EECS 507 Papers

Lectures Piazza Papers Description Times Schedule References Gradescope

General Information

Paper Assignments with Student Presentations

  1. 12 Sep: R. Banakar, S. Steinke, B.-S. Lee, M. Balakrishnan, and P. Marwedel, “Scratchpad Memory: A Design Alternative for Cache On-chip Memory in Embedded Systems,” in Proc. Int. Conf. Hardware-Software Co-Design and System Synthesis, May 2002.
  2. 17 Sep: C. L. Liu and James W. Layland, “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment,” in J. ACM, vol. 20, no. 1, Jan. 1973, pp. 46–61.
  3. 24 Sep: L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang, “Accurate online power estimation and automatic battery behavior based power model generation for smartphones,” in Proc. Int. Conf. Hardware/Software Codesign and System Synthesis, Oct. 2010, pp. 105–114. Notes: On-line component-specific power estimation for smartphones, including a battery state based model construction technique. One of five most cited articles in the history of the Embedded System Week federation of conferences as of 2013.
  4. 26 Sep: J. Polastre, R. Szewczyk, A. Mainwaring, D. Culler, and J. Anderson, “Analysis of wireless sensor net works for habitat monitoring,” in Wireless Sensor Networks, 2004, Springer.
  5. 1 Oct: E. Ronen, A. Shamir, A.-O Weingarten, C. O'Flynn, “IoT goes nuclear: creating a ZigBee chain reaction,” in Proc. Symp. on Security and Privacy, May 2017.
  6. 3 Oct: K. Mekki, E. Bajic, F. Chaxel, and F. Meyer, “A comparative study of LPWAN technologies for large-scale IoT deployment,” Elsevier ICT Express, vol. 5, no. 1, pp. 1–7, Mar. 2019.
  7. 8 Oct: D. Yeke, M. Ibrahim, G. S. Tuncay, H. Farrukh, A. Imran, A. Bianchi, and Z. B. Celik, “Wear's my data? understanding the cross-device runtime permission model in wearables,” in Symp. on Security and Privacy, May 2024, pp. 2404–2401.
  8. 22–24 Oct, present on the 24th: B. Widrow and M. A. Lehr, “30 years of adaptive neural networks: perceptron, madaline, and backpropagation,” in Proc. IEEE, vol. 78, no. 9, Sep. 1990.
  9. 29 Oct: Y. Zhu, A. Samajdar, M. Mattina, P. Whatmough, “Euphrates: algorithm-SoC co-design for low-power mobile continuous vision,” arXiv, Apr. 2018.
  10. 31 Oct: S. Han, H. Mao, and W. J. Dally, “Deep compression: compressing deep neural networks with pruning, trained quantization, and Huffman Coding,” Proc. Int. Conf. on Learning Representations, Feb. 2016.
  11. 5 Nov: B. Chatterjee, D. Das, S. Maity, and S. Sen, “RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning,” IEEE Internet of Things J., vol. 6, no. 1, Feb. 2019.
  12. 7 Nov: S. Kato, S. Tokunaga, Y. Maruyama, S. Maeda, M. Hirabayashi, and Y. Kitsukawa, “Autoware on board: Enabling autonomous vehicles with embedded systems,” in Proc. Int. Conf. on Cyber-Physical Systems, Apr. 2018.
  13. 12 Nov: P. Kanerva, “Hyperdimensional computing: an introduction to computing in distributed representation with high-dimensional random vectors,” Cognitive Computing, vol. 1, Jan. 2009.
  14. 14 Nov: N. G. Leveson and C. S. Turner, “An investigation of the Therac-25 accidents,” IEEE Computer, vol. 26, no.7, pp. 17–41, Jul. 1993.
  15. 19 Nov: P. M. Sheridan, F. Cai, C. Du, W. Ma, Z. Zhang, and W. D. Lu, “Sparse Coding with Memristor Networks,” Nature Nanotechnology, vol. 12, Aug. 2017.
  16. 21 Nov: Y. Chen et al., “Energy-autonomous wireless communication for millimeter-scale Internet-of-Things sensor nodes,” IEEE J. on Selected Areas in Communications, vol. 34, no. 12, Dec. 2016.
  17. 26 Nov: J. Zhang, Z. Wang, and N. Verma, “In-Memory Computation of a Machine-Learning Classifier in a Standard 6T SRAM Array,” IEEE J. of Solid-State Circuits, vol. 52, no. 4, Apr. 2017.
  18. 3 Dec: T. Sugawara, B. Cyr, S. Rampazzi, D. Genkin, and K. Fu, “Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems,” USENIX Security Symp., Aug. 2020.

Paper Assignments Without Student Presentations

  1. 3 Sep: A. Jantsch and I. Sander, “Models of computation and languages for embedded system design,” IEE Proc., pp. 114–129, 2005. Unscored but completion is required.
  2. 5 Sep: R. P. Dick, “Multiobjective synthesis of low-power real-time distributed embedded systems,” Ph.D. dissertation, Dept. of Electrical Engineering, Princeton University, July 2002. Read Chapter 4. No need to write a summary for this one.
  3. 10 Sep: L. Yang, R. P. Dick, H. Lekatsas, and S. Chakradhar, “High-performance operating system controlled on-line memory compression,” ACM Trans. Embedded Computing Systems, vol. 9, no. 4, pp. 30:1-30:28, Mar. 2010. I present this one.
  4. 19 Sep: Alberto Sangiovanni-Vincentelli, Werner Damm, Roberto Passerone, Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems,” European Journal of Control, Volume 18, Issue 3, 2012, Pages 217-238.
  5. 17 Oct: R. P. Dick, L. Shang, M. Wolf, and S.-W. Yang, “Embedded intelligence in the Internet-of-Things,” in IEEE Design & Test of Computers, Dec. 2019.

References For Those Interested in Greater Depth

  1. Y. LeCun, “A theoretical framework for back-propagation,” in Proc. Connectionist Models Summer School, 1988, pp. 21–28.
  2. “Some Algebraic Aspects of Assume-Guarantee Reasoning,” Inigo Incer, Albert Benveniste, and Alberto Sangiovanni-Vincentelli, arXiv, Sep. 2023.
  3. “The Algebra of Contracts,” Inigo Incer, Ph.D. Dissertation,, University of California, Berkeley, 2022.
  4. Introduction of Michael R. Garey and David S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman & Company, NY, 1979.
  5. Robert P. Dick, “Reliability, Thermal, and Power Modeling and Optimization,” in Proc. Int. Conf. on Computer-Aided Design, 2010, Nov and D. S. Khudia, G. Wright, and S. Mahlke, “Efficient soft error protection for commodity embedded microprocessors using profile information,” ACM SIGPLAN, vol. 26, no. 5, pp. 99–108, Oct. 2012.

Page maintained by Robert Dick.