengths and weaknesses are emerging. One of the
areas that requires further elaboration is asynchronous
event handling (AEH). The primary goal for handlers in
the RTSJ is to have a lightweight concurrency
mechanism. Some implementation will, however, simply
map a handler to a real-time thread and this results in
undermining the original motivations and introduces
performance penalties. However it is generally unclear
how to map handlers to real-time threads effectively.
Also the support for nonblocking handlers in the RTSJ
is criticized as lacking in configurability as
implementations are unable to take advantage of them.
This article, therefore, examines the AEH techniques
used in some popular RTSJ implementations and proposes
two efficient AEH models for the RTSJ. We then define
formal models of the RTSJ AEH implementations using the
automata formalism provided by the UPPAAL model
checking tool. Using the automata models, their
properties are explored and verified. In the proposed
models, blocking and nonblocking handlers are serviced
by different algorithms. In this way, it is possible to
assign a real-time thread to a handler at the right
time in the right place while maintaining the fewest
possible threads overall and to give a certain level of
configurability to AEH. We also have implemented the
proposed models on an existing RTSJ implementation,
jRate and executed a set of performance tests that
measure their respective dispatch and multiple-handler
completion latencies. The results from the tests and
the verifications indicate that the proposed models
require fewer threads on average with better
performance than other approaches.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "asynchronous event handling; blocking handler;
multiple-server switching phenomenon; nonblocking
handler; RTSJ",
}
@Article{Schoeberl:2010:NRT,
author = "Martin Schoeberl and Wolfgang Puffitsch",
title = "Nonblocking real-time garbage collection",
journal = j-TECS,
volume = "10",
number = "1",
pages = "6:1--6:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814545",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A real-time garbage collector has to fulfill two basic
properties: ensure that programs with bounded
allocation rates do not run out of memory and provide
short blocking times. Even for incremental garbage
collectors, two major sources of blocking exist,
namely, root scanning and heap compaction. Finding root
nodes of an object graph is an integral part of tracing
garbage collectors and cannot be circumvented. Heap
compaction is necessary to avoid probably unbounded
heap fragmentation, which in turn would lead to
unacceptably high memory consumption. In this article,
we propose solutions to both issues.\par
Thread stacks are local to a thread, and root scanning,
therefore, only needs to be atomic with respect to the
thread whose stack is scanned. This fact can be
utilized by either blocking only the thread whose stack
is scanned, or by delegating the responsibility for
root scanning to the application threads. The latter
solution eliminates blocking due to root scanning
completely. The impact of this solution on the
execution time of a garbage collector is shown for two
different variants of such a root scanning
algorithm.\par
During heap compaction, objects are copied. Copying is
usually performed atomically to avoid interference with
application threads, which could render the state of an
object inconsistent. Copying of large objects and
especially large arrays introduces long blocking times
that are unacceptable for real-time systems. In this
article, an interruptible copy unit is presented that
implements nonblocking object copy. The unit can be
interrupted after a single word move.\par
We evaluate a real-time garbage collector that uses the
proposed techniques on a Java processor. With this
garbage collector, it is possible to run high-priority
hard real-time tasks at 10 kHz parallel to the garbage
collection task on a 100 MHz system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Garbage collection; nonblocking copying; real-time;
root scanning",
}
@Article{Basanta-Val:2010:NHR,
author = "Pablo Basanta-Val and Marisol Garc{\'\i}a-Valls and
Iria Est{\'e}vez-Ayres",
title = "{No-Heap Remote Objects} for distributed real-time
{Java}",
journal = j-TECS,
volume = "10",
number = "1",
pages = "7:1--7:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814546",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents an approach to providing
real-time support for Java's Remote Method Invocation
(RMI) and its integration with the RTSJ memory model in
order to leave out garbage collection. A new construct
for remote objects, called {\em No-heap Remote
object\/} ({\em NhRo\/}), is introduced. The use of a
NhRo guarantees that memory required to perform a
remote invocation (at the server side) does not use
heap memory. Thus, the aim is to avoid garbage
collection in the remote invocation process, improving
predictability and memory isolation of distributed
Java-based real-time applications. The article presents
the bare model and the main programming patterns that
are associated with the NhRo model. Sun RMI
implementation has been modified to integrate the NhRo
model in both static and dynamic environments.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "distributed real-time Java; DRTSJ; Real-time Java;
real-time remote objects; region-based memory
management; RTSJ",
}
@Article{Curley:2010:RDT,
author = "Edward Curley and Binoy Ravindran and Jonathan
Anderson and E. Douglas Jensen",
title = "Recovering from distributable thread failures in
distributed real-time {Java}",
journal = j-TECS,
volume = "10",
number = "1",
pages = "8:1--8:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814547",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We consider the problem of recovering from the
failures of distributable threads (``threads'') in
distributed real-time systems that operate under
runtime uncertainties including those on thread
execution times, thread arrivals, and node failure
occurrences. When a thread experiences a node failure,
the result is a broken thread having an orphan. Under a
termination model, the orphans must be detected and
aborted, and exceptions must be delivered to the
farthest, contiguous surviving thread segment for
resuming thread execution. Our application/scheduling
model includes the proposed distributable thread
programming model for the emerging Distributed
Real-Time Specification for Java (DRTSJ), together with
an exception-handler model. Threads are subject to
time/utility function (TUF) time constraints and an
utility accrual (UA) optimality criterion. A key
underpinning of the TUF/UA scheduling paradigm is the
notion of ``best-effort'' where higher importance
threads are always favored over lower importance ones,
irrespective of thread urgency as specified by their
time constraints. We present a thread scheduling
algorithm called HUA and a thread integrity protocol
called TPR. We show that HUA and TPR bound the orphan
cleanup and recovery time with bounded loss of the
best-effort property. Our implementation experience for
HUA/TPR in the Reference Implementation of the proposed
programming model for the DRTSJ demonstrates the
algorithm/protocol's effectiveness.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "distributable thread; Distributed; distributed
scheduling; Java; real-time; thread integrity",
}
@Article{Pitter:2010:RTJ,
author = "Christof Pitter and Martin Schoeberl",
title = "A real-time {Java} chip-multiprocessor",
journal = j-TECS,
volume = "10",
number = "1",
pages = "9:1--9:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814548",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Chip-multiprocessors are an emerging trend for
embedded systems. In this article, we introduce a
real-time Java multiprocessor called JopCMP. It is a
symmetric shared-memory multiprocessor, and consists of
up to eight Java Optimized Processor (JOP) cores, an
arbitration control device, and a shared memory. All
components are interconnected via a system on chip bus.
The arbiter synchronizes the access of multiple CPUs to
the shared main memory. In this article, three
different arbitration policies are presented,
evaluated, and compared with respect to their real-time
and average-case performance: a fixed priority, a
fair-based, and a time-sliced arbiter.\par
Tasks running on different CPUs of a
chip-multiprocessor (CMP) influence each others'
execution times when accessing a shared memory.
Therefore, the system needs an arbiter that is able to
limit the worst-case execution time of a task running
on a CPU, even though tasks executing simultaneously on
other CPUs access the main memory. Our research shows
that timing analysis is in fact possible for
homogeneous multiprocessor systems with a shared
memory. The timing analysis of tasks, executing on the
CMP using time-sliced memory arbitration, leads to
viable worst-case execution time bounds.\par
The time-sliced arbiter divides the memory access time
into equal time slots, one time slot for each CPU. This
memory arbitration scheme allows for a calculation of
upper bounds of Java application worst-case execution
times, depending on the number of CPUs, the time slot
size, and the memory access time. Examples of
worst-case execution time calculation are presented,
and the analyzed results of a real-world application
task are compared to measured execution time results.
Finally, we evaluate the tradeoffs when using a
time-predictable solution compared to using
average-case optimized chip-multiprocessors, applying
three different benchmarks. These experiments are
carried out by executing the programs on the CMP
prototype.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Java processor; multiprocessor; Real-time system;
shared memory; worst-case execution time",
}
@Article{Kaiser:2010:ISI,
author = "William Kaiser and Majid Sarrafzadeh",
title = "Introduction to special issue on wireless health",
journal = j-TECS,
volume = "10",
number = "1",
pages = "10:1--10:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814549",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ko:2010:MME,
author = "Jeonggil Ko and Jong Hyun Lim and Yin Chen and
Rv{\~a}zvan Musvaloiu-E and Andreas Terzis and Gerald
M. Masson and Tia Gao and Walt Destler and Leo Selavo
and Richard P. Dutton",
title = "{MEDiSN}: {Medical} emergency detection in sensor
networks",
journal = j-TECS,
volume = "10",
number = "1",
pages = "11:1--11:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814550",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Staff shortages and an increasingly aging population
are straining the ability of emergency departments to
provide high quality care. At the same time, there is a
growing concern about hospitals' ability to provide
effective care during disaster events. For these
reasons, tools that automate patient monitoring have
the potential to greatly improve efficiency and quality
of health care. Towards this goal, we have developed
{\em MEDiSN}, a wireless sensor network for monitoring
patients' physiological data in hospitals and during
disaster events. MEDiSN comprises {\em Physiological
Monitors\/} (PMs), which are custom-built, patient-worn
motes that sample, encrypt, and sign physiological data
and {\em Relay Points\/} (RPs) that self-organize into
a multi-hop wireless backbone for carrying
physiological data. Moreover, MEDiSN includes a
back-end server that persistently stores medical data
and presents them to authenticated GUI clients. The
combination of MEDiSN's two-tier architecture and
optimized rate control protocols allows it to address
the compound challenge of reliably delivering large
volumes of data while meeting the application's QoS
requirements. Results from extensive simulations,
testbed experiments, and multiple pilot hospital
deployments show that MEDiSN can scale from tens to at
least five hundred PMs, effectively protect application
packets from congestive and corruptive losses, and
deliver medically actionable data.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Medical sensor networks; wireless physiological
monitoring",
}
@Article{Coronato:2010:FSW,
author = "Antonio Coronato and Giuseppe {De Pietro}",
title = "Formal specification of wireless and pervasive
healthcare applications",
journal = j-TECS,
volume = "10",
number = "1",
pages = "12:1--12:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814551",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wireless and pervasive healthcare applications
typically present critical requirements from the point
of view of functional correctness, reliability,
availability, security, and safety. In contrast to the
case of classic safety critical applications, the
behavior of wireless and pervasive applications is
affected by the movements and location of users and
resources.\par
This article presents a methodology to formally express
requirements in safety critical wireless and pervasive
healthcare applications in order to achieve a higher
degree of dependability. In particular, it will be
shown how it is possible to formalize and constrict
mobility characteristics by combining, and in some
cases extending, several formal methods. The article
also describes a rigorous specification process.
Finally, it concludes with a case study of a real
safety critical pervasive healthcare application that
is going to be deployed in a city hospital.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "Formal specification; methodologies and tools;
wireless and pervasive healthcare applications",
}
@Article{Waluyo:2010:MMB,
author = "Agustinus Borgy Waluyo and Wee-Soon Yeoh and Isaac Pek
and Yihan Yong and Xiang Chen",
title = "{MobiSense}: {Mobile} body sensor network for
ambulatory monitoring",
journal = j-TECS,
volume = "10",
number = "1",
pages = "13:1--13:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814552",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article introduces MobiSense, a novel mobile
health monitoring system for ambulatory patients.
MobiSense resides in a mobile device, communicates with
a set of body sensor devices attached to the wearer,
and processes data from these sensors. MobiSense is
able to detect body postures such as lying, sitting,
and standing, and walking speed, by utilizing our
rule-based heuristic activity classification scheme
based on the extended Kalman (EK) Filtering algorithm.
Furthermore, the proposed system is capable of
controlling each of the sensor devices, and performing
resource reconfiguration and management schemes (sensor
sleep/wake-up mode). The architecture of MobiSense is
highlighted and discussed in depth. The system has been
implemented, and its prototype is showcased. We have
also carried out rigorous performance measurements of
the system including real-time and query latency as
well as the power consumption of the sensor nodes. The
accuracy of our activity classifier scheme has been
evaluated by involving several human subjects, and we
found promising results.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "ambulatory patient monitoring; pervasive healthcare;
wireless body sensor network; Wireless health system",
}
@Article{Quwaider:2010:TPA,
author = "Muhannad Quwaider and Jayanthi Rao and Subir Biswas",
title = "Transmission power assignment with postural position
inference for on-body wireless communication links",
journal = j-TECS,
volume = "10",
number = "1",
pages = "14:1--14:??",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1814539.1814553",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Aug 30 15:29:45 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a novel transmission power
assignment mechanism for on-body wireless links formed
between severely energy-constrained wearable and
implanted sensors. The key idea is to develop a
measurement-based framework in which the postural
position as it pertains to a given wireless link is
first inferred based on the measured RF signal strength
and packet drops. Then optimal power assignment is done
by fitting those measurement results into a model
describing the relationship between the assigned power
and the resulting signal strength. A closed loop power
control mechanism is then added for iterative
convergence to the optimal power level as a response to
both intra-and-inter posture body movements. This
provides a practical paradigm for on-body power
assignment, which cannot leverage the existing
mechanisms in the literature that rely on localization,
which is not realistic for on-body sensors. Extensive
experimental results are provided to demonstrate the
model building and algorithm performance on a prototype
body area network. The proposed mechanism has also been
compared with a number of other closed loop mechanisms
and an experimental benchmark.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
keywords = "adaptive power control; Body area network; link
quality measurement; radio link quality",
}
@Article{Basten:2010:EMD,
author = "Twan Basten and Rolf Ernst",
title = "Editorial: {Model-driven} embedded-system design",
journal = j-TECS,
volume = "10",
number = "2",
pages = "15:1--15:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880051",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Geilen:2010:SDS,
author = "Marc Geilen",
title = "Synchronous dataflow scenarios",
journal = j-TECS,
volume = "10",
number = "2",
pages = "16:1--16:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880052",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The Synchronous Dataflow (SDF) model of computation by
Lee and Messerschmitt has become popular for modeling
concurrent applications on a multiprocessor platform.
It is used to obtain a guaranteed, predictable
performance. The model, on the other hand, is quite
restrictive in its expressivity, making it less
applicable to many modern, more dynamic applications. A
common technique to deal with dynamic behavior is to
consider different scenarios in separation. This
analysis is, however, currently limited mainly to
sequential applications. In this article, we present a
new analysis approach that allows analysis of
synchronous dataflow models across different scenarios
of operation. The dataflow graphs corresponding to the
different scenarios can be completely different.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wiggers:2010:BCC,
author = "Maarten H. Wiggers and Marco J. G. Bekooij and Gerard
J. M. Smit",
title = "Buffer capacity computation for throughput-constrained
modal task graphs",
journal = j-TECS,
volume = "10",
number = "2",
pages = "17:1--17:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880053",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Increasingly, stream-processing applications include
complex control structures to better adapt to changing
conditions in their environment. This adaptivity often
results in task execution rates that are dependent on
the processed stream. Current approaches to compute
buffer capacities that are sufficient to satisfy a
throughput constraint have limited applicability in
case of data-dependent task execution rates. In this
article, we present a dataflow model that allows tasks
to have loops with an unbounded number of iterations.
For instances of this dataflow model, we present
efficient checks on their validity. Furthermore, we
present an efficient algorithm to compute buffer
capacities that are sufficient to satisfy a throughput
constraint.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Falk:2010:ASA,
author = "Joachim Falk and Christian Zebelein and Joachim
Keinert and Christian Haubelt and Juergen Teich and
Shuvra S. Bhattacharyya",
title = "Analysis of {SystemC} actor networks for efficient
synthesis",
journal = j-TECS,
volume = "10",
number = "2",
pages = "18:1--18:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880054",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Applications in the signal processing domain are often
modeled by dataflow graphs. Due to heterogeneous
complexity requirements, these graphs contain both
dynamic and static dataflow actors. In previous work,
we presented a generalized clustering approach for
these heterogeneous dataflow graphs in the presence of
unbounded buffers. This clustering approach allows the
application of static scheduling methodologies for
static parts of an application during embedded software
generation for multiprocessor systems. It
systematically exploits the predictability and
efficiency of the static dataflow model to obtain
latency and throughput improvements. In this article,
we present a generalization of this clustering
technique to dataflow graphs with bounded buffers,
therefore enabling synthesis for embedded systems
without dynamic memory allocation.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Razavi:2010:SAB,
author = "Niloofar Razavi and Razieh Behjati and Hamideh Sabouri
and Ehsan Khamespanah and Amin Shali and Marjan
Sirjani",
title = "{Sysfier}: {Actor-based} formal verification of
{SystemC}",
journal = j-TECS,
volume = "10",
number = "2",
pages = "19:1--19:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880055",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "SystemC is a system-level modeling language that can
be used effectively for hardware/software co-design.
Since a major goal of SystemC is to enable verification
at higher levels of abstraction, the tendency is now
directing to introducing formal verification approaches
for SystemC. In this article, we propose an approach
for formal verification of SystemC designs, and provide
the semantics of SystemC using Labeled Transition
Systems (LTS) for this purpose. An actor-based
language, Rebeca, is used as an intermediate language.
SystemC designs are mapped to Rebeca models and then
Rebeca verification toolset is used to verify LTL and
CTL properties. To tackle the state-space explosion,
Rebeca model checkers offer some reduction policies
that make them appropriate for SystemC verification.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Adler:2010:CBM,
author = "Rasmus Adler and Ina Schaefer and Mario Trapp and Arnd
Poetzsch-Heffter",
title = "Component-based modeling and verification of dynamic
adaptation in safety-critical embedded systems",
journal = j-TECS,
volume = "10",
number = "2",
pages = "20:1--20:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880056",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Adaptation is increasingly used in the development of
safety-critical embedded systems, in particular to
reduce hardware needs and to increase availability.
However, composing a system from many reconfigurable
components can lead to a huge number of possible system
configurations, inducing a complexity that cannot be
handled during system design. To overcome this problem,
we propose a new component-based modeling and
verification method for adaptive embedded systems. The
component-based modeling approach facilitates
abstracting a composition of components to a
hierarchical component. In the hierarchical component,
the number of possible configurations of the
composition is reduced to a small number of
hierarchical configurations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Driver:2010:MES,
author = "Cormac Driver and Sean Reilly and {\'E}amonn Linehan
and Vinny Cahill and Siobh{\'a}n Clarke",
title = "Managing embedded systems complexity with
aspect-oriented model-driven engineering",
journal = j-TECS,
volume = "10",
number = "2",
pages = "21:1--21:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880057",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Model-driven engineering addresses issues of platform
heterogeneity and code quality through the use of
high-level system models and subsequent automatic
transformations. Adoption of the model-driven software
engineering paradigm for embedded systems necessitates
specification of appropriate models of often complex
systems. Modern embedded systems are typically composed
of multiple functional and nonfunctional concerns, with
the nonfunctional concerns (e.g., timing and
performance) typically affecting the design and
implementation of the functional concerns. The presence
of crosscutting concerns makes specification of
adequate platform-independent models a significant
challenge. Aspect-oriented software development is a
separation of concerns technique that decomposes
systems into distinct features with minimal overlap.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Schliecker:2010:RTP,
author = "Simon Schliecker and Rolf Ernst",
title = "Real-time performance analysis of multiprocessor
systems with shared memory",
journal = j-TECS,
volume = "10",
number = "2",
pages = "22:1--22:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880058",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Predicting timing behavior is key to reliable
real-time system design and verification, but becomes
increasingly difficult for current multiprocessor
systems on chip. The integration of formerly separate
functionality into a single multicore system introduces
new intercore timing dependencies resulting from the
common use of the now shared resources. This feedback
of system timing on local timing makes traditional
performance analysis approaches inappropriate. This
article presents a general methodology to model the
shared resource traffic and consider its effect on the
local task execution. The aggregate busy time captures
the timing of multiple accesses to a shared memory far
better than the traditional models that focus on the
timing of individual events.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Seo:2010:DAS,
author = "Euiseong Seo and Sangwon Kim and Seonyeong Park and
Joonwon Lee",
title = "Dynamic alteration schemes of real-time schedules for
{I/O} device energy efficiency",
journal = j-TECS,
volume = "10",
number = "2",
pages = "23:1--23:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880059",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many I/O devices provide multiple power states known
as the dynamic power management (DPM) feature. However,
activating from sleep state requires significant
transition time and this obstructs utilizing DPM in
nonpreemptive real-time systems. This article suggests
nonpreemptive real-time task scheduling schemes
maximizing the effectiveness of the I/O device DPM
support. First, we introduce a runtime schedulability
check algorithm for nonpreemptive real-time systems
that can check whether a modification from a valid
schedule is still valid. By using this, we suggest
three heuristic algorithms. The first algorithm
reorders the execution sequence of tasks according to
the similarity of their required device sets.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cabodi:2010:BSF,
author = "Gianpiero Cabodi and Marco Murciano and Massimo
Violante",
title = "Boosting software fault injection for dependability
analysis of real-time embedded applications",
journal = j-TECS,
volume = "10",
number = "2",
pages = "24:1--24:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880060",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The design of complex embedded systems deployed in
safety-critical or mission-critical applications
mandates the availability of methods to validate the
system dependability across the whole design flow. In
this article we introduce a fault injection approach,
based on loadable kernel modules and running under the
Linux operating system, which can be adopted as soon as
a running prototype of the systems is available.
