This paper presents the development cycle of complex real-time applications. The paper demonstrates how the different steps involved in the creation of complex control system are achieved in a cost effective way using...
详细信息
This paper presents the development cycle of complex real-time applications. The paper demonstrates how the different steps involved in the creation of complex control system are achieved in a cost effective way using state of the art development tools involving an open-source real-time operating system. Starting at model creation, ending at results analysis, the different aspect of development is covered. A concrete application of a power electronics controller are presented to illustrate the paper
Summary form only given. Whenever a programmer writes a loop, or a mathematician does a proof by induction, an invariant is involved. The discovery and understanding of invariants often underlies problem solving in ma...
详细信息
Summary form only given. Whenever a programmer writes a loop, or a mathematician does a proof by induction, an invariant is involved. The discovery and understanding of invariants often underlies problem solving in many domains. The author discusses his search for powerful invariants over the past decade. This search was/is motivated by a broad spectrum of problems: understanding query languages, engineering data integration systems, optimizing disease treatments, recognizing DNA feature sites, and discovering reliable patterns
This paper presents a Matlab based scheduling toolbox TORSCHE (time optimization of resources, scheduling). The toolbox offers a collection of data structures that allow the user to formalize various off-line and onli...
详细信息
This paper presents a Matlab based scheduling toolbox TORSCHE (time optimization of resources, scheduling). The toolbox offers a collection of data structures that allow the user to formalize various off-line and online scheduling problems. Algorithms are simply implemented as Matlab functions with fixed structure allowing users to implement new algorithms. A more complex problem can be formulated as an integer linear programming problem or satisfiability of Boolean expression problem. The toolbox is intended mainly as a research tool to handle control and scheduling co-design problems. Therefore, we provide an interface to a real-time Matlab/Simulik based simulator TrueTime and a code generator allowing to generate parallel code for FPGA
In this paper, we introduce a novel wavelet-based multiple description image coder, referred to as the feature-oriented MDC (FO-MDC). The proposed multiple description coders exploit the statistics of the wavelet coef...
详细信息
In this paper, we introduce a novel wavelet-based multiple description image coder, referred to as the feature-oriented MDC (FO-MDC). The proposed multiple description coders exploit the statistics of the wavelet coefficients, and identify the subsets of samples those are sensitive to packet loss. A joint optimization between tree-pruning and quantizer selection in the rate-distortion sense is used in order to allocate more bits to these sensitive coefficients. When compared with the state-of-the-art multiple description scalar quantization coders, the proposed FO-MDC yields a more efficient central-side distortion tradeoff control mechanism. Furthermore, it proves to be more robust for image transmission even with high packet loss ratios
In this paper, an application programming interface for wireless sensor networks (WSN API) is presented. The WSN API consists of a client-side API (gateway API) and a sensor-side API (node API). The WSN API conceals t...
详细信息
In this paper, an application programming interface for wireless sensor networks (WSN API) is presented. The WSN API consists of a client-side API (gateway API) and a sensor-side API (node API). The WSN API conceals the complexities of WSN communication protocols and architectures, and provides a well-defined and easy-to-use way to collect data from sensors. Also, easy expandability for new sensor components and applications is provided. The WSN API is implemented practically in TUTWSN prototype platforms
In a networked embedded system a real-time application is distributed and scheduled over a set of nodes, which are connected by means of heterogeneous networks. The application designer for such a system is often conf...
详细信息
In a networked embedded system a real-time application is distributed and scheduled over a set of nodes, which are connected by means of heterogeneous networks. The application designer for such a system is often confronted with the challenge of providing better response time and low failure probability for the distributed application. These objectives are conflicting with each other hence some trade-off between these two design objectives is needed to ensure a satisfactory application schedule. More often the designer's satisfaction can be expressed as a set of aspiration bounds on the design objectives, that if attained will be a good schedule. This paper proposes a satisfying multiobjective mixed integer programming (MOMIP) framework for deriving such a schedule
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about such programs must model the semantics o...
