Eindhoven University of Technology

Displaying 1-40 of 228 results

  • White Papers // Jul 2014

    Genetic Process Mining: Alignment-based Process Model Mutation

    The Evolutionary Tree Miner (ETM) is a genetic process discovery algorithm that enables the user to guide the discovery process based on preferences with respect to four process model quality dimensions: replay fitness, precision, generalization and simplicity. Traditionally, the ETM algorithm uses random creation of process models for the initial...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2014

    A General Framework for Correlating Business Process Characteristics

    Process discovery techniques make it possible to automatically derive process models from event data. However, often one is not only interested in discovering the control-flow but also in answering questions like \"What do the cases that are late have in common?\", \"What characterizes the workers that skip this check activity?\",...

    Provided By Eindhoven University of Technology

  • White Papers // May 2014

    Construction and Exploitation of VLIW ASIPs With Multiple Vector-Widths

    Many applications in important domains, such as communication, multimedia, etc. show a significant Data-Level Parallelism (DLP). A large part of the DLP is usually exploited through application vectorization and implementation of vector operations in processors executing the applications. While the amount of DLP varies between applications of the same domain...

    Provided By Eindhoven University of Technology

  • White Papers // Apr 2014

    Instruction-Set Architecture Exploration of VLIW ASIPs Using a Genetic Algorithm

    Genetic algorithms are commonly used for automatically solving complex design problem because exploration using genetic algorithms can consistently deliver good results when the algorithm is given a long enough run-time. However, the exploration time for problems with huge design spaces can be very long, often making exploration using a genetic...

    Provided By Eindhoven University of Technology

  • White Papers // Apr 2014

    Discovering Block-Structured Process Models from Incomplete Event Logs

    One of the main challenges in process mining is to discover a process model describing observed behavior in the best possible manner. Since event logs only contain example behaviour and one cannot assume to have seen all possible process executions, process discovery techniques need to be able to handle incompleteness....

    Provided By Eindhoven University of Technology

  • White Papers // Mar 2014

    BuildMaster: Efficient ASIP Architecture Exploration Through Compilation and Simulation Result Caching

    In this paper, the authors introduce and discuss the build-master framework. This framework supports the design space exploration of application specific VLIW processors and offers automated caching of intermediate compilation and simulation results. Both the compilation and the simulation cache can greatly help to shorten the exploration time and make...

    Provided By Eindhoven University of Technology

  • White Papers // Feb 2014

    Comparing Business Process Variants using Models and Event Logs

    Organizations realize that benefits can be achieved by closely working together on the design of their business processes. But even when there is a joint design for a particular business process, the way individual organizations carry out that process may differ - either wittingly or unwittingly. This paper proposes an...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Dynamically Scheduling a Component-Based Framework in Clusters

    In many clusters and datacenters, application frameworks are used that offer programming models such as Dryad and MapReduce, and jobs submitted to the clusters or datacenters may be targeted at specific instances of these frameworks, for example because of the presence of certain data. An important question that then arises...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Resource-Efficient Routing and Scheduling of Time-Constrained Streaming Communication on Networks-on-Chip

    Network-on-Chip (NoC)-based Multi-Processor Systems-on-Chip (MPSoC) are considered as future embedded systems platforms. One of the steps in mapping an application onto such a parallel platform involves scheduling the communication on the Network-on-Chip (NoC). This paper presents different scheduling strategies that minimize resource usage by exploiting all scheduling freedom offered by...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Predictable Embedding of Large Data Structures in Multiprocessor Networks-on-Chip

    Predictable, tile-based multiprocessor Network-on-Chips (NoCs) are considered as future embedded systems platforms. Each tile contains one or a few processors and local memories. These memories are typically too small to store large data structures. A solution to this is to embed tiles with large memories in the architecture. However, fetching...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    An FPGA Design Flow for Reconfigurable Network-Based Multi-Processor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Networks-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Constraint-Based Workflow Models: Change Made Easy

    The degree of flexibility of workflow management systems heavily influences the way business processes are executed. Constraint-based models are considered to be more flexible than traditional models because of their semantics: everything that does not violate constraints is allowed. Although constraint-based models are flexible, changes to process definitions might be...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Process Mining Online Assessment Data

    Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for generating...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Process Mining Based on Clustering: A Quest for Precision

    Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniques to automatically discover a process model based on some event log. Most of these algorithms perform well on structured processes with little disturbances. However, in...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Trace Clustering in Process Mining

    Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but still have problems discovering and visualizing less structured ones. Unfortunately, process mining is most interesting in domains requiring flexibility. A typical example would be...