Moreover, for the purpose of decoupling dependability
analysis from hardware availability, we also propose
the adoption of hardware virtualization.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mohan:2010:PTA,
author = "Sibin Mohan and Frank Mueller and Michael Root and
William Hawkins and Christopher Healy and David Whalley
and Emilio Vivancos",
title = "Parametric timing analysis and its application to
dynamic voltage scaling",
journal = j-TECS,
volume = "10",
number = "2",
pages = "25:1--25:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880061",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded systems with real-time constraints depend on
a priori knowledge of worst-case execution times
(WCETs) to determine if tasks meet deadlines. Static
timing analysis derives bounds on WCETs but requires
statically known loop bounds. This work removes the
constraint on known loop bounds through parametric
analysis expressing WCETs as functions. Tighter WCETs
are dynamically discovered to exploit slack by dynamic
voltage scaling (DVS) saving 60\% to 82\% energy over
DVS-oblivious techniques and showing savings close to
more costly dynamic-priority DVS algorithms.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhu:2010:RAD,
author = "Dakai Zhu",
title = "Reliability-aware dynamic energy management in
dependable embedded real-time systems",
journal = j-TECS,
volume = "10",
number = "2",
pages = "26:1--26:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880062",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Recent studies show that voltage scaling, which is an
efficient energy management technique, has a direct and
negative effect on system reliability because of the
increased rate of transient faults (e.g., those induced
by cosmic particles). In this article, we propose
energy management schemes that explicitly take system
reliability into consideration. The proposed
reliability-aware energy management schemes dynamically
schedule recoveries for tasks to be scaled down to
recuperate the reliability loss due to energy
management. Based on the amount of available slack, the
application size, and the fault rate changes, we
analyze when it is profitable to reclaim the slack for
energy savings without sacrificing system
reliability.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ramaprasad:2010:TBF,
author = "Harini Ramaprasad and Frank Mueller",
title = "Tightening the bounds on feasible preemptions",
journal = j-TECS,
volume = "10",
number = "2",
pages = "27:1--27:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880063",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Data caches are an increasingly important
architectural feature in most modern computer systems.
They help bridge the gap between processor speeds and
memory access times. One inherent difficulty of using
data caches in a real-time system is the
unpredictability of memory accesses, which makes it
difficult to calculate worst-case execution times
(WCETs) of real-time tasks. While cache analysis for
single real-time tasks has been the focus of much
research in the past, bounding the preemption delay in
a multitask preemptive environment is a challenging
problem, particularly for data caches. This article
makes multiple contributions in the context of
independent, periodic tasks with deadlines less than or
equal to their periods executing on a single
processor.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Li:2010:SMA,
author = "Lian Li and Jingling Xue and Jens Knoop",
title = "Scratchpad memory allocation for data aggregates via
interval coloring in superperfect graphs",
journal = j-TECS,
volume = "10",
number = "2",
pages = "28:1--28:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880064",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Existing methods place data or code in scratchpad
memory (SPM) by relying on heuristics or resorting to
integer programming or mapping it to a graph-coloring
problem. In this article, the SPM allocation problem
for arrays is formulated as an interval coloring
problem. The key observation is that in many embedded C
programs, two arrays can be modeled such that either
their live ranges do not interfere or one contains the
other (with good accuracy). As a result, array
interference graphs often form a special class of
superperfect graphs (known as comparability graphs),
and their optimal interval colorings become efficiently
solvable. This insight has led to the development of an
SPM allocation algorithm that places arrays in an
interference graph in SPM by examining its maximal
cliques.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Singh:2010:CPD,
author = "Montek Singh and Steven M. Nowick",
title = "Call for papers: {Deadline: March 15, 2011}",
journal = j-TECS,
volume = "10",
number = "2",
pages = "29:1--29:??",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1145/1880050.1880065",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Jan 10 09:44:12 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{West:2011:ASS,
author = "Richard West and Gabriel Parmer",
title = "Application-specific service technologies for
commodity operating systems in real-time environments",
journal = j-TECS,
volume = "10",
number = "3",
pages = "30:1--30:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952523",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In order to eliminate the costs of proprietary systems
and special purpose hardware, many real-time and
embedded computing platforms are being built on
commodity operating systems and generic hardware.
Unfortunately, many such systems are ill-suited to the
low-latency and predictable timing requirements of
real-time applications. This article, therefore,
focuses on application-specific service technologies
for low-cost commodity operating systems and hardware,
so that real-time service guarantees can be met. We
describe contrasting methods to deploy first-class
services on commodity systems that are dispatched with
low latency and execute asynchronously according to
bounds on CPU, memory, and I/O device usage.
Specifically, we present a ``user-level sandboxing''
(ULS) mechanism that relies on hardware protection to
isolate application-specific services from the core
kernel.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Liu:2011:NBF,
author = "Xue Liu and Tarek Abdelzaher",
title = "Nonutilization bounds and feasible regions for
arbitrary fixed-priority policies",
journal = j-TECS,
volume = "10",
number = "3",
pages = "31:1--31:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952524",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Prior research on schedulability bounds focused
primarily on bounding utilization/ as a means to meet
deadline constraints. Nontrivial bounds were found for
a handful of scheduling policies in which utilization
is directly related to the ability of the policy to
meet deadlines. Examples include rate-monotonic,
deadline-monotonic, and EDF scheduling. For most other
scheduling policies, however, utilization is not
correlated with schedulability. For example,
shortest-job-first can miss deadlines at an arbitrarily
low utilization. This raises the question of whether or
not some other nonutilization-based metric might be
more indicative of schedulability in those cases. This
article answers the above question positively by
extending the notion of schedulability bounds, in a
uniform manner, to arbitrary (fixed) priorities and
nonutilization metrics.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nair:2011:EHB,
author = "Ajay Nair and Karthik Shankar and Roman Lysecky",
title = "Efficient hardware-based nonintrusive dynamic
application profiling",
journal = j-TECS,
volume = "10",
number = "3",
pages = "32:1--32:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952525",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Application profiling---the process of monitoring an
application to determine the frequency of execution
within specific regions---is an essential step within
the design process for many software and hardware
systems. Profiling is often a critical step within
hardware/software partitioning utilized to determine
the critical kernels of an application. In this
article, we present an innovative, nonintrusive dynamic
application profiler (DAProf) capable of profiling an
executing application by monitoring the application's
short backward branches, function calls, and function
returns. The resulting profile information provides an
accurate characterization of the frequently executed
loops within the application providing a breakdown of
loop executions versus loop iterations per execution.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Aaraj:2011:FDE,
author = "Najwa Aaraj and Anand Raghunathan and Niraj K. Jha",
title = "A framework for defending embedded systems against
software attacks",
journal = j-TECS,
volume = "10",
number = "3",
pages = "33:1--33:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952526",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The incidence of malicious code and software
vulnerability exploits on embedded platforms is
constantly on the rise. Yet, little effort is being
devoted to combating such threats to embedded systems.
Moreover, adapting security approaches designed for
general-purpose systems generally fails because of the
limited processing capabilities of their embedded
counterparts. In this work, we evaluate a malware and
software vulnerability exploit defense framework for
embedded systems. The proposed framework extends our
prior work, which defines two isolated execution
environments: a testing environment, wherein an
untrusted application is first tested using dynamic
binary instrumentation (DBI), and a real environment,
wherein a program is monitored at runtime using an
extracted behavioral model, along with a continuous
learning process.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "33",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Berendsen:2011:FSA,
author = "Jasper Berendsen and Biniam Gebremichael and Frits W.
Vaandrager and Miaomiao Zhang",
title = "Formal specification and analysis of {Zeroconf} using
{Uppaal}",
journal = j-TECS,
volume = "10",
number = "3",
pages = "34:1--34:32",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952527",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The model checker Uppaal is used to formally model and
analyze parts of Zeroconf, a protocol for dynamic
configuration of IPv4 link-local addresses that has
been defined in RFC 3927 of the IETF. Our goal has been
to construct a model that (a) is easy to understand by
engineers, (b) comes as close as possible to the
informal text (for each transition in the model there
should be a corresponding piece of text in the RFC),
and (c) may serve as a basis for formal verification.
Our modeling efforts revealed several errors (or at
least ambiguities) in the RFC that no one else spotted
before.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "34",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ykman-Couvreur:2011:FMM,
author = "Ch. Ykman-Couvreur and V. Nollet and F. Catthoor and
H. Corporaal",
title = "Fast multidimension multichoice knapsack heuristic for
{MP-SoC} runtime management",
journal = j-TECS,
volume = "10",
number = "3",
pages = "35:1--35:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952528",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Since the application complexity is growing and
applications can be dynamically activated, the major
challenge for heterogeneous multiprocessor platforms is
to select at runtime an energy-efficient mapping of
these applications. Taking into account that many
different possible implementations per application can
be available, and that the selection must meet the
application deadlines under the available platform
resources, this runtime optimization problem can be
modeled as a Multidimension Multichoice Knapsack
Problem (MMKP), which is known to be NP-hard. Not only
algorithms for an optimal solution, but also
state-of-the-art heuristics for real-time systems are
still too slow for runtime management of multiprocessor
platforms.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "35",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ragel:2011:HHS,
author = "Roshan G. Ragel and Sri Parameswaran",
title = "A hybrid hardware--software technique to improve
reliability in embedded processors",
journal = j-TECS,
volume = "10",
number = "3",
pages = "36:1--36:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952529",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Numerous methods have been described in research
literature with methods to improve reliability of
processors by the use of control-flow checking. High
performance and code-size penalties cripple the
proposed software approaches, while hardware approaches
are not scalable and are thus rarely implemented in
real embedded systems. In this article, we show that by
including control-flow checking as an issue to be
considered when designing as embedded processor, we are
able to reduce overheads considerably and still provide
a scalable solution to this problem. The technique
described in this article includes architectural
improvements to the processor and binary rewriting of
the application.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "36",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huynh:2011:EAR,
author = "Johnny Huynh and Jos{\'e} Nelson Amaral and Paul
Berube and Sid-Ahmed-Ali Touati",
title = "Evaluating address register assignment and offset
assignment algorithms",
journal = j-TECS,
volume = "10",
number = "3",
pages = "37:1--37:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952530",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In digital signal processors (DSPs), variables are
accessed using $k$ address registers. The problem of
finding a memory layout, for a set of variables, that
minimizes the address-computation overhead is known as
the General Offset Assignment (GOA) problem. The most
common approach to this problem is to partition the set
of variables into $k$ partitions and to assign each
partition to an address register. Thus, effectively
decomposing the GOA problem into several Simple Offset
Assignment (SOA) problems. Many heuristic-based
algorithms are proposed in the literature to
approximate solutions to both the variable partitioning
and the SOA problems. However, the address-computation
overhead of the resulting memory layouts are not
accurately evaluated.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "37",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Diguet:2011:CLB,
author = "Jean-Philippe Diguet and Yvan Eustache and Guy
Gogniat",
title = "Closed-loop--based self-adaptive {Hardware\slash
Software-Embedded} systems: Design methodology and
smart {CAM} case study",
journal = j-TECS,
volume = "10",
number = "3",
pages = "38:1--38:??",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/1952522.1952531",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon May 2 10:07:27 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents our methodology for implementing
self-adaptivness within an OS-based and reconfigurable
embedded system according to objectives such as quality
of service, performance, or power consumption. We
detail our approach to separate application-specific
decisions and hardware\slash software-implementation
decisions at system level. The former are related to
the efficiency control of applications and based on the
knowledge of application engineers. The latter are
generic and address the choice between various hardware
and software implementations according to user
objectives. The decision management is implemented as
an adaptive closed-loop model. We describe how each
design step may be implemented and especially how we
solved the issue of stability.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "38",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gamatie:2011:MDD,
author = "Abdoulaye Gamati{\'e} and S{\'e}bastien {Le Beux} and
{\'E}ric Piel and Rabie {Ben Atitallah} and Anne Etien
and Philippe Marquet and Jean-Luc Dekeyser",
title = "A Model-Driven Design Framework for Massively Parallel
Embedded Systems",
journal = j-TECS,
volume = "10",
number = "4",
pages = "39:1--39:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043663",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Modern embedded systems integrate more and more
complex functionalities. At the same time, the
semiconductor technology advances enable to increase
the amount of hardware resources on a chip for the
execution. Massively parallel embedded systems
specifically deal with the optimized usage of such
hardware resources to efficiently execute their
functionalities. The design of these systems mainly
relies on the following challenging issues: first, how
to deal with the parallelism in order to increase the
performance; second, how to abstract their
implementation details in order to manage their
complexity; third, how to refine these abstract
representations in order to produce efficient
implementations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "39",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2011:DPT,
author = "Seungkyun Kim and Kiwon Kwon and Chihun Kim and
Choonki Jang and Jaejin Lee and Sang Lyul Min",
title = "Demand Paging Techniques for Flash Memory Using
Compiler Post-Pass Optimizations",
journal = j-TECS,
volume = "10",
number = "4",
pages = "40:1--40:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043664",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we propose an application-specific
demand paging mechanism for low-end embedded systems
that have flash memory as secondary storage. These
systems are not equipped with virtual memory. A small
memory space called an execution buffer is used to page
the code of an application. An application-specific
page manager manages the buffer. The page manager is
automatically generated by a compiler post-pass
optimizer and combined with the application image. The
post-pass optimizer analyzes the executable image and
transforms function call/return instructions into calls
to the page manager. As a result, each function in the
code can be loaded into the memory on demand at
runtime.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "40",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dini:2011:LLA,
author = "Gianluca Dini and Ida M. Savino",
title = "{LARK}: a Lightweight Authenticated {ReKeying} Scheme
for Clustered Wireless Sensor Networks",
journal = j-TECS,
volume = "10",
number = "4",
pages = "41:1--41:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043665",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Group communication has proven a powerful paradigm for
designing applications and services in Wireless Sensor
Networks (WSNs). Given the tight interaction between
WSNs and the physical world, a security infringement
may translate into a safety infringement. Therefore, in
order to fully exploit the group communication paradigm
we need to secure it. Traditionally, this requirement
has been formalized in terms of backward and forward
security and fulfilled by means of rekeying. In WSNs,
group rekeying becomes particularly a complex problem
because communication takes place over an easily
accessible wireless medium and because sensor nodes
have severe limitations in terms of computing, storage,
energy, and tamper-resistance capabilities for cost
reasons.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "41",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Schoeberl:2011:HAL,
author = "Martin Schoeberl and Stephan Korsholm and Tomas
Kalibera and Anders P. Ravn",
title = "A Hardware Abstraction Layer in {Java}",
journal = j-TECS,
volume = "10",
number = "4",
pages = "42:1--42:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043666",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded systems use specialized hardware devices to
interact with their environment, and since they have to
be dependable, it is attractive to use a modern,
type-safe programming language like Java to develop
programs for them. Standard Java, as a
platform-independent language, delegates access to
devices, direct memory access, and interrupt handling
to some underlying operating system or kernel, but in
the embedded systems domain resources are scarce and a
Java Virtual Machine (JVM) without an underlying
middleware is an attractive architecture. The
contribution of this article is a proposal for Java
packages with hardware objects and interrupt handlers
that interface to such a JVM.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "42",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gilroy:2011:RHA,
author = "Michael Gilroy and James Irvine and Robert Atkinson",
title = "{RAID 6} Hardware Acceleration",
journal = j-TECS,
volume = "10",
number = "4",
pages = "43:1--43:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043667",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Inexpensive, reliable hard disk storage is
increasingly required in both businesses and the home.
As disk capacities increase and multiple drives are
combined in one system the probability of multiple disk
failures increases. Through the adoption of RAID 6 the
capability to recover from up to two simultaneous disk
failures becomes available. In this article, we present
three different RAID 6 implementations each tailored to
support different target applications and optimized to
reduce overall hardware resource utilization. We
present an optimal Reed-Solomon-based RAID 6
implementation for arrays of four disks. We also
present the smallest in terms of hardware resource
utilization as well having the highest throughput RAID
6 hardware solution for disk arrays of up to 15
drives.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "43",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhuang:2011:CST,
author = "Xiaotong Zhuang and Santosh Pande",
title = "Compiler-Supported Thread Management for Multithreaded
Network Processors",
journal = j-TECS,
volume = "10",
number = "4",
pages = "44:1--44:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043668",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Traditionally, runtime management involving CPU
sharing, real-time scheduling, etc., is provided by the
runtime environment (typically an operating system)
using hardware support such as timers and interrupts.
However, due to stringent performance requirements on
network processors, neither OS nor hardware mechanisms
are typically feasible/available. Mapping packet
processing tasks on network processors involves complex
trade-offs to maximize parallelism and pipelining. Due
to an increase in the size of the code store and
complexity of application requirements, network
processors are being programmed with heterogeneous
threads that may execute code belonging to different
tasks on a given micro-engine. Also, most network
applications are streaming applications that are
typically processed in a pipelined fashion.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "44",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Stuart:2011:RRN,
author = "Matthias Bo Stuart and Mikkel Bystrup Stensgaard and
Jens Spars{\o}",
title = "The {ReNoC} Reconfigurable {Network-on-Chip}:
Architecture, Configuration Algorithms, and
Evaluation",
journal = j-TECS,
volume = "10",
number = "4",
pages = "45:1--45:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043669",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a reconfigurable network-on-chip
architecture called ReNoC, which is intended for use in
general-purpose multiprocessor system-on-chip
platforms, and which enables application-specific
logical NoC topologies to be configured, thus providing
both efficiency and flexibility. The article presents
three novel algorithms that synthesize an
application-specific NoC topology, map it onto the
physical ReNoC architecture, and create deadlock-free,
application-specific routing algorithms. We apply our
algorithms to a mixture of real and synthetic
applications and target three different physical
architectures. Compared to a conventional NoC, ReNoC
reduces power consumption by up to 58\% on average.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "45",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cucinotta:2011:RMA,
author = "Tommaso Cucinotta and Luca Abeni and Luigi Palopoli
and Giuseppe Lipari",
title = "A Robust Mechanism for Adaptive Scheduling of
Multimedia Applications",
journal = j-TECS,
volume = "10",
number = "4",
pages = "46:1--46:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043670",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We propose an adaptive scheduling technique to
schedule highly dynamic multimedia tasks on a CPU. We
use a combination of two techniques: the first one is a
feedback mechanism to track the resource requirements
of the tasks based on ``local'' observations. The
second one is a mechanism that operates with a
``global'' visibility, reclaiming unused bandwidth. The
combination proves very effective: resource reclaiming
increases the robustness of the feedback, while the
identification of the correct bandwidth made by the
feedback increases the effectiveness of the
reclamation. We offer both theoretical results and an
extensive experimental validation of the approach.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "46",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Touati:2011:ESR,
author = "Sid-Ahmed-Ali Touati and Frederic Brault and Karine
Deschinkel and Beno{\^\i}t Dupont de Dinechin",
title = "Efficient Spilling Reduction for Software Pipelined
Loops in Presence of Multiple Register Types in
Embedded {VLIW} Processors",
journal = j-TECS,
volume = "10",
number = "4",
pages = "47:1--47:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043671",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Integrating register allocation and software
pipelining of loops is an active research area. We
focus on techniques that precondition the dependence
graph before software pipelining in order to ensure
that no register spill instructions are inserted by the
register allocator in the software pipelined loop. If
spilling is not necessary for the input code,
preconditioning techniques insert dependence arcs so
that the maximum register pressure MAXLIVE achieved by
any loop schedule is below the number of available
registers, without hurting the initiation interval if
possible. When a solution exists, a spill-free software
pipeline is guaranteed to exist. Existing
preconditioning techniques consider one register type
(register class) at a time [Deschinkel and Touati
2008].",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "47",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhou:2011:ARA,
author = "Gang Zhou and Qiang Li and Jingyuan Li and Yafeng Wu
and Shan Lin and Jian Lu and Chieh-Yih Wan and Mark D.
