Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
A UAV absolute visual localization method for embedded devices
CNCIT '24: Proceedings of the 2024 3rd International Conference on Networks, Communications and Information TechnologyPages 57–61https://doi.org/10.1145/3672121.3672133UAV usually combines the Global Navigation Satellite System (GNNS) and the Inertial Navigation System (INS) to realize real-time localization and navigation. However, UAVs may lose GNSS signals due to complex terrain environments and electronic ...
- research-articleMay 2024
Binary Folding Compression for Efficient Software Distribution
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 169–176https://doi.org/10.1145/3605098.3636006This paper presents a simple yet effective approach for compressing binary files by detecting and folding similar patterns. Until now, methods for compressing these files were mostly limited to compiler optimization and traditional compression tools. ...
- research-articleApril 2024
YoseUe: "Trimming" Random Forest's Training Towards Resource-Constrained Inference
ASPDAC '24: Proceedings of the 29th Asia and South Pacific Design Automation ConferencePages 32–37https://doi.org/10.1109/ASP-DAC58780.2024.10473804Endowing artificial objects with intelligence is a longstanding computer science and engineering vision that recently converged under the umbrella of Artificial Intelligence of Things (AIoT). Nevertheless, AIoT's mission cannot be fulfilled if objects ...
- ArticleDecember 2023
Face to Face with Efficiency: Real-Time Face Recognition Pipelines on Embedded Devices
Advances in Mobile Computing and Multimedia IntelligencePages 129–143https://doi.org/10.1007/978-3-031-48348-6_11AbstractWhile real-time face recognition has become increasingly popular, its use in decentralized systems and on embedded hardware presents numerous challenges. One challenge is the trade-off between accuracy and inference-time on constrained hardware ...
- research-articleOctober 2023
Performance Evaluation of CNN-based Object Detectors on Embedded Devices
DIVANet '23: Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and ApplicationsPages 55–60https://doi.org/10.1145/3616392.3623417Computer-vision algorithms have been used to enhance hands-free user interactions with smart systems. Traditional approaches for object and gesture detection and recognition are through the processing of video frames by convolutional neural networks (...
-
- ArticleJuly 2023
CEFI: Command Execution Flow Integrity for Embedded Devices
Detection of Intrusions and Malware, and Vulnerability AssessmentPages 235–255https://doi.org/10.1007/978-3-031-35504-2_12AbstractAs embedded devices are widely used in increasingly complex settings (e.g., smart homes and industrial control systems), one device is usually connected with multiple entities, such as mobile apps and the cloud. Recent research has shown that ...
- research-articleJune 2023
LUNAR: A Native Table Engine for Embedded Devices
LCTES 2023: Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded SystemsPages 122–133https://doi.org/10.1145/3589610.3596276Embedded systems have evolved tremendously in recent years. We perform a study on SQLite and find that the multiple layers of abstraction drastically reduce bandwidth utilization. To minimize the bandwidth loss in the I/O path, we propose Lunar, a ...
- abstractJune 2023
Discovering Denial Constraints Using Boolean Patterns
SIGMOD '23: Companion of the 2023 International Conference on Management of DataPages 281–283https://doi.org/10.1145/3555041.3589392Denial constraints (DCs) are at the heart of maintaining data consistency. Formulating DCs by hand is difficult and susceptible to errors. Automatically discovering DCs from data is an alternative, but this is computationally expensive due to the large ...
- short-paperJune 2023
Analysis of ECDSA's Computational Impact on IoT Network Performance
ACMSE '23: Proceedings of the 2023 ACM Southeast ConferencePages 196–200https://doi.org/10.1145/3564746.3587013The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making the IoT an attractive target for ...
- short-paperOctober 2022
TinyRL: Towards Reinforcement Learning on Tiny Embedded Devices
CIKM '22: Proceedings of the 31st ACM International Conference on Information & Knowledge ManagementPages 4985–4988https://doi.org/10.1145/3511808.3557206We observe significant interest in reinforcement learning methods for real-world sensing-control scenarios driven by the sensor data streams. However, the delay introduced to the data by the communication channels may degrade the system's performance. ...
