Delft University of Technology

Displaying 1-40 of 297 results

  • White Papers // Oct 2014

    FPGA-Accelerated Monte-Carlo Integration Using Stratified Sampling and Brownian Bridges

    Monte-Carlo Integration (MCI) is a numerical technique for evaluating integrals which have no closed form solution. Naive MCI randomly samples the integrand at uniformly distributed points. This naive approach converges very slowly. Stratified sampling can be used to concentrate the samples on segments of the integration domain where the integrand...

    Provided By Delft University of Technology

  • White Papers // Apr 2014

    Massivizing Online Games Using Cloud Computing: A Vision

    Online gaming systems are already providing services to an increasing player base, but also to enterprise training, disaster-scenario analysis, and education. Although the current approach services overall hundreds of millions, the predominant industry approach is self-hosting, that is, to buy and operate large-scale infrastructure. This paper cannot scale when the...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Compiler-driven FPGA-area Allocation for Reconfigurable Computing

    In this paper, the authors propose two FPGA-area allocation algorithms based on profiling results for reducing the impact on performance of dynamic reconfiguration overheads. The problem of FPGA-area allocation is presented as a 0-1 integer linear programming problem and efficient solvers are incorporated for finding the optimal solutions. Additionally, they...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Investigation of Single-Cell Dynamic Faults in Deep-Submiron Memory Technologies

    In this paper, a systematic approach to analyze dynamic faults has been described. This paper presents single-cell dynamic fault models for deep-submicron semiconductor memories together with their associated tests (test primitives). The test primitives are evaluated industrially, together with the traditional tests; using 65nm technology 131 Kbytes embedded SRAMs. The...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Motion Estimation and Temporal Up-Conversion on the TM3270 Media-Processor

    The authors present a quantative performance evaluation of several components of a video format conversion algorithm (referred to as Natural Motion (NM)). The implementation platform is a new programmable media-processor, the TM3270, combined with dedicated hardware support. The performance of two compute-intense NM components, Motion Estimation (ME) and Temporal Up-conversion...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Profiling Bluetooth and Linux on the Xilinx Virtex II Pro

    In this paper, the authors present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, they solely focus on the Bluetooth standard and its internal functions. Second, they focus on the Bluetooth standard in conjunction with an...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Optimizing Cache Performance of the Discrete Wavelet Transform Using a Visualization Tool

    The 2D DWT consists of two 1D DWT in both directions: horizontal filtering processes the rows followed by vertical filtering processes the columns. It is well known that a straightforward implementation of the vertical filtering shows quite different performance with various working set sizes. The only reasonable explanation for this...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Parallel FPGA Design of CA CFAR Algorithm

    The authors propose a parallel implementation of the Cell Average Constant False Alarm Rate (CA-CFAR) algorithm in reconfigurable hardware. The design is based on a parallel processing scheme employing extensive data reuse and synchronized sliding windows over the input data sequence. A scalable parallel structure is designed and mapped on...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    The Molen Compiler for Reconfigurable Processors

    In this paper, the authors describe the compiler developed to target the Molen reconfigurable processor and programming paradigm. The compiler automatically generates optimized binary code for C applications, based on pragma annotation of the code executed on the reconfigurable hardware. For the IBM PowerPC 405 processor included in the Virtex...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    FPGA Implementation of Parallel Histogram Computation

    Parallelization of histogram functions is a challenging problem due to memory collisions. The authors propose a hardware technique to avoid memory collisions. It is called Parallel Histogram Computation (PHC). The hardware implementation of the PHC uses a dual-ported memory. This hardware technique needs two phases to perform the histogram function....

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Hardware Acceleration of Sequence Alignment Algorithms - An Overview

    Sequence alignment is one of the most important activities in bioinformatics. With the ever increasing volume of data in bioinformatics databases, the time for comparing a query sequence with the available databases is always increasing. Many algorithms have been proposed to perform and accelerate sequence alignment activities. This paper introduces...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    DWARV: DelftWorkbench Automated Reconfigurable VHDL Generator

    In this paper, the authors present the DWARV C-to-VHDL generation toolset. The toolset provides support for broad range of application domains. It exploits the operation parallelism, available in the algorithms. Their designs are generated with a view of actual hardware/software co-execution on a real hardware platform. The carried experiments on...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Interfacing Operating Systems and Polymorphic Computing Platforms based on the MOLEN Programming Paradigm

    The molen programming paradigm was proposed to offer a general function like execution of the computation intensive parts of the programs on the reconfigurable fabric of the polymorphic computing platforms. Within the molen programming paradigm, the molen set and execute primitives are employed to map an arbitrary function on the...