Yarvis and John A. Stankovic",
title = "Adaptive and Radio-Agnostic {QoS} for Body Sensor
Networks",
journal = j-TECS,
volume = "10",
number = "4",
pages = "48:1--48:??",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1145/2043662.2043672",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Dec 19 15:49:06 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "As wireless devices and sensors are increasingly
deployed on people, researchers have begun to focus on
wireless body-area networks. Applications of wireless
body sensor networks include healthcare, entertainment,
and personal assistance, in which sensors collect
physiological and activity data from people and their
environments. In these body sensor networks, quality of
service is needed to provide reliable data
communication over prioritized data streams. This
article proposes BodyQoS, the first running QoS system
demonstrated on an emulated body sensor network.
BodyQoS adopts an asymmetric architecture, in which
most processing is done on a resource-rich aggregator,
minimizing the load on resource-limited sensor nodes.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "48",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wandeler:2012:UGS,
author = "Ernesto Wandeler and Alexander Maxiaguine and Lothar
Thiele",
title = "On the use of greedy shapers in real-time embedded
systems",
journal = j-TECS,
volume = "11",
number = "1",
pages = "1:1--1:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146418",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Traffic shaping is a well-known technique in the area
of networking and is proven to reduce global buffer
requirements and end-to-end delays in networked
systems. Due to these properties, shapers also play an
increasingly important role in the design of
multiprocessor embedded systems that exhibit a
considerable amount of on-chip traffic. Despite the
growing importance of traffic shapping in this area, no
methods exist for analyzing shapers in distributed
embedded systems and for incorporating them into a
system-level performance analysis. Until now it was not
possible to determine the effect of shapers on
end-to-end delay guarantees or buffer requirements in
such systems. In this work, we present a method for
analyzing greedy shapers, and we embed this analysis
method into a well-established modular performance
analysis framework for real-time embedded systems. The
presented approach enables system-level performance
analysis of complete systems with greedy shapers, and
we prove its applicability by analyzing three case
study systems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hamers:2012:EMS,
author = "Juan Hamers and Lieven Eeckhout",
title = "Exploiting media stream similarity for
energy-efficient decoding and resource prediction",
journal = j-TECS,
volume = "11",
number = "1",
pages = "2:1--2:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146419",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article introduces a novel approach to
energy-efficient media stream decoding that is based on
the notion of media stream similarity. The key idea is
that platform-independent scenarios with similar
decoding complexity can be identified within and across
media streams. A device that decodes a media stream
annotated with scenario information can then adjust its
processor clock frequency and voltage level based on
these scenarios for lower energy consumption. Our
evaluation, done using the H.264 AVC decoder and 12
reference video streams, shows an average energy
reduction of 44\% while missing less than 0.2\% of the
frame deadlines using scenario-driven video decoding.
An additional application of scenario-based media
stream annotation is to predict required resources
(compute power and energy) for consuming a given
service on a given device. Resource prediction is
extremely useful in a client-server setup in which the
client requests a media service from the server or
content provider. The content provider (in cooperation
with the client) can then determine what service
quality to deliver, given the client's available
resources. Scenario-aware resource prediction can
predict (compute power and energy) consumption with
errors less than 4\% (and an overall average 1.4\%
error).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhong:2012:WSN,
author = "Ziguo Zhong and Tian He",
title = "Wireless sensor node localization by multisequence
processing",
journal = j-TECS,
volume = "11",
number = "1",
pages = "3:1--3:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146420",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wireless Sensor Networks have been proposed for use in
many location-dependent applications. Most of these
need to identify the locations of sensor nodes, a
challenging task because of severe constraints on cost,
energy and effective range of sensor devices. To
overcome limitations in existing solutions, we present
a Multi-Sequence Positioning (MSP) method for
large-scale stationary sensor node localization in
outdoor environments. The novel idea behind MSP is to
reconstruct and estimate two-dimensional location
information for each sensor node by processing multiple
one-dimensional node sequences, easily obtained through
loosely guided event distribution. Starting from a
basic MSP design, we propose four optimizations that
work together to increase localization accuracy. We
address several interesting issues such as incomplete
(partial) node sequences and sequence flip, found in
the Mirage test-bed we built. We have evaluated the MSP
system through theoretical analysis, extensive
simulation as well as two physical systems (an indoor
version with 46 MICAz motes and an outdoor version with
20 MICAz motes). Evaluation demonstrates that MSP can
achieve an accuracy within one foot, requiring neither
additional costly hardware on sensor nodes nor precise
event distribution. In fact, it provides a nice
tradeoff between physical cost (anchors) and soft cost
(events) while maintaining localization accuracy.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Peng:2012:BHA,
author = "Chunyi Peng and Guobin Shen and Yongguang Zhang",
title = "{BeepBeep}: a high-accuracy acoustic-based system for
ranging and localization using {COTS} devices",
journal = j-TECS,
volume = "11",
number = "1",
pages = "4:1--4:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146421",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We present the design and implementation of BeepBeep,
a high-accuracy acoustic-based system for ranging and
localization. It is a pure software-based solution and
uses the most basic set of commodity hardware --- a
speaker, a microphone, and some form of interdevice
communication. The ranging scheme works without any
infrastructure and is applicable to sensor platforms
and commercial-off-the-shelf mobile devices. It
achieves high accuracy through three techniques:
two-way sensing, self-recording, and sample counting.
We further devise a scalable and fast localization
scheme. Our experiments show that up to one-centimeter
ranging accuracy and three-centimeter localization
accuracy can be achieved.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kumar:2012:CMA,
author = "T. S. Rajesh Kumar and R. Govindarajan and C. P.
Ravikumar",
title = "On-chip memory architecture exploration framework for
{DSP} processor-based embedded system on chip",
journal = j-TECS,
volume = "11",
number = "1",
pages = "5:1--5:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146422",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Today's SoCs are complex designs with multiple
embedded processors, memory subsystems, and application
specific peripherals. The memory architecture of
embedded SoCs strongly influences the power and
performance of the entire system. Further, the memory
subsystem constitutes a major part (typically up to
70\%) of the silicon area for the current day SoC. In
this article, we address the on-chip memory
architecture exploration for DSP processors which are
organized as multiple memory banks, where banks can be
single/dual ported with non-uniform bank sizes. In this
paper we propose two different methods for physical
memory architecture exploration and identify the
strengths and applicability of these methods in a
systematic way. Both methods address the memory
architecture exploration for a given target application
by considering the application's data access
characteristics and generates a set of Pareto-optimal
design points that are interesting from a power,
performance and VLSI area perspective. To the best of
our knowledge, this is the first comprehensive work on
memory space exploration at physical memory level that
integrates data layout and memory exploration to
address the system objectives from both hardware design
and application software development perspective.
Further we propose an automatic framework that explores
the design space identifying 100's of Pareto-optimal
design points within a few hours of running on a
standard desktop configuration.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Pande:2012:PDP,
author = "Amit Pande and Joseph Zambreno",
title = "{Poly-DWT}: {Polymorphic} wavelet hardware support for
dynamic image compression",
journal = j-TECS,
volume = "11",
number = "1",
pages = "6:1--6:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146423",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many modern computing applications have been enabled
through the use of real-time multimedia processing.
While several hardware architectures have been proposed
in the research literature to support such primitives,
these fail to address applications whose performance
and resource requirements have a dynamic aspect.
Embedded multimedia systems typically need a power and
computation efficient design in addition to good
compression performance. In this article, we introduce
a Polymorphic Wavelet Architecture (Poly-DWT) as a
crucial building block towards the development of
embedded systems to address such challenges. We
illustrate how our Poly-DWT architecture can
potentially make dynamic resource allocation decisions,
such as the internal bit representation and the
processing kernel, according to the application
requirements. We introduce a filter switching
architecture that allows for dynamic switching between
5/3 and 9/7 wavelet filters and leads to a more power
efficient design. Further, a multiplier-free design
with a low adder requirement demonstrates the potential
of Poly-DWT for embedded systems. Through an FPGA
prototype, we perform a quantitative analysis of our
Poly-DWT architecture, and compare our filter to
existing approaches to illustrate the area and
performance benefits inherent in our approach.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Seo:2012:RGV,
author = "Suk-Hyun Seo and Jin-Ho Kim and Sung-Ho Hwang and Key
Ho Kwon and Jae Wook Jeon",
title = "A reliable gateway for in-vehicle networks based on
{LIN}, {CAN}, and {FlexRay}",
journal = j-TECS,
volume = "11",
number = "1",
pages = "7:1--7:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146424",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article describes a reliable gateway for
in-vehicle networks. Such networks include local
interconnect networks, controller area networks, and
FlexRay. There is some latency when transferring a
message from one node (source) to another node
(destination). A high probability of error exists due
to different protocol specifications such as baud-rate,
and message frame format. Therefore, deploying a
reliable gateway is a challenge to the automotive
industry. We propose a reliable gateway based on the
OSEK/VDX components for in-vehicle networks. We also
examine the gateway system developed, and then we
evaluate the performance of our proposed system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huang:2012:EFP,
author = "Kai Huang and Wolfgang Haid and Iuliana Bacivarov and
Matthias Keller and Lothar Thiele",
title = "Embedding formal performance analysis into the design
cycle of {MPSoCs} for real-time streaming
applications",
journal = j-TECS,
volume = "11",
number = "1",
pages = "8:1--8:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146425",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Modern real-time streaming applications are
increasingly implemented on multiprocessor
systems-on-chip (MPSoC). The implementation, as well as
the verification of real-time applications executing on
MPSoCs, are difficult tasks, however. A major challenge
is the performance analysis of MPSoCs, which is
required for early design space exploration and final
system verification. Simulation-based methods are not
well-suited for this purpose, due to long runtimes and
non-exhaustive corner-case coverage. To overcome these
limitations, formal performance analysis methods that
provide guarantees for meeting real-time constraints
have been developed. Embedding formal performance
analysis into the MPSoC design cycle requires the
generation of a faithful analysis model and its
calibration with the system-specific parameters. In
this article, a design flow that automates these steps
is presented. In particular, we integrate modular
performance analysis (MPA) into the distributed
operation layer (DOL) MPSoC programming environment.
The result is an MPSoC software design flow that allows
for automatically generating the system implementation,
together with an analysis model for system
verification.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chang:2012:AFS,
author = "Yuan-Hao Chang and Po-Liang Wu and Tei-Wei Kuo and
Shih-Hao Hung",
title = "An adaptive file-system-oriented {FTL} mechanism for
flash-memory storage systems",
journal = j-TECS,
volume = "11",
number = "1",
pages = "9:1--9:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146426",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "As flash memory becomes popular over various
platforms, there is a strong demand regarding the
performance degradation problem, due to the special
characteristics of flash memory. This research proposes
the design of a file-system-oriented flash translation
layer, in which a filter mechanism is designed to
separate the access requests of file-system metadata
and file contents for better performance. A recovery
scheme is then proposed for maintaining the integrity
of a file system. The proposed flash translation layer
is implemented as a Linux device driver and evaluated
with respect to ext2 and ext3 file systems. Experiments
were also done over NTFS by a series of realistic
traces. The experimental results show significant
performance improvement over ext2, ext3, and NTFS file
systems with limited system overheads.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Li:2012:SRS,
author = "Chunxiao Li and Niraj K. Jha and Anand Raghunathan",
title = "Secure reconfiguration of software-defined radio",
journal = j-TECS,
volume = "11",
number = "1",
pages = "10:1--10:??",
month = mar,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2146417.2146427",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Apr 2 17:42:24 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Software-defined radio (SDR) implements a radio system
in software that executes on a programmable processor.
The components of SDR, such as the filters, amplifiers,
and modulators, can be easily reconfigured to adapt to
the operating environment and user preferences.
However, the flexibility of radio reconfiguration
brings along the serious security concern of malicious
modification of software in the SDR system, leading to
radio malfunction and interference with other users'
communications. Both the SDR device and the network
need to be protected from such malicious radio
reconfiguration. In this article, a new architecture
targeted at protecting SDR devices from malicious
reconfiguration is proposed. The architecture is based
on robust separation of the radio operation environment
and user application environment, through the use of
virtualization. A new radio middleware layer is
designed to securely intercept all attempts to
reconfigure the radio, and a security policy monitor
checks the target configuration against security
policies that represent the interests of various
parties. Even if the operating system in the user
application environment is compromised, the proposed
architecture can ensure secure reconfiguration in the
radio operation environment. We have prototyped the
proposed secure SDR architecture using VMware and the
GNU Radio toolkit and demonstrate that overheads
incurred by the architecture are small and tolerable.
Therefore, we believe that the proposed solution could
be applied to address secure SDR reconfiguration in
both general-purpose and embedded computing systems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Berekovic:2012:ISS,
author = "Mladen Berekovic and Samarjit Chakraborty and Petru
Eles and Andy D. Pimentel",
title = "Introduction to the {Special Section on
ESTIMedia'08}",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "11:1--11:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180891",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhu:2012:PAR,
author = "Jun Zhu and Ingo Sander and Axel Jantsch",
title = "Performance Analysis of Reconfigurations in Adaptive
Real-Time Streaming Applications",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "12:1--12:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180888",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We propose a performance analysis framework for
adaptive real-time synchronous data flow streaming
applications on runtime reconfigurable FPGAs. As the
main contribution, we present a constraint based
approach to capture both streaming application
execution semantics and the varying design concerns
during reconfigurations. With our event models
constructed as cumulative functions on data streams, we
exploit a novel compile-time analysis framework based
on iterative timing phases. Finally, we implement our
framework on a public domain constraint solver, and
illustrate its capabilities in the analysis of design
trade-offs due to reconfigurations with experiments.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hsieh:2012:PBP,
author = "Kun-Yuan Hsieh and Chi-Hua Lai and Shang-Hong Lai and
Jenq Kuen Lee",
title = "Parallelization of Belief Propagation on {Cell}
Processors for Stereo Vision",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "13:1--13:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180889",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Markov random field models provide a robust
formulation for the stereo vision problem of inferring
three-dimensional scene geometry from two images taken
from different viewpoints. One of the most advanced
algorithms for solving the associated energy
minimization problem in the formulation is belief
propagation (BP). Although BP provides very accurate
results in solving stereo vision problems, the high
computational cost of the algorithm hinders it from
real-time applications. In recent years, multicore
architectures have been widely adopted in various
industrial application domains. The high computing
power of multicore processors provides new
opportunities to implement stereo vision algorithms.
This article examines and extracts the parallelisms in
the BP method for stereo vision on multicore
processors. This article shows that parallelism of the
algorithm can be efficiently utilized on multicore
processors. The results show that parallelization on
multicore processors provides a speedup for the BP
algorithm of almost 15 times compared to the
single-processor implementation on the PPE of the Cell
BE. The experimental results also indicate that a frame
rate of 6.5 frames/second is possible when implementing
the parallelized BP algorithm on the multicore
processor of Cell BE with one PPE and six SPEs.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Terechko:2012:BPS,
author = "Andrei Terechko and Jan Hoogerbrugge and Ghiath Alkadi
and Surendra Guntur and Anirban Lahiri and Marc
Duranton and Clemens W{\"u}st and Phillip Christie and
Axel Nackaerts and Aatish Kumar",
title = "Balancing Programmability and Silicon Efficiency of
Heterogeneous Multicore Architectures",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "14:1--14:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180890",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Multicore architectures provide scalable performance
with a lower hardware design effort than single core
processors. Our article presents a design methodology
and an embedded multicore architecture, focusing on
reducing the software design complexity and boosting
the performance density. First, we analyze
characteristics of the Task-Level Parallelism in modern
multimedia workloads. These characteristics are used to
formulate requirements for the programming model. Then
we translate the programming model requirements to an
architecture specification, including a novel
low-complexity implementation of cache coherence and a
hardware synchronization unit. Our evaluation
demonstrates that the novel coherence mechanism
substantially simplifies hardware design, while
reducing the performance by less than 18\% relative to
a complex snooping technique. Compared to a single
processor core, the multicores have already proven to
be more area- and energy-efficient. However, the
multicore architectures in embedded systems still
compete with highly efficient function-specific
hardware accelerators. In this article we identify five
architectural methods to boost performance density of
multicores; microarchitectural downscaling, asymmetric
multicore architectures, multithreading, generic
accelerators, and conjoining. Then, we present a novel
methodology to explore multicore design spaces,
including the architectural methods improving the
performance density. The methodology is based on a
complex formula computing performances of heterogeneous
multicore systems. Using this design space exploration
methodology for HD and QuadHD H.264 video decoding, we
estimate that the required areas of multicores in CMOS
45 nm are 2.5 mm$^2$ and 8.6 mm$^2$, respectively.
These results suggest that heterogeneous multicores are
cost-effective for embedded applications and can
provide a good programmability support.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Khajeh:2012:EAA,
author = "Amin Khajeh and Minyoung Kim and Nikil Dutt and Ahmed
M. Eltawil and Fadi J. Kurdahi",
title = "Error-Aware Algorithm\slash Architecture Coexploration
for Video Over Wireless Applications",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "15:1--15:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180892",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we propose a cross-layer
algorithm/architecture coexploration for wireless
multimedia systems to coordinate interactions among
sublayer optimizers for improvements in
energy/QoS/reliability. By exploiting the inherent
redundancy in wireless multimedia systems, we generate
an expanded design space over traditional
layer-specific approaches. Specifically, we control the
error resilient encoder at the application layer to
provide awareness of architectural exploration at the
physical layer allowing new design points with lower
power consumption via aggressive voltage scaling. While
trying to reduce energy consumption, the fault tolerant
technique compensates the effect of the hardware and
network errors due to aggressive voltage scaling and
lossy transmission, respectively. Our experiments on
H.263 video over a WCDMA communication system
demonstrate that coexploration enlarges the feasible
design space, which results in significant power
savings of more than 20\% in the WCDMA modem.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Salamy:2012:SOT,
author = "Hassan Salamy and J. Ramanujam",
title = "Storage Optimization through Offset Assignment with
Variable Coalescing",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "16:1--16:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180893",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Most modern digital signal processors (DSPs) provide
multiple address registers and a dedicated address
generation unit (AGU) which performs address generation
in parallel to instruction execution. There is no
address computation overhead if the next address is
within the auto-modify range. A careful placement of
variables in memory is utilized to decrease the number
of address arithmetic instructions and thus to generate
compact and efficient code. The simple offset
assignment (SOA) problem concerns the layout of
variables for machines with one address register and
the general offset assignment (GOA) deals with multiple
address registers. Both these problems assume that each
variable needs to be allocated for the entire duration
of a program. Both SOA and GOA are NP-complete. In this
article, we present effective heuristics for the simple
and the general offset assignment problems with
variable coalescing where two or more non-interfering
variables can be mapped into the same memory location.
