Embedded Computing Systems (TECS)


Search Issue
enter search term and/or author name


Editorial: Security of Embedded Systems and Cyber Irons -- Embedded Systems for Security
Sandeep K. Shukla
Article No.: 62
DOI: 10.1145/2976731

Section: Editorial

Guest Editorial for Special Issue of ESWEEK 2015
Petru Eles, Rolf Ernst
Article No.: 63
DOI: 10.1145/2968218

VecRA: A Vector-Aware Register Allocator for GPU Shader Processors
Yi-Ping You, Szu-Chien Chen
Article No.: 64
DOI: 10.1145/2961026

Graphics processing units (GPUs) are now widely used in embedded systems for manipulating computer graphics and even for general-purpose computation. However, many embedded systems have to manage highly restricted hardware resources in order to...

An Efficient Technique of Application Mapping and Scheduling on Real-Time Multiprocessor Systems for Throughput Optimization
Weichen Liu, Chunhua Xiao
Article No.: 65
DOI: 10.1145/2950051

Multiprocessor systems are becoming ubiquitous in today’s embedded systems design. In this article, we address the problem of mapping an application represented by a Homogeneous Synchronous Dataflow (HSDF) graph onto a real-time...

High-Performance and Energy-Efficient Network-on-Chip Architectures for Graph Analytics
Karthi Duraisamy, Hao Lu, Partha Pratim Pande, Ananth Kalyanaraman
Article No.: 66
DOI: 10.1145/2961027

With its applicability spanning numerous data-driven fields, the implementation of graph analytics on multicore platforms is gaining momentum. One of the most important components of a multicore chip is its communication backbone. Due to inherent...

Reliability-Aware Adaptations for Shared Last-Level Caches in Multi-Cores
Florian Kriebel, Semeen Rehman, Arun Subramaniyan, Segnon Jean Bruno Ahandagbe, Muhammad Shafique, Jörg Henkel
Article No.: 67
DOI: 10.1145/2961059

On account of their large footprint, on-chip last-level caches in multi-core systems are one of the most vulnerable components to soft errors. However, vulnerability to soft errors highly depends on the configuration and parameters of the...

On the Improved Hard Real-Time Scheduling of Cyclo-Static Dataflow
Jelena Spasic, Di Liu, Emanuele Cannella, Todor Stefanov
Article No.: 68
DOI: 10.1145/2932188

Recently, it has been shown that the hard real-time scheduling theory can be applied to streaming applications modeled as acyclic Cyclo-Static Dataflow (CSDF) graphs. However, this recent approach is not always efficient in terms of throughput and...

A Scalable Algebraic Method to Infer Quadratic Invariants of Switched Systems
Xavier Allamigeon, Stéphane Gaubert, Nikolas Stott, Éric Goubault, Sylvie Putot
Article No.: 69
DOI: 10.1145/2932187

We present a new numerical abstract domain based on ellipsoids designed for the formal verification of switched linear systems. Unlike the existing approaches, this domain does not rely on a user-given template. We overcome the difficulty that...

Static Analysis of Runtime Errors in Interrupt-Driven Programs via Sequentialization
Xueguang Wu, Liqian Chen, Antoine Miné, Wei Dong, Ji Wang
Article No.: 70
DOI: 10.1145/2914789

Embedded software often involves intensive numerical computations and suffers from a number of runtime errors. The technique of numerical static analysis is of practical importance for checking the correctness of embedded software. However, most...

Loosely Time-Triggered Architectures: Improvements and Comparisons
Guillaume Baudart, Albert Benveniste, Timothy Bourke
Article No.: 71
DOI: 10.1145/2932189

Loosely Time-Triggered Architectures (LTTAs) are a proposal for constructing distributed embedded control systems. They build on the quasi-periodic architecture, where computing units execute nearly periodically, by adding a thin layer of...

Section: Editorial

A Universal Application Storage System Based on Smart Card
Jie Shen, Yingjue Cai, Yang Ren, Xiao Yang
Article No.: 72
DOI: 10.1145/2886116

Nowadays, electronic commerce (e-commerce) has brought facilitation to people’s daily lives. Smart-card-based systems are widely used as an implementation, where smart cards act as a secure carrier for small-sized data. However, most of...

Harmonic Segment-Based Semi-Partitioning Scheduling on Multi-Core Real-Time Systems
Hadeer A. Hassan, Sameh A. Salem, Ahmed M. Mostafa, E. M. Saad
Article No.: 73
DOI: 10.1145/2933388

Nowadays, the issue of scheduling multi-core real-time systems has become the focus of such research in industrial, biomedical, military, and other fields. As a consequence, a new semi-partitioning algorithm that uses a static Rate-Monotonic...

JOM: A Joint Operation Mechanism for NAND Flash Memory
Chin-Hsien Wu, Syuan-An Chen
Article No.: 74
DOI: 10.1145/2915916

In the storage systems of NAND flash memory, an intermediate software called a Flash Translation Layer (FTL) is adopted to hide the characteristics of NAND flash memory and provide efficient management for NAND flash memory. Current flash...

A Novel Embedded Interpolation Algorithm with Negative Squared Distance for Real-Time Endomicroscopy
Wei Ming Chiew, Feng Lin, Hock Soon Seah
Article No.: 75
DOI: 10.1145/2905367

Interpolation is the most executed operation and one of the main bottlenecks in embedded imaging, registration, and rendering systems. Existing methods either lack parallelization and scalability capabilities or are too computationally complex to...

CURA: A Framework for Quality-Retaining Power Saving on Mobile OLED Displays
Chun-Han Lin, Chih-Kai Kang, Pi-Cheng Hsiu
Article No.: 76
DOI: 10.1145/2909875

Organic Light-Emitting Diode (OLED) technology is regarded as a promising alternative to mobile displays. In this article, we introduce the design, algorithm, and implementation of a novel framework called CURA for quality-retaining power saving...

Persistent Clocks for Batteryless Sensing Devices
Josiah Hester, Nicole Tobias, Amir Rahmati, Lanny Sitanayah, Daniel Holcomb, Kevin Fu, Wayne P. Burleson, Jacob Sorber
Article No.: 77
DOI: 10.1145/2903140

Sensing platforms are becoming batteryless to enable the vision of the Internet of Things, where trillions of devices collect data, interact with each other, and interact with people. However, these batteryless sensing platforms—that rely...

FE-SViT: A SViT-Based Fuzzy Extractor Framework
Kai Xi, Jiankun Hu, B. V. K. Vijaya Kumar
Article No.: 78
DOI: 10.1145/2930669

As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1)...

A Methodology for Estimating Performance and Power Consumption of Embedded Flash File Systems
Pierre Olivier, Jalil Boukhobza, Eric Senn, Hamza Ouarnoughi
Article No.: 79
DOI: 10.1145/2903139

In the embedded systems domain, obtaining performance and power consumption estimations is extremely valuable in numerous cases. This is particularly true during the design stage, as designers of complex embedded systems face an increasingly large...