CNRS

Displaying 121-160 of 233 results

  • White Papers // Feb 2012

    Push-and-Track: Saving Infrastructure Bandwidth Through Opportunistic Forwarding

    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. At the same time, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, the authors propose Push-and-track, a content dissemination framework that harnesses...

    Provided By CNRS

  • White Papers // Feb 2012

    A Lattice-Based Traitor Tracing Scheme

    A traitor tracing scheme is a multi-receiver encryption scheme where malicious receiver coalitions aiming at building pirate decryption devices are deterred by the existence of a tracing algorithm: using the pirate decryption device, the tracing algorithm can recover at least one member of the malicious coalition. All existing traitor tracing...

    Provided By CNRS

  • White Papers // Feb 2012

    Enabling Sleep Mode in Backbone IP-Networks: A Criticality-Driven Tradeoff

    The energy consumption of network devices, and, as a consequence, of communication networks, is generally independent from their level of utilization, which results in a waste of energy when the network is lightly loaded. Ideally the consumption of a network should be proportional to the amount of traffic it conveys....

    Provided By CNRS

  • White Papers // Feb 2012

    Combining SysML and AADL for the Design, Validation and Implementation of Critical Systems

    The realization of critical systems goes through multiple phases of specification, design, integration, validation, and testing. It starts from high-level sketches down to the final product. Model-Based Design has been acknowledged as a good conveyor to capture these steps. Yet, there is no universal solution to represent all activities. Two...

    Provided By CNRS

  • White Papers // Feb 2012

    Localized Load-Aware Geographic Routing in Wireless Ad Hoc Networks

    Wireless ad hoc networks are collections of wireless nodes (usually battery powered) that communicate with each other using radio frequency without a fixed infrastructure or centralized control. They are reorganized to have great potentials in a broad range of applications in disaster relief, conference, and battlefield environments, for example. One...

    Provided By CNRS

  • White Papers // Feb 2012

    Semidefinite Characterisation of Invariant Measures for One-Dimensional Discrete Dynamical Systems

    Using recent results on measure theory and algebraic geometry, the authors show how semi-definite programming can be used to construct invariant measures of one-dimensional discrete dynamical systems (iterated maps on a real interval). In particular they show that both discrete measures (corresponding to finite cycles) and continuous measures (corresponding to...

    Provided By CNRS

  • White Papers // Feb 2012

    Task Model and Online Operating System API for Hardware Tasks in OLLAF Platform

    In this paper, the authors present an original hardware task model and the corresponding online API for fine grained dynamically reconfigurable architecture. They cover the integration of this API in the OLLAF platform and more specifically its application to memory access management in a dynamically reconfigurable environment. Methods offered by...

    Provided By CNRS

  • White Papers // Feb 2012

    Impact of Power-Law Topology on IP-Level Routing Dynamics: Simulation Results

    This paper focuses on the Internet IP-level routing topology and proposes relevant explanations to its apparent dynamics. The authors first represent this topology as a power-law random graph. Then, they incorporate to the graph two well known factors responsible for the observed dynamics, which are load balancing and route evolution....

    Provided By CNRS

  • White Papers // Jan 2012

    Lexicalized Ontology for the Management of Business Rules an Industrial Experiment

    Business Rules Management Systems (BRMSs) are software applications that help organizations to separate their application code from their business knowledge. BRMSs help the users to author and maintain business rules and apply decision logic that reflects this business knowledge. However, domain experts who are not always business rules experts may...

    Provided By CNRS

  • White Papers // Jan 2012

    Generic Model for the Implementation of PLM Systems in Mechanical SMEs

    To improve the performance of extended enterprises, SMEs must be integrated. This integration must be done on several levels, including the PLM level. PLM is underdeveloped in SMEs mainly because of their difficulties in implementing information systems. This paper aims to provide a modelling framework to facilitate the implementation of...

    Provided By CNRS

  • White Papers // Jan 2012

    Closed - Form Error Probability of Network - Coded Cooperative Wireless Networks With Channel - Aware Detectors

    In this paper, the authors propose a simple analytical methodology to study the performance of multi-source multi-relay cooperative wireless networks with network coding at the relay nodes and Maximum-Likelihood (ML-) optimum channel-aware detectors at the destination. Channel-aware detectors are a broad class of receivers that account for possible decoding errors...

