Institute of Electrical and Electronics Engineers

Displaying 361-400 of 6885 results

  • White Papers // Apr 2012

    Gaussian Approximation for the Wireless Multi-Access Interference Distribution and Its Applications

    This paper investigates the problem of Gaussian approximation for the wireless multi-access interference distribution in large spatial wireless networks. First, a principled methodology is presented to establish rates of convergence of the multi-access interference distribution to a Gaussian distribution for general bounded and power-law decaying path-loss functions. The model is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Diversity Loss Due to Interference Correlation

    Interference in wireless systems is both temporally and spatially correlated. Yet very little research has analyzed the effect of such correlation. Here the authors focus on its impact on the diversity in Poisson networks with multi-antenna receivers. Most work on multi-antenna communication does not consider interference, and if it is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Named Data Networking for Military Communication Systems

    Many modern military communication systems rely on Internet Protocol (IP) mechanisms to provide networking functionality. In addition, mostly all of these military systems are moving towards net-centric architectures, making IP functionality vital to these networks. Despite its prodigious use, IP-type networks tend to struggle when faced with mobility. In many...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks

    Wormhole attacks are considered as a severe security threat in multi-hop wireless ad hoc networks. In this paper, the authors propose an Energy-Efficient Scheme Immune to Wormhole attacks (their so-called E2SIW). This protocol uses the location information of nodes to detect the presence of a wormhole, and in case a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    The Dynamic Granularity Memory System

    Chip multiprocessors enable continued performance scaling with increasingly many cores per chip. As the throughput of computation outpaces available memory bandwidth, however, the system bottleneck will shift to main memory. The authors present a memory system, the Dynamic Granularity Memory System (DGMS), which avoids unnecessary data transfers, saves power, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Lane Decoupling for Improving the Timing-Error Resiliency of Wide-SIMD Architectures

    A significant portion of the energy dissipated in modern integrated circuits is consumed by the overhead associated with timing guard-bands that ensure reliable execution. Timing speculation, where the pipeline operates at an unsafe voltage with any rare errors detected and resolved by the architecture, has been demonstrated to significantly improve...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    The JavaSPI Framework for Security Protocol Implementation

    Security protocols are distributed algorithms that run over untrusted networks with the aim of achieving security goals, such as mutual authentication of two protocol parties. This paper presents JavaSPI, a \"Model-driven\" development framework that allows the user to reliably develop security protocol implementations in Java, starting from abstract models that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Analysis and Design of Tuned Turbo Codes

    Turbo codes and Multiple Parallel Concatenated Codes (MPCCs) perform very close to the Shannon limit with suboptimum iterative decoding, but the corresponding code ensembles are asymptotically bad in the sense that their minimum (Hamming) distance does not grow linearly with block length. It has been widely observed that there exists...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    FemtoCaching: Wireless Video Content Delivery Through Distributed Caching Helpers

    The authors propose and analyze a novel way for increasing the area spectral efficiency of video transmission in cellular communications systems. Small base stations called helpers with low-rate backhaul but high storage capacity cache popular video files. Mobile stations requesting video files receive them via short-range transmissions from helpers, if...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Femtocaching and Device-to-Device Collaboration: A New Architecture for Wireless Video Distribution

    The authors present a new architecture to handle the ongoing explosive increase in the demand for video content in wireless networks. It is based on distributed caching of the content in femto-basestations with small or non-existing backhaul capacity but with considerable storage space, called helper nodes. They also consider using...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Connectivity of Large Wireless Networks Under a Generic Connection Model

    Connectivity is one of the most fundamental properties of wireless multi-hop networks. A network is said to be connected if there is a path between any pair of nodes. Extensive research has been done on connectivity problems using the well-known random geometric graph and the unit disk connection model, which...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Second-Order Resolvability, Intrinsic Randomness, and Fixed-Length Source Coding for Mixed Sources: Information Spectrum Approach

    The second-order achievable asymptotics in typical random number generation problems such as resolvability, intrinsic randomness, fixed-length source coding is considered. In these problems, several researchers have derived the first-order and the second-order achievability rates for general sources using the information spectrum methods. Although these formulas are general, their computation is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Signal Shaping and Modulation for Optical Wireless Communication

