首页 > 最新文献

2020 International Conference on Omni-layer Intelligent Systems (COINS)最新文献

英文 中文
Dynamic iFogSim: A Framework for Full-Stack Simulation of Dynamic Resource Management in IoT Systems 动态iFogSim:物联网系统动态资源管理全栈仿真框架
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191663
Dongjoo Seo, Sina Shahhosseini, Milad Asgari Mehrabadi, Bryan Donyanavard, Sung-Soo Lim, A. Rahmani, N. Dutt
Complex Internet of Things (IoT) applications such as Healthcare IoT include a variety of compute, data, and communication kernel intensities and have diverse sensitivities of QoS requirements including latency, throughput, availability, accuracy, etc. Ensuring QoS requirements for the applications requires a comprehensive tool to perform efficient full-stack analysis. Per our observation, the literature lacks a simulator capable of supporting a full-stack communication-computation co-simulation of an IoT system. Furthermore, IoT system behavior can dramatically change during run-time due to variation in status and context. Therefore, such a system must be dynamically controlled over time. In this paper, for the first time, we propose a full-stack framework to co-simulate communication and computation aspects of an IoT system in a dynamic scenario. We integrate a Transmission Control Protocol (TCP) latency model with the iFogSim simulator. We conduct a health-care IoT-based case study to evaluate the framework. The framework is open-sourced and available on GitHub in the following repository: https://github.com/HealthSciTech/Dynamic iFogSim.
复杂的物联网(IoT)应用(如医疗保健物联网)包括各种计算、数据和通信内核强度,并且对QoS需求具有不同的敏感性,包括延迟、吞吐量、可用性、准确性等。确保应用程序的QoS需求需要一个全面的工具来执行有效的全栈分析。根据我们的观察,文献缺乏能够支持物联网系统的全栈通信计算联合模拟的模拟器。此外,由于状态和上下文的变化,物联网系统的行为在运行时可能会发生巨大变化。因此,这样的系统必须随时间动态控制。在本文中,我们首次提出了一个全栈框架,在动态场景中共同模拟物联网系统的通信和计算方面。我们将传输控制协议(TCP)延迟模型与iFogSim模拟器集成。我们开展了一项基于医疗保健物联网的案例研究,以评估该框架。该框架是开源的,可以在GitHub上的以下存储库中获得:https://github.com/HealthSciTech/Dynamic iFogSim。
{"title":"Dynamic iFogSim: A Framework for Full-Stack Simulation of Dynamic Resource Management in IoT Systems","authors":"Dongjoo Seo, Sina Shahhosseini, Milad Asgari Mehrabadi, Bryan Donyanavard, Sung-Soo Lim, A. Rahmani, N. Dutt","doi":"10.1109/COINS49042.2020.9191663","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191663","url":null,"abstract":"Complex Internet of Things (IoT) applications such as Healthcare IoT include a variety of compute, data, and communication kernel intensities and have diverse sensitivities of QoS requirements including latency, throughput, availability, accuracy, etc. Ensuring QoS requirements for the applications requires a comprehensive tool to perform efficient full-stack analysis. Per our observation, the literature lacks a simulator capable of supporting a full-stack communication-computation co-simulation of an IoT system. Furthermore, IoT system behavior can dramatically change during run-time due to variation in status and context. Therefore, such a system must be dynamically controlled over time. In this paper, for the first time, we propose a full-stack framework to co-simulate communication and computation aspects of an IoT system in a dynamic scenario. We integrate a Transmission Control Protocol (TCP) latency model with the iFogSim simulator. We conduct a health-care IoT-based case study to evaluate the framework. The framework is open-sourced and available on GitHub in the following repository: https://github.com/HealthSciTech/Dynamic iFogSim.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Camera Based Barcode Localization and Decoding in Real-World Applications 基于相机的条码定位和解码在现实世界中的应用
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191416
Robert Brylka, Ulrich Schwanecke, Benjamin Bierwirth
In the last decades, many approaches were presented to localize and decode barcodes in images from off the shelf cameras. However, all proposed solutions usually only deal with one type of image artifacts, such as a poorly illuminated or noisy image, or an image that suffers from motion or out-of-focus blur. In this paper, we present a complete, fully automatic pipeline, which allows the localization and decoding of barcodes in real-world scenarios. Our method is capable of localization and decoding the correct barcode information even if the input image is noisy, poorly exposed, and blurred at the same time. We can also decode the correct information from barcode images whose resolution is actually too low, i.e., where the width of the smallest bar depicted is smaller than the width of a single pixel.
