The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Partial reconfiguration is a promising technique in the design of embedded systems since it enables an increase in efficiency and flexibility. However, its usage is still challenging due to the constraints of current FPGAs. In this paper, we present an extension of the Xilinx Python package ‘pynq’ to ease the usage of partial reconfigurable bitstreams. The pynq package belongs to Xilinx's open source...
Given the recent difficulty in continuing the classic CMOS manufacturing density and power scaling curves, also known as Moore's Law and Dennard Scaling, respectively, we find that modern complex system architectures are increasingly relying upon accelerators in order to optimize the placement of specific computational workloads. In addition, large-scale computing infrastructures utilized in HPC,...
Hardware design is an essential part of research in high performance computing. Initial efforts in hardware research consist of analyzing the design ideas in a software simulator. This allows chip designers to minimize amount of manufacturing that would be too costly and to avoid doing FPGA designs which are even more time consuming. Simulating a hardware design involves running many tests that try...
In this contribution, we present a coverage driven functional verification environment based on the UVM framework and the System Verilog language to certify the operational correctness of the ECC error management logic used in volatile and nonvolatile memories. We apply this methodology to floatinggate nonvolatile memories for the embedded market, which requires a read error rate of 10−14. The proposed...
Cyber-Physical Systems (CPS) consist of embedded computers with sensing and actuation capability, and are integrated into and tightly coupled with a physical system. Because the physical and cyber components of the system are tightly coupled, cyber-security is important for ensuring the system functions properly and safely. However, the effects of a cyberattack on the whole system may be difficult...
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying...
This paper focuses on culture and software development tools issues with respect to the development of a proposed Culture Aware Reference Architecture (CARA) for the delivery of culture competent mobile oriented solutions through culture awareness. The paper presents a discussion of selected architectural design approaches, tools or methodologies that were considered and applied across defined architectural...
Clustering is a crucial tool for analyzing data in virtually every scientific and engineering discipline. The U.S. National Academy of Sciences (NAS) has recently announced "the seven giants of statistical data analysis" in which data clustering plays a central role [1]. This research also emphasizes that more scalable solutions are required to enable time and space clustering for the future...
Many services are being moved to digital environments with industry 4.0. however, But the information in the digital environment poses a great risk. Ensuring the security of information on the users of online applications is a necessity. This perspective requires safe signal processing. But it is difficult to guarantee safe signal processing for resource constrained devices. Lightweight cryptology,...
Software visualizations provide many different complex views with different filters and metrics. But often users have a specific question to which they want to have an answer or they need to find the best visualization by themselves and are not aware of other metrics and possibilities of the visualization tool. We propose an interaction with software visualizations based on a conversational interface...
Sketching is an important activity for understanding, designing, and communicating different aspects of software systems such as their requirements or architecture. Often, sketches start on paper or whiteboards, are revised, and may evolve into a digital version. Users may then print a revised sketch, change it on paper, and digitize it again. Existing tools focus on a paperless workflow, i.e., archiving...
Although Internet of Things (IoT) is an evolving paradigm which allows everyday physical objects, devices and appliances to connect to the internet, and to communicate with each other, there are several essential challenges that should be addressed. One of them is big data generated by physical objects. It is quite challenging to manage and control such enormous amount of data. In this paper, we propose...
We present the Configurable Advanced Verification of Software (CAVS), a prototype tool that automatically generates an efficient set of test cases from descriptions of required interface behavior based on Unified Modeling Language (UML) artifacts. The input to CAVS consists of enhanced UML activity diagrams that define the required behavior of a software component as observed on its interfaces. CAVS...
Software in medical devices can be used in many ways to improve patient outcomes. Little contemporary data exists to document the actual practices used by software professionals for software engineering activities while building Software intensive medical devices. A carefully constructed survey has the potential to: 1) remedy the deficiency of lack of data and 2) to identify the software engineering...
Teaching software architecture to undergraduate students is particularly hard because they typically have no experience with medium or large systems with competing stakeholders. A particularly hard case is ATAM (Architecture Trade-off Analysis Method), which allows the evaluation of architectural designs and quality attributes by competing stakeholders. This article describes ATAM-RPG, a role-playing...
Novel applications demand computational resources that are provided by multiprocessor systems-on-chip (MPSoCs). At the same time, they increasingly process sensitive data and incorporate security-relevant functions like encryption or authentication. This paper discusses the implications of the MPSoC technology on security. It provides an overview of hardware-oriented techniques to enhance security...
The work is focused on intellectualization of the development process of integrated expert systems basing on the the problem-oriented methodology and AT-TECHNOLOGY workbench. Basic intelligent software environment components like intelligent planner, reusable components, standard design procedures are described. Development process with use of intelligent technology is reviewed. An example development...
A distributed software product engineering team has to deal with the additional issue of distribution apart from the usual expectations around cost, quality, time to market and innovation. Distribution of work brings in the issues of temporal, geographical and cultural separation. In spite of individually following the prescribed software engineering processes, often the distributed teams fail to...
The problems of parallelizing computations and increasing real performance are among the main ones for high-performance computing systems. The article describes a new dataflow computing model and architecture, which allow addressing these problems. Methods for solving other problems of classical dataflow systems and traditional cluster supercomputers by the parallel dataflow computing system are also...
Simulation is a powerful tool to evaluate quality attributes of complex software systems, but it is not the most comfortable environment for software engineers. They usually use to specify software architectures graphical notations like Use Case Map (UCM). This paper presents a methodological framework to apply DEVS to the software architecture evaluation problem. This framework is organized in two...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.