Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7347 results

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Programmable Neuromorphic Circuits for Spike-Based Neural Dynamics

    Hardware implementations of spiking neural networks offer promising solutions for a wide set of tasks, ranging from autonomous robotics to brain machine interfaces. The authors propose a set of programmable hybrid analog/digital neuromorphic circuits than can be used to build compact low-power neural processing systems. In particular, they present both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems

    Future flash-based Solid-State Drives (SSDs) must employ increasingly powerful Error Correction Code (ECC) and Digital Signal Processing (DSP) techniques to compensate the negative impact of technology scaling on NAND flash memory device reliability. Currently, all the ECC and DSP functions are implemented in a central SSD controller. However, the use...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2000

    Zipper VDSL: A Solution for Robust Duplex Communication Over Telephone Lines

    This paper presents an overview of a digital duplex scheme called Zipper, intended for DMT-based VDSL systems. The Zipper multi-carrier duplex scheme represents a breakthrough toward digital implementation of frequency-division duplexing. A duplex scheme is a method to divide the capacity of a line between the upstream and downstream directions....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2005

    Mobilizing Customer Relationship Management - A Journey From Strategy to System Design

    The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has recently been renewed interest in mobile business and mobile commerce. Now, however, business managers request detailed and thorough analyses prior to engaging in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2003

    Automating Keyphrase Extraction With Multi-Objective Genetic Algorithms

    This white paper proposes an automated key phrase extraction algorithm using a non dominated sorting multi-objective genetic algorithm. The "clumping" property of key phrases is used to judge the appropriateness of a phrase and is quantified by a condensation clustering measure proposed by Bookstein. The objective is to find the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2003

    Characterizations of Metal - Diamond - Silicon Associations for Active Power Electronics Applications

    This paper presents different grades of CVD diamond substrates and the comparison between them, especially between the natural and other kind of CVD diamond. Dielectric strength investigation and surface conductivity with or without chemical treatment are presented, then the influence of the metal to diamond interface on the electronic properties...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2003

    Tumor Detection in the Bladder Wall With a Measurement of Abnormal Thickness in CT Scans

    Virtual cystoscopy is a developing technique for bladder cancer screening. In a conventional cystoscopy, an optical probe is inserted into the bladder and an expert reviews the appearance of the bladder wall. Physical limitations of the probe place restrictions on the examination of the bladder wall. In virtual cystoscopy, a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2004

    Improved Watershed Transform for Medical Image Segmentation Using Prior Information

    The watershed transform has interesting properties that make it useful for many different image segmentation applications: it is simple and intuitive, can be parallelized, and always produces a complete division of the image. However, when applied to medical image analysis, it has important drawbacks. They present an improvement to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2006

    Performance Comparison of IP, MPLS and ATM Based Network Cores Using OPNET

    The core components of a network play vital role in its enhancement. For launching and providing Internet applications and services, vendors have come up with a variety of different technology based network cores and other components of Internet backbone. Among all the challenges for an efficient network core, traffic-routing is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2008

    History of Wireless Local Area Networks (WLANs) in the Unlicensed Bands

    A brief history of the development of WLAN standards and products is presented in the context of explaining how unlicensed spectrum regulations by the Federal Communications Commission (FCC) have affected the industry. In general, the FCC's initiative to create an "Unlicensed commons" for various forms of wireless communication applications has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2009

    HCI(Human Computer Interaction) Using Multi-Touch Tabletop Display

    In this paper, the authors describe the development of multi-touch tabletop display system and the classification of hand gesture commands for interacting with the system. And also, they analyze the suitability for interactive tabletop in light of the respective input and output degrees of freedom, as well as the precision...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Neural Networks Approaches for Computing the Forward Kinematics of a Redundant Parallel Manipulator

    In this paper, different approaches to solve the forward kinematics of a three DOF actuator redundant hydraulic parallel manipulator are presented. On the contrary to series manipulators, the forward kinematic map of parallel manipulators involves highly coupled nonlinear equations, which are almost impossible to solve analytically. The proposed methods are...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Transmission-Constrained Inverse Residual Demand Jacobian Matrix In Electricity Markets

    A generation firm in an electricity market may own multiple generators located at multiple locations. This paper generalizes the concept of transmission-constrained residual demand from a single generator's perspective to that of a generation firm. The authors calculate the derivative of a generation firm's inverse residual demand function, i.e., the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    New Indices Of Market Power In Transmission-Constrained Electricity Markets

    MARKET power continues to be a problematic issue in restructured electricity markets, with the interaction between tight supply conditions and transmission limits posing serious difficulties for market operations, particularly in the context of "Energy-only" markets such as the Electric Reliability Council Of Texas (ERCOT) balancing market and the upcoming ERCOT...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Bidding Into Electricity Markets: A Transmission-Constrained Residual Demand Derivative Approach