Results on several benchmarks show the significant
improvement of our proposed heuristics compared to
other heuristics in the literature.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Falk:2012:ISS,
author = "Heiko Falk and Peter Marwedel",
title = "Introduction to the {Special Section on SCOPES'09}",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "17:1--17:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180894",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2012:FLF,
author = "Jaegeuk Kim and Hyotaek Shim and Seon-Yeong Park and
Seungryoul Maeng and Jin-Soo Kim",
title = "{FlashLight}: a Lightweight Flash File System for
Embedded Systems",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "18:1--18:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180895",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A very promising approach for using NAND flash memory
as a storage medium is a flash file system. In order to
design a higher-performance flash file system, two
issues should be considered carefully. One issue is the
design of an efficient index structure that contains
the locations of both files and data in the flash
memory. For large-capacity storage, the index structure
must be stored in the flash memory to realize low
memory consumption; however, this may degrade the
system performance. The other issue is the design of a
novel garbage collection (GC) scheme that reclaims
obsolete pages. This scheme can induce considerable
additional read and write operations while identifying
and migrating valid pages. In this article, we present
a novel flash file system that has the following
features: (i) a lightweight index structure that
introduces the hybrid indexing scheme and intra-inode
index logging, and (ii) an efficient GC scheme that
adopts a dirty list with an on-demand GC approach as
well as fine-grained data separation and erase-unit
data allocation. We implemented FlashLight in a Linux
OS with kernel version 2.6.21 on an embedded device.
The experimental results obtained using several
benchmark programs confirm that FlashLight improves the
performance by up to 27.4\% over UBIFS by alleviating
index management and GC overheads by up to 33.8\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Eriksson:2012:ICG,
author = "Mattias Eriksson and Christoph Kessler",
title = "Integrated Code Generation for Loops",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "19:1--19:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180896",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Code generation in a compiler is commonly divided into
several phases: instruction selection, scheduling,
register allocation, spill code generation, and, in the
case of clustered architectures, cluster assignment.
These phases are interdependent; for instance, a
decision in the instruction selection phase affects how
an operation can be scheduled We examine the effect of
this separation of phases on the quality of the
generated code. To study this we have formulated
optimal methods for code generation with integer linear
programming; first for acyclic code and then we extend
this method to modulo scheduling of loops. In our
experiments we compare optimal modulo scheduling, where
all phases are integrated, to modulo scheduling, where
instruction selection and cluster assignment are done
in a separate phase. The results show that, for an
architecture with two clusters, the integrated method
finds a better solution than the nonintegrated method
for 27\% of the instances.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "19",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Murray:2012:ASL,
author = "Alastair Murray and Bj{\"o}rn Franke",
title = "Adaptive Source-Level Data Assignment to Dual Memory
Banks",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "20:1--20:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180897",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Dual memory banks provide extra memory bandwidth to
DSP applications and enable simultaneous access to two
operands if the data is partitioned appropriately.
Fully automated and compiler integrated approaches to
data partitioning and memory bank assignment have,
however, found little acceptance by DSP software
developers. In this article we present a novel
source-level approach that is more programmer friendly.
Our scheme is based on soft graph coloring and highly
adaptive heuristics generated by genetic programming.
We have evaluated our scheme on an Analog Devices
TigerSHARC TS-101 DSP and achieved speedups of up to
57\% on 13 UTDSP benchmarks.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "20",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Boissinot:2012:SPR,
author = "Benoit Boissinot and Philip Brisk and Alain Darte and
Fabrice Rastello",
title = "{SSI} Properties Revisited",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "21:1--21:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180898",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The static single information (SSI) form is an
extension of the static single assignment (SSA) form, a
well-established compiler intermediate representation
that has been successfully used for numerous compiler
analysis and optimizations. Several interesting results
have also been shown for SSI form concerning liveness
analysis and the representation of live-ranges of
variables, which could make SSI form appealing for
just-in-time compilation. Unfortunately, we have
uncovered several mistakes in the previous literature
on SSI form, which, admittedly, is already quite
sparse. This article corrects the mistakes that are
most germane to SSI form. We first explain why the two
definitions of SSI form proposed in past literature,
first by C. S. Ananian, then by J. Singer, are not
equivalent. Our main result is then to prove that basic
blocks, and thus program points, can be totally ordered
so that live-ranges of variables correspond to
intervals on a line, a result that holds for both
variants of SSI form. In other words, in SSI form, the
intersection graph defined by live-ranges is an
interval graph, a stronger structural property than for
SSA form for which the intersection graph of
live-ranges is chordal. Finally, we show how this
structure of live-ranges can be used to simplify
liveness analysis.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "21",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Franke:2012:SPM,
author = "Bj{\"o}rn Franke",
title = "Statistical Performance Modeling in Functional
Instruction Set Simulators",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "22:1--22:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180899",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Despite the recent progress in improving the speed of
instruction-accurate simulators cycle-accurate
simulation is still prohibitively slow for all but the
most basic programs. In this article we present a
statistical machine learning approach to performance
estimation in fast, instruction accurate simulators and
evaluate our methodology comprehensively against three
popular embedded RISC processors and about 300 embedded
applications. We show that our methodology is capable
of providing accurate performance estimations with an
average error of less than 3.9\% while, on average,
operating $ \approx 14.5 $ times faster than
cycle-accurate simulation.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "22",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chandraiah:2012:CAR,
author = "Pramod Chandraiah and Rainer D{\"o}mer",
title = "Computer-Aided Recoding to Create Structured and
Analyzable System Models",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "23:1--23:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180900",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In embedded system design, the quality of the input
model has a direct bearing on the effectiveness of the
system exploration and synthesis tools. Given a
well-written system model, tools today are effective in
generating working implementations. However, readily
available C reference code is not conducive for
immediate system synthesis as it lacks needed features
for automatic analysis and synthesis. Among others, the
lack of proper structure and the presence of
intractable pointers in the reference code are factors
that seriously hamper the effectiveness of system
design tools. To overcome these deficiencies, we aim to
automate the conversion of flat C code into a
well-structured system model by applying automated
source code transformations. We present a set of
computer-aided recoding operations that enable the
system designer to mitigate pointer problems and
quickly create the necessary structural hierarchy so
that the design model becomes easily analyzable and
synthesizable. Utilizing the designer's knowledge, our
interactive recoding transformations aid the designer
in efficiently creating well-structured system models
for rapid design space exploration and successful
synthesis. Our estimated and measured experimental
results show significant productivity gains through a
substantial reduction of the model creation time.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "23",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dubach:2012:EPE,
author = "Christophe Dubach and Timothy M. Jones and Michael F.
P. O'Boyle",
title = "Exploring and Predicting the Effects of
Microarchitectural Parameters and Compiler
Optimizations on Performance and Energy",
journal = j-TECS,
volume = "11S",
number = "1",
pages = "24:1--24:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2180887.2180901",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jun 7 16:18:52 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Embedded processor performance is dependent on both
the underlying architecture and the compiler
optimizations applied. However, designing both
simultaneously is extremely difficult to achieve due to
the time constraints designers must work under.
Therefore, current methodology involves designing
compiler and architecture in isolation, leading to
suboptimal performance of the final product. This
article develops a novel approach to this codesign
space problem. For our specific design space, we
demonstrate that we can automatically predict the
performance that an optimizing compiler would achieve
without actually tuning it for any of the
microarchitecture configurations considered. Once
trained, a single run of the program compiled with the
standard optimization setting is enough to make a
prediction on the new microarchitecture with just a
3.2\% error rate on average. This allows the designer
to accurately choose an architectural configuration
with knowledge of how an optimizing compiler will
perform on it. We use this to find the best optimizing
compiler/architectural configuration in our codesign
space and demonstrate that it achieves an average 19\%
performance improvement and energy savings of 16\%
compared to the baseline, nearly doubling the
energy-efficiency measured as the energy-delay-squared
product (EDD).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "24",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Staff:2012:APA,
author = "{TECS Staff}",
title = "Abstracts of Papers to appear in {Special Supplemental
Issue of TECS (v11, iSupplemental1)}",
journal = j-TECS,
volume = "11",
number = "2",
pages = "25:1--25:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220337",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In order to speed up the publication process, we have
begun to publish supplemental online-only issues. The
following abstracts describe the articles in the first
such issue, Vol. 11S(1). These articles are available
in the Digital Library.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "25",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2012:PPI,
author = "Jongeun Lee and Aviral Shrivastava",
title = "{PICA}: {Processor Idle Cycle Aggregation} for
Energy-Efficient Embedded Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "26:1--26:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220338",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Processor Idle Cycle Aggregation (PICA) is a promising
approach for low-power execution of processors, in
which small memory stalls are aggregated to create
large ones, enabling profitable switch of the processor
into low-power mode. We extend the previous approach in
three dimensions. First we develop static analysis for
the PICA technique and present optimal parameters for
five common types of loops based on steady-state
analysis. Second, to remedy the weakness of
software-only control in varying environment, we
enhance PICA with minimal hardware extension that
ensures correct execution for any loops and parameters,
thus greatly facilitating exploration-based parameter
tuning. Third, we demonstrate that our PICA technique
can be applied to certain types of nested loops with
variable bounds, thus enhancing the applicability of
PICA. We validate our analytical model against
simulation-based optimization and also show, through
our experiments on embedded application benchmarks,
that our technique can be applied to a wide range of
loops with average 20\% energy reductions, compared to
executions without PICA.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "26",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{McIntire:2012:EES,
author = "Dustin McIntire and Thanos Stathopoulos and Sasank
Reddy and Thomas Schmidt and William J. Kaiser",
title = "Energy-Efficient Sensing with the {Low Power, Energy
Aware Processing} ({LEAP}) Architecture",
journal = j-TECS,
volume = "11",
number = "2",
pages = "27:1--27:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220339",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A broad range of embedded networked sensing (ENS)
applications have appeared for large-scale systems,
introducing new requirements leading to new embedded
architectures, associated algorithms, and supporting
software systems. These new requirements include the
need for diverse and complex sensor systems that
present demands for energy and computational resources,
as well as for broadband communication. To satisfy
application demands while maintaining critical support
for low-energy operation, a new multiprocessor node
hardware and software architecture, Low Power Energy
Aware Processing (LEAP), has been developed. In this
article, we described the LEAP design approach, in
which the system is able to adaptively select the most
energy-efficient hardware components matching an
application's needs. The LEAP platform supports highly
dynamic requirements in sensing fidelity, computational
load, storage media, and network bandwidth. It focuses
on episodic operation of each component and considers
the energy dissipation for each platform task by
integrating fine-grained energy-dissipation monitoring
and sophisticated power-control scheduling for all
subsystems, including sensors. In addition to the LEAP
platform's unique hardware capabilities, its software
architecture has been designed to provide an easy way
to use power management interface and a robust,
fault-tolerant operating environment and to enable
remote upgrade of all software components. LEAP
platform capabilities are demonstrated by example
implementations, such as a network protocol design and
a light source event detection algorithm. Through the
use of a distributed node testbed, we demonstrate that
by exploiting high energy-efficiency components and
enabling proper on-demand scheduling, the LEAP
architecture may meet both sensing performance and
energy dissipation objectives for a broad class of
applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "27",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wang:2012:DCR,
author = "Weixun Wang and Prabhat Mishra and Ann Gordon-Ross",
title = "Dynamic Cache Reconfiguration for Soft Real-Time
Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "28:1--28:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220340",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In recent years, efficient dynamic reconfiguration
techniques have been widely employed for system
optimization. Dynamic cache reconfiguration is a
promising approach for reducing energy consumption as
well as for improving overall system performance. It is
a major challenge to introduce cache reconfiguration
into real-time multitasking systems, since dynamic
analysis may adversely affect tasks with timing
constraints. This article presents a novel approach for
implementing cache reconfiguration in soft real-time
systems by efficiently leveraging static analysis
during runtime to minimize energy while maintaining the
same service level. To the best of our knowledge, this
is the first attempt to integrate dynamic cache
reconfiguration in real-time scheduling techniques. Our
experimental results using a wide variety of
applications have demonstrated that our approach can
significantly reduce the cache energy consumption in
soft real-time systems (up to 74\%).",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "28",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Palermo:2012:VAR,
author = "Gianluca Palermo and Cristina Silvano and Vittorio
Zaccaria",
title = "A Variability-Aware Robust Design Space Exploration
Methodology for On-Chip Multiprocessors Subject to
Application-Specific Constraints",
journal = j-TECS,
volume = "11",
number = "2",
pages = "29:1--29:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220341",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Manufacturing process variation is dramatically
becoming one of the most important challenges related
to power and performance optimization for sub-90nm CMOS
technologies. Process variability impacts the
optimization of the target system metrics, that is,
performance and energy consumption by introducing
fluctuations and unpredictability. Besides, it impacts
the parametric yield of the chip with respect to
application level constraints by reducing the number of
devices working within normal operating conditions. The
impact of variability on systems with stringent
application-specific requirements (such as portable
multimedia and critical embedded systems) is much
greater than on general-purpose systems given the
emphasis on predictability and reduced operating
margins. In this market segment, failing to address
such a problem within the early design stages of the
chip may lead to missing market deadlines and suffering
greater economic losses. In the context of a design
space exploration framework for supporting the
platform-based design approach, we address the problem
of robustness with respect to manufacturing process
variations. First, we apply Response Surface Modeling
(RSM) techniques to enable an efficient evaluation of
the statistical measures of execution time and energy
consumption for each system configuration. Then, we
apply a robust design space exploration framework to
afford the problem of the impact of manufacturing
process variations onto the system-level metrics and
consequently onto the application-level constraints. We
finally provide a comparison of our design space
exploration technique with conventional approaches on
two different case studies.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "29",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yang:2012:UEP,
author = "Yoon Seok Yang and Gwan Choi",
title = "Unequal Error Protection Based on {DVFS} for {JSCD} in
Low-Power Portable Multimedia Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "30:1--30:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220342",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a low-power decoder design for
joint source-channel decoding (JSCD) based on a novel
unequal error protection (UEP) scheme over additive
white Gaussian noise (AWGN) channels. Conventional JSCD
schemes, adopting low-density parity check (LDPC) codes
for multimedia devices, typically operate at a
fixed-time decoding loop, regardless of the quality of
data received. We present a JSCD scheme that achieves
reduction in power through minimum energy decoding and
dynamic voltage and frequency scaling (DVFS).
Consequently, up to 39\% power reduction is achieved in
Foreman, Akiyo, and Mobile video streams without
performance degradation in reconstructed video
quality.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "30",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Namin:2012:EFF,
author = "Ashkan Hosseinzadeh Namin and Huapeng Wu and Majid
Ahmadi",
title = "An Efficient Finite Field Multiplier Using Redundant
Representation",
journal = j-TECS,
volume = "11",
number = "2",
pages = "31:1--31:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220343",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "An efficient word-level finite field multiplier using
redundant representation is proposed. The proposed
multiplier has a significantly higher speed, compared
to previously proposed word-level architectures using
either redundant representation or optimal normal basis
type I, at the expense of moderately higher area
complexity. Furthermore, the new design out-performs
other similar proposals when considering the product of
area and delay as a measure of performance. ASIC
Realization of the proposed design using TSMC's 0.18 $
\mu $ m CMOS technology for the binary field size of
163 is also presented.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "31",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Leyva-del-Foyo:2012:ITI,
author = "Luis E. Leyva-del-Foyo and Pedro Mejia-Alvarez and
Dionisio de Niz",
title = "Integrated Task and Interrupt Management for Real-Time
Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "32:1--32:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220344",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Real-time scheduling algorithms like RMA or EDF and
their corresponding schedulability test have proven to
be powerful tools for developing predictable real-time
systems. However, the traditional interrupt management
model presents multiple inconsistencies that break the
assumptions of many of the real-time scheduling tests,
diminishing its utility. In this article, we analyze
these inconsistencies and present a model that resolves
them by integrating interrupts and tasks in a single
scheduling model. We then use the RMA theory to
calculate the cost of the model and analyze the
circumstances under which it can provide the most
value. This model was implemented in a kernel module.
The portability of the design of our module is
discussed in terms of its independence from both the
hardware and the kernel. We also discuss the
implementation issues of the model over conventional PC
hardware, along with its cost and novel optimizations
for reducing the overhead. Finally, we present our
experimental evaluation to show evidence of its
temporal determinism and overhead.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Garg:2012:IMP,
author = "Siddharth Garg and Diana Marculescu",
title = "On the Impact of Manufacturing Process Variations on
the Lifetime of Sensor Networks",
journal = j-TECS,
volume = "11",
number = "2",
pages = "33:1--33:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220345",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The lifetime of individual nodes in a sensor network
depends strongly on the leakage power of the nodes in
idle state. With technology scaling, variability in
leakage power dissipation of sensor nodes will cause
increased variability in their lifetimes. In this
article, we analyze how the lifetime variations of
sensor nodes affect the performance of the sensor
network as a whole. We demonstrate the use of the
proposed framework to explore deployment cost versus
performance trade-offs for sensor networks. Results
indicate that up to 37\% improvement in the critical
lifetime of a sensor network can be obtained with a
20\% increase in deployment cost.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "33",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Blech:2012:GIB,
author = "Jan Olaf Blech and Micha{\"e}l P{\'e}rin",
title = "Generating Invariant-Based Certificates for Embedded
Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "34:1--34:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220346",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Automatic verification tools, such as model checkers
and tools based on static analysis or on abstract
interpretation, have become popular in software and
hardware development. They increase confidence and
potentially provide rich feedback. However, with
increasing complexity, verification tools themselves
are more likely to contain errors. In contrast to
automatic verification tools, higher-order theorem
provers use mathematically founded proof strategies
checked by a small proof checker to guarantee selected
properties. Thus, they enjoy a high level of
trustability. Properties of software and hardware
systems and their justifications can be encapsulated
into a certificate, thereby guaranteeing correctness of
the systems, with respect to the properties. These
results offer a much higher degree of confidence than
results achieved by verification tools. However,
higher-order theorem provers are usually slow, due to
their general and minimalistic nature. Even for small
systems, a lot of human interaction is required for
establishing a certificate. In this work, we combine
the advantages of automatic verification tools (i.e.,
speed and automation) with those of higher-order
theorem provers (i.e., high level of trustability). The
verification tool generates a certificate for each
invocation. This is checked by the higher-order theorem
prover, thereby guaranteeing the desired property. The
generation of certificates is much easier than
producing the analysis results of the verification tool
in the first place. In our work, we are able to create
certificates that come with an algorithmic description
of the proof of the desired property as justification.
We concentrate on verification tools that generate
invariants of systems and certify automatically that
these do indeed hold. Our approach is applied to the
certification of the verdicts of a deadlock-detection
tool for an asynchronous component-based language.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "34",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Jeong:2012:PLT,
author = "Jaein Jeong and David Culler",
title = "Predicting the Long-Term Behavior of a Micro-Solar
Power System",
journal = j-TECS,
volume = "11",
number = "2",
pages = "35:1--35:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220347",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Micro-solar power system design is challenging because
it must address long-term system behavior under highly
variable solar energy conditions and consider a large
space of design options. Several micro-solar power
systems and models have been made, validating
particular points in the whole design space. We provide
a general architecture of micro-solar power
systems---comprising key components and
interconnections among the components---and formalize
each component in an analytical or empirical model of
its behavior. To model the variability of solar energy,
we provide three solar radiation models, depending on
the degree of information available: an astronomical
model for ideal conditions, an obstructed astronomical
model for estimating solar radiation under the presence
of shadows and obstructions, and a weather-effect model
for estimating solar radiation under weather variation.
