University of Vigo

Displaying 1-40 of 60 results

  • White Papers // Jan 2014

    Practical Experience Teaching Embedded Systems

    The area of embedded systems and their interconnection is of utmost importance now-a-days. The technological evolution, and widespread use, of small electronic devices with processing and communication capabilities, creates the potential for the development of new applications in several different domains. Areas such as industrial control, automotive, home automation, surveillance...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Challenges in Transformation of Existing Real-Time Embedded Systems to Cyber-Physical Systems

    The recent integration of embedded real-time systems with large collections of sensors and actuators in hostile physical environments, called cyber-physical systems, is posing many new and challenging problems to the computer science community. Most research directions in the context of cyber-physical systems have focused on developing computing foundations for designing,...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Integrated Security and Quality of Service Support in E-Commerce

    One of the main challenges against successful ecommerce in an open environment is security and QoS (Quality of Service) support. A security compromise can lead to the failure of an e-business in the worst case. At the same time, an e-commerce system needs to process service requests with a certain...

    Provided By University of Vigo

  • White Papers // Aug 2013

    Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization

    Most modern applications are empowered by online services, so application developers frequently implement authentication and authorization. Major online providers, such as Facebook and Microsoft, provide SDKs for incorporating authentication services. This paper considers whether those SDKs enable typical developers to build secure apps. The authors work focuses on systematically explicating...

    Provided By University of Vigo

  • White Papers // May 2013

    GuarDroid: A Trusted Path for Password Entry

    Sensitive online transactions are now frequently executed using Smartphone clients. Whereas users of personal computers execute these transactions in a browser, Smartphone users tend to use installed apps. These apps use username and password pairs as the primary authentication method and may come from untrusted parties, opening users up to...

    Provided By University of Vigo

  • White Papers // May 2013

    Circuit Structures for Improving Efficiency of Security and Privacy Tools

    Several techniques in computer security, including generic protocols for secure computation and symbolic execution, depend on implementing algorithms in static circuits. Despite substantial improvements in recent years, tools built using these techniques remain too slow for most practical uses. They require transforming arbitrary programs into either Boolean logic circuits, constraint...

    Provided By University of Vigo

  • White Papers // Apr 2013

    On How to Provision Quality of Service (QoS) for Large Dataset Transfers

    For large-sized scientific dataset transfers, scientists typically invest in high-end computing systems that can source and sink data to/from their disk systems at high speeds. These transfers are referred to as flows as they dominate other flows. They also cause increased burstiness, which in turn impacts delay-sensitive real-time audio/video flows....

    Provided By University of Vigo

  • White Papers // Nov 2012

    Mechanism Design for Base Station Association and Resource Allocation in Downlink OFDMA Network

    The authors consider a resource management problem in a multi-cell downlink OFDMA network whereby the goal is to find the optimal combination of assignment of users to base stations and resource allocation strategies at each base station. Efficient resource management protocols must rely on users truthfully reporting privately held information...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Multilevel Pulse-Position Modulation Based on Balanced Incomplete Block Designs

    In this paper, two new modulation schemes using multilevel Pulse-Position Modulation (PPM) for application in unipolar optical wireless systems are presented. Balanced Incomplete Block Designs (BIBD) are used for constructing the symbol alphabets. Each symbol is obtained by combining multiple code-words of a BIBD code. In one scheme the symbols...

    Provided By University of Vigo

  • White Papers // Jun 2012

    Billion-Gate Secure Computation with Malicious Adversaries

    The goal of this paper is to assess the feasibility of two-party secure computation in the presence of a malicious adversary. Prior work has shown the feasibility of billion-gate circuits in the semi-honest model, but only the 35k-gate AES circuit in the malicious model, in part because security in the...

    Provided By University of Vigo

  • White Papers // May 2012

    Link Allocation, Routing and Scheduling of FSO Augmented RF Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are designed to provide broadband wireless services; however, capacities of WMNs are fundamentally limited in bandwidth because of the scarcity of RF spectral resources. A solution is to design a WMN using multiple wireless technologies. Since the optical spectrum remains unlicensed and under-utilized, the authors propose...

