Institute of Electrical and Electronics Engineers

Displaying 1-40 of 6931 results

  • White Papers // May 2015

    SRAM for Error-Tolerant Applications with Dynamic Energy-Quality Management in 28 nm CMOS

    In this paper, a voltage-scaled SRAM for both error-free and error-tolerant applications is presented that dynamically manages the energy/quality trade-off based on application need. Two variation-resilient techniques, write assist and error correcting code, are selectively applied to bit positions having larger impact on the overall quality, while jointly performing voltage...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2015

    Digitally Controlled Leakage-Based Oscillator and Fast Relocking MDLL for Ultra Low Power Sensor Platform

    In this paper, the authors present an all-digital Multiplying Delay-Locked Loop (MDLL) with a leakage-based oscillator for ultra-low-power sensor platforms. The proposed digital control of channel leakage current achieved ultra-low power consumption in frequency generation with a fine resolution. The leakage based oscillator was modeled as an RC-based oscillator, analyzed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    IoT Design Space Challenges: Circuits and Systems

    The Internet of Things (IoTs) is a rapidly emerging application space, poised to become the largest electronics market for the semiconductor industry. IoT devices are focused on sensing and actuating of the authors' physical environment and have a nearly unlimited breadth of uses. In this paper, they explore the IoT...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    Correctness Analysis and Power Optimization for Probabilistic Boolean Circuits

    Traditionally, the authors expect that circuit designs can be executed without errors. However, for error resilient applications such as image processing, 100% correctness is not necessary. By pursuing less than 100% correctness, power consumption can be significantly reduced. Recently, probabilistic CMOS and Probabilistic Boolean Circuits (PBCs) have been proposed to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2015

    Wireless Sensor Network Virtualization: A Survey

    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoTs) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSNs' nodes are becoming more and more powerful, it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    Wireless Sensor Networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2014

    An Ultra-Low Power Fully Integrated Energy Harvester Based on Self-Oscillating Switched-Capacitor Voltage Doubler

    Recent advances in low power circuits have enabled mm-scale wireless systems for wireless sensor networks and implantable devices among other applications. Energy harvesting is an attractive way to power such systems due to the limited energy capacity of batteries at these form factors. However, the same size limitation restricts the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers

    Cloud providers are typically hierarchically organized into interconnected data centers, each with a collection of racks of servers organized into clusters. The communication cost between two servers is a function of their relative location in the cloud infrastructure. Cloud consumers submit allocation requests for virtual machines, of different types and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    A Fully-Integrated 71 nW CMOS Temperature Sensor for Low Power Wireless Sensor Nodes

    The authors propose a fully-integrated temperature sensor for battery-operated, ultra-low power microsystems. Sensor operation is based on temperature independent/dependent current sources that are used with oscillators and counters to generate a digital temperature code. A conventional approach to generate these currents is to drop a temperature sensitive voltage across a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    An 8 Bit 4 GS/s 120 mWCMOS ADC

    For a given resolution, the power consumption of Analog-to-Digital Converters (ADCs) rises linearly with the speed up to some point and then begins to ascend at an increasingly higher rate. A time-interleaved ADC employs four pipelined time-interleaved channels along with a new timing mismatch detection algorithm and a high-resolution variable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Achieving High-Performance On-Chip Networks with Shared-Buffer Routers

    On-chip routers typically have buffers dedicated to their input or output ports for temporarily storing packets in case contention occurs on output physical channels. Buffers, unfortunately, consume significant portions of router area and power budgets. While running a traffic trace, however, not all input ports of routers have incoming packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    An Energy Efficient Full-Frame Feature Extraction Accelerator with Shift-Latch FIFO in 28 nm CMOS

    In this paper, the authors present an energy efficient feature extraction accelerator design aimed at visual navigation. The hardware oriented algorithmic modifications such as a circular-shaped sampling region and unified description are proposed to minimize area and energy consumption while maintaining feature extraction quality. A matched-throughput accelerator employs fully-unrolled filters...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    Analysis of Metastability in Pipelined ADCs

    A critical issue in the design of high-speed ADCs relates to the errors that result from comparator meta-stability. Studied for flash architectures in the past, this phenomenon assumes new dimensions in pipelined converters, creating far more complex error mechanisms. This paper presents a comprehensive analysis of comparator meta-stability effects in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Quaternary Logic Lookup Table in Standard CMOS

    Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this paper, they propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Secure Browser Architecture Based on Hardware Virtualization

    Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation mechanism to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Low-Power High-Throughput LDPC Decoder Using Non-Refresh Embedded DRAM

    The majority of the power consumption of a high-throughput LDPC decoder is spent on memory. Unlike in a general-purpose processor, the memory access in an LDPC decoder is deterministic and the access window is short. The authors take advantage of the unique memory access characteristic to design a non-refresh eDRAM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    GPU-Based JPEG2000 Decoding Scheme for Digital Cinema

    For the digital cinema system specification released by digital cinema initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Energy-Saving Cloud Computing Platform Based on Micro-Embedded System

    Energy consumption and computing performance are two essential considerations when service providers establish new data centers. The energy-saving cloud computing platform proposed in this study as potential applications in internet network information centers because of its excellent energy efficiency when manage large datasets. Increased data nodes in distributed computing systems...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Balancing Scalability, Performance and Fault Tolerance for Structured Data (BSPF)

    Analytical business applications generate reports that give a trend predicting insight into the organization's future, estimating the financial graphs and risk factors. These applications work on huge amounts of data, which comprises of decades of market and company records and decision logs of an organization. Today, limit of big data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Study on VM-Based Terminal Mobility Management

    Recently, subscribers are using services utilizing various kinds of virtualization technology. The authors propose Virtual Machine (VM)-based terminal mobility management. The mechanism requires enhanced mobility control procedures and data transmission procedure comparing with the existing mobility management like Access Independent Mobile Service (AIMS). The procedures newly introduce location notification message...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Measurement Results of Frequency Offset in DVB-C2 Receiver

    In this paper, the authors show the measurement results of Frequency Offset (FO) estimation in Digital Video Broadcasting for Cable version 2 (DVB-C2) receiver which uses Orthogonal Frequency-Division Multiplexing (OFDM). Because FO causes Inter-Carrier Interference (ICI) in a multicarrier system, it should be estimated and compensated to improve the performance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Evaluating Team Performance Using Slack Based Data Envelopment Analysis

    In this paper, the authors devise a Data Envelopment Analysis (DEA) model to assess team performance. The DEA model in this paper uses Slack Based Measure (SBM), a method which deals directly with the input excesses and output shortfall. An explanatory example has been given to demonstrate the applicability of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Device Control Protocol Using Mobile Phone

    With rapid development of Smartphone make the authors to face in front of the boundary of the world of ubiquitous computing. The capabilities of Smartphone are raising the interest of the smart home and home network technologies. These have used Smartphone as a remote controller. However, the technologies of each...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Iterative Threshold for Anti-Jamming Algorithm and Its Implementation on FPGA

    Frequency-Domain Anti-Jamming (FDAJ) algorithms achieve prominent performance on interference suppression with simple calculations; and hence they are widely used in many applications. The interference suppression threshold plays a key role in the algorithm and affects system performance greatly. In this paper, the initial interference threshold is derived theoretically and then...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-Based PKI

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "Cloud computing" also increases severe security concerns. Security has remained...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Reconfigurable Architecture for Generic OFDM Modulator Based on FPGA

    OFDM is a special case of multi-carrier modulations, which is of great use in various wireless communications, such as DAB, DVB, HDTV, CMMB, TMMB and 802.11a. The OFDM frame structure is similar to each other. It consists of a number of OFDM symbols following the synchronizing signal with different cyclic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    PCE Implementation and Testing by Using Virtual Machines

    In this paper, the authors describe the way to implement and test a PCE on the virtualized environment. The PCE is a special computational entity that will corporate with similar entities to compute the best possible path through single or multiple domains. Generally, in real network, the testing and implementation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Verification of Reconfigurable Binary Decision Diagram-Based Single-Electron Transistor Arrays

    Recently, Single-Electron Transistors (SETs) have been attracting substantial attention and are considered candidate devices for future integrated circuits due to their ultra-low power consumption. To realize SETs, a binary decision diagram-based SET array is proposed as a suitable candidate for implementing Boolean circuits. Then, some works started developing computer-aided design...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Adaptive Routing Strategies in IEEE 802.16 Multi-Hop Wireless Backhaul Networks Based on Evolutionary Game Theory

