Institute of Electrical and Electronics Engineers

Displaying 1-40 of 6886 results

  • White Papers // May 2015

    SRAM for Error-Tolerant Applications with Dynamic Energy-Quality Management in 28 nm CMOS

    In this paper, a voltage-scaled SRAM for both error-free and error-tolerant applications is presented that dynamically manages the energy/quality trade-off based on application need. Two variation-resilient techniques, write assist and error correcting code, are selectively applied to bit positions having larger impact on the overall quality, while jointly performing voltage...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2015

    Digitally Controlled Leakage-Based Oscillator and Fast Relocking MDLL for Ultra Low Power Sensor Platform

    In this paper, the authors present an all-digital Multiplying Delay-Locked Loop (MDLL) with a leakage-based oscillator for ultra-low-power sensor platforms. The proposed digital control of channel leakage current achieved ultra-low power consumption in frequency generation with a fine resolution. The leakage based oscillator was modeled as an RC-based oscillator, analyzed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    IoT Design Space Challenges: Circuits and Systems

    The Internet of Things (IoTs) is a rapidly emerging application space, poised to become the largest electronics market for the semiconductor industry. IoT devices are focused on sensing and actuating of the authors' physical environment and have a nearly unlimited breadth of uses. In this paper, they explore the IoT...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    Correctness Analysis and Power Optimization for Probabilistic Boolean Circuits

    Traditionally, the authors expect that circuit designs can be executed without errors. However, for error resilient applications such as image processing, 100% correctness is not necessary. By pursuing less than 100% correctness, power consumption can be significantly reduced. Recently, probabilistic CMOS and Probabilistic Boolean Circuits (PBCs) have been proposed to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2015

    Wireless Sensor Network Virtualization: A Survey

    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoTs) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSNs' nodes are becoming more and more powerful, it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    Wireless Sensor Networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2014

    An Ultra-Low Power Fully Integrated Energy Harvester Based on Self-Oscillating Switched-Capacitor Voltage Doubler

    Recent advances in low power circuits have enabled mm-scale wireless systems for wireless sensor networks and implantable devices among other applications. Energy harvesting is an attractive way to power such systems due to the limited energy capacity of batteries at these form factors. However, the same size limitation restricts the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers

    Cloud providers are typically hierarchically organized into interconnected data centers, each with a collection of racks of servers organized into clusters. The communication cost between two servers is a function of their relative location in the cloud infrastructure. Cloud consumers submit allocation requests for virtual machines, of different types and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    A Fully-Integrated 71 nW CMOS Temperature Sensor for Low Power Wireless Sensor Nodes

    The authors propose a fully-integrated temperature sensor for battery-operated, ultra-low power microsystems. Sensor operation is based on temperature independent/dependent current sources that are used with oscillators and counters to generate a digital temperature code. A conventional approach to generate these currents is to drop a temperature sensitive voltage across a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    An 8 Bit 4 GS/s 120 mWCMOS ADC

    For a given resolution, the power consumption of Analog-to-Digital Converters (ADCs) rises linearly with the speed up to some point and then begins to ascend at an increasingly higher rate. A time-interleaved ADC employs four pipelined time-interleaved channels along with a new timing mismatch detection algorithm and a high-resolution variable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Achieving High-Performance On-Chip Networks with Shared-Buffer Routers

    On-chip routers typically have buffers dedicated to their input or output ports for temporarily storing packets in case contention occurs on output physical channels. Buffers, unfortunately, consume significant portions of router area and power budgets. While running a traffic trace, however, not all input ports of routers have incoming packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    An Energy Efficient Full-Frame Feature Extraction Accelerator with Shift-Latch FIFO in 28 nm CMOS

    In this paper, the authors present an energy efficient feature extraction accelerator design aimed at visual navigation. The hardware oriented algorithmic modifications such as a circular-shaped sampling region and unified description are proposed to minimize area and energy consumption while maintaining feature extraction quality. A matched-throughput accelerator employs fully-unrolled filters...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    Analysis of Metastability in Pipelined ADCs