    Provided By CNRS

  • White Papers // Jan 2012

    Tightly-Secure Signatures from Lossy Identification Schemes

    In this paper the authors present three digital signature schemes with tight security reductions. Their first signature scheme is a particularly efficient version of the short exponent discrete log based scheme of the researcher (J. of Cryptology 2006). Their scheme has a tight reduction to the decisional short discrete logarithm...

    Provided By CNRS

  • White Papers // Jan 2012

    CGA as Alternative Security Credentials with IKEv2: Implementation and Analysis

    Internet Protocol Security (IPSec) is a protocol suite enabling secure IP communications by authentication and/or encryption. Internet Key Exchange version 2 (IKEv2) mechanisms is recommended to configure dynamically IPSec between IP nodes and the authentication of each peer is usually based on either pre-shared keys, X.509 certificates or Extensible Authentication...

    Provided By CNRS

  • White Papers // Jan 2012

    Evaluating Choreographies in BPMN 2.0 Using an Extended Quality Framework

    The notion of choreography has emerged over the past years as a foundational concept for capturing and managing collaborative business processes. This concept has been adopted as a first-class citizen in the latest version of the Business Process Modeling Notation (BPMN 2.0). However, it remains an open question whether or...

    Provided By CNRS

  • White Papers // Jan 2012

    Characterizing End-Host Application Performance Across Multiple Networking Environments

    Users today connect to the Internet everywhere - from home, work, airports, friend's homes, and more. This paper characterizes how the performance of networked applications varies across networking environments. Using data from a few dozen end-hosts, the authors compare the distributions of RTTs and download rates across pairs of environments....

    Provided By CNRS

  • White Papers // Jan 2012

    Detecting and Profiling TCP Connections Experiencing Abnormal Performance

    The authors study functionally correct TCP connections - normal set-up, data transfer and tear-down - that experience lower than normal performance in terms of delay and throughput. Several factors, including packet loss or application behavior, may lead to such abnormal performance. They present a methodology to detect TCP connections with...

    Provided By CNRS

  • White Papers // Jan 2012

    Business Process Driven Solutions for Innovative Enterprise Information Systems

    Existing limitations and problems in the current life-cycle of software applications will encourage new development paradigms. New technological trends, aiming at responding to current needs, such as flexibility, dynamicity, scalability, will certainly drive the envisaged changes. In this paper, possible solutions for the development and maintenance of innovative enterprise Information...

    Provided By CNRS

  • White Papers // Jan 2012

    An Ontological Approach to Business Process Modeling

    Business people use informal methods to represent Business Processes (BP), having the main objective to support an enterprise organization. On the other hand, application software is increasingly based on Service Oriented Architectures, where the application logic is represented by executable BP (e.g., by using BPEL.) Despite both are aiming at...

    Provided By CNRS

  • White Papers // Jan 2012

    Business Process Evolution: a Rule-based Approach

    Business Process (BP) evolution is a key aspect of BP lifecycle. There are several reasons that may cause BP modifications. Among these, particularly important are the changes of the enterprise organization and operation strategies, which can be captured by Business Rules (BRs). The authors focus here on a BP-based enterprise...

    Provided By CNRS

  • White Papers // Jan 2012

    On the Asymptotic Analysis of Mutual Information of MIMO Rician Correlated Channels

    The analysis of mutual information and capacity of block fading MIMO static channels has generated considerable interest since the seminal work of Telatar in 1995. The vast majority of these works have addressed the case of Rayleigh MIMO channels. Despite its importance, the context of Rician MIMO channels seems to...

    Provided By CNRS

  • White Papers // Jan 2012

    Data Coherency in Distributed Shared Memory

    The authors present a new model for distributed shared memory systems, based on remote data accesses. Such features are offered by network interface cards that allow one-sided operations, remote direct memory access and OS bypass. This model leads to new interpretations of distributed algorithms allowing the user to propose an...

