Delft University of Technology

Displaying 1-40 of 300 results

  • White Papers // Apr 2014

    Massivizing Online Games Using Cloud Computing: A Vision

    Online gaming systems are already providing services to an increasing player base, but also to enterprise training, disaster-scenario analysis, and education. Although the current approach services overall hundreds of millions, the predominant industry approach is self-hosting, that is, to buy and operate large-scale infrastructure. This paper cannot scale when the...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Profiling Bluetooth and Linux on the Xilinx Virtex II Pro

    In this paper, the authors present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, they solely focus on the Bluetooth standard and its internal functions. Second, they focus on the Bluetooth standard in conjunction with an...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Compiler-driven FPGA-area Allocation for Reconfigurable Computing

    In this paper, the authors propose two FPGA-area allocation algorithms based on profiling results for reducing the impact on performance of dynamic reconfiguration overheads. The problem of FPGA-area allocation is presented as a 0-1 integer linear programming problem and efficient solvers are incorporated for finding the optimal solutions. Additionally, they...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Hardware Acceleration of Sequence Alignment Algorithms - An Overview

    Sequence alignment is one of the most important activities in bioinformatics. With the ever increasing volume of data in bioinformatics databases, the time for comparing a query sequence with the available databases is always increasing. Many algorithms have been proposed to perform and accelerate sequence alignment activities. This paper introduces...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    DWARV: DelftWorkbench Automated Reconfigurable VHDL Generator

    In this paper, the authors present the DWARV C-to-VHDL generation toolset. The toolset provides support for broad range of application domains. It exploits the operation parallelism, available in the algorithms. Their designs are generated with a view of actual hardware/software co-execution on a real hardware platform. The carried experiments on...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Investigation of Single-Cell Dynamic Faults in Deep-Submiron Memory Technologies

    In this paper, a systematic approach to analyze dynamic faults has been described. This paper presents single-cell dynamic fault models for deep-submicron semiconductor memories together with their associated tests (test primitives). The test primitives are evaluated industrially, together with the traditional tests; using 65nm technology 131 Kbytes embedded SRAMs. The...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Motion Estimation and Temporal Up-Conversion on the TM3270 Media-Processor

    The authors present a quantative performance evaluation of several components of a video format conversion algorithm (referred to as Natural Motion (NM)). The implementation platform is a new programmable media-processor, the TM3270, combined with dedicated hardware support. The performance of two compute-intense NM components, Motion Estimation (ME) and Temporal Up-conversion...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Optimizing Cache Performance of the Discrete Wavelet Transform Using a Visualization Tool

    The 2D DWT consists of two 1D DWT in both directions: horizontal filtering processes the rows followed by vertical filtering processes the columns. It is well known that a straightforward implementation of the vertical filtering shows quite different performance with various working set sizes. The only reasonable explanation for this...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    FPGA Implementation of Parallel Histogram Computation

    Parallelization of histogram functions is a challenging problem due to memory collisions. The authors propose a hardware technique to avoid memory collisions. It is called Parallel Histogram Computation (PHC). The hardware implementation of the PHC uses a dual-ported memory. This hardware technique needs two phases to perform the histogram function....

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    The Molen Compiler for Reconfigurable Processors

    In this paper, the authors describe the compiler developed to target the Molen reconfigurable processor and programming paradigm. The compiler automatically generates optimized binary code for C applications, based on pragma annotation of the code executed on the reconfigurable hardware. For the IBM PowerPC 405 processor included in the Virtex...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Parallel FPGA Design of CA CFAR Algorithm

    The authors propose a parallel implementation of the Cell Average Constant False Alarm Rate (CA-CFAR) algorithm in reconfigurable hardware. The design is based on a parallel processing scheme employing extensive data reuse and synchronized sliding windows over the input data sequence. A scalable parallel structure is designed and mapped on...

