


default search action
ACM Transactions on Embedded Computing Systems, Volume 16
Volume 16, Number 1, November 2016
- Sandeep K. Shukla:
Editorial: Distributed Public Ledgers and Block Chains - What Good Are They for Embedded Systems? 1:1-1:2
- Jerónimo Castrillón Mazo, Cristina Silvano:
Guest Editorial: Special Issue on Virtual Prototyping of Parallel and Embedded Systems (ViPES). 2:1-2:2 - Daniele Bortolotti, Andrea Marongiu, Luca Benini:
VirtualSoC: A Research Tool for Modern MPSoCs. 3:1-3:27 - Philipp Wehner, Jens Rettkowski, Tobias Kalb, Diana Göhringer:
Simulating Reconfigurable Multiprocessor Systems-on-Chip with MPSoCSim. 4:1-4:24 - Christian Sauer, Hans-Peter Loeb:
A Lightweight Framework for the Dynamic Creation and Configuration of Virtual Platforms in SystemC. 5:1-5:16 - Rolf Meyer, Jan Wagner, Bastian Farkas, Sven Alexander Horsinka, Patrick Siegl, Rainer Buchty, Mladen Berekovic:
A Scriptable Standard-Compliant Reporting and Logging Framework for SystemC. 6:1-6:28 - Luis Gabriel Murillo, Robert Lajos Bücs, Rainer Leupers, Gerd Ascheid:
MPSoC Software Debugging on Virtual Platforms via Execution Control with Event Graphs. 7:1-7:25 - Efstathios Sotiriou-Xanthopoulos, Sotirios Xydis, Kostas Siozios, George Economakos, Dimitrios Soudris:
A Framework for Interconnection-Aware Domain-Specific Many-Accelerator Synthesis. 8:1-8:26
- Dakai Zhu, Meikang Qiu, Samarjit Chakraborty:
Guest Editorial: Special Issue on Emerging Technologies in Embedded Software and Systems. 9:1-9:2 - Hrishikesh Jayakumar, Arnab Raha, Vijay Raghunathan:
Sleep-Mode Voltage Scaling: Enabling SRAM Data Retention at Ultra-Low Power in Embedded Microcontrollers. 10:1-10:25 - Stephen Marz, Bradley T. Vander Zanden:
Reducing Power Consumption and Latency in Mobile Devices Using an Event Stream Model. 11:1-11:24 - Renhai Chen, Yi Wang, Jingtong Hu, Duo Liu, Zili Shao, Yong Guan:
Image-Content-Aware I/O Optimization for Mobile Virtualization. 12:1-12:24 - Zonghua Gu, Chao Wang, Haibo Zeng:
Cache-Partitioned Preemption Threshold Scheduling. 13:1-13:30 - Biao Hu, Kai Huang, Gang Chen, Long Cheng, Alois C. Knoll:
Adaptive Workload Management in Mixed-Criticality Systems. 14:1-14:27 - Cumhur Erkan Tuncali, Georgios Fainekos, Yann-Hang Lee:
Automatic Parallelization of Multirate Block Diagrams of Control Systems on Multicore Platforms. 15:1-15:26 - Edoardo Fusella, Alessandro Cilardo:
Crosstalk-Aware Automated Mapping for Optical Networks-on-Chip. 16:1-16:26 - Yuki Iida, Yusuke Fujii, Takuya Azumi, Nobuhiko Nishio, Shinpei Kato:
GPUrpc: Exploring Transparent Access to Remote GPUs. 17:1-17:25 - Kun Wang, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen, Yan Zhang:
Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems. 18:1-18:21 - Song Tan, Wen-Zhan Song, Steve Yothment, Junjie Yang, Lang Tong:
ScorePlus: A Software-Hardware Hybrid and Federated Experiment Environment for Smart Grid. 19:1-19:25
- Charvi A. Majmudar, Bashir I. Morshed:
Autonomous OA Removal in Real-Time from Single Channel EEG Data on a Wearable Device Using a Hybrid Algebraic-Wavelet Algorithm. 20:1-20:16 - Yuan-Hung Kuan, Yuan-Hao Chang, Tseng-Yi Chen, Po-Chun Huang, Kam-yiu Lam:
Space-Efficient Index Scheme for PCM-Based Multiversion Databases in Cyber-Physical Systems. 21:1-21:26 - Yusuf Bora Kartal, Ece Guran Schmidt, Klaus Werner Schmidt:
Modeling Distributed Real-Time Systems in TIOA and UPPAAL. 22:1-22:26 - Sedigheh Asyaban, Mehdi Kargahi, Lothar Thiele, Morteza Mohaqeqi:
Analysis and Scheduling of a Battery-Less Mixed-Criticality System with Energy Uncertainty. 23:1-23:26 - Kanchan Manna, Shivam Swami, Santanu Chattopadhyay, Indranil Sengupta:
Integrated Through-Silicon Via Placement and Application Mapping for 3D Mesh-Based NoC Design. 24:1-24:25 - Hossein Tajik, Bryan Donyanavard, Nikil D. Dutt
, Janmartin Jahn, Jörg Henkel:
SPMPool: Runtime SPM Management for Memory-Intensive Applications in Embedded Many-Cores. 25:1-25:27 - Stefan Schürmans, Gereon Onnebrink, Rainer Leupers, Gerd Ascheid, Xiaotao Chen:
Frequency-Aware ESL Power Estimation for ARM Cortex-A9 Using a Black Box Processor Model. 26:1-26:26 - Jan Henrik Weinstock, Luis Gabriel Murillo, Rainer Leupers, Gerd Ascheid:
Parallel SystemC Simulation for ESL Design. 27:1-27:25
Volume 16, Number 2, April 2017
- Sandeep K. Shukla:
Editorial: Continuing the Course. 28:1-28:2
- Sebastian Fischmeister, Jason Xue:
Guest Editorial: Special Issue on LCTES 2015. 29:1 - Marcos Aurélio Pinto Cunha
, Omayma Matoussi, Frédéric Pétrot:
Detecting Software Cache Coherence Violations in MPSoC Using Traces Captured on Virtual Platforms. 30:1-30:21 - Wenguang Zheng, Hui Wu
:
Dynamic Data-Cache Locking for Minimizing the WCET of a Single Task. 31:1-31:29 - Qingrui Liu
, Changhee Jung, Dongyoon Lee
, Devesh Tiwari:
Compiler-Directed Soft Error Detection and Recovery to Avoid DUE and SDC via Tail-DMR. 32:1-32:26 - Adam M. Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein:
A Principled Approach to Secure Multi-core Processor Design with ReWire. 33:1-33:25 - Li-Pin Chang, Po-Han Sung, Po-Tsang Chen, Po-Hung Chen:
Eager Synching: A Selective Logging Strategy for Fast fsync() on Flash-Based Android Devices. 34:1-34:25 - Christian Dietrich
, Martin Hoffmann, Daniel Lohmann
:
Global Optimization of Fixed-Priority Real-Time Systems by RTOS-Aware Control-Flow Analysis. 35:1-35:25 - Jing Liu, Kenli Li, Dakai Zhu, Jianjun Han, Keqin Li:
Minimizing Cost of Scheduling Tasks on Heterogeneous Multicore Embedded Systems. 36:1-36:25 - Ivan Llopard
, Christian Fabre
, Albert Cohen:
From a Formalized Parallel Action Language to Its Efficient Code Generation. 37:1-37:28 - Stanislav Manilov, Björn Franke
, Anthony Magrath, Cedric Andrieu:
Free Rider: A Source-Level Transformation Tool for Retargeting Platform-Specific Intrinsic Functions. 38:1-38:24 - Jing Zeng
, Laurence T. Yang
, Man Lin, Zili Shao
, Dakai Zhu:
System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems. 39:1-39:21
- Stefan Haar, Roland Meyer:
Message from the Guest Editors. 40:1 - Ferenc Bujtor, Lev Sorokin, Walter Vogler:
Testing Preorders for dMTS: Deadlock- and the New Deadlock-/DivergenceTesting. 41:1-41:28 - Stefan Vijzelaar, Wan J. Fokkink
:
Multi-valued Simulation and Abstraction Using Lattice Operations. 42:1-42:26 - Étienne André
, Thomas Chatain, César Rodríguez:
Preserving Partial-Order Runs in Parametric Time Petri Nets. 43:1-43:26 - Béatrice Bérard, Loïc Hélouët, John Mullins:
Non-interference in Partial Order Models. 44:1-44:34 - Olli Saarikivi
, Hernán Ponce de León, Kari Kähkönen, Keijo Heljanko
, Javier Esparza
:
Minimizing Test Suites with Unfoldings of Multithreaded Programs. 45:1-45:24 - Antti Valmari:
Stop It, and Be Stubborn! 46:1-46:26 - Tobias Isenberg:
Incremental Inductive Verification of Parameterized Timed Systems. 47:1-47:24 - Antti Siirtola
, Stavros Tripakis
, Keijo Heljanko
:
When Do We Not Need Complex Assume-Guarantee Rules? 48:1-48:25 - Qi Tang, Twan Basten
, Marc Geilen
, Sander Stuijk
, Jibo Wei:
Task-FIFO Co-Scheduling of Streaming Applications on MPSoCs with Predictable Memory Hierarchy. 49:1-49:25
