Embedded Software and Systems: First International Conference, ICESS 2004, Hangzhou, China, December 9-10, 2004, Revised Selected Papers / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (4) from $103.48   
  • Used (4) from $1.99   


This book constitutes the thoroughly refereed postproceedings of the First International Conference on Embedded Software and Systems, ICESS 2004, held in Hangzhou, China in December 2004.

The 80 revised full papers presented together with the abstracts of 4 keynote speeches and 4 invited talks were thoroughly reviewed and selected from almost 400 submissions. The papers are organized in topical sections on distributed embedded computing, embedded systems, embedded hardware and architecture, middleware for embedded computing, mobile systems, transducer network, embedded operating system, power-aware computing, real-time system, embedded system verification and testing, and software tools for embedded systems.

Read More Show Less

Product Details

Table of Contents

Keynote speech : abstraction and the C++ machine model 1
Keynote speech : industrializing software development 14
Keynote speech : testing methodologies for embedded systems and systems-on-chip 15
Keynote speech : China putian promote commercial TD-SCDMA services 25
Invited talk : agent-oriented approach to ubiquitous computing 30
Invited talk : resource-aware programming 38
Invited talk : in-house tools for low-power embedded systems 44
Invited talk : CODACS project : a development tool for embedded system prototyping 59
A study on Web services selection method based on the negotiation through quality broker : a MAUT-based approach 65
CA-Ex : a tuning-incremental methodology for communication architectures in embedded systems 74
Efficient parallel spatial join processing method in a shared-nothing database cluster system 81
Maximizing parallelism for non-uniform dependence loops using two parallel region partitioning method 88
The KODAMA methodology : an agent-based distributed approach 94
A new iris recognition approach for embedded system 103
A RAID controller : software, hardware and embedded platform based on intel IOP321 110
Component-based integration towards a frequency-regulating home appliance control system 118
Design and implementation of the system for remote voltage harmonic monitor 124
Guaranteed cost control of networked control systems : an LMI approach 130
Robust tuning of embedded intelligent PID controller for induction motor using bacterial foraging based optimization 137
The customizable embedded system for seriate intelligent sewing equipment 143
A distributed architecture model for heterogeneous multiprocessor system-on-chip design 150
A new technique for program code compression in embedded microprocessor 158
Design of system area network interface card based on Intel IOP310 165
Dual-stack return address predictor 172
Electronic reading pen : a DSP based portable device for offline OCR and bi-linguistic translation 180
Formal co-verification for SoC design with colored petri net 188
Hardware for modular exponentiation suitable for smart cards 196
PN-based formal modeling and verification for ASIP architecture 203
The design and performance analysis of embedded parallel multiprocessing system 210
Use dynamic combination of two meta-heuristics to do bi-partitioning 216
A new approach for predictable hard real-time transaction processing in embedded database 222
A QoS-aware component-based middleware for pervasive computing 229
AnyCom : a component framework optimization for pervasive computing 236
Association based prefetching algorithm in mobile environments 243
Integration policy in real-time embedded system 251
Prism-MW based connector interaction for middleware systems 258
ScudWare : a context-aware and lightweight middleware for smart vehicle space 266
Application of cooperating and embedded technology for network computer media player 274
QoS adaptive algorithms based on resources availability of mobile terminals 280
Semi-videoconference system using real-time wireless technologies 287
Smart client techniques for online game on portable device 294
The implementation of mobile IP in Hopen system 300
A new CGI queueing model designed in embedded Web server 306
A new embedded wireless microcensor network based on Bluetooth scatternet and PMCN 312
A new gradient-based routing protocol in wireless sensor networks 318
A sensor media access control protocol based on TDMA 326
Clusters partition and sensors configuration for target tracking in wireless sensor networks 333
Enhanced WFQ algorithm with (m,k)-firm guarantee 339
Fuzzy and real-time queue management in differentiated services networks 347
Issues of wireless sensor network management 355
OPC-based architecture of embedded Web server 362
Synchronized data gathering in real-time embedded fiber sensor network 368
The energy cost model of clustering wireless sensor network architecture 374
Traffic control scheme of VCNs' gigabit ethernet using BP 381
A jitter-free kernel for hard real-time systems 388
A new approach to deadlock avoidance in embedded system 395
A novel task scheduling for heterogeneous systems 400
Applying component-based meta-service in liquid operating system for pervasive computing 406
Embedded operating system design : the resolved and intelligent daemon approach 412
New approach for device driver development - devil+ language 418
On generalizing interrupt handling into a flexible binding model for kernel components 423
Research directions for embedded operating systems 430
SmartOSEK : a real-time operating system for automotive electronics 437
A functionality based instruction level software power estimation model for embedded RISC processors 443
Robust and adaptive dynamic power management for time varying system 449
Skyeye : an instruction simulator with energy awareness 456
The modeling for dynamic power management of embedded systems 462
Why simple timeout strategies work perfectly in practice? 468
An adaptive fault tolerance scheme for applications on real-time embedded system 474
Concurrent garbage collection implementation in a standard JVM for real-time purposes 481
Relating FFTW and split-radix 488
Selecting a scheduling policy for embedded real-time monitor and control systems 494
Sharing I/O in strongly partitioned real-time systems 502
The efficient QoS control in distributed real-time embedded systems 508
An efficient verification method for microprocessors based on the virtual machine 514
EFSM-based testing strategy for APIs test of embedded OS 522
EmGen : an automatic test-program generation tool for embedded IP cores 528
Formal verification of a ubiquitous hardware component 536
Model optimization techniques in a verification platform for classified properties 542
Using model-based test program generator for simulation validation 549
A new WCET estimation algorithm based on instruction cache and prefetching combined model 557
A component-based model integrated framework for embedded software 563
A cooperative Web framework of Jini into OSGi-based open home gateway 570
A structure modeling method for multi-task embedded software design 576
Chaos-model based framework for embedded software development 582
Hierarchical integration of runtime models 589
Object-oriented software loading and upgrading techniques for embedded and distributed system 595
Preserving consistency in distributed embedded collaborative editing systems 601
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)