    Provided By Delft University of Technology

  • White Papers // Jan 2014

    Interfacing Operating Systems and Polymorphic Computing Platforms based on the MOLEN Programming Paradigm

    The molen programming paradigm was proposed to offer a general function like execution of the computation intensive parts of the programs on the reconfigurable fabric of the polymorphic computing platforms. Within the molen programming paradigm, the molen set and execute primitives are employed to map an arbitrary function on the...

    Provided By Delft University of Technology

  • White Papers // Dec 2013

    Embedded Reconfigurable Computing: The ERA Approach

    The growing complexity and diversity of embedded systems - combined with continuing demands for higher performance and lower power consumption - places increasing pressure on embedded platforms designers. The target of the ERA project is to offer a holistic, multi-dimensional methodology to address these problems in a unified framework exploiting...

    Provided By Delft University of Technology

  • White Papers // Nov 2013

    Accurate and Efficient Identification of Worst-Case Execution Time for Multicore Processors: A Survey

    Parallel systems were for a long time confined to high-performance computing. However, with the increasing popularity of multicore processors, parallelization has also become important for other computing domains, such as desktops and embedded systems. Mission-critical embedded software, like that used in avionics and automotive industry, also needs to guarantee real...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    Hierarchies in Networks. Emerging Hybrids of Networks and Hierarchies for Producing Internet Security

    Networked governance is the default modus operandi in Internet governance. Even the provisioning of Internet security heavily relies on non-hierarchical, networked forms of organization. Responses to a large-scale botnets show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. Networked governance can be...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    3D-COSTAR: A Cost Model for 3D Stacked ICs

    Selecting appropriate and efficient test flow for a 3D Stacked IC (3D-SIC) is crucial for overall cost optimization. This paper presents 3D-COSTAR, a tool that considers costs involved in the whole 3D-SIC chain, including design, manufacturing, test, packaging and logistics (e.g. related to shipping wafers between a foundry and a...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    A Low Cost Method to Tolerate Soft Errors in the NoC Router Control Plane

    In this paper, the authors propose a low cost method to tolerate soft errors in the main NoC router functional units, i.e., routing units, Virtual Channel (VC) allocators, and switch allocators. The idea behind their proposal is to utilize the idle routing units at neighboring input ports to do redundant...

    Provided By Delft University of Technology

  • White Papers // Oct 2013

    Virtual Execution Platforms for Mixed-Time-Criticality Systems: The CompSOC Architecture and Design Flow

    System-on-Chips (SOC) contain multiple concurrent applications with different time criticality (firm, soft, non real-time). As a result, they are often developed by different teams or companies, with different Models Of Computation (MOC) such as dataflow, Kahn Process Networks (KPN), or Time-Triggered (TT). SOC functionality and (real-time) performance is verified after...

    Provided By Delft University of Technology

  • White Papers // Sep 2013

    Heterogeneous Hardware Accelerator Architecture for Streaming Image Processing

    In this paper, the authors propose a heterogeneous hardware accelerator architecture to support streaming image processing. Each image in a data-set is pre-processed on a host processor and sent to hardware kernels. The host processor and the hardware kernels process a stream of images in parallel. The convey hybrid computing...

    Provided By Delft University of Technology

  • White Papers // Aug 2013

    Impact of Mid-Bond Testing in 3D Stacked ICs

    In contrast to planar ICs, during the manufacturing of Three-Dimensional Stacked ICs (3D-SICs) several tests such as pre-bond, mid-bond, post-bond and final tests can be applied. This in turn results into a huge number of test flows/strategies. Selecting appropriate and efficient test flow (for given design and manufacturing parameters such...