    Provided By Eindhoven University of Technology

  • White Papers // Dec 2013

    A Detailed GPU Cache Model Based on Reuse Distance Theory

    As modern GPUs rely partly on their on-chip memories to counter the imminent off-chip memory wall, the efficient use of their caches has become important for performance and energy. However, optimizing cache locality systematically requires insight into and prediction of cache behavior. On sequential processors, stack distance or reuse distance...

    Provided By Eindhoven University of Technology

  • White Papers // Oct 2013

    Thermal-Aware Mapping of Streaming Applications on 3D Multi-Processor Systems

    Implementing Multi-Processor Systems-on-Chip (MPSoCs) in 3-Dimensional (3D) ICs has many benefits, but the increased power density can cause significant thermal problems, resulting in decreased reliability, lifetime and performance. This paper presents a fast thermal-aware approach for mapping throughput constrained streaming applications on a 3D MPSoC. While there are some published...

    Provided By Eindhoven University of Technology

  • White Papers // Oct 2013

    Improving Business Process Models using Observed Behavior

    Process-Aware Information Systems (PAISs) can be configured using a reference process model, which is typically obtained via expert interviews. Over time, however, contextual factors and system requirements may cause the operational process to start deviating from this reference model. While a reference model should ideally be updated to remain aligned...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2013

    Controlling Break-The-Glass Through Alignment

    Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. This causes organizations to employ functionality like break-the-glass that allows users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2013

    Discovering Block-Structured Process Models From Event Logs Containing Infrequent Behaviour

    Given an event log describing observed behavior, process discovery aims to find a process model that 'Best' describes this behavior. A large variety of process discovery algorithms has been proposed. However, no existing algorithm returns a sound model in all cases (free of deadlocks and other anomalies), handles infrequent behavior...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2013

    Process Cubes: Slicing, Dicing, Rolling Up and Drilling Down Event Data for Process Mining

    Recent breakthroughs in process mining research make it possible to discover, analyze, and improve business processes based on event data. The growth of event data provides many opportunities but also imposes new challenges. Process mining is typically done for an isolated well-defined process in steady-state. However, the boundaries of a...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    A Reconfigurable Real-Time SDRAM Controller for Mixed Time-Criticality Systems

    Verifying real-time requirements of applications is increasingly complex on modern System-on-Chips (SoCs). More applications are integrated into one system due to power, area and cost constraints. Resource sharing makes their timing behavior interdependent, and as a result the verification complexity increases exponentially with the number of applications. Predictable and composable...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Are On-Line Personae Really Unlinkable?

    More and more personal information is available digitally, both collected by organizations and published by individuals. People may attempt to protect their privacy by avoiding to provide uniquely identifying information and by providing different information in different places; however, in many cases, such profiles can still be de-anonymised. Techniques from...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Fast Multiprocessor Scheduling with Fixed Task Binding of Large Scale Industrial Cyber Physical Systems

    Latest trends in embedded platform architectures show a steady shift from high frequency single core platforms to lower-frequency but highly-parallel execution platforms. Scheduling applications with stringent latency requirements on such multiprocessor platforms is challenging. The authors work is motivated by the scheduling challenges faced by ASML, the world's leading provider...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Aligning Event Logs and Process Models for Multi-Perspective Conformance Checking: An Approach Based on Integer Linear Programming

    Modern organizations have invested in collections of descriptive and/or normative process models, but these rarely describe the actual processes adequately. Therefore, a variety of techniques for conformance checking have been proposed to pinpoint discrepancies between modeled and observed behavior. However, these techniques typically focus on the control-flow and abstract from...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Discovering and Navigating a Collection of Process Models using Multiple Quality Dimensions

    Process discovery algorithms typically aim at discovering a process model from an event log that best describes the recorded behavior. However, multiple quality dimensions can be used to evaluate a process model. In this paper, the authors showed that there often is not one single process model that describes the...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Mediating Between Modeled and Observed Behavior: The Quest for the \"Right\" Process

    Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining - an emerging scientific discipline relating modeled and observed behavior. Whereas an event log describes example behavior of the underlying process, a process model aims to describe an abstraction of...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Diagnostic Information for Compliance Checking of Temporal Compliance Requirements

    Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements or service level agreements. Deviations may be costly and expose an organization to severe risks. Compliance checking is of growing importance for the business process...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Rapid and Accurate Energy Estimation of Vector Processing in VLIW ASIPs

    Many modern applications in important application domains, as communication, image and video processing, multimedia, etc. involve much Data-Level Parallelism (DLP). Therefore, adequate exploitation of DLP is highly relevant. This paper focuses on effective and efficient exploitation of DLP for the synthesis of vector VLIW ASIP processors. The authors propose analytical...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Mining Configurable Process Models from Collections of Event Logs

    Existing process mining techniques are able to discover a specific process model for a given event log. In this paper, the authors aim to discover a configurable process model from a collection of event logs, i.e., the model should describe a family of process variants rather than one specific process....