    The high frequency segment (10-66GHz) of the IEEE 802.16 standard seems promising for the implementation of wireless backhaul networks carrying large volumes of Internet traffic. In contrast to wireline backbone networks, where channel errors seldom occur, routing decisions in IEEE 802.16 networks are conditioned by wireless channel impairments rather than...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    An Audio DSP Toolkit for Rapid Application Development in Flash

    The Adobe Flash platform has become the de facto standard for developing and deploying media rich web applications and games. The relative ease-of-development and cross-platform architecture of Flash enables designers to rapidly prototype graphically rich interactive applications, but comprehensive support for audio and signal processing has been lacking. ActionScript, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Rate Allocation for Satellite Systems With Correlated Channels Based on a Stackelberg Game

    In this paper, the authors consider the problem of capacity allocation for fixed broadband (Ka band) satellite networks with a large coverage and correlated atmospheric channel conditions both in time and space. The transmitted bit rate adapts to the channel by varying the coding rate and the constellation. The network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Physical Layer Security Game: How to Date a Girl With Her Boyfriend on the Same Table

    Physical layer security is an emerging security concept that achieves perfect secrecy data transmission between the intended network nodes, while the eavesdropping malicious nodes obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdropping malicious nodes while the interference to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Modelling Throughput and Starvation in 802.11 Wireless Networks With Multiple Flows

    Carrier Sense Multiple Access (CSMA) protocols require stations that wish to transmit to first check the shared medium for ongoing transmissions. However, in wireless networks stations may not be able to sense transmissions from all other stations; hence those at different locations can experience different amounts of contention, resulting in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Tracking and Activity Recognition Through Consensus in Distributed Camera Networks

    Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated processing of the data. Moreover, most methods for multicamera analysis are centralized schemes that require the data to be present at a central server. In many applications, this...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Synthesis Algorithm for Application-Specific Homogeneous Processor Networks

    The application-specific multiprocessor system-on-a chip is a promising design alternative because of its high degree of flexibility, short development time, and potentially high performance attributed to application-specific optimizations. However, designing an optimal application-specific multiprocessor system is still challenging because there are a number of important metrics, such as throughput, latency,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Efficient Gigabit Ethernet Switch Models for Large-Scale Simulation

    Ethernet is the most widely implemented low-level networking technology used today, with Gigabit Ethernet seen as the emerging standard implementation. The backbones of many large scale networks (e.g., Data Centers, Metroarea Deployments) are increasingly made up of Gigabit Ethernet as the underlying technology, and Ethernet is seeing increasing use in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    PWalrus: Towards Better Integration of Parallel File Systems Into Cloud Storage

    Amazon S3-style storage is an attractive option for clouds that provides data access over HTTP/HTTPS. At the same time, parallel file systems are an essential component in privately owned clusters that enable highly scalable data-intensive computing. In this work, the authors take advantage of both of those storage options, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    An Autonomic Approach to Integrated HPC Grid and Cloud Usage

    Clouds are rapidly joining high-performance Grids as viable computational platforms for scientific exploration and discovery, and it is clear that production computational infrastructures will integrate both these paradigms in the near future. As a result, understanding usage modes that are meaningful in such a hybrid infrastructure is critical. For example,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    SLA-Aware Profit Optimization in Cloud Services Via Resource Scheduling

    The users of cloud computing services are not only able to significantly reduce their IT costs and turn their capital expenditures to operational expenditures, but also able to speed up their innovation capabilities thanks to the on-demand access to vast IT resources in the cloud. While the cloud computing offers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    A Cloud Computing Platform Based on P2P

    In recent years, the technology of cloud computing has been widely applied in e-business, e-education and etc.. Cloud computing platform is a set of Scalable large-scale data server clusters, it provide computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    A Taxonomy and Survey of Cloud Computing Systems

    The computational world is becoming very large and complex. Cloud Computing has emerged as a popular computing model to support processing large volumetric data using clusters of commodity computers. According to the authors, Google currently processes over 20 terabytes of raw web data. It's some fascinating, large-scale processing of data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Scalability and Performance Evaluation of Hierarchical Hybrid Wireless Networks