    Provided By CNRS

  • White Papers // Dec 2011

    Probe and Pray: Using UPnP for Home Network Measurements

    Network measurement practitioners increasingly focus their interest on understanding and debugging home networks. The Universal Plug and Play (UPnP) technology holds promise as a highly efficient way to collect and leverage measurement data and configuration settings available from UPnP-enabled devices found in home networks. Unfortunately, UPnP proves less available and...

    Provided By CNRS

  • White Papers // Dec 2011

    A Joint Decode-and-Forward Strategy for Physical Network Coding Based on Factor Graphs

    The authors consider physical network coding on a two-way relay channel. Two source nodes send their packets simultaneously over time-varying MIMO channels to a relay node. Assuming that the relay employs the joint decode-and-forward strategy, the relay must be able to decode the individual source packets. This task requires a...

    Provided By CNRS

  • White Papers // Dec 2011

    Relativistic Causality and Clockless Circuits

    Time plays a crucial role in the performance of computing systems. The accurate modeling of logical devices, and of their physical implementations, requires an appropriate representation of time and of all properties that depend on this notion. The need for a proper model, particularly acute in the design of clockless...

    Provided By CNRS

  • White Papers // Dec 2011

    Affine Vector Cache for Memory Bandwidth Savings

    Preserving memory locality is a major issue in highly-multithreaded architectures such as GPUs. These architectures hide latency by maintaining a large number of threads in flight. As each thread needs to maintain a private working set, all threads collectively put tremendous pressure on on-chip memory arrays, at significant cost in...

    Provided By CNRS

  • White Papers // Nov 2011

    Business Rules Generation methods by Merging Model Driven Architecture and Web Semantics

    The increasing complexity of the information systems must be taking into account for new technologies, and the appearance of new types of requirements raise new problems that the traditional engineering approaches of the information systems cannot always solve in an adapted way. Business Rules constitute a key element of the...

    Provided By CNRS

  • White Papers // Nov 2011

    Distributed Estimation of the Maximum Value Over a Wireless Sensor Network

    This paper focuses on estimating the maximum of the initial measures in a Wireless Sensor Network. Two different algorithms are studied : the random gossip, relying on pair-wise exchanges between the nodes, and the broadcast in which each sensor sends its value to all its neighbors; both are asynchronous and...

    Provided By CNRS

  • White Papers // Oct 2011

    Building a Network of SME for a Global PSS Infrastructure in Complex High-Tech Systems: Example of Urban Applications

    While small dynamic firms propose PSS applications based on new technologies quite easily, large infrastructures are often required. SMEs don't have the capacity to do this alone. For complex systems, different SMEs combine efforts to build an efficient infrastructure. Other SMEs can join and propose other PSS, creating a network....

    Provided By CNRS

  • White Papers // Sep 2011

    Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

    The paper presents a simple probabilistic analysis of the energy consumption in preamble sampling MAC protocols. The authors validate the analytical results with simulations. They compare the classical MAC protocols (B-MAC and X-MAC) with LA-MAC, a method proposed in a companion paper. Their analysis highlights the energy savings achievable with...

    Provided By CNRS

  • White Papers // Sep 2011

    A Multiagent System for Production Synchronization in SME Mechatronics Supply Chain

    The growing need for supply chain integration between the various actors is a major strategic challenge and a strong competitive advantage. The authors present in this paper the application of Multi-Agent System (MAS) for modelling and simulation of the dynamic structure and behavior of the supply chain in SMEs mechatronic...

    Provided By CNRS

  • White Papers // Sep 2011

    Asymetric Pavlovian Populations

    Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pair-wise according to some rules that update their...

    Provided By CNRS

  • White Papers // Sep 2011

    Lexicalized Ontology for a Business Rules Management Platform: An Automotive Use Case

    This paper describes a platform that helps industrial domain experts to preserve the connection between textual sources and formalized business rules by using lexicalized ontologies both for links and for storage of the conceptual knowledge. Business Rules Management Systems (BRMSs) are used to update and query business rules of an...

