


default search action
ACM Transactions on Embedded Computing Systems, Volume 16
Volume 16, Number 1, November 2016
- Sandeep K. Shukla:
Editorial: Distributed Public Ledgers and Block Chains - What Good Are They for Embedded Systems? 1:1-1:2
- Jerónimo Castrillón Mazo, Cristina Silvano:
Guest Editorial: Special Issue on Virtual Prototyping of Parallel and Embedded Systems (ViPES). 2:1-2:2 - Daniele Bortolotti, Andrea Marongiu, Luca Benini:
VirtualSoC: A Research Tool for Modern MPSoCs. 3:1-3:27 - Philipp Wehner, Jens Rettkowski, Tobias Kalb, Diana Göhringer:
Simulating Reconfigurable Multiprocessor Systems-on-Chip with MPSoCSim. 4:1-4:24 - Christian Sauer, Hans-Peter Loeb:
A Lightweight Framework for the Dynamic Creation and Configuration of Virtual Platforms in SystemC. 5:1-5:16 - Rolf Meyer, Jan Wagner, Bastian Farkas, Sven Alexander Horsinka, Patrick Siegl, Rainer Buchty, Mladen Berekovic:
A Scriptable Standard-Compliant Reporting and Logging Framework for SystemC. 6:1-6:28 - Luis Gabriel Murillo, Robert Lajos Bücs, Rainer Leupers, Gerd Ascheid:
MPSoC Software Debugging on Virtual Platforms via Execution Control with Event Graphs. 7:1-7:25 - Efstathios Sotiriou-Xanthopoulos, Sotirios Xydis, Kostas Siozios, George Economakos, Dimitrios Soudris:
A Framework for Interconnection-Aware Domain-Specific Many-Accelerator Synthesis. 8:1-8:26
- Dakai Zhu, Meikang Qiu, Samarjit Chakraborty:
Guest Editorial: Special Issue on Emerging Technologies in Embedded Software and Systems. 9:1-9:2 - Hrishikesh Jayakumar, Arnab Raha, Vijay Raghunathan:
Sleep-Mode Voltage Scaling: Enabling SRAM Data Retention at Ultra-Low Power in Embedded Microcontrollers. 10:1-10:25 - Stephen Marz, Bradley T. Vander Zanden:
Reducing Power Consumption and Latency in Mobile Devices Using an Event Stream Model. 11:1-11:24 - Renhai Chen, Yi Wang, Jingtong Hu, Duo Liu, Zili Shao, Yong Guan:
Image-Content-Aware I/O Optimization for Mobile Virtualization. 12:1-12:24 - Zonghua Gu, Chao Wang, Haibo Zeng:
Cache-Partitioned Preemption Threshold Scheduling. 13:1-13:30 - Biao Hu, Kai Huang, Gang Chen, Long Cheng, Alois C. Knoll:
Adaptive Workload Management in Mixed-Criticality Systems. 14:1-14:27 - Cumhur Erkan Tuncali, Georgios Fainekos, Yann-Hang Lee:
Automatic Parallelization of Multirate Block Diagrams of Control Systems on Multicore Platforms. 15:1-15:26 - Edoardo Fusella, Alessandro Cilardo:
Crosstalk-Aware Automated Mapping for Optical Networks-on-Chip. 16:1-16:26 - Yuki Iida, Yusuke Fujii, Takuya Azumi, Nobuhiko Nishio, Shinpei Kato:
GPUrpc: Exploring Transparent Access to Remote GPUs. 17:1-17:25 - Kun Wang, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen, Yan Zhang:
Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems. 18:1-18:21 - Song Tan, Wen-Zhan Song, Steve Yothment, Junjie Yang, Lang Tong:
ScorePlus: A Software-Hardware Hybrid and Federated Experiment Environment for Smart Grid. 19:1-19:25
- Charvi A. Majmudar, Bashir I. Morshed:
Autonomous OA Removal in Real-Time from Single Channel EEG Data on a Wearable Device Using a Hybrid Algebraic-Wavelet Algorithm. 20:1-20:16 - Yuan-Hung Kuan, Yuan-Hao Chang, Tseng-Yi Chen, Po-Chun Huang, Kam-yiu Lam:
Space-Efficient Index Scheme for PCM-Based Multiversion Databases in Cyber-Physical Systems. 21:1-21:26 - Yusuf Bora Kartal, Ece Guran Schmidt, Klaus Werner Schmidt:
Modeling Distributed Real-Time Systems in TIOA and UPPAAL. 22:1-22:26 - Sedigheh Asyaban, Mehdi Kargahi, Lothar Thiele, Morteza Mohaqeqi:
Analysis and Scheduling of a Battery-Less Mixed-Criticality System with Energy Uncertainty. 23:1-23:26 - Kanchan Manna, Shivam Swami, Santanu Chattopadhyay, Indranil Sengupta:
Integrated Through-Silicon Via Placement and Application Mapping for 3D Mesh-Based NoC Design. 24:1-24:25 - Hossein Tajik, Bryan Donyanavard, Nikil D. Dutt
, Janmartin Jahn, Jörg Henkel:
SPMPool: Runtime SPM Management for Memory-Intensive Applications in Embedded Many-Cores. 25:1-25:27 - Stefan Schürmans, Gereon Onnebrink, Rainer Leupers, Gerd Ascheid, Xiaotao Chen:
Frequency-Aware ESL Power Estimation for ARM Cortex-A9 Using a Black Box Processor Model. 26:1-26:26 - Jan Henrik Weinstock, Luis Gabriel Murillo, Rainer Leupers, Gerd Ascheid:
Parallel SystemC Simulation for ESL Design. 27:1-27:25
Volume 16, Number 2, April 2017
- Sandeep K. Shukla:
Editorial: Continuing the Course. 28:1-28:2
- Sebastian Fischmeister, Jason Xue:
Guest Editorial: Special Issue on LCTES 2015. 29:1 - Marcos Aurélio Pinto Cunha
, Omayma Matoussi, Frédéric Pétrot:
Detecting Software Cache Coherence Violations in MPSoC Using Traces Captured on Virtual Platforms. 30:1-30:21 - Wenguang Zheng, Hui Wu
:
Dynamic Data-Cache Locking for Minimizing the WCET of a Single Task. 31:1-31:29 - Qingrui Liu
, Changhee Jung, Dongyoon Lee
, Devesh Tiwari:
Compiler-Directed Soft Error Detection and Recovery to Avoid DUE and SDC via Tail-DMR. 32:1-32:26 - Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
A Principled Approach to Secure Multi-core Processor Design with ReWire. 33:1-33:25 - Li-Pin Chang, Po-Han Sung, Po-Tsang Chen, Po-Hung Chen:
Eager Synching: A Selective Logging Strategy for Fast fsync() on Flash-Based Android Devices. 34:1-34:25 - Christian Dietrich
, Martin Hoffmann, Daniel Lohmann
:
Global Optimization of Fixed-Priority Real-Time Systems by RTOS-Aware Control-Flow Analysis. 35:1-35:25 - Jing Liu, Kenli Li, Dakai Zhu, Jianjun Han, Keqin Li:
Minimizing Cost of Scheduling Tasks on Heterogeneous Multicore Embedded Systems. 36:1-36:25 - Ivan Llopard
, Christian Fabre
, Albert Cohen:
From a Formalized Parallel Action Language to Its Efficient Code Generation. 37:1-37:28 - Stanislav Manilov, Björn Franke
, Anthony Magrath, Cedric Andrieu:
Free Rider: A Source-Level Transformation Tool for Retargeting Platform-Specific Intrinsic Functions. 38:1-38:24 - Jing Zeng
, Laurence T. Yang
, Man Lin, Zili Shao
, Dakai Zhu:
System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems. 39:1-39:21
- Stefan Haar, Roland Meyer:
Message from the Guest Editors. 40:1 - Ferenc Bujtor, Lev Sorokin, Walter Vogler:
Testing Preorders for dMTS: Deadlock- and the New Deadlock-/DivergenceTesting. 41:1-41:28 - Stefan Vijzelaar, Wan J. Fokkink
:
Multi-valued Simulation and Abstraction Using Lattice Operations. 42:1-42:26 - Étienne André
, Thomas Chatain, César Rodríguez:
Preserving Partial-Order Runs in Parametric Time Petri Nets. 43:1-43:26 - Béatrice Bérard, Loïc Hélouët, John Mullins:
Non-interference in Partial Order Models. 44:1-44:34 - Olli Saarikivi
, Hernán Ponce de León, Kari Kähkönen, Keijo Heljanko
, Javier Esparza
:
Minimizing Test Suites with Unfoldings of Multithreaded Programs. 45:1-45:24 - Antti Valmari:
Stop It, and Be Stubborn! 46:1-46:26 - Tobias Isenberg:
Incremental Inductive Verification of Parameterized Timed Systems. 47:1-47:24 - Antti Siirtola
, Stavros Tripakis
, Keijo Heljanko
:
When Do We Not Need Complex Assume-Guarantee Rules? 48:1-48:25 - Qi Tang, Twan Basten
, Marc Geilen
, Sander Stuijk
, Jibo Wei:
Task-FIFO Co-Scheduling of Streaming Applications on MPSoCs with Predictable Memory Hierarchy. 49:1-49:25
- Kim-Kwang Raymond Choo
, Yunsi Fei
, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. 50:1-50:5 - Deepak Puthal, Surya Nepal
, Rajiv Ranjan
, Jinjun Chen:
DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream. 51:1-51:24 - Jun Song
, Fan Yang, Kim-Kwang Raymond Choo
, Zhijian Zhuang, Lizhe Wang:
SIPF: A Secure Installment Payment Framework for Drive-Thru Internet. 52:1-52:18 - Zhe Liu, Jian Weng
, Zhi Hu, Hwajeong Seo:
Efficient Elliptic Curve Cryptography for Embedded Devices. 53:1-53:18 - Shan Fu, Guoai Xu, Juan Pan, Zongyue Wang, An Wang:
Differential Fault Attack on ITUbee Block Cipher. 54:1-54:10 - Yang Li, Mengting Chen, Zhe Liu, Jian Wang:
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers. 55:1-55:20 - Arcangelo Castiglione
, Raffaele Pizzolante, Francesco Palmieri, Barbara Masucci, Bruno Carpentieri, Alfredo De Santis
, Aniello Castiglione
:
On-Board Format-Independent Security of Functional Magnetic Resonance Images. 56:1-56:15 - Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. 57:1-57:20 - Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo
, Jinjun Chen:
Securely Reinforcing Synchronization for Embedded Online Contests. 58:1-58:21 - Mehran Mozaffari Kermani
, Reza Azarderakhsh, Anita Aghaie:
Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC. 59:1-59:19 - Keke Gai
, Longfei Qiu, Min Chen
, Hui Zhao, Meikang Qiu:
SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing. 60:1-60:22 - Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. 61:1-61:22
Volume 16, Number 3, July 2017
- Sandeep K. Shukla
:
Editorial: Cyber Security, IoT, Block Chains - Risks and Opportunities. 62:1-62:2
- Marilyn Wolf, Jason Xue:
Guest Editorial: Special Issue on Embedded Computing for IoT. 63:1 - Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
:
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks. 64:1-64:23 - Hrishikesh Jayakumar
, Arnab Raha
, Jacob R. Stevens, Vijay Raghunathan:
Energy-Aware Memory Mapping for Hybrid FRAM-SRAM MCUs in Intermittently-Powered IoT Devices. 65:1-65:23 - Marco Tiloca
, Kirill Nikitin
, Shahid Raza:
Axiom: DTLS-Based Secure IoT Group Communication. 66:1-66:29 - Urbi Chatterjee, Rajat Subhra Chakraborty
, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. 67:1-67:25 - Anfeng Liu, Xiao Liu, Zhipeng Tang, Laurence T. Yang
, Zili Shao:
Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs. 68:1-68:25 - Terrell R. Bennett, Nicholas R. Gans
, Roozbeh Jafari
:
Data-Driven Synchronization for Internet-of-Things Systems. 69:1-69:24 - Zhaoyan Shen
, Zhijian He, Shuai Li, Qixin Wang
, Zili Shao
:
A Multi-Quadcopter Cooperative Cyber-Physical System for Timely Air Pollution Localization. 70:1-70:23 - Jian Wu
, Roozbeh Jafari
:
Seamless Vision-assisted Placement Calibration for Wearable Inertial Sensors. 71:1-71:22
- Bo-Wei Chen, Wen Ji, Zhu Li:
Guest Editorial for ACM TECS Special Issue on Effective Divide-and-Conquer, Incremental, or Distributed Mechanisms of Embedded Designs for Extremely Big Data in Large-Scale Devices. 72:1-72:2 - Anfeng Liu, Xiao Liu, Tianyi Wei, Laurence T. Yang, Seungmin (Charlie) Rho, Anand Paul
:
Distributed Multi-Representative Re-Fusion Approach for Heterogeneous Sensing Data Collection. 73:1-73:25 - Xiaogang Chen, Z. Jane Wang, Xiangyang Ji:
A Load-Balancing Divide-and-Conquer SVM Solver. 74:1-74:10 - Bo Liu, Xiao-Tong Yuan, Yang Yu, Qingshan Liu, Dimitris N. Metaxas:
Parallel Sparse Subspace Clustering via Joint Sample and Parameter Blockwise Partition. 75:1-75:17 - Sun-Yuan Kung, Thee Chanyaswad, J. Morris Chang, Pei Yuan Wu
:
Collaborative PCA/DCA Learning Methods for Compressive Privacy. 76:1-76:18
- Tom Fleming, Huang-Ming Huang, Alan Burns, Christopher D. Gill, Sanjoy K. Baruah, Chenyang Lu:
