首页 > 最新文献

2007 Fifth Workshop on Intelligent Solutions in Embedded Systems最新文献

英文 中文
Intelligent, Fault Tolerant Control for Autonomous Systems 自治系统的智能容错控制
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408488
Willibald Krenn, F. Wotawa
We present a methodology for intelligent control of an autonomous and resource constrained embedded system. Geared towards mastering permanent and transient faults by dynamic reconfiguration, our approach uses rules for describing device functionality, valid environmental interactions, and goals the system has to reach. Besides rules, we use functions that characterize a goal's target activity profile. The target activity profile controls the frequency our system uses to reach the corresponding goal. In the paper we discuss a first implementation of the given methodology, and introduce useful extensions. In order to underline the feasibility and effectiveness of the presented control system, we present a case study that has been carried out on a prototype system.
我们提出了一种智能控制自主和资源受限嵌入式系统的方法。我们的方法旨在通过动态重新配置来控制永久和短暂故障,我们的方法使用规则来描述设备功能、有效的环境交互和系统必须达到的目标。除了规则之外,我们还使用函数来描述目标的目标活动概要。目标活动配置文件控制系统用于达到相应目标的频率。在本文中,我们讨论了给出的方法的第一个实现,并介绍了有用的扩展。为了强调所提出的控制系统的可行性和有效性,我们提出了一个在原型系统上进行的案例研究。
{"title":"Intelligent, Fault Tolerant Control for Autonomous Systems","authors":"Willibald Krenn, F. Wotawa","doi":"10.1109/WISES.2007.4408488","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408488","url":null,"abstract":"We present a methodology for intelligent control of an autonomous and resource constrained embedded system. Geared towards mastering permanent and transient faults by dynamic reconfiguration, our approach uses rules for describing device functionality, valid environmental interactions, and goals the system has to reach. Besides rules, we use functions that characterize a goal's target activity profile. The target activity profile controls the frequency our system uses to reach the corresponding goal. In the paper we discuss a first implementation of the given methodology, and introduce useful extensions. In order to underline the feasibility and effectiveness of the presented control system, we present a case study that has been carried out on a prototype system.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Decision Model For Efficient Requirement Traceability In SPICE Compliant Development SPICE兼容开发中高效需求追溯的集成决策模型
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408500
Bernhard M. Turban, M. Kucera, A. Tsakpinis, Christian Wolff
Requirement traceability ensures that (SW-)products meet their requirements and additionally makes the estimation of the consequences of requirement changes possible. It is especially difficult to establish at the transition from requirements specification to its provision in the design, because design processes represent creative and complex transfers of mostly unique problem constellations into a sustainable solution (so-called Wicked Problems). At first, this article searches for symptoms of the problem in analyzing the process model of ISO 12207, the foundation of SPICE or CMMi. This analysis mainly serves the derivation of a concept for the integrated extension of today's traceability models with the aspect of documented design decisions. In the context of current approaches in Rationale Management, our concept proofs as sustainable solution that supports - heavyweight" prescriptive approaches as well as - lightweight" pragmatic approaches and -moreover -shows interdependencies between both kinds.