    Provided By CNRS

  • White Papers // Sep 2011

    Stack-Less SIMT Reconvergence at Low Cost

    Parallel architectures following the SIMT model such as GPUs benefit from application regularity by issuing concurrent threads running in lockstep on SIMD units. As threads take different paths across the control-flow graph, lockstep execution is partially lost, and must be regained whenever possible in order to maximize the occupancy of...

    Provided By CNRS

  • White Papers // Sep 2011

    Unconstrained Keystroke Dynamics Authentication with Shared Secret

    Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additional sensor is required for authenticating the user before accessing to an application. In the last thirty years, many researchers have proposed, different algorithms...

    Provided By CNRS

  • White Papers // Sep 2011

    A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

    The authors propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. They base their role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, they prove...

    Provided By CNRS

  • White Papers // Aug 2011

    Unified Nuclear Core Activity Map Reconstruction Using Heterogeneous Instruments with Data Assimilation

    Evaluating the neutronic state of the whole nuclear core is a very important topic that has strong implication for nuclear core management and for security monitoring. The core state is evaluated using measurements. Usually, part of the measurements is used, and only one kind of instruments is taken into account....

    Provided By CNRS

  • White Papers // Aug 2011

    Local Failure Localization in Large Sensor Networks

    The joint fluctuations of the extreme eigen-values and eigenvectors of large sample covariance matrices of the spiked-model type are analyzed. This result is used to develop an original framework for the diagnosis of local failures in sensor networks, corroborated by simulations. One of the elementary requests for fault diagnosis is...

    Provided By CNRS

  • White Papers // Aug 2011

    Tensor-Based Link Prediction in Intermittently Connected Wireless Networks

    Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in...

    Provided By CNRS

  • White Papers // Aug 2011

    End-to-End Security Establishment Through Operators: SIP Experiment

    In this paper, the authors propose to experiment a secure multimedia session establishment in a fully open environment like Internet. Users equipped with multi-capacity devices can benefit from the authentication support of their operators to mutually authenticate, and secure their exchanges. Multi-operator crossed authentication can also take place under a...

    Provided By CNRS

  • White Papers // Jun 2011

    Market Efficiency, Anticipation And The Formation Of Bubbles-crashes

    A dynamical model is introduced for the formation of bullish or bearish trends driving an asset price in a given market. Initially, each agent decides to buy or sell according to its personal opinion, which results from the combination of its own private information, the public information and its own...

    Provided By CNRS

  • White Papers // Dec 2010

    The Complexity of Security Studies in NFC Payment System

    If the authors compare the security problem of a face-to-face contactless card payment process with a mobile phone NFC payment process, they may easily consider that the latter is far more difficult to study. Indeed, the more partners from different organizations involved in the process there are, the more complex...

    Provided By CNRS

  • White Papers // Oct 2010

    Static Analysis by Abstract Interpretation of Embedded Critical Software

    Formal methods are increasingly used to help ensuring the correctness of complex, critical embedded software systems. The authors show how sound semantic static analyses based on Abstract Interpretation may be used to check properties at various levels of a software design: from high level models to low level binary code....

    Provided By CNRS

  • White Papers // Feb 2012

    Combining SysML and AADL for the Design, Validation and Implementation of Critical Systems

    The realization of critical systems goes through multiple phases of specification, design, integration, validation, and testing. It starts from high-level sketches down to the final product. Model-Based Design has been acknowledged as a good conveyor to capture these steps. Yet, there is no universal solution to represent all activities. Two...

    Provided By CNRS

  • White Papers // Oct 2009

    Future High Speed In-Vehicle PLC Networks

    This paper deals with Power Line Communication in vehicle (PLC). PLC is a very promising communication solution in order to offer future in-vehicle applications without increasing wiring harnesses. The authors join recent additional measurements which have been carried out using modified indoor PLC modems. These PLC modems are based on...

    Provided By CNRS

  • White Papers // Jan 2011

    Power Control and Clustering in Wireless Sensor Networks

    The use of the Wireless Sensor Networks (WSNs) should be increasing in different fields (scientist, logistic, military and health, etc.). However, the sensor's size is an important limitation in term of energetic autonomy, and thus of lifetime because battery must be very small. This is the reason why, today, research...

