Institute of Electrical and Electronics Engineers

Displaying 321-360 of 6715 results

  • White Papers // Nov 2012

    Incremental Relaying Transmissions with Relay Selection in Cognitive Radio Networks

    In this paper, the authors investigate and evaluate the performance of incremental relaying and relay selection, when used in the context of cognitive radio networks. Assuming that a number of cognitive radio relay nodes N (N-2) are co-located with simultaneous primary and secondary transmissions, the "Best" relays are chosen to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Secure MISO Cognitive Radio System with Perfect and Imperfect CSI

    In cognitive Radio (CR) systems, harmful interference from the secondary system degrades the data rate of the primary system. However, this interference may be beneficial to the primary system in terms of the secrecy rate, when unauthorized users eavesdrop on the primary link. This paper explores Multiple-Input Single-Output (MISO) CR...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On the User Scheduling in Cognitive Radio MIMO Networks

    The cognitive radio technology allows the design of dynamic spectrum sharing techniques where unlicensed secondary users can use frequency bands owned by license primary holders. Thus, this emerging technology is regarded as the ideal candidate that can enhance the efficiency of spectrum usage for the next generation of wireless communication...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Performance of Precoding Assisted Dual-Polarized Multi-Cell MIMO Downlink Communications

    Conventional uni-polarized Multiple Input Multiple Output (MIMO) antenna systems offer the advantages of higher data rate and higher reliability through the use of spatial multiplexing and space-time coding, respectively. However, the cost and space constraints have led to the use of dual-polarized MIMO antenna systems where two spatially separated uni-polarized...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Cross-Layer Dynamic Rate Adaptations for Green Cognitive Radio Networks

    The authors investigate cross-layer rate adaptation techniques for a Secondary User (SU) equipped with a finite buffer in green Cognitive Radio networks. They assume that the activity statistics of the licensed Primary Users (PUs) channels are independent and identically distributed, and a SU detects their states using a spectrum sensing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On The Reduction of Power Loss Caused by Imperfect Spectrum Sensing in OFDMA-Based Cognitive Radio Access

    Cognitive Radio provides a promising solution for the spectrum scarcity in wireless systems. The main stage of a successful cognitive transmission is the spectrum sensing stage, where the spectrum is sensed to detect and avoid interfering with licensed users. Unfortunately, regardless of the type of the spectrum sensing technique employed,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    A Broadband Embedded Computing System for MapReduce Utilizing Hadoop

    An expanding wealth of ubiquitous, heterogeneous, and interconnected embedded devices is behind most of the exponential growth of the "Big Data" phenomenon. Meanwhile, the same embedded devices continue to improve in terms of computational capabilities, thus closing the gap with more traditional computers. Motivated by these trends, the authors developed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Scalia: An Adaptive Scheme for Efficient Multi-Cloud Storage

    A growing amount of data is produced daily resulting in a growing demand for storage solutions. While cloud storage providers offer a virtually infinite storage capacity, data owners seek geographical and provider diversity in data placement, in order to avoid vendor lock-in and to increase availability and durability. Moreover, depending...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Usage Behavior of a Large-Scale Scientific Archive

    Archival storage systems for scientific data have been growing in both size and relevance over the past two decades, yet researchers and system designers alike must rely on limited and obsolete knowledge to guide archival management and design. To address this issue, the authors analyzed three years of file-level activities...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    Adaptive Relaying Method Selection for Multi-Rate Wireless Networks with Network Coding

    To maximize the throughput of multi-rate wireless networks, in this paper, the authors propose a scheme to adaptively select the relaying method among Analog Network Coding (ANC), Conventional Network Coding (CNC), no relaying (i.e. direct transmission without relaying), and plain routing. They first discuss the achievable data rates with different...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    LAT Indoor MIMO-VLC

    Visible Light Communications (VLC) is an innovative technology that uses the visible spectrum for high-speed data communications. In this paper the authors investigate the use of MIMO in the design of luminaires supporting VLC and, specifically, in enabling localization and high data rate services. Localization and transmission appear as two...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    Metameric Modulation for Diffuse Visible Light Communications with Constant Ambient Lighting