需求可追溯性确保(SW-)产品满足它们的需求,并且使得对需求变更的后果的评估成为可能。在从需求规范到设计提供的过渡阶段建立需求规范是特别困难的,因为设计过程代表了将大多数独特的问题群创造性地和复杂地转移到可持续的解决方案(所谓的Wicked Problems)。本文首先通过对ISO 12207过程模型(SPICE或CMMi的基础)的分析,寻找问题的症状。这个分析主要是为今天的可跟踪性模型的集成扩展提供一个概念的推导,该模型具有文档化的设计决策方面。在基本原理管理中当前方法的背景下,我们的概念证明是可持续的解决方案,它支持重量级的“规定性方法”和轻量级的实用方法,而且还显示了两种方法之间的相互依赖性。
{"title":"An Integrated Decision Model For Efficient Requirement Traceability In SPICE Compliant Development","authors":"Bernhard M. Turban, M. Kucera, A. Tsakpinis, Christian Wolff","doi":"10.1109/WISES.2007.4408500","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408500","url":null,"abstract":"Requirement traceability ensures that (SW-)products meet their requirements and additionally makes the estimation of the consequences of requirement changes possible. It is especially difficult to establish at the transition from requirements specification to its provision in the design, because design processes represent creative and complex transfers of mostly unique problem constellations into a sustainable solution (so-called Wicked Problems). At first, this article searches for symptoms of the problem in analyzing the process model of ISO 12207, the foundation of SPICE or CMMi. This analysis mainly serves the derivation of a concept for the integrated extension of today's traceability models with the aspect of documented design decisions. In the context of current approaches in Rationale Management, our concept proofs as sustainable solution that supports - heavyweight\" prescriptive approaches as well as - lightweight\" pragmatic approaches and -moreover -shows interdependencies between both kinds.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deployment of Sensor Networks: Problems and Passive Inspection 传感器网络的部署:问题和被动检测
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408504
M. Ringwald, K. Römer
Deployment of sensor networks is concerned with setting up an operational wireless sensor network in a real-world setting. Unfortunately, deployment is a labor-intensive and cumbersome task as environmental influences often degrade performance or trigger bugs in the sensor network that could not be observed during lab tests. In this paper, we, firstly, study existing sensor networks to identify and classify typical problems that have been encountered during deployment. Secondly, we investigate whether and how the existence of these problems can be detected by means of passive inspection, where messages exchanged in the sensor network are overheard and analyzed such that modification of the sensor network is not required. We, thirdly, show how passive inspection can be implemented in a practical tool.
传感器网络的部署涉及在现实环境中建立可操作的无线传感器网络。不幸的是,部署是一项劳动密集型和繁琐的任务,因为环境影响经常会降低性能或触发传感器网络中的错误,而这些错误在实验室测试中无法观察到。本文首先对现有传感器网络进行研究,对部署过程中遇到的典型问题进行识别和分类。其次,我们研究是否以及如何通过被动检测来检测这些问题的存在,在被动检测中,传感器网络中交换的消息被窃听并分析,从而不需要修改传感器网络。第三,我们展示了如何在一个实用的工具中实现被动检查。
{"title":"Deployment of Sensor Networks: Problems and Passive Inspection","authors":"M. Ringwald, K. Römer","doi":"10.1109/WISES.2007.4408504","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408504","url":null,"abstract":"Deployment of sensor networks is concerned with setting up an operational wireless sensor network in a real-world setting. Unfortunately, deployment is a labor-intensive and cumbersome task as environmental influences often degrade performance or trigger bugs in the sensor network that could not be observed during lab tests. In this paper, we, firstly, study existing sensor networks to identify and classify typical problems that have been encountered during deployment. Secondly, we investigate whether and how the existence of these problems can be detected by means of passive inspection, where messages exchanged in the sensor network are overheard and analyzed such that modification of the sensor network is not required. We, thirdly, show how passive inspection can be implemented in a practical tool.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Physical modelling in SystemC-WMS and real time synthesis of electric guitar effects 在SystemC-WMS中的物理建模和电吉他效果的实时合成
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408493
Francesco Gambini, M. Conti, S. Orcioni, F. Ripa, M. Caldari
Physical models are widely used for sound synthesis and transformation. This paper presents a general methodology for the integration of physical modelling of sounds in a system level design environment using SystemC. The methodology has been applied in particular for physical modelling of electric guitar effects. The model developed has been used for a real time synthesis of a tunable electric guitar effects generator on a PC useful for the optimization of the algorithm for a future hardware implementation and integration in a DSP architecture for sound synthesis.