    In this paper, a signal shaping framework for Optical Wireless Communication (OWC) is proposed. The framework is tailored to the single-carrier pulse modulation techniques, such as multi-level Pulse Position Modulation (-PPM) and multi-level Pulse Amplitude Modulation (-PAM), and to multi-carrier transmission realized through multi-level Quadrature Amplitude Modulation (-QAM) with Orthogonal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Clipping Noise in OFDM-Based Optical Wireless Communication Systems

    In this paper, the impact of clipping noise on Optical Wireless Communication (OWC) systems employing Orthogonal Frequency Division Multiplexing (OFDM) is investigated. The two existing Optical OFDM (O-OFDM) transmission schemes, Asymmetrically Clipped Optical OFDM (ACO-OFDM) and Direct Current-biased Optical OFDM (DCO-OFDM), are studied. Time domain signal clipping generally results from...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2012

    Improving Channel Estimation Accuracy in OFDM System Using MATLAB Simulation

    This paper is to improve channel estimation accuracy in OFDM system because channel state information is required for signal detection at receiver and its accuracy affects the overall performance of system and it is essential to improve the channel estimation for more reliable communications. OFDM system was chosen in this...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Training Symbol Design for Channel Estimation and IQ Imbalance Compensation in OFDM Systems

    In this paper, training symbol designs for estimation of frequency selective channels and compensation of In-phase (I) and Quadrature (Q) imbalances on OFDM transmitters and receivers are studied. The authors utilize Cross Entropy (CE) optimization techniques together with convex optimization to design training sequence that minimizes the channel estimate Mean...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Suboptimal Power Allocation for a Two-Path Successive Relay System with Full Interference Cancellation

    Although power allocation considerably affects the Symbol Error Rate (SER) performance of a Two-Path Successive Relay System (TPSRS), it is not yet studied in a Full Interference Cancellation (FIC) scenario. In this paper, the authors develop a suboptimal power allocation scheme for the TPSRS-FIC through minimizing an SER-based cost function....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Utility-Based Dynamic Multi-Service Bandwidth Allocation in Heterogeneous Wireless Networks

    In this paper, the authors present a dynamic bandwidth allocation scheme for multiple services in heterogeneous networks. A utility function is introduced first, whose parameters are determined by the modified multi-state Analytic Hierarchy Process (AHP) which adapts to different load levels according to dynamic thresholds. Based on this, a bandwidth...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    A Physical-Layer Network Coding Scheme Based on Linear MIMO Detection

    A Physical-layer Network Coding (PNC) scheme based on MIMO linear detection is proposed in this paper for a two-way relay channel with a multi-antenna relay. The authors apply a real-valued linear combiner to the output symbols of the MIMO linear detector to obtain a superimposed constellation for which the labeling...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Performance Debugging in the Large Via Mining Millions of Stack Traces

    Given limited resource and time before software release, development-site testing and debugging become more and more insufficient to ensure satisfactory software performance. As a counterpart for debugging in the large pioneered by the Microsoft Windows Error Reporting (WER) system focusing on crashing/hanging bugs, performance debugging in the large has emerged...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Distributed Space Time Coding for Wireless Two-Way Relaying

    The authors consider the wireless two-way relay channel, in which two-way data transfer takes place between the end nodes with the help of a relay. For the Denoise-aNd-Forward (DNF) protocol, it was shown by Koike-Akino et. al. that adaptively changing the network coding map used at the relay greatly reduces...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Data Dissemination in Wireless Networks With Network Coding

    The authors investigate the use of network coding for information dissemination over a wireless network. Using network coding allows for a simple, distributed and robust algorithm where nodes do not need any information from their neighbors. In this paper, they analyze the time needed to diffuse information throughout a network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements

    The authors study the problem of medium access control in domain of event-driven Wireless Sensor Networks (WSN). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSN encounter correlated traffic as a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Balancing the Trade-Offs Between Query Delay and Data Availability in MANETs

    In Mobile Ad hoc NETworks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Mitigating Routing Misbehavior in Disruption Tolerant Networks

    In Disruption Tolerant Networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    On Optimal Link Activation With Interference Cancellation in Wireless Networking