    Provided By Delft University of Technology

  • White Papers // Dec 2013

    Embedded Reconfigurable Computing: The ERA Approach

    The growing complexity and diversity of embedded systems - combined with continuing demands for higher performance and lower power consumption - places increasing pressure on embedded platforms designers. The target of the ERA project is to offer a holistic, multi-dimensional methodology to address these problems in a unified framework exploiting...

    Provided By Delft University of Technology

  • White Papers // Nov 2013

    Accurate and Efficient Identification of Worst-Case Execution Time for Multicore Processors: A Survey

    Parallel systems were for a long time confined to high-performance computing. However, with the increasing popularity of multicore processors, parallelization has also become important for other computing domains, such as desktops and embedded systems. Mission-critical embedded software, like that used in avionics and automotive industry, also needs to guarantee real...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    Hierarchies in Networks. Emerging Hybrids of Networks and Hierarchies for Producing Internet Security

    Networked governance is the default modus operandi in Internet governance. Even the provisioning of Internet security heavily relies on non-hierarchical, networked forms of organization. Responses to a large-scale botnets show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. Networked governance can be...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    3D-COSTAR: A Cost Model for 3D Stacked ICs

    Selecting appropriate and efficient test flow for a 3D Stacked IC (3D-SIC) is crucial for overall cost optimization. This paper presents 3D-COSTAR, a tool that considers costs involved in the whole 3D-SIC chain, including design, manufacturing, test, packaging and logistics (e.g. related to shipping wafers between a foundry and a...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    A Low Cost Method to Tolerate Soft Errors in the NoC Router Control Plane

    In this paper, the authors propose a low cost method to tolerate soft errors in the main NoC router functional units, i.e., routing units, Virtual Channel (VC) allocators, and switch allocators. The idea behind their proposal is to utilize the idle routing units at neighboring input ports to do redundant...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    Virtual Execution Platforms for Mixed-Time-Criticality Systems: The CompSOC Architecture and Design Flow

    System-on-Chips (SOC) contain multiple concurrent applications with different time criticality (firm, soft, non real-time). As a result, they are often developed by different teams or companies, with different Models Of Computation (MOC) such as dataflow, Kahn Process Networks (KPN), or Time-Triggered (TT). SOC functionality and (real-time) performance is verified after...

    Provided By Delft University of Technology

  • White Papers // Sep 2013

    Heterogeneous Hardware Accelerator Architecture for Streaming Image Processing

    In this paper, the authors propose a heterogeneous hardware accelerator architecture to support streaming image processing. Each image in a data-set is pre-processed on a host processor and sent to hardware kernels. The host processor and the hardware kernels process a stream of images in parallel. The convey hybrid computing...

    Provided By Delft University of Technology

  • White Papers // Aug 2013

    Impact of Mid-Bond Testing in 3D Stacked ICs

    In contrast to planar ICs, during the manufacturing of Three-Dimensional Stacked ICs (3D-SICs) several tests such as pre-bond, mid-bond, post-bond and final tests can be applied. This in turn results into a huge number of test flows/strategies. Selecting appropriate and efficient test flow (for given design and manufacturing parameters such...

    Provided By Delft University of Technology

  • White Papers // Aug 2013

    Throughput Analysis and Voltage-Frequency Island Partitioning for Streaming Applications under Process Variation

    Variability in the manufacturing process results in variation in the maximum supported frequency of individual cores in a Multi-Processor System-on-Chip (MPSoC). This variation needs to be considered when performing statistical timing analysis in the system-level design. In this paper, the authors present a framework to estimate the probability distribution of...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    The BTWorld Use Case for Big Data Analytics: Description, MapReduce Logical Workflow, and Empirical Evaluation

    The commoditization of big data analytics, that is, the deployment, tuning, and future development of big data processing platforms such as MapReduce, relies on a thorough understanding of relevant use cases and workloads. In this paper, the authors propose BTWorld, a use case for time-based big data analytics that is...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Noise Reduction on Memory-Based PUFs

