Filters








248 Hits in 5.3 sec

Leveraging the Openness and Modularity of RISC-V in Space

Stefano Di Mascio, Alessandra Menicucci, Eberhard Gill, Gianluca Furano, Claudio Monteleone
2019 Journal of Aerospace Information Systems  
RISC-V is an open and modular instruction set architecture, which is rapidly growing in popularity in terrestrial applications.  ...  This paper proposes a roadmap to address present and future needs in space systems with RISC-V processors.  ...  Acknowledgments This work was supported by the European Space Agency under the NPI Program, Cobham Gaisler AB, and Delft University of Technology.  ... 
doi:10.2514/1.i010735 fatcat:b4ckmbr2uvhvzi57ltesqyiokm

On-Board Decision Making in Space with Deep Neural Networks and RISC-V Vector Processors

Stefano Di Mascio, Alessandra Menicucci, Eberhard Gill, Gianluca Furano, Claudio Monteleone
2021 Journal of Aerospace Information Systems  
The workload of DNNs for on-board image and telemetry analysis is analyzed, and the results are used to drive the preliminary design of a RISC-V vector processor to be employed as a generic platform to  ...  The design of the memory subsystem is carried out in detail to allow full exploitation of the computational resources in typically resource-constrained space systems.  ...  Acknowledgments This work was supported by the European Space Agency under the NPI Program, Cobham Gaisler AB, and Delft University of Technology.  ... 
doi:10.2514/1.i010916 fatcat:u4kjrzl7ozaihoswvdsbn2ezoa

Strategizing with Hardware Rich Open Source Ecosystems

Herve Legenvre, Ari-Pekka Hameri, Pietari Kauttu
2021 Journal of Innovation Management  
A downstream strategy aimed at carving a space in new markets requires an autocratic governance and an intellectual property policy that combine attractiveness and value capture opportunities.  ...  Our aim is to help decision makers assess the benefits and challenges associated with creating or joining such ecosystems.  ...  It is difficult to assess the risks and opportunities and the consequence as to how the company will later operate as this can be difficult to anticipate.  ... 
doi:10.24840/2183-0606_009.002_0003 fatcat:fxq4aplmlzetznxk4nbmum4q2q

The ECSEL FRACTAL Project: A Cognitive Fractal and Secure edge based on a unique Open-Safe-Reliable-Low Power Hardware Platform

Aizea Lojo, Leire Rubio, Jesus Miguel Ruano, Tania Di Mascio, Luigi Pomante, Enrico Ferrari, Ignacio Garcia Vega, Frank K. Gurkaynak, Mikel Labayen Esnaola, Vanessa Orani, Jaume Abella
2020 2020 23rd Euromicro Conference on Digital System Design (DSD)  
Cognitive advantages are brought to a resilient edge and a computing paradigm that lay down between the physical world and the cloud.  ...  The computing node will be the building block of scalable Internet of Things (from Low Computing to High Computing Edge Nodes).  ...  more research-oriented fully flexible customizable node based on RISC-V cores and acceletators for longer time-to-market exploration based on the open-source PULP (parallel ultra-low power) platform.  ... 
doi:10.1109/dsd51259.2020.00069 dblp:conf/dsd/LojoRRMPFVGEOA20 fatcat:ck4a6iwr2vdwrdadqq5rapfqii

Central Threat Register - A Complex System for Risk Analysis and Decision Support in Railway Transport

Marcin Michalak, Wojciech Gorka, Jacek Baginski, Dariusz Rogowski, Michal Socha, Tomasz Steclik, Barbara Flisiuk, Dawid Lesniak, Marek Sikora
2020 IET Intelligent Transport Systems  
Risk management is an important element in the operations of each organisation.  ...  The goal of the system is to collect information about events and threats in the area of railway transport and to support the system users in risk analysis and decision making.  ...  POIR.04.01.02-00-0024/17-00 (Central Threat Register -The management system of information and expertise knowledge about threats for railway transportation safety).  ... 
doi:10.1049/iet-its.2019.0695 fatcat:l7jp2zyrenawrmmn235rdtkx4m

Wearable Devices in Medical Internet of Things: Scientific Research and Commercially Available Devices

Mostafa Haghi, Kerstin Thurow, Regina Stoll
2017 Healthcare Informatics Research  
These are applied in the observation of a large variety of health monitoring indicators in the environment, vital signs, and fitness.  ...  During recent years with improvement in semiconductor technology, sensors have made investigation of a full range of parameters closer to realization.  ...  The devices for experiments were selected among the 10 top available wearable device in the market. The four wearable devices considered in the experiments [25, 39] were selected randomly.  ... 
doi:10.4258/hir.2017.23.1.4 pmid:28261526 pmcid:PMC5334130 fatcat:iqx6v3cosfe6pavd2uunji7bxi

A Model-Based Approach for Resource Constrained Devices Energy Test and Simulation [chapter]

Edgar M. Silva, Luis Gomes, João Rodrigues, Pedro Maló
2015 IFIP Advances in Information and Communication Technology  
simulation models) and on a precise energy consumption assessment system.  ...  Internet-of-Things (IoT) has become the last trend pushing forward in this direction, connecting all 'things', creating a sensing world around all of us.  ...  The property type can be of two kinds, single or an aggregation of properties. A single property is used for instance when referring to a microcontroller architecture type (e.g. RISC, CISC).  ... 
doi:10.1007/978-3-319-16766-4_37 fatcat:p3hi4jfzdfcszpkxx6vnnf5puu

DAEMON Deliverable 2.1: Initial report on requirements analysis and state-of-the-art frameworks and toolsets