详细信息
ISBN:
(纸本)1595934685
Bitwise operations are commonly used in low-level systems code to access multiple data fields that have been packed into a single word. Program analysis tools that reason about such programs must model the semantics of bitwise operations precisely in order to capture program control and data flow through these operations. We present a type system for subword data structures that explitictly tracks the flow of bit values in the program and identifies consecutive sections of bits as logical entities manipulated atomically by the programmer. Our type inference algorithm tags each integer value of the program with a bitvector type that identifies the data layout at the subword level. These types are used in a translation phase to remove bitwise operations from the program, thereby allowing verification engines to avoid the expensive low-level reasoning required for analyzing bitvector operations. We have used a software model checker to check properties of translated versions of a Linux device driver and a memory protection system. The resulting verification runs could prove many more properties than the naive model checker that did not reason about bitvectors, and could prove properties much faster than a model checker that did reason about bitvectors. We have also applied our bitvector type inference algorithm to generate program documentation for a virtual memory subsystem of an OS kernel. While we have applied the type system mainly for program understanding and verification, bitvector types also have applications to better variable ordering heuristics in boolean model checking and memory optimizations in compilers for embedded software. Copyright ACM 2006.
In this paper, we present our original approach to the model-based statistical usage testing of a class of communication protocol implementations that are based on the state design pattern and Java programming environ...
详细信息
In this paper, we present our original approach to the model-based statistical usage testing of a class of communication protocol implementations that are based on the state design pattern and Java programming environment augmented with the class FSMSystem. The approach is based on the working environment that has been proven on a number of real-world projects. The working environment is created with the following set of tools: generic modeling environment with the operational profile model paradigm registered to it, operational profile model interpreter, generic test case generator, test case compiler, and the unit testing framework JUnit extended with the class TestBed that acts as both test driver and stub thus providing the complete test harness. In the paper, we present the methodology of the model-based statistical usage testing of a class of communication protocol implementations, the tools that support this methodology, and the case study - the model based statistical usage testing of SIP INVITE client transaction, a part of the SIP protocol stack
We present a method for combining multiple point-based constraints in haptic programming environments. Instead of using a single proxy point for haptic feedback, the method maintains a separate proxy for each constrai...
详细信息
We present a method for combining multiple point-based constraints in haptic programming environments. Instead of using a single proxy point for haptic feedback, the method maintains a separate proxy for each constraint. The reaction force is computed by linking the proxies in a chain. Constraints are applied in sequential order, such that the proxy found in the current step becomes the probe for the next step in the chain. The advantage of the method over previous approaches is that the constraints are maintained precisely and the output is well-defined. We illustrate the method with examples from the domain of 3D scientific data visualization. Finally, we present the results of an experiment conducted to quantify the contribution of haptic guidance in two representative vector field exploration tasks.
High temperature has become a major problem for system-on-chip testing. In order to reduce the test time while keeping the temperature of the chip under test within a safe range, a thermal-aware test scheduling techni...
详细信息
ISBN:
(纸本)9780769527062;076952706X
High temperature has become a major problem for system-on-chip testing. In order to reduce the test time while keeping the temperature of the chip under test within a safe range, a thermal-aware test scheduling technique is required. This paper presents an approach to minimize the test time and, at the same time, prevent the temperature of cores under test going over the given upper limit. We employ test set partitioning to divide test sets into shorter test sequences, and add cooling spans between test sequences, so that overheating can be avoided. Moreover, test sequences from different test sets are interleaved, in order to utilize the cooling spans and the test bus bandwidth for test data transportation, hence the total test time is reduced. The test scheduling problem is formulated as a combinatorial optimization problem, and we use constraint logic programming to solve it in order to obtain the optimal solution. Experimental results have shown the efficiency of the proposed approach
暂无评论