物理模型广泛应用于声音合成和转换。本文介绍了一种使用SystemC在系统级设计环境中集成声音物理建模的一般方法。该方法已特别应用于电吉他效果的物理建模。所开发的模型已用于PC上可调谐电吉他效果发生器的实时合成,有助于优化算法,为未来的硬件实现和集成在DSP架构中进行声音合成。
{"title":"Physical modelling in SystemC-WMS and real time synthesis of electric guitar effects","authors":"Francesco Gambini, M. Conti, S. Orcioni, F. Ripa, M. Caldari","doi":"10.1109/WISES.2007.4408493","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408493","url":null,"abstract":"Physical models are widely used for sound synthesis and transformation. This paper presents a general methodology for the integration of physical modelling of sounds in a system level design environment using SystemC. The methodology has been applied in particular for physical modelling of electric guitar effects. The model developed has been used for a real time synthesis of a tunable electric guitar effects generator on a PC useful for the optimization of the algorithm for a future hardware implementation and integration in a DSP architecture for sound synthesis.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An object memory management solution for small devices with heterogeneous memories 一个对象内存管理解决方案,适用于具有异构内存的小型设备
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408498
K. Marquet, G. Grimaud
Small devices have a specific hardware configuration. In particular, they usually include several types of memories (typically internal and external RAM, EEPROM, Flash), different in quantities and properties. For instance, their access times can be very different. This is an issue for object-oriented solutions such as Java virtual machines which have to perform automatic data reclamation. In this paper, we firstly present results showing that the memory manager (especially the garbage collector) must be adapted to the type of memory it is in charge of. Then, we propose a flexible memory management solution that addresses this issue by assigning a different memory manager to each memory. Each manager can use the allocation and garbage collection schemes adapted to the physical properties of the memory it is in charge of. In order to minimize interactions between memory managers during allocations and garbage collections, we use a special component in charge of placing objects into the different memories. Thereby, our solution brings the benefits of automatic data reclamation to devices with heterogeneous memory spaces.
小型设备具有特定的硬件配置。特别是,它们通常包括几种类型的存储器(通常是内部和外部RAM, EEPROM, Flash),数量和性能不同。例如,它们的访问时间可能非常不同。这是面向对象解决方案的一个问题,例如Java虚拟机,它必须执行自动数据回收。在本文中,我们首先给出的结果表明,内存管理器(尤其是垃圾收集器)必须适应它所负责的内存类型。然后,我们提出一个灵活的内存管理解决方案,通过为每个内存分配不同的内存管理器来解决这个问题。每个管理器都可以使用适合于它所管理的内存的物理属性的分配和垃圾收集方案。为了在分配和垃圾收集期间最小化内存管理器之间的交互,我们使用了一个特殊的组件来负责将对象放入不同的内存中。因此,我们的解决方案为具有异构内存空间的设备带来了自动数据回收的好处。
{"title":"An object memory management solution for small devices with heterogeneous memories","authors":"K. Marquet, G. Grimaud","doi":"10.1109/WISES.2007.4408498","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408498","url":null,"abstract":"Small devices have a specific hardware configuration. In particular, they usually include several types of memories (typically internal and external RAM, EEPROM, Flash), different in quantities and properties. For instance, their access times can be very different. This is an issue for object-oriented solutions such as Java virtual machines which have to perform automatic data reclamation. In this paper, we firstly present results showing that the memory manager (especially the garbage collector) must be adapted to the type of memory it is in charge of. Then, we propose a flexible memory management solution that addresses this issue by assigning a different memory manager to each memory. Each manager can use the allocation and garbage collection schemes adapted to the physical properties of the memory it is in charge of. In order to minimize interactions between memory managers during allocations and garbage collections, we use a special component in charge of placing objects into the different memories. Thereby, our solution brings the benefits of automatic data reclamation to devices with heterogeneous memory spaces.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting a Prioritized MAC Protocol to Efficiently Compute Min and Max in Multihop Networks 利用优先级MAC协议高效地计算多跳网络中的最小和最大
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408491
Björn Andersson, Nuno Pereira, E. Tovar
Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.
考虑一个无线传感器网络(WSN),其中来自传感器节点的广播不能到达网络中的所有传感器节点;这种网络通常被称为多跳网络。传感器节点读取传感器读数,但单个传感器读数不是很重要。然而,计算这些传感器读数的总量是很重要的。瞬间所有传感器读数的最小值和最大值通常很有趣,因为它们表明异常行为,例如,如果最高温度非常高,则可能发生火灾。提出了一种计算多跳网络中传感器读数最小值或最大值的算法。该算法有一个特别有趣的特性,它的时间复杂度不依赖于传感器节点的数量;只有网络直径和传感器读数的值域范围重要。
{"title":"Exploiting a Prioritized MAC Protocol to Efficiently Compute Min and Max in Multihop Networks","authors":"Björn Andersson, Nuno Pereira, E. Tovar","doi":"10.1109/WISES.2007.4408491","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408491","url":null,"abstract":"Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123974565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specification for SystemC-AADL interoperability SystemC-AADL互操作性规范
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408490
E. Heras, E. Villar
Due to the increasing complexity of embedded systems, new design methodologies have to be adopted, since traditional techniques are no longer efficient. Model-based engineering enables the designer to confront these concerns using the architecture description of the system as the main axis during the design cycle. Defining the architecture of the system before its implementation, enables the analysis of the constraints imposed on the system from the beginning of the design cycle until the final implementation. AADL has been proposed to design and analyze software and hardware architectures for real time, mission-critical, embedded systems. In this paper, the specification for modelling AADL by means of SystemC is provided. The SystemC model will enable the refinement of the AADL specification until the final implementation is developed. The information about the system obtained during the refinement process will feedback the AADL model allowing the verification of high-level constraints during the complete design process.
由于嵌入式系统日益复杂,必须采用新的设计方法,因为传统技术不再有效。基于模型的工程使设计人员能够在设计周期中使用系统的体系结构描述作为主轴来面对这些问题。在系统实现之前定义系统的体系结构,可以分析从设计周期开始直到最终实现对系统施加的约束。AADL被提出用于设计和分析实时、关键任务嵌入式系统的软件和硬件架构。本文给出了用SystemC对AADL进行建模的规范。SystemC模型将使AADL规范的细化成为可能,直到最终实现被开发出来。在精化过程中获得的有关系统的信息将反馈给AADL模型,允许在整个设计过程中验证高级约束。
{"title":"Specification for SystemC-AADL interoperability","authors":"E. Heras, E. Villar","doi":"10.1109/WISES.2007.4408490","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408490","url":null,"abstract":"Due to the increasing complexity of embedded systems, new design methodologies have to be adopted, since traditional techniques are no longer efficient. Model-based engineering enables the designer to confront these concerns using the architecture description of the system as the main axis during the design cycle. Defining the architecture of the system before its implementation, enables the analysis of the constraints imposed on the system from the beginning of the design cycle until the final implementation. AADL has been proposed to design and analyze software and hardware architectures for real time, mission-critical, embedded systems. In this paper, the specification for modelling AADL by means of SystemC is provided. The SystemC model will enable the refinement of the AADL specification until the final implementation is developed. The information about the system obtained during the refinement process will feedback the AADL model allowing the verification of high-level constraints during the complete design process.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"87 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Knowledge Extraction from C-Code 从c代码中提取知识
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408505
F. Wotawa, Willibald Krenn
In this paper we present first ideas for extracting knowledge from C source code of control programs. The extracted knowledge is intended to be used in our smart control engine which takes a rule set and decides which rules to use based on the internal and environmental conditions. The extraction of rules is based on the control-flow graph of the supplied C program: Basically, our method extracts rules that correspond to paths to given high-level function calls. The advantage of this method is to get a first knowledge-base from available source code which makes using a smart control engine more applicable for industry. We use an industrial control program as example within the paper in order to justify the usefulness of our approach.
在本文中,我们提出了从控制程序的C源代码中提取知识的初步想法。提取的知识将用于我们的智能控制引擎,该引擎采用规则集,并根据内部和环境条件决定使用哪些规则。规则的提取基于所提供的C程序的控制流图:基本上,我们的方法提取与给定高级函数调用的路径相对应的规则。这种方法的优点是可以从可用的源代码中获得第一个知识库,这使得智能控制引擎更适用于工业。我们在论文中使用一个工业控制程序作为例子,以证明我们的方法的有效性。
{"title":"Knowledge Extraction from C-Code","authors":"F. Wotawa, Willibald Krenn","doi":"10.1109/WISES.2007.4408505","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408505","url":null,"abstract":"In this paper we present first ideas for extracting knowledge from C source code of control programs. The extracted knowledge is intended to be used in our smart control engine which takes a rule set and decides which rules to use based on the internal and environmental conditions. The extraction of rules is based on the control-flow graph of the supplied C program: Basically, our method extracts rules that correspond to paths to given high-level function calls. The advantage of this method is to get a first knowledge-base from available source code which makes using a smart control engine more applicable for industry. We use an industrial control program as example within the paper in order to justify the usefulness of our approach.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"35 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
System-Level Middleware for Embedded Hardware and Software Communication 用于嵌入式软硬件通信的系统级中间件
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408501
Fernando Rincón Calle, Jesús Barba, F. Moya, F. Villanueva, D. Villa, J. Dondo, J. C. López
Heterogeneous system architectures are currently the main platform on which an ever increasing number of innovative applications (i.e. smart home or ambient intelligence applications) rely. When designing these complex systems, one of the most time-consuming tasks is the definition of the communication interfaces between the different components through a number of scattered heterogeneous processing nodes. That is not only a complex task, but also very specific for a particular implementation, which may limit the flexibility of the system, and makes the solutions difficult to reuse. In this paper, we describe how to provide a unified abstraction for both hardware and software components that have to cooperate with each other, independently of their implementation and their location. Based on this abstraction, we define a low-overhead system-wide communication architecture that offers total communication transparency between any kind of components. Since the architecture is highly compatible with standard object-oriented distributed software systems, it also enables seamless interaction with any other kind of external network.
