ACM International Conference on Embedded Software, EMSOFT 2016 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Modular deductive verification of sampled-data systems

Daniel Ricketts, Gregory Malecha, Sorin Lerner

Modular deductive verification of sampled-data systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lessons learned on assumptions and scalability with time-aware instrumentation

Guy Martin Tchamgoue, Sebastian Fischmeister

Lessons learned on assumptions and scalability with time-aware instrumentation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Schedulability analysis of mixed-criticality systems with multiple frequency specifications

Sanjoy Baruah

Schedulability analysis of mixed-criticality systems with multiple frequency specifications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Author has verified information

The SMT-based automatic road network generation in vehicle simulation environment

BaekGyu Kim, Akshay Jarandikar, Jonathan Shum, Shinichi Shiraishi, Masahiro Yamaura

The SMT-based automatic road network generation in vehicle simulation environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

A fast, lightweight, and reliable file system for wireless sensor networks

Biswajit Mazumder, Jason O. Hallstrom

A fast, lightweight, and reliable file system for wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Underminer: a framework for automatically identifying non-converging behaviors in black box system models

Ayca Balkan, Paulo Tabuada, Jyotirmoy V. Deshmukh, Xiaoqing Jin, James Kapinski

Underminer: a framework for automatically identifying non-converging behaviors in black box system models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Synthesizing time-triggered schedules for switched networks with faulty links

Guy Avni, Shibashis Guha, Guillermo Rodríguez-Navas

Synthesizing time-triggered schedules for switched networks with faulty links

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring the performance of ROS2

Yuya Maruyama, Shinpei Kato, Takuya Azumi

Exploring the performance of ROS2

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real-time cache management for multi-core virtualization

Hyoseung Kim, Ragunathan Rajkumar

Real-time cache management for multi-core virtualization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy and timing aware synchronous programming

Jia Jie Wang, Partha S. Roop, Alain Girault

Energy and timing aware synchronous programming

Details
Discussion Comments: 0
Verification: Authors have not verified information

A refinement theory for timed-dataflow analysis with support for reordering

Joost P. H. M. Hausmans, Marco Jan Gerrit Bekooij

A refinement theory for timed-dataflow analysis with support for reordering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making DDS really real-time with openflow

Hyon-Young Choi, Andrew L. King, Insup Lee

Making DDS really real-time with openflow

Details
Discussion Comments: 0
Verification: Authors have not verified information

An algorithmic approach to global asymptotic stability verification of hybrid systems

Pavithra Prabhakar, Miriam Garcia Soto

An algorithmic approach to global asymptotic stability verification of hybrid systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

PCFIRE: towards provable <u>p</u>reventative <u>c</u>ontrol-<u>f</u>low <u>i</u>ntegrity enforcement for <u>r</u>ealistic <u>e</u>mbedded software

Jiaqi Tan, Hui Jun Tay, Utsav Drolia, Rajeev Gandhi, Priya Narasimhan

PCFIRE: towards provable <u>p</u>reventative <u>c</u>ontrol-<u>f</u>low <u>i</u>ntegrity enforcement for <u>r</u>ealistic <u>e</u>mbedded software

Details
Discussion Comments: 0
Verification: Authors have not verified information

On-the-fly fast overrun budgeting for mixed-criticality systems

Biao Hu, Kai Huang, Pengcheng Huang, Lothar Thiele, Alois Knoll

On-the-fly fast overrun budgeting for mixed-criticality systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

RMC: an integrated runtime system for adaptive many-core computing

Jinsu Park, Eunbi Cho, Woongki Baek

RMC: an integrated runtime system for adaptive many-core computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

I/O scheduling with mapping cache awareness for flash based storage systems

Cheng Ji, Chao Wu, Li-Pin Chang, Liang Shi, Chun Jason Xue

I/O scheduling with mapping cache awareness for flash based storage systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flexible support for time and costs in scenario-aware dataflow

Arnd Hartmanns, Holger Hermanns, Michael Bungert

Flexible support for time and costs in scenario-aware dataflow

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifying cyber-physical systems by combining software model checking with hybrid systems reachability

Stanley Bak, Sagar Chaki

Verifying cyber-physical systems by combining software model checking with hybrid systems reachability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Darboux-type barrier certificates for safety verification of nonlinear hybrid systems

Xia Zeng, Wang Lin, Zhengfeng Yang, Xin Chen, Lilei Wang

Darboux-type barrier certificates for safety verification of nonlinear hybrid systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Locally optimal reach set over-approximation for nonlinear systems

Chuchu Fan, James Kapinski, Xiaoqing Jin, Sayan Mitra

Locally optimal reach set over-approximation for nonlinear systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

The design of an efficient swap mechanism for hybrid DRAM-NVM systems

Xianzhang Chen, Edwin Hsing-Mean Sha, Weiwen Jiang, Qingfeng Zhuge, Junxi Chen, Jiejie Qin, Yuansong Zeng

The design of an efficient swap mechanism for hybrid DRAM-NVM systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic HAL generation for embedded multiprocessor systems

Merten Popp, Orlando Moreira, Wim Yedema, Menno Lindwer

Automatic HAL generation for embedded multiprocessor systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cache-related preemption delay analysis for multi-level inclusive caches

Zhenkai Zhang, Xenofon D. Koutsoukos

Cache-related preemption delay analysis for multi-level inclusive caches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust controller synthesis of switched systems using counterexample guided framework

Hadi Ravanbakhsh, Sriram Sankaranarayanan

Robust controller synthesis of switched systems using counterexample guided framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

A flattened hierarchical scheduler for real-time virtualization

Michael Drescher, Vincent Legout, Antonio Barbalace, Binoy Ravindran

A flattened hierarchical scheduler for real-time virtualization

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information