    The efficiency and cost of silicon PUF-based applications, and in particular key generators, are heavily impacted by the level of reproducibility of the bare PUF responses under varying operational circumstances. Error-correcting codes can be used to achieve near-perfect reliability, but come at a high implementation cost especially when the underlying...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Heterogeneous Hardware Accelerators Interconnect: An Overview

    In this paper, the authors present an overview of interconnect solutions for hardware accelerator systems. A number of solutions are presented: bus-based, DMA, crossbar, NoC, as well as combinations of these. The paper proposes analytical models to predict the performance of these solutions and implements them in practice. The jpeg...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    A Software-Based Technique Enabling Composable Hierarchical Preemptive Scheduling for Time-Triggered Applications

    Many embedded real-time applications are typically time-triggered and preemptive schedulers are used to execute tasks of such applications. Orthogonally, composable partitioned embedded platforms use preemptive time-division multiplexing mechanism to isolate applications. Existing composable systems that support two-level scheduling are restricted to cooperative intra-application schedulers, and thus cannot execute the time-triggered...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Security Economics in the HTTPS Value Chain

    Even though the authors increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. They present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. They conceptualize the security...

    Provided By Delft University of Technology

  • White Papers // May 2013

    Scheduling Jobs in the Cloud Using On-demand and Reserved Instances

    A growing number of applications are running in the cloud. Academia and industry are both increasingly using cloud resources as infrastructure to serve their users, due to the elastic, flexible, and pay-as-you-go features of Infrastructure-as-a-Service (IaaS) clouds. Cloud brokers need to lease resources from IaaS clouds cheaply, yet execute the...

    Provided By Delft University of Technology

  • White Papers // May 2013

    3D Stacked Wide-Operand Adders: A Case Study

    In this paper, the authors address the design of wide-operand addition units in the context of the emerging Through-Silicon Vias (TSV) based 3D Stacked IC (3D-SIC) technology. To this end they first identify and classify the potential of the direct folding approach on existing fast prefix adders, and then discuss...

    Provided By Delft University of Technology

  • White Papers // May 2013

    VASILE: A Reconfigurable Vector Architecture for Instruction Level Frequency Scaling

    Coarse-grained dynamic frequency scaling has been extensively utilized in embedded (multiprocessor) platforms to achieve energy reduction and by implication to extend the autonomy and battery lifetime. In this paper the authors propose to make use of fine-grained frequency scaling, i.e., adjust the frequency at instruction level; to increase the instruction...

    Provided By Delft University of Technology

  • White Papers // Apr 2013

    A Direct Measurement Scheme of Amalgamated Aging Effects with Novel On-Chip Sensor

    Aggressive technology scaling has led to a significant reduction of device reliability. As a consequence Integrated Circuits (ICs) reliability became a major issue and Dynamic Reliability Management (DRM) schemes have been proposed to assure ICs' lifetime reliability. Though, up to date, various aging sensors have been proposed, few of them...

    Provided By Delft University of Technology

  • White Papers // Mar 2013

    Autonomic Cloud-Based Operation of Massively Multiplayer Online Games

    Massively Multiplayer Online Games (MMOGs) are a new type of large-scale distributed application characterized by seamless virtual worlds in which millions of world-wide players act and interact in real-time. The authors propose a cloud-based middleware model for autonomic operation of Massively Multiplayer Online Games (MMOGs) which will allow small and...

    Provided By Delft University of Technology

  • White Papers // Mar 2013

    Sesame: A User-Transparent Optimizing Framework for Many-Core Processors

    In recent years, more and more many-core processors are superseding sequential ones. Increasing parallelism, rather than increasing clock rate, has become the primary engine of processor performance growth, and this trend is likely to continue. With the integration of more computational cores and deeper memory hierarchies on modern processors, the...

    Provided By Delft University of Technology

  • White Papers // Feb 2013

    Adapting Particle Filter Algorithms to Many-Core Architectures

    The particle filter is a Bayesian estimation technique based on Monte Carlo simulation. It is ideal for non-linear, non-Gaussian dynamical systems with applications in many areas, such as computer vision, robotics, and econometrics. Practical use has so far been limited, because of steep computational requirements. In this paper, the authors...