    Provided By Delft University of Technology

  • White Papers // Aug 2013

    Throughput Analysis and Voltage-Frequency Island Partitioning for Streaming Applications under Process Variation

    Variability in the manufacturing process results in variation in the maximum supported frequency of individual cores in a Multi-Processor System-on-Chip (MPSoC). This variation needs to be considered when performing statistical timing analysis in the system-level design. In this paper, the authors present a framework to estimate the probability distribution of...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    The BTWorld Use Case for Big Data Analytics: Description, MapReduce Logical Workflow, and Empirical Evaluation

    The commoditization of big data analytics, that is, the deployment, tuning, and future development of big data processing platforms such as MapReduce, relies on a thorough understanding of relevant use cases and workloads. In this paper, the authors propose BTWorld, a use case for time-based big data analytics that is...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Noise Reduction on Memory-Based PUFs

    The efficiency and cost of silicon PUF-based applications, and in particular key generators, are heavily impacted by the level of reproducibility of the bare PUF responses under varying operational circumstances. Error-correcting codes can be used to achieve near-perfect reliability, but come at a high implementation cost especially when the underlying...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Heterogeneous Hardware Accelerators Interconnect: An Overview

    In this paper, the authors present an overview of interconnect solutions for hardware accelerator systems. A number of solutions are presented: bus-based, DMA, crossbar, NoC, as well as combinations of these. The paper proposes analytical models to predict the performance of these solutions and implements them in practice. The jpeg...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    A Software-Based Technique Enabling Composable Hierarchical Preemptive Scheduling for Time-Triggered Applications

    Many embedded real-time applications are typically time-triggered and preemptive schedulers are used to execute tasks of such applications. Orthogonally, composable partitioned embedded platforms use preemptive time-division multiplexing mechanism to isolate applications. Existing composable systems that support two-level scheduling are restricted to cooperative intra-application schedulers, and thus cannot execute the time-triggered...

    Provided By Delft University of Technology

  • White Papers // Jun 2013

    Security Economics in the HTTPS Value Chain

    Even though the authors increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. They present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. They conceptualize the security...

    Provided By Delft University of Technology

  • White Papers // May 2013

    Scheduling Jobs in the Cloud Using On-demand and Reserved Instances

    A growing number of applications are running in the cloud. Academia and industry are both increasingly using cloud resources as infrastructure to serve their users, due to the elastic, flexible, and pay-as-you-go features of Infrastructure-as-a-Service (IaaS) clouds. Cloud brokers need to lease resources from IaaS clouds cheaply, yet execute the...

    Provided By Delft University of Technology

  • White Papers // May 2013

    3D Stacked Wide-Operand Adders: A Case Study

    In this paper, the authors address the design of wide-operand addition units in the context of the emerging Through-Silicon Vias (TSV) based 3D Stacked IC (3D-SIC) technology. To this end they first identify and classify the potential of the direct folding approach on existing fast prefix adders, and then discuss...

    Provided By Delft University of Technology

  • White Papers // May 2013

    VASILE: A Reconfigurable Vector Architecture for Instruction Level Frequency Scaling

    Coarse-grained dynamic frequency scaling has been extensively utilized in embedded (multiprocessor) platforms to achieve energy reduction and by implication to extend the autonomy and battery lifetime. In this paper the authors propose to make use of fine-grained frequency scaling, i.e., adjust the frequency at instruction level; to increase the instruction...

    Provided By Delft University of Technology

  • White Papers // Apr 2013

    A Direct Measurement Scheme of Amalgamated Aging Effects with Novel On-Chip Sensor

    Aggressive technology scaling has led to a significant reduction of device reliability. As a consequence Integrated Circuits (ICs) reliability became a major issue and Dynamic Reliability Management (DRM) schemes have been proposed to assure ICs' lifetime reliability. Though, up to date, various aging sensors have been proposed, few of them...

    Provided By Delft University of Technology

  • White Papers // Mar 2013

    Autonomic Cloud-Based Operation of Massively Multiplayer Online Games

    Massively Multiplayer Online Games (MMOGs) are a new type of large-scale distributed application characterized by seamless virtual worlds in which millions of world-wide players act and interact in real-time. The authors propose a cloud-based middleware model for autonomic operation of Massively Multiplayer Online Games (MMOGs) which will allow small and...