Corrections to and Discussion of "Implementation and Evaluation of Mixed-criticality Scheduling Approaches for Sporadic Tasks". 77:1-77:4 - Hasna Bouraoui
, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
:
Hardware Architectures for Embedded Speaker Recognition Applications: A Survey. 78:1-78:28 - Ye Xu, Israel Koren, C. Mani Krishna:
AdaFT: A Framework for Adaptive Fault Tolerance for Cyber-Physical Systems. 79:1-79:25 - Daniele Jahier Pagliari
, Mario R. Casu
, Luca P. Carloni
:
Accelerators for Breast Cancer Detection. 80:1-80:25 - Jiunn-Yeu Chen
, Wuu Yang, Wei-Chung Hsu, Bor-Yeh Shen, Quan-Huei Ou:
On Static Binary Translation of ARM/Thumb Mixed ISA Binaries. 81:1-81:25 - Wilson M. Tan, Paul Sullivan, Hamish Watson, Joanna Slota-Newson, Stephen A. Jarvis
:
An Indoor Test Methodology for Solar-Powered Wireless Sensor Networks. 82:1-82:25 - Tseng-Yi Chen
, Yuan-Hao Chang
, Shuo-Han Chen
, Nien-I Hsu, Hsin-Wen Wei, Wei-Kuan Shih:
On Space Utilization Enhancement of File Systems for Embedded Storage Systems. 83:1-83:28 - Aaron Landy
, Greg Stitt:
Serial Arithmetic Strategies for Improving FPGA Throughput. 84:1-84:25 - Rajeev Alur, Vojtech Forejt
, Salar Moarref, Ashutosh Trivedi:
Schedulability of Bounded-Rate Multimode Systems. 85:1-85:27 - Maryam Bandari, Robert Simon, Hakan Aydin:
DMS-Based Energy Optimizations for Clustered WSNs. 86:1-86:28 - Rajesh Devaraj
, Arnab Sarkar, Santosh Biswas:
Fault-Tolerant Preemptive Aperiodic RT Scheduling by Supervisory Control of TDES on Multiprocessors. 87:1-87:25 - Qining Lu, Guanpeng Li
, Karthik Pattabiraman, Meeta Sharma Gupta, Jude A. Rivers:
Configurable Detection of SDC-causing Errors in Programs. 88:1-88:25 - Guoxian Huang, Lei Wang:
An FPGA-Based Architecture for High-Speed Compressed Signal Reconstruction. 89:1-89:23 - Bogdan Groza
, Pal-Stefan Murvay
, Anthony Van Herrewege, Ingrid Verbauwhede
:
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks. 90:1-90:28
Volume 16, Number 4, September 2017
- Sandeep K. Shukla:
Editorial: Security of Mobile Devices. 91:1-91:2
- Jimson Mathew, Rajat Subhra Chakraborty, Dhiraj K. Pradhan:
Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded Computing". 92:1-92:2 - Yohan Ko
, Reiley Jeyapaul, Youngbin Kim
, Kyoungwoo Lee, Aviral Shrivastava
:
Protecting Caches from Soft Errors: A Microarchitect's Perspective. 93:1-93:28 - Stefano Esposito
, Massimo Violante, Marco Sozzi, Marco Terrone, Massimo Traversone:
A Novel Method for Online Detection of Faults Affecting Execution-Time in Multicore-Based Systems. 94:1-94:19 - Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Harika Santapuri, Conor Patrick, Leyla Nazhandali, Patrick Schaumont
:
Analyzing the Fault Injection Sensitivity of Secure Embedded Software. 95:1-95:25 - Maria Isabel Mera
, Jonah Caplan, Seyyed Hasan Mozafari, Brett H. Meyer, Peter A. Milder
:
Area, Throughput, and Power Trade-Offs for FPGA- and ASIC-Based Execution Stream Compression. 96:1-96:20
- Tigori Kabland Toussaint Gautier, Jean-Luc Béchennec
, Sébastien Faucou
, Olivier Henry Roux
:
Formal Model-Based Synthesis of Application-Specific Static RTOS. 97:1-97:25 - Francisco Sant'Anna
, Roberto Ierusalimschy, Noemi de La Rocque Rodriguez, Silvana Rossetto, Adriano Branco
:
The Design and Implementation of the Synchronous Language CÉU. 98:1-98:26 - Isabella Stilkerich, Clemens Lang, Christoph Erhardt, Christian Bay, Michael Stilkerich:
The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems. 99:1-99:30 - Mohamed Hassan
, Hiren D. Patel, Rodolfo Pellizzoni:
PMC: A Requirement-Aware DRAM Controller for Multicore Mixed Criticality Systems. 100:1-100:28 - Tianyi Wang, Soamar Homsi, Linwei Niu, Shaolei Ren
, Ou Bai
, Gang Quan
, Meikang Qiu:
Harmonicity-Aware Task Partitioning for Fixed Priority Scheduling of Probabilistic Real-Time Tasks on Multi-Core Platforms. 101:1-101:21 - Yi Wang
, Yajun Ha:
A DFA-Resistant and Masked PRESENT with Area Optimization for RFID Applications. 102:1-102:22 - Kartik Nagar
, Y. N. Srikant:
Refining Cache Behavior Prediction Using Cache Miss Paths. 103:1-103:26 - Massimo Benerecetti, Marco Faella
:
Automatic Synthesis of Switching Controllers for Linear Hybrid Systems: Reachability Control. 104:1-104:27 - Nathan Sandoval, Casey Mackin, Sean Whitsitt
, Vijay Shankar Gopinath, Sachidanand Mahadevan, Andrew Milakovich, Kyle Merry, Jonathan Sprinkle
, Roman Lysecky:
Task Transition Scheduling for Data-Adaptable Systems. 105:1-105:28 - Xi Zheng
, Christine Julien
, Hongxu Chen, Rodion M. Podorozhny, Franck Cassez
:
Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems. 106:1-106:24 - Kaisheng Ma
, Xueqing Li, Huichu Liu, Xiao Sheng, Yiqun Wang, Karthik Swaminathan, Yongpan Liu, Yuan Xie, John Sampson, Vijaykrishnan Narayanan:
Dynamic Power and Energy Management for Energy Harvesting Nonvolatile Processor Systems. 107:1-107:23 - Navonil Chatterjee
, Suraj Paul, Santanu Chattopadhyay:
Fault-Tolerant Dynamic Task Mapping and Scheduling for Network-on-Chip-Based Multicore Platform. 108:1-108:24 - Prashant Ahir, Mehran Mozaffari Kermani
, Reza Azarderakhsh:
Lightweight Architectures for Reliable and Fault Detection Simon and Speck Cryptographic Algorithms on FPGA. 109:1-109:17 - Chen Pan, Mimi Xie, Chengmo Yang, Yiran Chen, Jingtong Hu
:
Exploiting Multiple Write Modes of Nonvolatile Main Memory in Embedded Systems. 110:1-110:26 - Yu Li, Albert M. K. Cheng
:
Toward a Practical Regularity-based Model: The Impact of Evenly Distributed Temporal Resource Partitions. 111:1-111:25 - Yooseong Kim, David Broman, Aviral Shrivastava
:
WCET-Aware Function-Level Dynamic Code Management on Scratchpad Memory. 112:1-112:26 - Guanjun Liu, Mengchu Zhou, Changjun Jiang:
Petri Net Models and Collaborativeness for Parallel Processes with Resource Sharing and Message Passing. 113:1-113:20 - Michal Ciszewski, Konrad Iwanicki
:
Efficient Automated Code Partitioning for Microcontrollers with Switchable Memory Banks. 114:1-114:26 - Yun Liang, Xiuhong Li:
Efficient Kernel Management on GPUs. 115:1-115:24 - Yuliang Sun
, Lanjun Wang
, Chen Wang, Yu Wang:
Exploiting Stable Data Dependency in Stream Processing Acceleration on FPGAs. 116:1-116:26 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu
, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. 117:1-117:24
Volume 16, Number 5s, October 2017
CASES 2017
- Avinash Malik
, Partha S. Roop, Sidharta Andalam, Mark Trew, Michael Mendler:
Modular Compilation of Hybrid Systems for Emulation and Large Scale Simulation. 118:1-118:21 - Gabriel Hjort Blindell, Mats Carlsson, Roberto Castañeda Lozano, Christian Schulte:
Complete and Practical Universal Instruction Selection. 119:1-119:18 - Xuesong Su, Hui Wu
, Jingling Xue
:
An Efficient WCET-Aware Instruction Scheduling and Register Allocation Approach for Clustered VLIW Processors. 120:1-120:21 - Paul-Jules Micolet, Aaron Smith, Christophe Dubach:
A Study of Dynamic Phase Adaptation Using a Dynamic Multicore Processor. 121:1-121:19 - Roman Trüb
, Georgia Giannopoulou, Andreas Tretter, Lothar Thiele:
Implementation of Partitioned Mixed-Criticality Scheduling on a Multi-Core Platform. 122:1-122:21 - Ujjwal Gupta, Chetan Arvind Patil
