Linkoping University

Displaying 1-40 of 80 results

  • White Papers // Jan 2014

    A Low Area and Low Power Programmable Baseband Processor Architecture

    Fully programmable radio baseband processor architecture is presented. The architecture is based on a DSP processor core and a number flexible accelerator, connected via a configurable network. Design choices are motivated by the inherent properties of the baseband algorithms used in different types of radio systems. A large degree of...

    Provided By Linkoping University

  • White Papers // Dec 2013

    Dynamic Content Allocation for Cloud-Assisted Service of Periodic Workloads

    Motivated by improved models for content workload prediction, in this paper, the authors consider the problem of dynamic content allocation for a hybrid content delivery system that combines cloud-based storage with low cost dedicated servers that have limited storage and unmetered upload bandwidth. They formulate the problem of allocating contents...

    Provided By Linkoping University

  • White Papers // Jul 2013

    Design Optimization of Security-Sensitive Mixed-Criticality Real-Time Embedded Systems

    In this paper the authors are interested in security sensitive mixed-criticality real-time systems. Existing researches on mixed-criticality systems usually are safety-oriented, which seriously ignore the security requirements. They firstly establish the system model to capture security-critical applications in mixed-criticality systems. Higher security-criticality protection always results in significant time and energy...

    Provided By Linkoping University

  • White Papers // Jun 2013

    Uplink Performance of Time-Reversal MRC in Massive MIMO Systems Subject to Phase Noise

    Multi-User Multiple-Input Multiple-Output (MU-MIMO) cellular systems with an excess of Base Station (BS) antennas (Massive MIMO) offer unprecedented multiplexing gains and radiated energy efficiency. Oscillator phase noise is introduced in the transmitter and receiver radio frequency chains and severely degrades the performance of communication systems. The authors study the effect...

    Provided By Linkoping University

  • White Papers // Apr 2013

    EnergyBox: A Trace-driven Tool for Data Transmission Energy Consumption Studies

    Although evolving mobile technologies bring millions of users closer to the vision of information anywhere-anytime, device battery depletions hamper the quality of experience to a great extent. The authors argue that the design of energy-efficient solutions starts by energy-awareness and propose Energy Box, a tool that provides accurate and repeatable...

    Provided By Linkoping University

  • White Papers // Apr 2013

    Kernel Level Energy-Efficient 3G Background Traffic Shaper for Android Smartphones

    Reducing the energy consumption of wireless devices is paramount to a wide spread adoption of mobile applications. Cellular communication imposes high energy consumption on the mobile devices due to the radio resource allocation, which differs from other networks such as Wi-Fi. Most applications are unaware of the energy consumption characteristics...

    Provided By Linkoping University

  • White Papers // Apr 2013

    Mobile Location Sharing: An Energy Consumption Study

    The use of a mobile device's battery for frequent transmissions of position data in a location sharing application can be more expensive than the location retrieval itself. This is in part due to energy-agnostic application development and in part dependent on choice of protocols. This paper studies the lightweight Message...

    Provided By Linkoping University

  • White Papers // Mar 2013

    Stability of Adaptive Feedback-based Resource Managers for systems with Execution Time Variations

    Today's embedded systems are exposed to variations in load demand due to complex software applications, dynamic hardware platforms, and the impact of the run-time environment. When these variations are large, and efficiency is required, adaptive on-line resource managers may be deployed on the system to control its resource usage. An...

    Provided By Linkoping University

  • White Papers // Mar 2013

    General Purpose Computing on Low-Power Embedded GPUs: Has It Come of Age?

    In this paper the authors evaluate the promise held by low-power GPUs for non-graphic workloads that arise in embedded systems. Towards this, they map and implement 5 benchmarks that find utility in very different application domains, to an embedded GPU. Their results show that apart from accelerated performance, embedded GPUs...

    Provided By Linkoping University

  • White Papers // Mar 2013

    Multi-Pair Amplify-and-Forward Relaying with Very Large Antenna Arrays

    The authors consider a multi-pair relay channel where multiple sources simultaneously communicate with destinations using a relay. Each source or destination has only a single antenna, while the relay is equipped with a very large antenna array. They investigate the power efficiency of this system when Maximum Ratio Combining/Maximal Ratio...

