{"title":"MobDSL: A Domain Specific Language for multiple mobile platform deployment","authors":"D. Kramer, T. Clark, Samia Oussena","doi":"10.1109/NESEA.2010.5678062","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678062","url":null,"abstract":"There is increasing interest in establishing a presence in the mobile application market, with platforms including Apple iPhone, Google Android and Microsoft Windows Mobile. Because of the differences in platform languages, frameworks, and device hardware, development of an application for more than one platform can be a difficult task. In this paper we address this problem by the creation of a mobile Domain Specific Language (DSL). Domain analysis was carried out using two case studies, inferring basic requirements of the language. The paper further introduces the language calculus definition and provides discussion how it fits the domain analysis, and any issues found in our approach.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware for resource sharing in multi-purpose Wireless Sensor Networks","authors":"P. Cid, Sam Michiels, W. Joosen, D. Hughes","doi":"10.1109/NESEA.2010.5678061","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678061","url":null,"abstract":"In order to improve application reaction times and decrease overall transmission overhead, Wireless Sensor Network (WSN) applications are being developed to push intelligence into the network. In multi-purpose enterprise deployments of WSNs the infrastructure is considered a lightweight service platform that can provide services for multiple concurrent distributed applications. In this context our middleware focuses on efficiently managing shared resources while considering Quality of Data (QoD) and context aware operation. In this paper we address the issue of how concurrent use of WSN services may lead to consequential contention over a sensor node's resources. We contribute by introducing share-able components that minimize the consequential resources needed and a resource planner that effectively reserves these resources. A prototype implementation and evaluation are provided.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122265106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low power, small die-size PLL using semi-digital storage instead of big loop filter capacitance","authors":"M. Dietl, P. Sareen","doi":"10.1109/NESEA.2010.5678055","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678055","url":null,"abstract":"Conventional low bandwidth Phase lock loop uses an external Capacitor together with a big on chip ripple capacitor. A new architecture of a Phase lock loop is proposed which eliminates the need for an external capacitor. Also the value of the on chip capacitor is reduced drastically, reducing the chip size. The PLL architecture proposed uses very low power.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending sensor networks into the Cloud using Amazon Web Services","authors":"Kevin Lee, David Murray, D. Hughes, W. Joosen","doi":"10.1109/NESEA.2010.5678063","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678063","url":null,"abstract":"Sensor networks provide a method of collecting environmental data for use in a variety of distributed applications. However, to date, limited support has been provided for the development of integrated environmental monitoring and modeling applications. Specifically, environmental dynamism makes it difficult to provide computational resources that are sufficient to deal with changing environmental conditions. This paper argues that the Cloud Computing model is a good fit with the dynamic computational requirements of environmental monitoring and modeling. We demonstrate that Amazon EC2 can meet the dynamic computational needs of environmental applications. We also demonstrate that EC2 can be integrated with existing sensor network technologies to offer an end-to-end environmental monitoring and modeling solution.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composition challenges and approaches for cyber physical systems","authors":"Kaiyu Wan, D. Hughes, K. Man, Tomas Krilavičius","doi":"10.1109/NESEA.2010.5678065","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678065","url":null,"abstract":"A wide variety of programming abstractions have been developed for cyber-physical systems. These approaches provide support for the composition of cyber-physical systems from generic units of application functionality. This paper surveys the current state-of-the-art in composition mechanisms for cyber physical systems and reviews each approach in terms of its support for composition analysis, re-use and adaptation. We then review approaches for modeling and verifying cyber-physical application compositions and conclude by proposing promising research directions that will address these shortcomings.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"486 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pattern based methodology for the design and implementation of multiplexed Master-Slave devices at the system-level use-case: Modeling a Level-2 Cache IP module at transaction level","authors":"Sushil Menon, Suryaprasad Jayadevappa","doi":"10.1109/NESEA.2010.5678054","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678054","url":null,"abstract":"In a customer driven environment, systems pose a great challenge to designers in terms of complexity and time-to-market. Thus, designers have to look at Commercial-Off-The-Shelf (COTS) based development techniques that rely on integrating components produced by various manufacturers. However, the vast range of components from various manufacturers leads to obscurity of interfaces between them, making system integration a dreadful task. Hence, large warehouses of IP modules comprising of various software simulation models of system components at different levels of abstraction that can be readily integrated to form a Virtual Prototype are highly beneficial towards the exploration of various architectures. In order to design and implement IP modules efficiently, we identify the Design patterns that they follow. We propose a Design pattern based methodology for modeling and implementing multiplexed Master-Slave devices. As an effort to showcase the methodology, we choose to model a Level-2 Cache (L2Cache) using SystemC. A technical specification document of the Motorola MPC2605 L2Cache is procured and modeled using hierarchical state machines that we implement using SystemC. The developed model is an integrated lookaside L2Cache supporting 4-way set-associative cache mapping and LRU replacement algorithm, compatible with the Simple Bus. The L2Cache module is then further parameterized to accommodate changes in L2Cache size, cache mapping strategies and replacement algorithms. In this paper, we present the proposed methodology through a description of the process of modeling and verifying an L2Cache IP module at system-level, using the “Master-Bus-Slave/Master-Bus-Slave” Design pattern. The test-bench involves a master (to generate transactions), a Simple Bus, the L2Cache Module and Slave Module (Simple memory). Various relevant test cases were generated to test the functionality of the developed module. The test-case outputs were routed to a debug file which is inspected to determine whether the output is as expected. We conclude by enunciating our learning from our experience with this methodology.