skip to main content
10.1145/2968478acmotherconferencesBook PagePublication PagesesweekConference Proceedingsconference-collections
EMSOFT '16: Proceedings of the 13th International Conference on Embedded Software
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ESWEEK'16: TWELFTH EMBEDDED SYSTEM WEEK Pittsburgh Pennsylvania October 1 - 7, 2016
ISBN:
978-1-4503-4485-2
Published:
01 October 2016
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Mar 2025Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
Energy and timing aware synchronous programming
Article No.: 1, Pages 1–10https://doi.org/10.1145/2968478.2968500

The synchronous paradigm is widely used for the design of safety critical systems. Such systems, especially in the medical devices domain, must meet strict timing requirements while also ensuring long battery life. As a consequence, they are subject to ...

research-article
Lessons learned on assumptions and scalability with time-aware instrumentation
Article No.: 2, Pages 1–7https://doi.org/10.1145/2968478.2975584

Software instrumentation is a key technique in many stages of the development process. Instrumentation is particularly important for profiling, debugging, performance evaluation, and security analysis of real-time and embedded systems. Unfortunately, ...

research-article
Flexible support for time and costs in scenario-aware dataflow
Article No.: 3, Pages 1–10https://doi.org/10.1145/2968478.2968496

Scenario-aware dataflow is a formalism to model modern dynamic embedded applications whose behaviour is heavily dependent on input data or the operational environment. Key behavioural aspects are the execution times and energy consumption of a system's ...

research-article
Public Access
Making DDS really real-time with openflow
Article No.: 4, Pages 1–10https://doi.org/10.1145/2968478.2968479

An increasing amount of distributed real-time systems and other critical infrastructure now rely on Data Distribution Service (DDS) middleware for timely dissementation of data between system nodes. While DDS has been designed specifically for use in ...

research-article
Open Access
Exploring the performance of ROS2
Article No.: 5, Pages 1–10https://doi.org/10.1145/2968478.2968502

Middleware for robotics development must meet demanding requirements in real-time distributed embedded systems. The Robot Operating System (ROS), open-source middleware, has been widely used for robotics applications. However, the ROS is not suitable ...

research-article
Public Access
Locally optimal reach set over-approximation for nonlinear systems
Article No.: 6, Pages 1–10https://doi.org/10.1145/2968478.2968482

Safety verification of embedded systems modeled as hybrid systems can be scaled up by employing simulation-guided reach set over-approximation techniques. Existing methods are either applicable to only restricted classes of systems, overly conservative, ...

research-article
Public Access
Underminer: a framework for automatically identifying non-converging behaviors in black box system models
Article No.: 7, Pages 1–10https://doi.org/10.1145/2968478.2968487

Evaluation of industrial embedded control system designs is a time-consuming and imperfect process. While an ideal process would apply a formal verification technique such as model checking or theorem proving, these techniques do not scale to industrial ...

research-article
Public Access
Robust controller synthesis of switched systems using counterexample guided framework
Article No.: 8, Pages 1–10https://doi.org/10.1145/2968478.2968485

We investigate the problem of synthesizing robust controllers that ensure that the closed loop satisfies an input reach-while-stay specification, wherein all trajectories starting from some initial set I, eventually reach a specified goal set G, while ...

research-article
Public Access
An algorithmic approach to global asymptotic stability verification of hybrid systems
Article No.: 9, Pages 1–10https://doi.org/10.1145/2968478.2968483

In this paper, we present an algorithmic approach to global asymptotic stability (GAS) verification of hybrid systems. Our broad approach consists of reducing the GAS verification to the verification of a region stability (RS) analysis problem and an ...

research-article
Verifying cyber-physical systems by combining software model checking with hybrid systems reachability
Article No.: 10, Pages 1–10https://doi.org/10.1145/2968478.2968490

Cyber-physical systems (CPS) span the communication, computation and control domains. Creating a single, complete, and detailed model of a CPS is not only difficult, but, in terms of verification, probably not useful; current verification algorithms are ...

research-article
Darboux-type barrier certificates for safety verification of nonlinear hybrid systems
Article No.: 11, Pages 1–10https://doi.org/10.1145/2968478.2968484

Benefit from less computational difficulty, barrier certificate based method has attracted much attention in safety verification of hybrid systems. Barrier certificates are inherent existences of a hybrid system and may have different types. A set of ...

research-article
Public Access
A flattened hierarchical scheduler for real-time virtualization
Article No.: 12, Pages 1–10https://doi.org/10.1145/2968478.2968501

Migrating legacy real-time software stacks to newer hardware platforms can be achieved with virtualization which allows several software stacks to run on a single machine. Existing solutions guarantee that deadlines of virtualized real-time systems are ...

research-article
RMC: an integrated runtime system for adaptive many-core computing
Article No.: 13, Pages 1–10https://doi.org/10.1145/2968478.2968494

Many-core computing has surfaced as a promising solution to satisfy the rapidly increasing computational needs for various areas ranging from embedded to datacenter computing. However, when allocated with an excessive number of cores, multithreaded ...

research-article
Automatic HAL generation for embedded multiprocessor systems
Article No.: 14, Pages 1–10https://doi.org/10.1145/2968478.2968493

Automated hardware design flows considerably speed up the development of embedded systems and are a useful asset during architecture exploration phase. However, any existing software has to be adapted for every new system. In this work we will ...

research-article
Real-time cache management for multi-core virtualization
Article No.: 15, Pages 1–10https://doi.org/10.1145/2968478.2968480

Real-time virtualization techniques have been investigated with the primary goal of consolidating multiple real-time systems onto a single hardware platform while ensuring timing predictability. However, a shared last-level cache (LLC) on recent multi-...

research-article
Cache-related preemption delay analysis for multi-level inclusive caches
Article No.: 16, Pages 1–10https://doi.org/10.1145/2968478.2968481

Cache-related preemption delay (CRPD) analysis is crucial when designing embedded control systems that employ preemptive scheduling. CRPD analysis for single-level caches has been studied extensively based on useful cache blocks (UCBs). As high-...

research-article
Public Access
Modular deductive verification of sampled-data systems
Article No.: 17, Pages 1–10https://doi.org/10.1145/2968478.2968495

Unsafe behavior of cyber-physical systems can have disastrous consequences, motivating the need for formal verification of these kinds of systems. Deductive verification in a proof assistant such as Coq is a promising technique for this verification ...

research-article
The SMT-based automatic road network generation in vehicle simulation environment
Article No.: 18, Pages 1–10https://doi.org/10.1145/2968478.2968498

Vehicle simulators are widely used to test the correctness of vehicle control algorithms. It is important to create a virtual road environment in a way that the vehicle algorithm can be tested under various circumstances that may happen in the real ...

research-article
PCFIRE: towards provable <u>p</u>reventative <u>c</u>ontrol-<u>f</u>low <u>i</u>ntegrity enforcement for <u>r</u>ealistic <u>e</u>mbedded software
Article No.: 19, Pages 1–10https://doi.org/10.1145/2968478.2968492

Control-Flow Integrity (CFI) is an important safety property of software, particularly in embedded and safety-critical systems, where CFI violations have led to patient deaths and can render cars remotely controllable by attackers. Previous techniques ...

research-article
A refinement theory for timed-dataflow analysis with support for reordering
Article No.: 20, Pages 1–10https://doi.org/10.1145/2968478.2968489

Real-time stream processing applications executed on embedded multiprocessor systems often have strict throughput and latency constraints. Violating these constraints is undesired and temporal analysis methods are therefore used to prevent such ...

research-article
I/O scheduling with mapping cache awareness for flash based storage systems
Article No.: 21, Pages 1–10https://doi.org/10.1145/2968478.2968503

NAND flash memory has been the default storage component in mobile systems. One of the key technologies for flash management is the address mapping scheme between logical addresses and physical addresses, which deals with the inability of in-place-...

research-article
The design of an efficient swap mechanism for hybrid DRAM-NVM systems
Article No.: 22, Pages 1–10https://doi.org/10.1145/2968478.2968497

Non-Volatile Memory (NVM) is becoming an attractive candidate to be the swap area in embedded systems for its near-DRAM speed, low energy consumption, high density, and byte-addressability. Swapping data from DRAM out to NVM, however, can cause large ...

research-article
Public Access
A fast, lightweight, and reliable file system for wireless sensor networks
Article No.: 23, Pages 1–10https://doi.org/10.1145/2968478.2968486

Sensor nodes are increasingly used in critical applications. A file storage system that is fast, lightweight, and reliable across device failures is important to safeguard the data that these devices record. A fast and lightweight file system should ...

research-article
Public Access
Schedulability analysis of mixed-criticality systems with multiple frequency specifications
Article No.: 24, Pages 1–10https://doi.org/10.1145/2968478.2968488

In mixed-criticality systems functionalities of different criticalities, that need to have their correctness validated to different levels of assurance, co-exist upon a shared platform. Multiple specifications at differing levels of assurance may be ...

research-article
On-the-fly fast overrun budgeting for mixed-criticality systems
Article No.: 25, Pages 1–10https://doi.org/10.1145/2968478.2968491

In mixed-criticality scheduling, the widely assumed mode-switch scheme assumes that both high- and low-criticality tasks are schedulable when no tasks overrun (normal mode) and all high-criticality tasks are schedulable even when they overrun (critical ...

research-article
Open Access
Synthesizing time-triggered schedules for switched networks with faulty links
Article No.: 26, Pages 1–10https://doi.org/10.1145/2968478.2968499

Time-triggered (TT) switched networks are a deterministic communication infrastructure used by real-time distributed embedded systems. These networks rely on the notion of globally discretized time (i.e. time slots) and a static TT schedule that ...

Recommendations

Acceptance Rates

Overall Acceptance Rate 60 of 203 submissions, 30%
YearSubmittedAcceptedRate
EMSOFT '13972728%
EMSOFT '091063331%
Overall2036030%