The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unattended surveillance of public transportation infrastructures that may generate alarms in the case of a destructive event, and provide information on the current status of the infrastructure as well as on the short interval before the event, can empower the Search and Rescue teams with useful information that may save lives increasing their overall effectiveness. This paper presents a novel system...
The importance of securing the investment made in software is increasing for small embedded devices, as the size of the development efforts are rapidly growing. The meaning of securing in this context is related to protecting against cloning, prohibit reverse engineering of software, preventing alterations performed in order to tweak performance etc. Sales of illegal copies of devices are a major...
UPPAAL is a model-checking tool primarily aimed for real-time and embedded systems in which timing plays an important role. It has existed for over 16 years and has become very popular among formal method scientists in academia. In recent years, licenses of the tool have also been offered and sold on commercial basis. In this paper, the characteristics of the tool, its domains of application, as well...
This paper illustrates the use of software for monitoring and recording the effects of electrostatic discharge (ESD) on the operation of embedded systems, with the goal of facilitating root-cause analysis of resulting failures. Hardware -- based scanning techniques are typically used for analyzing the effect of ESD on systems by identifying physical coupling paths. This paper proposes software techniques...
A novel software-implemented hardware fault tolerance method based on encoding both the control and the data-flow segments of programs with matrices is proposed and evaluated. Results show an average speed-up of 3 times compared to standard duplication and comparison, with coverage higher than 95% for the case studies considered, which outperforms previous works in the field.
Flash memory is becoming the storage media of choice for mobile devices and embedded systems. The performance of flash memory is impacted by the asymmetric speed of read and write operations, limited number of erase times and the absence of in-place updates. To improve the performance of flash memory based systems, write buffer cache has been equipped in flash memories recently. At the same time,...
Our ability to create systems with large amount of hardware parallelism is exceeding the average software developer's ability to effectively program them. This is a problem that plagues our industry. Since the vast majority of the world's software developers are not parallel programming experts, making it easy to write, port, and debug applications with sufficient core and vector parallelism is essential...
A reconfigurable Control and Monitoring Framework (CMF) was developed, integrated and tested with a Radar Signal Processor (RSP). The methods and processes used to develop and utilise the CMF are highlighted in the context of a complete Control and Monitoring System (CMS) for an RSP. The CMF provides the basis for developing interactive, high-level control and monitoring applications using a multi-layer...
In this paper, we present different modeling and execution frameworks that allow us to efficiently analyze, design and verify complex systems, mainly to cope with the specific concerns of the Real-time and embedded systems (RTE) domain. First we depict a UML /MARTE based methodology for executable RTE systems modeling with a framework and its underlying model transformations required to execute UML...
This paper describes an optimized embedded memory diagnosis flow that exploits many levels of knowledge to produce accurate failure hypothesis. The proposed post-processing analysis flow is composed of many steps investigating failure shapes as well as cell fail syndromes, and includes advanced techniques to tackle incomplete data possibly due to tester noise and/or by faults showing intermittent...
The goal of this study is to improve the understanding of how architecting is performed within the field of software-intensive systems. Architects at six different internationally well-known companies have been interviewed to understand their way of working. This paper presents the practices that are found most successful. The context of the different companies as well as the architecting practices...
The size and complexity of large-scale distributed embedded systems such as automotive and process controls have increased recently. Sophisticated systems that are safe and environmentally friendly require numerous types of sensor data, which are collected from various devices and sent to computers through networks. To develop such large-scale distributed embedded systems with high dependability and...
Software on mobile devices has become increasingly complicated as end users demand a PC-converged user experience on the mobile Internet. This has complicated the software configuration and boot procedures, resulting in a longer boot time. This is damaging to the mobile user experience. Many legacy techniques to enable the fast boot time differentiation in mobile handsets are not applicable to the...
This paper presents a low-level memory and hardware model suitable for analyzing embedded systems software written in high-level languages such as C. The key feature of this approach is that it combines information that can be discovered from the C code itself with information from the executable binary program. Further, it also integrates effects caused through hardware dependencies. We describe...
Smart phones are starting to find use in mission critical applications, such as search-and-rescue operations, wherein the mission capabilities are realized by deploying a collaborating set of services across a group of smart phones involved in the mission. Since these missions are deployed in environments where replenishing resources, such as smart phone batteries, is hard, it is necessary to maximize...
Estimating the worst-case execution time (WCET) of real-time embedded systems is compulsory for the verification of their correct functioning. Traditionally, the WCET of a program is estimated assuming availability of the program's binary which is disassembled to reconstruct the program, and in some cases its source code to derive useful high-level execution information. However, in certain scenarios...
Unmanned Aerial Vehicles (UAVs) are remotely piloted or self-piloted aircraft that are capable of flight without any on-board operator and can carry cameras, sensors, communications equipment or other payloads. UAVs have been used in a reconnaissance and intelligence-gathering role, including combat and rescue missions. This paper describes development and implementation of remote manual control system...
Medical, artistic and social applications of biomedical signals benefit from the possibility of measuring a person's emotional state, and of creating, through biofeedback techniques, a personal dynamic interaction with the environment. This paper describes a wearable microsensor module used to acquire and preprocess biological signals that are directly related to one's emotional state in daily activities...
Secure components are subject to physical attacks whose aim is to recover the secret information that they store. Most of works which aim to protect these components generally consist in developing protections (or countermeasures) taken one by one. But this "countermeasure-centered" approach drastically decreases the performances of the whole chip in terms of power and speed. Our work is...
Raising the level of abstraction is an important research topic in the context of software for mobile and embedded devices. Model Driven Software Development techniques have been recognized for their ability to provide this abstraction by separating domain specific aspects from their technical implementation. Traditionally, such approaches rely on static code generation, which does not fit well in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.