Abstract is missing.
- New models and methods for programming cyber-physical systems (keynote)Rajesh K. Gupta 0001, Jason Koh, Dezhi Hong. 1-3 [doi]
- An open, transparent, industry-driven approach to AV safety (keynote)Jack Weast. 4 [doi]
- Optimizing tensor contractions for embedded devices with racetrack memory scratch-padsAsif Ali Khan, Norman A. Rink, Fazal Hameed, Jerónimo Castrillón. 5-18 [doi]
- SHAKTI-MS: a RISC-V processor for memory safety in CSourav Das, R. Harikrishnan Unnithan, Arjun Menon, Chester Rebeiro, Kamakoti Veezhinathan. 19-32 [doi]
- Crash recoverable ARMv8-oriented B+-tree for byte-addressable persistent memoryChundong Wang 0001, Sudipta Chattopadhyay 0001, Gunavaran Brihadiswarn. 33-44 [doi]
- 1+1>2: variation-aware lifetime enhancement for embedded 3D NAND flash systemsYejia Di, Liang Shi, Shuo-Han Chen, Chun Jason Xue, Edwin Hsing-Mean Sha. 45-56 [doi]
- SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper)Thomas Haywood Dadzie, Jiwon Lee, Jihye Kim, Hyunok Oh. 57-69 [doi]
- Efficient intermittent computing with differential checkpointingSaad Ahmed, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola. 70-81 [doi]
- SPECTRUM: a software defined predictable many-core architecture for LTE baseband processingVanchinathan Venkataramani, Aditi Kulkarni Mohite, Tulika Mitra, Li-Shiuan Peh. 82-96 [doi]
- The betrayal of constant power × time: finding the missing Joules of transiently-powered computersSaad Ahmed, Abu Bakar, Naveed Anwar Bhatti, Muhammad Hamad Alizai, Junaid Haroon Siddiqui, Luca Mottola. 97-109 [doi]
- WCET-aware hyper-block construction for clustered VLIW processorsXuesong Su, Hui Wu, Jingling Xue. 110-122 [doi]
- From Java to real-time Java: a model-driven methodology with automated toolchain (invited paper)Wanli Chang, Shuai Zhao, Ran Wei, Andy J. Wellings, Alan Burns. 123-134 [doi]
- IA-graph based inter-app conflicts detection in open IoT systemsXinyi Li, Lei Zhang, Xipeng Shen. 135-147 [doi]
- ApproxSymate: path sensitive program approximation using symbolic executionHimeshi De Silva, Andrew E. Santosa, Nhut-Minh Ho, Weng-Fai Wong. 148-162 [doi]
- Automating the generation of hardware component knowledge basesLuke Hsiao, Sen Wu 0002, Nicholas Chiang, Christopher Ré, Philip Levis. 163-176 [doi]
- BitBench: a benchmark for bitstream computingKyle Daruwalla, Heng Zhuo, Carly Schulz, Mikko H. Lipasti. 177-187 [doi]
- An empirical comparison between monkey testing and human testing (WIP paper)Mostafa Mohammed, Haipeng Cai, Na Meng. 188-192 [doi]
- A compiler-based approach for GPGPU performance calibration using TLP modulation (WIP paper)Yongseung Yu, Seokwon Kang, Yongjun Park. 193-197 [doi]
- PANDORA: a parallelizing approximation-discovery framework (WIP paper)Greg Stitt, David Campbell. 198-202 [doi]
- On intermittence bugs in the battery-less internet of things (WIP paper)Andrea Maioli, Luca Mottola, Muhammad Hamad Alizai, Junaid Haroon Siddiqui. 203-207 [doi]
- Imprecision in WCET estimates due to library calls and how to reduce it (WIP paper)Martin Becker 0001, Samarjit Chakraborty, Ravindra Metta, R. Venkatesh. 208-212 [doi]
- Raising binaries to LLVM IR with MCTOLL (WIP paper)S. Bharadwaj Yadavalli, Aaron Smith. 213-218 [doi]