    Provided By Linkoping University

  • White Papers // Feb 2013

    Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems

    In this paper, the authors approach the design of energy and security-critical distributed real-time embedded systems from the early mapping and scheduling phases. Modern Distributed Embedded Systems (DESs) are common to be connected to external networks, which is beneficial for various purposes, but also opens up the gate for potential...

    Provided By Linkoping University

  • White Papers // Nov 2012

    Complexity Reduction of Blind Decoding Schemes Using CRC Splitting

    Blind decoding, used on control channels of some multi-user wireless access systems, is a technique for achieving adaptive modulation and coding. The idea is to adapt the modulation and coding scheme to the channel quality but instead of signaling the parameters used explicitly, the receiver blindly tries a number of...

    Provided By Linkoping University

  • White Papers // Nov 2012

    Surviving Attacks in Challenged Networks

    In the event of a disaster, telecommunication infrastructures can be severely damaged or overloaded. Hastily formed networks can provide communication services in an ad hoc manner. These networks are challenging due to the chaotic context where intermittent connection is the norm and the identity and number of participants cannot be...

    Provided By Linkoping University

  • White Papers // Nov 2012

    Rapid Internationalization of SMEs from Resource Based View: A longitudinal Study of a Pharmaceutical company in Iran

    In current global economy with hyper competition in home market, access to foreign markets has become a must for most of SMEs; therefore, SMEs internationalization has received great attention. However, internationalization of SMEs from developing countries in general and rapid internationalization in particular has remained largely unsearched. This longitudinal paper...

    Provided By Linkoping University

  • White Papers // Aug 2012

    Reliability-Aware Instruction Set Customization for ASIPs With Hardened Logic

    Application-Specific Instruction-set Processors (ASIPs) allow the designer to extend the instruction set of the base processor with selected custom instructions to tailor-fit the application. In this paper, with the help of a motivational example, the authors first demonstrate that different custom instructions are vulnerable to faults with varying probabilities. This...

    Provided By Linkoping University

  • White Papers // Jun 2012

    Expectation Maximization Algorithm for Calibration of Ground Sensor Networks Using a Road Constrained Particle Filter

    Target tracking in ground sensor networks requires an accurate calibration of sensor positions and orientations, as well as sensor offsets and scale errors. The authors present a calibration algorithm based on the EM (Expectation Maximization) algorithm, where the particle filter is used for target tracking and a non-linear least squares...

    Provided By Linkoping University

  • White Papers // Jun 2012

    Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint

    In this paper, the authors are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Different to former energy minimal scheduling problem, they introduce a new optimization problem...

    Provided By Linkoping University

  • White Papers // Jun 2012

    Context-Aware Speculative Prefetch for Soft Real-Time Applications

    Dynamically reconfigurable computing devices have the ability to adapt their hardware to application demands, providing the performance of hardware acceleration, as well as high flexibility, at competitive costs. For these reasons, FPGA-based reconfigurable systems are becoming popular in many application domains, including soft real-time computing. Unfortunately, one of their biggest...

    Provided By Linkoping University

  • White Papers // May 2012

    Load Balancing in Heterogeneous LTE: Range Optimization Via Cell Offset and Load-Coupling Characterization

    Heterogeneous Networks (HetNets) with a topology of mixed macro-cells and Low-Power Nodes (LPNs) form an important step of capacity enhancement for LTE and LTE-A. In this paper, the authors present an optimization framework for load balancing in LTE HetNets, by means of cell range assignment using cell-specific offset. For any...

    Provided By Linkoping University

  • White Papers // May 2012

    Power-Efficient Downlink Communication Using Large Antenna Arrays: The Doughnut Channel

    Large antenna arrays at the base station can facilitate power efficient single user downlink communication due to the inherent array power gain, i.e., under an average only total transmit power constraint, for a fixed desired information rate, the required total transmit power can be reduced by increasing the number of...