, Ganapati Bhat, Prabhat Mishra
, Ümit Y. Ogras
:
DyPO: Dynamic Pareto-Optimal Configuration Selection for Heterogeneous MpSoCs. 123:1-123:20 - Vignyan Reddy Kothinti Naresh, Dibakar Gope, Mikko H. Lipasti:
The CURE: Cluster Communication Using Registers. 124:1-124:19 - Lana Josipovic
, Philip Brisk
, Paolo Ienne:
An Out-of-Order Load-Store Queue for Spatial Computing. 125:1-125:19 - Brian Crites
, Karen Kong, Philip Brisk
:
Diagonal Component Expansion for Flow-Layer Placement of Flow-Based Microfluidic Biochips. 126:1-126:18 - Mahmoud Elfar
, Zhanwei Zhong
, Zipeng Li
, Krishnendu Chakrabarty
, Miroslav Pajic
:
Synthesis of Error-Recovery Protocols for Micro-Electrode-Dot-Array Digital Microfluidic Biochips. 127:1-127:22 - Mark Gottscho
, Irina Alam, Clayton Schoeny, Lara Dolecek, Puneet Gupta
:
Low-Cost Memory Fault Tolerance for IoT Devices. 128:1-128:25 - Hasan Erdem Yantir, Ahmed M. Eltawil
, Fadi J. Kurdahi
:
Approximate Memristive In-memory Computing. 129:1-129:18 - Arnab Raha
, Vijay Raghunathan:
qLUT: Input-Aware Quantized Table Lookup for Energy-Efficient Approximate Accelerators. 130:1-130:23 - Begum Egilmez, Matthew Schuchhardt, Gokhan Memik, Raid Ayoub, Niranjan Soundararajan, Michael Kishinevsky:
User-aware Frame Rate Management in Android Smartphones. 131:1-131:17 - Hao Yan, Lei Jiang, Lide Duan, Wei-Ming Lin, Eugene John
:
FlowPaP and FlowReR: Improving Energy Efficiency and Performance for STT-MRAM-Based Handheld Devices under Read Disturbance. 132:1-132:20 - Siddharth Rai
, Mainak Chaudhuri:
Using Criticality of GPU Accesses in Memory Management for CPU-GPU Heterogeneous Multi-Core Processors. 133:1-133:23 - Won-Kyung Kang, Dongkun Shin, Sungjoo Yoo:
Reinforcement Learning-Assisted Garbage Collection to Mitigate Long-Tail Latency in SSD. 134:1-134:20 - Andreas Tretter, Georgia Giannopoulou, Matthias Baer, Lothar Thiele:
Minimising Access Conflicts on Shared Multi-Bank Memory. 135:1-135:20
- M. Sadegh Riazi, Mohammad Samragh, Farinaz Koushanfar
:
CAMsure: Secure Content-Addressable Memory for Approximate Search. 136:1-136:20 - Luca Piccolboni
, Alessandro Menon, Graziano Pravadelli
:
Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models. 137:1-137:19 - Vincent Migliore, Cédric Seguin, Maria Mendez Real
, Vianney Lapotre
, Arnaud Tisserand, Caroline Fontaine, Guy Gogniat
, Russell Tessier:
A High-Speed Accelerator for Homomorphic Encryption using the Karatsuba Algorithm. 138:1-138:17 - Jiacheng Zhang, Youyou Lu, Jiwu Shu, Xiongjun Qin:
FlashKV: Accelerating KV Performance with Open-Channel SSDs. 139:1-139:19 - Hongseok Kim, Eyee Hyun Nam, JiHyuck Yun, Sheayun Lee, Sang Lyul Min:
P-BMS: A Bad Block Management Scheme in Parallelized Flash Memory Storage Devices. 140:1-140:19 - Fei Wu, Meng Zhang, Yajuan Du, Xubin He, Ping Huang, Changsheng Xie, Jiguang Wan:
A Program Interference Error Aware LDPC Scheme for Improving NAND Flash Decoding Performance. 141:1-141:20 - Yi Wang
, Lisha Dong
, Rui Mao:
P-Alloc: Process-Variation Tolerant Reliability Management for 3D Charge-Trapping Flash Memory. 142:1-142:19 - Benjamin Tan
, Morteza Biglari-Abhari, Zoran Salcic:
An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC. 143:1-143:20 - Vasileios Tsoutsouras, Dimosthenis Masouros, Sotirios Xydis, Dimitrios Soudris
:
SoftRM: Self-Organized Fault-Tolerant Resource Management for Failure Detection and Recovery in NoC Based Many-Cores. 144:1-144:19 - Ganapati Bhat, Suat Gumussoy
, Ümit Y. Ogras
:
Power-Temperature Stability and Safety Analysis for Multiprocessor Systems. 145:1-145:19 - Siqi Wang
, Guanwen Zhong, Tulika Mitra