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127184083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data traffic based route selection for real-time data delivery in wireless sensor networks","authors":"Hyeon Park, Z. H. Mir, Naesoo Kim, C. Pyo","doi":"10.1109/NESEA.2010.5678058","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678058","url":null,"abstract":"Surveillance and reconnaissance applications such as military in wireless sensor networks require timely transfer of important data (i.e., the detection of enemy troops and vehicles) to a remote base station or sink node. Unfortunately, picking up the reliable routing path to deliver the data in realtime is difficult because of various interferences, often environmental changes, and so on. Thus, routing protocols based on the link quality to select the routing path are affected by those kinds of factors. In this paper, we propose a reliable routing mechanism that provides real-time transfer of the important data. In other words, we provide the weighted link quality metric that reflect the TX/RX traffic flow to select the reliable route over the routing path. Moreover, we also provide a cross-layer routing protocol design in order to reduce the data queue processing time and to send out the priority data at both network and MAC layer.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"45 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust optimization of serial link system for signal integrity and power integrity","authors":"J. N. Tripathi, R. Nagpal, Rakesh Malik","doi":"10.1109/NESEA.2010.5678052","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678052","url":null,"abstract":"Signal Integrity (SI) and Power Integrity (PI) are the most critical issues for higher operational speeds in semiconductor industry. This work identifies and optimizes the parameters of board, package and termination environment, influencing the signal integrity and power integrity of serial link. System level model has been created for USB HSLINK taking into account the external parameters like board, package, measurement environment which influence the performance of the channel. Parameters variations appearing from manufactura-bility constraints, material property constraints, design tolerance etc affecting the serial link performance has been optimized using Taguchi method based on statistical co-analysis. Using the Taguchi statistical techniques, sensitivity analysis on parameter variations affecting HSLINK performance is analyzed and optimized for desired performance.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133446592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy and Assuring Integrity in data aggregation for Wireless Sensor Networks","authors":"Rabindra Bista, Myoung-Seon Song, Jae-Woo Chang","doi":"10.1109/NESEA.2010.5678059","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678059","url":null,"abstract":"Many applications require reliable and trustful data aggregation in Wireless Sensor Networks (WSNs). In this paper, we propose a new scheme to achieve data privacy and integrity protection in data aggregation for WSNs, called Preserving Privacy and Assuring Integrity (PPAI) scheme. For this, before data transmission, the PPAI scheme blurs the original sampled data of a sensor node by randomly breaking down the data two times independently into two unequal pieces for each time and combining each of the data pieces with a separate private seed of the sensor node. Through analytical performance evaluations, we show that the PPAI scheme is much more efficient in terms of both communication overhead and data propagation delay than the existing work to achieve data privacy and integrity assurance in data aggregation for WSNs.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121992651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SenaaS: An event-driven sensor virtualization approach for Internet of Things cloud","authors":"Sarfraz Alam, M. Chowdhury, Josef Noll","doi":"10.1109/NESEA.2010.5678060","DOIUrl":"https://doi.org/10.1109/NESEA.2010.5678060","url":null,"abstract":"In this paper, we propose an Internet of Things (IoT) virtualization framework to support connected objects sensor event processing and reasoning by providing a semantic overlay of underlying IoT cloud. The framework uses the sensor-as-aservice notion to expose IoT cloud's connected objects functional aspects in the form of web services. The framework uses an adapter oriented approach to address the issue of connectivity with various types of sensor nodes. We employ semantic enhanced access polices to ensure that only authorized parties can access the IoT framework services, which result in enhancing overall security of the proposed framework. Furthermore, the use of event-driven service oriented architecture (e-SOA) paradigm assists the framework to leverage the monitoring process by dynamically sensing and responding to different connected objects sensor events. We present our design principles, implementations, and demonstrate the development of IoT application with reasoning capability by using a green school motorcycle (GSMC) case study. Our exploration shows that amalgamation of e-SOA, semantic web technologies and virtualization paves the way to address the connectivity, security and monitoring issues of IoT domain.","PeriodicalId":348247,"journal":{"name":"2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130923266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}