    A critical issue in the design of high-speed ADCs relates to the errors that result from comparator meta-stability. Studied for flash architectures in the past, this phenomenon assumes new dimensions in pipelined converters, creating far more complex error mechanisms. This paper presents a comprehensive analysis of comparator meta-stability effects in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Quaternary Logic Lookup Table in Standard CMOS

    Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this paper, they propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Secure Browser Architecture Based on Hardware Virtualization

    Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation mechanism to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Low-Power High-Throughput LDPC Decoder Using Non-Refresh Embedded DRAM

    The majority of the power consumption of a high-throughput LDPC decoder is spent on memory. Unlike in a general-purpose processor, the memory access in an LDPC decoder is deterministic and the access window is short. The authors take advantage of the unique memory access characteristic to design a non-refresh eDRAM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    GPU-Based JPEG2000 Decoding Scheme for Digital Cinema

    For the digital cinema system specification released by digital cinema initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Energy-Saving Cloud Computing Platform Based on Micro-Embedded System

    Energy consumption and computing performance are two essential considerations when service providers establish new data centers. The energy-saving cloud computing platform proposed in this study as potential applications in internet network information centers because of its excellent energy efficiency when manage large datasets. Increased data nodes in distributed computing systems...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Balancing Scalability, Performance and Fault Tolerance for Structured Data (BSPF)

    Analytical business applications generate reports that give a trend predicting insight into the organization's future, estimating the financial graphs and risk factors. These applications work on huge amounts of data, which comprises of decades of market and company records and decision logs of an organization. Today, limit of big data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Study on VM-Based Terminal Mobility Management

    Recently, subscribers are using services utilizing various kinds of virtualization technology. The authors propose Virtual Machine (VM)-based terminal mobility management. The mechanism requires enhanced mobility control procedures and data transmission procedure comparing with the existing mobility management like Access Independent Mobile Service (AIMS). The procedures newly introduce location notification message...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Measurement Results of Frequency Offset in DVB-C2 Receiver

    In this paper, the authors show the measurement results of Frequency Offset (FO) estimation in Digital Video Broadcasting for Cable version 2 (DVB-C2) receiver which uses Orthogonal Frequency-Division Multiplexing (OFDM). Because FO causes Inter-Carrier Interference (ICI) in a multicarrier system, it should be estimated and compensated to improve the performance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Evaluating Team Performance Using Slack Based Data Envelopment Analysis

    In this paper, the authors devise a Data Envelopment Analysis (DEA) model to assess team performance. The DEA model in this paper uses Slack Based Measure (SBM), a method which deals directly with the input excesses and output shortfall. An explanatory example has been given to demonstrate the applicability of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Device Control Protocol Using Mobile Phone

    With rapid development of Smartphone make the authors to face in front of the boundary of the world of ubiquitous computing. The capabilities of Smartphone are raising the interest of the smart home and home network technologies. These have used Smartphone as a remote controller. However, the technologies of each...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Iterative Threshold for Anti-Jamming Algorithm and Its Implementation on FPGA

    Frequency-Domain Anti-Jamming (FDAJ) algorithms achieve prominent performance on interference suppression with simple calculations; and hence they are widely used in many applications. The interference suppression threshold plays a key role in the algorithm and affects system performance greatly. In this paper, the initial interference threshold is derived theoretically and then...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-Based PKI

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "Cloud computing" also increases severe security concerns. Security has remained...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Reconfigurable Architecture for Generic OFDM Modulator Based on FPGA

    OFDM is a special case of multi-carrier modulations, which is of great use in various wireless communications, such as DAB, DVB, HDTV, CMMB, TMMB and 802.11a. The OFDM frame structure is similar to each other. It consists of a number of OFDM symbols following the synchronizing signal with different cyclic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    PCE Implementation and Testing by Using Virtual Machines

    In this paper, the authors describe the way to implement and test a PCE on the virtualized environment. The PCE is a special computational entity that will corporate with similar entities to compute the best possible path through single or multiple domains. Generally, in real network, the testing and implementation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Verification of Reconfigurable Binary Decision Diagram-Based Single-Electron Transistor Arrays

