首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Dynamic Thermal and Power Management methods highly depend on the quality of the monitoring, which needs to provide estimations of the system's state. This can be achieved with a set of performance counters that can be configured to track logical events at different levels. Although this problem has been addressed in the literature, recently developed highly reactive adaptation techniques require faster, more accurate and more robust estimations methods. A systematic approach (PESel) is proposed for the selection of the relevant performance events from the local, shared and system resources. We investigate an implementation of a neural network based estimation technique which provides better results compared to related works. Our approach is robust to external temperature variations and takes into account dynamic scaling of the operating frequency. It achieves 96% accuracy with a temporal resolution of 100 ms, with negligible performance/energy overheads (less than 1%).  相似文献   

2.
Internet technology is reaching industrial embedded systems first by providing remote access to them. The GLASS system supports remote monitoring capabilities for facilities ranging from large plants to devices on mobile platforms like trains  相似文献   

3.
Securing embedded systems   总被引:1,自引:0,他引:1  
A top-down, multiabstraction layer approach for embedded security design reduces the risk of security flaws, letting designers maximize security while limiting area, energy, and computation costs.  相似文献   

4.
5.
提出了一个基于SIP协议的嵌入式视频监控系统。它的监控端采用嵌入式Linux设备,并且使用SIP协议同监控中心进行通信。通过SIP协议,监控中心能够开启和关闭视频监控,调整监控端的监控参数如亮度、对比度和色调等。监控端还能实现自主监控,当发现监控对象发生意外情况,能及时向监控中心报警。SIP的应用不仅拓展了视频监控系统的物理范围,也提高了监控的智能性。  相似文献   

6.
Embedded systems are critical components of our everyday lives, be they in control systems like airbag controllers in cars, or in consumer products like washing machines and phones. Since such electronic products evolve to software intensive systems, software, becoming larger, more complex and prevalent, poses severe problems in the development of those systems. The required degree of dependability will lead to more rigour in construction and validation, and hence, strengthen the role of formal methods. Moreover, methods used in other areas, such as model checking in hardware verification and finite-state-machine-based testing in protocol testing, will make their way.  相似文献   

7.
Java for embedded systems   总被引:1,自引:0,他引:1  
Java requires infrastructure to run on embedded devices. This requirement must be traded against the powerful support for dynamic behavior that it offers embedded system developers  相似文献   

8.
Systems that require reengineering are a fact of life in both the commercial and military arenas. The authors have developed a systematic methodology based on virtual prototyping, with accompanying tools and libraries, for rapidly upgrading electronic systems  相似文献   

9.
Fleischmann  J. Buchenrieder  K. 《Computer》1999,32(2):116-119
Sophisticated consumer devices that support multimedia-personal digital assistants, network computers, and mobile communication devices-pose challenges for embedded systems designers. The low-cost, consumer-oriented, fast time-to-market mentality that dominates embedded system design today forces design teams to use hardware-software codesign to cope with growing design complexities. New codesign methodologies and tools must support a key characteristic of next-generation embedded systems: the capability to communicate over networks and adapt to different operating environments. The paper discusses two emerging classes of embedded systems: multifunction systems and multimode systems  相似文献   

10.
11.
Codesign of embedded systems: status and trends   总被引:1,自引:0,他引:1  
Ever increasing embedded system design complexity combined with a very tight time-to-market window has revolutionized the embedded-system design process. The concurrent design of hardware and software has displaced traditional sequential design. Further, hardware and software design now begins before the system architecture (or even the specification) is finalised. System architects, customers, and marketing departments develop requirement definitions and system specifications together. System architects define a system architecture consisting of cooperating system functions that form the basis of concurrent hardware and software design. Interface design requires the participation of both hardware and software developers. The next step integrates and tests hardware and software-this phase consists of many individual steps. Reusing components taken from previous designs or acquired from outside the design group is a main design goal to improve productivity and reduce design risk. It is argued that new methodologies and AD tools support an integrated hardware software codesign process  相似文献   

12.
Real-time systems need time-predictable platforms to allow static analysis of the worst-case execution time (WCET). Standard multi-core processors are optimized for the average case and are hardly analyzable. Within the T-CREST project we propose novel solutions for time-predictable multi-core architectures that are optimized for the WCET instead of the average-case execution time. The resulting time-predictable resources (processors, interconnect, memory arbiter, and memory controller) and tools (compiler, WCET analysis) are designed to ease WCET analysis and to optimize WCET performance. Compared to other processors the WCET performance is outstanding.The T-CREST platform is evaluated with two industrial use cases. An application from the avionic domain demonstrates that tasks executing on different cores do not interfere with respect to their WCET. A signal processing application from the railway domain shows that the WCET can be reduced for computation-intensive tasks when distributing the tasks on several cores and using the network-on-chip for communication. With three cores the WCET is improved by a factor of 1.8 and with 15 cores by a factor of 5.7.The T-CREST project is the result of a collaborative research and development project executed by eight partners from academia and industry. The European Commission funded T-CREST.  相似文献   

13.
Embedded systems tend to be event driven. The BED kernel supports an event-action programming model for an embedded systems development environment called Testbed. The kernel features deterministic scheduling and message transfer services.  相似文献   

14.
Smart cameras as embedded systems   总被引:1,自引:0,他引:1  
Wolf  W. Ozer  B. Lv  T. 《Computer》2002,35(9):48-53
  相似文献   

15.
An embedded system is a system that computer is used as a component in a larger device.In this paper,we study hybridity in embedded systems and present an interval based temporal logic to express and reason about hybrid properties of such kind of systems.  相似文献   

16.
Designers generally implement embedded controllers for reactive real-time applications as mixed software-hardware systems. In our formal methodology for specifying, modeling, automatically synthesizing, and verifying such systems, design takes place within a unified framework that prejudices neither hardware nor software implementation. After interactive partitioning, this approach automatically synthesizes the entire design, including hardware-software interfaces. Maintaining a finite-state machine model throughout, it preserves the formal properties of the design. It also allows verification of both specification and implementation, as well as the use of specification refinement through formal verification  相似文献   

17.
With reference to an embedded system featuring no support for memory management, we present a model of a protection system based on passwords. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU supports both concepts of a protection context and a protection domain. A protection context is a set of access rights for the memory pages; a protection domain is a set of one or more protection contexts. Passwords are associated with protection domains. A process that holds a given password can take advantage of this password to activate the corresponding domain. A small set of protection primitives makes it possible to modify the composition of the domains in a strictly controlled fashion.The proposed protection model is evaluated from a number of important viewpoints, which include password distribution, review and revocation, the memory requirements for storage of the information concerning protection, and the time necessary for password validation.  相似文献   

18.
The authors review several approaches to control-oriented and dataflow-oriented software scheduling to determine whether a given technique can satisfy deadlines, throughput, and other constraints for embedded real-time systems  相似文献   

19.
Bond  M. Anderson  R. 《Computer》2001,34(10):67-75
We have recently discovered a whole new family of attacks on the APIs (application programming interfaces) used by security processors. These attacks are economically important, as security processors are used to support a wide range of services - from ATMs (automated teller machines) to pre-payment utility metering - but designing APIs that resist such attacks is difficult  相似文献   

20.
Online BIST for embedded systems   总被引:1,自引:0,他引:1  
Embedded systems must meet increasingly high expectations of safety and high reliability. The authors survey online-testing techniques for identifying faults that can lead to system failure. They focus on online built-in self-test and its role in a comprehensive testing approach  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号