    Provided By University of Vigo

  • White Papers // May 2012

    Minimizing Transponder Cost for Two-Way Data Exchange in Satellite Networking

    Two-way satellite communication that simultaneously shares spectrum, with subsequent interference cancelation, is an attractive means of efficiently using satellite resources. Systems may employ this method on full-transponder access, or with lease of a partial transponder. In this case, it is of interest to request bandwidth and power resources that minimize...

    Provided By University of Vigo

  • White Papers // May 2012

    Quid-Pro-Quo-Tocols: Strengthening Semi-Honest Protocols With Dual Execution

    Known protocols for secure two-party computation that are designed to provide full security against malicious behavior are significantly less efficient than protocols intended only to thwart semi-honest adversaries. The authors present a concrete design and implementation of protocols achieving security guarantees that are much stronger than are possible with semi-honest...

    Provided By University of Vigo

  • White Papers // Feb 2012

    A System-Aware Cyber Security Architecture

    As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Private Set Intersection: Are Garbled Circuits Better Than Custom Protocols?

    Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Replacement Attacks Against VM-Protected Applications

    Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software protection). Process-level Virtual Machines (PVMs) can safeguard the application code at run time and hamper the adversary's ability to launch dynamic attacks on the application. This dynamic protection, combined...

    Provided By University of Vigo

  • White Papers // Jan 2012

    Feedback Control With Queueing-Theoretic Prediction for Relative Delay Guarantees in Web Servers

    The use of feedback control theory for performance guarantees in QoS-aware systems has gained much attention in recent years. In this paper, they authors investigate merging, within a single framework, the predictive power of queueing theory with the reactive power of feedback control to produce software systems with a superior...

    Provided By University of Vigo

  • White Papers // Dec 2011

    Efficient Secure Computation With Garbled Circuits

    Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, the authors show the potential of building privacy-preserving applications using garbled circuits, a generic technique that...

    Provided By University of Vigo

  • White Papers // Oct 2011

    Auditing Information Leakage for Distance Metrics

    Many useful scenarios involve allowing untrusted users to run queries against secret data, so long as the results do not leak too much information. This problem has been studied widely for statistical queries, but not for queries with more direct semantics. In this paper, the authors consider the problem of...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Using Cycle Stacks to Understand Scaling Bottlenecks in Multi-Threaded Workloads

    In this paper, the authors propose a methodology for analyzing parallel performance by building cycle stacks. A cycle stack quantifies where the cycles have gone, and provides hints towards optimization opportunities. They make the case that this is particularly interesting for analyzing parallel performance: understanding how cycle components scale with...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Protecting Private Web Content From Embedded Scripts

    Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. The authors present a browser modification that provides fine-grained control over what parts of a document are visible to different scripts, and...

    Provided By University of Vigo

  • White Papers // Aug 2011

    Privacy-Preserving Applications on Smartphones

    Smartphones are becoming some of the people most trusted computing devices. People use them to store highly sensitive information including email, passwords, financial accounts, and medical records. These properties make Smartphones an essential platform for privacy-preserving applications. To date, this area remains largely unexplored mainly because privacy-preserving computation protocols were...

    Provided By University of Vigo

  • White Papers // Jun 2011

    Faster Secure Two-Party Computation Using Garbled Circuits

    Secure two-party computation enables two parties to evaluate a function cooperatively without revealing to either party anything beyond the function's output. The garbled-circuit technique, a generic approach to secure two-party computation for semi-honest participants, was developed by Yao in the 1980s, but has been viewed as being of limited practical...

    Provided By University of Vigo

  • White Papers // Apr 2011

    The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback

    The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...

    Provided By University of Vigo

  • White Papers // Feb 2011

    Detection Diversity of Multiantenna Spectrum Sensors

    Spectrum sensing is a key task in the Cognitive Radio (CR) paradigm in order to limit harmful interference to licensed users of the frequency band. By using multiple antennas (either co-located or spatially distributed), the sensing system can substantially improve its detection performance. In order to quantify and compare the...

    Provided By University of Vigo

  • White Papers // Oct 2010

    Multiantenna Detection Under Noise Uncertainty and Primary User's Spatial Structure

    Spectrum sensing is a challenging key component of the Cognitive Radio paradigm, since primary signals must be detected in the face of noise uncertainty and at Signal-to-Noise Ratios (SNRs) well below decodability levels. Multiantenna detectors exploit spatial independence of receiver thermal noise to boost detection performance and robustness. Here, the...

    Provided By University of Vigo

  • White Papers // Jul 2010

    The Network Empowered Internetwork (NEI): An Architecture Overview

    After classifying internetworks into type internetworks, protocol internetworks, and organization internetworks, this paper focuses on the last of these. A key problem with organization internetworking is global routing scalability. In developing the NEI architecture to address this problem, some basic mechanisms/tenets of IP internetworking are upended. In NEI, internetworking addresses...

    Provided By University of Vigo

  • White Papers // Apr 2010

    On the Impact of Primary User Localization on Rrate Performance of CR Systems

    This paper investigates how localization knowledge of primary users impacts the sum-rate performance of a secondary system in an underlay cognitive radio setting. Two different probabilistic models for the primary users' location information are assumed, one uniform distribution and the other with Gaussian distribution. The interplay between the achievable rate...

    Provided By University of Vigo

  • White Papers // Apr 2010

    Monitoring User Actions for Better Malware Specifications

    Malware authors have used the open nature of the web to distribute malicious software more quickly than security software manufacturers can respond using static signature-based detection mechanisms. Current behavioral techniques suffer from high false positive rates because of the difficulty of distinguishing between benign and malicious behaviors based only on...

    Provided By University of Vigo

  • White Papers // Apr 2010

    Cryptanalysis of the DECT Standard Cipher

    Cordless phones using the Digital Enhanced Cordless Telecommunications standard (DECT) are among the most widely deployed security technologies with 90 million new handsets shipping every year. However, DECT does not provide sufficient security for its intended application 'Cordless telephony' as it fails to deliver confidentiality and access control. The DECT...

    Provided By University of Vigo

  • White Papers // Feb 2010

    Multiantenna Spectrum Sensing for Cognitive Radio: Overcoming Noise Uncertainty

    Spectrum sensing is a key ingredient of the dynamic spectrum access paradigm, but it needs powerful detectors operating at SNRs well below the decodability levels of primary signals. Noise uncertainty poses a significant challenge to the development of such schemes, requiring some degree of diversity (spatial, temporal, or in distribution)...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Hands-on Oriented Curriculum and Laboratory Development for Embedded System Design

    As embedded systems are getting popular in industrial product designs, a dedicated teaching laboratory for embedded systems has been setup for college and graduate students to get familiar with embedded system engineering and researches. In this paper, the authors present their experiences in embedded system education curriculum and teaching laboratory...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Virtual Microcontrollers

    Embedded programming training today commonly involves numerous low-level details of a particular microcontroller. Such details shift focus away from higher-level structured embedded programming concepts. Thus, hard-to-break, unstructured programming habits are commonplace in the field. Yet structured embedded programming is becoming more necessary as embedded systems grow in complexity. The authors...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Incorporating System-Level Concepts into Undergraduate Embedded Systems Curricula

    As more and more embedded systems concepts are integrated into academic curricula, the incorporation of system-level concepts must keep pace with lower-level topics. However, there are several challenges faced by educators trying to integrate system-level concepts into embedded systems curricula. Four such challenges include: the breadth of the embedded systems...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Multi-Processor Programming in the Embedded System Curriculum

    Embedded systems are characterized by the importance of non-functional requirements, i.e. hard or soft real-time constraints, a limited power budget and limited resources, such as memory footprint. Furthermore, architectures must be programmable to deal with changes in applications. Architectures for embedded systems are the result of a compromise between efficiency...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Teaching Skills and Concepts for Embedded Systems Design

    Smart devices are omnipresent today and the design of these embedded systems requires a multidisciplinary approach. It is important that students in electrical engineering and computer science learn these different aspects of embedded systems design. The authors' course on complex systems design methodology presents an overview of embedded systems design...

