{"title":"Investigation of transient effects on FPGA-based embedded systems","authors":"A. Bakhoda, S. Miremadi, H. Zarandi","doi":"10.1109/ICESS.2005.66","DOIUrl":"https://doi.org/10.1109/ICESS.2005.66","url":null,"abstract":"In this paper, we present an experimental evaluation of transient effects on an embedded system which uses SRAM-based FPGAs. A total of 7500 transient faults were injected into the target FPGA using power supply disturbances (PSD) and a simple 8-bit microprocessor was implemented on the FPGA as the testbench. The results show that nearly 64 percent of faults cause system failures and about 63 percent of the faults lead to corruption of the configuration data of the FPGA chip.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123933768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The computation model of code error distortion based on the rate-distortion theory","authors":"Zhang Jian, Yu Sheng-sheng, Zheng Xin-wei","doi":"10.1109/ICESS.2005.91","DOIUrl":"https://doi.org/10.1109/ICESS.2005.91","url":null,"abstract":"This paper starts from the end to end error distortion, constructs the statistical model of the information sources encoding distortion, channel error distortion, intra frame encoding macro block error diffusion, and the inter frame encoding macro block error diffusion, and brings forwards a rate distortion robust encoding control algorithm model under a low computation quantity. This method not only can acquire the optimal control point in the rate-distortion curve from the global perspective under the code error environment, but also can self adaptive adjust the bit allocation and the quantization parameter under given network bandwidth. Furthermore, it can also implement intra frame macro block refresh at the same time and play important role in counteracting the channel code error to minimize the total distortion under certain bit-rated according to current network package loss probability, by which to establish the rate distortion model of associated signal source channel and apply the rate-distortion optimized solution method to optimal allocate the bit-rate between the signal source coding and the channel coding. This method can provide valuable reference for the video robust coding transmission and resource allocation under the wireless environment.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-detection: how does a target traverse a sensing field","authors":"Wenzhe Zhang, Minglu Li","doi":"10.1109/ICESS.2005.31","DOIUrl":"https://doi.org/10.1109/ICESS.2005.31","url":null,"abstract":"Most sensor networks are deployed to monitor a region of interest for any potential target. An intelligent target looks for the best path to traverse the sensing field. In this paper, we model this anti-detection problem, propose a number of path-finding algorithms, and evaluate these algorithms. Different from previous works which assume complete information of the sensing field, we assume that the target only can detect part of the deployment of sensor network. This makes the proposed method more practical. Experimental results manifest the effectiveness of the path-finding algorithms.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent-based automated trust negotiation for pervasive computing","authors":"Zhaoyu Liu, Daoxi Xiu","doi":"10.1109/ICESS.2005.19","DOIUrl":"https://doi.org/10.1109/ICESS.2005.19","url":null,"abstract":"For pervasive computing systems, how to trust the mobile clients such as devices, users and applications is a great challenge. This paper provides an answer to this question by introducing an agent-based automated trust negotiation framework. In this trust negotiation framework, the client tries to establish the trust relationship with the system through an active trust negotiation scheme. The first stage in this active trust negotiation scheme is to download the trust negotiation strategy from the host system. In the second stage, the client and the host system use the same trust negotiation strategy to establish trust relationship between them so that the client can be granted to access the requested resources. By using the mobile agents, security capsules, to encode the definition and interpretation of trust negotiation strategies, trust negotiation strategies can be distributed and loaded dynamically and transparently. The mobility, transparency and configurability brought by the security capsules make this framework flexible, adaptive and dynamic for automated trust negotiation between different clients and systems.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129364939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node-disjoint parallel multi-path routing in wireless sensor networks","authors":"Shanping Li, Zhendong Wu","doi":"10.1109/ICESS.2005.72","DOIUrl":"https://doi.org/10.1109/ICESS.2005.72","url":null,"abstract":"Although data forwarding algorithms are among the first set of the most important issues explored in sensor networks, how to efficiently and reliably deliver sensing data through a large field of sensors remains a research challenge. Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distribute traffic and balance network's load, as well as considerate fault tolerance. In this paper, we proposed a node-disjoint parallel multi-path routing algorithm (DPMR), which finds the node-disjoint multi-paths simultaneously by taking full advantage of the known geographic information. Through improving the packet delivery performance and evenly distributing the energy load among the sensors, DPMR can prolong the network's system lifetime. Simulations show that DPMR can significantly improve the network's performance.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of data-path for a VLIW media coprocessor","authors":"Jing He, Yi-He Sun","doi":"10.1109/ICESS.2005.44","DOIUrl":"https://doi.org/10.1109/ICESS.2005.44","url":null,"abstract":"A design study of data-path for a VLIW media coprocessor is presented. The VLIW coprocessor executes the kernels in media applications, and has great impact on the performance of the media processor. To explore the architecture tradeoff at early stage, we proposed three architecture models, and hand scheduled three typical kernels onto the models, with the instruction set simulator, we evaluated architecture by evaluating the instruction level behavior of the architecture models, so that the data-path can be adapted to kernel programs.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feedback scheduling of real-time control tasks in power-aware embedded systems","authors":"Feng Xia, Xiaohua Dai, Xiaodong Wang, Youxian Sun","doi":"10.1109/ICESS.2005.56","DOIUrl":"https://doi.org/10.1109/ICESS.2005.56","url":null,"abstract":"Power awareness has become a critical issue in real-time scheduling of embedded systems. In the context of control applications, the goal of high control performance and low energy consumption are at odds with each other. While dynamic voltage/frequency scaling (DVS) has proved to be promising in energy saving while preserving task schedulability, traditional DVS algorithms use either open loop or ad hoc solutions, and hence cannot perform well for dynamic systems where the workload varies significantly. By targeting these systems, a novel scheme, namely DVS-FS, which combines DVS and feedback scheduling, is suggested. The objective is to save CPU energy as much as possible, while still providing control performance guarantees, which largely depends on successful schedule of the control task set. DVS-FS exploits feedback control methodology, and facilitates tradeoffs between energy consumption and control performance through controlling the CPU utilization at a considerably high level. Simulation experiments demonstrate that DVS-FS can easily reduce significant energy consumption at the expense of only minor control performance degradation.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}