Embedded systems are targeted for specific applications under constraints on relative timing of their actions. In this paper, we proposed a co-synthesis approach to hardware/software (HW/SW) co-design for embedded sys...
详细信息
ISBN:
(纸本)9781424449095
Embedded systems are targeted for specific applications under constraints on relative timing of their actions. In this paper, we proposed a co-synthesis approach to hardware/software (HW/SW) co-design for embedded system based on Dynamic dataflow (DDF). Firstly, we introduced the theory of DDF and presented a methodology of designing embedded system on system-level that depends on decomposing DDF graph into sub-graphs. Furthermore, we then extend DDF by analyzing C language program structure in detail. Finally, we designed an embedded monitoring prototyping system based on FPGAs with HW/SW co-design approach. Our experience is verified that the HW/SW co-design for embedded system based on DDF is effective.
It is noted that Tandem's loosely coupled multiprocessor machine is a natural environment for parallel database operations. Horizontally partitioned tables are supported by the Tandem system. It is shown how this ...
详细信息
It is noted that Tandem's loosely coupled multiprocessor machine is a natural environment for parallel database operations. Horizontally partitioned tables are supported by the Tandem system. It is shown how this environment is utilized in Tandem's NonStop SQL implementation. The Tandem architecture, parallel index maintenance, parallel use of partitioned tables, and repartitioning are discussed. It is shown that the use of the parallel execution in NonStop SQL can result in a large speedup in the execution of operations on partitioned and nonpartitioned data. A benchmark showed that parallel queries in NonStop SQL achieve linear speedup and scaleup for batch queries.< >
Due to the lack of information flow control mechanism, the authorization model of an electronic institution (EI) may bring illegal information propagation threatening the confidentiality of sensitive data. By analyzin...
详细信息
Due to the lack of information flow control mechanism, the authorization model of an electronic institution (EI) may bring illegal information propagation threatening the confidentiality of sensitive data. By analyzing information flows among roles, algorithms for detecting and controlling potential illegal information flows in EIs are designed. The algorithms are applied to simulating classic cases. The experiments show the proposed algorithms can prevent unauthorized information leakage and enhance securities of EI based systems.
We present an approach allowing communication optimization during the hardware-software partitioning task. Our methodology focuses on systems represented by a dataflow graph whose nodes are elements of libraries. To a...
详细信息
ISBN:
(纸本)9780818678950
We present an approach allowing communication optimization during the hardware-software partitioning task. Our methodology focuses on systems represented by a dataflow graph whose nodes are elements of libraries. To abstract the communication constraints, we include communication nodes in this graph. Consequently assignment and scheduling of communications and operations can be determined together by the same partitioning algorithm. During partitioning, protocol optimization and bus scheduling are realized. We illustrate with a telecommunication system example the feasibility and the usefulness of our methodology.
The Java language environment, World Wide Web, and client-server architecture are complementary software technologies, which, when used together provide a powerful set of tools for developing and deploying multi-user ...
详细信息
ISBN:
(纸本)0780365666
The Java language environment, World Wide Web, and client-server architecture are complementary software technologies, which, when used together provide a powerful set of tools for developing and deploying multi-user distributed applications. In this article we describe an approach to build easy-to-use client software as WWW-downloadable Java applets, which use the World Wide Web to interact with servlets running on a remote server. We use this technology for developing a generic framework for remote computation. As application example serves the parametric multicriteria robustness exploration of the dynamics of a high-fidelity aircraft model.
A combining of GSPNs (generalized stochastic Petri nets) and PERT networks is used in order to reduce the computational complexity of performance evaluation of concurrent processes modeled by GSPNs. The authors propos...
详细信息
A combining of GSPNs (generalized stochastic Petri nets) and PERT networks is used in order to reduce the computational complexity of performance evaluation of concurrent processes modeled by GSPNs. The authors propose the following methodology. First, for PERT networks, an algorithm with good accuracy and computational complexity criteria should be formulated. Second, for safe GSPNs with acyclic behavior, a modification of the algorithm should be created. Third, another algorithm for safe GSPNs with cyclic behavior should be constructed.< >
To listed companies, cash holdings governance is very important and there are many factors may affect cash holdings, like financial leverage, debt structure, enterprise scale and so on. So in this paper, through the e...
详细信息
To listed companies, cash holdings governance is very important and there are many factors may affect cash holdings, like financial leverage, debt structure, enterprise scale and so on. So in this paper, through the establishment of models and using regression analysis method, we analyze their relationship with cash holdings.
This paper describes a set of techniques for the synthesis of pipelined data paths, and presents Sehwa, a program which performs such synthesis. The task includes the generation of data paths from a dataflow graph al...
详细信息
This paper describes a set of techniques for the synthesis of pipelined data paths, and presents Sehwa, a program which performs such synthesis. The task includes the generation of data paths from a dataflow graph along with a clocking scheme which overlaps execution of multiple tasks. Some examples which Sehwa has designed are given. Sehwa can find the minimum cost design, the highest performance design, and other designs between these two in the design space. We believe Sehwa to be the first pipelined synthesis program published in the open literature. Sehwa is written in Franz LISP, and executes within minutes for problems of practical size on a VAX 11/750.
This work concerns automatic hardware synthesis from dataflow graph (DFG) specification for fast HW/SW cosynthesis. A node in DFG represents a coarse grain block such as FIR and DCT and a port in a block may consume ...
详细信息
ISBN:
(纸本)1581139373
This work concerns automatic hardware synthesis from dataflow graph (DFG) specification for fast HW/SW cosynthesis. A node in DFG represents a coarse grain block such as FIR and DCT and a port in a block may consume multiple data samples per invocation, which distinguishes our approach from behavioral synthesis and complicates the problem. In the presented design methodology, a dataflow graph with specified algorithm can be mapped to various hardware structures according to the resource allocation and schedule information. This simplifies the management of the area/performance tradeoff in hardware design and widens the design space of hardware implementation of a dataflow graph compared with the previous approaches. Through experiments with some examples, the usefulness of the proposed technique is demonstrated.
Recent advances in the general theory of multivariable and large-scale systems have contributed to the development of hierarchical control schemes where the overall decision-making task is distributed over a number of...
详细信息
Recent advances in the general theory of multivariable and large-scale systems have contributed to the development of hierarchical control schemes where the overall decision-making task is distributed over a number of hierarchical levels. Use of such a hierarchical framework for the design of control schemes at the transport level in large computer communication networks can result in several beneficial features such as information aggregation for reduction in data storage requirements, capability of handling multiple objective functions in performance optimization, better adaptivity to variations in load and network topology and possibility of integrating routing and flow control functions for a more efficient control of traffic congestion. This paper outlines the development of two hierarchical schemes for routing and flow control that have recently been developed within such a framework.
暂无评论