    Provided By Delft University of Technology

  • White Papers // Mar 2013

    Sesame: A User-Transparent Optimizing Framework for Many-Core Processors

    In recent years, more and more many-core processors are superseding sequential ones. Increasing parallelism, rather than increasing clock rate, has become the primary engine of processor performance growth, and this trend is likely to continue. With the integration of more computational cores and deeper memory hierarchies on modern processors, the...

    Provided By Delft University of Technology

  • White Papers // Feb 2013

    Adapting Particle Filter Algorithms to Many-Core Architectures

    The particle filter is a Bayesian estimation technique based on Monte Carlo simulation. It is ideal for non-linear, non-Gaussian dynamical systems with applications in many areas, such as computer vision, robotics, and econometrics. Practical use has so far been limited, because of steep computational requirements. In this paper, the authors...

    Provided By Delft University of Technology

  • White Papers // Feb 2013

    Towards an Optimized Big Data Processing System

    To perform fast and inexpensive big data analytics, researchers use a processing system represented by a stack of frameworks for data storage, data processing, and data manipulation deployed over a large distributed system. In the context of the data explosion phenomenon, existing performance models for MapReduce are applicable for specific...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Massivizing Multi-Player Online Games on Clouds

    Massively Multiplayer Online Games (MMOGs) are a new type of large-scale distributed application. For example, the social game FarmVille and similar games attract monthly over one hundred million users. Since the early 2000s, MMOGs are traditional HPC users; for example, World of Warcraft (WoW) deploys globally hundreds of thousands of...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Reliability and Variability Analyses in SRAM Decoder

    Modern Static Random Access Memory (SRAM) systems are susceptible to reliability and variability issues. Examples of reliability and variability issues are Bias Temperature Instability (BTI) in the transistors and resistive/open interconnect defects, respectively. This paper analyzes the impacts of BTI and resistive defects independently as well as simultaneously on the...

    Provided By Delft University of Technology

  • White Papers // Jan 2013

    Configurable Fault-Tolerance for a Configurable VLIW Processor

    In this paper the authors present the design and implementation of configurable fault-tolerance techniques for a configurable VLIW processor. The processor can be configured for 2, 4, or 8 issue-slots with different types of execution Functional Units (FUs), and its Instruction Set Architecture (ISA) is based on the VEX ISA....

    Provided By Delft University of Technology

  • White Papers // Dec 2012

    Exploring Test Opportunities for Memory and Interconnects in 3D ICs

    3D-Stacked IC (3D-SIC) based on Through-Silicon-Vias (TSV) is an emerging technology that provides many benefits such as low power, high bandwidth 3D memories and heterogeneous integration. One of the attractive applications making use of such benefits is the stacking of memory dies on logic. System integrators for such application have...

    Provided By Delft University of Technology

  • White Papers // Dec 2012

    DetLock: Portable and Efficient Deterministic Execution for Shared Memory Multicore Systems

    Multicore systems are not only hard to program but also hard to test, debug and maintain. This is because the traditional way of accessing shared memory in multithreaded applications is to use lock-based synchronization, which is inherently non-deterministic and can cause a multithreaded application to have many different possible execution...

    Provided By Delft University of Technology

  • White Papers // Dec 2012

    Impact of Partial Resistive Defects and Bias Temperature Instability on SRAM Decoder Reliablity

    Partial open defects in modern Static Random Access Memory (SRAM) address decoders are one of the main causes of small delays; these are hard to detect and may result in escapes and reliability problems. In addition, aging failures -such as Bias Temperature Instability (BTI) - may worsen the situation and...

    Provided By Delft University of Technology

  • White Papers // Jun 2009

    Sensitivity of Small Disturbance Angle Stability to the System Parameters of Future Power Networks

    The incorporation of renewable energy sources for the sustainable electricity production is undertaking a more prominent role in electric power systems. Thus, it will be an indispensable incident that the characteristics of future power networks, their prospective stability for instance, get influenced by the imposed features of sustainable energy sources....

