enter search term and/or author name
Probabilistic design of multimedia embedded systems
Shaoxiong Hua, Gang Qu, Shuvra S. Bhattacharyya
Article No.: 15
In this paper, we propose the novel concept of probabilistic design for multimedia embedded systems, which is motivated by the challenge of how to design, but not overdesign, such systems while systematically incorporating performance requirements...
Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints
Farinaz Koushanfar, Abhijit Davare, David T. Nguyen, Alberto Sangiovanni-Vincentelli, Miodrag Potkonjak
Article No.: 16
Distributed wireless systems (DWSs) are emerging as the enabler for next-generation wireless applications. There is a consensus that DWS-based applications, such as pervasive computing, sensor networks, wireless information networks, and speech...
Hardware/software IP integration using the ROSES design environment
Flávio R. Wagner, Wander Cesário, Ahmed A. Jerraya
Article No.: 17
Considering current time-to-market pressures, IP reuse is mandatory for the design of complex embedded systems-on-chip (SoC). The integration of IP components into a given design is the most complex task in the whole reuse process. This paper...
A log buffer-based flash translation layer using fully-associative sector translation
Sang-Won Lee, Dong-Joo Park, Tae-Sun Chung, Dong-Ho Lee, Sangwon Park, Ha-Joo Song
Article No.: 18
Flash memory is being rapidly deployed as data storage for mobile devices such as PDAs, MP3 players, mobile phones, and digital cameras, mainly because of its low electronic power, nonvolatile storage, high performance, physical stability, and...
An efficient B-tree layer implementation for flash-memory storage systems
Chin-Hsien Wu, Tei-Wei Kuo, Li Ping Chang
Article No.: 19
With the significant growth of the markets for consumer electronics and various embedded systems, flash memory is now an economic solution for storage systems design. Because index structures require intensively fine-grained updates/modifications,...
Improving security for periodic tasks in embedded systems through scheduling
Tao Xie, Xiao Qin
Article No.: 20
While many scheduling algorithms for periodic tasks ignore security requirements posed by sensitive applications and are, consequently, unable to perform properly in embedded systems with security constraints, in this paper, we present an approach...