You are previewing Advancing Embedded Systems and Real-Time Communications with Emerging Technologies.
O'Reilly logo
Advancing Embedded Systems and Real-Time Communications with Emerging Technologies

Book Description

Embedded systems and real-time computing can be useful tools for a variety of applications. Further research developments in this field can assist in promoting the future development of these technologies for various applications. Advancing Embedded Systems and Real-Time Communications with Emerging Technologies discusses embedded systems, communication system engineering, and real-time systems in an integrated manner. This research book includes advancements in the fields of computer science, computer engineering, and telecommunication engineering in regard to how they are used in embedded and real-time systems for communications purposes. With its practical and theoretical research, this book is an essential reference for academicians, students, researchers, practitioners, and IT professionals.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Preface
  6. Acknowledgment
  7. Section 1: Technology Review
    1. Chapter 1: Self-Adaptive SoCs for Dependability
      1. ABSTRACT
      2. INTRODUCTION
      3. DEPENDABILITY AND SELF-ADAPTIVITY: OVERVIEW
      4. THREATS TO SOC’s DEPENDABILITY
      5. SELF-ADAPTIVE ARCHITECTURES AND TECHNIQUES
      6. SUMMARY AND FUTURE PERSPECTIVES
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Security Issues in Tactical Software-Defined Radios
      1. ABSTRACT
      2. INTRODUCTION
      3. SOFTWARE COMMUNICATIONS ARCHITECTURE (SCA)
      4. ATTACKS, VULNERABILITIES AND THREATS
      5. CLASSES OF ATTACKS FOR GENERAL TACTICAL SDRS
      6. MITIGATION MEASURES
      7. SCA IMPACTS
      8. CASE STUDIES
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Interference and Spoofing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: THREATS CLASSIFICATION
      4. INTERFERENCE MONITORING, DETECTION AND MITIGATION TECHNIQUES
      5. SPOOFING DETECTION
      6. COMPLEXITY TRADEOFF
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
  8. Section 2: Innovations for Wireless Networks and Positioning
    1. Chapter 4: A Multi-Hop Software Update Method for Resource Constrained Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. PIDP DESIGN
      5. IMPLEMENTATION
      6. EVALUATION
      7. COMPARISON
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 5: Asymmetric Link Routing in Location-Aware Mobile Ad-Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. CHARACTERISTICS OF ASYMMETRIC LINKS IN WIRELESS NETWORKS
      4. ASYMMETRIC LINK ROUTING IN LOCATION-AWARE MOBILE ENVIRONMENTS
      5. ASYMMETRIC GEOGRAPHIC FORWARDING (A-GF)
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
      9. ENDNOTES
    3. Chapter 6: Implementation Strategies for High-Performance Multiuser MIMO Precoders
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TREE-SEARCH TECHNIQUES FOR VECTOR PRECODING
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 7: Information Filter-Assisted Indoor Bluetooth Positioning
      1. ABSTRACT
      2. INTRODUCTION
      3. SYSTEM DESCRIPTION
      4. INFORMATION FILTERING WITH VELOCITY DETECTION
      5. EXPERIMENTS
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    5. Chapter 8: Analysis of Real-Time Hybrid-Cooperative GNSS-Terrestrial Positioning Algorithms
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  9. Section 3: System Specification and Modeling
    1. Chapter 9: Co-Modeling of Embedded Networks Using SystemC and SDL
      1. ABSTRACT
      2. INTRODUCTION
      3. EMBEDDED SYSTEMS DESIGN FLOW
      4. OVERVIEW OF THE SYSTEMC MODELING LANGUAGE
      5. OVERVIEW OF SDL MODELING LANGUAGE
      6. OVERVIEW OF RELATED STUDIES
      7. THE SDL→SYSTEMC CO-MODELING APPROACH
      8. TESTER FOR THE PROTOCOL STACK MODELING
      9. NETWORK SIMULATION ON THE BASIS OF SDL/SYSTEMC CO-MODELING
      10. CONCLUSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    2. Chapter 10: Model-Based Testing of Highly Configurable Embedded Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. EXAMPLE CASE STUDIES
      4. TEST ENVIRONMENT
      5. MODEL-BASED TESTING PROCESS FOR EMBEDDED DEVICES
      6. PARAMETER MODELING
      7. FEATURE MODEL
      8. GENERIC TEST MODELING
      9. AUTOMATED GENERATION OF TEST CASES
      10. TEST CASE EXECUTION AND ANALYSIS OF RESULTS
      11. EVALUATION OF THE APPROACH
      12. RELATED WORK
      13. SUMMARY AND OUTLOOK
      14. REFERENCES
      15. ADDITIONAL READING
      16. KEY TERMS AND DEFINITIONS
    3. Chapter 11: On Parallel Online Learning for Adaptive Embedded Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. ALGORITHM DESCRIPTIONS
      4. EXPERIMENTS
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    4. Chapter 12: Classification-Based Optimization of Dynamic Dataflow Programs
      1. ABSTRACT
      2. INTRODUCTION
      3. DATAFLOW PROGRAMMING
      4. CASE STUDY: RECONFIGURABLE VIDEO CODING
      5. ACTOR CLASSIFICATION
      6. EXECUTION OF DYNAMIC DATAFLOW PROGRAMS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    5. Chapter 13: Hierarchical Agent-Based Monitoring Systems for Dynamic Reconfiguration in NoC Platforms
      1. ABSTRACT
      2. INTRODUCTION
      3. AGENT-BASED MONITORING SYSTEM FOR NOC PLATFORMS
      4. THE EVENT-B FORMALISM
      5. PROPOSED APPROACH
      6. SUMMARY OF THE DEVELOPMENT
      7. DISCUSSION
      8. RELATED WORK
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
  10. Section 4: Technologies for Network-On-Chip
    1. Chapter 14: System-Level Analysis of MPSoCs with a Hardware Scheduler
      1. ABSTRACT
      2. INTRODUCTION
      3. RUNTIME MANAGEMENT
      4. OSIP-BASED MPSOCS
      5. COMMUNICATION OVERHEAD: OSIP BASELINE SYSTEMS
      6. INTERCONNECT ENHANCEMENTS AND PERFORMANCE ANALYSIS
      7. OSIP-CENTRIC SYSTEM LEVEL ANALYSIS
      8. CONCLUSION AND OUTLOOK
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 15: Efficiency Analysis of Approaches for Temperature Management and Task Mapping in Networks-on-Chip
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. SIMULATION ENVIRONMENT
      5. THERMAL-AWARE TASK MAPPING
      6. EXPERIMENTS AND RESULTS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITONS
    3. Chapter 16: Wearout and Variation Tolerant Source Synchronous Communication for GALS Network-on-Chip Design
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. TARGET GALS PLATFORM AND MOTIVATION
      5. ARCHITECTURE OF THE VARIATION DETECTOR
      6. ARCHITECTURE INTEGRATION
      7. DESIGN GUIDELINES
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    4. Chapter 17: Silicon Validation of GALS Methods and Architectures in a State-of-the-Art CMOS Process
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: GALS SYSTEMS AND DEMONSTRATORS
      4. MOONRAKE CHIP
      5. FUTURE OF GALS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors