A technical operation or procedure that consists of determination of one or more characteristics of a given product, process or service according to a specified procedure.
Event
ICESS 2017
14th IEEE International Conference on Embedded Software and Systems (ICESS 2017)
Sydney, Australia | August 1-4, 2017 | http://www.stprp-activity.com/ICESS2017
Co-Located with IEEE TrustCom and IEEE BigDataSE
IMPORTANT DATES
Paper submission deadline: April 15, 2017
Notification of acceptance: May 15, 2017
Final paper submission: June 1, 2017
As the fastest growing industry, embedded systems have great societal and environmental impacts.
Event
CODES+ISSS '17
CODES+ISSS: International Conference on Hardware/Software Codesign and System Synthesis
The International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) is the premier event in system-level design, modeling, analysis, and implementation of modern embedded and cyber-physical systems, from system-level specification and optimization down to system synthesis of multi-processor hardware/software implementations.
Event
SAMOS XVII
International Conference on Embedded Computer Systems:
Event
MECO 2017
The 6th Mediterranean Conference on Embedded Computing (MECO 2017) is a continuation of very successful MECO events. It is an International Scientific Forum aimed to present and discuss the leading achievements in the modeling, analysis, design, validation and application of embedded computing systems.
Event
SIES 2017
12th IEEE International Symposium on Industrial Embedded Systems (SIES 2017)
June 7-9, 2017 | Toulouse, France | Web site: http://sies2017.onera.fr
This project addresses urgent challenges in high confidence validation and verification of automotive vehicles due to on-going and anticipated introduction of advanced, connected and autonomous vehicles into mass production. Since such vehicles operate across both physical and cyber domains, faults can occur in traditional physical components, in cyber components (i.e., algorithms, processors, networks, etc.), or in both. Thus, advanced vehicles need to be tested for both physical and cyber-related fault conditions. The goal of this project is to develop theory, methods, and novel tools for generating and optimizing test trajectories and data inputs that can uncover both physical and cyber faults of future automotive vehicles. The level of vehicle reliability and safety achieved for current vehicles is remarkable considering their mass production, low cost, and wide range of operating conditions. If successful, the research advances made in this project will enable achieving similar levels of reliability and safety for future vehicles relying on advanced driver assistance technologies, connectivity and autonomy. The project will advance the field of cyber-physical systems, in general, and their lifecycle management, in particular. The validation and verification theory and methodology for cyberphysical systems will be expanded for uncovering anomalies and faults, especially using comprehensive case-based and optimization-based techniques for test scenario generation.
The theoretical advances and case studies will contribute to the state-of-the-art in optimal control theory, game theory, information theory, data collection and processing, autonomous and connected vehicles, and automotive control. Sampling-based vehicle data acquisition and vehicle-aware data management strategies will be developed which can be applied more broadly, e.g., to cloud-based vehicle prognostics / conditional maintenance and mobile health-monitoring devices. Finally, approaches for efficient on-board data collection and aggregation will be implemented in a Cyber-physical system (CPS) Black Box prototype. The development of a vehicle-aware data management system (VDMS) will be pursued, leading to optimized use of data mining and compression inside the CPS Black Box to aggressively reduce the communication and computational costs. Synergistically with theoretical and methodological advances, automotive case studies will be undertaken with both realistic simulations and real experiments in collaboration with an industrial partner (AVL).
Off
University of Michigan Ann Arbor
-
National Science Foundation
Barzan Mozafari
Mark Oliver
Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards. Internet threats tomorrow will disable home security systems, flood fields, and disrupt hospitals. The root problem is that these applications consist of software on tiny low-power devices and cloud servers, have difficult networking, and collect sensitive data that deserves strong cryptography, but usually written by developers who have expertise in none of these areas. The goal of the research is to make it possible for two developers to build a complete, secure, Internet of Things applications in three months.
The research focuses on four important principles. The first is "distributed model view controller." A developer writes an application as a distributed pipeline of model-view-controller systems. A model specifies what data the application generates and stores, while a new abstraction called a transform specifies how data moves from one model to another. The second is "embedded-gateway-cloud." A common architecture dominates Internet of Things applications. Embedded devices communicate with a gateway over low-power wireless. The gateway processes data and communicates with cloud systems in the broader Internet. Focusing distributed model view controller on this dominant architecture constrains the problem sufficiently to make problems, such as system security, tractable. The third is "end-to-end security." Data emerges encrypted from embedded devices and can only be decrypted by end user applications. Servers can compute on encrypted data, and many parties can collaboratively compute results without learning the input. Analysis of the data processing pipeline allows the system and runtime to assert and verify security properties of the whole application. The final principle is "software-defined hardware." Because designing new embedded device hardware is time consuming, developers rely on general, overkill solutions and ignore the resulting security implications. The data processing pipeline can be compiled into a prototype hardware design and supporting software as well as test cases, diagnostics, and a debugging methodology for a developer to bring up the new device. These principles are grounded in Ravel, a software framework that the team collaborates on, jointly contributes to, and integrates into their courses and curricula on cyberphysical systems.
Off
Stanford University
-
National Science Foundation
Event
ANT-17
The 8th International Conference on Ambient Systems, Networks and Technologies (ANT-17)
The goal of the ANT-2017 conference is to provide an international forum for scientists, engineers, and managers in academia, industry, and government to address recent research results and to present and discuss their ideas, theories, technologies, systems, tools, applications, work in progress and experiences on all theoretical and practical issues arising in the ambient systems paradigm, infrastructures, models, and technologies that have significant contributions to the advancement of amb
Event
Building IoT 2017
Building IoT 2017
http://www.buildingiot.london