    Advances in solid-state lighting are renewing interest in the adoption of the visible spectrum for optical wireless communications. Under the luminaire-as-transmitter model, wireless communication is achieved by modulating LED(s) that must simultaneously meet the illumination mission. Illumination requirements include maintaining energy efficiency, constant color and intensity control whereas communications requirements...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    Optimal Linear Transceiver Designs for Cognitive Two-Way Relay Networks

    This paper studies a cooperative cognitive radio network where two Primary Users (PUs) exchange information with the help of a Secondary User (SU) that is equipped with multiple antennas and in return, the SU superimposes its own messages along with the primary transmission. The fundamental problem in the considered network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    System of Systems to Provide Quality of Service Monitoring, Management and Response in Cloud Computing Environments

    As military, academic, and commercial computing systems evolve from autonomous entities that deliver computing products into network centric enterprise systems that deliver computing as a service, opportunities emerge to consolidate computing resources, software and information through cloud computing. Along with these opportunities come challenges, especially to service providers and operations...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2012

    From Mobiles to Clouds: Developing Energy-Aware Offloading Strategies for Workflows

    Cloud computing and mobile computing is two of the most influential technologies that look set to change the face of computing in the coming years. Combination of the two provides the user with an unprecedented opportunity to provide highly portable and yet content-rich and computation-intensive services to the end user....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Delay-Based Congestion Control for Multipath TCP

    With the aid of multipath transport protocols, a multihomed host can shift some of its traffic from more congested paths to less congested ones, thus compensating for lost bandwidth on some paths by moderately increasing transmission rates on other ones. However, existing multipath proposals achieve only coarse-grained load balancing due...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Rake: Semantics Assisted Network-Based Tracing Framework

    The ability to trace request execution paths is critical for diagnosing performance faults in large-scale distributed systems. Previous black-box and white-box approaches are either inaccurate or invasive. The authors present a novel semantics-assisted gray-box tracing approach, called Rake, which can accurately trace individual request by observing network traffic. Rake infers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Nanoelectronic Solutions for Hardware Security

    Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high energy and performance overhead. Further, emerging side channel and physical attacks can compromise classical security solutions. Hardware based security solutions overcome...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    From Business Process Modeling to Data Model: A Systematic Approach

    Business process modeling and management approaches are increasingly used and disclosed between organizations as a means of optimizing and streamlining the business activities. Among the various existing modeling languages, the authors stress the Business Process Model and Notation (BPMN), currently in version 2.0. BPMN is a widespread OMG standard that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    SecEPM: A Security Engineering Process Model for Electronic Business Processes

    Business Process Management (BPM) and accompanying systems allow organizations to react faster both to environmental and market changes. Therefore, BPM is widely applied in industry. Although organizations depend on the secure enactment of electronic business processes, existing BPM languages and techniques provide only little support for security. Several approaches have...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    A Geographical Self-Organizing Approach for Vehicular Networks

    Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Compressed Sensing of EEG for Wireless Telemonitoring With Low Energy Consumption and Inexpensive Hardware

    Telemonitoring of ElectroEncephaloGram (EEG) through wireless body-area networks is an evolving direction in personalized medicine. Among various constraints in designing such a system, three important constraints are energy consumption, data compression, and device cost. Conventional data compression methodologies, although effective in data compression, consumes significant energy and cannot reduce device...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Coupling Loss and Delay Differentiation to Enhance TCP Performance within Wireless Multi-hop Ad-hoc Networks

    Most existing TCP variants cannot distinguish between different packet loss causes within MANETs. TCP was, mainly, developed to deal with network congestion errors. While within MANETs, there are packet loss causes other than congestion. Studying the behavior of TCP in front of such losses, the authors notice that TCP doesn't...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2012

    Estimating Information-Theoretical NAND Flash Memory Storage Capacity and Its Implication to Memory System Design Space Exploration

    Today and future NAND flash memory will heavily rely on system-level fault-tolerance techniques such as Error Correction Code (ECC) to ensure the overall system storage integrity. Since, ECC demands the storage of coding redundancy and hence degrades effective cell storage efficiency; it is highly desirable to use more powerful coding...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    A Solution Framework to Provide Management Services for Wireless Communications in the Digital Home

