@conference {28.1049903, title = {Application-Driven Optimization of VLIW Architectures: A Hardware-Software Approach}, booktitle = {RTAS {\textquoteright}05: Proceedings of the 11th IEEE Real Time on Embedded Technology and Applications Symposium}, year = {2005}, month = {03/2005}, pages = {128{\textendash}137}, publisher = {IEEE Computer Society}, organization = {IEEE Computer Society}, address = {Washington, DC, USA}, abstract = {A large number of embedded multimedia applications are characterized by high instruction-level parallelism (ILP) expecially in the most critical internal loop bodies. Very Large Instruction Word (VLIW) architectures Application Specific Instruction Set Processors (ASIP) are best suited to exploit such parallelism. Fast design space exploration and optimization of VLIW architecture to a specific application target is increasingly becoming the crucial factor to achieve higher efficiency designs in a relatively small amount of time. In this paper we propose an example of VLIW architecture application driven optimization using the VEX (VLIW Example) system. A typical image processing application, the Imaging Pipeline, has been chosen as an example.}, keywords = {design space exploration, embedded systems, HW/SW co-design, HW/SW partitioning, system level design, very long instruction words (VLIW)}, isbn = {0-7695-2302-1}, doi = {http://dx.doi.org/10.1109/RTAS.2005.9}, author = {Ferrante, Alberto and Piscopo, Giuseppe and Scaldaferri, Stefano} } @conference {25.PiPreSte2004, title = {UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems}, booktitle = {FDL{\textquoteright}04}, year = {2004}, month = {September 14-17}, pages = {301-312}, address = {Lille, France}, abstract = {In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IPsec, SSL/TSL) and existing implementations aimed at embedded systems with low-power constraints in general (e.g. lwIP, lwBT, ZigBee). Then, starting from a Platform Independent Modeling (PIM), we develop a protocol concept to address authentication, integrity and confidentiality, also covering battery lifetime checking and theft monitoring. Finally the protocol itself is described by means of UML. Limited resource and low-power constraints are taken into account when examining secure-transmission features. RMR is thus an example of an application requiring a light-weight protocol combined with security features. One of the future objectives is to switch from the PIM description to PSM implementation.}, keywords = {embedded systems, low-power protocols, security, unified modeling language (UML)}, author = {Piscopo, Giuseppe and Prevostini, Mauro and Stefanini, Ivan} }