Search
Reliable and Reconfigurable Dynamic Architecture – ARDyT
Today, advances in CMOS technology are hampered because of physical and economic limits. In particular, the shrinking transistor size implies a reduction in yield and reliability of SoC due to the presence (variability) or appearing ("aging") of physical defects in the circuit. This change brings a
Static Analysis of Embedded Asynchronous Real-Time Software – AstréeA
The focus of the AstréeA project is on the development of static analysis by abstract interpretation to check the safety of large scale asynchronous embedded software. The safety of critical embedded software, such as found in aeronautical, railway, automotive or medical industries, is of paramou
Lightweight privacy-enhancing cryptography for mobile contactless services – LYRICS
The next generation of mobile and smart phones will integrate NFC (Near Field Communication) chips. With the fast emergence of this contactless technology, mobile phones will soon be able to play the role of e-tickets, credit cards, transit pass, loyalty cards, access control badges, e-voting tokens
Design Oriented Model of Computation for Embedded and Adaptive Multiprocessor – COMPA
For the last 20 years, the complexity and requirements of communication and video standards have been increasing in an exponential manner. In the meantime, embedded system designers have witnessed the end of single processor platforms, and the generalization of so-called heterogeneous multi-core har
Design and cryptanalysis of block ciphers – BLOC
Cryptography is only one component of information security, but it is a crucial component. Without cryptography, it would be impossible to establish secure communications between users over insecure networks like the Internet. In particular, secret-key cryptography enables, after having exchanged
MRAM (Magnetic Memory) based Architecture for Reliable and low power Systems – MARS
With the advent of memory technologies combining new features (non-volatility, density, performance, low power consumption, robustness), some architectural principles specifics into the field of embedded systems will eventually be reviewed. Such memory technology opens up particularly interesting i
Architecture for MObiquitous REsilient Systems – AMORES
The ubiquitous world in which we live is characterized by a high mobility of individuals, most of them wearing devices capable of geo-localization (smartphones or GPS-equipped cars). However, most of the current transportation systems have not yet really used the facilities offered by these geo-loca
Solutions for the self-Adaptation of Communicating Systems in Operation – SACSO
In the context of high performance systems and critical applications, the general objective of the project is to design Self-Adaptive Systems which are capable of monitoring the surrounding environment and adapt themselves to different scenarios and requirements. In other words, a Self-Adaptive Syst
Design of a Defect Tolerant FPGA – Robust FPGA
The tremendous development of CMOS technology has enabled an increasing integration density according to Moore's Law. However, this trend of evolution is being slowed due to economic and physical limits. One particular key issue to focus on is the significant reduction in the manufacturing yiel
Pervasive Parallelism in Highly-Trustable Interactive Theorem Proving Systems – Paral-ITP
Interactive theorem proving is a technology of fundamental importance for mathematics and computer-science. It is based on expressive logical foundations and implemented in a highly-trustable way. Applications include huge mathematical proofs and semi-automated verifications of complex software
Guaranteed Methods and Algorithms for Integrity Control and Preventive Monitoring of Systems – MAGIC-SPS
Current systems must show autonomous capabilities that allow them to remain operational possibly in a degraded but safe mode even when occur a fault, a failure or any other disturbance. To achieve such an objective, current modern systems often embed software and hardware that allow them to detect i
Keep your Information Safe and Secure – KISS
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Smart appliances surrounding individuals also accumulate spatio-temporal sensitive information (e.g., healthcare monitoring, geolocation). Citizen themselves
Validating crtical systems control by coupling simulation and formal analysis methods – VACSIM
The consortium of the VACSIM project (Validation de la commande des systèmes critiques par couplage simulation et méthodes d’analyse formelle – Validation of the control of critical systems by coupling simulation and formal analysis methods) is composed of two companies, one designer and user of cri
Formally-verified static analyzers and compilers – VERASCO
In its quest for software perfection, the critical software industry (aircraft, railways, nuclear, medical, etc.), especially in France, has been progressively embracing the use of formal verification tools as a complement, or even as an alternative, to traditional software validation techniques bas
Design of fixed-point embedded systems – DEFIS
Many embedded systems contain applications integrating mathematical processing. To satisfy the constraint (area, energy consumption, execution time) inherent to embedded systems, fixed-point arithmetic is widely used and preferred. Applications are designed and simulated using floating-point data ty
Programming reversible recoverable systems – REVER
Despite the development of many techniques to add reliability and availability to distributed systems (including exception handling, checkpointing and rollback-recovery schemes, replication protocols, transaction management facilities), programming dependability remains a challenge. This is in no