Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Published on Nov 14, 2016 in International Conference on Embedded Networked Sensor Systems
Amit Levy7
Estimated H-index: 7
(Stanford University),
Bradford Campbell6
Estimated H-index: 6
(University of Michigan)
+ 4 AuthorsPrabal Dutta38
Estimated H-index: 38
(University of Michigan)
For the last fifteen years, research explored the hardware, software, sensing, communication abstractions, languages, and protocols that could make networks of small, embedded devices---motes---sample and report data for long periods of time while unattended. Today, the application and technological landscapes have shifted, introducing new requirements and new capabilities. Hardware has evolved past 8 and 16 bit microcontrollers: there are now 32 bit processors with lower energy budgets a...
Source Cite
Published on Nov 3, 2014 in International Conference on Embedded Networked Sensor Systems
Pat Pannuto10
Estimated H-index: 10
(University of Michigan),
Michael P. Andersen6
Estimated H-index: 6
(University of California, Berkeley)
+ 5 AuthorsPrabal Dutta38
Estimated H-index: 38
(University of Michigan)
For the last fifteen years, research explored the hardware, software, sensing, communication abstractions, languages, and protocols that could make networks of small, embedded devices---motes---sample and report data for long periods of time unattended. Today, the application and technological landscapes have shifted, introducing new requirements and new capabilities. Hardware has evolved past 8 and 16 bit microcontrollers: there are now 32 bit processors with lower energy budgets and gre...
5 Citations Source Cite
Published on Jun 7, 2004 in Design Automation Conference
Paul C. Kocher35
Estimated H-index: 35
(Cryptography Research),
Ruby B. Lee44
Estimated H-index: 44
(Princeton University)
+ 2 AuthorsSrivaths Ravi13
Estimated H-index: 13
(NEC)
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded systems, which will be ubiquitously used to capture, store, manipulate, and access data of a sensitive nature, pose several unique and interesting security challenges. Security has been the subject of intensive research in the areas of cryptography, computing, and networking. However, despite these eff...
276 Citations Source Cite
Published on Jul 1, 2017 in Application-Specific Systems, Architectures, and Processors
Arman Pouraghily1
Estimated H-index: 1
(University of Massachusetts Amherst),
Tilman Wolf27
Estimated H-index: 27
(University of Massachusetts Amherst),
Russell Tessier29
Estimated H-index: 29
(University of Massachusetts Amherst)
Internet-connected embedded systems have limited capabilities to defend themselves against remote hacking attacks. The potential effects of such attacks, however, can have a significant impact in the context of the Internet of Things, industrial control systems, smart health systems, etc. Embedded systems cannot effectively utilize existing software-based protection mechanisms due to limited processing capabilities and energy resources. We propose a nove...
Source Cite
Published on Apr 1, 2018 in Real Time Technology and Applications Symposium
Oleg Iegorov1
Estimated H-index: 1
,
Sebastian Fischmeister15
Estimated H-index: 15
(University of Waterloo)
Real-time embedded systems have evolved from simple, self-contained single-processor computers to distributed multiprocessor systems that are extremely hard to develop and maintain. Execution tracing has proved itself to be a useful technology to gain a detailed knowledge of runtime behavior of software systems. However, the size and complexity of execution traces generated by modern embedded systems make manual trace analysis impossible. Therefore, soft...
Source Cite
Published on Dec 1, 1995 in International Conference on Computer Aided Design
Ti-Yen Yen9
Estimated H-index: 9
,
Wayne H. Wolf50
Estimated H-index: 50
(Princeton University)
Abstract: Communication synthesis is an essential step in hardware-software co-synthesis: many embedded systems use custom communication topologies and the communication links are often a significant part of the system cost. This paper describes new techniques for the analysis and synthesis of the communication requirements of embedded systems during co-synthesis. Our analysis algorithm derives delay bounds on communication in the system given an allocat...
190 Citations Source Cite
Published on Jun 5, 2011 in Design Automation Conference
Gernot Heiser40
Estimated H-index: 40
(University of New South Wales)
Platform virtualization, which supports the co-existence of multiple operating-system environments on a single physical platform, is now commonplace in server computing, as it can provide similar isolation as separate physical servers, but with improved resource utilisation. In the embedded space, virtualization is a new development, which is likely to become more widespread in the next few years. Unlike the server world, where virtualized systems typically run multiple copi...
23 Citations Source Cite
Published on Jan 1, 2005 in Real Time Technology and Applications Symposium
Zhengting He2
Estimated H-index: 2
,
Aloysius K. Mok35
Estimated H-index: 35
(University of Texas at Austin),
Cheng Peng2
Estimated H-index: 2
(Texas Instruments)
With processor speed doubling every 18 months, more and more system functionalities are implemented as software (SW) in the design process of embedded systems. Selecting the "right" RTOS before the SW is developed is very important. In this paper, we present an RTOS modeling tool based on SystemC. It is configurable to support modeling and timed simulation of most popular embedded RTOSs. Timing fidelity is achieved by using delay annotation. The OS timing information ...
38 Citations Source Cite
Published on Oct 9, 2011 in Embedded Software
Saddek Bensalem25
Estimated H-index: 25
,
Kees Goossens31
Estimated H-index: 31
(Eindhoven University of Technology)
+ 3 AuthorsJoseph Sifakis47
Estimated H-index: 47
(Centre national de la recherche scientifique)
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embedded-systems architectures and design processes consider "non-functional" properties such as time, energy, and reliability as an afterthought, when functional correctness has (hopefully) been achieved. As a result, embedded systems are often fragile in their real-time behaviour, and take longer to design and test than planned. Several techniques h...
4 Citations Source Cite
Published on Oct 12, 2014 in Embedded Software
Husheng Zhou3
Estimated H-index: 3
(University of Texas at Dallas),
Cong Liu15
Estimated H-index: 15
(University of Texas at Dallas)
Graphics processing units are being widely used in embedded systems as they can achieve high performance and energy efficiency. In such systems, the problem of computation and data mapping for multiple applications while minimizing the completion time is quite challenging due to a large size of the policy space, including heterogeneous application characteristics, complex application structure, data communication costs, and data partitioning. To achieve fast competition time...
7 Citations Source Cite