    Provided By Delft University of Technology

  • White Papers // Feb 2013

    Towards an Optimized Big Data Processing System

    To perform fast and inexpensive big data analytics, researchers use a processing system represented by a stack of frameworks for data storage, data processing, and data manipulation deployed over a large distributed system. In the context of the data explosion phenomenon, existing performance models for MapReduce are applicable for specific...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Massivizing Multi-Player Online Games on Clouds

    Massively Multiplayer Online Games (MMOGs) are a new type of large-scale distributed application. For example, the social game FarmVille and similar games attract monthly over one hundred million users. Since the early 2000s, MMOGs are traditional HPC users; for example, World of Warcraft (WoW) deploys globally hundreds of thousands of...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Reliability and Variability Analyses in SRAM Decoder

    Modern Static Random Access Memory (SRAM) systems are susceptible to reliability and variability issues. Examples of reliability and variability issues are Bias Temperature Instability (BTI) in the transistors and resistive/open interconnect defects, respectively. This paper analyzes the impacts of BTI and resistive defects independently as well as simultaneously on the...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Configurable Fault-Tolerance for a Configurable VLIW Processor

    In this paper the authors present the design and implementation of configurable fault-tolerance techniques for a configurable VLIW processor. The processor can be configured for 2, 4, or 8 issue-slots with different types of execution Functional Units (FUs), and its Instruction Set Architecture (ISA) is based on the VEX ISA....

    Provided By Delft University of Technology

  • White Papers // Dec 2012

    Exploring Test Opportunities for Memory and Interconnects in 3D ICs

    3D-Stacked IC (3D-SIC) based on Through-Silicon-Vias (TSV) is an emerging technology that provides many benefits such as low power, high bandwidth 3D memories and heterogeneous integration. One of the attractive applications making use of such benefits is the stacking of memory dies on logic. System integrators for such application have...

    Provided By Delft University of Technology

  • White Papers // Dec 2012

    DetLock: Portable and Efficient Deterministic Execution for Shared Memory Multicore Systems

    Multicore systems are not only hard to program but also hard to test, debug and maintain. This is because the traditional way of accessing shared memory in multithreaded applications is to use lock-based synchronization, which is inherently non-deterministic and can cause a multithreaded application to have many different possible execution...

    Provided By Delft University of Technology

  • White Papers // Jan 2010

    On The Performance Variability Of Production Cloud Services

    Cloud computing is an emerging commercial infrastructure paradigm that promises to eliminate the need for companies to maintain expensive computing hardware. Through the use of virtualization and resource time-sharing, clouds address with a single set of physical resources a large user base with different needs. Thus, clouds have the potential...

    Provided By Delft University of Technology

  • White Papers // Sep 2010

    Enterprise Systems Adoption And Firm Performance In Europe: The Role Of Innovation

    Despite the ubiquitous proliferation and importance of Enterprise Systems (ES), little research exists on their post-implementation impact on firm performance, especially in Europe. This paper provides representative, large-sample evidence on the differential effects of different ES types on performance of European enterprises. It also highlights the mediating role of innovation...

    Provided By Delft University of Technology

  • White Papers // Jul 2010

    CAMEO: Enabling Social Networks for Massively Multiplayer Online Games Through Continuous Analytics and Cloud Computing

    Millions of people play Massively Multiplayer Online Games (MMOGs) and participate in the social networks built around MMOGs daily. These players turn into a collaborative com-munity to exchange game news, advice, and expertise, but in return expect support such as player reports and clan statistics. Thus, the MMOG social networks...

    Provided By Delft University of Technology

  • White Papers // Oct 2009

    CAMEO: Continuous Analytics for Massively Multiplayer Online Games on Cloud Resources

    Massively Multiplayer Online Games (MMOGs) have grown to entertain tens of millions of players daily. Currently, the game operators and third-parties using gameplay information rely on pre-provisioned resources to analyze the current status of the player community and the evolution of this status over time. Instead, with the appearance of...

    Provided By Delft University of Technology

  • White Papers // Jun 2010

    Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

    The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover...

    Provided By Delft University of Technology

  • White Papers // Oct 2009

    Security Flaws in a Recent Ultralightweight RFID Protocol

    In this paper, the authors present the cryptanalysis of Lee et al. protocol, which is one of the most recent RFID mutual authentication protocols in the area of ultralightweight cryptography. The scheme presents noteworthy weaknesses related to most of the security properties initially required in its protocol design. Furthermore, the...

