Institute of Electrical and Electronics Engineers

Displaying 1-40 of 8929 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Efficient and Robust Communication Topologies for Distributed Decision Making in Networked Systems

    Distributed decision making in networked systems depends critically on the timely availability of critical fresh information. Performance of networked systems, from the perspective of achieving goals and objectives in a timely and efficient manner is constrained by their collaboration and communication structures and their interplay with the networked system's dynamics....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

    Link state routing mechanisms have shown good convergence behaviour in networks with mobile hosts. Compared to traditional link state mechanisms, which suffer from broadcast storm problems in Mobile Ad Hoc NETworks (MANETs), pruned link state approaches such as those used in Optimized Link State Routing (OLSR) have shown significant reduction...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks

    Ad hoc networks rely on the mutual cooperation among individual nodes to achieve network-wide objectives. However, individual nodes may behave selfishly in order to maximize their own benefits without considering the global benefits of the network. One approach to incentivize nodes cooperation for better global benefits is to establish trust...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    Trust-Assisted Anomaly Detection and Localization in Wireless Sensor Networks

    Fast anomaly detection and localization is critical to ensure effective functioning of wireless sensor networks. The low bandwidth and power constraints in wireless sensor networks are the main challenges for achieving this task, especially for large scale networks. In this paper, the authors propose a trust-assisted framework for detecting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Distributed Collaborative Controlled Autonomous Vehicle Systems Over Wireless Networks

    Inspired by military tactical, civil help-and-rescue applications, it is desirable yet challenging to develop networked systems of autonomous vehicles and sensors in dynamic, resource-constrained and adversarial environments. An essential aspect of designing such collaborative systems is to address the communication needs of the vehicles in order to perform a given...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Robust State Estimation Under False Data Injection in Distributed Sensor Networks

    Distributed sensor networks have been widely employed to monitor and protect critical infrastructure assets. The network status can be estimated by centralized state estimation using coordinated data aggregation or by distributed state estimation, where nodes only exchange information locally to achieve enhanced scalability and adaptability to network dynamics. One important...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2008

    Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications

    Securing group communications in resource constrained, infrastructure-less Mobile Ad hoc NETworks (MANETs) has become one of the most challenging research directions in the areas of wireless networking and security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Intrusion Detection of In-Band Wormholes in MANETS Using Advanced Statistical Methods

    Due to the dynamics and mobility of Mobile Ad hoc NETworks (MANETs), intrusion detection techniques in MANETs must be adaptive. In this paper, the authors propose detection schemes that are suitable to detect in-band wormhole attacks. The first detection scheme uses the Sequential Probability Ratio Test (SPRT). The SPRT has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Aerial Platform Placement Algorithms to Satisfy Connectivity, Capacity and Survivability Constraints in Wireless Ad-Hoc Networks

    In this paper, the authors address the problem of establishing full connectivity and satisfying required traffic capacity between disconnected clusters in large wireless ad-hoc ground networks by placing a minimum number of advantaged high flying Aerial Platforms (APs) as relay nodes at appropriate places. They also extend the connectivity solution...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2008

    Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks

    The authors develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. They introduce an approximate (throughput) loss model that couples the physical, MAC and routing layers effects. The model provides quantitative statistical relations between the loss parameters that are used...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Maximum Likelihood Based Estimation of Frequency and Phase Offset in DCT OFDM Systems Under Non-Circular Transmissions: Algorithms, Analysis and Comparisons

    Recently, the advantages of the Discrete Cosine Transform (DCT) based Orthogonal Frequency-Division Multiplexing (OFDM) have come to the light. The authors thus consider DCTOFDM with non-circular transmission (the authors' results cover circular transmission as well) and present two blind joint maximum-likelihood frequency offset and phase offset estimators. Both the theoretical...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    On Using Educational Computers for HPC Applications in Campus Grid Management

    Nowadays, multimedia applications get more complicated and therefore required High Performance Computation (HPC). Fully dedicated computer cluster is one of the answers, anyhow the price is relatively expensive and the authors have to spend more space and electric power arrangement for the computer cluster. To address these requirements, they implement...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Flexible Simulators for OBS Network Architectures

    Since the OBS paradigm has become a potential candidate to cope with the needs of the future all optical networks, it has really caught the attention from both academia and industry worldwide. In this direction, OBS networks have been investigated under many different scenarios comprising numerous architectures and strategies. This...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    HEMIN: A Cryptographic Approach for Private k-NN Classification

    Data mining is frequently obstructed by privacy concerns. In many cases, data is shared with third party for the mining purpose. However, sharing of data for analysis is not possible due to prevailing privacy laws and/or policies. Privacy preserving data mining techniques have been developed to address this issue by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    A Mapping Flow for Dynamically Reconfigurable Multi-Core System-on-Chip Design