    Provided By Linkoping University

  • White Papers // May 2012

    Passive Crowd-Based Monitoring of World Wide Web Infrastructure and Its Performance

    The World Wide Web and the services it provides are continually evolving. Even for a single time instant, it is a complex task to methodologically determine the infrastructure over which these services are provided and the corresponding effect on user perceived performance. For such tasks, researchers typically rely on active...

    Provided By Linkoping University

  • White Papers // May 2012

    Distributed Space-Time Coding in Two-Way Fixed Gain Relay Networks Over Nakagami-M Fading

    The distributed Alamouti space-time code in two-way fixed gain Amplify-and-Forward (AF) relay is proposed in this paper. In particular, closed-form expressions for approximated ergodic sum-rate and exact Pair-Wise Error Probability (PWEP) are derived for Nakagami-m fading channels. To reveal further insights into array and diversity gains, an asymptotic PWEP is...

    Provided By Linkoping University

  • White Papers // May 2012

    Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems

    A multiplicity of autonomous terminals simultaneously transmits data streams to a compact array of antennas. The array uses imperfect channel-state information derived from transmitted pilots to extract the individual data streams. The power radiated by the terminals can be made inversely proportional to the square-root of the number of base...

    Provided By Linkoping University

  • White Papers // May 2012

    Analyzing Delay-Tolerant Networks With Correlated Mobility

    Given a mobility pattern that entails intermittent wireless ad hoc connectivity, what is the best message delivery ratio and latency that can be achieved for a delay-tolerant routing protocol? The authors address this question by introducing a general scheme for deriving the routing latency distribution for a given mobility trace....

    Provided By Linkoping University

  • White Papers // Apr 2012

    Control-Quality Optimization for Distributed Embedded Systems With Adaptive Fault Tolerance

    In this paper, the authors propose a design framework for distributed embedded control systems that ensures reliable execution and high quality of control even if some computation nodes fail. When a node fails, the configuration of the underlying distributed system changes and the system must adapt to this new situation...

    Provided By Linkoping University

  • White Papers // Mar 2012

    Distributed Resource Optimization in Multicell OFDMA Networks

    The authors consider the joint allocation of receiver, bit, and power to subcarriers in the downlink of multi-cell Orthogonal Frequency-Division Multiple-Access (OFDMA) networks. Assuming that the cells share the entire bandwidth and that the rates are discrete, they formulate the joint allocation problem as a nonlinear Mixed Integer Program (MIP),...

    Provided By Linkoping University

  • White Papers // Dec 2011

    R2NC: Redundant and Random Network Coding for Robust H.264/SVC Transmission

    In this paper, the authors are interested in improving the performance of constructive network coding schemes for video transmission over packet lossy networks. A novel unequal packet loss protection scheme R2NC based on low-triangular global coding matrix with ladder-shaped partition will be presented, which combines redundant and random network coding...

    Provided By Linkoping University

  • White Papers // Nov 2011

    Customizing Instruction Set Extensible Reconfigurable Processors using GPUs

    Many reconfigurable processors allow their instruction sets to be tailored according to the performance requirements of target applications. They have gained immense popularity in recent years because of this flexibility of adding custom instructions. However, most design automation algorithms for instruction set customization (like enumerating and selecting the optimal set...

    Provided By Linkoping University

  • White Papers // Nov 2011

    Modular Anomaly Detection for Smartphone Ad Hoc Communication

    The capabilities of the modern smartphones make them the obvious platform for novel mobile applications. The open architectures, however, also create new vulnerabilities. Measures for prevention, detection, and reaction need to be explored with the peculiarities that resource-constrained devices impose. Smartphones, in addition to cellular broadband network capabilities, include WiFi...

    Provided By Linkoping University

  • White Papers // Nov 2011

    Constant Envelope Precoding for Power-Efficient Downlink wireless Communication in Multi-User Mimo Systems Using Large Antenna Arrays

    The authors consider downlink cellular multi-user communication between a Base Station (BS) having N antennas and M single-antenna users, i.e., an N ?M Gaussian Broadcast Channel (GBC). Under an Average only total transmit Power Constraint (APC), large antenna arrays at the BS (having tens to a few hundred antennas) have...