    This paper proposes a novel approach to optimize a generator's profit in an offer-based electricity market cleared by an Optimal Power Flow (OPF) program. A generator's offer is optimized based on its Transmission-Constrained Residual Demand Derivative (TCRDD), which avoids representing the full network model in the optimization. The TCRDD can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Integrating Data for Business Process Management

    To be able to utilize Web-scale resources for business processes and to adapt these processes to the dynamic change of environments, Business Process Management Suites/Systems (BPMS) must be able to gather, integrate and manage various types of data in the lifecycle of business processes. The authors discuss the issue of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    COPAL: An Adaptive Approach to Context Provisioning

    Context-aware services need to acquire context information from heterogeneous context sources. The diversity of service requirements posts challenges on context provisioning systems as well as their programming models. This paper proposes COPAL (COntext Provisioning for ALl) - an adaptive approach to context provisioning. COPAL is at first a runtime middleware,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    A Hybrid Sharing Control Model for Context Sharing and Privacy in Collaborative Systems

    Complex Web-based information systems involving multiple entities and their dynamic mobile-based collaborations require efficient techniques for context information sharing. Sharing control is a requirement for preserving the privacy of personal context and shared context. The authors' sharing control mechanism is hybrid, based on sharing control rules defined by enterprise as...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    The Social Compute Unit

    Social computing is perceived mainly as a vehicle for establishing and maintaining private relationships and thus lacks mainstream adoption in enterprises. Collaborative computing, however, is firmly established, but no tight integration of the two approaches exists. Here, the authors look at how to integrate people, in the form of human-based...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    End-to-End Support for QoS-Aware Service Selection, Binding and Mediation in VRESCo

    Service-oriented Computing has recently received a lot of attention from both academia and industry. However, current service-oriented solutions are often not as dynamic and adaptable as intended because the publish-find-bind-execute cycle of the SOA triangle is not entirely realized. In this paper, the authors highlight some issues of current Web...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    OppCast: Opportunistic Broadcast of Warning Messages in VANETs With Unreliable Links

    Multi-hop broadcast is a key technique to disseminate important information such as time-sensitive safety Warning Messages (WMs) in Vehicular Ad hoc NETworks (VANETs). Due to the fact that the implementation of broadcast at the link layer uses unreliable transmissions (i.e., lack of positive ACKs), highly reliable, scalable, and fast multihop...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Self-Reference Ultra-Wideband Systems

    In practical Ultra-WideBand (UWB) systems, Rake receivers are not able to fully take advantage of all resolvable paths, because of the required computational and power resources. On the other hand, Transmitted Reference (TR) schemes are simple, robust structures with low power consumption and they do not require channel estimation, but...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Splitting Algorithms for Fast Relay Selection: Generalizations, Analysis, and a Unified View

    Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, the authors develop a novel, yet simple, asymptotic analysis...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    On Feasibility of Interference Alignment in MIMO Interference Networks

    The authors explore the feasibility of interference alignment in signal vector space - based only on beamforming - for K-user MIMO interference channels. The main contribution is to relate the feasibility issue to the problem of determining the solvability of a multivariate polynomial system, considered extensively in algebraic geometry. It...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Pseudo Random Numbers Generators Available as Web Services

    Series of Pseudo Random Numbers are often used as simulation input, and they strongly influence the results. Thus, their usage and the usage of their generator need to be taken care of very well. Qualified generators are available on the web as source code or libraries. However, they require an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Network MIMO With Linear Zero-Forcing Beamforming: Large System Analysis, Impact of Channel Estimation and Reduced-Complexity Scheduling

    The authors consider the downlink of a multi-cell system with multi-antenna base stations and single-antenna user terminals, arbitrary base station cooperation clusters, distance-dependent propagation pathloss, and general "Fairness" requirements. They focus on the joint transmission from the base stations in a cooperation cluster based on linear zero-forcing beamforming, subject to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming

    In recent years there has been growing interest in study of multi-antenna transmit designs for providing secure communication over the physical layer. This paper considers the scenario of an intended multi-input single-output channel overheard by multiple multi-antenna eavesdroppers. Specifically, the authors address the transmit covariance optimization for Secrecy-Rate Maximization (SRM)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Effectively Indexing the Uncertain Space

    With the rapid development of various optical, infrared, and radar sensors and GPS techniques, there are a huge amount of multidimensional uncertain data collected and accumulated everyday. Recently, considerable research efforts have been made in the field of indexing, analyzing, and mining uncertain data. As shown in a recent book...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Approximate Processing of Massive Continuous Quantile Queries Over High-Speed Data Streams

