EECS 507 Papers

Lectures Piazza Papers Description Times Schedule References Gradescope

General Information

Paper Assignments with Student Presentations

  1. 12 Sep: R. Banakar, S. Steinke, B.-S. Lee, M. Balakrishnan, and P. Marwedel, “Scratchpad Memory: A Design Alternative for Cache On-chip Memory in Embedded Systems,” in Proc. Int. Conf. Hardware-Software Co-Design and System Synthesis, May 2002.
  2. 17 Sep: C. L. Liu and James W. Layland, “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment,” in J. ACM, vol. 20, no. 1, Jan. 1973, pp. 46–61.
  3. 24 Sep: L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang, “Accurate online power estimation and automatic battery behavior based power model generation for smartphones,” in Proc. Int. Conf. Hardware/Software Codesign and System Synthesis, Oct. 2010, pp. 105–114. Notes: On-line component-specific power estimation for smartphones, including a battery state based model construction technique. One of five most cited articles in the history of the Embedded System Week federation of conferences as of 2013.
  4. 26 Sep: J. Polastre, R. Szewczyk, A. Mainwaring, D. Culler, and J. Anderson, “Analysis of wireless sensor net works for habitat monitoring,” in Wireless Sensor Networks, 2004, Springer.
  5. 1 Oct: E. Ronen, A. Shamir, A.-O Weingarten, C. O'Flynn, “IoT goes nuclear: creating a ZigBee chain reaction,” in Proc. Symp. on Security and Privacy, May 2017.
  6. 3 Oct: K. Mekki, E. Bajic, F. Chaxel, and F. Meyer, “A comparative study of LPWAN technologies for large-scale IoT deployment,” Elsevier ICT Express, vol. 5, no. 1, pp. 1–7, Mar. 2019.
  7. 8 Oct: D. Yeke, M. Ibrahim, G. S. Tuncay, H. Farrukh, A. Imran, A. Bianchi, and Z. B. Celik, “Wear's my data? understanding the cross-device runtime permission model in wearables,” in Symp. on Security and Privacy, May 2024, pp. 2404–2401.
  8. 22–24 Oct, present on the 24th: B. Widrow and M. A. Lehr, “30 years of adaptive neural networks: perceptron, madaline, and backpropagation,” in Proc. IEEE, vol. 78, no. 9, Sep. 1990.

Paper Assignments Without Student Presentations

  1. 3 Sep: A. Jantsch and I. Sander, “Models of computation and languages for embedded system design,” IEE Proc., pp. 114–129, 2005. Unscored but completion is required.
  2. 5 Sep: R. P. Dick, “Multiobjective synthesis of low-power real-time distributed embedded systems,” Ph.D. dissertation, Dept. of Electrical Engineering, Princeton University, July 2002. Read Chapter 4. No need to write a summary for this one.
  3. 10 Sep: L. Yang, R. P. Dick, H. Lekatsas, and S. Chakradhar, “High-performance operating system controlled on-line memory compression,” ACM Trans. Embedded Computing Systems, vol. 9, no. 4, pp. 30:1-30:28, Mar. 2010. I present this one.
  4. 19 Sep: Alberto Sangiovanni-Vincentelli, Werner Damm, Roberto Passerone, Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems,” European Journal of Control, Volume 18, Issue 3, 2012, Pages 217-238.
  5. 17 Oct: R. P. Dick, L. Shang, M. Wolf, and S.-W. Yang, “Embedded intelligence in the Internet-of-Things,” in IEEE Design & Test of Computers, Dec. 2019.

References For Those Interested in Greater Depth

  1. “Some Algebraic Aspects of Assume-Guarantee Reasoning,” Inigo Incer, Albert Benveniste, and Alberto Sangiovanni-Vincentelli, arXiv, Sep. 2023.
  2. “The Algebra of Contracts,” Inigo Incer, Ph.D. Dissertation,, University of California, Berkeley, 2022.
  3. Introduction of Michael R. Garey and David S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman & Company, NY, 1979.
  4. Robert P. Dick, “Reliability, Thermal, and Power Modeling and Optimization,” in Proc. Int. Conf. on Computer-Aided Design, 2010, Nov and D. S. Khudia, G. Wright, and S. Mahlke, “Efficient soft error protection for commodity embedded microprocessors using profile information,” ACM SIGPLAN, vol. 26, no. 5, pp. 99–108, Oct. 2012.

Page maintained by Robert Dick.