Our solar radiation models are validated with a
concrete design, the HydroWatch node, thus achieving
small deviation from the long-term measurement. They
can be used in combination with other micro-solar
system models to improve the utility of the load and
estimate the behavior of micro-solar power systems more
accurately. Thus, our solar radiation models provide
more accurate estimations of solar radiation and close
the loop for micro-solar power system modeling.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "35",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Smith:2012:OSH,
author = "Melissa C. Smith and Gregory D. Peterson",
title = "Optimization of Shared High-Performance Reconfigurable
Computing Resources",
journal = j-TECS,
volume = "11",
number = "2",
pages = "36:1--36:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220348",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In the field of high-performance computing, systems
harboring reconfigurable devices, such as
field-programmable gate arrays (FPGAs), are gaining
more widespread interest. Such systems range from
supercomputers with tightly coupled reconfigurable
hardware to clusters with reconfigurable devices at
each node. The use of these architectures for
scientific computing provides an alternative for
computationally demanding problems and has advantages
in metrics, such as operating cost/performance and
power/performance. However, performance optimization of
these systems can be challenging even with knowledge of
the system's characteristics. Our analytic performance
model includes parameters representing the
reconfigurable hardware, application load imbalance
across the nodes, background user load, basic
message-passing communication, and processor
heterogeneity. In this article, we provide an overview
of the analytical model and demonstrate its application
for optimization and scheduling of high-performance
reconfigurable computing (HPRC) resources. We examine
cost functions for minimum runtime and other
optimization problems commonly found in shared
computing resources. Finally, we discuss additional
scheduling issues and other potential applications of
the model.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "36",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2012:EEA,
author = "Kyoungwoo Lee and Nikil Dutt and Nalini
Venkatasubramanian",
title = "{EAVE}: {Error-Aware Video Encoding} Supporting
Extended Energy\slash {QoS} Trade-offs for Mobile
Embedded Systems",
journal = j-TECS,
volume = "11",
number = "2",
pages = "37:1--37:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220349",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Energy/QoS provisioning is challenging for video
applications over lossy wireless network with
power-constrained mobile handheld devices. In this
work, we exploit the inherent error tolerance of video
data to generate a range of acceptable operating points
by controlling the amount of errors in the system. In
particular, we propose an error-aware video encoding
technique, EAVE, that intentionally injects errors
while ensuring acceptable QoS. The expanded trade-off
space generated by EAVE allows system designers to
comparatively evaluate different operating points with
varying QoS and energy consumption by aggressively
exploiting error-resilience attributes, and could
potentially result in significant energy savings. The
novelty of our approach resides in active exploitation
of errors to vary the operating conditions for further
optimization of system parameters. Moreover, we present
the adaptivity of our approach by incorporating the
feedback from the decoding side to achieve the QoS
requirement under the dynamic network status. Our
experiments show that EAVE can reduce the energy
consumption for an encoding device by up to 37\% for a
video conferencing application over a wireless network
without quality degradation, compared to a standard
video encoding technique over test video streams.
Further, our experimental results demonstrate that EAVE
can expand the design space by 14 times with respect to
energy consumption and by 13 times with respect to
video quality (compared to a traditional approach
without active error exploitation) on average, over
test video streams.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "37",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chen:2012:ART,
author = "Mingsong Chen and Prabhat Mishra and Dhrubajyoti
Kalita",
title = "Automatic {RTL} Test Generation from {SystemC TLM}
Specifications",
journal = j-TECS,
volume = "11",
number = "2",
pages = "38:1--38:??",
month = jul,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2220336.2220350",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jul 27 18:57:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "SystemC transaction-level modeling (TLM) is widely
used to enable early exploration for both hardware and
software designs. It can reduce the overall design and
validation effort of complex system-on-chip (SOC)
architectures. However, due to lack of automated
techniques coupled with limited reuse of validation
efforts between abstraction levels, SOC validation is
becoming a major bottleneck. This article presents a
novel top-down methodology for automatically generating
register transfer-level (RTL) tests from SystemC TLM
specifications. It makes two important contributions:
(i) it proposes a method that can automatically
generate TLM tests using various coverage metrics, and
(ii) it develops a test refinement specification for
automatically converting TLM tests to RTL tests in
order to reduce overall validation effort. We have
developed a tool which incorporates these activities to
enable automated RTL test generation from SystemC TLM
specifications. Case studies using a router example and
a 64-bit Alpha AXP pipelined processor demonstrate that
our approach can achieve intended functional coverage
of the RTL designs, as well as capture various
functional errors and inconsistencies between
specifications and implementations.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "38",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Plaks:2012:ESS,
author = "Toomas P. Plaks",
title = "Editorial: Special Section on {CAPA'09}",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "39:1--39:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331148",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "39",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Paul:2012:PRC,
author = "Anand Paul and Yung-Chuan Jiang and Jhing-Fa Wang and
Jar-Ferr Yang",
title = "Parallel Reconfigurable Computing-Based Mapping
Algorithm for Motion Estimation in Advanced Video
Coding",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "40:1--40:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331149",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Computational load of motion estimation in advanced
video coding (AVC) standard is significantly high and
even worse for HDTV and super-resolution sequences. In
this article, a video processing algorithm is
dynamically mapped onto a new parallel reconfigurable
computing (PRC) architecture which consists of multiple
dynamic reconfigurable computing (DRC) units. First, we
construct a directed acyclic graph (DAG) to represent
video coding algorithms in which motion estimation is
the focus. A novel parallel partition approach is then
proposed to map motion estimation DAG onto the multiple
DRC units in a PRC system. This partitioning algorithm
is capable of design optimization of parallel
processing reconfigurable systems for a given number of
processing elements in different search ranges. This
speeds up the video processing with minimum
sacrifice.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "40",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Suris:2012:RSC,
author = "Jorge A. Sur{\'\i}s and Adolfo Recio and Peter
Athanas",
title = "{RapidRadio}: Signal Classification and Radio
Deployment Framework",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "41:1--41:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331151",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, the RapidRadio framework for signal
classification and receiver deployment is discussed.
The framework is a productivity-enhancing tool that
reduces the required knowledge base for implementing a
receiver on an FPGA-based SDR platform. The ultimate
objective of this framework is to identify unknown
signals and to build FPGA-based receivers capable of
receiving them. RapidRadio divides the process of radio
creation into two phases; the analysis phase and radio
synthesis phase. The analysis phase guides the user
through the process of classifying an unknown signal
and determining its modulation scheme and parameters,
resulting in a radio receiver model. In the second
phase, this model is transformed into a functional
receiver in an FPGA-based platform.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "41",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mark:2012:HBC,
author = "Cindy Mark and Scott Y. L. Chin and Lesley Shannon and
Steven J. E. Wilton",
title = "Hierarchical Benchmark Circuit Generation for {FPGA}
Architecture Evaluation",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "42:1--42:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331152",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We describe a stochastic circuit generator that can be
used to automatically create benchmark circuits for use
in FPGA architecture studies. The circuits consist of a
hierarchy of interconnected modules, reflecting the
structure of circuits designed using a system-on-chip
design flow. Within each level of hierarchy, modules
can be connected in a bus, star, or dataflow
configuration. Our circuit generator is calibrated
based on a careful study of existing system-on-chip
circuits. We show that our benchmark circuits lead to
more realistic architectural conclusions than circuits
generated using previous generators.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "42",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Reardon:2012:REE,
author = "Casey Reardon and Brian Holland and Alan D. George and
Greg Stitt and Herman Lam",
title = "{RCML}: An Environment for Estimation Modeling of
Reconfigurable Computing Systems",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "43:1--43:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331153",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Reconfigurable computing (RC) is emerging as a
promising area for embedded computing, in which complex
systems must balance performance, flexibility, cost,
and power. The difficulty associated with RC
development suggests improved strategic planning and
analysis techniques can save significant development
time and effort. This article presents a new abstract
modeling language and environment, the RC Modeling
Language (RCML), to facilitate efficient design space
exploration of RC systems at the estimation modeling
level, that is, before building a functional
implementation. Two integrated analysis tools and case
studies, one analytical and one simulative, are
presented illustrating relatively accurate automated
analysis of systems modeled in RCML.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "43",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{DiBiagio:2012:AOA,
author = "Andrea {Di Biagio} and Giovanni Agosta and Martino
Sykora and Cristina Silvano",
title = "Architecture Optimization of Application-Specific
Implicit Instructions",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "44:1--44:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331154",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Dynamic configuration of application-specific implicit
instructions has been proposed to better exploit the
available parallelism at the instruction level in
pipelined processors. The support of such implicit
instruction issue-requires the pipeline to be extended
with a trigger table that describes the instruction
implicitly issued as a response to a value written into
a triggering register by a triggering instruction
(which may be an add or sub instruction). In this
article, we explore the design optimization of the
trigger table to maximize the number of instructions
that can be implicitly issued while keeping the limited
size of the trigger table. The concept of implicitly
issued instruction has been formally defined by
considering the inter-basic block analysis of control
and data dependencies. A compilation tool chain has
been developed to automatically identify the
optimization opportunities, taking into account the
constraints imposed by control and data dependencies as
well as by architectural limitations. The proposed
solutions have been applied to the case of a baseline
scalar MIPS processor where, for the selected set of
benchmarks (DSPStone and Mibench/automotive), we
obtained an average speedup of 17\%.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "44",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Napapetian:2012:ESS,
author = "Ani Napapetian and William Kaiser and Majid
Sarrafzadeh",
title = "Editorial: Special Section on {WHS'09}",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "45:1--45:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331155",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "45",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Guenterberg:2012:ASR,
author = "Eric Guenterberg and Hassan Ghasemzadeh and Roozbeh
Jafari",
title = "Automatic Segmentation and Recognition in Body Sensor
Networks Using a Hidden {Markov} Model",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "46:1--46:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331156",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "One important application of body sensor networks is
action recognition. Action recognition often implicitly
requires partitioning sensor data into intervals, then
labeling the partitions according to the action that
each represents or as a non-action. The temporal
partitioning stage is called segmentation, and the
labeling is called classification. While many effective
methods exist for classification, segmentation remains
problematic. We present a technique inspired by
continuous speech recognition that combines
segmentation and classification using hidden Markov
models. This technique is distributed across several
sensor nodes. We show the results of this technique and
the bandwidth savings over full data transmission.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "46",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Pradhan:2012:AVJ,
author = "Gaurav N. Pradhan and B. Prabhakaran",
title = "Analyzing and Visualizing Jump Performance Using
Wireless Body Sensors",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "47:1--47:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331157",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Advancement in technology has led to the deployment of
body sensor networks (BSN) to monitor and sense human
activity in pervasive environments. Using multiple
wireless on-body systems, such as physiological data
monitoring and motion capture systems, body sensor
network data consists of heterogeneous physiologic and
motoric streams that form a multidimensional framework.
In this article, we analyze such high-dimensional body
sensor network data by proposing an efficient,
multidimensional factor analysis technique for
quantifying human performance and, at the same time,
providing visualization for performances of
participants in a low-dimensional space for easier
interpretation.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "47",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Thatte:2012:KEE,
author = "Gautam Thatte and Ming Li and Sangwon Lee and Adar
Emken and Shrikanth Narayanan and Urbashi Mitra and
Donna Spruijt-Metz and Murali Annavaram",
title = "{KNOWME}: An Energy-Efficient Multimodal Body Area
Network for Physical Activity Monitoring",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "48:1--48:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331158",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The use of biometric sensors for monitoring an
individual's health and related behaviors, continuously
and in real time, promises to revolutionize healthcare
in the near future. In an effort to better understand
the complex interplay between one's medical condition
and social, environmental, and metabolic parameters,
this article presents the KNOWME platform, a complete,
end-to-end, body area sensing system that integrates
off-the-shelf biometric sensors with a Nokia N95 mobile
phone to continuously monitor the metabolic signals of
a subject. With a current focus on pediatric obesity,
KNOWME employs metabolic signals to monitor and
evaluate physical activity. KNOWME development and
in-lab deployment studies have revealed three major
challenges: (1) the need for robustness to highly
varying operating environments due to subject-induced
variability, such as mobility or sensor placement; (2)
balancing the tension between achieving high fidelity
data collection and minimizing network energy
consumption; and (3) accurate physical activity
detection using a modest number of sensors. The KNOWME
platform described herein directly addresses these
three challenges. Design robustness is achieved by
creating a three-tiered sensor data collection
architecture. The system architecture is designed to
provide robust, continuous, multichannel data
collection and scales without compromising normal
mobile device operation. Novel physical activity
detection methods which exploit new representations of
sensor signals provide accurate and efficient physical
activity detection. The physical activity detection
method employs personalized training phases and
accounts for intersession variability. Finally,
exploiting the features of the hardware implementation,
a low-complexity sensor sampling algorithm is
developed, resulting in significant energy savings
without loss of performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "48",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Banerjee:2012:BAT,
author = "Ayan Banerjee and Sailesh Kandula and Tridib Mukherjee
and Sandeep K. S. Gupta",
title = "{BAND-AiDe}: a Tool for Cyber-Physical Oriented
Analysis and Design of Body Area Networks and Devices",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "49:1--49:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331159",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Body area networks (BANs) are networks of medical
devices implanted within or worn on the human body.
Analysis and verification of BAN designs require (i)
early feedback on the BAN design and (ii)
high-confidence evaluation of BANs without requiring
any hazardous, intrusive, and costly deployment. Any
design of BAN further has to ensure (i) the safety of
the human body, that is, limiting any undesirable
side-effects (e.g., heat dissipation) of BAN operations
(involving sensing, computation, and communication
among the devices) on the human body, and (ii) the
sustainability of the BAN operations, that is, the
continuation of the operations under constrained
resources (e.g., limited battery power in the devices)
without requiring any redeployments. This article uses
the Model Based Engineering (MBE) approach to perform
design and analysis of BANs. In this regard, first, an
abstract cyber-physical model of BANs, called BAN-CPS,
is proposed that captures the undesirable side-effects
of the medical devices (cyber) on the human body
(physical); second, a design and analysis tool, named
BAND-AiDe, is developed that allows specification of
BAN-CPS using industry standard Abstract Architecture
Description Language (AADL) and enables safety and
sustainability analysis of BANs; and third, the
applicability of BAND-AiDe is shown through a case
study using both single and a network of medical
devices for health monitoring applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "49",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Hanson:2012:AFE,
author = "Mark A. Hanson and Harry C. {Powell, Jr.} and Adam T.
Barth and John Lach",
title = "Application-Focused Energy-Fidelity Scalability for
Wireless Motion-Based Health Assessment",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "50:1--50:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331160",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Energy-fidelity trade-offs are central to the
performance of many technologies, but they are
essential in wireless body area sensor networks (BASNs)
due to severe energy and processing constraints and the
critical nature of certain healthcare applications.
On-node signal processing and compression techniques
can save energy by greatly reducing the amount of data
transmitted over the wireless channel, but lossy
techniques, capable of high compression ratios, can
incur a reduction in application fidelity. In order to
maximize system performance, these trade-offs must be
considered at runtime due to the dynamic nature of BASN
applications, including sensed data, operating
environments, user actuation, etc. BASNs therefore
require energy-fidelity scalability, so automated and
user-initiated trade-offs can be made dynamically. This
article presents a data rate scalability framework
within a motion-based health application context which
demonstrates the design of efficient and efficacious
wireless health systems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "50",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Boulis:2012:IWC,
author = "Athanassios Boulis and Yuriy Tselishchev and Lavy
Libman and David Smith and Leif Hanlen",
title = "Impact of Wireless Channel Temporal Variation on {MAC}
Design for Body Area Networks",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "51:1--51:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331161",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We investigate the impact of wireless channel temporal
variations on the design of medium access control (MAC)
protocols for body area networks (BANs). Our
measurements-based channel model captures large and
small time-scale signal correlations, giving an
accurate picture of the signal variation, specifically,
the deep fades which are the features that mostly
affect the behavior of the MAC. We test the effect of
the channel model on the performance of the 802.15.4
MAC both in contention access mode and TDMA access
mode. We show that there are considerable differences
in the performance of the MAC compared to simulations
that do not model channel temporal variation.
Furthermore, explaining the behavior of the MAC under a
temporal varying channel, we can suggest specific
design choices for the emerging BAN MAC standard.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "51",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Fainekos:2012:ESS,
author = "Georgios Fainekos and Eric Goubault and Franjo
Ivanci{\'c} and Sriram Sankaranarayanan",
title = "Editorial: Special Section {VCPSS'09}",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "52:1--52:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331162",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "52",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wongpiromsarn:2012:VPC,
author = "Tichakorn Wongpiromsarn and Sayan Mitra and Andrew
Lamperski and Richard M. Murray",
title = "Verification of Periodically Controlled Hybrid
Systems: Application to an Autonomous Vehicle",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "53:1--53:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331163",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article introduces Periodically Controlled Hybrid
Automata (PCHA) for modular specification of embedded
control systems. In a PCHA, control actions that change
the control input to the plant occur roughly
periodically, while other actions that update the state
of the controller may occur in the interim. Such
actions could model, for example, sensor updates and
information received from higher-level planning modules
that change the set point of the controller. Based on
periodicity and subtangential conditions, a new
sufficient condition for verifying invariant properties
of PCHAs is presented. For PCHAs with polynomial
continuous vector fields, it is possible to check these
conditions automatically using, for example, quantifier
elimination or sum of squares decomposition. We examine
the feasibility of this automatic approach on a small
example. The proposed technique is also used to
manually verify safety and progress properties of a
fairly complex planner-controller subsystem of an
autonomous ground vehicle. Geometric properties of
planner-generated paths are derived which guarantee
that such paths can be safely followed by the
controller.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "53",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Girard:2012:VSL,
author = "Antoine Girard and Gang Zheng",
title = "Verification of Safety and Liveness Properties of
Metric Transition Systems",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "54:1--54:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331164",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "We consider verification problems for transition
systems enriched with a metric structure. We believe
that these metric transition systems are particularly
suitable for the analysis of cyber-physical systems in
which metrics can be naturally defined on the numerical
variables of the embedded software and on the
continuous states of the physical environment. We
consider verification of bounded and unbounded safety
properties, as well as bounded liveness properties. The
transition systems we consider are nondeterministic,
finitely branching, and with a finite set of initial
states. Therefore, bounded safety/liveness properties
can always be verified by exhaustive exploration of the
system trajectories. However, this approach may be
intractable in practice, as the number of trajectories
usually grows exponentially with respect to the
considered bound. Furthermore, since the system we
consider can have an infinite set of states, exhaustive
exploration cannot be used for unbounded safety
verification. For bounded safety properties, we propose
an algorithm which combines exploration of the system
trajectories and state space reduction using merging
based on a bisimulation metric. The main novelty
compared to an algorithm presented recently by Lerda et
al. [2008] consists in introducing a tuning parameter
that improves the performance drastically. We also
establish a procedure that allows us to prove unbounded
safety from the result of the bounded safety algorithm
via a refinement step. We then adapt the algorithm to
handle bounded liveness verification. Finally, the
effectiveness of the approach is demonstrated by
applying it to the analysis of implementations of an
embedded control loop.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "54",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Seshia:2012:QAS,
author = "Sanjit A. Seshia and Alexander Rakhlin",
title = "Quantitative Analysis of Systems Using Game-Theoretic
Learning",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "55:1--55:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331165",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The analysis of quantitative properties, such as
timing and power, is central to the design of reliable
embedded software and systems. However, the
verification of such properties on a program is made
difficult by their heavy dependence on the program's
environment, such as the processor it runs on. Modeling
the environment by hand can be tedious, error prone,
and time consuming. In this article, we present a new
game-theoretic approach to analyzing quantitative
properties that is based on performing systematic
measurements to automatically learn a model of the
environment. We model the problem as a game between our
algorithm (player) and the environment of the program
(adversary) in which the player seeks to accurately
predict the property of interest, while the adversary
sets environment states and parameters. To solve this
problem, we employ a randomized strategy that
repeatedly tests the program along a linear-sized set
of program paths called basis paths, using the
resulting measurements to infer a weighted-graph model
of the environment from which quantitative properties
can be predicted. Test cases are automatically
generated using satisfiability modulo theories (SMT)
solving. We prove that our algorithm can, under certain
assumptions and with arbitrarily high probability,
accurately predict properties such as worst-case
execution time or estimate the distribution of
execution times. Experimental results for execution
time analysis demonstrate that our approach is
efficient, accurate, and highly portable.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "55",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wu:2012:MCB,
author = "Lan Wu and Wei Zhang",
title = "A Model Checking Based Approach to Bounding Worst-Case
Execution Time for Multicore Processors",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "56:1--56:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331166",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "As multicore processors are increasingly adopted in
industry, it has become a great challenge to accurately
bound the worst-case execution time (WCET) for
real-time systems running on multicore chips. This is
particularly true because of the inter-thread
interferences in accessing shared resources on
multicores, such as shared L2 caches, which can
significantly affect the performance but are very
difficult to be estimated statically. This article
proposes an approach to analyzing WCET for multicore
processors with shared L2 instruction caches by using a
model checking based method. We model each concurrent
real-time thread, including the inter-thread cache
interferences with a PROMELA process, and derive the
WCET by using a binary search algorithm. To reduce the
state explosion problem, we propose several techniques
for reducing the memory consumption by exploiting
domain-specific information. Our experiments indicate
that compared to the static analysis technique based on
extended ILP (integer linear programming), our approach
improves the tightness of WCET estimation by more than
31.1\% for the benchmarks we studied. However, due to
the inherent complexity of multicore timing analysis
and the state explosion problem, the model checking
based approach currently can only work with small
real-time kernels for dual-core processors.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "56",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tang:2012:UMS,
author = "Qinghui Tang and Sandeep K. S. Gupta and Georgios
Varsamopoulos",
title = "A Unified Methodology for Scheduling in Distributed
Cyber-Physical Systems",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "57:1--57:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331167",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A distributed cyber-physical system (DCPS) may receive
and induce energy-based interference to and from its
environment. This article presents a model and an
associated methodology that can be used to (i) schedule
tasks in DCPSs to ensure that the thermal effects of
the task execution are within acceptable levels, and
(ii) verify that a given schedule meets the
constraints. The model uses coarse discretization of
space and linearity of interference. The methodology
involves characterizing the interference of the task
execution and fitting it into the model, then using the
fitted model to verify a solution or explore the
solution space.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "57",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nghiem:2012:TTI,
author = "Truong Nghiem and George J. Pappas and Rajeev Alur and
Antoine Girard",
title = "Time-Triggered Implementations of Dynamic
Controllers",
journal = j-TECS,
volume = "11",
number = "S2",
pages = "58:1--58:??",
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2331147.2331168",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Sep 6 09:57:10 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Bridging the gap between model-based design and
platform-based implementation is one of the critical
challenges for embedded software systems. In the
context of embedded control systems that interact with
an environment, a variety of errors due to
quantization, delays, and scheduling policies may
generate executable code that does not faithfully
implement the model-based design. In this article, we
show that the performance gap between the model-level
semantics of linear dynamic controllers, for example,
the proportional-integral-derivative (PID) controllers
and their implementation-level semantics, can be
rigorously quantified if the controller implementation
is executed on a predictable time-triggered
architecture. Our technical approach uses lifting
techniques for periodic time-varying linear systems in
order to compute the exact error between the model
semantics and the execution semantics. Explicitly
computing the impact of the implementation on overall
system performance allows us to compare and partially
order different implementations with various scheduling
or timing characteristics.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "58",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dong:2012:UAS,
author = "Qi Dong and Donggang Liu",
title = "Using Auxiliary Sensors for Pairwise Key Establishment
in {WSN}",
journal = j-TECS,
volume = "11",
number = "3",
pages = "59:1--59:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345771",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many techniques have been developed recently for
establishing pairwise keys in sensor networks. However,
some of them are vulnerable to a few compromised sensor
nodes, while others could involve expensive protocols
for establishing keys. This article introduces a much
better alternative that can achieve both high
resilience to node compromises and high efficiency in
key establishment. The main idea is to deploy a small
number of additional sensor nodes, called assisting
nodes, to help key establishment between sensor nodes.