    A fundamental aspect in performance engineering of wireless networks is optimizing the set of links that can be concurrently activated to meet given Signal-to-Interference-and-Noise Ratio (SINR) thresholds. The solution of this combinatorial problem is the key element in scheduling and cross-layer resource management. Previous works on link activation assume single-user...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    The Overall Balance Between Cooperation and Interference for a Class of Wireless Networks

    This paper investigates the benefits of cooperation in large wireless networks with multiple sources and relays, where the nodes form an homogeneous Poisson point process. The source nodes may dispose of their nearest neighbor from the set of inactive nodes as their relay. Although cooperation can potentially lead to significant...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    A Survey on Security for Mobile Devices

    Now-a-days, mobile devices are an important part of the authors' everyday lives since they enable the users to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Reinforcement Learning Strategies for Self-Organized Coverage and Capacity Optimization

    Traditional manual procedures for coverage and capacity optimization are complex and time consuming due to the increasing complexity of cellular networks. This paper presents reinforcement learning strategies for self-organized coverage and capacity optimization through antenna downtilt adaptation. The authors analyze different learning strategies for a Fuzzy Q-Learning based solution in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Topology Control in Multihop Wireless Networks With Multi-Beam Smart Antennas

    Smart (directional) antennas can be deployed in a wireless network to enhance the capacity of the network by forming one or multiple beams only towards intended receivers. In this paper, the authors focus on the topology control approach for efficient communications in a wireless network with multi-beam smart antennas. This...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Integrating Routing with Content Delivery Networks

    Several research efforts are underway to associate content "Names" to the network space. There is a general belief that video and other types of cacheable content are going to continue to demand ever larger portions of a network's bandwidth. Technologies that enable network link bandwidth increases are struggling to keep...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    On Exploiting Flow Allocation With Rate Adaptation for Green Networking

    Network power consumption can be reduced considerably by adapting link data rates to their offered traffic loads. In this paper, the authors exploit how to leverage rate adaptation for green networking by studying the following flow allocation problem in wired networks: given a set of candidate paths for each end-to-end...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Energy-Efficient Collaborative Sensing With Mobile Phones

    Mobile phones with a rich set of embedded sensors enable sensing applications in various domains. In this paper, the authors propose to leverage cloud-assisted collaborative sensing to reduce sensing energy consumption for mobile phone sensing applications. They formally define a minimum energy sensing scheduling problem and present a polynomial-time algorithm...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    DEAR: Delay-Bounded Energy-Constrained Adaptive Routing in Wireless Sensor Networks

    Reliability and energy efficiency are critical issues in wireless sensor networks. In this paper, the authors study Delay-bounded Energy-constrained Adaptive Routing (DEAR) problem with reliability, differential delay, and transmission energy consumption constraints in wireless sensor networks. They aim to route the connections in a manner such that link failure does...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Sensing and Probing Cardinalities for Active Cognitive Radios

    In a cognitive radio network, Opportunistic Spectrum Access (OSA) to the underutilized spectrum involves not only sensing the spectrum occupancy, but also probing the channel quality in order to identify an idle and good channel for data transmission - particularly if a large number of channels is open for secondary...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Large Families of Asymptotically Optimal Two-Dimensional Optical Orthogonal Codes

    Nine new 2-D OOCs are presented here, all sharing the common feature of a code size that is much larger in relation to the number of time slots than those of constructions appearing previously in the literature. Each of these constructions is either optimal or asymptotically optimal with respect to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Weighted Sum Rate Maximization of Correlated MISO Broadcast Channels Under Linear Precoding: A Large System Analysis

    In this paper, the authors study the iterative Weighted Sum Rate (WSR) maximizing linear precoder algorithm proposed by Christensen et al. in large correlated MISO broadcast channels. They propose a novel approximation of the Signal-to-Interference plus Noise Ratio (SINR) at every iteration. Moreover, for independent and identical distributed channels the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments

    With the increase of energy consumption associated with IT infrastructures, energy management is becoming a priority in the design and operation of complex service-based systems. At the same time, service providers need to comply with Service Level Agreement (SLA) contracts which determine the revenues and penalties on the basis of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    CommonCode: A Code-Reuse Platform for Wireless Network Experimentation