    Provided By University of Vigo

  • White Papers // Jan 2009

    The Development of Training Course for Embedded Middleware Design

    The industry of Information Technology (IT) and Integrated Circuit (IC) are the main focuses in Taiwan's industry. In order to keep the competition with worldwide IT/IC industry, well-trained engineers play the key factor. In order to promote embedded software education and establish fundamental related research, Embedded SoftWare (ESW) consortium was...

    Provided By University of Vigo

  • White Papers // Jan 2009

    Non-Expert Construction of Customized Embedded Systems to Enhance STEM Curricula

    The authors present an interactive platform to enhance STEM education through project-based activities that complement the existing curriculum, while drawing on problem solving skills and team work. The addition of hands-on projects is intended not only to reinforce the various concepts learnt through normal class readings and discussion, but also...

    Provided By University of Vigo

  • White Papers // Jun 2008

    Financial Constraints: Source Of Output And TFP Gaps In Latin America?

    Earlier studies have shown that a combination of high intermediation costs, poor contract enforcement, and high levels of inequality reduce long-run productivity and output levels. The authors present evidence showing that all these factors have been more favorable to East Asian economies in a direct comparison with Latin America over...

    Provided By University of Vigo

  • White Papers // Mar 2008

    Phishing for the Answer: Recent Developments in Combating Phishing

    In this paper, the authors discuss some legal implications of phishing. First, it provides an introduction on phishing and its variants. Then it discusses various efforts to combat phishing, ranging from consumer education, private sector efforts, and law enforcement. Lastly, the paper details recent legislative developments concerning phishing at both...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Using Cycle Stacks to Understand Scaling Bottlenecks in Multi-Threaded Workloads

    In this paper, the authors propose a methodology for analyzing parallel performance by building cycle stacks. A cycle stack quantifies where the cycles have gone, and provides hints towards optimization opportunities. They make the case that this is particularly interesting for analyzing parallel performance: understanding how cycle components scale with...

    Provided By University of Vigo

  • White Papers // May 2012

    Quid-Pro-Quo-Tocols: Strengthening Semi-Honest Protocols With Dual Execution

    Known protocols for secure two-party computation that are designed to provide full security against malicious behavior are significantly less efficient than protocols intended only to thwart semi-honest adversaries. The authors present a concrete design and implementation of protocols achieving security guarantees that are much stronger than are possible with semi-honest...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Private Set Intersection: Are Garbled Circuits Better Than Custom Protocols?

    Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Protecting Private Web Content From Embedded Scripts

    Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. The authors present a browser modification that provides fine-grained control over what parts of a document are visible to different scripts, and...

    Provided By University of Vigo

  • White Papers // Aug 2011

    Privacy-Preserving Applications on Smartphones

    Smartphones are becoming some of the people most trusted computing devices. People use them to store highly sensitive information including email, passwords, financial accounts, and medical records. These properties make Smartphones an essential platform for privacy-preserving applications. To date, this area remains largely unexplored mainly because privacy-preserving computation protocols were...

    Provided By University of Vigo

  • White Papers // Jun 2011

    Faster Secure Two-Party Computation Using Garbled Circuits

    Secure two-party computation enables two parties to evaluate a function cooperatively without revealing to either party anything beyond the function's output. The garbled-circuit technique, a generic approach to secure two-party computation for semi-honest participants, was developed by Yao in the 1980s, but has been viewed as being of limited practical...

    Provided By University of Vigo

  • White Papers // Jun 2012

    Billion-Gate Secure Computation with Malicious Adversaries

    The goal of this paper is to assess the feasibility of two-party secure computation in the presence of a malicious adversary. Prior work has shown the feasibility of billion-gate circuits in the semi-honest model, but only the 35k-gate AES circuit in the malicious model, in part because security in the...

