Second International Conference on Embedded Software and Systems (ICESS'05)最新文献

筛选
英文 中文
Reducing conflicts in SMT VLIW processor for higher throughput 减少SMT VLIW处理器的冲突,提高吞吐量
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.80
Jianghua Wan, Shuming Chen
{"title":"Reducing conflicts in SMT VLIW processor for higher throughput","authors":"Jianghua Wan, Shuming Chen","doi":"10.1109/ICESS.2005.80","DOIUrl":"https://doi.org/10.1109/ICESS.2005.80","url":null,"abstract":"Cache misses and insufficient instruction-level parallelism (ILP) in a single program make functional units of VLIW (very long instruction word) processor underused. Simultaneous multithreading (SMT) technology is one of the best choices to improve the utilization of functional units in processors, since it can convert thread-level parallelism (TLP) to ILP. Previous work investigate how to incorporate SMT technology with VLIW processors, but none of them reveals further what prevents SMT VLIW processors from achieving higher throughput. In addition, those methods that enhance throughputs for SMT superscalar processors are unsuitable for VLIW processors. In this paper, we propose an approach, which reduces conflicts among threads with moderate hardware costs, to improve the utilization of functional units. Experimental results show that our approach can effectively increase throughputs of SMT VLIW processors.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129031639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous reconfigurable computing array design 异步可重构计算阵列设计
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.33
Jiale Zhang, Xuezeng Pan, Haibin Shen
{"title":"Asynchronous reconfigurable computing array design","authors":"Jiale Zhang, Xuezeng Pan, Haibin Shen","doi":"10.1109/ICESS.2005.33","DOIUrl":"https://doi.org/10.1109/ICESS.2005.33","url":null,"abstract":"We present a novel architecture of asynchronous reconfigurable computing array (ARCA) to seek the balance between performance and versatility. Advancing the completion detector of control circuit, a modified structure of asynchronous micropipeline based on DSDCVSL is discussed. The analysis and simulation of our ARCA have both resulted in high-performance and low-power consumption, and it can be used as an IP module integrated into a system on chip to built the reconfigurable computing platform.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facial animation system for embedded application 面部动画系统的嵌入式应用
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.55
Jiajun Bu, Mingyu You, Chun Chen
{"title":"Facial animation system for embedded application","authors":"Jiajun Bu, Mingyu You, Chun Chen","doi":"10.1109/ICESS.2005.55","DOIUrl":"https://doi.org/10.1109/ICESS.2005.55","url":null,"abstract":"This paper describes a prototype implementation of a speech driven facial animation system for embedded devices. The system is comprised of speech recognition and talking head synthesis. A context-based visubsyllable database is set up to map Chinese initials or finals to their corresponding pronunciation mouth shape. With the database, 3D facial animation can be synthesized based on speech signal input. Experiment results show the system works well in simulating real mouth shapes and forwarding a friendly interface in communication terminals.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121485118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient data gathering in large wireless sensor networks 大型无线传感器网络中的节能数据采集
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.51
Kezhong Lu, Liusheng Huang, Y. Wan, Hongli Xu
{"title":"Energy-efficient data gathering in large wireless sensor networks","authors":"Kezhong Lu, Liusheng Huang, Y. Wan, Hongli Xu","doi":"10.1109/ICESS.2005.51","DOIUrl":"https://doi.org/10.1109/ICESS.2005.51","url":null,"abstract":"In this paper, we investigate an energy-efficient data gathering scheme that prolongs the lifetime of battery-powered sensor nodes. We consider two points in our scheme: turning off some sensor nodes' radio components when they needn't participate in data forwarding and reducing communication path length. To achieve the above two points, the proposed scheme constructs and maintains a spanning tree that is based on breadth-first search and has more leaf nodes in network. Sensor nodes transfer data by the path in the tree. Our simulation results show that our scheme consumes much less energy than previous known schemes.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125872574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An efficient structure for an object-oriented database 面向对象数据库的有效结构
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.25
Kyeongrim Ahn, Hyunchul Kim, Jinwook Chung
{"title":"An efficient structure for an object-oriented database","authors":"Kyeongrim Ahn, Hyunchul Kim, Jinwook Chung","doi":"10.1109/ICESS.2005.25","DOIUrl":"https://doi.org/10.1109/ICESS.2005.25","url":null,"abstract":"New technologies have been continuously introduced in the e-business environment since the emergence of e-commerce. For example, ebXML (electronic business extensible markup language) has been adopted instead of EDI (electronic data interchange) for exchanging electronic documents, or RDB (relational database) is being replaced by OODB (object oriented database) for storing data. In view of the fact ebXML is based on the object-oriented concept, OODB is more efficient than RDB or XML-based e-business system. In this paper, we introduce the electronic document using XML and the object-oriented database instance instead of tables or fields of RDBMS. One of the most important things in designing database is to define the classification rules for choosing elements or attributes among meaningful values. We also propose a system architecture that reflects the ebXML concept and an implementation method using a distributed and component-based architecture.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Internet robustness against malicious flows using active queue management 使用主动队列管理增强针对恶意流的Internet健壮性
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.52
Jun Zheng, Mingzeng Hu, Liyuan Zhao