在过去的几十年里,人们提出了许多方法来定位和解码来自现成相机图像中的条形码。然而,所有提出的解决方案通常只处理一种类型的图像伪影,如照明不足或噪声图像,或遭受运动或失焦模糊的图像。在本文中,我们提出了一个完整的、全自动的流水线,它允许在现实场景中对条形码进行定位和解码。我们的方法能够定位和解码正确的条形码信息,即使输入的图像是嘈杂的,曝光不良,模糊的同时。我们也可以从分辨率实际上太低的条形码图像中解码正确的信息,例如,所描绘的最小条的宽度小于单个像素的宽度。
{"title":"Camera Based Barcode Localization and Decoding in Real-World Applications","authors":"Robert Brylka, Ulrich Schwanecke, Benjamin Bierwirth","doi":"10.1109/COINS49042.2020.9191416","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191416","url":null,"abstract":"In the last decades, many approaches were presented to localize and decode barcodes in images from off the shelf cameras. However, all proposed solutions usually only deal with one type of image artifacts, such as a poorly illuminated or noisy image, or an image that suffers from motion or out-of-focus blur. In this paper, we present a complete, fully automatic pipeline, which allows the localization and decoding of barcodes in real-world scenarios. Our method is capable of localization and decoding the correct barcode information even if the input image is noisy, poorly exposed, and blurred at the same time. We can also decode the correct information from barcode images whose resolution is actually too low, i.e., where the width of the smallest bar depicted is smaller than the width of a single pixel.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129213111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
COINS 2020 Breaker Page 硬币2020决胜页
Pub Date : 2020-08-01 DOI: 10.1109/coins49042.2020.9191419
{"title":"COINS 2020 Breaker Page","authors":"","doi":"10.1109/coins49042.2020.9191419","DOIUrl":"https://doi.org/10.1109/coins49042.2020.9191419","url":null,"abstract":"","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116097641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COINS 2020 Cover Page 硬币2020封面
Pub Date : 2020-08-01 DOI: 10.1109/coins49042.2020.9191424
{"title":"COINS 2020 Cover Page","authors":"","doi":"10.1109/coins49042.2020.9191424","DOIUrl":"https://doi.org/10.1109/coins49042.2020.9191424","url":null,"abstract":"","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125814622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COINS 2020 TOC
Pub Date : 2020-08-01 DOI: 10.1109/coins49042.2020.9191431
{"title":"COINS 2020 TOC","authors":"","doi":"10.1109/coins49042.2020.9191431","DOIUrl":"https://doi.org/10.1109/coins49042.2020.9191431","url":null,"abstract":"","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain, what time is it? Trustless Datetime Synchronization for IoT 区块链,现在几点了?物联网的无信任日期时间同步
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191420
Emanuel Regnath, N. Shivaraman, Shanker Shreejith, A. Easwaran, S. Steinhorst
Time synchronization among IoT devices is a fundamental requirement for efficient and reliable communication on a global scale. Common synchronization schemes such as NTP operate on a trust-based client-server model, which does not scale well in a decentralized network because single server failures can lead to a severe downtime before re-establishing synchronization. Public blockchains such as Ethereum provide a trustless network and tamper-proof time-stamped data that is freely available. In this paper, we leverage the availability of time information in the block headers, which are very small (several hundreds of bytes) compared to the full blocks and can be validated without participation in the mining process. Our approach uses two estimators that are fed with the timestamps from block headers as well as the elapsed time between consecutive block receptions to estimate the true time to an accuracy of one second. We evaluate our approach by extensive validation on blockchain data from different geographical locations across the globe and show that global synchronization can be established despite the non-deterministic behavior of blockchains such as mining difficulty, network latencies and forks.