    Provided By University of Vigo

  • White Papers // Jul 2010

    The Network Empowered Internetwork (NEI): An Architecture Overview

    After classifying internetworks into type internetworks, protocol internetworks, and organization internetworks, this paper focuses on the last of these. A key problem with organization internetworking is global routing scalability. In developing the NEI architecture to address this problem, some basic mechanisms/tenets of IP internetworking are upended. In NEI, internetworking addresses...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Multilevel Pulse-Position Modulation Based on Balanced Incomplete Block Designs

    In this paper, two new modulation schemes using multilevel Pulse-Position Modulation (PPM) for application in unipolar optical wireless systems are presented. Balanced Incomplete Block Designs (BIBD) are used for constructing the symbol alphabets. Each symbol is obtained by combining multiple code-words of a BIBD code. In one scheme the symbols...

    Provided By University of Vigo

  • White Papers // Apr 2011

    The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback

    The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...

    Provided By University of Vigo

  • White Papers // Apr 2013

    On How to Provision Quality of Service (QoS) for Large Dataset Transfers

    For large-sized scientific dataset transfers, scientists typically invest in high-end computing systems that can source and sink data to/from their disk systems at high speeds. These transfers are referred to as flows as they dominate other flows. They also cause increased burstiness, which in turn impacts delay-sensitive real-time audio/video flows....

    Provided By University of Vigo

  • White Papers // Jan 2014

    Practical Experience Teaching Embedded Systems

    The area of embedded systems and their interconnection is of utmost importance now-a-days. The technological evolution, and widespread use, of small electronic devices with processing and communication capabilities, creates the potential for the development of new applications in several different domains. Areas such as industrial control, automotive, home automation, surveillance...

    Provided By University of Vigo

  • White Papers // Mar 2008

    Feedback Scheduling of Real-Time Divisible Loads in Clusters

    Quality-of-Service (QoS) provisioning for divisible loads in clusters can be enabled using real-time scheduling theory, but is based on an important assumption: that the scheduler knows the execution time of every task in the workload. Information from production clusters, however, shows that estimated execution times of tasks are often inaccurate....

    Provided By University of Vigo

  • White Papers // Mar 2008

    A Testbed for Secure and Robust SCADA Systems

    SCADA refers to a large-scale, distributed measurement (and control) system. The supervisory control system is placed on top of a real time control system to control an external process. The Supervisory Control And Data Acquisition system (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Impact of RTOS Parameters on End-to-End Timing Performance

    For accurate end-To-end (e2e) analysis of a Real-Time Embedded System (RTES), the authors need a method to precisely reflect the effects of the underlying Real-Time Operating System (RTOS). In timing analysis, RTOS can be viewed as a matrix of parameters that could affect the timing of the RTES. In this...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Thermal Effects on Real-Time Systems

    In this paper, the authors study how real-time systems are affected by thermal management to satisfy the temperature constraint. In temperature-constrained real-time systems, deadline guarantees must be met without exceeding safe temperature level of the processor. While processor speed control is the most popular method of thermal management of systems,...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Challenges in Transformation of Existing Real-Time Embedded Systems to Cyber-Physical Systems

    The recent integration of embedded real-time systems with large collections of sensors and actuators in hostile physical environments, called cyber-physical systems, is posing many new and challenging problems to the computer science community. Most research directions in the context of cyber-physical systems have focused on developing computing foundations for designing,...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Using Sequencing to Trigger a Better Analysis

    The authors improve the static analysis of control flow in programs running on embedded microcontrollers. Their new techniques, called sequencing and triggering analysis, can sometimes determine that the scheduler always runs a collection of tasks in a certain order or that some interrupt handlers are dead or at least cannot...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Compositional Schedulability Analysis for Cyber-Physical Systems

    Cyber-Physical Systems (CPSs) are becoming all-pervasive, and due to increasing complexity they are designed using component-based approaches. Temporal constraints of such complex CPSs are then modeled using hierarchical scheduling frameworks. Therefore, there is a need to develop compositional schedulability analysis techniques for such CPSs. In this paper, the authors describe...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Structural Integrity: Safety in Miniature Technology

    Micro-Electro-Mechanical-Systems (MEMS) are positioned to be fundamental components in future cyber-physical systems, by allowing deeply embedded systems to interact with the physical environment. Widespread availability of devices such as accelerometers, gyroscopes, pressure transducers, and even complex arrays of thousands of micromirrors, enables system miniaturization and mobility at unprecedented levels. Despite...