    Provided By Linkoping University

  • White Papers // Oct 2011

    Towards a Security Domain Model for Embedded Systems

    Embedded devices are increasingly involved in applications that store, access, and manipulate sensitive information. This creates a need for protecting such devices from security threats. However, resource-constrained nature of these devices does not allow engineers to apply conventional security mechanisms in a straight forward manner. For instance, Ravi et al....

    Provided By Linkoping University

  • White Papers // Sep 2011

    Test Scheduling in an IEEE P1687 Environment with Resource and Power Constraints

    In contrast to IEEE 1149.1, IEEE P1687 allows, through segment insertion bits, flexible scan paths for accessing on-chip instruments, such as test, debug, monitoring, measurement and configuration features. Flexible access to embedded instruments allows test time reduction, which is important at production test. However, the test access scheme should be...

    Provided By Linkoping University

  • White Papers // Jun 2011

    Stability Conditions of On-line Resource Managers for Systems with Execution Time Variations

    Today's embedded systems are exposed to variations in load demand due to complex software applications, hardware platforms, and impact of the run-time environments. When these variations are large, and efficiency is required, on-line resource managers may be deployed on the system to help it control its resource usage. An often...

    Provided By Linkoping University

  • White Papers // Jun 2011

    Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms

    Wireless communication is becoming the dominant form of communication and ad hoc wireless connections are posed to play a role in disaster area networks. However, research efforts on wireless ad hoc communication protocols do not pay enough attention to measurable and reproducible indications of the mobile footprint including power consumption....

    Provided By Linkoping University

  • White Papers // Jun 2011

    Adaptive Temperature-Aware SoC Test Scheduling Considering Process Variation

    High temperature and process variation are undesirable effects for modern systems-on-chip. The high temperature is a prominent issue during test and should be taken care of during the test process. Modern SoCs, affected by large process variation, experience rapid and large temperature deviations and, therefore, a traditional static test schedule...

    Provided By Linkoping University

  • White Papers // May 2011

    Communication Problems in Crisis Response

    This paper describes five problem areas of communication that occur during crisis response. These areas are communication infrastructure, situation awareness, individual and organizational common ground, form and content of messages, and communication paths through organizations. Five focus groups with Swedish field personnel from national and international crises were performed. The...

    Provided By Linkoping University

  • White Papers // Apr 2011

    Heuristics for Adaptive Temperature-Aware SoC Test Scheduling Considering Process Variation

    High working temperature and process variation are undesirable effects for modern Systems-on-Chip (SoC). The high temperature should be taken care of during the test. On the other hand, large process variations induce rapid and large temperature deviations causing the traditional static test schedules to be suboptimal in terms of speed...

    Provided By Linkoping University

  • White Papers // Apr 2011

    Efficient Computation of the Pareto Boundary for the MISO Interference Channel with Perfect CSI

    The authors consider the two-user Multiple-Input Single-Output (MISO) interference channel and the rate region which is achieved when the receivers treat the interference as additive Gaussian noise and the transmitters have perfect Channel State Information (CSI). They propose a computationally efficient method for calculating the Pareto boundary of the rate...

    Provided By Linkoping University

  • White Papers // Mar 2011

    Optimization of Assertion Placement in Time-Constrained Embedded Systems

    The authors present an approach for optimization of assertion placement in time-constrained HW/SW modules for detection of errors due to transient and intermittent faults. During the design phases, these assertions have to be inserted into the executable code and, hence, will always be executed with the corresponding code branches. As...

    Provided By Linkoping University

  • White Papers // Jan 2011

    Comparative Study of Price-Based Resource Allocation Algorithms for Ad Hoc Networks

    As mobile ad hoc networks provide a wide range of possibly critical services, providing quality of service guarantees becomes an essential element. Yet there is a limited understanding of the performance characteristics of different resource allocation algorithms. In particular, there is little work that comparatively studies different algorithms in the...