- research-articleJanuary 2022
Real-time performance analysis of distributed multithreaded applications in a cluster of ARM-based embedded devices
International Journal of High Performance Systems Architecture (IJHPSA), Volume 11, Issue 2Pages 105–116https://doi.org/10.1504/ijhpsa.2022.127772The challenges in real-time cluster computing, particularly in computing efficiency and reliability, have evolved significantly due to the increase of Internet of Things (IoT), cloud and edge computing applications. Lately, a number of low-power and low-...
- research-articleNovember 2021
An Anti-vibration Hammer Detection Algorithm Based on Mobilenet V3 and YOLO V3
ICDLT '21: Proceedings of the 2021 5th International Conference on Deep Learning TechnologiesPages 54–58https://doi.org/10.1145/3480001.3480010Deep learning-based object detection algorithms have some limitations, such as complex network structure and high computing power requirements, which makes it difficult to meet real-time detection in transmission line inspection robots. In response to ...
- research-articleJune 2021
Design Flow and Methodology for Dynamic and Static Energy-constrained Scheduling Framework in Heterogeneous Multicore Embedded Devices
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 26, Issue 5Article No.: 36, Pages 1–18https://doi.org/10.1145/3450448With Internet of things technologies, billions of embedded devices, including smart gateways, smart phones, and mobile robots, are connected and deeply integrated. Almost all these embedded devices are battery-constrained and energy-limited systems. In ...
- research-articleMay 2021
cREAtIve: reconfigurable embedded artificial intelligence
- Poona Bahrebar,
- Leon Denis,
- Maxim Bonnaerens,
- Kristof Coddens,
- Joni Dambre,
- Wouter Favoreel,
- Illia Khvastunov,
- Adrian Munteanu,
- Hung Nguyen-Duc,
- Stefan Schulte,
- Dirk Stroobandt,
- Ramses Valvekens,
- Nick Van den Broeck,
- Geert Verbruggen
CF '21: Proceedings of the 18th ACM International Conference on Computing FrontiersPages 194–199https://doi.org/10.1145/3457388.3458857cREAtIve targets the development of novel highly-adaptable embedded deep learning solutions for automotive and traffic monitoring applications, including position sensor processing, scene interpretation based on LiDAR, and object detection and ...
- research-articleJanuary 2021
Contactless temperature measuring with low-cost embedded device using deep learning
Procedia Computer Science (PROCS), Volume 192, Issue CPages 3517–3533https://doi.org/10.1016/j.procs.2021.09.125AbstractMeasuring temperature of humans in light of the COVID-19 pandemic has become crucial in various places. Although there are already commercial systems to measure temperature contactless, we attempted to develop a deep learning based low-cost method ...
- research-articleAugust 2020
SCFMSP: static detection of side channels in MSP430 programs
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 21, Pages 1–10https://doi.org/10.1145/3407023.3407050Information leakage through side-channels poses a serious threat to the security of distributed systems. Recent research on countermeasures against side-channel attacks show that, on embedded platforms with predictable execution times, certain classes ...
- short-paperJune 2020
Beyond Base-2 Logarithmic Number Systems (WiP Paper)
LCTES '20: The 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded SystemsPages 141–145https://doi.org/10.1145/3372799.3394368Logarithmic number systems (LNS) reduce hardware complexity for multiplication and division in embedded systems, at the cost of more complicated addition and subtraction. Existing LNS typically use base-2, meaning that representable numbers are some (...
- research-articleJanuary 2020
CSL: FPGA implementation of lightweight block cipher for power-constrained devices
International Journal of Information and Computer Security (IJICS), Volume 12, Issue 2-3Pages 349–377https://doi.org/10.1504/ijics.2020.105185The exploration of interconnected devices, embedded devices, sensors, and various network-connected devices helps to communicate each other and exchange communications. These devices overcome with security threats related to privacy and data exchange over ...
Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferencePages 17–27https://doi.org/10.1145/3359789.3359811Pattern matching is an important building block for many security applications, including Network Intrusion Detection Systems (NIDS). As NIDS grow in functionality and complexity, the time overhead and energy consumption of pattern matching become a ...
- research-articleMay 2019
On the use of Deep Autoencoders for Efficient Embedded Reinforcement Learning
GLSVLSI '19: Proceedings of the 2019 Great Lakes Symposium on VLSIPages 507–512https://doi.org/10.1145/3299874.3319493In autonomous embedded systems, it is often vital to reduce the amount of actions taken in the real world and energy required to learn a policy. Training reinforcement learning agents from high dimensional image representations can be very expensive and ...