    Provided By Delft University of Technology

  • White Papers // Oct 2009

    Security Flaws in a Recent Ultralightweight RFID Protocol

    In this paper, the authors present the cryptanalysis of Lee et al. protocol, which is one of the most recent RFID mutual authentication protocols in the area of ultralightweight cryptography. The scheme presents noteworthy weaknesses related to most of the security properties initially required in its protocol design. Furthermore, the...

    Provided By Delft University of Technology

  • White Papers // Jan 2011

    2Fast : Collaborative Downloads in P2P Networks

    P2P systems that rely on the voluntary contribution of bandwidth by the individual peers may suffer from freeriding. To address this problem, mechanisms enforcing fairness in bandwidth sharing have been designed, usually by limiting the download bandwidth to the available upload bandwidth. As in real environments the latter is much...

    Provided By Delft University of Technology

  • White Papers // Dec 2009

    Modeling and Analyzing the Effects of Firewalls and NATs in P2P Swarming Systems

    Many P2P systems have been designed without taking into account an important factor: a large fraction of Internet users nowadays are located behind a Network Address Translator (NAT) or a firewall, making them unable to accept incoming connections (i.e. unconnectable). Peers suffering from this limitation cannot fully enjoy the advantages...

    Provided By Delft University of Technology

  • White Papers // Apr 2010

    A 65-Nm CMOS Temperature-Compensated Mobility-Based Frequency Reference for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is based on small, cheap and energy efficient nodes. Since the largest fraction of the energy used in each node is spent listening to the channel, synchronous networks are employed to reduce such idle listening time. In that case, the receiver predicts the timeslot that the...

    Provided By Delft University of Technology

  • White Papers // Mar 2011

    BOTCLOUDS the Future of Cloud-Based Botnets?

    Many Cloud Service Providers (CSP) offer access to scalable, reliable computing resources following a pay-as-you-go model. Research into security of the Cloud focuses mainly on protecting legitimate users of Cloud services from attacks by external, malicious users. Little attention is given to prohibit malicious users from using the Cloud to...

    Provided By Delft University of Technology

  • White Papers // Jan 2011

    An Agent-Based Infrastructure for Energy Profile Capture and Management

    Accurately monitoring changing energy usage patterns in households is a first requirement for more efficient and eco-friendly energy management. Such data is essential to the establishment of the Smart Grid, but at this stage, domestic data collection devices are still in development and monitoring-enabled domestic appliances are rare, so that...

    Provided By Delft University of Technology

  • White Papers // Apr 2011

    Identifying Time-Varying Channels With Aid of Pilots for MIMO-OFDM

    In this paper, the authors consider pilot-aided channel estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems with a Multiple-Input Multiple-Output (MIMO) setup. The channel is time-varying due to Doppler effects, and can be approximated by an oversampled complex-exponential basis expansion model [(O)CE-BEM]. They use a Best Linear Unbiased Estimator (BLUE)...

    Provided By Delft University of Technology

  • White Papers // Sep 2009

    Energy-Efficient Spectrum Sensing for Cognitive Sensor Networks

    The authors consider a combined sleeping and censoring scheme for energy-efficient spectrum sensing in cognitive sensor networks. They analyze the detection performance of this scheme by theoretically deriving the global probabilities of detection and false-alarm. Their goal is to minimize the energy consumption incurred in distributed sensing, given constraints on...

    Provided By Delft University of Technology

  • White Papers // Jan 2011

    Low-Complexity Block Turbo Equalization for OFDM Systems in Time-And Frequency-Selective Channels

    A low-complexity block turbo equalizer is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) systems in time and frequency-selective channels. The complexity of the proposed algorithm is linear in the number of subcarriers by exploiting the band structure of the frequency-domain channel matrix. The presented block turbo equalizer is based on a...

    Provided By Delft University of Technology

  • White Papers // Jan 2011

    Optimal Hard Fusion Strategies for Cognitive Radio Networks

    Optimization of hard fusion spectrum sensing using the k-out-of-N rule is considered. Two different setups are used to derive the optimal k. A throughput optimization setup is defined by minimizing the probability of false alarm subject to a probability of detection constraint representing the interference of a cognitive radio with...