    Recently, Single-Electron Transistors (SETs) have been attracting substantial attention and are considered candidate devices for future integrated circuits due to their ultra-low power consumption. To realize SETs, a binary decision diagram-based SET array is proposed as a suitable candidate for implementing Boolean circuits. Then, some works started developing computer-aided design...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Learning Link-Based Classifiers From Ontology-Extended Textual Data

    Real-world data mining applications call for effective strategies for learning predictive models from richly structured relational data. In this paper, the authors address the problem of learning classifiers from structured relational data that are annotated with relevant meta data. Specifically, they show how to learn classifiers at different levels of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Design and Implementation of a Query Planner for Data Integration

    Recent advances in high throughput data acquisition technologies in many areas have led to a proliferation of a multitude of physically distributed, autonomous, and often semantically disparate data sources. Effective use of such data in data-driven knowledge acquisition and decision support applications e.g., in health informatics, security informatics, social informatics,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    On a Taxonomy of Facial Features

    After nearly a decade of intensive research in face recognition, no standard organization exists for grouping the salient information available in 2D face images into feature categories. At the same time, human verification of a subject's identity based on facial images lacks a consistent methodology. In this paper the authors...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Towards Understanding the Symmetry of Human Ears: A Biometric Perspective

    In this paper, an analysis of the symmetry of human ears is presented. Such an analysis is essential in order to understand the possibility of matching the left and right ears of an individual, or to reconstruct portions of the ear that may be occluded in a surveillance video. Ear...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Soft Biometrics Systems: Reliability and Asymptotic Bounds

    This work presents a preliminary statistical analysis on the reliability of soft biometrics systems which employ multiple traits for human identification. The analysis places emphasis on the setting where identification errors occur mainly due to cross subject interference, i.e., due to the event that subjects share similar facial and body...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Soft Biometric Classification Using Periocular Region Features

    With periocular biometrics gaining attention recently, the goal of this paper is to investigate the effectiveness of local appearance features extracted from the periocular region images for soft biometric classification. The authors extract gender and ethnicity information from the periocular region images using grayscale pixel intensities and periocular texture computed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Performance Evaluation of Local Appearance Based Periocular Recognition

    The human periocular region is known to be one of the most discriminative regions of a face image, and recent studies have indicated its potential as a biometric trait. However, the bulk of the previous work concerning the periocular region consists of feasibility studies that report recognition results on controlled...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    PTZ Camera Assisted Face Acquisition, Tracking & Recognition

    Face recognition systems typically have a rather short operating distance with standoff (distance between the camera and the subject) limited to 1~2 meters. When these systems are used to capture face images at a larger distance (5~10 m), the resulting images contain only a small number of pixels on the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Dynamic Random Projection for Biometric Template Protection

    Random projection provides a good diversification effect for biometric template protection but is drawing increasing security concerns under the token-stolen (or public parameter) case. The authors propose a dynamic random projection method to alleviate these security concerns due to the stolen token by increasing the computational complexity to search for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Practical Multi-Factor Biometric Remote Authentication

    In this paper, the authors evaluate the security properties of Multi-Factor Biometric Authentication (MFBA) and define the notion of User Privacy, where the biometrics is assumed as a set of features that can be either ordered or unordered depending on the biometric modality. The authors propose efficient schemes for MFBA,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Weight Estimation From Visual Body Appearance

    Weight is a biometric trait which has been already studied in both the forensic and medical domains. In many practical situations, such as video surveillance, weight can provide useful information for re - identification purposes but needs to be estimated from visual appearance (images or video). In this paper the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Feature Detection on 3D Face Surfaces for Pose Normalisation and Recognition

    This paper presents a SIFT algorithm adapted for 3D surfaces (called meshSIFT) and its applications to 3D face pose normalisation and recognition. The algorithm allows reliable detection of scale space extrema as local feature locations. The scale space contains the mean curvature in each vertex on different smoothed versions of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Fusion Levels of Visible and Infrared Modalities for Face Recognition

    The authors present a study on different levels of visible and infrared modalities fusion for face recognition. While visible modality is the most natural way to recognize someone, infrared presents thermal distribution that can be useful for face recognition. The authors compare the well-known eigenfaces method as a baseline to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Aging Face Verification in Score-Age Space Using Single Reference Image Template

