Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 19, Issue 5September 2020Special Issue on LCETES, Part 1, Real-Time, Critical Systems, and Approximation
Reflects downloads up to 02 Mar 2025Bibliometrics
Skip Table Of Content Section
SECTION: Real-Time
research-article
Development Automation of Real-Time Java: Model-Driven Transformation and Synthesis
Article No.: 31, Pages 1–26https://doi.org/10.1145/3391897

Many applications in emerging scenarios, such as autonomous vehicles, intelligent robots, and industrial automation, are safety-critical with strict timing requirements. However, the development of real-time systems is error prone and highly dependent ...

research-article
SPECTRUM: A Software-defined Predictable Many-core Architecture for LTE/5G Baseband Processing
Article No.: 32, Pages 1–28https://doi.org/10.1145/3400032

Wireless communication standards such as Long-term Evolution (LTE) are rapidly changing to support the high data-rate of wireless devices. The physical layer baseband processing has strict real-time deadlines, especially in the next-generation ...

research-article
Dealing with Uncertainty in pWCET Estimations
Article No.: 33, Pages 1–23https://doi.org/10.1145/3396234

The problem of estimating a tight and safe Worst-Case Execution Time (WCET), needed for certification in safety-critical environment, is a challenging problem for modern embedded systems. A possible solution proposed in past years is to exploit ...

SECTION: Critical Systems
research-article
GMAI: Understanding and Exploiting the Internals of GPU Resource Allocation in Critical Systems
Article No.: 34, Pages 1–23https://doi.org/10.1145/3391896

Critical real-time systems require strict resource provisioning in terms of memory and timing. The constant need for higher performance in these systems has led industry to recently include GPUs. However, GPU software ecosystems are by their nature ...

research-article
Crab-tree: A Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture
Article No.: 35, Pages 1–26https://doi.org/10.1145/3396236

In recent years, the next-generation non-volatile memory (NVM) technologies have emerged with DRAM-like byte addressability and disk-like durability. Computer architects have proposed to use them to build persistent memory that blurs the conventional ...

research-article
TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems
Article No.: 36, Pages 1–26https://doi.org/10.1145/3398327

This article addresses the challenges of memory safety in life-critical medical devices. Since the last decade, healthcare manufacturers have embraced the Internet of Things, pushing technological innovations to increase market share. Medical devices, ...

research-article
Formal Verification of Spacecraft Control Programs
Article No.: 37, Pages 1–18https://doi.org/10.1145/3391900

Verification of correctness of control programs is an essential task in the development of space electronics; it is difficult and typically outweighs design and programming tasks in terms of development hours. This article presents a verification ...

research-article
Hardware Performance Counter-Based Fine-Grained Malware Detection
Article No.: 38, Pages 1–17https://doi.org/10.1145/3403943

Detection of malicious programs using hardware-based features has gained prominence recently. The tamper-resistant hardware metrics prove to be a better security feature than the high-level software metrics, which can be easily obfuscated. Hardware ...

SECTION: Approximation
research-article
PANDORA: An Architecture-Independent Parallelizing Approximation-Discovery Framework
Article No.: 39, Pages 1–17https://doi.org/10.1145/3391899

In this article, we introduce a parallelizing approximation-discovery framework, PANDORA, for automatically discovering application- and architecture-specialized approximations of provided code. PANDORA complements existing compilers and runtime ...

research-article
Approximate Cache in GPGPUs
Article No.: 40, Pages 1–22https://doi.org/10.1145/3407904

There is a growing number of application domains ranging from multimedia to machine learning where a certain level of inexactness can be tolerated. For these applications, approximate computing is an effective technique that trades off some loss in ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Subjects