    Provided By Delft University of Technology

  • White Papers // Oct 2010

    Performance Evaluation of an IEEE 802.15.4 Cognitive Radio Link in the 2360-2400 MHz Band

    In this paper, the authors analyze the performance of an IEEE 802.15.4 radio link in the 2360-2400 MHz band to support the ongoing Medical Body Area Network (MBAN) standardization activities in IEEE 802.15. There has been a lot of interest recently in opening the 2360-2400 MHz band for secondary allocations...

    Provided By Delft University of Technology

  • White Papers // Nov 2010

    Block Transmission Over Multi-Scale Multi-Lag Wireless Channels

    In this paper, new parametric models for wideband, timevarying channels are developed. These models seek to describe multi-scale, multi-lag channels. The new model is adapted from recently defined scale-lag canonical models, which suffer from model mismatch issues when employed with wavelet signaling. The main challenge of the scale-lag canonical models...

    Provided By Delft University of Technology

  • White Papers // Jul 2010

    Energy Detection of Wideband and Ultra-Wideband PPM

    In this paper, energy detectors are developed for wideband and Ultra-WideBand (UWB) Pulse Position Modulation (PPM). Exact Bit Error Probability (BEP) formulas are derived under different assumptions about the channel. More specifically, the authors present an expression for the instantaneous BEP for a specific channel realization, as well as an...

    Provided By Delft University of Technology

  • White Papers // Sep 2011

    Pseudoseeds: Investigating Long-Distance, Ocean Seed Dispersal With Wireless Sensors

    Recent theoretical research has shown that ocean currents and wind interact to disperse seeds over long distances among isolated landmasses. Dispersal of seeds among isolated oceanic islands, by birds, oceans and man, is a well-known phenomenon, and many widespread island plants have traits that facilitate this process. Crucially, however, there...

    Provided By Delft University of Technology

  • White Papers // Nov 2011

    Opal: A Multi-Radio Platform for High Throughput Wireless Sensor Networks

    Design of current sensor network platforms has favored low power operation at the cost of communication throughput or range, which severely limits support for real-time monitoring applications with high throughput requirements. This paper presents the design of the versatile Opal platform that couples a Cortex M3 MCU with two IEEE...

    Provided By Delft University of Technology

  • White Papers // Jun 2011

    FailDetect: Gossip-Based Failure Estimator for Large-Scale Dynamic Networks

    Ubiquitous and wirelessly connected devices are the present status quo in terms of networks around one. With the ever increase of scale, there comes also the problem of various transmission failures. They are usually caused by hardware, software, or any other medium access contention. For the case of mobile networks,...

    Provided By Delft University of Technology

  • White Papers // Apr 2011

    Chrysso - A Multi-Channel Approach to Mitigate External Interference

    When a wireless sensor network is deployed indoors, sensor nodes often need to compete for channel usage with other, more powerful devices such as 802.11 access points. To mitigate the effects of such external interference the authors propose Chrysso, a protocol extension specifically designed for data collection applications that leverages...

    Provided By Delft University of Technology

  • White Papers // Jul 2011

    NetDetect: Neighborhood Discovery in Wireless Networks Using Adaptive Beacons

    It is generally foreseen that the number of wirelessly connected networking devices will increase in the next decades, leading to a rise in the number of applications involving large-scale networks. A major building block for enabling self-system properties in ad-hoc scenarios is the run-time discovery of neighboring devices and somewhat...

    Provided By Delft University of Technology

  • White Papers // Oct 2011

    Detecting Dwelling in Urban Environments Using GPS, WiFi, and Geolocation Measurements

    A fundamental part of studying human mobility is to detect dwelling. When the authors dwell at places such as their homes, the supermarket or the local park, they are not necessarily still or stationary, but move around in a confined area. Most, but not all, of their significant places are...