    Experimentation of a wireless network protocol over the air is of significant interest. However, it is more rarely performed than simulation because of the difficulties in coding and debugging as well as lack of scalability and repeatability. In this paper, the concept of a code-reuse platform making use of a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    Green Resource Allocation to Minimize Receiving Energy in OFDMA Cellular Systems

    Advanced cellular systems supporting ultra high traffic (e.g., 1 Gbps) utilize aggressive communication technologies to User Equipment (UE) and thus induce high-energy consumption. To reduce UE energy consumption, the authors note that in OFDMA systems, transmissions to one UE can be scheduled into fewer time slots due to multiple available...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Comparing Simulation Tools and Experimental Testbeds for Wireless Mesh Networks

    Wireless simulators provide full control to researchers in investigating traffic flow behavior, but do not always reflect real-world scenarios. Although previous work pointed out such shortages are due to the limitation of radio propagation models in the simulators, it is still unclear how these imperfect models affect network behavior and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    DIPLOMA: Distributed Policy Enforcement Architecture for MANETs

    Lack of well-defined defense perimeter in MANETs prevents the use traditional firewalls, and requires the security to be implemented in a distributed manner. The authors recently introduced a novel deny-by-default distributed security policy enforcement architecture for MANETs by harnessing and extending the concept of network capabilities. The deny-by-default principle allows...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Evaluating a Collaborative Defense Architecture for MANETs

    Mobile Ad-hoc Networks (MANETs) are susceptible to both insider and outsider attacks more than wired and base station-based wireless networks. This is because of the lack of a well-defined defense perimeter in MANETs, preventing the use of defenses including firewalls or intrusion detection systems. This lack of perimeter calls for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Frontiers in Information and Software as Services

    The high cost of creating and maintaining software and hardware infrastructures for delivering services to businesses has led to a notable trend toward the use of third-party service providers, which rent out network presence, computation power, and data storage space to clients with infrastructural needs. These third party service providers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Wireless Secrecy in Large-Scale Networks

    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically Secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper provides...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    SAMER: Spectrum Aware Mesh Routing in Cognitive Radio Networks

    Cognitive radio technology holds great promises in enabling unlicensed operation in licensed bands, to meet the increasing demand for radio spectrum. The new open spectrum operation necessitates novel routing protocols to exploit the available spectrum opportunistically. In this paper the authors present SAMER, a routing solution for cognitive radio mesh...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks

    A Body Sensor Network (BSN) is a network of sensors deployed on a person's body for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a BSN. In this paper, the authors developed IBELite, a lightweight identity-based encryption suitable for sensors in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Efficient Techniques for Monitoring Missing RFID Tags

    As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, the authors consider the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags. The approach accurately monitors a set of tags without...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Optimize Storage Placement in Sensor Networks

    Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. Storage nodes are introduced in this paper to store the data collected from the sensors in their proximities. The storage nodes alleviate the heavy load...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Semantic MPEG Query Format Validation and Processing

    The retrieval of multimedia content has experienced a tremendous boost in the research and industry sectors during the last couple of years. Due to the intensive work in this area, an unmanageable diversity of approaches and retrieval systems in the image,1 video,2 and audio3 domains has emerged. In addition, computer...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    GPU Computing

    The Graphics Processing Unit (GPU) has become an integral part of today's mainstream computing systems. Over the past six years, there has been a marked increase in the performance and capabilities of GPUs. The modern GPU is not only a powerful graphics engine but also a highly parallel programmable processor...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Synthesis Algorithm for Application-Specific Homogeneous Processor Networks

    The application-specific multiprocessor system-on-a chip is a promising design alternative because of its high degree of flexibility, short development time, and potentially high performance attributed to application-specific optimizations. However, designing an optimal application-specific multiprocessor system is still challenging because there are a number of important metrics, such as throughput, latency,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Securing Structured Overlays Against Identity Attacks

    Structured overlay networks can greatly simplify data storage and management for a variety of distributed applications. Despite their attractive features, these overlays remain vulnerable to the Identity attack, where malicious nodes assume control of application components by intercepting and hijacking key-based routing requests. Attackers can assume arbitrary application roles such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    On the Design of Low-Power Cache Memories for Homogeneous Multi-Core Processors