    Provided By Delft University of Technology

  • White Papers // Jul 2009

    Multi-Path Routing in Time-Division-Multiplexed Networks on Chip

    The exponential increase in transistor count due to technological progress has resulted in an increase in complexity and processing power of on-chip elements. Recently a stage has been reached where it is not practical anymore to increase the core size, and as a consequence the number of cores, processing elements...

    Provided By Delft University of Technology

  • White Papers // Jun 2009

    Sensitivity of Small Disturbance Angle Stability to the System Parameters of Future Power Networks

    The incorporation of renewable energy sources for the sustainable electricity production is undertaking a more prominent role in electric power systems. Thus, it will be an indispensable incident that the characteristics of future power networks, their prospective stability for instance, get influenced by the imposed features of sustainable energy sources....

    Provided By Delft University of Technology

  • White Papers // Jan 2011

    2Fast : Collaborative Downloads in P2P Networks

    P2P systems that rely on the voluntary contribution of bandwidth by the individual peers may suffer from freeriding. To address this problem, mechanisms enforcing fairness in bandwidth sharing have been designed, usually by limiting the download bandwidth to the available upload bandwidth. As in real environments the latter is much...

    Provided By Delft University of Technology

  • White Papers // Dec 2009

    Modeling and Analyzing the Effects of Firewalls and NATs in P2P Swarming Systems

    Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a Network Address Translator (NAT) or a firewall, making them unable to accept incoming connections (i.e. unconnectable). Peers suffering from this limitation cannot fully enjoy the advantages...

    Provided By Delft University of Technology

  • White Papers // Mar 2010

    A Diagnostic Approach to Test Prioritization

    In development processes with high code production rates testing typically triggers fault diagnosis to localize the detected failures. However, current test prioritization algorithms are tuned for failure detection rate rather than diagnostic information. Consequently, unnecessary diagnostic effort might be spent to localize the faults. This paper presents a dynamic test...

    Provided By Delft University of Technology

  • White Papers // Jan 2010

    Comparing Coordination Arrangements Enabled by Web Services and Web Service Orchestration Technology

    Web services create interoperability among information systems and web service orchestration enables the coordination of activities. Both enable public agencies to cooperate more and more in chains to deliver services to their constituents. There are various ways to organize the coordination of cross-agency processes. In general it can be done...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice

    Cloud Computing is a new paradigm in the world of IT. In traditional IT environments, clients connected to a number of servers located on company premises. In Cloud Computing, users connect to the 'Cloud', appearing as a single entity as opposed to multiple servers. Outsourcing data to the Cloud Service...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    A 65-Nm CMOS Temperature-Compensated Mobility-Based Frequency Reference for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is based on small, cheap and energy efficient nodes. Since the largest fraction of the energy used in each node is spent listening to the channel, synchronous networks are employed to reduce such idle listening time. In that case, the receiver predicts the timeslot that the...

    Provided By Delft University of Technology

  • White Papers // Mar 2010

    Protection of an Intrusion Detection Engine With Watermarking in Ad Hoc Networks

    In this paper, the authors present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information that must be exchanged between nodes. In particular, they exploit information visualization and machine learning techniques in...

    Provided By Delft University of Technology

  • White Papers // Mar 2012

    2D UWB Localization in Indoor Multipath Environment Using a Joint ToA/DoA Technique

    A 2D UWB localization technique based on joint ToA/DoA in indoor dense multipath environment is proposed. In this method, Direction of Arrival (DoA) is estimated from Time of Arrival (ToA). The joint usage of ToA and DoA results in an accurate localization of the mobile node (MN). Unlike conventional methods,...

    Provided By Delft University of Technology

  • White Papers // Oct 2009

    A Novel Non-Iterative Localization Solution

    In this paper, a new method is proposed for low complexity localization based on measured/estimated ranges. First, it is proved that the method provides a better estimator than the well known non-iterative direct methods documented in literature, i.e. the Spherical Interpolation and the Linear Least Squares method. It does so...