    Provided By Delft University of Technology

  • White Papers // May 2011

    ChurnDetect: A Gossip-Based Churn Estimator for Large-Scale Dynamic Networks

    With the ever increasing scale of dynamic wireless networks (such as MANETs, WSNs, VANETs, etc.), there is a growing need for performing aggregate computations, such as online detection of network churn, via distributed, robust and scalable algorithms. In this paper, the authors introduce the ChurnDetect algorithm, a novel solution to...

    Provided By Delft University of Technology

  • White Papers // Mar 2010

    A Diagnostic Approach to Test Prioritization

    In development processes with high code production rates testing typically triggers fault diagnosis to localize the detected failures. However, current test prioritization algorithms are tuned for failure detection rate rather than diagnostic information. Consequently, unnecessary diagnostic effort might be spent to localize the faults. This paper presents a dynamic test...

    Provided By Delft University of Technology

  • White Papers // Mar 2010

    Protection of an Intrusion Detection Engine With Watermarking in Ad Hoc Networks

    In this paper, the authors present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques for protecting the related information that must be exchanged between nodes. In particular, they exploit information visualization and machine learning techniques in...

    Provided By Delft University of Technology

  • White Papers // Oct 2010

    Handoff in Radio Over Fiber Indoor Networks at 60 GHz

    Wireless indoor networks employing Radio over Fiber technique combining 60GHz wireless networks with wired networks is a new solution to provide high definition in-home multimedia applications. About 5 Gbps is available around 60GHz band. In 60GHz band each antenna can cover a small space such as a single room in...

    Provided By Delft University of Technology

  • White Papers // Sep 2012

    JAG: Reliable and Predictable Wireless Agreement Under External Radio Interference

    Wireless low-power transceivers used in sensor networks typically operate in unlicensed frequency bands that are subject to external radio interference caused by devices transmitting at much higher power. Communication protocols should therefore be designed to be robust against such interference. A critical building block of many protocols at all layers...

    Provided By Delft University of Technology

  • White Papers // Aug 2012

    Benchmarking in the Cloud: What It Should, Can, and Cannot Be

    With the increasing adoption of Cloud Computing, the authors observe an increasing need for Cloud Benchmarks, in order to assess the performance of Cloud infrastructures and software stacks, to assist with provisioning decisions for Cloud users, and to compare Cloud offerings. They understand their paper as one of the first...

    Provided By Delft University of Technology

  • White Papers // Jun 2010

    How Do Enterprise System Applications Create Business Value for European Firms? New Evidence for the Mediation Effects of Product and Process Innovation

    Despite the ubiquitous proliferation and importance of enterprise system applications, there exists little empirical research on their performance effects, especially among European firms. This paper provides large-sample, economy-wide evidence on the differential effects of enterprise systems adoption on firm performance. It explains how business value is actually created by differentiating...

    Provided By Delft University of Technology

  • White Papers // Nov 2012

    IaaS Cloud Benchmarking: Approaches, Challenges, and Experience

    Infrastructure-as-a-Service (IaaS) cloud computing is an emerging commercial infrastructure paradigm under which clients (users) can lease resources when and for how long needed, under a cost model that reflects the actual usage of resources by the client. For IaaS clouds to become mainstream technology and for current cost models to...

    Provided By Delft University of Technology

  • White Papers // Jun 2011

    Agent-Based Organisational Governance of Services

    The objective of Service-Oriented Computing (SOC) is to construct software applications out of appropriate services available and executing in place anywhere across the Web. To achieve this objective requires that techniques for discovering and engaging services be developed and used across the lifetime of the service-based applications. Succeeding with SOC...

    Provided By Delft University of Technology

  • White Papers // Sep 2011

    Innovative ICT Solutions for Monitoring and Facilitating International Trade

    In today's global, networked economy, goods often travel a long way around the world across the international supply chain from suppliers to manufacturers, buyers, and sellers, before reaching their final destination in people' homes and businesses. This movement of goods across national and regional borders is highly regulated: governments seek...

