Embedded Computing Systems (TECS)


Search Issue
enter search term and/or author name


ACM Transactions on Embedded Computing Systems (TECS), Volume 3 Issue 4, November 2004

Modeling and optimizing run-time reconfiguration using evolutionary computation
J. Harkin, T. M. McGinnity, L. P. Maguire
Pages: 661-685
DOI: 10.1145/1027794.1027795

The hardware--software (HW--SW) partitioning of applications to dynamically reconfigurable embedded systems allows for customization of their hardware resources during run-time to meet the demands of executing applications. The run-time...

Dynamic voltage scheduling with buffers in low-power multimedia applications
Chaeseok Im, Soonhoi Ha, Huiseok Kim
Pages: 686-705
DOI: 10.1145/1027794.1027796

Power-efficient design of multimedia applications becomes more important as they are used increasingly in many embedded systems. We propose a simple dynamic voltage scheduling (DVS) technique, which suits multimedia applications well and, in case...

Schedulability analysis of applications with stochastic task execution times
Sorin Manolache, Petru Eles, Zebo Peng
Pages: 706-735
DOI: 10.1145/1027794.1027797

In the past decade, the limitations of models considering fixed (worst-case) task execution times have been acknowledged for large application classes within soft real-time systems. A more realistic model considers the tasks having varying...

Evaluation of hardware and software schedulers for embedded switches
Dimitrios N. Serpanos, Poluxeni Mountrouidou, Maria Gamvrili
Pages: 736-759
DOI: 10.1145/1027794.1027798

High-speed packet switches become increasingly important to embedded systems because they provide multiple parallel data paths necessary in emerging systems such as embedded multiprocessors, multiprotocol communication processors, and so on. The...

Information flow in hybrid systems
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini
Pages: 760-799
DOI: 10.1145/1027794.1027799

Our aim is to study the information flow problem in hybrid systems, namely systems consisting of a discrete program with an analog environment. Information flows compromise the security of a system because they cause leakage of protected...

Multilevel μTESLA: Broadcast authentication for distributed sensor networks
Donggang Liu, Peng Ning
Pages: 800-836
DOI: 10.1145/1027794.1027800

Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of a scalable broadcast authentication scheme named <i>multilevel μTESLA</i> based on μTESLA, a broadcast...

Real-time garbage collection for flash-memory storage systems of real-time embedded systems
Li-Pin Chang, Tei-Wei Kuo, Shi-Wu Lo
Pages: 837-863
DOI: 10.1145/1027794.1027801

Flash-memory technology is becoming critical in building embedded systems applications because of its shock-resistant, power economic, and nonvolatile nature. With the recent technology breakthroughs in both capacity and reliability, flash-memory...