Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7388 results

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Programmable Neuromorphic Circuits for Spike-Based Neural Dynamics

    Hardware implementations of spiking neural networks offer promising solutions for a wide set of tasks, ranging from autonomous robotics to brain machine interfaces. The authors propose a set of programmable hybrid analog/digital neuromorphic circuits than can be used to build compact low-power neural processing systems. In particular, they present both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems

    Future flash-based Solid-State Drives (SSDs) must employ increasingly powerful Error Correction Code (ECC) and Digital Signal Processing (DSP) techniques to compensate the negative impact of technology scaling on NAND flash memory device reliability. Currently, all the ECC and DSP functions are implemented in a central SSD controller. However, the use...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Joint Relay Assignment and Channel Allocation for Energy-Efficient Cooperative Communications

    Cooperative Communication (CC) has been proposed to achieve spatial diversity without requiring multiple antennas on a single device. Many efforts in exploiting the benefits of CC focus on improving the performance in terms of outage probability and channel capacity. However, the energy efficiency of CC, which is critical for the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Space-Time Coded MPSK Coherent MIMO FSO Systems in Gamma-Gamma Turbulence

    Coherent free-space optical communication employing M-ary phase-shift keying is investigated for space-time coded Multiple-Input Multiple-Output (MIMO) systems over Gamma-Gamma turbulence channels. The proposed space-time coded system offers an efficient utilization of coherent free-space optical channel capacity by exploiting the degree of freedom at both the transmitter and receiver ends. Such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2012

    Hint-Based Execution of Workloads in Clouds With Nefeli

    Infrastructure-as-a-service clouds offer entire virtual infrastructures for distributed processing while concealing all physical underlying machinery. Current cloud interface abstractions restrict users from providing information regarding usage patterns of their requested Virtual Machines (VMs). In this paper, the authors propose Nefeli, a virtual infrastructure gateway that lifts this restriction. Through Nefeli,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    StoRM: A Flexible Solution for Storage Resource Manager in Grid

    In these times, scientific data intensive applications generate ever-increasing volumes of data that need to be stored, managed, and shared between geographically distributed communities. Datacenters are normally able to provide tens of petabytes of storage space through a large variety of heterogeneous storage and file systems. However, storage systems shared...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2008

    Design and Implementation of the POWER6 Microprocessor

    The IBM POWER6 processor is a dual-core, 341 mm (2); 790 million transistor chips fabricated using IBM's 65 nm partially-depleted SOI process. Capable of running at frequencies up to 5GHz in high performance applications, it can also operate under 100W for power-sensitive applications. Traditional power-intensive and deep-pipelining techniques used in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2011

    Design Techniques to Facilitate Processor Power Delivery in 3-D Processor-DRAM Integrated Systems

    As a promising option to address the memory wall problem, 3-D processor-DRAM integration has recently received many attentions. Since DRAM dies should be stacked between the processor die and package substrate, the authors have to fabricate a large number of through-DRAM Through-Silicon Vias (TSVs) to connect the processor die and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Using Lossless Data Compression in Data Storage Systems: Not for Saving Space

    Lossless data compression for data storage has become less popular as mass data storage systems are becoming increasingly cheap. This leaves many files stored on mass data storage media uncompressed although they are losslessly compressible. This paper proposes to exploit the lossless compressibility of those files to improve the underlying...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Estimating Information-Theoretical NAND Flash Memory Storage Capacity and Its Implication to Memory System Design Space Exploration

    Today and future NAND flash memory will heavily rely on system-level fault-tolerance techniques such as Error Correction Code (ECC) to ensure the overall system storage integrity. Since, ECC demands the storage of coding redundancy and hence degrades effective cell storage efficiency; it is highly desirable to use more powerful coding...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Design of Last-Level On-Chip Cache Using Spin-Torque Transfer RAM (STT RAM)

    Because of its high storage density with superior scalability, low integration cost and reasonably high access speed, Spin-Torque Transfer Random Access Memory (STT RAM) appears to have a promising potential to replace SRAM as last-level on-chip cache (e.g., L2 or L3 cache) for microprocessors. Due to unique operational characteristics of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2008

    Spin-Transfer Torque Magnetoresistive Content Addressable Memory (CAM) Cell Structure Design with Enhanced Search Noise Margin

    In this paper, the authors present a new memory cell structure for Content Addressable Memory (CAM) based on Magnetic Tunneling Junction (MTJ). Each CAM cell uses a pair of differential MTJs as basic storage element and incorporates transistors to greatly improve the cell search noise margin at low sensing current....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Using Magnetic RAM to Build Low-Power and Soft Error-Resilient L1 Cache

    Due to its great scalability, fast read access, low leakage power, and non-volatility, Magnetic Random Access Memory (MRAM) appears to be a promising memory technology for on-chip cache memory in microprocessors. However, the write-to-MRAM process is relatively slow and results in high dynamic power consumption. Such inherent disadvantages of MRAM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2007