The proposed approach has many advantages over existing
approaches. In particular, a sensor node only needs to
make a few local communications and perform a few
efficient hash operations to setup a key with any other
sensor node in the network at a very high probability.
The majority of sensor nodes only need to store a
single key. Besides, it also provides high resilience
to node compromises. The theoretical analysis,
simulation studies, and experiments on TelosB sensor
motes also demonstrate the advantages of this key
establishment protocol in sensor networks.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "59",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Arora:2012:ILM,
author = "Divya Arora and Najwa Aaraj and Anand Raghunathan and
Niraj K. Jha",
title = "{INVISIOS}: a Lightweight, Minimally Intrusive Secure
Execution Environment",
journal = j-TECS,
volume = "11",
number = "3",
pages = "60:1--60:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345772",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many information security attacks exploit
vulnerabilities in ``trusted'' and privileged software
executing on the system, such as the operating system
(OS). On the other hand, most security mechanisms
provide no immunity to security-critical user
applications if vulnerabilities are present in the
underlying OS. While technologies have been proposed
that facilitate isolation of security-critical
software, they require either significant computational
resources and are hence not applicable to many
resource-constrained embedded systems, or necessitate
extensive redesign of the underlying processors and
hardware. In this work, we propose INVISIOS: a
lightweight, minimally intrusive hardware-software
architecture to make the execution of security-critical
software invisible to the OS, and hence protected from
its vulnerabilities. The INVISIOS software architecture
encapsulates the security-critical software into a
self-contained software module. While this module is
part of the kernel and is run with kernel-level
privileges, its code, data, and execution are
transparent to and protected from the rest of the
kernel. The INVISIOS hardware architecture consists of
simple add-on hardware components that are responsible
for bootstrapping the secure core, ensuring that it is
exercised by applications in only permitted ways, and
enforcing the isolation of its code and data. We
implemented INVISIOS by enhancing a full-system
emulator and Linux to model the proposed software and
hardware enhancements, and applied it to protect a
commercial cryptographic library. Our experiments
demonstrate that INVISIOS is capable of facilitating
secure execution at very small overheads, making it
suitable for resource-constrained embedded systems and
systems-on-chip.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "60",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Izosimov:2012:SOF,
author = "Viacheslav Izosimov and Paul Pop and Petru Eles and
Zebo Peng",
title = "Scheduling and Optimization of Fault-Tolerant Embedded
Systems with Transparency\slash Performance
Trade-Offs",
journal = j-TECS,
volume = "11",
number = "3",
pages = "61:1--61:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345773",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, we propose a strategy for the
synthesis of fault-tolerant schedules and for the
mapping of fault-tolerant applications. Our techniques
handle transparency/performance trade-offs and use the
fault-occurrence information to reduce the overhead due
to fault tolerance. Processes and messages are
statically scheduled, and we use process reexecution
for recovering from multiple transient faults. We
propose a fine-grained transparent recovery, where the
property of transparency can be selectively applied to
processes and messages. Transparency hides the recovery
actions in a selected part of the application so that
they do not affect the schedule of other processes and
messages. While leading to longer schedules,
transparent recovery has the advantage of both improved
debuggability and less memory needed to store the
fault-tolerant schedules.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "61",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yang:2012:PAA,
author = "Shengqi Yang and Pallav Gupta and Marilyn Wolf and
Dimitrios Serpanos and Vijaykrishnan Narayanan and Yuan
Xie",
title = "Power Analysis Attack Resistance Engineering by
Dynamic Voltage and Frequency Scaling",
journal = j-TECS,
volume = "11",
number = "3",
pages = "62:1--62:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345774",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article proposes a novel approach to cryptosystem
design to prevent power analysis attacks. Such attacks
infer program behavior by continuously monitoring the
power supply current going into the processor core.
They form an important class of security attacks. Our
approach is based on dynamic voltage and frequency
scaling (DVFS), which hides processor state to make it
harder for an attacker to gain access to a secure
system. Three designs are studied to test the efficacy
of the DVFS method against power analysis attacks. The
advanced realization of our cryptosystem is presented
which achieves enough high power and time trace
entropies to block various kinds of power analysis
attacks in the DES algorithm. We observed 27\% energy
reduction and 16\% time overhead in these algorithms.
Finally, DVFS hardness analysis is presented.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "62",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Shokry:2012:HSS,
author = "Hesham Shokry and Hatem M. El-Boghdadi",
title = "On Heuristic Solutions to the Simple Offset Assignment
Problem in Address-Code Optimization",
journal = j-TECS,
volume = "11",
number = "3",
pages = "63:1--63:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345775",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The increasing demand for more functionality in
embedded systems applications nowadays requires
efficient generation of compact code for embedded DSP
processors. Because such processors have highly
irregular data-paths, compilers targeting those
processors are challenged with the automatic generation
of optimized code with competent quality comparable to
hand-crafted code. A major issue in code-generation is
to optimize the placement of program variables in ROM
relative to each other so as to reduce the overhead
instructions dedicated for address computations. Modern
DSP processors are typically shipped with a feature
called Address Generation Unit (AGU) that provides
efficient address-generation instructions for accessing
program variables. Compilers targeting those processors
are expected to exploit the AGU to optimize variables
assignment. This article focuses on one of the basic
offset-assignment problems; the Simple Offset
Assignment (SOA) problem, where the AGU has only one
Address Register and no Modify Registers. The notion of
Tie-Break Function, TBF, introduced by Leupers and
Marwedel [1996], has been used to guide the placement
of variables in memory. In this article, we introduce a
more effective form of the TBF; the Effective
Tie-Breaking Function, ETBF, and show that the ETBF is
better at guiding the variables placement process.
Underpinning ETBF is the fact that program variables
are placed in memory in sequence, with each variable
having only two neighbors. We applied our technique to
randomly generated graphs as well as to real-world code
from the OffsetStone testbench [2010]. In previous work
[Ali et al. 2008], our technique showed up to 7\%
reduction in overhead when applied to
randomly-generated problem instances. We report in this
article on a further experiment of our technique on
real-code from the OffsetStone testbench. Despite the
substantial improvement our technique has achieved when
applied to random problem instances, we found that it
shows slight overhead reduction when applied to
real-world instances in OffsetStone, which agrees with
similar existing experiments. We analyze these results
and show that the ETBF defaults to TBF.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "63",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Girodias:2012:IMO,
author = "Bruno Girodias and Luiza Gheorghe Iugan and Youcef
Bouchebaba and Gabriela Nicolescu and El Mostapha
Abouhamid and Michel Langevin and Pierre Paulin",
title = "Integrating Memory Optimization with Mapping
Algorithms for Multi-Processors System-on-Chip",
journal = j-TECS,
volume = "11",
number = "3",
pages = "64:1--64:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345776",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Due to their great ability to parallelize at a very
high integration level, Multi-Processors
Systems-on-Chip (MPSoCs) are good candidates for
systems and applications such as multimedia. Memory is
becoming a key player for significant improvements in
these applications (power, performance and area). The
large amount of data manipulated by these applications
requires high-capacity computing and memory. Lately,
new programming models have been introduced. This leads
to the need of new optimization and mapping techniques
suitable for embedded systems and their programming
models. This article presents novel approaches for
combining memory optimization with mapping of
data-driven applications while considering
anti-dependence conflicts. Two different approaches are
studied and integrated with existing mapping
algorithms. The first approach (based on heuristic
algorithms) keeps the graph transformation for memory
optimization stage from the mapping stage and enables
their combination in a design flow. The second approach
(based on evolutionary algorithms) combines these two
stages and integrates them in a unique stage. Some
significant improvements are obtained for memory gain,
communication load and physical links.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "64",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhong:2012:SNL,
author = "Ziguo Zhong and Tian He",
title = "Sensor Node Localization with Uncontrolled Events",
journal = j-TECS,
volume = "11",
number = "3",
pages = "65:1--65:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345777",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Event-driven localization has been proposed as a
low-cost solution for node positioning in wireless
sensor networks. In order to eliminate the costly
requirement for accurate event control in existing
methods, we present a practical design using
uncontrolled events. The main idea is to estimate both
event generation parameters and the location of sensor
nodes simultaneously, by processing node sequences that
can be easily obtained from event detections. Besides
the basic design, we proposed two enhancements to
further extract information embedded in node orderings
for two scenarios: (i) node density is high; and (ii)
abundant events are available. To demonstrate the
generality of our design, both straight-line scan and
circular wave propagation events are addressed in the
article, and we evaluated the design with extensive
simulation as well as a testbed implementation with 41
MICAz motes. Results show that with only randomly
generated events, our design can effectively localize
nodes with great flexibility while adding little extra
cost at the resource constrained sensor node side. In
addition, localization via uncontrolled events provides
a potential option of achieving node positioning
through long-term ambient events.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "65",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kumar:2012:ECI,
author = "Karthik Kumar and Yamini Nimmagadda and Yung-Hsiang
Lu",
title = "Energy Conservation for Image Retrieval on Mobile
Systems",
journal = j-TECS,
volume = "11",
number = "3",
pages = "66:1--66:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345779",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Mobile systems such as PDAs and cell phones play an
increasing role in handling visual contents such as
images. Thousands of images can be stored in a mobile
system with the advances in storage technology: this
creates the need for better organization and retrieval
of these images. Content Based Image Retrieval (CBIR)
is a method to retrieve images based on their visual
contents. In CBIR, images are compared by matching
their numerical representations called features; CBIR
is computation and memory intensive and consumes
significant amounts of energy. This article examines
energy conservation for CBIR on mobile systems. We
present three improvements to save energy while
performing the computation on the mobile system:
selective loading, adaptive loading, and caching
features in memory. Using these improvements adaptively
reduces the features to be loaded into memory for each
search. The reduction is achieved by estimating the
difficulty of the search. If the images in the
collection are dissimilar, fewer features are
sufficient; less computation is performed and energy
can be saved. We also consider the effect of
consecutive user queries and show how features can be
cached in memory to save energy. We implement a CBIR
algorithm on an HP iPAQ hw6945 and show that these
improvements can save energy and allow CBIR to scale up
to 50,000 images on a mobile system. We further
investigate if energy can be saved by migrating parts
of the computation to a server, called computation
offloading. We analyze the impact of the wireless
bandwidth, server speed, number of indexed images, and
the number of image queries on the energy consumption.
Using our scheme, CBIR can be made energy efficient
under all conditions.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "66",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lee:2012:IMR,
author = "Jaehwan John Lee and Xiang Xiao",
title = "Instant Multiunit Resource Hardware Deadlock Detection
Scheme for System-on-Chips",
journal = j-TECS,
volume = "11",
number = "3",
pages = "67:1--67:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345780",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, a brand new method of determining
deadlock is presented. Most previous deadlock detection
methods are algorithmic in the sense that they usually
leverage some forms of Resource Allocation Graph (RAG)
representations and then algorithms are devised to
manipulate such representations in order to detect
deadlock using information contained in the graph.
Different from all previous methods, the proposed
method actualizes the RAG with a digital circuit and
uses it as a token-transmitting network. By supplying
special input signals (tokens) to the network and
observing the output tokens from the network, it is
easier to identify which process nodes are reachable
from each resource node in the graph. Using the
reachability information, deadlock can be detected
immediately. The time required to obtain the
reachability information is determined by how fast the
combinational circuit operates. Compared with previous
algorithmic methods, the proposed deadlock detection
can be deemed instant. We show that the proposed method
is an order of magnitude faster than the previous
fastest hardware mechanism and several orders of
magnitude faster than traditional software-based
algorithms.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "67",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zappi:2012:NLP,
author = "Piero Zappi and Daniel Roggen and Elisabetta Farella
and Gerhard Tr{\"o}ster and Luca Benini",
title = "Network-Level Power-Performance Trade-Off in Wearable
Activity Recognition: a Dynamic Sensor Selection
Approach",
journal = j-TECS,
volume = "11",
number = "3",
pages = "68:1--68:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345781",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wearable gesture recognition enables context aware
applications and unobtrusive HCI. It is realized by
applying machine learning techniques to data from
on-body sensor nodes. We present an gesture recognition
system minimizing power while maintaining a run-time
application defined performance target through dynamic
sensor selection. Compared to the non managed approach
optimized for recognition accuracy (95\% accuracy), our
technique can extend network lifetime by 4 times with
accuracy {$>$90}\% and by 9 times with accuracy
{$>$70}\%. We characterize the approach and outline its
applicability to other scenarios.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "68",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ambrose:2012:RII,
author = "Jude A. Ambrose and Roshan G. Ragel and Sri
Parameswaran",
title = "Randomized Instruction Injection to Counter Power
Analysis Attacks",
journal = j-TECS,
volume = "11",
number = "3",
pages = "69:1--69:??",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2345770.2345782",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Mon Oct 22 10:44:19 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Side-channel attacks in general and power analysis
attacks in particular are becoming a major security
concern in embedded systems. Countermeasures proposed
against power analysis attacks are data and table
masking, current flattening, dummy instruction
insertion and bit-flips balancing. All these techniques
are either susceptible to multi-order power analysis
attack, not sufficiently generic to cover all
encryption algorithms, or burden the system with high
area, run-time or energy cost. In this article, we
propose a randomized instruction injection technique
(RIJID) that overcomes the pitfalls of previous
countermeasures. RIJID scrambles the power profile of a
cryptographic application by injecting random
instructions at random points of execution and
therefore protects the system against power analysis
attacks. Two different ways of triggering the
instruction injection are also presented: (1)
softRIJID, a hardware/software approach, where special
instructions are used in the code for triggering the
injection at runtime; and (2) autoRIJID, a hardware
approach, where the code injection is triggered by the
processor itself via detecting signatures of encryption
routines at runtime. A novel signature detection
technique is also introduced for identifying encryption
routines within application programs at runtime.
Further, a simple obfuscation metric (RIJIDindex) based
on cross-correlation that measures the scrambling
provided by any code injection technique is introduced,
which coarsely indicates the level of scrambling
achieved. Our processor models cost 1.9\% additional
area in the hardware/software approach and 1.2\% in the
hardware approach for a RISC based processor, and costs
on average 29.8\% in runtime and 27.1\% in energy for
the former and 25.0\% in runtime and 28.5\% in energy
for the later, for industry standard cryptographic
applications.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "69",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Pimentel:2012:ISS,
author = "Andy D. Pimentel and Naehyuck Chang and Mladen
Berekovic",
title = "Introduction to special section {ESTIMedia'09}",
journal = j-TECS,
volume = "11",
number = "4",
pages = "70:1--70:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362337",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "70",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Paterna:2012:VTW,
author = "Francesco Paterna and Andrea Acquaviva and Francesco
Papariello and Giuseppe Desoli and Luca Benini",
title = "Variability-tolerant workload allocation for {MPSoC}
energy minimization under real-time constraints",
journal = j-TECS,
volume = "11",
number = "4",
pages = "71:1--71:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362338",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Sub-50nm CMOS technologies are affected by significant
variability, which causes power and performance
variations among nominally similar cores in MPSoC
platforms. This undesired heterogeneity threatens
execution predictability and energy efficiency. We
propose two techniques to allocate sets of
barrier-synchronized tasks. The first technique models
allocation as an ILP and achieves optimal results, but
requires an offline solver. The second technique adopts
a two-stage heuristic approach, and it can be adapted
to work online. We tested our approach on the virtual
prototype of a next-generation industrial multicore
platform. Experimental results demonstrate that our
approach minimizes deadline violations while increasing
energy efficiency.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "71",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tsutsui:2012:HTP,
author = "Hiroshi Tsutsui and Koichi Hattori and Hiroyuki Ochi
and Yukihiro Nakamura",
title = "A high-throughput pipelined parallel architecture for
{JPEG XR} encoding",
journal = j-TECS,
volume = "11",
number = "4",
pages = "72:1--72:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362339",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "JPEG XR is an emerging image coding standard, based on
HD Photo developed by Microsoft Corporation. It
supports high compression performance twice as high as
the de facto image coding system, namely, JPEG, and
also has an advantage over JPEG 2000 in terms of
computational cost. JPEG XR is expected to be
widespread for many devices including embedded systems
in the near future. In this article, we propose a novel
architecture for JPEG XR encoding. In previous
architectures, entropy coding was the throughput
bottleneck because it was implemented as a sequential
algorithm to handle data with dependency. We found that
there is no dependency in intra-macroblock data, and we
could safely pipeline all the encoding processes
including the entropy coding. In addition, each module
of our architecture, which can be regarded as a
pipeline stage, can be parallelized. As a result, our
architecture can achieve 12.8 pixel/cycle at its
maximum. To demonstrate our architecture, we designed
three versions of our architecture with different
degrees of parallelism of one, two, and four. Our
four-way parallel architecture achieves 579 Mpixel/sec
at 181MHz clock frequency for grayscale images.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "72",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Kim:2012:XFM,
author = "Minyoung Kim and Mark-Oliver Stehr and Carolyn Talcott
and Nikil Dutt and Nalini Venkatasubramanian",
title = "{xTune}: a formal methodology for cross-layer tuning
of mobile embedded systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "73:1--73:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362340",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Resource-limited mobile embedded systems can benefit
greatly from dynamic adaptation of system parameters.