- Kim-Kwang Raymond Choo
, Yunsi Fei
, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. 50:1-50:5 - Deepak Puthal, Surya Nepal
, Rajiv Ranjan
, Jinjun Chen:
DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream. 51:1-51:24 - Jun Song
, Fan Yang, Kim-Kwang Raymond Choo
, Zhijian Zhuang, Lizhe Wang:
SIPF: A Secure Installment Payment Framework for Drive-Thru Internet. 52:1-52:18 - Zhe Liu, Jian Weng
, Zhi Hu, Hwajeong Seo:
Efficient Elliptic Curve Cryptography for Embedded Devices. 53:1-53:18 - Shan Fu, Guoai Xu, Juan Pan, Zongyue Wang, An Wang:
Differential Fault Attack on ITUbee Block Cipher. 54:1-54:10 - Yang Li, Mengting Chen, Zhe Liu, Jian Wang:
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers. 55:1-55:20 - Arcangelo Castiglione
, Raffaele Pizzolante, Francesco Palmieri, Barbara Masucci, Bruno Carpentieri, Alfredo De Santis
, Aniello Castiglione
:
On-Board Format-Independent Security of Functional Magnetic Resonance Images. 56:1-56:15 - Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu:
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design. 57:1-57:20 - Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo
, Jinjun Chen:
Securely Reinforcing Synchronization for Embedded Online Contests. 58:1-58:21 - Mehran Mozaffari Kermani
, Reza Azarderakhsh, Anita Aghaie:
Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC. 59:1-59:19 - Keke Gai
, Longfei Qiu, Min Chen
, Hui Zhao, Meikang Qiu:
SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing. 60:1-60:22 - Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. 61:1-61:22
Volume 16, Number 3, July 2017
- Sandeep K. Shukla
:
Editorial: Cyber Security, IoT, Block Chains - Risks and Opportunities. 62:1-62:2
- Marilyn Wolf, Jason Xue:
Guest Editorial: Special Issue on Embedded Computing for IoT. 63:1 - Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
:
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks. 64:1-64:23 - Hrishikesh Jayakumar
, Arnab Raha
, Jacob R. Stevens, Vijay Raghunathan:
Energy-Aware Memory Mapping for Hybrid FRAM-SRAM MCUs in Intermittently-Powered IoT Devices. 65:1-65:23 - Marco Tiloca
, Kirill Nikitin
, Shahid Raza:
Axiom: DTLS-Based Secure IoT Group Communication. 66:1-66:29 - Urbi Chatterjee, Rajat Subhra Chakraborty
, Debdeep Mukhopadhyay:
A PUF-Based Secure Communication Protocol for IoT. 67:1-67:25 - Anfeng Liu, Xiao Liu, Zhipeng Tang, Laurence T. Yang
, Zili Shao:
Preserving Smart Sink-Location Privacy with Delay Guaranteed Routing Scheme for WSNs. 68:1-68:25 - Terrell R. Bennett, Nicholas R. Gans
, Roozbeh Jafari
:
Data-Driven Synchronization for Internet-of-Things Systems. 69:1-69:24 - Zhaoyan Shen
, Zhijian He, Shuai Li, Qixin Wang
, Zili Shao
:
A Multi-Quadcopter Cooperative Cyber-Physical System for Timely Air Pollution Localization. 70:1-70:23 - Jian Wu
, Roozbeh Jafari
:
Seamless Vision-assisted Placement Calibration for Wearable Inertial Sensors. 71:1-71:22
- Bo-Wei Chen, Wen Ji, Zhu Li:
Guest Editorial for ACM TECS Special Issue on Effective Divide-and-Conquer, Incremental, or Distributed Mechanisms of Embedded Designs for Extremely Big Data in Large-Scale Devices. 72:1-72:2 - Anfeng Liu, Xiao Liu, Tianyi Wei, Laurence T. Yang, Seungmin (Charlie) Rho, Anand Paul
:
Distributed Multi-Representative Re-Fusion Approach for Heterogeneous Sensing Data Collection. 73:1-73:25 - Xiaogang Chen, Z. Jane Wang, Xiangyang Ji:
A Load-Balancing Divide-and-Conquer SVM Solver. 74:1-74:10 - Bo Liu, Xiao-Tong Yuan, Yang Yu, Qingshan Liu, Dimitris N. Metaxas:
Parallel Sparse Subspace Clustering via Joint Sample and Parameter Blockwise Partition. 75:1-75:17 - Sun-Yuan Kung, Thee Chanyaswad, J. Morris Chang, Pei Yuan Wu
:
Collaborative PCA/DCA Learning Methods for Compressive Privacy. 76:1-76:18
- Tom Fleming, Huang-Ming Huang, Alan Burns, Christopher D. Gill, Sanjoy K. Baruah, Chenyang Lu:
Corrections to and Discussion of "Implementation and Evaluation of Mixed-criticality Scheduling Approaches for Sporadic Tasks". 77:1-77:4 - Hasna Bouraoui
, Chadlia Jerad, Anupam Chattopadhyay, Nejib Ben Hadj-Alouane
:
Hardware Architectures for Embedded Speaker Recognition Applications: A Survey. 78:1-78:28 - Ye Xu, Israel Koren, C. Mani Krishna:
AdaFT: A Framework for Adaptive Fault Tolerance for Cyber-Physical Systems. 79:1-79:25 - Daniele Jahier Pagliari
, Mario R. Casu
, Luca P. Carloni
:
Accelerators for Breast Cancer Detection. 80:1-80:25 - Jiunn-Yeu Chen
, Wuu Yang, Wei-Chung Hsu, Bor-Yeh Shen, Quan-Huei Ou:
On Static Binary Translation of ARM/Thumb Mixed ISA Binaries. 81:1-81:25 - Wilson M. Tan, Paul Sullivan, Hamish Watson, Joanna Slota-Newson, Stephen A. Jarvis
:
An Indoor Test Methodology for Solar-Powered Wireless Sensor Networks. 82:1-82:25 - Tseng-Yi Chen
, Yuan-Hao Chang
, Shuo-Han Chen
, Nien-I Hsu, Hsin-Wen Wei, Wei-Kuan Shih:
On Space Utilization Enhancement of File Systems for Embedded Storage Systems. 83:1-83:28 - Aaron Landy
, Greg Stitt:
Serial Arithmetic Strategies for Improving FPGA Throughput. 84:1-84:25 - Rajeev Alur, Vojtech Forejt
, Salar Moarref, Ashutosh Trivedi:
Schedulability of Bounded-Rate Multimode Systems. 85:1-85:27 - Maryam Bandari, Robert Simon, Hakan Aydin:
DMS-Based Energy Optimizations for Clustered WSNs. 86:1-86:28 - Rajesh Devaraj
, Arnab Sarkar, Santosh Biswas:
Fault-Tolerant Preemptive Aperiodic RT Scheduling by Supervisory Control of TDES on Multiprocessors. 87:1-87:25 - Qining Lu, Guanpeng Li
, Karthik Pattabiraman, Meeta Sharma Gupta, Jude A. Rivers:
Configurable Detection of SDC-causing Errors in Programs. 88:1-88:25 - Guoxian Huang, Lei Wang:
An FPGA-Based Architecture for High-Speed Compressed Signal Reconstruction. 89:1-89:23 - Bogdan Groza
, Pal-Stefan Murvay
, Anthony Van Herrewege, Ingrid Verbauwhede
:
LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks. 90:1-90:28
Volume 16, Number 4, September 2017
- Sandeep K. Shukla:
Editorial: Security of Mobile Devices. 91:1-91:2
- Jimson Mathew, Rajat Subhra Chakraborty, Dhiraj K. Pradhan:
Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded Computing". 92:1-92:2 - Yohan Ko
, Reiley Jeyapaul, Youngbin Kim
, Kyoungwoo Lee, Aviral Shrivastava
:
Protecting Caches from Soft Errors: A Microarchitect's Perspective. 93:1-93:28 - Stefano Esposito
, Massimo Violante, Marco Sozzi, Marco Terrone, Massimo Traversone:
A Novel Method for Online Detection of Faults Affecting Execution-Time in Multicore-Based Systems. 94:1-94:19 - Bilgiday Yuce, Nahid Farhady Ghalaty, Chinmay Deshpande, Harika Santapuri, Conor Patrick, Leyla Nazhandali, Patrick Schaumont
:
Analyzing the Fault Injection Sensitivity of Secure Embedded Software. 95:1-95:25 - Maria Isabel Mera
, Jonah Caplan, Seyyed Hasan Mozafari, Brett H. Meyer, Peter A. Milder
:
Area, Throughput, and Power Trade-Offs for FPGA- and ASIC-Based Execution Stream Compression. 96:1-96:20
- Tigori Kabland Toussaint Gautier, Jean-Luc Béchennec
, Sébastien Faucou
, Olivier Henry Roux
:
Formal Model-Based Synthesis of Application-Specific Static RTOS. 97:1-97:25 - Francisco Sant'Anna