    Provided By Delft University of Technology

  • White Papers // Aug 2012

    Benchmarking in the Cloud: What It Should, Can, and Cannot Be

    With the increasing adoption of Cloud Computing, the authors observe an increasing need for Cloud Benchmarks, in order to assess the performance of Cloud infrastructures and software stacks, to assist with provisioning decisions for Cloud users, and to compare Cloud offerings. They understand their paper as one of the first...

    Provided By Delft University of Technology

  • White Papers // May 2009

    Classifying RFID Attacks and Defenses

    RFID (Radio Frequency IDentification) systems are one of the most pervasive computing technologies with technical potential and pro table opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops...

    Provided By Delft University of Technology

  • White Papers // Oct 2008

    COPnets: Cooperative Internet Security Systems

    In this paper, the authors introduce the concept of COPnets. A COPnet refers to a network of security systems (agents) that cooperate to form a collaborative defence system. COPnets give answer to the growing complexity and sophistication of attacks, like DDOS and other botnets. In a COPnet each existing security...

    Provided By Delft University of Technology

  • White Papers // Jun 2011

    Agent-Based Organisational Governance of Services

    The objective of Service-Oriented Computing (SOC) is to construct software applications out of appropriate services available and executing in place anywhere across the Web. To achieve this objective requires that techniques for discovering and engaging services be developed and used across the lifetime of the service-based applications. Succeeding with SOC...

    Provided By Delft University of Technology

  • White Papers // Sep 2012

    JAG: Reliable and Predictable Wireless Agreement Under External Radio Interference

    Wireless low-power transceivers used in sensor networks typically operate in unlicensed frequency bands that are subject to external radio interference caused by devices transmitting at much higher power. Communication protocols should therefore be designed to be robust against such interference. A critical building block of many protocols at all layers...

    Provided By Delft University of Technology

  • White Papers // Oct 2009

    Analyzing the Effect of Node Mobility in Clustered Wireless Ad Hoc Networks

    Clustering has been used as a fundamental tool to improve scalability in large wireless ad-hoc networks. Techniques based on clustering, such as routing, self-organization, context management, service discovery, etc., ensure QoS in wireless ad-hoc networks when the number of devices increases. The crucial issue of clustering is the overhead generated...

    Provided By Delft University of Technology

  • White Papers // Nov 2012

    IaaS Cloud Benchmarking: Approaches, Challenges, and Experience

    Infrastructure-as-a-Service (IaaS) cloud computing is an emerging commercial infrastructure paradigm under which clients (users) can lease resources when and for how long needed, under a cost model that reflects the actual usage of resources by the client. For IaaS clouds to become mainstream technology and for current cost models to...

    Provided By Delft University of Technology

  • White Papers // Jun 2010

    How Do Enterprise System Applications Create Business Value for European Firms? New Evidence for the Mediation Effects of Product and Process Innovation

    Despite the ubiquitous proliferation and importance of enterprise system applications, there exists little empirical research on their performance effects, especially among European firms. This paper provides large-sample, economy-wide evidence on the differential effects of enterprise systems adoption on firm performance. It explains how business value is actually created by differentiating...

    Provided By Delft University of Technology

  • White Papers // Jul 2011

    A Secure Distance-Based RFID Identification Protocol With an Off-Line Back-End Database

    The design of a secure RFID identification scheme is a thought-provoking challenge and this paper deals with this problem adopting a groundbreaking approach. The proposed protocol, called Noent, is based on cryptographic puzzles to avoid the indiscriminate disclose of the confidential information stored on tags and on an innovative role...

    Provided By Delft University of Technology

  • White Papers // Jul 2010

    ASH: Tackling Node Mobility in Large-Scale Networks

    With an increased adoption of technologies like wireless sensor networks by real-world applications, dynamic network topologies are becoming the rule rather than the exception. Node mobility, however, introduces a range of problems (communication interference, path uncertainty, low quality of service and information loss, etc.) that are not handled well by...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept

    This paper proposes a cognitive management framework for realizing and exploiting the Internet of Things concept in the Future Internet (FI) era. Cognitive systems offer self-x and learning. A cognitive system has the ability to dynamically select its behavior through self-management/awareness functionality, taking into account information and knowledge on the...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    Approximate Service Provisioning in an Invisible Network of the Future

    Communication and specifically networking has brought a huge change in the people lifestyles. Coupled with the increased use of mobile services, more and more population is increasingly being networked. It is observed that people are dependent on networks, networked devices, and the services provided by them. People, in the near...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    COGMAN: A Cognitive Management Framework to Support Exploitation of the Future Internet

    In this paper, a cognitive management framework is proposed for ensuring exploitation of the Future Internet (FI). Cognitive systems offer self-x and learning. A cognitive system has the ability to dynamically select its behavior through self-management/awareness functionality, taking into account information and knowledge on the context of the operations as...