    The future Digital Home (DH) is envisioned as a place where a plethora of diverse personal and machine-to-machine communications will coexist to support different applications in areas such as information and entertainment, home automation, home health care and home security and management. Wireless technologies are usually the preferred solution to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Slew-Aware Buffer Insertion for Through-Silicon-Via-Based 3D ICs

    For high performance 3D ICs, it is crucial to perform thorough timing optimization, especially when the 3D nets are on timing critical paths. Large parasitic capacitances of through-silicon vias in 3D ICs cause signal slew and delay to increase. The authors propose a buffer insertion algorithm that further reduces delay...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Process Compensated CMOS Temperature Sensor for Microprocessor Application

    With microprocessors scaling to higher performance and faster speed, heat dissipation has become a growing concern. Excessive heat degrades performance and increases power consumption of the entire system. This paper presents the design and implementation of a process compensated CMOS temperature sensor that does not require any BJTs. CTAT and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Adaptive Bit Allocation in Rateless Coded MISO Downlink System with Limited Feedback

    Rateless coding is a new type of feed-forward incremental redundancy channel coding technique which can be incorporated with MIMO technology to exploit both the diversity and coding gain with possibly reduced channel feedback. In this paper, the benefits of limited feedback beamforming and rateless coding are investigated jointly in a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Dynamic Sensors Selection for Overlapped Multiple-Target Tracking Using Eagerness

    Efficient target tracking applications use active sensor nodes collaboratively to track multiple moving targets by balancing the trade-off between the quality of tracking and network's lifetime. In this paper, the authors propose a Low-Energy Dynamic Sensor selection (LEDS) scheme to track multiple targets by estimating energy consumption of sensors and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Low-Latency Reweighted Belief Propagation Decoding for LDPC Codes

    In this paper, the authors propose a novel message passing algorithm which exploits the existence of short cycles to obtain performance gains by reweighting the factor graph. The proposed decoding algorithm is called Variable Factor Appearance Probability Belief Propagation (VFAP-BP) algorithm and is suitable for wireless communications applications with low-latency...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    Variation-Aware Clock Network Design Methodology for Ultralow Voltage (ULV) Circuits

    In this paper, the authors present a design methodology for robust and low-energy clock networks for Ultra-Low Voltage (ULV) circuits. They show that both clock slew and skew play important roles in achieving high maximum operating Frequency (Fmax) and low clock energy in ULV circuits. In addition, clock networks in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2012

    TSV Stress-Aware Full-Chip Mechanical Reliability Analysis and Optimization for 3-D IC

    In this paper, the authors propose an efficient and accurate full-chip thermomechanical stress and reliability analysis tool and design optimization methodology to alleviate mechanical reliability issues in 3-D Integrated Circuits (ICs). First, they analyze detailed thermomechanical stress induced by through-silicon-vias in conjunction with various associated structures such as landing pad...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    On PMU Location Selection for Line Outage Detection in Wide-Area Transmission Networks

    The optimal PMU locations to collect voltage phase angle measurements for detecting line outages in wide-area transmission networks are investigated. The problem is established as one of maximizing the minimum distance among the voltage phase angle signatures of the outages, which can be equivalently formulated as an integer programming problem....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    An Adaptive Redundancy Scheme for TCP with Network Coding

    To address the inability of the standard TCP protocol to distinguish between congestive losses and random packet losses produced by the noisy channel, in this paper, the authors propose an adaptive algorithm to dynamically adjust the redundancy factor R of the TPC/NC protocol proposed by Sundararajan et al. by adding...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    Joint Filter Design of Alternate MIMO AF Relaying Networks with Interference Alignment

    Wireless relaying systems have been recently considered an attractive option because of their potentials to improve the system throughput, enhance the cell-edge performance, extend cell coverage, and reduce the overall system deployment cost. As such they have been considered for the standardization of IEEE 802.16j, 16m and 3GPP LTE-Advanced. Most...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    Security in the Cloud: A Stake Holder's Perspective

    The cloud computing is a paradigm involving many disparate stake holders. Any system built upon this paradigm and a business run on such system architecture would have similarly disparate scope of access, activities and responsibilities for the stake holders. Depending on the scope of the activities and responsibilities, a stakeholder...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    A Fittingness Factor-based Spectrum Management Framework for Cognitive Radio Networks