Ivan Paez, Luca Cominardi, Miguel Camelo, Paola Soto-Arenas, Nina Slamnik-Krijestorac, Marco Fiore, Marco Gramaglia, Albert Banchs, Maria Molina, Ana Hernandez, Danny De Vleeschauwer, Chia-Yu Chang (+7 others)
2021 Zenodo  
D2.1 also presents DAEMON's initial guidelines on the i) selection, ii) configuration, and iii) orchestration of all NI instances deployed in the network.  ...  All three aspects are driven by the time constraints in NI functions execution, considering time as one of the most influential factors when making decisions on selection, configuration, and orchestration  ...  in both edge and cloud, thereby significantly increasing the risk of conflicts and imposing additional delay in selecting the more convenient decision among the ones that are in conflict.  ... 
doi:10.5281/zenodo.5060978 fatcat:i3kehvi6ivbr5e7ki3wjml6qua

Conquering the complexity mountain: Full-stack computer architecture teaching with FPGAs

A. Theodore Markettos, Simon W. Moore, Brian D. Jones, Roy Spliet, Vlad A. Gavrila
2016 2016 11th European Workshop on Microelectronics Education (EWME)  
This makes it challenging for students with no background in computer systems to climb the mountain of 40 years of design, particularly within a constrained teaching timetable.  ...  We recount our experiences with rapidly bringing students up to speed with the modern world of computing systems, and some of the lessons we, as course designers, were taught by the process. 978-1-4673  ...  Fox did some of our initial adaptations. We also thank all students who gave us comments and feedback during the labs.  ... 
doi:10.1109/ewme.2016.7496457 dblp:conf/ewme/MarkettosMJSG16 fatcat:wjzgwlaf2vem5orhdhgygsza4u

D5.1: Market and Technology Watch Report Year1

Nico Sanna, Aris Sotiropoulos
2018 Zenodo  
It is thus the continuation of a well-established effort to carry out an assessment of the HPC market based on market surveys, supercomputing conferences, and exchanges between vendors and experts involved  ...  This document is the first deliverable of PRACE-5IP Work Package 5 "Task 5.1 - Technology and market watch" and corresponds to a periodic annual update on technology and market trends.  ...  It is thus the continuation of a well-established effort to carry out an assessment of the HPC market based on market surveys, supercomputing conferences, and exchanges between vendors and experts involved  ... 
doi:10.5281/zenodo.6805965 fatcat:656msfaojzhfznp4kwta7jkyyy

A Smartphone App and Cloud-Based Consultation System for Burn Injury Emergency Care

Lee A. Wallis, Julian Fleming, Marie Hasselberg, Lucie Laflamme, Johan Lundin, Philip Alexander Efron
2016 PLoS ONE  
We developed an interactive mobile phone application that enables transfer of both patient data and pictures of a wound from the point-of-care to a remote burns expert who, in turn, provides advice back  ...  Each year more than 10 million people worldwide are burned severely enough to require medical attention, with clinical outcomes noticeably worse in resource poor settings.  ...  Acknowledgments Constance Boissin and Mohammed R Booley are kindly acknowledged for assistance with data, pictures and references in preparation of the manuscript. Author Contributions  ... 
doi:10.1371/journal.pone.0147253 pmid:26918631 pmcid:PMC4769217 fatcat:hpsdtjftwbgfjd4jp46jhg4x2e

Nanosystems, Edge Computing, and the Next Generation Computing Systems

Ali Passian, Neena Imam
2019 Sensors  
capacity, and the broad spectrum of light into the high-performance computing, the internet of things, and industries related to cloud, fog, and recently edge computing.  ...  For example, in addition to being supremely fast, optical and photonic components and devices are capable of operating across multiple orders of magnitude length, power, and spectral scales, encompassing  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19184048 fatcat:rtjffajkj5h4vfa4v7yuevhdzi

iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems

Pierre-Henri Thevenon, Sébastien Riou, Duc-Minh Tran, Maxime Puys, Nikolaos Foivos Polychronou, Mustapha El-Majihi, Camille Sivelle
2022 Journal of Internet Services and Information Security  
In recent years, the security of connected objects has become a real challenge.  ...  In this paper, we introduce a new solution called iMRC (integrated Monitoring & Recovery Component) to improve the resilience of embedded systems in case of proven attacks.  ...  Finally, we aim to find innovative compression algorithms to optimize the measurement module in order to reduce the size of data sent to the cloud.  ... 
doi:10.22667/jisis.2022.05.31.070 dblp:journals/jisis/ThevenonRTPPES22 fatcat:zdct4a55drgbzoq53b7rnzp4da

COREnect D3.3. Initial COREnect industry roadmap [article]

AUSTRALO
2021 Zenodo  
Table 1 gives a selected list of those documents.  ...  An extended RISC-V implementation could be the target of a DBT, both could possibly be in the EU skillset.  Adaptations of Standard ISAs (e.g., 64-bit RISC-V): There are a few EU 64-bit RISC-V implementations  ...  Some of the current members of the COREnect expert groups, as described in Section 4, are listed below. Experts from within the consortium (non-exhaustive list):  ... 
doi:10.5281/zenodo.5075317 fatcat:ww7icphzfjcdjlxbsbo2qekghy

The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers [article]

Allison Randal
2019 arXiv   pre-print
providing a solid foundation for ongoing research into the future of secure isolation for multitenant infrastructures, such as cloud and container deployments.  ...  This survey covers key developments in the evolution of virtual machines and containers from the 1950s to today, with an emphasis on countering modern misperceptions with accurate historical details and  ...  Acknowledgments Thanks to Ravi Nair for help locating and scanning copies of several pivotal IBM papers on virtual machines from the 1960s that were no longer (or perhaps never) available in libraries  ... 
arXiv:1904.12226v1 fatcat:thevbset2rfqpfhd2wwehyjpqe
« Previous Showing results 1 — 15 out of 248 results