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Supporting Risk-Informed Decisions during Business Process Execution

    In this paper the authors proposes a technique that supports process participants in making risk-informed decisions, with the aim to reduce the process risks. Risk reduction involves decreasing the likelihood and severity of a process fault from occurring. Given a process exposed to risks, e.g. a financial process exposed to...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Discovering Block-Structured Process Models From Event Logs - A Constructive Approach

    Process mining techniques aim to extract information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise resource planning system can be used to discover models describing processes, organizations and products. The most challenging process mining problem is to learn...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    YAWL in the Cloud

    In the context of the CoSeLoG project (which involves 10 Dutch municipalities), the authors realised a proof-of-concept implementation based on YAWL. The municipalities want to share a common IT infrastructure and learn from one another, but also allow for local differences. Therefore, they extended YAWL to run in a cloud-based...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Hybrid Control of Supply Chains: A Structured Exploration From a Systems Perspective

    Supply chains are becoming increasingly complex these days, both in the structure of the chains and in the need for fine-grained, real-time control. This development occurs in many industries, such as manufacturing, logistics, and the service industry. The increasing structural complexity is caused by larger numbers of participating companies in...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    An Efficient Method for Energy Estimation of Application Specific Instruction-Set Processors

    Design space exploration for ASIP instruction-set design is a very complex problem, involving a large set of architectural choices. Existing methods are usually handcrafted and time-consuming. In this paper, the authors propose and investigate a rapid method to estimate the energy consumption of candidate architectures for VLIW ASIP processors. The...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Mine Your Own Business: Using Process Mining to Turn Big Data Into Real Value

    Like most IT-related phenomena, also the growth of event data complies with Moore's Law. Similar to the number of transistors on chips, the capacity of hard disks, and the computing power of computers, the digital universe is growing exponentially and roughly doubling every 2 years. Although this is not a...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Database Anomalous Activities: Detection and Quantification

    The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, the authors focus on data leakage...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Instruction-set Architecture Exploration Strategies for Deeply Clustered VLIW ASIPs

    Instruction-set architecture exploration for clustered VLIW processors is a very complex problem. Most of the existing exploration methods are hand-crafted and time consuming. This paper presents and compares several methods for automating this exploration. The authors propose and discuss a two-phase method which can quickly explore many different architectures and...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Privacy-Aware Web Service Composition and Ranking

    Service selection is a key issue in the future internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on QoS properties of services such as throughput, latency and response time, or on their trust and reputation level....

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Decomposing Petri Nets for Process Mining - A Generic Approach-

    The practical relevance of process mining is increasing as more and more event data become available. Process mining techniques aim to discover, monitor and improve real processes by extracting knowledge from event logs. The two most prominent process mining tasks are: process discovery: learning a process model from example behavior...

    Provided By Eindhoven University of Technology

  • White Papers // Mar 2010

    Towards Static Flow-Based Declassification for Legacy and Untrusted Programs

    Simple non-interference is too restrictive for specifying and enforcing information flow policies in most programs. Exceptions to non-interference are provided using declassification policies. Several approaches for enforcing declassification have been proposed in the literature. In most of these approaches, the declassification policies are embedded in the program itself or heavily...

    Provided By Eindhoven University of Technology

  • White Papers // Apr 2012

    On-Demand Data Forwarding for Automatic Adaptation of Data Propagation in WBANs

    Practical experience reveals the characteristic properties of Wireless Body Area Networks (WBANs), signifying the need for a well-designed communication protocol. High mobility, stringent resource constraints, and low and time-variant quality of wireless links are some of the challenging issues in WBANs. Typical applications further have varying Quality-of-Service requirements and demand...

    Provided By Eindhoven University of Technology

  • White Papers // May 2012

    Demonstrating On-Demand Listening and Data Forwarding in Wireless Body Area Networks

    Adaptation of the network architecture through on-demand data forwarding is an efficient mechanism to provide robustness against long outages in WBANs. The authors developed an experimental test-bed that provides online observation of the network behavior for different data propagation approaches in WBANs. The paper shows how different approaches deal with...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2012

    A Distributed Feedback Control Mechanism for Quality-of-Service Maintenance in Wireless Sensor Networks

    Wireless sensor networks are typically operating in a dynamic context where events, such as moving sensor nodes and changing external interference, constantly impact the quality-of-service of the network. The authors present a distributed feedback control mechanism that actively balances multiple conflicting network-wide quality metrics, such as power consumption and end-to-end...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2012

    Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems

    This paper is a introduction to the present state-of-the-art in the field of security of lattice-based cryptosystems. After a short introduction to lattices, the authors describe the main hard problems in lattice theory that cryptosystems base their security on, and they present the main methods of attacking these hard problems,...

    Provided By Eindhoven University of Technology

  • White Papers // Apr 2012

    Asymptotic Fingerprinting Capacity in the Combined Digit Model

    Watermarking is a means of tracing the (re-)distribution of content. Before distribution, digital content is modified by applying an imperceptible WaterMark (WM), embedded using a watermarking algorithm. Once an unauthorized copy of the content is found, the WM helps to trace those users who participated in the creation of the...

    Provided By Eindhoven University of Technology

  • White Papers // Apr 2013

    A Case for Societal Digital Security Culture

    Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of the users' lives. Security vulnerabilities in these systems could cause financial losses, privacy/safety compromises, and operational interruptions. This paper demonstrates through examples, that technical security solutions for these information systems,...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Delay Performance and Mixing Times in Random-Access Networks

    The authors explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules...

    Provided By Eindhoven University of Technology

  • White Papers // May 2013

    Mine Your Own Business: Using Process Mining to Turn Big Data Into Real Value

    Like most IT-related phenomena, also the growth of event data complies with Moore's Law. Similar to the number of transistors on chips, the capacity of hard disks, and the computing power of computers, the digital universe is growing exponentially and roughly doubling every 2 years. Although this is not a...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2010

    A Study into the Factors that Influence the Understandability of Business Process Models

    Business process models are key artifacts in the development of information systems. While one of their main purposes is to facilitate communication among stakeholders, little is known about the factors that influence their comprehension by human agents. On the basis of a sound theoretical foundation, this paper presents a study...

    Provided By Eindhoven University of Technology

  • White Papers // Mar 2009

    Preserving Correctness During Business Process Model Configuration

    A configurable process model captures a family of related process models in a single artifact. Such models are intended to be configured to t the requirements of specific organizations or projects, leading to individualized process models that are subsequently used for domain analysis or solution design. This paper proposes a...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2012

    Tying Process Model Quality to the Modeling Process: The Impact of Structuring, Movement, and Speed

    In an investigation into the process of process modeling, the authors examined how modeling behavior relates to the quality of the process model that emerges from that. Specifically, they considered whether; a modeler's structured modeling style, the frequency of moving existing objects over the modeling canvas, and the overall modeling...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2008

    Modularity in Process Models: Review and Effects

    The use of sub-processes in large process models is an important step in modeling practice to handle complexity. While there are several advantages attributed to such a modular design, including ease of reuse, scalability, and enhanced understanding, the lack of precise guidelines turns out to be a major impediment for...

    Provided By Eindhoven University of Technology

  • White Papers // Feb 2008

    Measuring Similarity between Business Process Models

    Quality aspects become increasingly important when business process modeling is used in a large-scale enterprise setting. In order to facilitate storage without redundancy and an efficient retrieval of relevant process models in model databases it is required to develop a theoretical understanding of how a degree of behavioral similarity can...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2008

    Correctness-Preserving Configuration of Business Process Models

    Reference process models capture recurrent business operations in a given domain such as procurement or logistics. These models are intended to be configured to fit the requirements of specific organizations or projects, leading to individualized process models that are subsequently used for domain analysis or solution design. Although the advantages...

    Provided By Eindhoven University of Technology

  • White Papers // Nov 2006

    Integration of EPC-related Tools with ProM

    The heterogeneity of different formats for EPCs is a major problem for model interchange between specialized tools in practice. In this paper, the authors compare three different formats for storing EPCs, in particular, the proprietary formats of Microsoft Visio and ARIS Toolset as well as the tool-independent EPML format. Furthermore,...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2006

    Structural Patterns for Soundness of Business Process Models

    The correctness of Business Process Models is of paramount importance for the application on an enterprise level. A severe problem is that several languages for Business Process Modeling do not have formal execution semantics which is a prerequisite to check correctness criteria. In this paper, soundness defines a minimum correctness...

