100 results found

[Thesis]

Event-based energy management infrastructure : application to a sense&react mixed-signal architecture

Offer N°: SL-DRT-14-0375

Start date: 1 Oct 2014

Future applications in the context of internet of things (IoT) will require an efficient energy management considering the very low energy budget of that kind of circuits. In this frame, this PhD work objective is to propose a complete energy management integrated infrastructure, dissociated from the functional part of the IoT node.



[Thesis]

Coordination rules generation from automata, in the context of redeployments of distributed control systems

Offer N°: SL-DRT-14-0341

Start date: 1 Oct 2014

The general context of this PhD thesis is to enable a reliable redeployment of a distributed application during its execution. The target applications operate continuously, eg building automation, water supply system or industrial process control.

There are many reasons for redeployment: load balancing, reducing the energy footprint of the physical infrastructure, update without stopping the application, hardware and / or software redundancy for fault tolerance.



[Thesis]

Optimizing data transfers in distributed multiprocessors using just-in-time compilation and dedicated hardware support

Offer N°: SL-DRT-14-0339

Start date: 1 Oct 2014

Modern Systems on chip integrate more and more computing resources and memory to meet the ever increasing performance needs. Sadly, these highly parallel architectures have serious programming issues mainly due to the data exchange between processing cores. Two architectural solutions prevail today. The first one tries to keep a unified shared memory by implementing complex hardware coherence mechanisms between physically distributed memories.



[Thesis]

Toolkit for the design and the compilation of software protections to secure embeded systems

Offer N°: SL-DRT-14-0345

Start date: 1 Oct 2014

The security of information systems is a critical issue. The design of software applications secured against attacks aiming at compromising sensitive data requires specific implementation techniques: software protections. Most of the time, software protections lead to a severe performance decrease. Moreover, a traditional compiler is not designed to handle correctly software protections: a compiler involves optimisations for reducing execution time and energy consumption of a program.



My offers

  • Loading...

Theme:

Laboratory:

Your search