    Nowadays, multi-core Systems-on-Chip (SoCs) are typically required to execute multiple complex applications, which demand a large set of heterogeneous hardware cores with different sizes. In this context, the popularity of dynamically reconfigurable platforms (e.g., FPGAs) is growing, as they increase the ability of the initial design to adapt to future...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Adaptive Task Migration Policies for Thermal Control in MPSoCs

    In deep submicron circuits, high temperatures have created critical issues in reliability, timing, performance, coolings costs and leakage power. Task migration techniques have been proposed to manage efficiently the thermal distribution in multi-processor systems but at the cost of important performance penalties. While traditional techniques have focused on reducing the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    HTPCP: GNSS-R Multi-Channel Cross-Correlation Waveforms Post-Processing Solution for GOLD-RTR Instrument

    Global Navigation Satellite System Reflectometry (GNSS-R) remote sensing is a new remote sensing technique of satellite navigation application. Essentially, it entails a method of remote sensing that receives and processes microwave signals reflected from various surfaces. The GPS Open-Loop Differential Real-Time Receiver (GOLD-RTR) instrument have been proposed as GNSS-R instrument,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Synthesizing Near-Optimal Malware Specifications From Suspicious Behaviors

    Fueled by an emerging underground economy, malware authors are exploiting vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly available, and much of the malware is open source, leading to a huge number of variants. Behavior-based detection techniques are a promising solution to this growing problem....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    SmallBlue: Social Network Analysis for Expertise Search and Collective Intelligence

    SmallBlue is a social networking application that unlocks the valuable business intelligence of 'who knows what?', 'who knows whom?' and 'who knows what about whom' within an organization, without requiring explicit involvement of individuals. The aim of SmallBlue is to locate knowledgeable colleagues, communities, and knowledge networks in companies. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Run-Time Mapping of Applications on FPGA-Based Reconfigurable Systems

    The role of Field-Programmable Gate Arrays (FPGAs) in System-on-Chip (SoC) design considerably increased in the last few years. Their established importance is due to the large amount of hardware resources they offer, as well as to their increasing performance, and furthermore to the support for reconfigurability. Even though FPGAs seem...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Neural Network based On-Chip Thermal Simulator

    With increasing power densities, runtime thermal management is becoming a necessity in today's systems, especially so for highly integrated Multi-Processor Systems-on-Chip (MPSoCs). In this paper, the authors propose a Neural Network (NN) based approach to implement an on-chip thermal simulator to aid such runtime management for MPSoCs. The proposed method...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Multicore Thermal Management Using Approximate Explicit Model Predictive Control

    Meeting temperature constraints and reducing the hot-spots are critical for achieving reliable and efficient operation of complex multi-core systems. In this paper the authors aim at achieving an online smooth thermal control action that minimizes the performance loss as well as the computational and hardware overhead of embedding a thermal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Inducing Thermal-Awareness in Multicore Systems Using Networks-on-Chip

    Technology scaling imposes an ever increasing temperature stress on digital circuit design due to transistor density, especially on highly integrated systems, such as Multi-Processor Systems-on-Chip (MPSoCs). Therefore, temperature-aware design is mandatory and should be performed at the early design stages. In this paper the authors present a novel hardware infrastructure...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2009

    Imbuing Unstructured P2P Systems With Non-Intrusive Topology Awareness

    The random nature of unstructured P2P overlays imbues them with enhanced self-properties. Most of the algorithms which make searching in unstructured P2P systems scalable, such as dynamic querying and 1-hop replication, rely on the random nature of the overlay to function efficiently. However, they do not take into account the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2008

    A Novel Near-Optimum Medium Access Control Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    The Distributed Queuing MAC Protocol for COOPerative Networks (DQCOOP) is presented in this paper as an innovative MAC protocol designed to coordinate the relay retransmissions in a Cooperative Automatic Retransmission ReQuest (C-ARQ) scheme for wireless networks. The distributed cooperative ARQ scheme when the DQCOOP is applied at layer two is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Interacting With the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services

    The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    A Fair Non-Transfer Exchange Protocol

    Network exchange is now widely used. However, it still cannot avoid the problems evolving from network exchange. For example, a buyer may not receive the order even if he/she makes the payment. For another example, the seller possibly get nothing even when the merchandise is sent. Some studies about the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Statistical Approach to Networks-on-Chip

    Chip MultiProcessors (CMPs) combine increasingly many general-purpose processor cores on a single chip. These cores run several tasks with unpredictable communication needs, resulting in uncertain and often-changing traffic patterns. This unpredictability leads Network-on-Chip (NoC) designers to plan for the worst-case traffic patterns, and significantly over-provision link capacities. In this paper,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Design of a Low-Cost Underwater Acoustic Modem