:
CGPredict: Embedded GPU Performance Estimation from Single-Threaded Applications. 146:1-146:22 - Amit Kumar Singh
, Alok Prakash, Basireddy Karunakar Reddy
, Geoff V. Merrett, Bashir M. Al-Hashimi:
Energy-Efficient Run-Time Mapping and Thread Partitioning of Concurrent OpenCL Applications on CPU-GPU MPSoCs. 147:1-147:22 - Kenneth O'Neal, Philip Brisk
, Ahmed Abousamra
, Zack Waters, Emily Shriver:
GPU Performance Estimation using Software Rasterization and Machine Learning. 148:1-148:21 - Pietro Fezzardi
, Marco Lattuada
, Fabrizio Ferrandi
:
Using Efficient Path Profiling to Optimize Memory Consumption of On-Chip Debugging for High-Level Synthesis. 149:1-149:19 - Luca Piccolboni
, Paolo Mantovani, Giuseppe Di Guglielmo, Luca P. Carloni
:
COSMOS: Coordination of High-Level Synthesis and Memory Optimization for Hardware Accelerators. 150:1-150:22 - Mohammad Motamedi, Daniel D. Fong
, Soheil Ghiasi:
Machine Intelligence on Resource-Constrained IoT Devices: The Case of Thread Granularity Optimization for CNN Inference. 151:1-151:19 - Ilias Vougioukas
, Andreas Sandberg
, Stephan Diestelhorst, Bashir M. Al-Hashimi, Geoff V. Merrett:
Nucleus: Finding the Sharing Limit of Heterogeneous Cores. 152:1-152:16 - Dimitra Papagiannopoulou, Andrea Marongiu, Tali Moreshet, Maurice Herlihy, R. Iris Bahar
:
Edge-TM: Exploiting Transactional Memory for Error Tolerance and Energy Efficiency. 153:1-153:18 - Pirmin Vogel, Andreas Kurth
, Johannes Weinbuch, Andrea Marongiu, Luca Benini
:
Efficient Virtual Memory Sharing via On-Accelerator Page Table Walking in Heterogeneous Embedded SoCs. 154:1-154:19 - Hoda Aghaei Khouzani
, Chengmo Yang:
A DWM-Based Stack Architecture Implementation for Energy Harvesting Systems. 155:1-155:18 - Jaehyun Park
, Hitesh Joshi, Hyung Gyu Lee, Sayfe Kiaei, Ümit Y. Ogras
:
Flexible PV-cell Modeling for Energy Harvesting in Wearable IoT Applications. 156:1-156:20 - Sidharta Andalam, Nathan Allen
, Avinash Malik, Partha S. Roop, Mark Trew:
A Novel Emulation Model of the Cardiac Conduction System. 157:1-157:20 - Bita Darvish Rouhani, Azalia Mirhoseini, Farinaz Koushanfar
:
RISE: An Automated Framework for Real-Time Intelligent Video Surveillance on FPGA. 158:1-158:18 - Soumya Basu, Loris Duch, Rubén Braojos, Giovanni Ansaloni, Laura Pozzi, David Atienza:
An Inexact Ultra-low Power Bio-signal Processing Architecture With Lightweight Error Recovery. 159:1-159:19 - Joost van Pinxten, Umar Waqas, Marc Geilen
, Twan Basten
, Lou J. Somers:
Online Scheduling of 2-Re-entrant Flexible Manufacturing Systems. 160:1-160:20 - Matthias Beckert, Rolf Ernst:
Response Time Analysis for Sporadic Server Based Budget Scheduling in Real Time Virtualization Environments. 161:1-161:19 - Xiaowen Chen, Zhonghai Lu
, Sheng Liu, Shuming Chen:
Round-trip DRAM Access Fairness in 3D NoC-based Many-core Systems. 162:1-162:21
- Jaewoo Lee
, Hoon Sung Chwa, Linh T. X. Phan, Insik Shin, Insup Lee:
MC-ADAPT: Adaptive Task Dropping in Mixed-Criticality Scheduling. 163:1-163:21 - Benjamin Rouxel, Steven Derrien, Isabelle Puaut:
Tightening Contention Delays While Scheduling Parallel Applications on Multi-core Architectures. 164:1-164:20 - Rehan Ahmed, Pengcheng Huang, Max Millen, Lothar Thiele:
On The Design and Application of Thermal Isolation Servers. 165:1-165:19 - Xavier Allamigeon, Stéphane Gaubert, Eric Goubault, Sylvie Putot, Nikolas Stott:
A Fast Method to Compute Disjunctive Quadratic Invariants of Numerical Programs. 166:1-166:19 - Christoph Schulze, Rance Cleaveland:
Improving Invariant Mining via Static Analysis. 167:1-167:20 - Sagar Chaki, Dionisio de Niz:
Formal Verification of a Timing Enforcer Implementation. 168:1-168:19 - Mohammadreza Mehrabian, Mohammad Khayatian, Aviral Shrivastava
, John C. Eidson, Patricia Derler
, Hugo A. Andrade, Ya-Shian Li-Baboud, Edward R. Griffor, Marc Weiss
, Kevin B. Stanton:
Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems. 169:1-169:20 - Jyotirmoy V. Deshmukh, Marko Horvat, Xiaoqing Jin, Rupak Majumdar, Vinayak S. Prabhu:
Testing Cyber-Physical Systems through Bayesian Optimization. 170:1-170:18 - Youcheng Sun
, Marco Di Natale:
Weakly Hard Schedulability Analysis for Fixed Priority Scheduling of Periodic Real-Time Tasks. 171:1-171:19 - Johannes Schlatow
, Rolf Ernst:
Response-Time Analysis for Task Chains with Complex Precedence and Blocking Relations. 172:1-172:19 - Philip S. Kurtin
, Marco Jan Gerrit Bekooij:
An Abstraction-Refinement Theory for the Analysis and Design of Real-Time Systems. 173:1-173:20 - Iman Azimi
, Arman Anzanpour
, Amir M. Rahmani, Tapio Pahikkala
, Marco Levorato, Pasi Liljeberg, Nikil D. Dutt
:
HiCH: Hierarchical Fog-Assisted Computing Architecture for Healthcare IoT. 174:1-174:20 - Yecheng Zhao, Chao Peng, Haibo Zeng, Zonghua Gu
:
Optimization of Real-Time Software Implementing Multi-Rate Synchronous Finite State Machines. 175:1-175:21 - Timothy Bourke, Francois Carcenac, Jean-Louis Colaço, Bruno Pagano, Cédric Pasteur, Marc Pouzet:
A Synchronous Look at the Simulink Standard Library. 176:1-176:24 - Jiajie Wang, Michael Mendler, Partha S. Roop, Bruno Bodin
:
Timing Analysis of Synchronous Programs using WCRT Algebra: Scalability through Abstraction. 177:1-177:19 - Srinivas Pinisetty, Partha S. Roop, Steven Smyth, Nathan Allen
, Stavros Tripakis
, Reinhard von Hanxleden:
Runtime Enforcement of Cyber-Physical Systems. 178:1-178:25 - Qingrui Liu, Xiaolong Wu, Larry Kittinger, Markus Levy, Changhee Jung:
BenchPrime: Effective Building of a Hybrid Benchmark Suite. 179:1-179:22 - Simon Schuster, Peter Ulbrich
, Isabella Stilkerich, Christian Dietrich
, Wolfgang Schröder-Preikschat:
Demystifying Soft-Error Mitigation by Control-Flow Checking - A New Perspective on its Effectiveness. 180:1-180:19 - Shaswot Shresthamali
, Masaaki Kondo, Hiroshi Nakamura
:
Adaptive Power Management in Solar Energy Harvesting Sensor Node Using Reinforcement Learning. 181:1-181:21 - Sang-Hoon Kim, Jinkyu Jeong
, Jin-Soo Kim:
Application-Aware Swapping for Mobile Systems. 182:1-182:19 - Cheng Ji, Li-Pin Chang, Liang Shi, Congming Gao, Chao Wu, Yuangang Wang, Chun Jason Xue:
Lightweight Data Compression for Mobile Flash Storage. 183:1-183:18 - Ramy Medhat
, Michael O. Lam
, Barry L. Rountree, Borzoo Bonakdarpour, Sebastian Fischmeister:
Managing the Performance/Error Tradeoff of Floating-point Intensive Applications. 184:1-184:19 - Andrew Sogokon
, Khalil Ghorbal
, Taylor T. Johnson
:
Operational Models for Piecewise-Smooth Systems. 185:1-185:19 - Chao Huang, Xin Chen, Wang Lin, Zhengfeng Yang, Xuandong Li:
Probabilistic Safety Verification of Stochastic Hybrid Systems Using Barrier Certificates. 186:1-186:19 - Xin Chen, Sergio Mover, Sriram Sankaranarayanan:
Compositional Relational Abstraction for Nonlinear Hybrid Systems. 187:1-187:19 - Vuk Lesi, Ilija Jovanov, Miroslav Pajic
:
Security-Aware Scheduling of Embedded Control Tasks. 188:1-188:21 - Sumana Ghosh
, Souradeep Dutta, Soumyajit Dey, Pallab Dasgupta:
A Structured Methodology for Pattern based Adaptive Scheduling in Embedded Control. 189:1-189:22 - Ivan Gavran, Rupak Majumdar, Indranil Saha:
Antlab: A Multi-Robot Task Server. 190:1-190:19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.