物联网设备之间的时间同步是全球范围内高效可靠通信的基本要求。常见的同步方案(如NTP)在基于信任的客户机-服务器模型上运行,这种模型在分散的网络中不能很好地扩展,因为单个服务器故障可能导致在重新建立同步之前严重停机。像以太坊这样的公共区块链提供了一个无需信任的网络和可免费获得的防篡改时间戳数据。在本文中,我们利用了块头中时间信息的可用性,与完整块相比,这些信息非常小(几百字节),并且可以在不参与挖掘过程的情况下进行验证。我们的方法使用两个估计器,它们使用来自块报头的时间戳以及连续块接收之间的经过时间来估计真实时间,精度为一秒。我们通过对来自全球不同地理位置的区块链数据进行广泛验证来评估我们的方法,并表明尽管区块链存在采矿难度、网络延迟和分叉等不确定性行为,但可以建立全球同步。
{"title":"Blockchain, what time is it? Trustless Datetime Synchronization for IoT","authors":"Emanuel Regnath, N. Shivaraman, Shanker Shreejith, A. Easwaran, S. Steinhorst","doi":"10.1109/COINS49042.2020.9191420","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191420","url":null,"abstract":"Time synchronization among IoT devices is a fundamental requirement for efficient and reliable communication on a global scale. Common synchronization schemes such as NTP operate on a trust-based client-server model, which does not scale well in a decentralized network because single server failures can lead to a severe downtime before re-establishing synchronization. Public blockchains such as Ethereum provide a trustless network and tamper-proof time-stamped data that is freely available. In this paper, we leverage the availability of time information in the block headers, which are very small (several hundreds of bytes) compared to the full blocks and can be validated without participation in the mining process. Our approach uses two estimators that are fed with the timestamps from block headers as well as the elapsed time between consecutive block receptions to estimate the true time to an accuracy of one second. We evaluate our approach by extensive validation on blockchain data from different geographical locations across the globe and show that global synchronization can be established despite the non-deterministic behavior of blockchains such as mining difficulty, network latencies and forks.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134537523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations 传感器网络中的可信度——一种基于信誉的气象站方法
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191382
Nuno Figueiredo, M. Caeiro
Trustworthiness is a soft-security feature that evaluates the correct behavior of nodes in a network. More specifically, this feature tries to answer the following question: how much should we trust in a certain node? To determine the trustworthiness of a node, our approach focuses on two reputation indicators: the self-data trust, which evaluates the data generated by the node itself taking into account its historical data; and the peer-data trust, which utilizes the nearest nodes’ data. In this paper, we show how these two indicators can be calculated using the Gaussian Overlap and Pearson correlation. This paper includes a validation of our trustworthiness approach using real data from unofficial and official weather stations in Portugal. This is a representative scenario of the current situation in many other areas, with different entities providing different kinds of data using autonomous sensors in a continuous way over the networks.
可信度是一种评估网络中节点正确行为的软安全特性。更具体地说,这个特性试图回答以下问题:我们应该在多大程度上信任某个节点?为了确定节点的可信度,我们的方法侧重于两个声誉指标:自数据信任,它评估节点自身生成的数据,并考虑其历史数据;另一种是对等数据信任,它利用最近节点的数据。在本文中,我们展示了如何使用高斯重叠和皮尔逊相关来计算这两个指标。本文包括使用来自葡萄牙非官方和官方气象站的真实数据验证我们的可信度方法。这是许多其他领域当前情况的代表性场景,不同的实体通过网络以连续的方式使用自主传感器提供不同类型的数据。
{"title":"Trustworthiness in Sensor Networks A Reputation-Based Method for Weather Stations","authors":"Nuno Figueiredo, M. Caeiro","doi":"10.1109/COINS49042.2020.9191382","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191382","url":null,"abstract":"Trustworthiness is a soft-security feature that evaluates the correct behavior of nodes in a network. More specifically, this feature tries to answer the following question: how much should we trust in a certain node? To determine the trustworthiness of a node, our approach focuses on two reputation indicators: the self-data trust, which evaluates the data generated by the node itself taking into account its historical data; and the peer-data trust, which utilizes the nearest nodes’ data. In this paper, we show how these two indicators can be calculated using the Gaussian Overlap and Pearson correlation. This paper includes a validation of our trustworthiness approach using real data from unofficial and official weather stations in Portugal. This is a representative scenario of the current situation in many other areas, with different entities providing different kinds of data using autonomous sensors in a continuous way over the networks.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133013645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-sensor data augmentation for robust sensing 多传感器数据增强鲁棒感测
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191412
Aaqib Saeed, Ye Li, T. Ozcelebi, J. Lukkien
Data augmentation is a crucial technique for effectively learning deep models and for improving their generalization. It has shown remarkable performance gains on complex sets of problems, such as object detection and image classification. However, for sensor (time-series) data, its potential is not thoroughly explored even though the acquisition of large annotated sensor datasets is prohibitively expensive and challenging in real-life. In this work, we propose Sensor Augment - a generalized framework for automatically discovering data-specific augmentation strategies with black-box optimization search algorithms. Our approach makes use of the user-defined transformations to discover an optimal combination of the operations that can be used to train deep networks for a wide variety of tasks. Besides, we propose several augmentation operations that can be used to generate synthetic data and enrich the search space while harnessing existing functions. We show the efficacy of learned augmentation strategies on 7 multi-sensor datasets for 4 complex tasks. In our experiments, we see a substantial performance gain ranging from 1.5 to 10 F-score points over the baseline. We also show that the strategies can be learned from smaller subsets, and they can transfer well between related datasets.