    Provided By Delft University of Technology

  • White Papers // Jul 2010

    Neighbor Discovery in 60 GHz Wireless Personal Area Networks

    60GHz radio is a promising technology which can handle the data rate of the order of gigabits-per-second. Hence, it is an attractive candidate for Wireless Personal Area Networks (WPANs). Due to the high path loss, directional antennas are recommended for use in 60GHz systems. To set-up directional communications, it is...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    Performance Measures of Dynamic Spectrum Access Networks

    In this paper, the authors give insight into the performance of Dynamic Spectrum Access Networks (DSAN), analyzing Quality of Detection of Primary User (PU) and DSAN blocking probability, when the channel is under the effect of log-normal shadowing. Specifically they propose a distributed power conserving PU detection architecture and investigate...

    Provided By Delft University of Technology

  • White Papers // Feb 2011

    Impact of Antenna Pattern and Link Model on Directional Neighbor Discovery in 60 GHz Networks

    60GHz radio is a very attractive technology for short-range wireless communication due to its capability to provide Gbps data rate. To address the Neighbor Discovery (ND) problem in 60GHz networks, the authors propose a novel analytical framework to investigate the ND performance. The main difficulty in modeling the ND process...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    A Survey on Handoffs - Lessons for 60 GHz Based Wireless Systems

    Wireless communication is playing an important role in the people daily life since it offers flexibility and mobility. New multimedia services demand data-rates of up to hundreds of Mbps and thus higher frequency bands are being explored to support these new high data rate services. However, to support mobility, handoff...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    In House High Definition Multimedia: An Overview on Quality-of-Service Requirements

    The increasing demand for high definition multimedia applications in indoor environment requires a novel network design, which should be devised on a clear understanding of Quality-of-Service (QoS) requirements of the applications. In this paper, the authors present an overview of the current and future High Definition (HD) multimedia applications, classify...

    Provided By Delft University of Technology

  • White Papers // Apr 2012

    A New Ant Colony Routing Approach With a Trade-Off Between System and User Optimum

    Dynamic Traffic Routing (DTR) refers to the process of (re)directing traffic at junctions in a traffic network corresponding to the evolving traffic conditions as time progresses. This paper considers the DTR problem for a traffic network defined as a directed graph, and deals with the mathematical aspects of the resulting...

    Provided By Delft University of Technology

  • White Papers // Aug 2011

    A Distributed Optimization-Based Approach for Hierarchical Model Predictive Control of Large-Scale Systems With Coupled Dynamics and Constraints: Extended Report

    The authors present a hierarchical model predictive control approach for large-scale systems based on dual decomposition. The proposed scheme allows coupling in both dynamics and constraints between the subsystems and generates a primal feasible solution within a finite number of iterations, using primal averaging and a constraint tightening approach. The...

    Provided By Delft University of Technology

  • White Papers // Sep 2010

    Quasi-Linear Cryptanalysis of a Secure RFID Ultralight-weight Authentication Protocol

    In the RFID context, some researchers have dealt with the stimulating challenge of designing secure RFID protocols based only on simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND and modular addition. This type of RFID protocols are categorized as ultralight-weight protocols, and are intended for very...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    On the Energy Savings of Network Coding in Wireless Networks

    The energy consumption of a wireless device is modeled by including not only the energy emitted while transmitting, but also energy consumed by supporting circuitry. In particular also receiver energy consumption is taken into account. It is shown that under this model, compared to traditional routing, the energy reduction offered...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    Privacy Regulations for Cloud Computing

    Cloud Computing is a new paradigm in the world of IT. In traditional IT environments, clients connected to a number of servers located on company premises. In Cloud Computing, users connect to the 'Cloud', appearing as a single entity as opposed to multiple servers. Outsourcing data to the Cloud Service...

    Provided By Delft University of Technology