We propose a novel approach that employs iterative
tuning using lightweight formal verification at runtime
with feedback for dynamic adaptation. One objective of
this approach is to enable trade-off analysis across
multiple layers (e.g., application, middleware, OS) and
predict the possible property violations as the system
evolves dynamically over time. Specifically, an
executable formal specification is developed for each
layer of the mobile system under consideration. The
formal specification is then analyzed using statistical
property checking and statistical quantitative
analysis, to determine the impact of various resource
management policies for achieving desired timing/QoS
properties. Integration of formal analysis with dynamic
behavior from system execution results in a feedback
loop that enables model refinement and further
optimization of policies and parameters. We demonstrate
the applicability of this approach to the adaptive
provisioning of resource-limited distributed real-time
systems using a mobile multimedia case study.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "73",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Dick:2012:ISS,
author = "Robert Dick and Li Shang and Nikil Dutt",
title = "Introduction to special section {SCPS'09}",
journal = j-TECS,
volume = "11",
number = "4",
pages = "74:1--74:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362341",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "74",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Koutsoukos:2012:PAM,
author = "Xenofon Koutsoukos and Nicholas Kottenstette and
Joseph Hall and Emeka Eyisi and Heath Leblanc and
Joseph Porter and Janos Sztipanovits",
title = "A passivity approach for model-based compositional
design of networked control systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "75:1--75:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362342",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The integration of physical systems through computing
and networking has become pervasive, a trend now known
as cyber-physical systems (CPS). Functionality in CPS
emerges from the interaction of networked computational
and physical objects. System design and integration are
particularly challenging because fundamentally
different physical and computational design concerns
intersect. The impact of these interactions is the loss
of compositionality which creates tremendous
challenges. The key idea in this article is to use
passivity for decoupling the control design of
networked systems from uncertainties such as time
delays and packet loss, thus providing a fundamental
simplification strategy that limits the complexity of
interactions. The main contribution is the application
of the approach to an experimental case study of a
networked multi-robot system. We present a networked
control architecture that ensures the overall system
remains stable in spite of implementation uncertainties
such as network delays and data dropouts, focusing on
the technical details required for the implementation.
We describe a prototype domain-specific modeling
language and automated code generation tools for the
design of networked control systems on top of passivity
that facilitate effective system configuration,
deployment, and testing. Finally, we present
experimental evaluation results that show decoupling of
interlayer interactions.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "75",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Shin:2012:CTC,
author = "Donghwa Shin and Jaehyun Park and Younghyun Kim and
Jaeam Seo and Naehyuck Chang",
title = "Control-theoretic cyber-physical system modeling and
synthesis: a case study of an active direct methanol
fuel cell",
journal = j-TECS,
volume = "11",
number = "4",
pages = "76:1--76:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362343",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A joint optimization of the physical system and the
cyber world is one of the key problems in the design of
a cyber-physical system (CPS). The major mechanical
forces and/or chemical reactions in a plant are
commonly modified by actuators in the balance-of-plant
(BOP) system. More powerful actuators requires more
power, but generally increase the response of the
physical system powered by the electrical energy
generated by the physical system. To maximize the
overall output of a power generating plant therefore
requires joint optimization of the physical system and
the cyber world, and this is a key factor in the design
of a CPS. We introduce a systematic approach to the
modeling and synthesis of a CPS that emphasize joint
power optimization, using an active direct methanol
fuel cell (DMFC) as a case study. Active DMFC systems
are superior to passive DMFCs in terms of fuel
efficiency thanks to their BOP system, which includes
pumps, air blowers, and fans. However, designing a
small-scale active DMFC with the best overall system
efficiency requires the BOP system to be jointly
optimized with the DMFC stack operation, because the
BOP components are powered by the stack. Our approach
to this synthesis problem involves (i) BOP system
characterization, (ii) integrated DMFC system modeling,
(iii) configuring a system for the maximum net power
output through design space exploration, (iv) synthesis
of feedback control tasks, and (v) implementation.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "76",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Malik:2012:SLA,
author = "Avinash Malik and Zoran Salcic and Christopher Chong
and Salman Javed",
title = "System-level approach to the design of a smart
distributed surveillance system using {SystemJ}",
journal = j-TECS,
volume = "11",
number = "4",
pages = "77:1--77:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362344",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Distributed surveillance systems represent a class of
sensor networks used for object location and tracking,
road traffic monitoring, security, and other purposes.
They are very complex to describe, design, and run.
Because of their sensitivity, they need to be carefully
designed and validated. We present a system-level
approach to modeling and designing such systems using a
new system-level programming language, SystemJ, which
enables designers to describe computational and
communication parts of such applications in a highly
abstract manner. The designed system can be modeled and
validated even before deployment and in that way
contribute to the overall reliability and
trustworthiness of such systems. As an additional tool,
the design environment for specification of the
surveillance system topology, physical and
communication properties, selected sensors and their
interconnectivity with the computing resources was
developed. This tool enables easy composition of
multiple sensors and their respective controllers,
capturing changes of configuration of the system and
underlying communication, and automatic generation of
the formal description of the surveillance system. This
description is then used for the generation of
executable code and/or the templates for detailed
SystemJ application-specific code, as well as for
generation of the operator GUI in a surveillance
system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "77",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Yoong:2012:ICC,
author = "Li Hsien Yoong and Partha S. Roop and Zoran Salcic",
title = "Implementing constrained cyber-physical systems with
{IEC 61499}",
journal = j-TECS,
volume = "11",
number = "4",
pages = "78:1--78:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362345",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Cyber-physical systems (CPS) are integrations of
computation and control with sensing and actuation of
the physical environment. Typically, such systems
consist of embedded computers that monitor and control
physical processes in a feedback loop. While modern
electronic systems are increasingly characterized as
CPS, their design and synthesis still rely on
traditional methods, which lack systematic and
automated techniques for accomplishment. Recently, IEC
61499 has been proposed as a standard for designing
industrial process-control and measurement systems. It
prescribes a component-based approach for developing
industrial automation software using function blocks.
Executable code can then be automatically generated and
simulated from these function blocks. This bodes well
for designers of CPS, who are more likely to be experts
in specific industrial domains, rather than in computer
science. The intuitive graphical nature and automatic
code synthesis of IEC 61499 programs will alleviate the
programming burden of industrial engineers, while
ensuring more reliable software. While software
synthesis from IEC 61499 programs is not new, the
generation of efficient code from them has been
wanting. This has made it difficult for function blocks
to be used in software development for
resource-constrained embedded controllers commonly
employed in CPS. To address this, we present an
approach that can generate very efficient code from
function block descriptions. Experimental results from
a benchmark suite shows that our approach produces
substantially faster and smaller code compared to
existing techniques.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "78",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Subramanian:2012:GOP,
author = "Varun Subramanian and Michael Gilberti and Alex Doboli
and Dan Pescaru",
title = "A goal-oriented programming framework for grid sensor
networks with reconfigurable embedded nodes",
journal = j-TECS,
volume = "11",
number = "4",
pages = "79:1--79:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362346",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Cyber-physical systems (CPS) are large, distributed
embedded systems integrated with various sensors and
actuators. CPS are rapidly emerging as an important
computing paradigm in many modern applications.
Developing CPS applications is currently challenging
due to the sheer complexity of the related
functionality as well as the broad set of constraints
and unknowns that must be tackled during operation.
This article presents a novel high-level programming
model and the supporting optimization and middleware
routines for executing applications on
physically-distributed networks of reconfigurable
embedded systems. The proposed model describes the
optimization goals, sensing inputs, actuation outputs,
events, and constraints of an application, while
leaving to the compiler and execution environment the
task of optimally implementing the derived
functionality. Experimental results discuss the
additional performance optimizations enabled by the
proposed model, and the timing and power consumption of
the middleware routines, and present a temperature
monitoring application implemented on a network of
reconfigurable, embedded processors.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "79",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Tan:2012:ACF,
author = "Rui Tan and Guoliang Xing and Xue Liu and Jianguo Yao
and Zhaohui Yuan",
title = "Adaptive calibration for fusion-based cyber-physical
systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "80:1--80:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362347",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Many Cyber-Physical Systems (CPS) are composed of
low-cost devices that are deeply integrated with
physical environments. As a result, the performance of
a CPS system is inevitably undermined by various
physical uncertainties, which include stochastic
noises, hardware biases, unpredictable environment
changes, and dynamics of the physical process of
interest. Traditional solutions to these issues (e.g.,
device calibration and collaborative signal processing)
work in an open-loop fashion and hence often fail to
adapt to the uncertainties after system deployment. In
this article, we propose an adaptive system-level
calibration approach for a class of CPS systems whose
primary objective is to detect events or targets of
interest. Through collaborative data fusion, our
calibration approach features a feedback control loop
that exploits system heterogeneity to mitigate the
impact of aforementioned uncertainties on the system
performance. In contrast to existing heuristic-based
solutions, our control-theoretical calibration
algorithm can ensure provable system stability and
convergence. We also develop a routing algorithm for
fusion-based multihop CPS systems that is robust to
communication unreliability and delay. Our approach is
evaluated by both experiments on a testbed of Tmotes as
well as extensive simulations based on data traces
gathered from a real vehicle detection experiment. The
results demonstrate that our calibration algorithm
enables a CPS system to maintain the optimal sensing
performance in the presence of various system and
environmental dynamics.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "80",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nam:2012:MTI,
author = "Min-Young Nam and Kyungtae Kang and Rodolfo Pellizzoni
and Kyung-Joon Park and Jung-Eun Kim and Lui Sha",
title = "Modeling towards incremental early analyzability of
networked avionics systems using virtual integration",
journal = j-TECS,
volume = "11",
number = "4",
pages = "81:1--81:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362348",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "With the advance of hardware technology, more features
are incrementally added to already existing networked
systems. Avionics has a stronger tendency to use
preexisting applications due to its complexity and
scale. As resource sharing becomes intense among the
network and the computing modules, it has become a
difficult task for the system designer to make
confident architectural decisions even for incremental
changes. Providing a tailored environment to model and
analyze incremental changes requires a combination of
software tools and hardware support. We have built a
virtual integration tool called ASIIST which can
provide a worst-case end-to-end latency of data that is
sent through a network and the internal bus
architecture of the end-systems. Also, we have devised
a new real-time switching algorithm which guarantees
the worst-case network delay of preexisting network
traffic under feasible conditions. With the real-time
switch support, ASIIST can provide an early modularized
analysis of the end-to-end latency to make
architectural design choices and incremental changes
easier for the user.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "81",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Pajic:2012:RAE,
author = "Miroslav Pajic and Alexander Chernoguzov and Rahul
Mangharam",
title = "Robust architectures for embedded wireless network
control and actuation",
journal = j-TECS,
volume = "11",
number = "4",
pages = "82:1--82:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362349",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Networked cyber-physical systems are fundamentally
constrained by the tight coupling and closed-loop
control of physical processes. To address actuation in
such closed-loop wireless control systems there is a
strong need to rethink the communication architectures
and protocols for reliability, coordination, and
control. We introduce the Embedded Virtual Machine
(EVM), a programming abstraction where controller tasks
with their control and timing properties are maintained
across physical node boundaries and functionality is
capable of migrating to the most competent set of
physical controllers. In the context of process and
discrete control, an EVM is the distributed runtime
system that dynamically selects primary-backup sets of
controllers given spatial and temporal constraints of
the underlying wireless network. EVM-based algorithms
allow network control algorithms to operate seamlessly
over less reliable wireless networks with topological
changes. They introduce new capabilities such as
predictable outcomes during sensor/actuator failure,
adaptation to mode changes, and runtime optimization of
resource consumption. An automated design flow from
Simulink to platform-independent domain-specific
languages, and subsequently, to platform-dependent code
generation is presented. Through case studies in
discrete and process control we demonstrate the
capabilities of EVM-based wireless network control
systems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "82",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Lakshmanan:2012:OPM,
author = "Karthik Lakshmanan and Dionisio {De Niz} and
Ragunathan (Raj) Rajkumar and Gabriel Moreno",
title = "Overload provisioning in mixed-criticality
cyber-physical systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "83:1--83:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362350",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Cyber-physical systems are an emerging class of
applications that require tightly coupled interaction
between the computational and physical worlds. These
systems are typically realized using sensor/actuator
interfaces connected with processing backbones. Safety
is a primary concern in cyber-physical systems since
the actuators directly influence the physical world.
However, unexpected or unusual conditions in the
physical world can manifest themselves as increased
workload demands being offered to the computational
infrastructure of a cyber-physical system. Guaranteeing
system safety under overload conditions is therefore a
prime concern in developing and deploying
cyber-physical systems. In this work, we study this
problem in the context of a radar surveillance system,
where tasks have different levels of criticality or
influence on system safety. In the face of overloads,
we observe that the desirable property in such systems
is that the more critical tasks continue to meet their
timing requirements. We capture this mixed-criticality
overload requirement using a formal overload-tolerance
metric called ductility. Using this overload-tolerance
metric, we first develop our solution in the context of
uniprocessor systems, where we show that Zero-Slack
scheduling (ZS) algorithms can be used to improve the
overload behavior in mixed-criticality cyber-physical
systems compared to existing fixed-priority scheduling
algorithms like Rate-Monotonic Scheduling (RMS) and
Criticality-As-Priority-Assignment (CAPA). Leveraging
these results, we then develop a criticality-aware task
allocation algorithm called Compress-on-Overload
Packing (COP) for dealing with multiprocessor
cyber-physical systems. Evaluation results show that
COP achieves up to five times better ductility than
traditional load balancing bin-packing algorithms like
Worst-Fit Decreasing (WFD). Finally, we apply ZS and
COP to the radar surveillance system to demonstrate the
resulting improvement in system overload behavior. Our
implementation of the Zero-Slack scheduler is available
as a part of the Linux/RK project, which provides
resource kernel extensions for Linux.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "83",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Woehrle:2012:CTC,
author = "Matthias Woehrle and Kai Lampka and Lothar Thiele",
title = "Conformance testing for cyber-physical systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "84:1--84:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362351",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Cyber-Physical Systems (CPS) require a high degree of
reliability and robustness. Hence it is important to
assert their correctness with respect to
extra-functional properties, like power consumption,
temperature, etc. In turn the physical quantities may
be exploited for assessing system implementations. This
article develops a methodology for utilizing
measurements of physical quantities for testing the
conformance of a running CPS with respect to a formal
description of its required behavior allowing to
uncover defects. We present foundations and
implementations of this approach and demonstrate its
usefulness by conformance testing power measurements of
a wireless sensor node with a formal model of its power
consumption.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "84",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhu:2012:OTA,
author = "Qi Zhu and Haibo Zeng and Wei Zheng and Marco {Di
Natale} and Alberto Sangiovanni-Vincentelli",
title = "Optimization of task allocation and priority
assignment in hard real-time distributed systems",
journal = j-TECS,
volume = "11",
number = "4",
pages = "85:1--85:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362352",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The complexity and physical distribution of modern
active safety, chassis, and powertrain automotive
applications requires the use of distributed
architectures. Complex functions designed as networks
of function blocks exchanging signal information are
deployed onto the physical HW and implemented in a SW
architecture consisting of a set of tasks and messages.
The typical configuration features priority-based
scheduling of tasks and messages and imposes end-to-end
deadlines. In this work, we present and compare
formulations and procedures for the optimization of the
task allocation, the signal to message mapping, and the
assignment of priorities to tasks and messages in order
to meet end-to-end deadline constraints and minimize
latencies. Our formulations leverage worst-case
response time analysis within a mixed integer linear
optimization framework and are compared for performance
against a simulated annealing implementation. The
methods are applied for evaluation to an automotive
case study of complexity comparable to industrial
design problems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "85",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Cucinotta:2012:ART,
author = "Tommaso Cucinotta and Fabio Checconi and Luca Abeni
and Luigi Palopoli",
title = "Adaptive real-time scheduling for legacy multimedia
applications",
journal = j-TECS,
volume = "11",
number = "4",
pages = "86:1--86:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362353",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Multimedia applications are often executed on standard
personal computers. The absence of established
standards has hindered the adoption of real-time
scheduling solutions in this class of applications.
Developers have adopted a wide range of heuristic
approaches to achieve an acceptable timing behavior but
the result is often unreliable. We propose a mechanism
to extend the benefits of real-time scheduling to
legacy applications based on the combination of two
techniques: (1) a real-time monitor that observes and
infers the activation period of the application, and
(2) a feedback mechanism that adapts the scheduling
parameters to improve its real-time performance.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "86",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Scharfenberger:2012:RIP,
author = "Christian Scharfenberger and Samarajiit Chakraborty
and Georg F{\"a}rber",
title = "Robust image processing for an omnidirectional
camera-based smart car door",
journal = j-TECS,
volume = "11",
number = "4",
pages = "87:1--87:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2362354",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Over the last decade, there has been an increasing
emphasis on driver-assistance systems for the
automotive domain. In this article, we report our work
on designing a camera-based surveillance system
embedded in a ``smart'' car door. Such a camera is used
to monitor the ambient environment outside the car, for
instance, the presence of obstacles such as approaching
cars or cyclists who might collide with the car door if
opened-and automatically control the car door
operations. This is an enhancement to the currently
available side-view mirrors that the driver/passenger
checks before opening the car door. The focus of this
article is on fast and robust image processing
algorithms specifically targeting such a smart car door
system. The requirement is to quickly detect traffic
objects of interest from grayscale images captured by
omnidirectional cameras. While known algorithms for
object extraction from the image processing literature
rely on color information and are sensitive to shadows
and illumination changes, our proposed algorithms are
highly robust, can operate on grayscale images (color
images are not available in our setup), and output
results in real time. We present a number of
experimental results based on image sequences captured
from real-life traffic scenarios to demonstrate the
applicability of our algorithm.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "87",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Gordon-Ross:2012:CCR,
author = "Ann Gordon-Ross and Frank Vahid and Nikil Dutt",
title = "Combining code reordering and cache configuration",
journal = j-TECS,
volume = "11",
number = "4",
pages = "88:1--88:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2399177",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The instruction cache is a popular optimization target
due to the cache's high impact on system performance
and power and because of the cache's predictable
temporal and spatial locality. This article is an in
depth study on the interaction of code reordering (a
long-known technique) and cache configuration (a
relatively new technique). Experimental results show
that code reordering coupled with cache configuration
reveals additional energy savings as high as 10--15\%
for several benchmarks with reduced cache area as high
as 48\%. To exploit these additional benefits, we
architect and evaluate several design exploration
heuristics for combining these two methods.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "88",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Baiocchi:2012:EDB,
author = "Jos{\'e} A. Baiocchi and Bruce R. Childers and Jack W.
Davidson and Jason D. Hiser",
title = "Enabling dynamic binary translation in embedded
systems with scratchpad memory",
journal = j-TECS,
volume = "11",
number = "4",
pages = "89:1--89:??",
month = dec,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1145/2362336.2399178",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Thu Jan 10 17:38:16 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Important challenges for embedded systems can be
addressed by dynamic binary translation. A dynamic
binary translator stores translated instructions in a
software-managed code cache, which is usually large to
minimize overhead. This article shows how to use a
small scratchpad memory for the code cache. A small
code cache may require frequent code evictions and
retranslation, which degrade performance. We propose
techniques to reduce the number of instructions
inserted by the translator and a way to form fragments
that minimizes translated code size. With our
techniques, a much smaller code cache can hold a
program's translated code working set.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "89",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Khalgui:2013:ISI,
author = "Mohamed Khalgui and Zhiwu Li",
title = "Introduction to the {Special Issue on Modeling and
Verification of Discrete Event Systems}",
journal = j-TECS,
volume = "12",
number = "1",
pages = "1:1--1:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406337",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "1",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wang:2013:DLE,
author = "Shouguang Wang and Chengying Wang and Yanping Yu",
title = "Design of Liveness-Enforcing Supervisors for {S3PR}
Based on Complementary Places",
journal = j-TECS,
volume = "12",
number = "1",
pages = "2:1--2:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406338",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article, an algorithm is proposed to design
liveness-enforcing supervisors for systems of simple
sequential processes with resources (S$^3$PR) based on
complementary places. Firstly, a mixed integer
programming (MIP) based deadlock detection method is
used to find unmarked strict minimal siphons from an
infinite-capacity net. Next, the finite-capacity net,
in which liveness can be enforced, is obtained by
adding capacity function to the infinite-capacity net.