    The influence of age progression on the performance of face verification systems is a challenging and largely open research problem. When only one reference and one test image per subject are available, in this paper the authors propose to manage the aging influence on the adult face verification system through...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    TupleQ: Fully-Asynchronous and Zero-Copy MPI Over InfiniBand

    The Message Passing Interface (MPI) is the defacto standard for parallel programming. As system scales increase, application writers often try to increase the overlap of communication and computation. Unfortunately, even on offloaded hardware such as InfiniBand, performance is not improved since the underlying protocols within MPI implementation require control messages...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Designing Multi-Leader-Based Allgather Algorithms for Multi-Core Clusters

    The increasing demand for computational cycles is being met by the use of multi-core processors. Having large number of cores per node necessitates multi-core aware designs to extract the best performance. The Message Passing Interface (MPI) is the dominant parallel programming model on modern high performance computing clusters. The MPI...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Performance Analysis and Evaluation of PCIe 2.0 and Quad-Data Rate InfiniBand

    High-performance systems are undergoing a major shift as commodity multi-core systems become increasingly prevalent. As the number of processes per compute node increase, the other parts of the system must also scale appropriately to maintain a balanced system. In the area of high-performance computing, one very important element of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    High Performance Resource Allocation and Request Redirection Algorithms for Web Clusters

    With increasing richness in features such as personalization of content, web applications are becoming more complex and hence compute intensive. Traditional approaches towards the design of web cluster architectures have targeted static content such as images that are usually network intensive. However, these methods are not applicable to dynamic content...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    An Adaptive Link Layer for Heterogeneous Multi-Radio Mobile Sensor Networks

    An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node mobility. In this paper, the authors argue that the pairing of two complementary radios with heterogeneous range characteristics enables greater range and interference diversity...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks

    Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over CSMA based multihop wireless networks. Despite these advances, however, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Robust Gray-Scale Distribution Estimation for Contactless Palmprint Recognition

    Palmprint identification has emerged as one of the popular and promising biometric modalities for forensic and commercial applications. In recent years the contactless system emerges as a viable option to address hygienic issues and improve the user acceptance. The presence of significant scale, rotation, occlusion and translation variations in the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Improving the Performance of Delay Based Protocol in Delivering Real Time Media Via Early Retransmission

    Early Retransmission (ER) has already been shown to improve TCP-SACK's performance in delivering time sensitive media. In this paper, the authors integrate the ER scheme into a delay-based TCP variant, namely TCP-PERT, and perform extensive ns2 simulation. The results show that ER can also improve PERT's performance in delivering real...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Reaching Approximate Wardrop Equilibrium at Reduced Costs of Link State Updates

    Several routing protocols have been proposed to take advantage of the dynamic metrics on links such as link delays, queueing lengths, and available link bandwidths. Wardrop routing, QOS routing are few such example routing protocols. Even when these protocols can be shown to offer convergence properties without oscillations, the protocols...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Characterization of Time Variation on 1.9 GHz Fixed Wireless Channels in Suburban Macrocell Environments

    The authors observed temporal fading on 1.9 GHz fixed wireless channels during short-term measurements at 107 different locations in a suburban macrocell environment characterized by flat terrain and heavy foliage in order to determine how the rate of fading varies with average wind speed and distance. For each location, they...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Fade Slope Analysis of Ka-Band Earth-LEO Satellite Links Using a Synthetic Rain Field Model

    Because the motion of a Low Earth Orbit (LEO) satellite across the sky causes the Earth-space path to very quickly pass through any rain cells in the vicinity, the degree of rain fading on such paths changes more rapidly and leads to steeper fade slopes than in the geostationary case....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Effect of Turbulence Layer Height and Satellite Altitude on Tropospheric Scintillation on Ka-Band Earth-LEO Satellite Links

    Tropospheric scintillation on Earth-space paths increases greatly at low elevation angles and/or higher carrier frequencies, may impair low margin systems and can interfere with power control algorithms used to mitigate rain fading. The amplitude and spectral characteristics of tropospheric scintillation have been well studied for Earth-GEO links which have fixed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Depth and Rate of Fading on Fixed Wireless Channels Between 200 MHz and 2 GHz in Suburban Macrocell Environments

