Embedded Software and Systems: Second International Conference, ICESS 2005, Xi'an, China, December 16-18, 2005, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $129.31
Usually ships in 1-2 business days
(Save 27%)
Other sellers (Paperback)
  • All (7) from $129.31   
  • New (6) from $129.31   
  • Used (1) from $230.16   


This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi'an, China, in December 2005.

The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless communications, mobile computing, pervasive/ubiquitous computing and intelligence, multimedia and human-computer interaction, network prool, security and fault-tolerance, and abstracts of eight selected workshop papers.

Read More Show Less

Product Details

Table of Contents

Keynote Speech.- Are Lessons Learnt in Mobile Ad Hoc Networks Useful for Wireless Sensor Networks?.- Compiler-Directed Scratchpad Memory Management.- Heterogeneous Multi-processor SoC: An Emerging Paradigm of Embedded System Design and Its Challenges.- Track 1: Embedded Hardware.- Trace-Based Runtime Instruction Rescheduling for Architecture Extension.- Bioinformatics on Embedded Systems: A Case Study of Computational Biology Applications on VLIW Architecture.- The Design Space of CMP vs. SMT for High Performance Embedded Processor.- Reconfigurable Microarchitecture Based System-Level Dynamic Power Management SoC Platform.- Track 2: Embedded Software.- A Methodology for Software Synthesis of Embedded Real-Time Systems Based on TPN and LSC.- Ahead of Time Deployment in ROM of a Java-OS.- The Research on How to Reduce the Number of EEPROM Writing to Improve Speed of Java Card.- A Packet Property-Based Task Scheduling Policy for Control Plane OS in NP-Based Applications.- RBLS: A Role Based Context Storage Scheme for Sensornet.- CDP: Component Development Platform for Communication Prools.- TrieC: A High-Speed IPv6 Lookup with Fast Updates Using Network Processor.- Separate Compilation for Synchronous Modules.- Implementation of Hardware and Embedded Software for Stream Gateway Interface Supporting Media Stream Transmissions with Heterogeneous Home Networks.- Track 3: Real-Time Systems.- On Using Locking Caches in Embedded Real-Time Systems.- Trace Acquirement from Real-Time Systems Based on WCET Analysis.- Elimination of Non-deterministic Delays in a Real-Time Database System.- Solving Real-Time Scheduling Problems with Model-Checking.- Efficient FPGA Implementation of a Knowledge-Based Automatic Speech Classifier.- Track 4: Power-Aware Computing.- A Topology Control Method for Multi-path Wireless Sensor Networks.- Dynamic Threshold Scheme Used in Directed Diffusion.- Compiler-Directed Energy-Aware Prefetching Optimization for Embedded Applications.- A Dynamic Energy Conservation Scheme for Clusters in Computing Centers.- Track 5: Hardware/Software Co-design and System-On-Chip.- Realization of Video Object Plane Decoder on On-Chip Network Architecture.- Network on Chip for Parallel DSP Architectures.- A New Methodology of Integrating High Level Synthesis and Floorplan for SoC Design.- Designing On-Chip Network Based on Optimal Latency Criteria.- Track 6: Testing and Verification.- Microprocessor Based Self Schedule and Parallel BIST for System-On-a-Chip.- Self-correction of FPGA-Based Control Units.- Detecting Memory Access Errors with Flow-Sensitive Conditional Range Analysis.- Deductive Probabilistic Verification Methods of Safety, Liveness and Nonzenoness for Distributed Real-Time Systems.- Specification and Verification Techniques of Embedded Systems Using Probabilistic Linear Hybrid Automata.- Formalization of fFSM Model and Its Verification.- Track 7: Reconfigurable Computing.- Dynamic Co-allocation of Level One Caches.- Jaguar: A Compiler Infrastructure for Java Reconfigurable Computing.- CCD Camera-Based Range Sensing with FPGA for Real-Time Processing.- Track 8: Agent and Distributed Computing.- Best Web Service Selection Based on the Decision Making Between QoS Criteria of Service.- Data Storage in Sensor Networks for Multi-dimensional Range Queries.- An OSEK COM Compliant Communication Model for Smart Vehicle Environment.- Track 9: Wireless Communications.- Resource Allocation Based on Traffic Load over Relayed Wireless Access Networks.- An Adaptive Cross Layer Unequal Protection Method for Video Transmission over Wireless Communication Channels.- Power-Efficient Packet Scheduling Method for IEEE 802.15.3 WPAN.- Two Energy-Efficient, Timesaving Improvement Mechanisms of Network Reprogramming in Wireless Sensor Network.- On Location-Free Node Scheduling Scheme for Random Wireless Sensor Networks.- Leading Causes of TCP Performance Degradation over Wireless Links.- The Study and Implementation of Wireless Network Router NPU-1.- Track 10: Mobile Computing.- Performance Evaluation of Air Indexing Schemes for Multi-attribute Data Broadcast.- Hierarchical Route Optimization in Mobile Network and Performance Evaluation.- Track 11: Pervasive/Ubiquitous Computing and Intelligence.- Swarm Based Sensor Deployment Optimization in Ad Hoc Sensor Networks.- Weighted Localized Clustering: A Coverage-Aware Reader Collision Arbitration Prool in RFID Networks.- A Kind of Context-Aware Approach Based on Fuzzy-Neural for Proactive Service of Pervasive Computing.- Track 12: Multimedia and Human-Computer Interaction.- A Novel Block-Based Motion Estimation Algorithm and VLSI Architecture Based on Cluster Parallelism.- Software-Based Video Codec for Mobile Devices.- Real-Time Expression Mapping with Ratio Image.- Power Consumption Analysis of Embedded Multimedia Application.- Track 13: Network Prool, Security and Fault-Tolerance.- A Dynamic Threshold and Subsection Control TCP Slow-Start Algorithm.- An Improved DRR Packet Scheduling Algorithm Based on Even Service Sequence.- An Improvement on Strong-Password Authentication Prools.- Two-Step Hierarchical Prools for Establishing Session Keys in Wireless Sensor Networks.- A Revenue-Aware Bandwidth Allocation Model and Algorithm in IP Networks.- Control Flow Error Checking with ISIS.- Support Industrial Hard Real-Time Traffic with Switched Ethernet.- Integer Factorization by a Parallel GNFS Algorithm for Public Key Cryptosystems.- Localized Energy-Aware Broadcast Prool for Wireless Networks with Directional Antennas.- Track 14: Workshop Selected Papers.- The Optimal Profile-Guided Greedy Dynamic Voltage Scaling in Real-Time Applications.- A Parallelizing Compiler Approach Based on IXA.- The Design of Firewall Based on Intel IXP2350 and Autopartitioning Mode C.- AMT6: End-to-End Active Measurement Tool for IPv6 Network.- Semantic Web Based Knowledge Searching System in Mobile Environment.- A General-Purpose, Intelligent RAID-Based Object Storage Device.- The Design and Implement of Remote Mirroring Based on iSCSI.- Improvement of Space Utilization in NAND Flash Memory Storages.- Keynote Speech.- Smart u-Things and Ubiquitous Intelligence.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)