数据增强是有效学习深度模型和提高其泛化能力的关键技术。它在复杂的问题集上表现出了显著的性能提升,比如目标检测和图像分类。然而,对于传感器(时间序列)数据,尽管在现实生活中获取大型带注释的传感器数据集非常昂贵且具有挑战性,但其潜力尚未得到充分探索。在这项工作中,我们提出传感器增强-一个通用框架,用于自动发现数据特定的增强策略与黑盒优化搜索算法。我们的方法利用用户定义的转换来发现可用于训练深度网络的各种任务的操作的最佳组合。此外,我们提出了几种增强操作,可用于生成合成数据并在利用现有功能的同时丰富搜索空间。我们在4个复杂任务的7个多传感器数据集上展示了学习增强策略的有效性。在我们的实验中,我们看到了显著的性能提升,从1.5到10个F-score点超过基线。我们还表明,这些策略可以从更小的子集中学习,并且它们可以在相关数据集之间很好地迁移。
{"title":"Multi-sensor data augmentation for robust sensing","authors":"Aaqib Saeed, Ye Li, T. Ozcelebi, J. Lukkien","doi":"10.1109/COINS49042.2020.9191412","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191412","url":null,"abstract":"Data augmentation is a crucial technique for effectively learning deep models and for improving their generalization. It has shown remarkable performance gains on complex sets of problems, such as object detection and image classification. However, for sensor (time-series) data, its potential is not thoroughly explored even though the acquisition of large annotated sensor datasets is prohibitively expensive and challenging in real-life. In this work, we propose Sensor Augment - a generalized framework for automatically discovering data-specific augmentation strategies with black-box optimization search algorithms. Our approach makes use of the user-defined transformations to discover an optimal combination of the operations that can be used to train deep networks for a wide variety of tasks. Besides, we propose several augmentation operations that can be used to generate synthetic data and enrich the search space while harnessing existing functions. We show the efficacy of learned augmentation strategies on 7 multi-sensor datasets for 4 complex tasks. In our experiments, we see a substantial performance gain ranging from 1.5 to 10 F-score points over the baseline. We also show that the strategies can be learned from smaller subsets, and they can transfer well between related datasets.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Compiler Comparison in the RISC-V Ecosystem RISC-V生态系统中的编译器比较
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191411
Mehrdad Poorhosseini, W. Nebel, Kim Grüttner
The GNU Compiler Collection (GCC) is the traditional compiler for most embedded systems, since it supports many different instruction set architectures (ISA) in its back-end. GCC has also been the first compiler that supported the RISC-V ISA. Since a while Clang/LLVM has gained more and more interest in the embedded software community. Recently, RISC-V is also supported in the LLVM back-end and maintained in the official LLVM release. In this paper we propose a benchmark environment for the comparison of compilers in the RISC-V ecosystem. We perform a comparison of GCC against LLVM for an embedded software benchmark considering compile time, size of the resulting binary, number of instructions and execution time. The results show that LLVM compiles faster in 88% of the experiments, while GCC and LLVM produce nearly the same binary size in 51% of the experiments. In 37% GCC wins and in 12% LLVM wins. In 94% of the experiments the difference between the resulting binary size in GCC and LLVM is +/-5%. The execution time analysis shows that in 42% of the experiments GCC and LLVM have nearly the same execution time clock cycles while in 40% GCC wins and in 18% LLVM wins.