异构系统架构是目前越来越多的创新应用(如智能家居或环境智能应用)所依赖的主要平台。在设计这些复杂系统时,最耗时的任务之一是通过许多分散的异构处理节点定义不同组件之间的通信接口。这不仅是一项复杂的任务,而且对于特定的实现也非常具体,这可能会限制系统的灵活性,并使解决方案难以重用。在本文中,我们描述了如何为必须相互合作的硬件和软件组件提供统一的抽象,而不依赖于它们的实现和位置。基于这个抽象,我们定义了一个低开销的系统范围的通信体系结构,它在任何类型的组件之间提供了完全的通信透明性。由于该体系结构与标准的面向对象分布式软件系统高度兼容,因此它还支持与任何其他类型的外部网络进行无缝交互。
{"title":"System-Level Middleware for Embedded Hardware and Software Communication","authors":"Fernando Rincón Calle, Jesús Barba, F. Moya, F. Villanueva, D. Villa, J. Dondo, J. C. López","doi":"10.1109/WISES.2007.4408501","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408501","url":null,"abstract":"Heterogeneous system architectures are currently the main platform on which an ever increasing number of innovative applications (i.e. smart home or ambient intelligence applications) rely. When designing these complex systems, one of the most time-consuming tasks is the definition of the communication interfaces between the different components through a number of scattered heterogeneous processing nodes. That is not only a complex task, but also very specific for a particular implementation, which may limit the flexibility of the system, and makes the solutions difficult to reuse. In this paper, we describe how to provide a unified abstraction for both hardware and software components that have to cooperate with each other, independently of their implementation and their location. Based on this abstraction, we define a low-overhead system-wide communication architecture that offers total communication transparency between any kind of components. Since the architecture is highly compatible with standard object-oriented distributed software systems, it also enables seamless interaction with any other kind of external network.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA-Rootkits Hiding Malicious Code inside the Hardware fpga rootkits在硬件中隐藏恶意代码
Pub Date : 2007-06-21 DOI: 10.1109/WISES.2007.4408497
M. Kucera, M. Vetter
This paper describes the security implications of FPGAs to the trusted computing base of embedded systems. It gives an overview of different FPGA architectures and discusses the security measures and shortcoming of modern FPGAs. Furthermore it shows how an attacker can exploit this shortcoming and integrate rootkit-like code inside the FPGA. After a discussion on possible countermeasures, description on the different ways a root kit can be deployed into the FPGA is given.
本文介绍了fpga对嵌入式系统可信计算基础的安全意义。概述了不同FPGA体系结构,讨论了现代FPGA的安全措施和缺点。此外,它还展示了攻击者如何利用这一缺点并将类似rootkit的代码集成到FPGA中。在讨论了可能的对策之后,描述了将根套件部署到FPGA中的不同方式。
{"title":"FPGA-Rootkits Hiding Malicious Code inside the Hardware","authors":"M. Kucera, M. Vetter","doi":"10.1109/WISES.2007.4408497","DOIUrl":"https://doi.org/10.1109/WISES.2007.4408497","url":null,"abstract":"This paper describes the security implications of FPGAs to the trusted computing base of embedded systems. It gives an overview of different FPGA architectures and discusses the security measures and shortcoming of modern FPGAs. Furthermore it shows how an attacker can exploit this shortcoming and integrate rootkit-like code inside the FPGA. After a discussion on possible countermeasures, description on the different ways a root kit can be deployed into the FPGA is given.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2007 Fifth Workshop on Intelligent Solutions in Embedded Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1