    Provided By Linkoping University

  • White Papers // Jan 2014

    A Low Area and Low Power Programmable Baseband Processor Architecture

    Fully programmable radio baseband processor architecture is presented. The architecture is based on a DSP processor core and a number flexible accelerator, connected via a configurable network. Design choices are motivated by the inherent properties of the baseband algorithms used in different types of radio systems. A large degree of...

    Provided By Linkoping University

  • White Papers // Apr 2006

    MediaDSP: An Application Specific Heterogeneous Multiprocessor SoC

    DSP industry has seen the prominent evolution of mobile and multimedia applications. It is more and more difficult for single-core DSPs to accommodate new applications that demand huge computing power. Meanwhile, new multimedia standards are emerging with a number of legacy standards still existing, which makes it difficult for customized...

    Provided By Linkoping University

  • White Papers // Feb 2006

    Simultaneous Multi-Standard Support in Programmable Baseband Processors

    Programmability will be increasingly important in future multi-standard radio systems. In this paper, the authors present an enhanced baseband processor architecture capable of efficiently supporting simultaneous multi-standard operation. Their DSP processor is based on the SIMT (Single Instruction stream Multiple Tasks) architecture which allows concurrent tasks to be executed on...

    Provided By Linkoping University

  • White Papers // Jun 2007

    An FPGA Based Open Source Network-on-Chip Architecture

    As chip manufacturing techniques continue to improve, more complex maksystems are being designed. Designing such a large system is not easily done however and much research from both academia and industry is focused on this problem. One of the problems encountered is how to handle the on-chip interconnections between different...

    Provided By Linkoping University

  • White Papers // Apr 2007

    A Comparison of Three FPGA Optimized NoC Architectures

    Network-on-chips (NoCs) have long been seen as a possible solution to the on-chip interconnection problems encountered when dealing with large system on a chip designs. However, almost all Network-on-Chip (NoC) publications are primarily targeting ASIC solutions. In this paper, the authors instead describe the details of three different network types...

    Provided By Linkoping University

  • White Papers // Sep 2009

    Wireless Ad Hoc Dissemination for Search and Rescue

    In search and rescue scenarios local information on victims and other finds needs to be disseminated rapidly to other rescue workers and team leaders. However, post disaster scenarios may imply the collapse of information infrastructure including cellular communication and Internet connectivity. Even if one considers wireless ad hoc communication as...

    Provided By Linkoping University

  • White Papers // May 2010

    DC Programming Approach for Resource Allocation in Wireless Networks

    The authors consider the problem of sum rate maximization with joint resource allocation and interference mitigation by multiantenna processing in wireless networks. The denominators in the users' signal-to-interference-plus-noise expressions are assumed to be representable in the form of matrix-based, concave interference functions. It is shown that the problem of interest...

    Provided By Linkoping University

  • White Papers // Oct 2009

    Multimode Flex-Interleaver Core for Baseband Processor Platform

    Growth of high-performance wireless communication systems has been drastically increased over the last few years. Due to rapid advancements and changes in radio communication systems, there is always a need of flexible and general purpose solutions for processing the data. The solution not only requires adopting the variances within a...

    Provided By Linkoping University

  • White Papers // Jan 2011

    Comparative Study of Price-Based Resource Allocation Algorithms for Ad Hoc Networks

    As mobile ad hoc networks provide a wide range of possibly critical services, providing quality of service guarantees becomes an essential element. Yet there is a limited understanding of the performance characteristics of different resource allocation algorithms. In particular, there is little work that comparatively studies different algorithms in the...

    Provided By Linkoping University

  • White Papers // Apr 2011

    Efficient Computation of the Pareto Boundary for the MISO Interference Channel with Perfect CSI

    The authors consider the two-user Multiple-Input Single-Output (MISO) interference channel and the rate region which is achieved when the receivers treat the interference as additive Gaussian noise and the transmitters have perfect Channel State Information (CSI). They propose a computationally efficient method for calculating the Pareto boundary of the rate...

    Provided By Linkoping University

  • White Papers // Sep 2010

    Anomaly Detection and Mitigation for Disaster Area Networks

    One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common operational picture and thereby reliable dissemination are prevalent. In this paper, the authors address anomaly detection in intermittently connected mobile ad hoc networks in which there...