    Provided By CNRS

  • White Papers // Jan 2011

    A Survey on Energy-Efficient Communications

    In this paper, the authors review the literature on physical layer energy-efficient communications. The most relevant and recent works are mainly centered around two frameworks: the pragmatic and the information theoretical approaches. Both of them aim at finding the best transmit and/or receive policies which maximize the number of bits...

    Provided By CNRS

  • White Papers // May 2011

    Implementation of a WSNet Module to Simulate the IEEE 802.15.4 Beacon-Enabled Mode in Multihop Topologies

    In this paper, the authors describe their implementation of the beacon-enabled mode in IEEE 802.15.4. They implemented both the Beacon-Only Period (BOP) and the superframe scheduling techniques to support multihop topologies. These techniques permit to reduce the number of collisions, and they implemented very simple collision avoidance scheduling. This implementation...

    Provided By CNRS

  • White Papers // Sep 2009

    Blind Identification of MISO-FIR Channels

    In this paper, the authors address the problem of determining the order of MISO channels by means of a series of hypothesis tests based on scalar statistics. Using estimated 4th-order output cumulants, they exploit the sensitiveness of a Chi-square test statistic to the non Gaussianity of a stochastic process. This...

    Provided By CNRS

  • White Papers // Sep 2011

    A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

    The authors propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. They base their role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, they prove...

    Provided By CNRS

  • White Papers // Oct 2010

    A Route-Aware MAC for Wireless Multihop Networks With a Convergecast Traffic Pattern

    The MAC layer for multihop wireless networks has drawn considerable research attention in the last few years. The authors focus here on the wireless multihop networks with a converge-cast traffic pattern: the whole traffic is destined to a sink/gateway. They propose first to select a k-tree core, i.e. a sub-tree...

    Provided By CNRS

  • White Papers // Jan 2011

    Connectivity in Multi-Channel Multi-Interface Wireless Mesh Networks

    The authors can improve the performance of wireless mesh networks by using multiple interfaces tuned to non-overlapping channels. A Channel and Interface Assignment (CIA) decides when to switch interfaces and which channel to use. Surprisingly, the impact of CIAs on connectivity has received little attention so far. In this paper,...

    Provided By CNRS

  • White Papers // Mar 2012

    Diversity, Coding, and Multiplexing Trade - Off of Network - Coded Cooperative Wireless Networks

    In this paper, the authors study the performance of network - coded cooperative diversity systems with practical communication constraints. More specifically, they investigate the interplay between diversity, coding, and multiplexing gain when the relay nodes do not act as dedicated repeaters, which only forward data packets transmitted by the sources,...

    Provided By CNRS

  • White Papers // Mar 2012

    A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Motivated by the benefits of small world networks, the authors propose a self-organization framework for wireless ad hoc networks. They investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, they identify crucial design issues for algorithm design....

    Provided By CNRS

  • White Papers // Oct 2009

    Effect of Packet Loss on the Quality of Control of a Networked-Mobile Robot

    This paper describes a wireless network based control of a Khepera mobile robot moving in a WLAN distributed infrastructure. Due to the dependence of Quality of Control (QoC) over network Quality of Service (QoS), a simulation is performed for packet losses and compared to actual results in the lab environment....

    Provided By CNRS

  • White Papers // May 2010

    Scientific Workflow Development Using both Visual and Script-based Representation

    In this paper the authors propose to achieve a semantic equivalence between a visual- and a script-based workflow development paradigm. They accomplish this by building a script language which execution semantics matches an existing sophisticated, data-parallel scientific workflow language and its underlying GUI-based core workflow enactor. It facilitates multiple representations...

    Provided By CNRS

  • White Papers // Jan 2014

    Formal Modeling and Evaluation of Stateful Service-based Business Process Elasticity in the Cloud

    Cloud environments are being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). One of the expected features of cloud environments is elasticity at different levels. It is obvious that provisioning of elastic platforms is not sufficient to provide elasticity of the deployed business process....

    Provided By CNRS

  • White Papers // Feb 2014

    Query Processing for SPARQL Federations with Data Replication

    Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not...