    Provided By University of Vigo

  • White Papers // Aug 2007

    xTune: Online Verifiable Cross-Layer Adaptation for Distributed Real-Time Embedded Systems

    Adaptive resource management is critical to ensuring the quality of real-time multimedia communication, particularly for energy-constrained mobile handheld devices. In this context, a holistic cross-layer optimization considering multiple layers (e.g., application, middleware, operating system) needs to be developed for continuous adaptation of system parameters. This paper proposes a unified framework...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Real-time Analysis of Resource-Constrained Distributed Systems by Simulation-Guided Model Checking

    As real-time systems are becoming increasingly distributed and embedded, designers need to address a growing number of QoS constraints that have traditionally been relevant to hardware design, such as real-time properties, end-to-end performance and energy consumption. This paper proposes a model-based design flow for the dynamic real-time analysis of resource-constrained...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Design Suite for Deeply Embedded Cyber Physical Systems

    Many emerging applications are deployed in harsh environments and must operate dependably, efficiently and in real-time. This paper makes it essential to develop robust system designs before deployment. Thus, there is a tremendous need for a complete design suite for deeply embedded cyber physical systems that will enable the designers...

    Provided By University of Vigo

  • White Papers // Nov 2007

    CPS-IP: Cyber Physical Systems Interconnection Protocol

    As sensing, wireless communication, and embedded computing technologies evolve, more and more special-purpose cyber physical systems are emerging in the users' daily lives, such as mobile tracking and health care system, emplaced environmental monitoring systems, and building maintenance control systems. In these systems, heterogeneity is a fundamental research issue. To...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Towards Verifiable Deeply Embedded Systems

    An important class of Deeply Embedded Systems (DES) involves interlocking cyber-physical control loops, each with its own dynamics and correctness constraints. For instance, in medical systems which monitor a patient's vital signs and control drug infusion rates, multiple sensing and control systems may be implicitly coupled. These systems present new...

    Provided By University of Vigo

  • White Papers // Nov 2007

    A Hybrid Framework for Resource Verification in Executable Model-Based Embedded System Development

    Model-based development has focused on verification and testing for functional or timing aspects, yet embedded software also involves para-functional resource-related aspects, termed resource (bound) properties. In this paper, the authors consider the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems....

    Provided By University of Vigo

  • White Papers // Dec 2006

    Bringing Embedded Software Closer to Computer Science Students

    Computer Science (CS) students have often shied away from the field of embedded systems owing to their perception of this area as \"Hardware\" oriented, not without reason. But recent trends in embedded systems, with the growing importance of the software component, has brought about new opportunities for computer science students...

    Provided By University of Vigo

  • White Papers // Dec 2006

    Incorporating Embedded Programming Skills into an ECE Curriculum

    In this paper, the typical Electrical and Computer Engineering (ECE) curriculum is examined to determine its effectiveness at presenting embedded programming skills. The software concepts and programming techniques necessary for embedded systems are somewhat different than those seen in other engineering domains. Thus, it makes sense to specifically address embedded...

    Provided By University of Vigo

  • White Papers // Dec 2006

    Hardware Platform Design Decisions in Embedded Systems - A Systematic Teaching Approach

    Designers of embedded systems can choose between a large varieties of different hardware platforms. The question often arising is which hardware platform is suited best for a certain application. This decision is usually made by an expert in industry being familiar with a variety of hardware platforms. Therefore, it is...

    Provided By University of Vigo

  • White Papers // Jul 2006

    Towards Formally Verifiable Resource Bounds for Real-Time Embedded Systems

    In this paper, the authors describe ongoing work aimed at the construction of formal cost models and analyses that are capable of producing verifiable guarantees of resource usage (space, time and ultimately power consumption) in the context of real-time embedded systems. Their paper is conducted in terms of the domain-specific...