    Continuous queries are issued once and run continuously to update query results along with updates of the underlying data sets. Research in efficient query processing over data streams has recently received a great deal of attention and many techniques have been developed, such as processing of relational queries, semi-structured data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Visible Reverse k-Nearest Neighbor Query Processing in Spatial Databases

    Reverse Nearest Neighbor (RNN) queries have a broad application base such as decision support, profile-based marketing, resource allocation, etc. Previous work on RNN search does not take obstacles into consideration. In the real world, however, there are many physical obstacles (e.g., buildings) and their presence may affect the visibility between...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Graph Partition Based Multi-Way Spatial Joins

    In this paper, the authors investigate the problem of efficiently computing a multi-way spatial join without spatial indexes. They propose a novel and effective filtering algorithm based on a two phase partitioning technique. To avoid missing hits due to an inherent difficulty in multi-way spatial joins, they propose to firstly...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    SPARK2: Top-k Keyword Query in Relational Databases

    With the increasing amount of text data stored in relational databases, there is a demand for RDBMS to support keyword queries over text data. As a search result is often assembled from multiple relational tables, traditional IRstyle ranking and query evaluation methods cannot be applied directly. In this paper, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Design and Performance of Adaptive Polarized MIMO MC-SS-CDMA System for Downlink Mobile Communications

    In this paper, an adaptive polarized Multiple-Input Multiple-Output (MIMO) MultiCarrier Spread Spectrum Code Division Multiple Access (MC-SS-CDMA) system is designed for downlink mobile communications. The proposed system will be examined in Frequency Division Duplex (FDD) mode for both macro urban and suburban environments. For the same transmission bandwidth, a performance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Flexible Querying of Personal Information

    The amount of personal data that users store and access in personal information systems has grown massively. Simple flexible search tools are a necessity for users to be able to access the data they need. In addition, the file organization that is typical in file systems is not a practical...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    EAAC: Energy-Aware Admission Control Scheme for Ad Hoc Networks

    The decisions made by admission control algorithms are based on the availability of network resources viz. bandwidth, energy, memory buffers, etc., without degrading the Quality-of-Service (QoS) requirement of applications that are admitted. In this paper, the authors present an Energy-Aware Admission Control (EAAC) scheme which provides admission control for flows...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    Audio-Visual Synchronization Recovery in Multimedia Content

    This paper proposes a method recovering audio-visual synchronization of multimedia content. It exploits the correlation between the acoustic and the visual signals in order to estimate the audio-visual drift existing in the content. By shifting the audio signal relative to the visual signal, the estimation of the drift is obtained...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Island-Based Adaptable Embedded System Design

    Nowadays, hardware devices are meant to host the execution of many complex, multi-core applications, whose functional and non-functional requirements vary according to the specific working domain. In this paper, the authors propose a design methodology that combines an efficient reconfigurable architecture and a related mapping flow. In particular, the proposed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Fuzzy Control for Enforcing Energy Efficiency in High-Performance 3D Systems

    3D stacked circuits reduce communication delay in multi-core System-on-Chips (SoCs) and enable heterogeneous integration of cores, memories, sensors, and RF devices. However, vertical integration of layers exacerbates the reliability and thermal problems, and cooling is a limiting factor in multitier systems. Liquid cooling is a highly efficient solution to overcome...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    A Fair Non-Transfer Exchange Protocol

    Network exchange is now widely used. However, it still cannot avoid the problems evolving from network exchange. For example, a buyer may not receive the order even if he/she makes the payment. For another example, the seller possibly get nothing even when the merchandise is sent. Some studies about the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Channel Uncertainty in Ultra Wideband Communication Systems

    Channel uncertainty limits the achievable data rates of certain ultra wide band systems due to the need to estimate the channel. The use of bursty duty-cycled transmission reduces the channel uncertainty because the receiver has to estimate the channel only when transmission takes place, but the maximum amount of burstiness...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Cooperative Transmission for a Vector Gaussian Parallel Relay Network

    In this paper, the authors consider a parallel relay network where two relays cooperatively help a source transmit to a destination. They assume the source and the destination nodes are equipped with multiple antennas. Three basic schemes and their achievable rates are studied: Decode-and-Forward (DF), Amplify-and-Forward (AF), and Compress-and-Forward (CF)....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Turbo NOC: A Framework for the Design of Network on Chip Based Turbo Decoder Architectures

    This work proposes a general framework for the design and simulation of network on chip based turbo decoder architectures. Several parameters in the design space are investigated, namely the network topology, the parallelism degree, the rate at which messages are sent by processing nodes over the network and the routing...

    Provided By Institute of Electrical and Electronics Engineers