    Provided By Linkoping University

  • White Papers // May 2011

    Communication Problems in Crisis Response

    This paper describes five problem areas of communication that occur during crisis response. These areas are communication infrastructure, situation awareness, individual and organizational common ground, form and content of messages, and communication paths through organizations. Five focus groups with Swedish field personnel from national and international crises were performed. The...

    Provided By Linkoping University

  • White Papers // May 2010

    Cooperative Beamforming for the MISO Interference Channel

    A distributed beamforming algorithm is proposed for the two-user Multiple-Input Single-Output (MISO) InterFerence Channel (IFC). The algorithm is iterative and uses as bargaining value the interference that each transmitter generates towards the receiver of the other user. It enables cooperation among the transmitters in order to increase both users' rates...

    Provided By Linkoping University

  • White Papers // Jun 2010

    Spectrum Sensing Methods for Detection of DVB-T Signals in AWGN and Fading Channels

    In this paper, the authors consider spectrum sensing of DVB-T signals in different fading environments. They compare state-of-the-art detectors including detectors based on pilot subcarriers, as well as detectors for general OFDM signals that exploit the correlation structure incurred by the cyclic prefix. Energy detection is also included for comparison....

    Provided By Linkoping University

  • White Papers // Oct 2010

    Software Programmable Data Allocation in Multi-Bank Memory of SIMD Processors

    The host-SIMD style heterogeneous multi-processor architecture offers high computing performance and user-friendly programmability. It explores both task level parallelism and data level parallelism by the on-chip multiple SIMD coprocessors. For embedded DSP applications with predictable computing feature, this architecture can be further optimized for performance, implementation cost and power consumption....

    Provided By Linkoping University

  • White Papers // Nov 2010

    Organizational Changes in Connection With IPSO

    Integrated Product Service Offerings (IPSO) have the potential of obtaining better margins, profitability and less environmental impact. Becoming a service provider implies significant changes in the way companies do business, considerable changes within the organization and changes with the relationships to external actors. This paper aims to contribute to the...

    Provided By Linkoping University

  • White Papers // Oct 2009

    Fast BER Test for Digital RF Transceivers

    The paper presents a fast Bit-Error-Rate (BER) test suitable for digital receivers or transceivers. The test technique makes use of an elevated BER which can be achieved by geometrical translation of the signal constellation points on the IQ plane. As the elevated BER requires much less bits (or symbols) to...

    Provided By Linkoping University

  • White Papers // Nov 2011

    Constant Envelope Precoding for Power-Efficient Downlink wireless Communication in Multi-User Mimo Systems Using Large Antenna Arrays

    The authors consider downlink cellular multi-user communication between a Base Station (BS) having N antennas and M single-antenna users, i.e., an N ?M Gaussian Broadcast Channel (GBC). Under an Average only total transmit Power Constraint (APC), large antenna arrays at the BS (having tens to a few hundred antennas) have...

    Provided By Linkoping University

  • White Papers // Feb 2010

    Platform-Independent Modeling of Explicitly Parallel Programs

    The authors propose a model-driven approach to parallel programming of SPMD-style, explicitly parallel computations. They define an executable, platform-independent modeling language with explicitly parallel control and data flow for an abstract parallel computer with shared address space, and implement it as an extension of UML2 activity diagrams and a generator...

    Provided By Linkoping University

  • White Papers // Oct 2011

    Towards a Security Domain Model for Embedded Systems

    Embedded devices are increasingly involved in applications that store, access, and manipulate sensitive information. This creates a need for protecting such devices from security threats. However, resource-constrained nature of these devices does not allow engineers to apply conventional security mechanisms in a straight forward manner. For instance, Ravi et al....

    Provided By Linkoping University

  • White Papers // Mar 2011

    Optimization of Assertion Placement in Time-Constrained Embedded Systems

    The authors present an approach for optimization of assertion placement in time-constrained HW/SW modules for detection of errors due to transient and intermittent faults. During the design phases, these assertions have to be inserted into the executable code and, hence, will always be executed with the corresponding code branches. As...