    Provided By Delft University of Technology

  • White Papers // Jun 2012

    Business Models Tooling and a Research Agenda

    During the bled conferences, business models have attracted a lot of attention. The discussion has moved from understanding the core concepts towards designing and implementing business models. Business models have become a common topic, with concepts and approaches becoming main stream, and connected to more generic research approaches and design...

    Provided By Delft University of Technology

  • White Papers // Jan 2009

    Mobile Business Models: Organizational and Financial Design Issues that Matter

    Designing viable mobile services and business models that capture value for all the organizations involved is a challenge. There are many design issues that can be taken into account, and it is often unclear what their ultimate effect is on the performance of a business model. This paper offers a...

    Provided By Delft University of Technology

  • White Papers // Jun 2008

    Capturing Value From Mobile Business Models: Design Issues that Matter

    Designing viable mobile business models that capture value for all organizations involved is challenging. A range of design issues could be considered, and it is often not clear how they ultimately impact the performance of the business model. This paper tests causal relations between design issues and success factors in...

    Provided By Delft University of Technology

  • White Papers // Apr 2012

    868 MHz: A Noiseless Environment, But No Free Lunch for Protocol Design

    Lossy links are one of the fundamental characteristics of Wireless Sensor Networks (WSNs). A large amount of work has been performed on characterizing link properties of 802.15.4 radios, in particular in the 2.4GHz band. Unfortunately, the 2.4 GHz band has the apparent disadvantage of a crowded spectrum and considerable external...

    Provided By Delft University of Technology

  • White Papers // Mar 2012

    Mechanized Extraction of Topology Anti-Patterns in Wireless Networks

    Exhaustive and mechanized formal verification of wireless networks is hampered by the huge number of possible topologies and the large size of the actual networks. However, the generic communication structure in such networks allows for reducing the root causes of faults to faulty (sub-)topologies, called anti-patterns, of small size. The...

    Provided By Delft University of Technology

  • White Papers // Mar 2012

    Search-Based Stress Testing of Wireless Network Protocol Stacks

    The operation of wireless network protocol stacks is heavily dependent on the actual deployment of the system and especially on the corresponding network topology, e.g., due to channel contention. The nature of wireless communication does not allow for a-priori determination of network topology; network-defining metrics such as neighbor density and...

    Provided By Delft University of Technology

  • White Papers // Jul 2011

    Segmented State Space Traversal for Conformance Testing of Cyber-Physical Systems

    Quantitative conformance testing of Cyber-Physical System (CPS) exploits time series of measurements, such as temperature or energy, for validating the correctness of deployed systems. This paper presents the foundations of segmented state space traversal in the setting of quantitative conformance testing of a CPS. It is demonstrated how this strategy...

    Provided By Delft University of Technology

  • White Papers // Feb 2012

    Localization and Tracking of a Mobile Target for an Isogradient Sound Speed Profile

    In this paper, the authors analyze the problem of localizing and tracking a mobile node in an underwater environment with an iso-gradient Sound Speed Profile (SSP). They will show that range-based localization algorithms are not so accurate in such an environment, and they should be replaced by time-based ones. Therefore,...

    Provided By Delft University of Technology

  • White Papers // Mar 2012

    Sparse Multi-Target Localization Using Cooperative Access Points

    In this paper, a novel multi-target Sparse Localization (SL) algorithm based on Compressive Sampling (CS) is proposed. Different from the existing literature for target counting and localization where signal/Received-Signal-Strength (RSS) readings at different Access Points (APs) are used separately, the authors propose to reformulate the SL problem so that they...

    Provided By Delft University of Technology

  • White Papers // Jul 2011

    Energy Savings in Wireless Networks Through Network Coding

    Emerging applications in wireless networks require more and more resources. One of the most important limitations is formed by battery life. Since battery technology is not keeping up with the increasing demand for resources, it is imperative that more efficient use is made of the available energy. Previous work on...

    Provided By Delft University of Technology