The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Japanese language includes thousands of characters, distributed across various scripts, some extinct. The majority of Japanese characters is of Chinese ascent: these are the kanji characters. Character memorisation is thus an extremely challenging task for the learner of Japanese as a foreign language. Several methods have been proposed to alleviate this workload. We have recently described a...
Embedded systems require low overhead security approaches to ensure that they are protected from attacks. In this paper, we propose a hardware-based approach to secure the operation of an embedded processor instruction-by-instruction, where deviations from expected program behavior are detected within the execution of an instruction. These security-enabled embedded processors provide effective defenses...
As thread level parallelism in applications has continued to expand, so has research in chip multi-core processors. As more and more applications become multi-threaded we expect to find a growing number of threads executing on a machine. As a consequence, the operating system will require increasingly larger amounts of CPU time to schedule these threads efficiently. Instead of perpetuating the trend...
Openflow provides a key step in abstracting network functions by separating the control and the forwarding plane. However, current rather rigid switches constrain packet processing programmability. It is therefore complex to implement flexible packet classification within existing ASIC-based switches, especially when forwarding switches rely on a restricted set of tables. In this paper, we introduce...
In previous work we showed that reflection and Wrappings are useful tools for system integration. But System of Systems integration also needs to accommodate specific hardware challenges. We discuss simple examples from the operation of a single cyber-physical agent that accepts top-down commands, but uses the Wrappings architecture to self-organize its context specific implementation of them. Our...
The ARINC 653 specification defines a standard functional interface and temporal requirements for Operating Systems (OSs) used in aviation systems, and is based on temporally and spatially isolated partitions in which the application processes are executed. In this paper we present the key lessons learned from the development of an ARINC 653 compatible OS with educational and experimental purposes...
Implementing applications on Reconfigurable Computing Architectures (RCAs) is an important research topic because of their high potential to accelerate a wide range of functions. Nevertheless, configuring and programming RCAs is a long-standing challenge. In this paper, we propose a design methodology to map an algorithm on an FPGA preconfigured with a Coarse-Grained Reconfigurable Architecture (CGRA)...
In this paper, we show how to speed up the computation of fast Fourier transforms over complex numbers for "medium" precisions, typically in the range from 100 until 400 bits. On the one hand, such precisions are usually not supported by hardware. On the other hand, asymptotically fast algorithms for multiple precision arithmetic do not pay off yet. The main idea behind our algorithms is...
The atan2 function computes the polar angle arctan(y/x) of a point given by its cartesian coordinates. It is widely used in digital signal processing to recover the phase of a signal. This article studies for this context the implementation of atan2 with fixed-point inputs and outputs. It compares the prevalent CORDIC shift-and-add algorithm to two multiplier-based techniques. The first one computes...
While the future importance of cyber-physical systems is widely acknowledged, there is surprisingly rare discussion about the design of operating systems for these kinds of systems. We present an extended view on the low-level abstractions to be offered by the operating system to applications. The central idea is the treatment of all relevant cyber-physical entities as task execution resource, which...
For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities. Although many techniques have been proposed to address the problem, they mostly introduce a very high overhead while others assume the availability of a separate system to pinpoint attacks or provide detailed traces for defense generation, which is very slow in itself and requires considerable...
Medication reminder solutions have become a matter of concern in health-care research, as advancements in treatments and medication may be offset by patients' low compliance to medication schedule. In this context, an efficient reminder system should empower patients to accurately follow the prescribed medication program. In order to achieve this, we propose an architecture for a wearable self-care...
Mechanisms for runtime fault-tolerance in many-core architectures are mandatory to cope with transient and permanent faults. This issue is even more relevant with aggressive technology nodes due to process variability, aging effects, and susceptibility to upsets, among other factors. This work proposes to save periodically the context and to re-schedule tasks to the last reliable known state and avoid...
Fault handling mechanisms become more relevant as systems integrate more hardware logic. For instance, current multi-processor system-on-chips (MPSoCs) consists of hundreds of processors connected by an interconnection network. This type of system can only be cost effective if it can handle faults on its main components (i.e. processors and interconnect). Traditional fault recovery approaches for...
To migrate complex sequential code to multicore, profiling is often used on sequential executions to find opportunities for parallelization. In non-scientific code, the potential parallelism often resides in while-loops rather than for-loops. The do-all model used in the past by many studies cannot detect this type of parallelism. A new, task-based model has been used by a number of recent studies...
Wireless sensor network (WSN) is a technology used to collect data from different sources. The development of WSNs offer complex challenges. Developers of WSN systems should be aware of issues such as energy-efficient network management and cooperation among nodes. The advancement in sensor nodes have created new opportunities for cooperation. This paper addresses the lack of software development...
Virtualization technology as the foundation of cloud computing provides many benefits in cost, security, and management, but all of them rely on the reliability of the underlying virtualization software - the hypervisor (or virtual machine monitor). Cloud data centers are built upon 10Ks to 100Ks commodity servers. Hardware errors in these large scale computer systems are not rare events. When hardware...
The combination of emerging concepts, such as Fog Computing, Software Defined Networking and Network Function Virtualization will contribute to transform the network into a flexible and dynamical continuum of resources, on which services can be easily deployed and managed (network programmability). In this scenario, a major topic is the use of ad hoc h/w accelerators, in particular to provide the...
This paper presents a high-level overview of NEMO, an implementation of a communications research software workspace with special focus on application scenarios involving underwater (e.g. acoustic), and other maritime communications methods. The NEMO is an organic result of marine autonomy and communications experimentation, basically being composed of reconfigurable modules and services that interact...
In this work, we present a differential fault analysis of the SHA-3 finalist Gr⊘stl when used in the dedicated MAC mode. The fault model exploited here is similar to fault repeatability model proposed and used by Roche et al. in CARDIS 2011. We propose a new way of extracting half of the state of Gr⊘stl from the knowledge of the remaining half. This result is of particular interest since it may be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.