Issue Downloads
Development Automation of Real-Time Java: Model-Driven Transformation and Synthesis
Many applications in emerging scenarios, such as autonomous vehicles, intelligent robots, and industrial automation, are safety-critical with strict timing requirements. However, the development of real-time systems is error prone and highly dependent ...
SPECTRUM: A Software-defined Predictable Many-core Architecture for LTE/5G Baseband Processing
Wireless communication standards such as Long-term Evolution (LTE) are rapidly changing to support the high data-rate of wireless devices. The physical layer baseband processing has strict real-time deadlines, especially in the next-generation ...
Dealing with Uncertainty in pWCET Estimations
The problem of estimating a tight and safe Worst-Case Execution Time (WCET), needed for certification in safety-critical environment, is a challenging problem for modern embedded systems. A possible solution proposed in past years is to exploit ...
GMAI: Understanding and Exploiting the Internals of GPU Resource Allocation in Critical Systems
Critical real-time systems require strict resource provisioning in terms of memory and timing. The constant need for higher performance in these systems has led industry to recently include GPUs. However, GPU software ecosystems are by their nature ...
Crab-tree: A Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture
In recent years, the next-generation non-volatile memory (NVM) technologies have emerged with DRAM-like byte addressability and disk-like durability. Computer architects have proposed to use them to build persistent memory that blurs the conventional ...
TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems
This article addresses the challenges of memory safety in life-critical medical devices. Since the last decade, healthcare manufacturers have embraced the Internet of Things, pushing technological innovations to increase market share. Medical devices, ...
Formal Verification of Spacecraft Control Programs
Verification of correctness of control programs is an essential task in the development of space electronics; it is difficult and typically outweighs design and programming tasks in terms of development hours. This article presents a verification ...
Hardware Performance Counter-Based Fine-Grained Malware Detection
Detection of malicious programs using hardware-based features has gained prominence recently. The tamper-resistant hardware metrics prove to be a better security feature than the high-level software metrics, which can be easily obfuscated. Hardware ...
PANDORA: An Architecture-Independent Parallelizing Approximation-Discovery Framework
In this article, we introduce a parallelizing approximation-discovery framework, PANDORA, for automatically discovering application- and architecture-specialized approximations of provided code. PANDORA complements existing compilers and runtime ...
Approximate Cache in GPGPUs
There is a growing number of application domains ranging from multimedia to machine learning where a certain level of inexactness can be tolerated. For these applications, approximate computing is an effective technique that trades off some loss in ...