    In order to increase CRs (Cognitive Radios) operation efficiency, there has been an increasing interest in strengthening awareness level about spectrum utilization. In this respect, this paper proposes to exploit the fittingness factor concept to capture the suitability of spectral resources exhibiting time-varying characteristics to support a set of heterogeneous...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    Topological Transformation Approaches to TCAM-Based Packet Classification

    Several range re-encoding schemes have been proposed to mitigate the effect of range expansion and the limitations of small capacity, large power consumption, and high heat generation of Ternary Content Addressable Memory (TCAM)-based packet classification systems. However, they all disregard the semantics of classifiers and therefore miss significant opportunities for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    Transition Delay Fault Testing of 3D ICs with IR-Drop Study

    In order to ensure the correctness of 3D ICs, they need to be tested both before and after their individual dies are bonded. All previous paper in the area of 3D IC testing considers only stuck-at fault testing. However, 3D ICs also need to be tested for delay defects. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2012

    Cognitive Control Channels: from Concept to Identification of Implementation Options

    Recent effort related to cognitive radio systems has lead to an in-depth analysis of context information management and exploitation based on a cognitive control channel for enhancement of management needed for, say, suitable link selection in a heterogeneous radio framework, dynamic radio resource management, and distributed sensing. Concerning the actual...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    An Effective Clustering Approach to Web Query Log Anonymization

    Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries. These privacy concerns go far beyond removing explicitly identifying information such as name and address, since non-identifying personal data can be combined with publicly available information to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Multiple-Access Network Information-Flow and Correction Codes

    This work considers the multiple-access multicast error-correction scenario over a packetized network with z malicious edge adversaries. The network has min-cut m and packets of length ??, and each sink demands all information from the set of sources S. The capacity region is characterized for both a "Side-channel" model (where...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Perfect Secrecy Using Compressed Sensing

    In the recent years, many researchers have used the theory of Compressed Sensing or Compressive Sampling (CS) for their field of study. Candes and his colleagues in and Donoho in proposed this theory and it has been served in some applications such as image processing, radar, signal detection and other...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Progressive Decoding for Data Availability and Reliability in Distributed Networked Storage

    To harness the ever growing capacity and decreasing cost of storage, providing an abstraction of dependable storage in the presence of crash-stop and Byzantine failures is compulsory. The authors propose a decentralized Reed Solomon coding mechanism with minimum communication overhead. Using a progressive data retrieval scheme, a data collector contacts...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    A Unified Perspective on Parity-And Syndrome-Based Binary Data Compression Using Off-the-Shelf Turbo Codecs

    The authors consider the problem of compressing memoryless binary data with or without side information at the decoder. They review the parity- and the syndrome-based approaches and discuss their theoretical limits, assuming that there exists a virtual binary symmetric channel between the source and the side information, and that the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Distributed Storage Codes With Repair-by-Transfer and Non-Achievability of Interior Points on the Storage-Bandwidth Tradeoff

    Regenerating codes are a class of recently developed codes for distributed storage that, like Reed-Solomon codes, permit data recovery from any subset of k nodes within the n-node network. However, regenerating codes possess in addition, the ability to repair a failed node by connecting to an arbitrary subset of d...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Multipath Parameter Estimation From OFDM Signals in Mobile Channels

    The authors study multipath parameter estimation from orthogonal frequency division multiplex signals transmitted over doubly dispersive mobile radio channels. They are interested in cases where the transmission is long enough to suffer time selectivity, but short enough such that the time variation can be accurately modeled as depending only on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Approximately Optimal Wireless Broadcasting

    The authors study a wireless broadcast network, where a single source reliably communicates independent messages to multiple destinations, with the aid of relays and cooperation between destinations. The wireless nature of the medium is captured by the broadcast nature of transmissions as well as the superposition of all transmits signals...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Projector Placement Planning for High Quality Visualizations on Real-World Colored Objects

    Many visualization applications benefit from displaying content on real-world objects rather than on a traditional display (e.g., a monitor). This type of visualization display is achieved by projecting precisely controlled illumination from multiple projectors onto the real-world colored objects. For such a task, the placement of the projectors is critical...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Modeling Repetitive Motions Using Structured Light

    Obtaining models of dynamic 3D objects is an important part of content generation for computer graphics. Numerous methods have been extended from static scenarios to model dynamic scenes. If the states or poses of the dynamic object repeat often during a sequence (but not necessarily periodically), the authors call such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Power-Controlled Feedback and Training for Two-Way MIMO Channels