    Provided By Eindhoven University of Technology

  • White Papers // Aug 2010

    Predicting the Throughput of Multiprocessor Applications Under Dynamic Workload

    In this paper, the authors contribute to throughput calculation for real-time multiprocessor applications experiencing dynamic workload variations. They focus on a method to predict the system throughput when processing an arbitrarily long data frame given the meta-characteristics of the workload in that frame. This is useful for different purposes, such...

    Provided By Eindhoven University of Technology

  • White Papers // Aug 2010

    Thermal-Aware Scratchpad Memory Design and Allocation

    ScratchPad Memories (SPMs) have become a promising on-chip storage solution for embedded systems from an energy, performance and predictability perspective. The thermal behavior of these types of memories has not been considered in detail. This thermal behavior plays an important role in the reliability of silicon devices and in their...

    Provided By Eindhoven University of Technology

  • White Papers // May 2010

    A Predictable Multiprocessor Design Flow for Streaming Applications with Dynamic Behaviour

    The design of new embedded systems is getting more and more complex as more functionality is integrated into these systems. To deal with the design complexity, a predictable design flow is needed. The result should be a system that guarantees that an application can perform its own tasks within strict...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2012

    Static Rate-Optimal Scheduling of Multirate DSP Algorithms via Retiming and Unfolding

    In this paper, the authors present an exact method and a heuristic method for static rate-optimal multiprocessor scheduling of real-time multi-rate DSP algorithms represented by Synchronous Data Flow Graphs (SDFGs). Through exploring the state-space generated by a Self-Timed Execution (STE) of an SDFG, a static rate-optimal schedule via explicit retiming...

    Provided By Eindhoven University of Technology

  • White Papers // Aug 2011

    Analyzing Synchronous Dataflow Scenarios for Dynamic Software-Defined Radio Applications

    Contemporary embedded systems for wireless communications support various radios. A Software-Defined Radio (SDR) is a radio implemented as concurrent software processes that typically run on a Multi-Processor System-on-Chip (MPSoC). SDRs are real-time streaming applications with throughput requirements. One efficient approach for timing analysis of concurrent real-time applications is the dataflow...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2011

    Hybrid Code-Data Prefetch-Aware Multiprocessor Task Graph Scheduling

    The ever increasing performance gap between processors and memories is one of the biggest performance bottlenecks for computer systems. In this paper, the authors propose a task scheduling technique that schedules an application, modeled with a task graph, on a Multi-Processor System-on-Chip (MPSoC) that contains a limited on-chip memory. The...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Resource-Efficient Routing and Scheduling of Time-Constrained Streaming Communication on Networks-on-Chip

    Network-on-Chip (NoC)-based Multi-Processor Systems-on-Chip (MPSoC) are considered as future embedded systems platforms. One of the steps in mapping an application onto such a parallel platform involves scheduling the communication on the Network-on-Chip (NoC). This paper presents different scheduling strategies that minimize resource usage by exploiting all scheduling freedom offered by...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Predictable Embedding of Large Data Structures in Multiprocessor Networks-on-Chip

    Predictable, tile-based multiprocessor Network-on-Chips (NoCs) are considered as future embedded systems platforms. Each tile contains one or a few processors and local memories. These memories are typically too small to store large data structures. A solution to this is to embed tiles with large memories in the architecture. However, fetching...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2006

    Handling Dynamism in Embedded System Design by Application Scenarios

    In the past years, real-time embedded systems became more and more complex. From the user perspective, these systems have stringent requirements regarding size, performance and power consumption, and due to business competition, their time-to-market is a crucial factor. Therefore, much work has been done in developing design methodologies for embedded...

    Provided By Eindhoven University of Technology

  • White Papers // Aug 2006

    Application Scenarios in Streaming-Oriented Embedded System Design

    In the past decade real-time embedded systems became more and more complex and pervasive. From the user perspective, these systems have stringent requirements regarding size, performance and energy consumption, and due to business competition, their time-to-market is a crucial factor. Therefore, much work has been done in developing design methodologies...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2007

    Execution-time Prediction for Dynamic Streaming Applications with Task-level Parallelism

    Programmable Multi-Processor System-on-Chips (MPSoCs) are becoming the preferred implementation platform for embedded streaming applications. This enables using more software components, which leads to large and frequent dynamic variations of data-dependent execution times. In this paper, accurate and conservative prediction of execution times helps in maintaining good audio/video quality and reducing...