, Roberto Ierusalimschy, Noemi de La Rocque Rodriguez, Silvana Rossetto, Adriano Branco
:
The Design and Implementation of the Synchronous Language CÉU. 98:1-98:26 - Isabella Stilkerich, Clemens Lang, Christoph Erhardt, Christian Bay, Michael Stilkerich:
The Perfect Getaway: Using Escape Analysis in Embedded Real-Time Systems. 99:1-99:30 - Mohamed Hassan
, Hiren D. Patel, Rodolfo Pellizzoni:
PMC: A Requirement-Aware DRAM Controller for Multicore Mixed Criticality Systems. 100:1-100:28 - Tianyi Wang, Soamar Homsi, Linwei Niu, Shaolei Ren
, Ou Bai
, Gang Quan
, Meikang Qiu:
Harmonicity-Aware Task Partitioning for Fixed Priority Scheduling of Probabilistic Real-Time Tasks on Multi-Core Platforms. 101:1-101:21 - Yi Wang
, Yajun Ha:
A DFA-Resistant and Masked PRESENT with Area Optimization for RFID Applications. 102:1-102:22 - Kartik Nagar
, Y. N. Srikant:
Refining Cache Behavior Prediction Using Cache Miss Paths. 103:1-103:26 - Massimo Benerecetti, Marco Faella
:
Automatic Synthesis of Switching Controllers for Linear Hybrid Systems: Reachability Control. 104:1-104:27 - Nathan Sandoval, Casey Mackin, Sean Whitsitt
, Vijay Shankar Gopinath, Sachidanand Mahadevan, Andrew Milakovich, Kyle Merry, Jonathan Sprinkle
, Roman Lysecky:
Task Transition Scheduling for Data-Adaptable Systems. 105:1-105:28 - Xi Zheng
, Christine Julien
, Hongxu Chen, Rodion M. Podorozhny, Franck Cassez
:
Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems. 106:1-106:24 - Kaisheng Ma
, Xueqing Li, Huichu Liu, Xiao Sheng, Yiqun Wang, Karthik Swaminathan, Yongpan Liu, Yuan Xie, John Sampson, Vijaykrishnan Narayanan:
Dynamic Power and Energy Management for Energy Harvesting Nonvolatile Processor Systems. 107:1-107:23 - Navonil Chatterjee
, Suraj Paul, Santanu Chattopadhyay:
Fault-Tolerant Dynamic Task Mapping and Scheduling for Network-on-Chip-Based Multicore Platform. 108:1-108:24 - Prashant Ahir, Mehran Mozaffari Kermani
, Reza Azarderakhsh:
Lightweight Architectures for Reliable and Fault Detection Simon and Speck Cryptographic Algorithms on FPGA. 109:1-109:17 - Chen Pan, Mimi Xie, Chengmo Yang, Yiran Chen, Jingtong Hu
:
Exploiting Multiple Write Modes of Nonvolatile Main Memory in Embedded Systems. 110:1-110:26 - Yu Li, Albert M. K. Cheng
:
Toward a Practical Regularity-based Model: The Impact of Evenly Distributed Temporal Resource Partitions. 111:1-111:25 - Yooseong Kim, David Broman, Aviral Shrivastava
:
WCET-Aware Function-Level Dynamic Code Management on Scratchpad Memory. 112:1-112:26 - Guanjun Liu, Mengchu Zhou, Changjun Jiang:
Petri Net Models and Collaborativeness for Parallel Processes with Resource Sharing and Message Passing. 113:1-113:20 - Michal Ciszewski, Konrad Iwanicki
:
Efficient Automated Code Partitioning for Microcontrollers with Switchable Memory Banks. 114:1-114:26 - Yun Liang, Xiuhong Li:
Efficient Kernel Management on GPUs. 115:1-115:24 - Yuliang Sun
, Lanjun Wang
, Chen Wang, Yu Wang:
Exploiting Stable Data Dependency in Stream Processing Acceleration on FPGAs. 116:1-116:26 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu
, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. 117:1-117:24
Volume 16, Number 5s, October 2017
CASES 2017
- Avinash Malik
, Partha S. Roop, Sidharta Andalam, Mark Trew, Michael Mendler:
Modular Compilation of Hybrid Systems for Emulation and Large Scale Simulation. 118:1-118:21 - Gabriel Hjort Blindell, Mats Carlsson, Roberto Castañeda Lozano, Christian Schulte:
Complete and Practical Universal Instruction Selection. 119:1-119:18