    Most communication systems use some form of feedback, often related to channel state information. The common models used in analyses either assume perfect channel state information at the receiver and/or noiseless state feedback links. However, in practical systems, neither is the channel estimate known perfectly at the receiver and nor...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    On the Energy Efficiency of LT Codes in Proactive Wireless Sensor Networks

    This paper presents an in-depth analysis on the energy efficiency of Luby Transform (LT) codes with Frequency Shift Keying (FSK) modulation in a Wireless Sensor Network (WSN) over Rayleigh fading channels with path-loss. The authors describe a proactive system model according to a flexible duty-cycling mechanism utilized in practical sensor...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Effects of the Generation Size and Overlap on Throughput and Complexity in Randomized Linear Network Coding

    To reduce computational complexity and delay in randomized network coded content distribution, and for some other practical reasons, coding is not performed simultaneously over all content blocks, but over much smaller, possibly overlapping subsets of these blocks, known as generations. A penalty of this strategy is throughput reduction. To analyze...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Technology Choices and Pricing Policies in Public and Private Wireless Networks

    This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses questions that do not seem to have been studied before in the engineering literature on wireless networks:...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    This paper provides a comprehensive review of the domain of physical layer security for wireless communications. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers. This can be achieved primarily in two ways: Without the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    XtremeData DbX: An FPGA-Based Data Warehouse Appliance

    Green computing - low power, "Eco-friendly" - is a hot topic these days and will influence server design for the coming years. Green computing's importance was firmly recognized by the research community with the first semiannual publication of the Green500 List in November 2007. The Green500 identifies the most energy-efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    On the Saddle-Point Solution and the Large-Coalition Behavior of Fingerprinting Games

    The authors study a fingerprinting game in which the number of colluders and the collusion channel are unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Construction of Network Error Correction Codes in Packet Networks

    Recently, Network Error Correction coding (NEC) has been studied extensively. Several bounds in classical coding theory have been extended to network error correction coding, especially the Singleton bound. In this paper, following the research line using the extended global encoding kernels proposed in, the refined Singleton bound of NEC can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Enabling Differentiated Services Using Generalized Power Control Model in Optical Networks

    This paper considers a generalized framework to study OSNR optimization-based end-to-end link level power control problems in optical networks. The authors combine favorable features of game-theoretical approach and central cost approach to allow different service groups within the network. They develop solutions concepts for both cases of empty and nonempty...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Optimal Energy Allocation for Wireless Communications With Energy Harvesting Constraints

    The authors consider the use of energy harvesters, in place of conventional batteries with fixed energy storage, for point-to-point wireless communications. In addition to the challenge of transmitting in a channel with time selective fading, energy harvesters provide a perpetual but unreliable energy source. In this paper, they consider the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Detect Related Bugs From Source Code Using Bug Information

    Open source projects often maintain open bug repositories during development and maintenance, and the reporters often point out straightly or implicitly the reasons why bugs occur when they submit them. The comments about a bug are very valuable for developers to locate and fix the bug. Meanwhile, it is very...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks

    This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, the authors are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. They consider random networks where the legitimate nodes and the eavesdroppers...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Fast and Power Efficient Sensor Arbitration: Physical Layer Collision Recovery of Passive

    This work concerns physical layer collision recovery for cheap sensors with allowed variations in frequency and delay of their communications. The work is presented as a generic, communication theoretic framework and demonstrated using UHF RFID tag technology. Previous work in this area has not provided recovery for more than two...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Logic Soft Errors in a Parallel CISC Decoder

    The instruction decoder is one of the most complex and least regular logic structures in a modern processor that attempts to process multiple variable-length CISC instructions per cycle. This structure consumes a significant amount of area and is heavily utilized, making it vulnerable to logic soft errors. This paper analyzes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Asymptotic Spectral Efficiency of the Uplink in Spatially Distributed Wireless Networks With Multi-Antenna Base Stations