    Provided By Eindhoven University of Technology

  • White Papers // May 2006

    An Overview of Application Scenario Usage in Streaming-Oriented Embedded System Design

    In the past years real-time embedded systems became more and more complex. From the user perspective, these systems have stringent requirements regarding size, performance and power consumption, and due to business competition, their time-to-market is a crucial factor. Therefore, much work has been done in developing design methodologies for embedded...

    Provided By Eindhoven University of Technology

  • White Papers // May 2007

    Scenario Selection and Prediction for DVS-Aware Scheduling of Multimedia Applications

    Modern multimedia applications usually have real-time constraints and they are implemented using application-domain specific embedded processors. Dimensioning a system requires accurate estimations of resources needed by the applications. Overestimation leads to over-dimensioning. For a good resource estimation, all the cases in which an application can run must be considered. To...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    Fast Multiprocessor Scheduling with Fixed Task Binding of Large Scale Industrial Cyber Physical Systems

    Latest trends in embedded platform architectures show a steady shift from high frequency single core platforms to lower-frequency but highly-parallel execution platforms. Scheduling applications with stringent latency requirements on such multiprocessor platforms is challenging. The authors work is motivated by the scheduling challenges faced by ASML, the world's leading provider...

    Provided By Eindhoven University of Technology

  • White Papers // Sep 2013

    Controlling Break-The-Glass Through Alignment

    Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. This causes organizations to employ functionality like break-the-glass that allows users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    Dynamically Scheduling a Component-Based Framework in Clusters

    In many clusters and datacenters, application frameworks are used that offer programming models such as Dryad and MapReduce, and jobs submitted to the clusters or datacenters may be targeted at specific instances of these frameworks, for example because of the presence of certain data. An important question that then arises...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2011

    Business Process Configuration in the Cloud: How to Support and Analyze Multi-Tenant Processes?

    Lion's share of cloud research has been focusing on performance related problems. However, cloud computing will also change the way in which business processes are managed and supported, e.g., more and more organizations will be sharing common processes. In the classical setting, where product software is used, different organizations can...

    Provided By Eindhoven University of Technology

  • White Papers // Jul 2013

    A Reconfigurable Real-Time SDRAM Controller for Mixed Time-Criticality Systems

    Verifying real-time requirements of applications is increasingly complex on modern System-on-Chips (SoCs). More applications are integrated into one system due to power, area and cost constraints. Resource sharing makes their timing behavior interdependent, and as a result the verification complexity increases exponentially with the number of applications. Predictable and composable...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2013

    Supporting Risk-Informed Decisions during Business Process Execution

    In this paper the authors proposes a technique that supports process participants in making risk-informed decisions, with the aim to reduce the process risks. Risk reduction involves decreasing the likelihood and severity of a process fault from occurring. Given a process exposed to risks, e.g. a financial process exposed to...

    Provided By Eindhoven University of Technology

  • White Papers // Oct 2013

    Thermal-Aware Mapping of Streaming Applications on 3D Multi-Processor Systems

    Implementing Multi-Processor Systems-on-Chip (MPSoCs) in 3-Dimensional (3D) ICs has many benefits, but the increased power density can cause significant thermal problems, resulting in decreased reliability, lifetime and performance. This paper presents a fast thermal-aware approach for mapping throughput constrained streaming applications on a 3D MPSoC. While there are some published...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2014

    An FPGA Design Flow for Reconfigurable Network-Based Multi-Processor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Networks-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By Eindhoven University of Technology

  • White Papers // Jun 2011

    Process Diagnostics Using Trace Alignment: Opportunities, Issues, and Challenges

    Business processes leave trails in a variety of data sources (e.g., audit trails, databases, and transaction logs). Hence, every process instance can be described by a trace, i.e., a sequence of events. Process mining techniques are able to extract knowledge from such traces and provide a welcome extension to the...

    Provided By Eindhoven University of Technology

  • White Papers // Jan 2013

    DECLARE: Full Support for Loosely-Structured Processes

    Traditional Workflow Management Systems (WFMSs) are not flexible enough to support loosely-structured processes. Furthermore, flexibility in contemporary WFMSs usually comes at a certain cost, such as lack of support for users, lack of methods for model analysis, lack of methods for analysis of past executions, etc. DECLARE is a prototype...

    Provided By Eindhoven University of Technology