Academia.eduAcademia.edu

Distributed Embedded Systems

description51 papers
group123 followers
lightbulbAbout this topic
Distributed Embedded Systems are networks of interconnected embedded devices that collaborate to perform tasks. These systems operate autonomously, often in real-time, and are designed to communicate and coordinate with each other over a network, enabling complex functionalities while maintaining constraints on resources such as power, memory, and processing capabilities.
lightbulbAbout this topic
Distributed Embedded Systems are networks of interconnected embedded devices that collaborate to perform tasks. These systems operate autonomously, often in real-time, and are designed to communicate and coordinate with each other over a network, enabling complex functionalities while maintaining constraints on resources such as power, memory, and processing capabilities.
As software production achieves a growing importance in the embedded systems world, quality evaluation of embedded software and its impact on physical properties of embedded systems becomes increasingly relevant. Although there are tools... more
The paper presents test-bed experiments for evaluation of Web services implementation for ARM-based embedded system running embedded Linux 2.6. The gSOAP Web services generation toolkit optimized for embedded devices is used. Security is... more
This paper discusses the hierarchical manufacturing approach and distributed model used by embedded systems for monitoring of particular environment's parameters. A set of sensors for the different nature of measurements could be... more
branch Plovdiv. The presented experimental results provide a base data for evaluation of the leaks and performance of the example implementation. The experiments are monitored and analyzed using specially built MS .NET application. The... more
The paper deals with embedded networking and distributed embedded systems, which is a key area of research over the last years. It presents a custom protocol for data access in embedded devices -CNDEP (Controller Network Data Extracting... more
The paper discusses the application of Network Simulator (NS-2) in simulation of Internet-based distributed embedded systems. It envisions the pros and cons of NS-2 as a simulation tool for distributed embedded systems and suggests some... more
Sorting is an important operation for a number of embedded applications. As sorting large datasets may impose undesired performance degradation, acceleration units coupled to the embedded processor can be an interesting solution for... more
Connection mechanisms are critical to many modular reconfigurable systems. This paper introduces the Mod-Lock manual connection system which is both easy and fast to attach/detach (requires seconds) as well as strong (failure at 2.2kN... more
We consider scheduling distributable real-time threads with dependencies (e.g, due to synchronization) in partially synchronous systems in the presence of node failure. We present a distributed real-time scheduling algorithm called DQBUA.... more
The adoption of model-driven engineering in the automotive domain resulted in the standardization of a layered architectural description language, namely EAST-ADL, which provides means for enforcing abstraction and separation of concerns,... more
The paper deals with embedded networking and distributed embedded systems, which is a key area of research over the last years. It presents a custom protocol for data access in embedded devices-CNDEP (Controller Network Data Extracting... more
We consider scheduling distributable real-time threads with dependencies (e.g, due to synchronization) in partially synchronous systems in the presence of node failure. We present a distributed real-time scheduling algorithm called DQBUA.... more
Thinking of distributed embedded systems (DES)—let alone the more general area of embedded computing—as a unified topic is difficult. Nevertheless, it is a vastly important topic and potentially represents a revolution in information... more
Connection mechanisms are critical to many modular reconfigurable systems. This paper introduces the Mod-Lock manual connection system which is both easy and fast to attach/detach (requires seconds) as well as strong (failure at 2.2kN... more
Resumen. El presente artículo trata sobre el diseño e implementación de una orquesta sinfónica distribuida haciendo uso del paquete de Lego Mindstorms, como proyecto final enmarcado dentro de la asignatura Sistemas Empotrados... more
The paper presents test-bed experiments for evaluation of Web services implementation for ARM-based embedded system running embedded Linux 2.6. The gSOAP Web services generation toolkit optimized for embedded devices is used. Security is... more
This Project consists of a development of an electronics system to manipulate a snake like robot in a modular way. The structure of this project is based on three topics; The Hardware and its Firmware, The Mathematical Analysis of the... more
Decision tree classification (DTC) is a widely used technique in data mining algorithms known for its high accuracy in forecasting. As technology has progressed and available storage capacity in modern computers increased, the amount of... more
The paper discusses the application of Network Simulator (NS-2) in simulation of Internet-based distributed embedded systems. It envisions the pros and cons of NS-2 as a simulation tool for distributed embedded systems and suggests some... more
As software production achieves a growing importance in the embedded systems world, quality evaluation of embedded software and its impact on physical properties of embedded systems becomes increasingly relevant. Although there are tools... more
Distributed embedded systems involve communication in various layers, and therefore their design is more difficult than of single embedded systems. This paper presents how communication exploration can be done in a design process of... more
This paper discusses the hierarchical manufacturing approach and distributed model used by embedded systems for monitoring of particular environment's parameters. A set of sensors for the different nature of measurements could be... more
The paper deals with embedded networking and distributed embedded systems, which is a key area of research over the last years. It presents a custom protocol for data access in embedded devices -CNDEP (Controller Network Data Extracting... more
Approaching the limits of scaling down of CMOS circuits where transistors can switch faster and faster transmitting information between different areas of an integrated circuit has great importance. The speed of signals are determined by... more
The end-to-end response-time and delay analysis can verify timing requirements specified on vehicular distributed embedded systems without performing exhaustive testing. For this purpose, the timin ...
