Second International Conference on Embedded Software and Systems (ICESS'05)最新文献

筛选
英文 中文
Investigation of transient effects on FPGA-based embedded systems 基于fpga的嵌入式系统瞬态效应研究
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.66
A. Bakhoda, S. Miremadi, H. Zarandi
{"title":"Investigation of transient effects on FPGA-based embedded systems","authors":"A. Bakhoda, S. Miremadi, H. Zarandi","doi":"10.1109/ICESS.2005.66","DOIUrl":"https://doi.org/10.1109/ICESS.2005.66","url":null,"abstract":"In this paper, we present an experimental evaluation of transient effects on an embedded system which uses SRAM-based FPGAs. A total of 7500 transient faults were injected into the target FPGA using power supply disturbances (PSD) and a simple 8-bit microprocessor was implemented on the FPGA as the testbench. The results show that nearly 64 percent of faults cause system failures and about 63 percent of the faults lead to corruption of the configuration data of the FPGA chip.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123933768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The computation model of code error distortion based on the rate-distortion theory 基于率失真理论的码误码失真计算模型
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.91
Zhang Jian, Yu Sheng-sheng, Zheng Xin-wei
{"title":"The computation model of code error distortion based on the rate-distortion theory","authors":"Zhang Jian, Yu Sheng-sheng, Zheng Xin-wei","doi":"10.1109/ICESS.2005.91","DOIUrl":"https://doi.org/10.1109/ICESS.2005.91","url":null,"abstract":"This paper starts from the end to end error distortion, constructs the statistical model of the information sources encoding distortion, channel error distortion, intra frame encoding macro block error diffusion, and the inter frame encoding macro block error diffusion, and brings forwards a rate distortion robust encoding control algorithm model under a low computation quantity. This method not only can acquire the optimal control point in the rate-distortion curve from the global perspective under the code error environment, but also can self adaptive adjust the bit allocation and the quantization parameter under given network bandwidth. Furthermore, it can also implement intra frame macro block refresh at the same time and play important role in counteracting the channel code error to minimize the total distortion under certain bit-rated according to current network package loss probability, by which to establish the rate distortion model of associated signal source channel and apply the rate-distortion optimized solution method to optimal allocate the bit-rate between the signal source coding and the channel coding. This method can provide valuable reference for the video robust coding transmission and resource allocation under the wireless environment.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-detection: how does a target traverse a sensing field 反探测:目标如何穿过感应场
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.31
Wenzhe Zhang, Minglu Li
{"title":"Anti-detection: how does a target traverse a sensing field","authors":"Wenzhe Zhang, Minglu Li","doi":"10.1109/ICESS.2005.31","DOIUrl":"https://doi.org/10.1109/ICESS.2005.31","url":null,"abstract":"Most sensor networks are deployed to monitor a region of interest for any potential target. An intelligent target looks for the best path to traverse the sensing field. In this paper, we model this anti-detection problem, propose a number of path-finding algorithms, and evaluate these algorithms. Different from previous works which assume complete information of the sensing field, we assume that the target only can detect part of the deployment of sensor network. This makes the proposed method more practical. Experimental results manifest the effectiveness of the path-finding algorithms.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Agent-based automated trust negotiation for pervasive computing 用于普及计算的基于代理的自动信任协商
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.19
Zhaoyu Liu, Daoxi Xiu
{"title":"Agent-based automated trust negotiation for pervasive computing","authors":"Zhaoyu Liu, Daoxi Xiu","doi":"10.1109/ICESS.2005.19","DOIUrl":"https://doi.org/10.1109/ICESS.2005.19","url":null,"abstract":"For pervasive computing systems, how to trust the mobile clients such as devices, users and applications is a great challenge. This paper provides an answer to this question by introducing an agent-based automated trust negotiation framework. In this trust negotiation framework, the client tries to establish the trust relationship with the system through an active trust negotiation scheme. The first stage in this active trust negotiation scheme is to download the trust negotiation strategy from the host system. In the second stage, the client and the host system use the same trust negotiation strategy to establish trust relationship between them so that the client can be granted to access the requested resources. By using the mobile agents, security capsules, to encode the definition and interpretation of trust negotiation strategies, trust negotiation strategies can be distributed and loaded dynamically and transparently. The mobility, transparency and configurability brought by the security capsules make this framework flexible, adaptive and dynamic for automated trust negotiation between different clients and systems.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129364939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Node-disjoint parallel multi-path routing in wireless sensor networks 无线传感器网络中的节点不相交并行多路径路由
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.72
Shanping Li, Zhendong Wu
{"title":"Node-disjoint parallel multi-path routing in wireless sensor networks","authors":"Shanping Li, Zhendong Wu","doi":"10.1109/ICESS.2005.72","DOIUrl":"https://doi.org/10.1109/ICESS.2005.72","url":null,"abstract":"Although data forwarding algorithms are among the first set of the most important issues explored in sensor networks, how to efficiently and reliably deliver sensing data through a large field of sensors remains a research challenge. Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distribute traffic and balance network's load, as well as considerate fault tolerance. In this paper, we proposed a node-disjoint parallel multi-path routing algorithm (DPMR), which finds the node-disjoint multi-paths simultaneously by taking full advantage of the known geographic information. Through improving the packet delivery performance and evenly distributing the energy load among the sensors, DPMR can prolong the network's system lifetime. Simulations show that DPMR can significantly improve the network's performance.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Design of data-path for a VLIW media coprocessor VLIW媒体协处理器的数据路径设计
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.44
Jing He, Yi-He Sun
{"title":"Design of data-path for a VLIW media coprocessor","authors":"Jing He, Yi-He Sun","doi":"10.1109/ICESS.2005.44","DOIUrl":"https://doi.org/10.1109/ICESS.2005.44","url":null,"abstract":"A design study of data-path for a VLIW media coprocessor is presented. The VLIW coprocessor executes the kernels in media applications, and has great impact on the performance of the media processor. To explore the architecture tradeoff at early stage, we proposed three architecture models, and hand scheduled three typical kernels onto the models, with the instruction set simulator, we evaluated architecture by evaluating the instruction level behavior of the architecture models, so that the data-path can be adapted to kernel programs.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feedback scheduling of real-time control tasks in power-aware embedded systems 功率感知嵌入式系统中实时控制任务的反馈调度
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.56
Feng Xia, Xiaohua Dai, Xiaodong Wang, Youxian Sun
{"title":"Feedback scheduling of real-time control tasks in power-aware embedded systems","authors":"Feng Xia, Xiaohua Dai, Xiaodong Wang, Youxian Sun","doi":"10.1109/ICESS.2005.56","DOIUrl":"https://doi.org/10.1109/ICESS.2005.56","url":null,"abstract":"Power awareness has become a critical issue in real-time scheduling of embedded systems. In the context of control applications, the goal of high control performance and low energy consumption are at odds with each other. While dynamic voltage/frequency scaling (DVS) has proved to be promising in energy saving while preserving task schedulability, traditional DVS algorithms use either open loop or ad hoc solutions, and hence cannot perform well for dynamic systems where the workload varies significantly. By targeting these systems, a novel scheme, namely DVS-FS, which combines DVS and feedback scheduling, is suggested. The objective is to save CPU energy as much as possible, while still providing control performance guarantees, which largely depends on successful schedule of the control task set. DVS-FS exploits feedback control methodology, and facilitates tradeoffs between energy consumption and control performance through controlling the CPU utilization at a considerably high level. Simulation experiments demonstrate that DVS-FS can easily reduce significant energy consumption at the expense of only minor control performance degradation.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信