A technical operation or procedure that consists of determination of one or more characteristics of a given product, process or service according to a specified procedure.
Event
ICESS 2017
14th IEEE International Conference on Embedded Software and Systems  (ICESS 2017) Sydney, Australia | August 1-4, 2017 | http://www.stprp-activity.com/ICESS2017 Co-Located with IEEE TrustCom and IEEE BigDataSE IMPORTANT DATES Paper submission deadline:  April 15, 2017 Notification of acceptance:  May 15, 2017 Final paper submission: June 1, 2017 As the fastest growing industry, embedded systems have great societal and environmental impacts. 
Submitted by Anonymous on March 6th, 2017
CODES+ISSS: International Conference on Hardware/Software Codesign and System Synthesis The International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) is the premier event in system-level design, modeling, analysis, and implementation of modern embedded and cyber-physical systems, from system-level specification and optimization down to system synthesis of multi-processor hardware/software implementations.
Submitted by Anonymous on February 20th, 2017
Event
SAMOS XVII
International Conference on Embedded Computer Systems: 
Submitted by Anonymous on February 20th, 2017
Event
MECO 2017
The 6th Mediterranean Conference on Embedded Computing (MECO 2017) is a continuation of very successful MECO events. It is an International Scientific Forum aimed to present and discuss the leading achievements in the modeling, analysis, design, validation and application of embedded computing systems.
Submitted by Anonymous on January 23rd, 2017
Event
EMSOFT 2017
CALL FOR PAPERS
Submitted by Anonymous on December 28th, 2016
Event
SIES 2017
12th IEEE International Symposium on Industrial Embedded Systems (SIES 2017) June 7-9, 2017 | Toulouse, France | Web site: http://sies2017.onera.fr
Submitted by Anonymous on November 9th, 2016
This project addresses urgent challenges in high confidence validation and verification of automotive vehicles due to on-going and anticipated introduction of advanced, connected and autonomous vehicles into mass production. Since such vehicles operate across both physical and cyber domains, faults can occur in traditional physical components, in cyber components (i.e., algorithms, processors, networks, etc.), or in both. Thus, advanced vehicles need to be tested for both physical and cyber-related fault conditions. The goal of this project is to develop theory, methods, and novel tools for generating and optimizing test trajectories and data inputs that can uncover both physical and cyber faults of future automotive vehicles. The level of vehicle reliability and safety achieved for current vehicles is remarkable considering their mass production, low cost, and wide range of operating conditions. If successful, the research advances made in this project will enable achieving similar levels of reliability and safety for future vehicles relying on advanced driver assistance technologies, connectivity and autonomy. The project will advance the field of cyber-physical systems, in general, and their lifecycle management, in particular. The validation and verification theory and methodology for cyberphysical systems will be expanded for uncovering anomalies and faults, especially using comprehensive case-based and optimization-based techniques for test scenario generation. The theoretical advances and case studies will contribute to the state-of-the-art in optimal control theory, game theory, information theory, data collection and processing, autonomous and connected vehicles, and automotive control. Sampling-based vehicle data acquisition and vehicle-aware data management strategies will be developed which can be applied more broadly, e.g., to cloud-based vehicle prognostics / conditional maintenance and mobile health-monitoring devices. Finally, approaches for efficient on-board data collection and aggregation will be implemented in a Cyber-physical system (CPS) Black Box prototype. The development of a vehicle-aware data management system (VDMS) will be pursued, leading to optimized use of data mining and compression inside the CPS Black Box to aggressively reduce the communication and computational costs. Synergistically with theoretical and methodological advances, automotive case studies will be undertaken with both realistic simulations and real experiments in collaboration with an industrial partner (AVL).
Off
University of Michigan Ann Arbor
-
National Science Foundation
Barzan Mozafari
Mark Oliver
Submitted by Ilya V. Kolmanovsky on September 23rd, 2016
Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards. Internet threats tomorrow will disable home security systems, flood fields, and disrupt hospitals. The root problem is that these applications consist of software on tiny low-power devices and cloud servers, have difficult networking, and collect sensitive data that deserves strong cryptography, but usually written by developers who have expertise in none of these areas. The goal of the research is to make it possible for two developers to build a complete, secure, Internet of Things applications in three months. The research focuses on four important principles. The first is "distributed model view controller." A developer writes an application as a distributed pipeline of model-view-controller systems. A model specifies what data the application generates and stores, while a new abstraction called a transform specifies how data moves from one model to another. The second is "embedded-gateway-cloud." A common architecture dominates Internet of Things applications. Embedded devices communicate with a gateway over low-power wireless. The gateway processes data and communicates with cloud systems in the broader Internet. Focusing distributed model view controller on this dominant architecture constrains the problem sufficiently to make problems, such as system security, tractable. The third is "end-to-end security." Data emerges encrypted from embedded devices and can only be decrypted by end user applications. Servers can compute on encrypted data, and many parties can collaboratively compute results without learning the input. Analysis of the data processing pipeline allows the system and runtime to assert and verify security properties of the whole application. The final principle is "software-defined hardware." Because designing new embedded device hardware is time consuming, developers rely on general, overkill solutions and ignore the resulting security implications. The data processing pipeline can be compiled into a prototype hardware design and supporting software as well as test cases, diagnostics, and a debugging methodology for a developer to bring up the new device. These principles are grounded in Ravel, a software framework that the team collaborates on, jointly contributes to, and integrates into their courses and curricula on cyberphysical systems.
Off
Stanford University
-
National Science Foundation
Submitted by Philip Levis on September 23rd, 2016
Event
ANT-17
The 8th International Conference on Ambient Systems, Networks and Technologies (ANT-17) The goal of the ANT-2017 conference is to provide an international forum for scientists, engineers, and managers in academia, industry, and government to address recent research results and to present and discuss their ideas, theories, technologies, systems, tools, applications, work in progress and experiences on all theoretical and practical issues arising in the ambient systems paradigm, infrastructures, models, and technologies that have significant contributions to the advancement of amb
Submitted by Anonymous on September 15th, 2016
Building IoT 2017 http://www.buildingiot.london
Submitted by Anonymous on August 24th, 2016
Subscribe to Testing