    Provided By CNRS

  • White Papers // Dec 2013

    Privacy Preserving Minimal Observability for Composite Transactional Services

    For complex services composed of many (component) services, logging is an integral middleware aspect, especially for providing transactions and monitoring. In the event of a failure, the log allows one to deduce the cause of failure (diagnosis) and recover by compensating the executed services (atomicity). However, for heterogeneous services with...

    Provided By CNRS

  • White Papers // Nov 2013

    A Survey of RDB to RDF Translation Approaches and Tools

    Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, the authors propose a detailed review of RDB-to-RDF methods and tools, considering end-to-end projects that delivered operational tools. The...

    Provided By CNRS

  • White Papers // Oct 2013

    Embedded Data on Intelligent Products - Impact on Real-Time Applications

    New challenges and opportunities arise with the Internet of Things (IoT), making it possible to link any objects of the real world with the virtual one. In recent years, IoT has become increasingly popular in industrial applications (e.g. for the inclusion of data related to the product history). It might...

    Provided By CNRS

  • White Papers // Sep 2013

    Visual Analysis of Complex Networks for Business Intelligence with Gephi

    The recent availability of a vast amount of data from Online Social Networks (OSN) and from the Web has opened promising perspectives for the field of Business Intelligence (BI), in particular for the monitoring of brand e-reputation and for the management of customer relationships. Platforms which combine data mining algorithms...

    Provided By CNRS

  • White Papers // Jun 2013

    Symmetry Breaking for Multi-Criteria Mapping and Scheduling on Multicores

    Multiprocessor mapping and scheduling is a long-old difficult problem. In this paper the authors propose a new methodology to perform mapping and scheduling along with buffer memory optimization using an SMT solver. They target split-join graphs, a formalism inspired by Synchronous Data-Flow (SDF) which provides a compact symbolic representation of...

    Provided By CNRS

  • White Papers // Jun 2012

    Monitoring Properties of Analog and Mixed-Signal Circuits

    Verification of digital hardware has achieved in the past years a high level of automation, thanks to amature tool and methodology support from the Electronic Design Automation (EDA) industry. In this paper, the authors present a comprehensive overview of the property-based monitoring framework for analog and mixed-signal systems. Their monitoring...

    Provided By CNRS

  • White Papers // Sep 2013

    Fact Checking and Analyzing the Web

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to...

    Provided By CNRS

  • White Papers // Dec 2013

    Multi-Hop Counter Based Data Dissemination Protocol for Communicating Materials

    The communicating material is a new paradigm of Internet of Things. It is designed to perform efficient product control and ensure an information continuum all along the product life cycle. Therefore, storage of life cycle information and data dissemination in communicating materials are very important issues. This paper provides a...

    Provided By CNRS

  • White Papers // Feb 2013

    Dynamically Adaptable NoC Router Architecture for Multiple Pixel Streams Applications

    Modern computing systems for vision have to support advanced image applications. They involve several heterogeneous pixel streams and they have to respect hard timing and area constraints. To face those challenges, an adaptable ring-based interconnection Network-on-Chip (NoC) has been recently proposed. This NoC is based on a new router architecture,...

    Provided By CNRS

  • White Papers // Aug 2012

    Rigorous System Level Modeling and Analysis of Mixed HW/SW Systems

    A grand challenge in complex embedded systems design is developing methods and tools for modeling and analyzing the behavior of an application software running on multicore or distributed platforms. The authors propose a rigorous method and a tool chain that allows obtaining a faithful model representing the behavior of a...

    Provided By CNRS

  • White Papers // Feb 2012

    Task Model and Online Operating System API for Hardware Tasks in OLLAF Platform

    In this paper, the authors present an original hardware task model and the corresponding online API for fine grained dynamically reconfigurable architecture. They cover the integration of this API in the OLLAF platform and more specifically its application to memory access management in a dynamically reconfigurable environment. Methods offered by...

    Provided By CNRS

  • White Papers // Dec 2011

    Relativistic Causality and Clockless Circuits

    Time plays a crucial role in the performance of computing systems. The accurate modeling of logical devices, and of their physical implementations, requires an appropriate representation of time and of all properties that depend on this notion. The need for a proper model, particularly acute in the design of clockless...

    Provided By CNRS

  • White Papers // Dec 2010

    Automatic Method for Efficient Hardware Implementation From RVC-CAL Dataflow: A LAR Coder Baseline Case Study

    Implementing an algorithm to hardware platforms is generally not an easy task. The algorithm, typically described in a high-level specification language, must be translated to a low-level HDL language. The difference between models of computation (sequential versus fine-grained parallel) limits the efficiency of automatic translation. On the other hand, manual...

    Provided By CNRS

  • White Papers // Sep 2011

    Stack-Less SIMT Reconvergence at Low Cost

    Parallel architectures following the SIMT model such as GPUs benefit from application regularity by issuing concurrent threads running in lockstep on SIMD units. As threads take different paths across the control-flow graph, lockstep execution is partially lost, and must be regained whenever possible in order to maximize the occupancy of...

    Provided By CNRS

  • White Papers // Sep 2012

    A Cache Management Strategy to Replace Wear Leveling Techniques for Embedded Flash Memory

    Prices of NAND flash memories are falling drastically due to market growth and fabrication process mastering while research efforts from a technological point of view in terms of endurance and density are very active. NAND flash memories are becoming the most important storage media in mobile computing and tend to...

    Provided By CNRS

  • White Papers // Jun 2013

    Fast and Efficient FPGA Implementation of Connected Operators

    The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems....

    Provided By CNRS

  • White Papers // May 2011

    Localization of Damaged Resources in NoC Based Shared-Memory MP2SOC, Using a Distributed Cooperative Configuration Infrastructure

    In this paper, the authors present a software approach for localization of faulty components in a 2D-mesh Network-on-Chip, targeting fault tolerance in a shared memory MP2SoC architecture. They use a pre-existing and distributed hardware infrastructure supporting self-test and de-activation of the faulty components (routers and communication channels), that are transformed...

    Provided By CNRS

  • White Papers // May 2011

    Fully Distributed Initialization Procedure for a 2D-Mesh NoC, Including Off-Line BIST and Partial Deactivation of Faulty Components

    In this paper, the authors present an embedded, at speed, off-line, and fully distributed initialization procedure for 2DMesh Network-on-Chip (NoC). This procedure is executed at power boot, and targets the detection and the deactivation of the faulty routers and/or faulty communication channels. The final objective is fault tolerance. The proposed...

    Provided By CNRS

  • White Papers // May 2010

    Simulator Generation Using an Automaton Based Pipeline Model for Timing Analysis

    Hardware simulation is an important part of the design of embedded and/or real-time systems. It can be used to compute the Worst Case Execution Time (WCET) and to provide a mean to run software when final hardware is not yet available. Building a simulator is a long and difficult task,...

    Provided By CNRS

  • White Papers // Jul 2013

    Security for Future Networks : a Prospective Study of AAIs

    The future internet will rely heavily on virtualization and cloud networking. The project security for future networks proposes the design of a framework providing secure identification and authentication, secure data transfer and secure virtualized infrastructure. In this paper, the authors present a comparative study should examine some models and frameworks...

    Provided By CNRS

  • White Papers // May 2013

    PiMM: Parameterized and Interfaced Dataflow Meta-Model for MPSoCs Runtime Reconfiguration

    Dataflow models of computation are widely used for the specification, analysis, and optimization of Digital Signal Processing (DSP) applications. In this paper, a new meta-model called PiMM is introduced to address the important challenge of managing dynamics in DSP-oriented representations. PiMM extends a dataflow model by introducing an explicit parameter...

    Provided By CNRS

  • White Papers // Jul 2013

    Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the...

    Provided By CNRS

  • White Papers // Jun 2012

    R-MOM: A Component-Based Framework for Interoperable and Adaptive Asynchronous Middleware Systems

    Systems of Systems (SoS) are composed of subsystems such as distributed, information technology, real-time and embedded systems. Among distributed systems, Message-Oriented Middleware (MOM) is used by SoS in order to share status information from system elements (component, service, etc.). Often several different MOM technologies are used in one SoS, then...

    Provided By CNRS