{"title":"Enhancing Internet robustness against malicious flows using active queue management","authors":"Jun Zheng, Mingzeng Hu, Liyuan Zhao","doi":"10.1109/ICESS.2005.52","DOIUrl":"https://doi.org/10.1109/ICESS.2005.52","url":null,"abstract":"Attackers can easily modify the TCP control protocols of host computers to inject the malicious flows to the Internet. Including DDoS and worm attack flows, these malicious flows are unresponsive to the congestion control mechanism which is necessary to the equilibrium of the whole Internet. In this paper, a new scheme against the large scale malicious flows is proposed based on the principles of TCP congestion control. The kernel is to implement a new scheduling algorithm named as CCU (compare and control unresponsive flows) which is one sort of active queue management (AQM). According to the unresponsive characteristic of malicious flows, CCU algorithm relies on the two processes of malicious flows - detection and punishment. The elastics control mechanism of unresponsive flows benefits the AQM with the high performance and enhances the Internet robustness against malicious flows. The network resource can be regulated for the basic quality of service (QoS) demands of legal users. The experiments prove that CCU can detect and restrain responsive flows more accurately compared to other AQM algorithms.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and implementation of an agile kernel component runtime 敏捷内核组件运行时的设计和实现
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.42
XuYong Jun, Chenkan Yu, Wang Xiaoge
{"title":"Design and implementation of an agile kernel component runtime","authors":"XuYong Jun, Chenkan Yu, Wang Xiaoge","doi":"10.1109/ICESS.2005.42","DOIUrl":"https://doi.org/10.1109/ICESS.2005.42","url":null,"abstract":"In this paper, we describe ARMOR, an Agile keRnel coMpOnent Runtime which seeks to greatly enhance operating system reliability and performance at the same time. ARMOR is made up of AKE, Agile Kernel Engine which is implemented in kernel, and system servers which are user processes. In ARMOR, the kernel functions are encapsulated through component and can be loaded both into kernel address space for performance and into system server's user address space for reliability at runtime. ARMOR isolates kernel components through loading them into system server's user address space, where hardware and software prevent them from corrupting the kernel. To prove the feasibility of our approach, we implemented ARMOR in Linux operating system and some experiments are given to evaluate our work.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency metrics model for component-based embedded application software 基于组件的嵌入式应用软件效率度量模型
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.50
Yuyu Yuan
{"title":"Efficiency metrics model for component-based embedded application software","authors":"Yuyu Yuan","doi":"10.1109/ICESS.2005.50","DOIUrl":"https://doi.org/10.1109/ICESS.2005.50","url":null,"abstract":"This paper develops efficiency metrics model to support application-level evaluation of embedded system resource utilization. In particular, we address the efficiency metrics of embedded application software running on a component-based embedded system. Efficiency analysis and estimate are, therefore, essential and critical during the design and integration of embedded application software, to estimate and predict that the application timing and hardware resource constraints will meet requirement. We propose an efficiency metrics method, which, on the basis of a parameterization of the software efficiency and the hardware architecture, is able to predict the number of response time, throughput and utilization of an embedded application system. Example with several conditions to explain the efficiency metric model is analysis and evaluated to support this claim.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Linux kernel with fixed interrupt latency for embedded real-time system 嵌入式实时系统中具有固定中断延迟的Linux内核
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.3
Jian Yang, Yu Chen, Huayong Wang, Bibo Wang
{"title":"A Linux kernel with fixed interrupt latency for embedded real-time system","authors":"Jian Yang, Yu Chen, Huayong Wang, Bibo Wang","doi":"10.1109/ICESS.2005.3","DOIUrl":"https://doi.org/10.1109/ICESS.2005.3","url":null,"abstract":"This paper proposes a Linux 2.6./spl times/ hard real-time system on ARM MMU-less platform, and compares the performance of the new system to the original one. Traditionally, Linux is designed mainly for desktop and server applications, it focuses on the throughput and overall workloads. Therefore, it hardly satisfies the real-time embedded systems' requirements. In order to improve the real-time performance of the Linux system, this paper realizes the priority inheritance protocol in the kernel source, and rewrites the interruption service routings by a new method: kernel thread. The experiments show that this new scheme tremendously decreases the interrupt latency and the time needed to enter the critical sections for applications, which is a quite important feature required by real-time system.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
RTCR: a soft real-time context reasoner RTCR:一个软实时上下文推理器
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.81
Shanping Li, Zhaohui Yang, Xin Lin
{"title":"RTCR: a soft real-time context reasoner","authors":"Shanping Li, Zhaohui Yang, Xin Lin","doi":"10.1109/ICESS.2005.81","DOIUrl":"https://doi.org/10.1109/ICESS.2005.81","url":null,"abstract":"Context-aware applications in pervasive computing environments consume a large variety of context information. Some of the contexts are highly dynamic and applications put real-time requirements on their provision. This kind of requirement applies to any component that provide such contexts, including context reasoners, which synthesize high level contexts from low level ones. This paper presents the architecture of real-time context reasoner (RTCR), a context reasoner that is designed to satisfy soft real-time requirements on the reasoning process. It manages to meet timing constraints by scheduling executions of reasoning jobs with respect to demanded deadlines on result contexts. The reasoner follows a first order logic model and uses rule based reasoning. A heuristic temporary rules mechanism is introduced in its design to reduce repeated reasoning at run time. Simulation results show that the reasoner provides all demanded contexts on time in situations where an identical reasoner without real-time scheduling misses many deadlines. Another experiment illustrates the potential of the temporary rules mechanism in reducing workload for the reasoner.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信