    Provided By Linkoping University

  • White Papers // Oct 2010

    Scheduling and Optimization of Fault-Tolerant Embedded Systems with Transparency/ Performance Trade-Offs

    In this paper, the authors propose a strategy for the synthesis of fault-tolerant schedules and for the mapping of fault-tolerant applications. Their techniques handle transparency/performance trade-offs and use the fault-occurrence information to reduce the overhead due to fault tolerance. Processes and messages are statically scheduled, and they use process re-execution...

    Provided By Linkoping University

  • White Papers // Feb 2008

    Scheduling of Fault-Tolerant Embedded Systems with Soft and Hard Timing Constraint

    In this paper, the authors present an approach to the synthesis of fault-tolerant schedules for embedded applications with soft and hard real-time constraints. They are interested to guarantee the deadlines for the hard processes even in the case of faults, while maximizing the overall utility. They use time/utility functions to...

    Provided By Linkoping University

  • White Papers // Jan 2009

    Analysis and Optimization of Fault-Tolerant Embedded Systems with Hardened Processors

    In this paper, the authors propose an approach to the design optimization of fault-tolerant hard real-time embedded systems, which combines hardware and software fault tolerance techniques. They trade-off between selective hardening in hardware and process re-execution in software to provide the required levels of fault tolerance against transient faults with...

    Provided By Linkoping University

  • White Papers // Jan 2006

    Synthesis of Fault-Tolerant Embedded Systems with Checkpointing and Replication

    The authors present an approach to the synthesis of fault-tolerant hard real-time systems for safety-critical applications. They use checkpointing with rollback recovery and active replication for tolerating transient faults. Processes are statically scheduled and communications are performed using the time-triggered protocol. Their synthesis approach decides the assignment of fault-tolerance policies...

    Provided By Linkoping University

  • White Papers // Sep 2006

    Mapping of Fault-Tolerant Applications with Transparency on Distributed Embedded Systems

    In this paper, the authors present an approach for the mapping optimization of fault-tolerant embedded systems for safety-critical applications. Processes and messages are statically scheduled. Process re-execution is used for recovering from multiple transient faults. They call process recovery transparent if it does not affect operation of other processes. Transparent...

    Provided By Linkoping University

  • White Papers // Feb 2006

    Power Constrained and Defect-Probability Driven SoC Test Scheduling with Test Set Partitioning

    In this paper, the authors present a test scheduling approach for System-on-Chip (SoC) production tests with peak-power constraints. An abort-on-first-fail test approach is assumed, whereby the test is terminated as soon as the first fault is detected. Defect probabilities of individual cores are used to guide the test scheduling and...

    Provided By Linkoping University

  • White Papers // Jun 2010

    Multi-Temperature Testing for Core-Based System-on-Chip

    Recent research has shown that different defects can manifest themselves as failures at different temperature spectra. Therefore, the authors need multi-temperature testing which applies tests at different temperature levels. In this paper, they discuss the need and problems for testing core-based systems-on-chip at different temperatures. To address the long test...

    Provided By Linkoping University

  • White Papers // Dec 2013

    Dynamic Content Allocation for Cloud-Assisted Service of Periodic Workloads

    Motivated by improved models for content workload prediction, in this paper, the authors consider the problem of dynamic content allocation for a hybrid content delivery system that combines cloud-based storage with low cost dedicated servers that have limited storage and unmetered upload bandwidth. They formulate the problem of allocating contents...

    Provided By Linkoping University

  • White Papers // Oct 2009

    System Architecture for 3GPP LTE Modem Using a Programmable Baseband Processor

    3G evolution towards HSPA and LTE is ongoing which will substantially increase the throughput with higher spectral efficiency. This paper presents the system architecture of an LTE modem based on a programmable baseband processor. The architecture includes a baseband processor that handles processing such as time and frequency synchronization, IFFT/FFT...