    Provided By University of Vigo

  • White Papers // Jul 2006

    Research Trends in Real-Time Computing for Embedded Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence, embedded systems...

    Provided By University of Vigo

  • White Papers // Jan 2006

    Parallel Task Scheduling on Multicore Platforms

    Multicore architectures, which include several processors on a single chip, are being widely touted as a solution to thermal and power problems currently limiting single-core designs. In most proposed multicore platforms, different cores share either on- or off-chip caches. The authors propose a scheduling method for real-time systems implemented on...

    Provided By University of Vigo

  • White Papers // Jun 2008

    Financial Constraints: Source Of Output And TFP Gaps In Latin America?

    Earlier studies have shown that a combination of high intermediation costs, poor contract enforcement, and high levels of inequality reduce long-run productivity and output levels. The authors present evidence showing that all these factors have been more favorable to East Asian economies in a direct comparison with Latin America over...

    Provided By University of Vigo

  • White Papers // Feb 2011

    Detection Diversity of Multiantenna Spectrum Sensors

    Spectrum sensing is a key task in the Cognitive Radio (CR) paradigm in order to limit harmful interference to licensed users of the frequency band. By using multiple antennas (either co-located or spatially distributed), the sensing system can substantially improve its detection performance. In order to quantify and compare the...

    Provided By University of Vigo

  • White Papers // Oct 2010

    Multiantenna Detection Under Noise Uncertainty and Primary User's Spatial Structure

    Spectrum sensing is a challenging key component of the Cognitive Radio paradigm, since primary signals must be detected in the face of noise uncertainty and at Signal-to-Noise Ratios (SNRs) well below decodability levels. Multiantenna detectors exploit spatial independence of receiver thermal noise to boost detection performance and robustness. Here, the...

    Provided By University of Vigo

  • White Papers // Feb 2010

    Multiantenna Spectrum Sensing for Cognitive Radio: Overcoming Noise Uncertainty

    Spectrum sensing is a key ingredient of the dynamic spectrum access paradigm, but it needs powerful detectors operating at SNRs well below the decodability levels of primary signals. Noise uncertainty poses a significant challenge to the development of such schemes, requiring some degree of diversity (spatial, temporal, or in distribution)...

    Provided By University of Vigo

  • White Papers // Apr 2010

    On the Impact of Primary User Localization on Rrate Performance of CR Systems

    This paper investigates how localization knowledge of primary users impacts the sum-rate performance of a secondary system in an underlay cognitive radio setting. Two different probabilistic models for the primary users' location information are assumed, one uniform distribution and the other with Gaussian distribution. The interplay between the achievable rate...

    Provided By University of Vigo

  • White Papers // May 2012

    Link Allocation, Routing and Scheduling of FSO Augmented RF Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are designed to provide broadband wireless services; however, capacities of WMNs are fundamentally limited in bandwidth because of the scarcity of RF spectral resources. A solution is to design a WMN using multiple wireless technologies. Since the optical spectrum remains unlicensed and under-utilized, the authors propose...

    Provided By University of Vigo

  • White Papers // May 2012

    Minimizing Transponder Cost for Two-Way Data Exchange in Satellite Networking

    Two-way satellite communication that simultaneously shares spectrum, with subsequent interference cancelation, is an attractive means of efficiently using satellite resources. Systems may employ this method on full-transponder access, or with lease of a partial transponder. In this case, it is of interest to request bandwidth and power resources that minimize...

    Provided By University of Vigo

  • White Papers // Jan 2012

    Feedback Control With Queueing-Theoretic Prediction for Relative Delay Guarantees in Web Servers

    The use of feedback control theory for performance guarantees in QoS-aware systems has gained much attention in recent years. In this paper, they authors investigate merging, within a single framework, the predictive power of queueing theory with the reactive power of feedback control to produce software systems with a superior...

    Provided By University of Vigo