    There has been an increasing interest in creating short-range, low data rate, underwater wireless sensor networks for scientific marine exploration and monitoring. However, the lack of an inexpensive, underwater acoustic modem is preventing the proliferation of these sensor networks. Thus, the authors are building an underwater acoustic modem starting with...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Assessing Asymmetric Fault-Tolerant Software

    The most popular forms of fault tolerance against design faults use "Asymmetric" architectures in which a "Primary" part performs the computation and a "Secondary" part is in charge of detecting errors and performing some kind of error processing and recovery. In contrast, the most studied forms of software fault tolerance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    An Embedded Stream Processor Core Based on Logarithmic Arithmetic for a Low-Power 3-D Graphics SoC

    A low-power and high-performance 4-way 32-bit stream processor core is developed for handheld low-power 3-D graphics systems. It contains a floating-point unified matrix, vector, and elementary function unit. By exploiting the logarithmic arithmetic and the proposed adaptive number conversion scheme, a 4-way arithmetic unit achieves a single-cycle throughput for all...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    A 200-Mbps 0.02-nJ/b Dual-Mode Inductive Coupling Transceiver for cm-Range Multimedia Application

    A 200-Mbps 0.02-nJ/b dual-mode inductive coupling transceiver is proposed for cm-range multimedia application. The inductive link geometry and the advantage of the pulse-based inductive coupling are explained. In this paper, the parallel capacitor connected with the TX inductor, the InterSymbol Interference (ISI) reduction scheme, and the pulse generation scheme are...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A 195 MW, 9.1 MVertices/s Fully Programmable 3-D Graphics Processor for Low-Power Mobile Devices

    A 195 mW, 9.1 Mvertices/s fully programmable 3-D graphics processor is designed and implemented for mobile devices. The mobile unified shader provides programmable per-vertex operations and per-pixel operations in a single hardware and thus, it achieves 35% area and 28% power reduction compared with previous architecture. The pixel-vertex multi-threading enhances...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2008

    A 195 MW/152 MW Mobile Multimedia SoC With Fully Programmable 3-D Graphics and MPEG4/H.264/JPEG

    In this paper, the authors present a low power multimedia SoC with fully programmable 3-D graphics, MPEG4 codec, H.264 decoder, and JPEG codec for mobile devices. The mobile unified shader in 3-D graphics engine provides fully programmable 3-D graphics pipeline with 35% area and 28% power reduction. Low power lighting...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Stable Multi-Target Tracking in Real-Time Surveillance Video (Preprint)

    The majority of existing pedestrian trackers concentrate on maintaining the identities targets; however systems for remote biometric analysis or activity recognition in surveillance video often require stable bounding-boxes around pedestrians rather than approximate locations. The authors present a multi-target tracking system that is designed specifically for the provision of stable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Expression-Insensitive 3D Face Recognition Using Sparse Representation

    The authors present a face recognition method based on sparse representation for recognizing 3D face meshes under expressions using low-level geometric features. First, to enable the application of the sparse representation framework, they develop a uniform remeshing scheme to establish a consistent sampling pattern across 3D faces. To handle facial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    A Consumer-Centred Approach for Service-Oriented Product Line Development

    The notion of software as a service promises agile, flexible and low maintenance system development through a dynamic run-time architecture that allows third-party functionality and capability to be added on demand. There is growing research interest in how service-orientation can be adopted a means for enhancing agility and flexibility in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    A Discrete Perceptual Impact Evaluation Quality Assessment Framework for IPTV Services

    Network impairments are unpredictable and highly destructive to the perceptual quality of media content in the IPTV content distribution networks. As a result the existing network QoS based assessment methodologies are not adequate for the IPTV QoE assessment which determines the overall acceptability of a service as perceived by the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    A Comparative Study of DECT and WLAN Signals for Indoor Localization

    While there is more to context than location, localization and positioning must continue to be improved. Location-aware applications, such as Google Latitude, are enjoying great popularity. Location-based applications and services are widely used on platforms such as the iPhone. The localization itself thus remains an issue, especially in indoor scenarios....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Combining Service Orientation With Product Line Engineering

    Dynamic product reconfiguration involves making changes to a deployed product configuration at run-time. Examples include dynamically adding, deleting, or modifying product features and making dynamic changes to architectural structures. Researchers have studied dynamic product reconfiguration for various application areas, including self-healing systems, context-aware computing, software component deployment, and ubiquitous computing....

    Provided By Institute of Electrical and Electronics Engineers