The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ADAS (Advanced Driver Assistance Systems) algorithms increasingly use heavy image processing operations. To embed this type of algorithms, semiconductor companies offer many heterogeneous architectures. These SoCs (System on Chip) are composed of different processing units, with different capabilities, and often with massively parallel computing unit. Due to the complexity of these SoCs, predicting...
Multithreading implementation through real time operating system was held in several years to optimize resource management in embedded system. Several side effects, such as large binary size and memory usage were appeared while implementing multithreading mechanism and its supporting mechanism. We developed FLoW to reduce those side effects while performing multithread in embedded system. FLoW implemented...
Nowadays, there is a trend to integrate trusted computing concepts into autonomic systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system. In this work, we propose an architecture...
Engineers of next generation embedded systems heavily rely on virtual platforms as central tools in their design process. Yet, the ever increasing HW/SW complexity degrades the simulation performance of those platforms and threatens their viability as design tools. With multi-core workstations today being widely available, the transition towards parallel simulation technologies seems obvious. Recently...
To reduce the manpower and response time for surveillance systems at low cost, in this paper, an ARM-based embedded system dedicated for unattended realtime moving target detection is constructed. The comprehensive procedures in building up an embedded system such as setup environment for cross-compilation, migration of Bootloader, migration of Linux-2.6 kernel, fabrication and migration of root document...
In this work we present a verification framework for applications for the embedded system operating system Contiki, based on the software model checking tool CBMC. A challenge when verifying such systems is the modeling of the hardware environment, especially the handling of interrupts. After an introduction to the Contiki system, we discuss approaches to model interrupts at the level of hardware...
The correctness of kernel is the key to the safety critical embedded application, and only by formal verification it can prove the kernel does not exist some defects or meet certain attributes. In this paper, we introduce SAFEBOX, a microkernel based on spatial-temporal isolation, give the formal description of SAFEBOX, and use theorem proverb Isabelle/HOL to verify the functional and non-functional...
Tracing is an approach used for debugging and profiling software. Conventional approach to create traces is to instrument program’s code tapping data out from an execution. An original execution is mixed with tracing routines. In consequent, a program in production state and development state are not identical. In addition, instrumentation code adds execution overhead and increases error probability...
With the wide application of embedded technology and its products, much attention has been turned to the development of program to improve the safety and reliability of embedded devices. In this paper, we present a construct program of embedded trusted computing environment based on QEMU virtual machine architecture. The proposed program, simulates functions of trusted cryptographic modules by software,...
This paper describes a novel approach to teach embedded system development to undergraduate students. A robotics-based platform is used to develop a multi-task application on a commercially available RTOS. Students are guided through three laboratory sessions to get familiarized with a commercially popular Integrated Development Environment (IDE) and an off-the-shelf ARM-based embedded platform, EvalBot...
In this paper, we propose a new approach to data density estimation based on the total sum of distances from a data point, and the recently introduced Recursive Density Estimation technique. It is suitable for autonomous real-time video analytics problems, and has been specifically designed to be executed very fast; it uses integer-only arithmetic with no divisions and no floating point numbers (no...
Checkpointing is the act of saving the state of a running program so that it may be recovered later, which is a general idea that enables various functionalities in computer systems, including fault tolerance, system recovery, and process migration. Checkpointing mechanisms in traditional systems normally save the state of process running on volatile memory to a checkpoint file stored on non-volatile...
Most of today's computer systems, including rapidly emerging embedded ones, rely on an operating system. Consequently, the development of embedded systems and related software often requires a deeper understanding of operating systems. This paper presents a new incrementally built operating system and a learning course formed around it. Each increment builds on the previous one and introduces new...
The advent of increasingly powerful low-power processors offers new opportunities for embedded systems. Instead of multiple small microprocessors devoted to a single task, a centralized multi-core processor can be used to run all applications, while ensuring isolation and resources allocation for critical tasks. Seeing a growing interest for bringing virtualization on embedded systems, IP suppliers,...
The authors have developed a mechatronic tracking system controlled by a hard real-time embedded Linux based system. The control software is implemented on a standard PC/104-Plus embedded single board computer (CoreModule745 with Intel Atom processor). The paper is focused on various aspects of developing an embedded version of Linux software that are mostly not dependent on the application. The reader...
In this work we consider a security model for resource constrained embedded systems, where memory is sometimes measured in a handful of kilobytes. Such systems normally do not include any security or safety mechanisms. The minority that do provide such functions often do so in an inflexible and ad hoc manner. The simple separation kernel demonstrated in this work enables a dynamic security model with...
Phase Change Memory (PCM) has been considered as a leading candidate to replace the traditional DRAM in embedded systems due to its promising characteristics such as low leakage power, low cost, non-volatility, and high scalability. One of the constraints that undermine the credential of PCM as main memory is its limited write endurance. In this paper, we develop wear-leveling techniques purely on...
Embedded systems are constantly becoming more complex, as they are increasingly equipped with more functionality. Networking capability is one of the most desired features even for embedded systems, hence network applications, typically used in desktop systems, are required to become available in the embedded system domain. Rewriting these applications to fit into embedded root file systems takes...
Multi-core operating systems inherently face the problem of concurrent access to internal kernel state held in shared memory. Previous work on the Sloth real-time kernel proposed to offload the scheduling decisions to the interrupt hardware, thus removing the need for a software scheduler, no state has to be managed in software. While our existing design covers single-core platforms only, we now present...
Since their introduction in 1995, Support Vector Machines (SVM) have shown that classification by this relatively recent machine learning tool can be more accurate than popular contemporary techniques such as neural networks and decision trees, hence causing it to find its way quickly to various applications in engineering, economy and statistics. Despite their possible advantages, SVM use in space...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.