INE5346 - Software/Hardware Integration - 2002/2

Program

Schedule

Day Time Hours Room
Tuesday 13:30 2 LAB
Thursday 13:30 2 LAB

Mailing list

The class can be reached through a mailing list. Click here to send us a message.

Students

D: desing, I: implementation, P: integration and presentation, M = (D + I + P) / 3
Name D I P M
Alexandre Honorio Silva 8.5 10.0 10.0 9.5
Alvaro Millen da Silveira Neto - - - -
Andre Ossamu Sato - - - -
Arliones Stevert Hoeller Junior 8.5 10.0 10.0 9.5
Bruno Bisol 9.5 10.0 9.5 9.5
Carlos Eduardo Lenz 9.0 10.0 10.0 10.0
Djan Belli 8.5 9.0 7.0 8.0
Eduardo Erle dos Santos 9.0 10.0 10.0 10.0
Fabio Cechinel Veronez 9.5 10.0 9.5 9.5
Fabricio Barcellos Aguirre 8.5 - - 3.0
Filipe Rondon Quintanilha 9.5 9.5 9.5 9.5
Iomani Engelmann Gomes 9.0 10.0 10.0 10.0
Julio Cezar Rodrigues Sincero 9.0 10.0 10.0 10.0
Luis Fernando Jordan 8.5 9.0 7.0 8.0
Rafael Henchen 8.5 9.0 7.0 8.0

Practical Work

The scenario for this edition of SHI has been jointly developed by Marcelo Trierveiler Pereira, a M.Sc. student within LISHA. We envisioned an realistic scenery in which Earth's natural resources have been almost exhausted: on the one hand, some said-developed countries hold emissions of pollutant substances at unacceptable levels for decades; on the other hand, some said-developing countries kept destroying their forests and rivers at a quick pace. Fortunately, the International Court of Hague (you thought it should be the UN? I said the scenario should be somehow realistic :-) got authority to judge the world's biggest enemies (no, not the terrorists, the nature destructors).

However, on the eve of mankind's most important trial, which should put an end to Earth destruction, a group of nature-destructors got to put their hands on the sophisticated computer that was holding the evidence files. Being unable to explode such a fine engineering masterpiece, the nature-destructors got to erase the computer's operating system, leaving behind only the encrypted evidence files. Moving the media in which the files were stored to another computer wasn't possible either, since the nature-destructors managed to trap the device in a pollutant-bomb that is able to pollute most of little Amazon (yes, by this time, Amazon isn't that large anymore).

In summary, our challenge is to reprogram the hacked device from scratch, so the evidence files can get to Hague on time. For this purpose, all we've got is a boot loader over an infrared connection.

What is what?

Students' Work

  1. A setup utility for the Khomp platform, by Filipe Rondon Quintanilha e Alvaro Millen da Silveira Neto.
  2. A set of EPOS abstractions to build an executive for the Khomp platform (memory), by Arliones Stevert Hoeller Junior e Alexandre Honorio Silva
  3. A set of EPOS abstractions to build an executive for the Khomp platform (process), by Carlos Eduardo Lenz, Iomani Engelmann Gomes e Eduardo Erle dos Santos
  4. An UART mediator for EPOS on the Khomp platform, by Rafael Henchen e Luis Fernando Jordan.
  5. A flash memory mediator for EPOS on Khomp platform, by Djan Belli e Fabricio Barcellos Aguirre.
  6. An Ethernet mediator for EPOS on the Khomp platform, by Julio Cezar Rodrigues Sincero.
  7. The scanning/decoding application , by Bruno Bisol e Fabio Cechinel Veronez.