    This paper investigates the impact of Level-1 Cache (CL1) parameters, Level-2 Cache (CL2) parameters, and cache organizations on the power consumption and performance of multi-core systems. The authors simulate two 4-core architectures - both with private CL1s, but one with shared CL2 and the other one with private CL2s. Simulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Investigating the Impact of Multimedia Applications on Multicore Cache Memory Subsystems

    Multicore cache memory subsystems are gaining increasing importance in designing multimedia systems to support real-time applications. Future multimedia systems are expected to have several hundred, if not several thousand or more, processing cores to improve performance/power ratio. Multilevel caches in a multicore architecture require huge amount of power and may...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks

    Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Opportunistic Routing in Multi-Radio Multi-Channel Multi-Hop Wireless Networks

    Two major factors that limit the throughput in multi-hop wireless networks are the co-channel interference and unreliability of wireless transmissions. Multi-radio multi-channel technology and Opportunistic Routing (OR) have shown their promise to significantly improve the network capacity by combating these two limits. It raises an interesting problem on the tradeoff...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Bio-Inspired Node Localization in Wireless Sensor Networks

    Many applications of Wireless Sensor Networks (WSNs) require location information of the randomly deployed nodes. A common solution to the localization problem is to deploy a few special beacon nodes having location awareness, which help the ordinary nodes to localize. In this approach, non-beacon nodes estimate their locations using noisy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Bio-Inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes

    Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a Wireless Sensor Network (WSN). This paper considers real-time autonomous deployment of sensor nodes from an Unmanned Aerial Vehicle (UAV). Such a deployment has importance, particularly in ad hoc WSNs, for emergency applications, such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Using Sensor Inputs to Affect Virtual and Real Environments

    Cross-reality (also known as x-reality) is an informational or media exchange between real and virtual-world systems. Specifically, x-reality affects worlds both real and virtual to the point that its platforms have a meaningful and discernable effect upon that particular world. Current x-reality projects from different fields point to an unprecedented...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Circuit Design Advances for Wireless Sensing Applications

    Miniature wireless sensors with long lifetimes enable new applications for medical diagnosis, infrastructure monitoring, military surveillance, and environmental sensing among many other applications in a growing field. Sensor miniaturization leads to decreased on-sensor energy capacity, and lifetime requirements further constrain the sensor's power budget. To enable millimeter-scale wireless sensors with...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Energy-Efficient Subthreshold Processor Design

    Subthreshold circuits have drawn a strong interest in recent ultralow power research. In this paper, the authors present a highly efficient subthreshold microprocessor targeting sensor application. It is optimized across different design stages including ISA definition, microarchitecture evaluation and circuit and implementation optimization. The investigation concludes that microarchitectural decisions in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks

    Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness and QoS constraints, the authors use opportunistic scheduling to efficiently utilize the available spectrum. Opportunistic scheduling algorithms rely on the collaboration among all mobile users to achieve their...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Evaluating Dynamic Software Update Safety Using Efficient Systematic Testing

    Dynamic Software Updating (DSU) systems, which allow programs to be patched on the fly, often employ automatic safety checks to avoid applying a patch that may lead to incorrect behavior. This paper presents what the authors believe is the first significant empirical evaluation of two DSU safety checks: Activeness Safety...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Towards Internet-Scale Multi-View Stereo

    This paper introduces an approach for enabling existing multi-view stereo methods to operate on extremely large unstructured photo collections. The main idea is to decompose the collection into a set of overlapping sets of photos that can be processed in parallel, and to merge the resulting reconstructions. This overlapping clustering...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    High-Performance Routing at the Nanometer Scale

    Despite being one of the first areas of EDA to be automated in the 1960s, VLSI routing remains an area of active research and development as evidenced by a growing body of literature recent collaboration between Cadence and IBM on routing technology, as well as the ISPD '07 Global Routing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Nonuniform Codes for Correcting Asymmetric Errors in Data Storage

    Codes that correct asymmetric errors have important applications in storage systems, including flash memories and phase-change memories. The construction of asymmetric error correcting codes is a topic that was studied extensively, however, the existing approach for code construction is similar to the approach taken in the construction of symmetric error...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Distributed Network Formation for N-Way Broadcast Applications