    This paper considers the problem of scaling ad hoc wireless networks now being applied to urban mesh and sensor network scenarios. Previous results have shown that the inherent scaling problems of a multihop "Flat" ad hoc wireless network can be improved by a "Hybrid network" with an appropriate proportion of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Internet Service in Developing Regions Through Network Coding

    The availability of Internet services brings many benefits to developing regions, yet Internet deployment levels in these regions remain staggeringly low. In this work the authors investigate how existing cellular deployments, which have enjoyed more rapid and wider deployment than client Internet infrastructure, could be used to provide very low...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Teaching Web Services and Service-Oriented Architecture Using Mobile Platforms

    Even as everyday software increasingly transitions to online software services, many educational projects in software development courses still remain on single-user PC systems. To better prepare the students for this emerging trend in software development, material on web services and service-oriented architecture should become more of a focus in computer...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks

    The authors propose a contention based reservation MAC protocol for a collaborative sensing scenario involving a set of surveillance UAVs communicating with a hub. Data transmission rights are secured via distributed contention access between the UAV nodes for K available mini-slots. Each node chooses a slot with probability p independently...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

    The importance of suitable link-aware routing metrics for multi-hop (Mesh) wireless networks is well-established. Channel-to-link assignments impact the distribution of co-channel links and contributes to inter-flow and intra-flow interference. In this paper the authors present A new Location-Aware Routing Metric (ALARM) that better captures the resulting co-channel interference as a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Adaptive Business Intelligence for an Open Negotiation Environment

    Engineering of negotiation model allows developing effective heuristic for business intelligence. Digital Ecosystems demand open negotiation models. To define in advance effective heuristics is not compliant with the requirement of openness. The new challenge is to develop business intelligence in advance exploiting an adaptive approach. The idea is to learn...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Securing Structured Overlays Against Identity Attacks

    Structured overlay networks can greatly simplify data storage and management for a variety of distributed applications. Despite their attractive features, these overlays remain vulnerable to the Identity attack, where malicious nodes assume control of application components by intercepting and hijacking key-based routing requests. Attackers can assume arbitrary application roles such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    A Scalable Hybrid Approach to Switching in Metro Ethernet Networks

    The most common technology in Local Area Networks is the Ethernet protocol. The continuing evolution of Ethernet has propelled it into the scope of Metropolitan Area Networks. Even though Ethernet is fast and simple, the Spanning Tree in Ethernet is inefficient in terms of network utilization and load balancing. This...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Flow-Based Front Payload Aggregation

    The authors present and discuss a new monitoring technique that the authors call Front Payload Aggregation (FPA). Instead of being limited to either analyzing single packets for signature based attack detection or exploiting statistical flow information for anomaly detection, FPA combines the advantages of both approaches. Exploiting the fact that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Bandwidth Adaptation in Streaming Overlays

    A major challenge for real-time streaming overlays is to distribute high bit-rate streams with uninterrupted playback. Hosts usually have sufficient inbound bandwidth to support streaming, but due to the prevalence of asymmetric links in broadband networks, the bottleneck is the aggregate, overlay wide outbound bandwidth. If this bandwidth is less...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Business and Market Intelligence 2.0

    BI has been used as an umbrella term to describe concepts and methods for improving business decision making by using fact-based support systems. BI also includes the underlying architectures, tools, databases, applications, and methodologies. BI's major objectives are to enable interactive and easy access to diverse data, enable manipulation and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks With Relays Deployment

    In this paper, a binary hypothesis distributed detection problem in correlated wireless sensor networks with cooperative relays deployment is considered. In particular, the effect of correlation between sensor nodes is modeled and analyzed in Rayleigh flat fading channels in order to explore the natural tradeoffs between the number of sensor/relay...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    An Auction-Based Framework for Multimedia Streaming Over Cognitive Radio Networks

    Recently, many works have been proposed in the area of cognitive radio to efficiently utilize the spectrum for data communication. However, little effort has been made in content-aware multimedia applications over cognitive radio networks. This paper studies the multimedia streaming problem over cognitive radio networks. The uniquely scalable and delay-sensitive...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Attack-Resistant Collaboration in Wireless Video Streaming Social Networks

    Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with each other to obtain better-quality service. The decisions and actions of users influence the performance of others; hence they form a social network....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Channel-Based Detection of Sybil Attacks in Wireless Networks

    Due to the broadcast nature of the wireless medium, wireless networks are especially vulnerable to Sybil attacks, where a malicious node illegitimately claims a large number of identities and thus depletes system resources. This paper proposes an enhanced physical-layer authentication scheme to detect Sybil attacks, exploiting the spatial variability of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    IPTV Home Networking Via 802.11 Wireless Mesh Networks: An Implementation Experience

    Wireless multimedia home servers are the next generation of home entertainment systems. From a single broadband connection entering home, multimedia data is transmitted to TV and other peripherals using only wireless links. The provision of hiqh quality time-critical multimedia services in indoor environment is very challenging due to high attenuation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks

    A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized healthcare. Securing intersensor communications within BANs is essential for preserving not only the privacy of health data, but also for ensuring safety of healthcare delivery. This paper presents Physiological-Signal-based Key Agreement (PSKA), a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Channel Assignment Strategies for Multiradio Wireless Mesh Networks: Issues and Solutions

    Next-generation wireless mobile communications will be driven by converged networks that integrate disparate technologies and services. The wireless mesh network is envisaged to be one of the key components in the converged networks of the future, providing flexible high-bandwidth wireless backhaul over large geographical areas. While single radio mesh nodes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Secure Semantic Sensor Web and Pervasive Computing

    Sensors are everywhere and they have become part of the daily lives. These sensors are continually monitoring the environment, events, activities, people, vehicles, and many other objects, gathering data from these objects, aggregating the data and then making sense out of the data and finally taking actions based on the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Demonstration of Omnipresent Ethernet: A Novel Metro End-to-End Communication System Using Binary + Source Routing and Carrier Ethernet

    A new end-to-end communication solution called Omnipresent Ethernet (OEthernet) is demonstrated through a test-bed. The solution takes into consideration contemporary interconnection methodologies in enterprise/provider networks from a generalized graph perspective. The aim is to be able to convert any network graph into a known symmetric graph by simple algorithmic treatment....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    A Virtualization Infrastructure That Supports Pervasive Computing

    Virtualization technology - as applied in embedded devices such as mobile smartphones - is a practical means for the widespread deployment of pervasive computing applications. As anyone who reads this magazine knows, pervasive computing is all about moving beyond the desktop PC to the computational and digital devices that surround...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    An E-Learning Ecosystem Based on Cloud Computing Infrastructure

    Recently the research community has believed that an e-learning ecosystem is the next generation e-learning. However, the current models of e-learning ecosystems lack the support of underlying infrastructures, which can dynamically allocate the required computation and storage resources for e-learning ecosystems. Cloud computing is a promising infrastructure which provides computation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Privacy-Preserving Public Auditing for Secure Cloud Storage

    Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    A Study in Hadoop Streaming with Matlab for NMR data processing

    Applying Cloud computing techniques for analyzing large data sets has shown promise in many data-driven scientific applications. The approach presented here is to use Cloud computing for Nuclear Magnetic Resonance (NMR) data analysis which normally consists of large amounts of data. Biologists often use third party or commercial software for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Channel Assignment Schemes for Infrastructure-Based 802.11 WLANs: A Survey

    Efficient channel assignment is crucial for successful deployment and operation of IEEE 802.11-based WLANs. This paper presents a survey on the state of the art channel assignment schemes in IEEE 802.11-based WLANs. After detailing out all the schemes, the authors provide a qualitative comparison among different schemes in terms of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    NashWifi: Coordinated Management of Heterogenous Home 802.11 Networks Using Bargaining

    This paper presents an economically principled framework for coordinated configurations of heterogeneous wireless networks. The approach, called NashWiFi, is based on the concept of Nash bargaining. The authors argue that NashWiFi can improve both the global performance of a large diverse 802.11 deployment, while also improving the local performance of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks

    The authors consider the simplest IEEE 802.11 WLAN networks for which analytical models are available and seek to provide an experimental validation of these models. The experiments include the following cases: two nodes with saturated queues, sending fixed-length UDP packets to each other, and a TCP-controlled transfer between two nodes....

    Provided By Institute of Electrical and Electronics Engineers