GNU编译器集合(GCC)是大多数嵌入式系统的传统编译器,因为它在后端支持许多不同的指令集体系结构(ISA)。GCC也是第一个支持RISC-V ISA的编译器。一段时间以来,Clang/LLVM在嵌入式软件社区引起了越来越多的兴趣。最近,在LLVM的后端也支持RISC-V,并在LLVM的官方版本中进行维护。在本文中,我们提出了一个用于比较RISC-V生态系统中编译器的基准环境。考虑编译时间、生成的二进制文件的大小、指令数和执行时间,我们对GCC和LLVM进行了嵌入式软件基准测试的比较。结果表明,LLVM在88%的实验中编译速度更快,而GCC和LLVM在51%的实验中生成的二进制大小几乎相同。37%的GCC胜出,12%的LLVM胜出。在94%的实验中,GCC和LLVM生成的二进制大小的差异为+/-5%。执行时间分析表明,在42%的实验中,GCC和LLVM具有几乎相同的执行时间时钟周期,而40%的实验中GCC胜出,18%的实验中LLVM胜出。
{"title":"A Compiler Comparison in the RISC-V Ecosystem","authors":"Mehrdad Poorhosseini, W. Nebel, Kim Grüttner","doi":"10.1109/COINS49042.2020.9191411","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191411","url":null,"abstract":"The GNU Compiler Collection (GCC) is the traditional compiler for most embedded systems, since it supports many different instruction set architectures (ISA) in its back-end. GCC has also been the first compiler that supported the RISC-V ISA. Since a while Clang/LLVM has gained more and more interest in the embedded software community. Recently, RISC-V is also supported in the LLVM back-end and maintained in the official LLVM release. In this paper we propose a benchmark environment for the comparison of compilers in the RISC-V ecosystem. We perform a comparison of GCC against LLVM for an embedded software benchmark considering compile time, size of the resulting binary, number of instructions and execution time. The results show that LLVM compiles faster in 88% of the experiments, while GCC and LLVM produce nearly the same binary size in 51% of the experiments. In 37% GCC wins and in 12% LLVM wins. In 94% of the experiments the difference between the resulting binary size in GCC and LLVM is +/-5%. The execution time analysis shows that in 42% of the experiments GCC and LLVM have nearly the same execution time clock cycles while in 40% GCC wins and in 18% LLVM wins.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127241614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A True Decentralized Implementation Based on IoT and Blockchain: a Vehicle Accident Use Case 基于物联网和区块链的真正去中心化实现:一个车辆事故用例
Pub Date : 2020-08-01 DOI: 10.1109/COINS49042.2020.9191405
L. Gerrits, Roland Kromes, F. Verdier
In this paper, we will present a new model of distributed ledger-based IoT network, in which we combined Hyperledger Sawtooth as blockchain with Inter Planetary File System (IPFS) as a distributed storage system. The combination of these two types of distributed ledger technologies can allow more efficient data storage than in other blockchain implementations. This work was initiated by the automotive manufacturer Renault based on the idea of a new ecosystem of smart vehicles containing IoT devices. We will focus on an accident use case. After the accident, the cars send their data to a dedicated smart contract. We will also describe furthermore our implementation, the characteristics of Hyperledger Sawtooth and IPFS and finally, we demonstrate the realistic feasibility of this implementation by latency measurements.
在本文中,我们将提出一种基于分布式账本的物联网网络新模型,其中我们将超级账本锯齿作为区块链与星际文件系统(IPFS)作为分布式存储系统相结合。这两种分布式账本技术的结合可以比其他区块链实现更有效地存储数据。这项工作是由汽车制造商雷诺基于包含物联网设备的智能汽车新生态系统的想法发起的。我们将关注一个事故用例。事故发生后,汽车将数据发送到专用智能合约。我们还将进一步描述我们的实现,Hyperledger Sawtooth和IPFS的特征,最后,我们通过延迟测量证明了这种实现的现实可行性。
{"title":"A True Decentralized Implementation Based on IoT and Blockchain: a Vehicle Accident Use Case","authors":"L. Gerrits, Roland Kromes, F. Verdier","doi":"10.1109/COINS49042.2020.9191405","DOIUrl":"https://doi.org/10.1109/COINS49042.2020.9191405","url":null,"abstract":"In this paper, we will present a new model of distributed ledger-based IoT network, in which we combined Hyperledger Sawtooth as blockchain with Inter Planetary File System (IPFS) as a distributed storage system. The combination of these two types of distributed ledger technologies can allow more efficient data storage than in other blockchain implementations. This work was initiated by the automotive manufacturer Renault based on the idea of a new ecosystem of smart vehicles containing IoT devices. We will focus on an accident use case. After the accident, the cars send their data to a dedicated smart contract. We will also describe furthermore our implementation, the characteristics of Hyperledger Sawtooth and IPFS and finally, we demonstrate the realistic feasibility of this implementation by latency measurements.","PeriodicalId":350108,"journal":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126543109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 International Conference on Omni-layer Intelligent Systems (COINS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1