Pramote Kuacharoen

Learn More
Many real-time applications require a high-resolution time tick in order to work properly. However, supporting a high-resolution time tick imposes a very high overhead on the system. In addition, such systems may need to change scheduling discipline from time to time to satisfy some user requirements such as Quality of Service (QoS). The dynamic changing of(More)
Previous work has shown that a system-on-a-chip lock cache (SoCLC) reduces on-chip memory traffic, provides a fair and fast lock hand-off, simplifies software, increases the real-time predictability of the system and improves performance. In this research work, we extend the SoCLC mechanism with a priority inheritance support implemented in hardware.(More)
There are still needs for paper-based documents in certain circumstances where electronic documents cannot efficiently replace them. For example, documents issued by the government such as birth certificates, driver licenses, and passports must be paper-based. With advanced scanning and printing technologies, paper-based document fraud can easily be(More)
Software streaming allows the execution of stream-enabled software on a device even while the transmission/streaming may still be in progress. Thus, the software can be executed while it is being streamed instead of causing the user to wait for the completion of download, decompression, installation and reconfiguration. Our streaming method can reduce(More)
In this paper, we present a mechanism for runtime updating of all kernel modules of a highly modular dynamic real-time operating system. Our approach can help solve the lack of adaptability, extensibility, and flexibility of existing real-time operating systems. The dynamic real-time operating system will efficiently support a wide range of applications(More)
Customer privacy protection is very important in an e-commerce site. Without such protection, the customers may not be willing to provide personal information or conduct business at the site. Therefore, the merchant should protect its customer information in order to gain customer trust. In this paper, an approach for protecting customer information on(More)
To my mother iii ACKNOWLEDGMENTS I would like to express my sincere gratitude and appreciation to everyone who helped make this dissertation possible. First and foremost, I would like to thank my advisor, Professor Vincent J. Mooney III, for his patience and guidance during my graduate study at Georgia Tech. With his knowledge and experience, he has guided(More)
Wireless and embedded portable devices, such as cell phones and PDAs, place a premium on storage and communications bandwidth. The communications channel itself is prone to outages as well. However, users are expecting much more capability from these devices, including the ability to run business applications (e.g., Oracle), play video games, and also to(More)