    In an n-way broadcast application, each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective data files. BitTorrent-like swarming protocols are ideal choices for handling such massive data volume transfers. The original BitTorrent targets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Mobile Supercomputers for the Next-Generation Cell Phone

    Mobile devices have proliferated at a spectacular rate, with more than 3.3 billion active cell phones in the world. Soon, improvements to today's smart phones, such as high-bandwidth internet access, high-definition video processing, and interactive video conferencing will be commonplace. The International Telecommunications Union has proposed Fourth-Generation (4G) wireless technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Low-Complexity Codes for Random and Clustered High-Order Failures in Storage Arrays

    RC (Random/Clustered) codes are a new efficient array-code family for recovering from 4-erasures. RC codes correct most 4-erasures, and essentially all 4-erasures that are clustered. Clustered erasures are introduced as a new erasure model for storage arrays. This model draws its motivation from correlated device failures, that are caused by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Optical Cross-Connect Based on the Spherical Fourier Cell

    A free-space optical cross connect is proposed here that is highly compact and uses digital MicroElectroMechanical Systems (MEMS) tip-style micromirror arrays. Based on the Fourier cell, previously described for true time delays, the cross-connect can be strictly non-blocking, or can be of blocking or reconfigurably blocking designs to reduce the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    On Multihop Distances in Wireless Sensor Networks With Random Node Locations

    Location and intersensor distance estimations are important functions for the operation of wireless sensor networks, especially when protocols can benefit from the distance information prior to network deployment. The maximum multihop distance that can be covered in a given number of hops in a sensor network is one such parameter...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Data Sharing Options for Scientific Workflows on Amazon EC2

    Efficient data management is a key component in achieving good performance for scientific workflows in distributed environments. Workflow applications typically communicate data between tasks using files. When tasks are distributed, these files are either transferred from one computational node to another, or accessed through a shared storage system. In grids...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Ethics in Security Vulnerability Research

    Debate has arisen in the scholarly community, as well as among policymakers and business entities, regarding the role of vulnerability researchers and security practitioners as sentinels of information security adequacy. The exact definition of vulnerability research and who counts as a "Vulnerability Researcher" is a subject of debate in the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Voice-Over-IP Security

    Consumers and enterprises alike are rapidly adopting Voice-Over-IP (VoIP) technologies, which offer higher flexibility and more features than traditional telephony infrastructures. They can also potentially lower costs through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent high complexity in terms of architecture, protocols,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Multi-Round Sensor Deployment for Guaranteed Barrier Coverage

    Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveillance. To reduce the number of sensors needed to provide guaranteed barrier coverage, the authors propose multi-round sensor deployment which splits sensor deployment into multiple rounds and can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Increasing the Information Density of Storage Systems Using the Precision-Resolution Paradigm

    The (d, k) RLL system is perhaps the most commonly used constraint, appearing in various contexts and applications, including (but not restricted to) magnetic and optical storage, holographic storage, and wireless and fiber-optic communication. It is however easy to forget that RLL coding is but one possible solution to a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    A Low-Power DSP for Wireless Communications

    This paper proposes a low-power high-throughput Digital Signal Processor (DSP) for baseband processing in wireless terminals. It builds on the earlier architecture - Signal processing On Demand Architecture (SODA) - which is a four-processor, 32-lane SIMD machine that was optimized for WCDMA 2 Mbps and IEEE 802.11a. SODA has several...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Challenges and Opportunities for Extremely Energy-Efficient Processors

    Here, the author make the case for improving the energy efficiency of processors suitable for data centers by operating the cores and caches at dramatically lower voltages - that is, at near threshold. Apart from dramatically reducing core and cache power, lowering core power has a multiplier effect that simplifies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Prediction of Optimal Parallelism Level in Wide Area Data Transfers

    Wide area data transfers may be a major bottleneck for the end-to-end performance of distributed applications. A practical way of increasing the wide area throughput at the application layer is using multiple parallel streams. Although increased number of parallel streams may yield much better performance than using a single stream,...

    Provided By Institute of Electrical and Electronics Engineers