In this paper the design and construction of a 3D printed snake robot is presented. This snake robot has been designed to be able to complete a wide variety of tasks and motions that other snake robots are currently able to preform, such... more
As software production achieves a growing importance in the embedded systems world, quality evaluation of embedded software and its impact on physical properties of embedded systems becomes increasingly relevant. Although there are tools... more
As software production achieves a growing importance in the embedded systems world, quality evaluation of embedded software and its impact on physical properties of embedded systems becomes increasingly relevant. Although there are tools... more
As software production achieves a growing importance in the embedded systems world, quality evaluation of embedded software and its impact on physical properties of embedded systems becomes increasingly relevant.
Communication-induced checkpointing protocols constitute an interesting approach to the on-line determination of checkpoint and communication patterns enjoying desirable properties such as domino-effect freedom. They do not add control... more
Communication-induced checkpointing protocols constitute an interesting approach to the on-line determination of checkpoint and communication patterns enjoying desirable properties such as domino-effect freedom. They do not add control... more
A useless checkpoint is a local checkpoint that cannot be part of a consistent global checkpoint. This paper addresses the following important problem. Given a set of processes that take (basic) local checkpoints in an independent and... more
Communication-induced checkpointing protocols constitute an interesting approach to the on-line determination of checkpoint and communication patterns enjoying desirable properties such as domino-effect freedom. They do not add control... more
A useless checkpoint is a local checkpoint that cannot be part of a consistent global checkpoint. This paper addresses the following important problem. Given a set of processes that take (basic) local checkpoints in an independent and... more
In order to save time and improve efficiency, all SoC development processes are separated into many parallel flows. These flows should keep a strong communication to avoid redundancy and incoherency. We distinguish two main trends. One... more
Grid and peer-to-peer computing are becoming pervasive. Every night personal computers are sharing files, cracking encryption codes and searching for aliens. Wireless devices and users will join the grid, changing grid infrastructure... more
Reconfiguration-Based Fault-Tolerance is one approach for developing dependable safety-critical embedded applications. This approach, compared to traditional hardware and software redundancy, is a promising technique that may achieve the... more
Distributed embedded systems involve communication in various layers, and therefore their design is more difficult than of single embedded systems. This paper presents how communication exploration can be done in a design process of... more
This paper describes the VHDL design of a sorting algorithm, aiming at defining an elementary sorting unit as a building block of VLSI devices which require a huge number of sorting units. As such, an attempt was made to reach a... more
When natural disasters like flooding, hurricanes, wildfires, there are situations where people get trapped and in many cases nobody can get into that areas for rescue. There comes the need for smaller, reconfigurable and modular robots to... more
Much work on self-reconfigurable robotics has been focused on motion planning and physical reconfiguration of the robot. Using the reconfigurable robot, we focus on the details of realizing locomotion gaits given that a single robot... more
SUMMARY This paper presents the results derived from our survey on metrics used in object- oriented environments. Our survey includes a small set of the most well known and commonly applied traditional software metrics which could be... more
We consider scheduling distributable real-time threads with dependencies (e.g, due to synchronization) in partially synchronous systems in the presence of node failure. We present a distributed real-time scheduling algorithm called DQBUA.... more
In order to save time and improve efficiency, all SoC development processes are separated into many parallel flows. These flows should keep a strong communication to avoid redundancy and incoherency. We distinguish two main trends. One... more
In last few years, Dynamic metrics was hot area of research in software engineering. A number of studies have explored how dynamic analysis can measure the quality of Object Oriented Software. Most of the studies utilized dynamic... more
We consider scheduling distributable real-time threads with dependencies (e.g, due to synchronization) in partially synchronous systems in the presence of node failure. We present a distributed real-time scheduling algorithm called DQBUA.... more
Maintenance of software is risky, potentially expensive -and inevitable. The main objective of this study is to examine the relationship of code change, referred to as maintenance effort, with source-level software metrics. This approach... more
A useless checkpoint is a local checkpoint that cannot be part of a consistent global checkpoint. This paper addresses the following important problem. Given a set of processes that take (basic) local checkpoints in an independent and... more
Communication-induced checkpointing protocols constitute an interesting approach to the on-line determination of checkpoint and communication patterns enjoying desirable properties such as domino-effect freedom. They do not add control... more
Download research papers for free!