Finally, complementary-place transformation is used to
transform the finite-capacity net into an
infinite-capacity net. This article focuses on adding a
complementary place to each operation place that is
related to unmarked siphons, deals with the deadlock
problem from a new view point, and hence advances the
deadlock control theory. Compared with the existing
methods, the new policy is easier to implement for real
industrial systems. More importantly, design of a
complementary-place supervisor is very easy. Finally,
in some cases, the new policy can obtain a structurally
simpler supervisor with more permissive behavior than
the existing methods do. A flexible manufacturing
systems (FMS) example is used to compare the proposed
policy with some other methods.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "2",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chen:2013:CMS,
author = "Yufeng Chen and Gaiyun Liu",
title = "Computation of Minimal Siphons in {Petri} Nets by
Using Binary Decision Diagrams",
journal = j-TECS,
volume = "12",
number = "1",
pages = "3:1--3:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406339",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Siphons play an important role in the development of
deadlock control methods by using Petri nets. The
number of siphons increases exponentially with respect
to the size of a Petri net. This article presents a
symbolic approach to the computation of minimal siphons
in Petri nets by using binary decision diagrams (BDD).
The siphons of a Petri net can be found via a set of
logic conditions. The logic conditions are symbolically
modeled by using Boolean algebras. The operations of
Boolean algebras are implemented by BDD that are
capable of representing large sets of siphons with
small shared data structures. The proposed method first
uses BDD to compute all siphons of a Petri net and then
a binary relation is designed to extract all minimal
siphons. Finally, by using a number of examples, the
efficiency of the proposed method is verified through
different-sized problems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "3",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ding:2013:DAV,
author = "Zhijun Ding and Changjun Jiang and Mengchu Zhou",
title = "Design, Analysis and Verification of Real-Time Systems
Based on Time {Petri} Net Refinement",
journal = j-TECS,
volume = "12",
number = "1",
pages = "4:1--4:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406340",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A type of refinement operations of time Petri nets is
presented for design, analysis and verification of
complex real-time systems. First, the behavior
preservation is studied under time constraints in a
refinement operation, and a sufficient condition for
behavior preservation is obtained. Then, the property
preservation is considered, and the results indicate
that if the refinement operation of time Petri nets
satisfies behavior preservation, it can also preserve
properties such as boundedness and liveness. Finally,
based on the behavior preservation, a reachability
decidability algorithm of a refined time Petri net is
designed using the reachability trees of its original
net and subnet. The research results are illustrated by
an example of designing, analyzing and verifying a
real-time manufacturing system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "4",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{McInnes:2013:MAT,
author = "Allan I. McInnes",
title = "Modeling and Analysis of {TinyOS} Sensor Node
Firmware: a {CSP} Approach",
journal = j-TECS,
volume = "12",
number = "1",
pages = "5:1--5:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406341",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Wireless sensor networks are an increasingly popular
application area for embedded systems. Individual
sensor nodes within a network are typically
resource-constrained, event-driven, and require a high
degree of concurrency. This combination of requirements
motivated the development of the widely used TinyOS
sensor node operating system. The TinyOS concurrency
model is a lightweight nonpreemptive system designed to
suit the needs of typical sensor network applications.
Although the TinyOS concurrency model is easier to
reason about than preemptive threads, it can still give
rise to undesirable behavior due to unexpected
interleavings of related tasks, or unanticipated
preemption by interrupt handlers. To aid TinyOS
developers in understanding the behavior of their
programs we have developed a technique for using the
process algebra Communicating Sequential Processes
(CSP) to model the interactions between TinyOS
components, and between an application and the TinyOS
scheduling and preemption mechanisms. Analysis of the
resulting models can help TinyOS developers to discover
and diagnose concurrency-related errors in their
designs that might otherwise go undetected until after
the application has been widely deployed. Such analysis
is particularly valuable for the TinyOS components that
are used as building blocks for a large number of other
applications, since a subtle or sporadic error in a
widely deployed building block component could be
extremely costly to repair.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "5",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Godary-Dejean:2013:FVD,
author = "Karen Godary-Dejean and David Andreu",
title = "Formal Validation of a Deterministic {MAC} Protocol",
journal = j-TECS,
volume = "12",
number = "1",
pages = "6:1--6:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406342",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article deals with the formal validation of
STIMAP, a medium access protocol that has been designed
to meet the specific requirements of an implantable
network-based neuroprosthesis. This article presents
the modeling and the validation of its medium access,
using model checking on Time Petri Nets. Doing so, we
show that existent formal methods and tools are not
perfectly suitable for the validation of real systems,
especially when some hardware parameters have to be
considered. This article then presents how these
difficulties have been managed during the modeling and
verification phases, and gives the validation results
for STIMAP, providing constraints to respect.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "6",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Boucheneb:2013:RIS,
author = "Hanifa Boucheneb and Kamel Barkaoui",
title = "Reducing Interleaving Semantics Redundancy in
Reachability Analysis of Time {Petri} Nets",
journal = j-TECS,
volume = "12",
number = "1",
pages = "7:1--7:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406343",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The main problem of verification techniques based on
exploration of (reachable) state space is the state
explosion problem. In timed models, abstract states
reached by different interleavings of the same set of
transitions are, in general, different and their union
is not necessarily an abstract state. To attenuate this
state explosion, it would be interesting to reduce the
redundancy caused by the interleaving semantics by
agglomerating all these abstract states whenever their
union is an abstract state. This article considers the
time Petri net model and establishes some sufficient
conditions that ensure that this union is an abstract
state. In addition, it proposes a procedure to compute
this union without computing beforehand intermediate
abstract states. Finally, it shows how to use this
result to improve the reachability analysis.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "7",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhang:2013:SCE,
author = "Zhiming Zhang and Weimin Wu",
title = "Sequence Control of Essential Siphons for Deadlock
Prevention in {Petri} Nets",
journal = j-TECS,
volume = "12",
number = "1",
pages = "8:1--8:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406344",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Deadlock prevention is crucial to the modeling of
flexible manufacturing systems. In the Petri net
framework, deadlock prevention is often addressed by
siphon-based control (SC) policies. Recent research
results show that SC methods can avoid full siphon
enumeration by using mixed integer programming (MIP) to
greatly increase the computational efficiency so that
it can be applied in large systems in computable time.
Besides, maximally permissive control solutions can be
obtained by means of iterative siphon control (ISC)
approaches and MIP. Then the remaining problems are
redundancy and MIP iterations. Redundant controllers
make the closed-loop system more complicated and each
MIP iteration increases the total computational time.
This article proposes a revised ISC deadlock prevention
policy which can achieve better results than the other
reported methods in terms of redundancy and MIP
iterations while maintaining the maximal
permissiveness. Several benchmark examples are provided
to illustrate the proposed approach and to be compared
with the other reported methods.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "8",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Ahmed:2013:HGA,
author = "Zakir Hussain Ahmed",
title = "A Hybrid Genetic Algorithm for the {Bottleneck
Traveling Salesman Problem}",
journal = j-TECS,
volume = "12",
number = "1",
pages = "9:1--9:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406345",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The bottleneck traveling salesman problem is to find a
Hamiltonian circuit that minimizes the largest cost of
any of its arcs in a graph. A simple genetic algorithm
(GA) using sequential constructive crossover has been
developed to obtain heuristic solution to the problem.
The hybrid GA incorporates 2-opt search, another
proposed local search and immigration to the simple GA
for obtaining better solution. The efficiency of our
hybrid GA to the problem against two existing heuristic
algorithms has been examined for some symmetric TSPLIB
instances. The comparative study shows the
effectiveness of our hybrid algorithm. Finally, we
present solutions to the problem for asymmetric TSPLIB
instances.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "9",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Wu:2013:OSL,
author = "Naiqi Wu and Mengchu Zhou and Gang Hu",
title = "One-Step Look-Ahead Maximally Permissive Deadlock
Control of {AMS} by Using {Petri} Nets",
journal = j-TECS,
volume = "12",
number = "1",
pages = "10:1--10:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406346",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "It is desired that a deadlock control policy for
automated manufacturing systems (AMS) is maximally
permissive. However, its tractability issue remains
open, and this work addresses this important issue. It
models AMS with a resource-oriented Petri net (ROPN)
and presents a necessary and sufficient condition under
which there exists a one-step look-ahead maximally
permissive control policy for deadlock avoidance in
AMS. It further identifies some conditions under which
a one-step look-ahead maximally permissive deadlock
control policy exists for a single-capacity system. The
conditions can be conveniently examined by using the
developed ROPN model.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "10",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Huang:2013:TBD,
author = "Yi-Sheng Huang and Yen-Liang Pan and Pin-June Su",
title = "Transition-Based Deadlock Detection and Recovery
Policy for {FMSs} Using Graph Technique",
journal = j-TECS,
volume = "12",
number = "1",
pages = "11:1--11:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406347",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "A transition-controlled deadlock detection and
recovery prevention policy is presented for a subclass
of Petri nets used to model flexible manufacturing
systems. The subclass is called systems of simple
sequential processes with resources (S$^3$PR). The
proposed policy is different from the standard deadlock
prevention policies. Instead of adding control places,
this policy adds a controlled transition to solve a
group of deadlocked markings that have the same
graph-based property. Finally, the results of our study
indicate that the proposed policy appears to be more
permissive than those existing ones that add control
places.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "11",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nazemzadeh:2013:FMD,
author = "Payam Nazemzadeh and Abbas Dideban and Meisam
Zareiee",
title = "Fault Modeling in Discrete Event Systems Using {Petri}
Nets",
journal = j-TECS,
volume = "12",
number = "1",
pages = "12:1--12:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406348",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "In this article a model-based controller
reconfiguration method for fault-tolerant control of
discrete event systems has been introduced. In this
method, we model the fault conditions for each
specified fault as a new model called fault model. The
system then consists of three different models called
process, specification and fault. The faulty parts of
the system are not permitted to do any job and the
controller tries to enforce the specifications by other
parts of the system. With this method, the controller
reconfiguration problem for fault- tolerant control of
discrete event systems converts to the problem of
synchronizing the process, specification and fault
model. We must synthesize a supervisor that can enforce
both specifications and faults status. If this
supervisor can be determined, we can achieve a
fault-tolerant controller. Implementing both
specification and fault models in the system, may lead
to a large number of forbidden states and constraints
and so on a more complicated forbidden states problem
must be solved. The application of constraints
simplification methods is shown. By the existing
methods for offline simplifying of constraints, we can
arrive at a simplified fault tolerant controller.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "12",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mhamdi:2013:FMT,
author = "Tarek Mhamdi and Osman Hasan and Sofi{\`e}ne Tahar",
title = "Formalization of Measure Theory and {Lebesgue}
Integration for Probabilistic Analysis in {HOL}",
journal = j-TECS,
volume = "12",
number = "1",
pages = "13:1--13:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406349",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Dynamic systems that exhibit probabilistic behavior
represent a large class of man-made systems such as
communication networks, air traffic control, and other
mission-critical systems. Evaluation of quantitative
issues like performance and dependability of these
systems is of paramount importance. In this paper, we
propose a generalized methodology to formally reason
about probabilistic systems within a theorem prover. We
present a formalization of measure theory in the HOL
theorem prover and use it to formalize basic concepts
from the theory of probability. We also use the
Lebesgue integration to formalize statistical
properties of random variables. To illustrate the
practical effectiveness of our methodology, we formally
prove classical results from the theories of
probability and information and use them in a data
compression application in HOL.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "13",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Khalgui:2013:RRE,
author = "Mohamed Khalgui and Olfa Mosbahi and Zhiwu Li",
title = "Runtime Reconfigurations of Embedded Controllers",
journal = j-TECS,
volume = "12",
number = "1",
pages = "14:1--14:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406350",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The article deals with Reconfigurable Embedded Control
Systems following different Component-based
Technologies and/or Architecture Description Languages
used today in Industry. We define a Control Component
as a software unit to support control tasks of the
system which is assumed to be a network of components
with precedence constraints. We define an agent-based
architecture to handle automatic reconfigurations under
well-defined conditions by creating, deleting or
updating components to bring the whole system into safe
and optimal behaviors. To cover all possible
reconfiguration forms, we model the agent by nested
state machines according to the formalism Net
Condition/Event Systems (abbr. NCES) which is an
extension of Petri nets. We apply in addition a model
checking to verify functional and extra-functional
properties according to the temporal logic
``Computation Tree Logic'' (abbr. CTL). The goal is to
check the agent's reactivity after any evolution of the
environment. Several complex networks can implement the
system such that each one is executed at a given time
when a corresponding reconfiguration scenario is
automatically applied by the agent. To check the
correctness of each one of them, we apply in several
steps a refinement-based approach that automatically
specifies feasible Control Components according to
NCES. The model checker SESA is automatically applied
in each step to verify deadlock properties of new
generated components, and is manually used to verify
CTL-based properties according to user requirements.
Two Industrial Benchmark Production Systems FESTO and
EnAS available in our research laboratory are applied
to explain the article's contributions.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "14",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mery:2013:FSM,
author = "Dominique M{\'e}ry and Neeraj Kumar Singh",
title = "Formal Specification of Medical Systems by Proof-Based
Refinement",
journal = j-TECS,
volume = "12",
number = "1",
pages = "15:1--15:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406351",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "Formal methods have emerged as an alternative approach
to ensuring quality and correctness of highly critical
systems, overcoming limitations of traditional
validation techniques such as simulation and testing.
We propose a refinement-based methodology for complex
medical systems design, which possesses all the
required key features. A refinement-based combined
approach of formal verification, model validation using
a model-checker and refinement chart is proposed in
this methodology for designing a high-confidence
medical device. Furthermore, we show the effectiveness
of this methodology for the design of a cardiac
pacemaker system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "15",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Mosbahi:2013:CFM,
author = "Olfa Mosbahi",
title = "Combining Formal Methods for the Development of
Reactive Systems",
journal = j-TECS,
volume = "12",
number = "1",
pages = "16:1--16:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406352",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article deals with the use of two verification
approaches: theorem proving and model checking. We
focus on the Event-B method by using its associated
theorem proving tool (Click\_n\_Prove), and on the
language TLA$^+$ by using its model checker TLC. By
considering the limitation of the Event-B method to
invariance properties, we propose to apply the language
TLA$^+$ to verify liveness properties on a software
behavior. We extend first the expressivity and the
semantics of a B model (called temporal B model) to
deal with the specification of fairness and eventuality
properties. Second, we give transformation rules from a
temporal B model into a TLA$^+$ module. We present in
particular, our prototype system called B2TLA$^+$, that
we have developed to support this transformation; then
we can verify these properties thanks to the model
checker TLC on finite state systems. For the
verification of infinite-state systems, we propose the
use of the predicate diagrams. We illustrate our
approach on a case study of a parcel sorting system.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "16",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Sunder:2013:FVD,
author = "Christoph S{\"u}nder and Valeriy Vyatkin and Alois
Zoitl",
title = "Formal Verification of Downtimeless System Evolution
in Embedded Automation Controllers",
journal = j-TECS,
volume = "12",
number = "1",
pages = "17:1--17:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406353",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "This article presents a new formal approach to
validation of on-the-fly modification of control
software in automation systems. The concept of
downtimeless system evolution (DSE) is introduced. The
DSE is essentially based on the use of IEC 61499 system
architecture and formal modeling and verification of
the hardware and software of an automation device. The
validation is performed by means of two complimentary
techniques: analytic calculations and formal
verification by model-checking.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "17",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Khalgui:2013:DRA,
author = "Mohamed Khalgui",
title = "Distributed Reconfigurations of Autonomous {IEC61499}
Systems",
journal = j-TECS,
volume = "12",
number = "1",
pages = "18:1--18:??",
month = jan,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2406336.2406354",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Fri Jan 25 17:38:43 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "The article deals with Distributed Multiagent
Reconfigurable Embedded Control Systems following the
International Industrial Standard IEC61499 in which a
Function Block (Abbreviated by FB) is an
event-triggered software component owning data and a
control system is a network of distributed blocks. We
define a multiagent embedded architecture in which a
Reconfiguration Agent is affected to each device of the
execution environment to apply local reconfigurations,
and a Coordination Agent is proposed for coordination
between devices in order to guarantee safe and coherent
distributed reconfigurations. A Communication Protocol
is proposed to handle such coordination by using
well-defined Coordination Matrices. A prototype is
developed to simulate the whole architecture when
faults occur or system's optimizations are applied. We
specify Reconfiguration Agents to be modeled by nested
state machines, and the Coordination Agent according to
the formalism Net Condition/Event Systems (Abbreviated
by NCES) which is an extension of Petri nets. To allow
correct and coherent distributed reconfigurations, we
check all possible interactions between controllers by
verifying that whenever a reconfiguration is applied in
a device, the Coordination Agent and other concerned
devices react as described in user requirements. We
propose finally XML-based implementations of both
Coordination and Reconfiguration Agents according to
the technology IEC61499. The article's contributions
are applied to two Benchmark Production Systems
available in our research laboratory.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "18",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Chen:2013:ISS,
author = "Jian-Jia Chen and Maurizio Palesi",
title = "Introduction to the special section on
{ESTIMedia'12}",
journal = j-TECS,
volume = "12",
number = "1s",
pages = "32:1--32:??",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2435227.2435228",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Mar 19 07:54:21 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "32",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Nikitakis:2013:NLP,
author = "Antonis Nikitakis and Savvas Papaioannou and Ioannis
Papaefstathiou",
title = "A novel low-power embedded object recognition system
working at multi-frames per second",
journal = j-TECS,
volume = "12",
number = "1s",
pages = "33:1--33:??",
month = mar,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1145/2435227.2435229",
ISSN = "1539-9087 (print), 1558-3465 (electronic)",
ISSN-L = "1539-9087",
bibdate = "Tue Mar 19 07:54:21 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/tecs.bib",
abstract = "One very important challenge in the field of
multimedia is the implementation of fast and detailed
Object Detection and Recognition systems. In
particular, in the current state-of-the-art mobile
multimedia systems, it is highly desirable to detect
and locate certain objects within a video frame in real
time. Although a significant number of Object Detection
and Recognition schemes have been developed and
implemented, triggering very accurate results, the vast
majority of them cannot be applied in state-of-the-art
mobile multimedia devices; this is mainly due to the
fact that they are highly complex schemes that require
a significant amount of processing power, while they
are also time consuming and very power hungry. In this
article, we present a novel FPGA-based embedded
implementation of a very efficient object recognition
algorithm called Receptive Field Cooccurrence
Histograms Algorithm (RFCH). Our main focus was to
increase its performance so as to be able to handle the
object recognition task of today's highly sophisticated
embedded multimedia systems while keeping its energy
consumption at very low levels. Our low-power embedded
reconfigurable system is at least 15 times faster than
the software implementation on a low-voltage high-end
CPU, while consuming at least 60 times less energy. Our
novel system is also 88 times more energy efficient
than the recently introduced low-power multi-core Intel
devices which are optimized for embedded systems. This
is, to the best of our knowledge, the first system
presented that can execute the complete complex object
recognition task at a multi frame per second rate while
consuming minimal amounts of energy, making it an ideal
candidate for future embedded multimedia systems.",
acknowledgement = ack-nhfb,
ajournal = "ACM Trans. Embed. Comput. Syst.",
articleno = "33",
fjournal = "ACM Transactions on Embedded Computing Systems",
journal-URL = "https://dl.acm.org/loi/tecs",
}
@Article{Zhai:2013:MSA,
author = "Jiali Teddy Zhai and Hristo Nikolov and Todor
Stefanov",
title = "Mapping of strea