    Hybrid Resistor/FET-Logic Demultiplexer Architecture Design for Hybrid CMOS/Nanodevice Circuits

    Hybrid nanoelectronics are emerging as one viable option to sustain the Moore's Law after the CMOS scaling limit is reached. One main design challenge in hybrid nanoelectronics is the interface (named as demux) between the highly dense nanowires in nanodevice crossbars and relatively coarse microwires in CMOS domain. The paper...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    On the Use of Soft-Decision Error-Correction Codes in NAND Flash Memory

    As technology continues to scale down, NAND Flash memory has been increasingly relying on Error-Correction Codes (ECCs) to ensure the overall data storage integrity. Although advanced ECCs such as Low-Density Parity-Check (LDPC) codes can provide significantly stronger error-correction capability over BCH codes being used in current practice, their decoding requires...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems

    Future flash-based Solid-State Drives (SSDs) must employ increasingly powerful Error Correction Code (ECC) and Digital Signal Processing (DSP) techniques to compensate the negative impact of technology scaling on NAND flash memory device reliability. Currently, all the ECC and DSP functions are implemented in a central SSD controller. However, the use...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Programmable Neuromorphic Circuits for Spike-Based Neural Dynamics

    Hardware implementations of spiking neural networks offer promising solutions for a wide set of tasks, ranging from autonomous robotics to brain machine interfaces. The authors propose a set of programmable hybrid analog/digital neuromorphic circuits than can be used to build compact low-power neural processing systems. In particular, they present both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Pipelined FPGA Adders

    Integer addition is a universal building block and applications such as quad-precision floating-point or elliptic curve cryptography now demand precisions well beyond 64 bits. This paper explores the trade-offs between size, latency and frequency for pipelined large-precision adders on FPGA. It compares three pipelined adder architectures, the classical pipelined ripple-carry...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2008

    Integer and Floating-Point Constant Multipliers for FPGAs

    Reconfigurable circuits now have a capacity that allows them to be used as floating-point accelerators. They offer massive parallelism, but also the opportunity to design optimized floating-point hardware operators not available in microprocessors. Multiplication by a constant is an important example of such an operator. This paper presents an architecture...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Large Multipliers with Fewer DSP Blocks

    Recent computing-oriented FPGAs feature DSP blocks including small embedded multipliers. A large integer multiplier, for instance for a double-precision floating-point multiplier, consumes many of these DSP blocks. This paper studies three non-standard implementation techniques of large multipliers, the Karatsuba-Ofman algorithm, non-standard multiplier tiling and specialized squarers. They allow for large...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2011

    An Efficient Implementation of Floating Point Multiplier

    In this paper, the authors describe an efficient implementation of an IEEE 754 single precision floating point multiplier targeted for Xilinx Virtex-5 FPGA. VHDL is used to implement a technology-independent pipelined design. The multiplier implementation handles the overflow and underflow cases. Rounding is not implemented to give more precision when...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Efficient Implementation of Parallel BCD Multiplication in LUT-6 FPGAs

    Decimal multiplication is one of the most frequent operations used by many financial, business and user-oriented applications but current implementations in FPGAs are very inefficient in terms of both area and latency when compared to binary multipliers. In this paper, the authors present a new method for implementing BCD multiplication...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    A High Performance Unified BCD and Binary Adder/subtractor

    Decimal data processing applications have grown exponentially in recent years thereby increasing the need to have hardware support for decimal arithmetic. In this paper, an improved architecture for efficient Binary Coded Decimal (BCD) addition/subtraction is presented that performs binary addition/subtraction without any extra hardware. The architecture works for both signed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2013

    Sharing-Aware Cloud-Based Mobile Outsourcing

    Mobile devices, such as smart phones and tablets, are becoming the universal interface to online services and applications. However, such devices have limited computational power and battery life, which limits their ability to execute resource-intensive applications. Computation outsourcing to external resources has been proposed as a technique to alleviate this...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    From Mobiles to Clouds: Developing Energy-Aware Offloading Strategies for Workflows

    Cloud computing and mobile computing is two of the most influential technologies that look set to change the face of computing in the coming years. Combination of the two provides the user with an unprecedented opportunity to provide highly portable and yet content-rich and computation-intensive services to the end user....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2003

    Characterizations of Metal - Diamond - Silicon Associations for Active Power Electronics Applications

    This paper presents different grades of CVD diamond substrates and the comparison between them, especially between the natural and other kind of CVD diamond. Dielectric strength investigation and surface conductivity with or without chemical treatment are presented, then the influence of the metal to diamond interface on the electronic properties...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2003

    Tumor Detection in the Bladder Wall With a Measurement of Abnormal Thickness in CT Scans

    Virtual cystoscopy is a developing technique for bladder cancer screening. In a conventional cystoscopy, an optical probe is inserted into the bladder and an expert reviews the appearance of the bladder wall. Physical limitations of the probe place restrictions on the examination of the bladder wall. In virtual cystoscopy, a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2009

    Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents

    There is a significant number of IT failures per year because parts fail, products are used in ways they were not designed for, and humans make errors in using products. These failures result in incidents that product vendors service as a part of the warranty or contracts. Incidents incur significant...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Improving Depth Perception With Motion Parallax and Its Application in Teleconferencing

    Depth perception, or 3D perception, can add a lot to the feeling of immersiveness in many applications such as 3D TV, 3D teleconferencing, etc. Stereopsis and motion parallax are two of the most important cues for depth perception. Most of the 3D displays today rely on stereopsis to create 3D...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Compress Compound Images in H.264/MPEG-4 AVC by Fully Exploiting Spatial Correlation

    Compound images consist of text, graphics and natural images, which present strong anisotropic features. It makes existing image coding standards inefficient on compressing them. To solve the problem, this paper proposes a novel coding scheme based on the H.264 intra-frame coding. Two new intra modes are proposed to better exploit...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Autonomous Mental Development: A New Interdisciplinary Transactions for Natural and Artificial Intelligence

    Although some baby animals can get up and walk within hours after birth, what a human child learns during the first two years of life easily exceeds what those animals learn in their entire lifetime. Furthermore, besides the explosive growth that occurs during this period, it is now well documented...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2004

    Improved Watershed Transform for Medical Image Segmentation Using Prior Information

    The watershed transform has interesting properties that make it useful for many different image segmentation applications: it is simple and intuitive, can be parallelized, and always produces a complete division of the image. However, when applied to medical image analysis, it has important drawbacks. They present an improvement to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2003

    Automating Keyphrase Extraction With Multi-Objective Genetic Algorithms

    This white paper proposes an automated key phrase extraction algorithm using a non dominated sorting multi-objective genetic algorithm. The "clumping" property of key phrases is used to judge the appropriateness of a phrase and is quantified by a condensation clustering measure proposed by Bookstein. The objective is to find the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2005

    Mobilizing Customer Relationship Management - A Journey From Strategy to System Design

    The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has recently been renewed interest in mobile business and mobile commerce. Now, however, business managers request detailed and thorough analyses prior to engaging in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2008

    History of Wireless Local Area Networks (WLANs) in the Unlicensed Bands

    A brief history of the development of WLAN standards and products is presented in the context of explaining how unlicensed spectrum regulations by the Federal Communications Commission (FCC) have affected the industry. In general, the FCC's initiative to create an "Unlicensed commons" for various forms of wireless communication applications has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2006

    Performance Comparison of IP, MPLS and ATM Based Network Cores Using OPNET

    The core components of a network play vital role in its enhancement. For launching and providing Internet applications and services, vendors have come up with a variety of different technology based network cores and other components of Internet backbone. Among all the challenges for an efficient network core, traffic-routing is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2000

    Zipper VDSL: A Solution for Robust Duplex Communication Over Telephone Lines

    This paper presents an overview of a digital duplex scheme called Zipper, intended for DMT-based VDSL systems. The Zipper multi-carrier duplex scheme represents a breakthrough toward digital implementation of frequency-division duplexing. A duplex scheme is a method to divide the capacity of a line between the upstream and downstream directions....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2009

    Silicon Photonic WDM Point-to-Point Network for Multi-Chip Processor Interconnects

    Processor performance in instructions per second continues to rise. But the improvement is no longer coming from increasing clock rates due to the associated power, heat and design complexity costs. Instead, parallelism through multi-core processing has become the technology choice to continue processor performance scaling. Processors with 8 cores and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2009

    Optical Proximity Communication in Packaged SiPhotonics

    This paper reports 10Gb/s Optical-Proximity-Communication with reflecting mirrors micro-machined into Si and co-integrated to low loss SOI waveguides for chip to chip communication using a self-aligned-packaging mechanism with measured 4.0 dB coupling loss. There continues to be growing interest in scaling high performance computing to meet the ever-increasing computational demands...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    2D CAD Data Mining Based on Spatial Relation

    This paper proposes CAD data mining technique to obtain semantic elements without prior knowledge about plans being designed. The method consists of two steps. The first step is to extract frequent spatial relations between figure elements in CAD data as clues to the semantic elements. These relations are modeled as...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Dynamic SLA Template Adjustments Based on Service Property Monitoring

    Service Level Agreements (SLAs) are used to manifest guarantees about certain functional and non-functional aspects of service execution. Service providers are confronted with a hard problem when trying to estimate reasonable QoS levels and other default settings for SLA templates. The insufficient use of formal service behaviour descriptions, varying resource...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    A Collision-Free MAC Scheme for Multimedia Wireless Mesh Backbone

    Wireless mesh networking is a promising wireless technology for future broadband Internet access. In this paper, a novel collision-free Medium Access Control (MAC) scheme supporting multimedia applications is proposed for wireless mesh backbone. The proposed scheme is distributed, simple, and scalable. Benefiting from the fixed locations of wireless routers, the...

    Provided By Institute of Electrical and Electronics Engineers