    Various bands between 200 MHz and 2 GHz have recently been reallocated to multipoint fixed wireless services. The links in such systems are usually obstructed by buildings and foliage and are susceptible to fading caused by windblown trees and foliage. To date, there have been relatively few efforts to characterize...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Risk-Aware Response for Mitigating MANET Routing Attacks

    Mobile Ad hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Security-Enhanced OSGi Service Environments

    Today's home and local-area network environments consist of various types of personal equipments, network devices, and corresponding services. Since such prevalent home network environments frequently deal with private and sensitive information, it is crucial to legitimately provide access control for protecting such emerging environments. As a result, the Open Services...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Representing and Reasoning About Web Access Control Policies

    The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled one to perform business services more efficiently and effectively. However, people still suffer from unintended security leakages by unauthorized services while providing more convenient services to Internet users through such a cutting-edge technological growth....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Constructing Authorization Systems Using Assurance Management Framework

    Model-driven approach has recently received much attention in developing secure software and systems. In addition, software developers have attempted to employ such an emerging approach in the early stage of software development life cycle. However, security concerns are rarely considered and practiced due to the lack of appropriate systematic mechanisms...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Caches and Predictors for Real-Time, Unobtrusive, and Cost-Effective Program Tracing in Embedded Systems

    The increasing complexity of modern embedded computer systems makes software development and system verification the most critical steps in the system development. To expedite verification and program debugging, chip manufacturers increasingly consider hardware infrastructure for program debugging and tracing, including logic to capture and filter traces, buffers to store traces,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Codes for Asymmetric Limited-Magnitude Errors With Application to Multi-Level Flash Memories

    Several physical effects that limit the reliability and performance of Multilevel Flash Memories induce errors that have low magnitudes and are dominantly asymmetric. This paper studies block codes for asymmetric limited-magnitude errors over q-ary channels. The authors propose code constructions and bounds for such channels when the number of errors...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Characterization of UWB Channel Impulse Responses Within the Passenger Cabin of a Boeing 737-200 Aircraft

    With its confined volume, cylindrical structure and high density of seating, the passenger cabin of a typical midsize airliner is significantly different from the residential, office, outdoor and industrial environments previously considered by IEEE 802.15.4a. The authors have characterized the shape of the Ultra Wide Band (UWB) channel impulse response...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Effect of Human Presence on UWB Radiowave Propagation Within the Passenger Cabin of a Midsize Airliner

    The authors have characterized the effect of human presence on path gain and time dispersion over Ultra Wide Band (UWB) channels within the passenger cabin of a typical midsize airliner. They measured a few hundred channel frequency responses over the range 3.1 - 6.1 GHz between various locations within a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Spectrum Management in Cognitive Radio Ad Hoc Networks

    The problem of spectrum scarcity and inefficiency in spectrum usage will be addressed by the newly emerging cognitive radio paradigm that allows radios to opportunistically transmit in the vacant portions of the spectrum already assigned to licensed users. For this, the ability for spectrum sensing, spectrum sharing, choosing the best...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Keystroke-Dynamics Authentication Against Synthetic Forgeries

    The authors describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, they present a remote authentication framework called TUBA for monitoring a user's typing patterns. They evaluate the robustness of TUBA through comprehensive experimental evaluation including two series of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Trajectory Codes for Flash Memory

    Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the stored data changes its value with certain patterns. The patterns of data updates are determined by the data structure and the application, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    A Combinatorial Approach to Building Navigation Graphs for Dynamic Web Applications

    Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt with: The page explosion problem, i.e., the number of dynamic pages may be huge or even infinite; and the request generation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Interference-Limited Opportunistic Relaying With Reactive Sensing

    This work evaluates opportunistic relaying in the presence of thermal noise as well as interference, when channel sensing is conducted reactively, in slow fading environments. The studied scenario employs a single gateway that provides access towards several destinations with weak links and exploits a network of intermediate relays. In sharp...

    Provided By Institute of Electrical and Electronics Engineers