    Provided By Linkoping University

  • White Papers // Aug 2010

    Efficient Embedding of Deterministic Test Data

    Electronic systems, Printed Circuit Boards (PCBs), with an increasing number of Integrated Circuits (ICs) are increasingly common. Systems with many Integrated Circuits (ICs), often of the same type, are increasingly common to meet the constant performance demand. However, systems in recent semiconductor technologies require not only manufacturing test, but also...

    Provided By Linkoping University

  • White Papers // Aug 2010

    Temperature-Aware SoC Test Scheduling Considering Inter-Chip Process Variation

    Systems-on-Chip (SoC) implemented with deep submicron technologies suffer from two undesirable effects, high power density, thus high temperature, and high process variation, which must be addressed in the test process. This paper presents two temperature-aware scheduling approaches to maximize the test throughput in the presence of inter-chip process variation. The...

    Provided By Linkoping University

  • White Papers // Jun 2011

    Adaptive Temperature-Aware SoC Test Scheduling Considering Process Variation

    High temperature and process variation are undesirable effects for modern systems-on-chip. The high temperature is a prominent issue during test and should be taken care of during the test process. Modern SoCs, affected by large process variation, experience rapid and large temperature deviations and, therefore, a traditional static test schedule...

    Provided By Linkoping University

  • White Papers // Sep 2011

    Test Scheduling in an IEEE P1687 Environment with Resource and Power Constraints

    In contrast to IEEE 1149.1, IEEE P1687 allows, through segment insertion bits, flexible scan paths for accessing on-chip instruments, such as test, debug, monitoring, measurement and configuration features. Flexible access to embedded instruments allows test time reduction, which is important at production test. However, the test access scheme should be...

    Provided By Linkoping University

  • White Papers // Apr 2011

    Heuristics for Adaptive Temperature-Aware SoC Test Scheduling Considering Process Variation

    High working temperature and process variation are undesirable effects for modern Systems-on-Chip (SoC). The high temperature should be taken care of during the test. On the other hand, large process variations induce rapid and large temperature deviations causing the traditional static test schedules to be suboptimal in terms of speed...

    Provided By Linkoping University

  • White Papers // Sep 2007

    Bus Access Design for Combined Worst and Average Case Execution Time Optimization of Predictable Real-Time Applications on Multiprocessor Systems-on-Chip

    Optimization techniques for improving the average-case execution time of an application, for which predictability with respect to time is not required, have been investigated for a long time in many different contexts. However, this has traditionally been done without paying attention to the worst-case execution time. For predictable real-time applications,...

    Provided By Linkoping University

  • White Papers // Jun 2010

    Multiplexed Redundant Execution: A Technique for Efficient Fault Tolerance in Chip Multiprocessors

    Continued CMOS scaling is expected to make future microprocessors susceptible to transient faults, hard faults, manufacturing defects and process variations causing fault tolerance to become important even for general purpose processors targeted at the commodity market. To mitigate the effect of decreased reliability, a number of fault-tolerant architectures have been...

    Provided By Linkoping University

  • White Papers // May 2009

    Power Efficient Redundant Execution for Chip Multiprocessors

    In this paper, the authors describe the design of a power efficient micro-architecture for transient fault detection in Chip Multi-Processors (CMPs). They introduce a new per-core Dynamic Voltage and Frequency Scaling (DVFS) algorithm for their architecture that significantly reduces power dissipation for redundant execution with a minimal performance overhead. Using...

    Provided By Linkoping University

  • White Papers // Jun 2011

    Stability Conditions of On-line Resource Managers for Systems with Execution Time Variations

    Today's embedded systems are exposed to variations in load demand due to complex software applications, hardware platforms, and impact of the run-time environments. When these variations are large, and efficiency is required, on-line resource managers may be deployed on the system to help it control its resource usage. An often...

    Provided By Linkoping University

  • White Papers // Mar 2013

    Stability of Adaptive Feedback-based Resource Managers for systems with Execution Time Variations

    Today's embedded systems are exposed to variations in load demand due to complex software applications, dynamic hardware platforms, and the impact of the run-time environment. When these variations are large, and efficiency is required, adaptive on-line resource managers may be deployed on the system to control its resource usage. An...

    Provided By Linkoping University