    The spectral efficiency of the uplink (with appropriate normalization) in interference-limited, spatially-distributed wireless networks with hexagonal cells and linear Minimum-Mean-Square-Error estimation is found to converge to an asymptotic limit as the numbers of base-station antennas N and wireless nodes go to infinity. A simple approximation for the mean spectral efficiency...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Generating Functional Analysis for Iterative CDMA Multiuser Detectors

    The authors investigate the detection dynamics of a soft Parallel Interference Canceller (soft-PIC), which includes a hard-PIC as a special case, for CDMA multiuser detection, applied to a randomly spread, fully synchronous base-band uncoded CDMA channel model with Additive White Gaussian Noise (AWGN) under perfect power control in the large-system...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Pricing and Investments in Internet Security A Cyber-Insurance Perspective

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Schema Evolution for Persistent Object-Oriented Software: Model, Empirical Study, and Automated Support

    With the wide support for object serialization in object-oriented programming languages, persistent objects have become common place and most large object-oriented software systems rely on extensive amounts of persistent data. Such systems also evolve over time. Retrieving previously persisted objects from classes whose schema has changed is however difficult, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    Mean Interference in Hard-Core Wireless Networks

    Matern hard core processes of types I and II are the point processes of choice to model concurrent transmitters in CSMA networks. The authors determine the mean interference observed at a node of the process and compare it with the mean interference in a Poisson point process of the same...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2011

    GLRT-Based Spectrum Sensing With Blindly Learned Feature Under Rank-1 Assumption

    Prior knowledge can improve the performance of spectrum sensing. Instead of using universal features as prior knowledge, the authors propose to blindly learn the localized feature at the secondary user. Motivated by pattern recognition in machine learning, they define signal feature as the leading eigenvector of the signal's sample covariance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Adaptive Algorithms for Coverage Control and Space Partitioning in Mobile Robotic Networks

    The authors consider deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Three classes of problems are discussed in detail: coverage control problems, spatial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Data-Driven Grasping With Partial Sensor Data

    To grasp a novel object, the authors can index it into a database of known 3D models and use precomputed grasp data for those models to suggest a new grasp. They refer to this idea as data-driven grasping, and they have previously introduced the Columbia Grasp Database for this purpose....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Performance Assessment of MIMO-BICM Demodulators Based on System Capacity

    The authors provide a comprehensive performance comparison of soft-output and hard-output demodulators in the context of non-iterative Multiple-Input Multiple-Output Bit-Interleaved Coded Modulation (MIMOBICM). Coded Bit Error Rate (BER), widely used in literature for demodulator comparison, has the drawback of depending strongly on the error correcting code being used. This motivates...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Compressive Estimation of Doubly Selective Channels in Multicarrier Systems: Leakage Effects and Sparsity-Enhancing Processing

    The authors consider the application of Compressed Sensing (CS) to the estimation of doubly selective channels within pulse-shaping multicarrier systems (which include OFDM systems as a special case). By exploiting sparsity in the delay-Doppler domain, CS-based channel estimation allows for an increase in spectral efficiency through a reduction of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Construction of Codes for Wiretap Channel and Secret Key Agreement From Correlated Source Outputs by Using Sparse Matrices

    The aim of this paper is to prove the coding theorems for the wiretap channel introduced in and secret key agreement problem introduced in. The proof of theorems is based on the notion hash property for an ensemble of functions introduced in. This notion provides a sufficient condition for the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Refined Coding Bounds and Code Constructions for Coherent Network Error Correction

    Coherent network error correction is the error-control problem in network coding with the knowledge of the network codes at the source and sink nodes. With respect to a given set of local encoding kernels defining a linear network code, the authors obtain refined versions of the Hamming bound, the Singleton...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    On the Security of PAS (Predicate-Based Authentication Service)

    Recently a new human authentication scheme called PAS (Predicate-based Authentication Service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    A Deterministic Equivalent for the Analysis of Correlated MIMO Multiple Access Channels

    In this paper, novel deterministic equivalents for the Stieltjes transform and the Shannon transform of a class of large dimensional random matrices are provided. These results are used to characterise the ergodic rate region of multiple antenna multiple access channels, when each point-to-point propagation channel is modeled according to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Adaptive Workload Prediction of Grid Performance in Confidence Windows

    Predicting grid performance is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on a grid is even harder to predict due to heavy load fluctuations. In this paper, the authors use Kalman filter to minimize the prediction errors. The authors apply Savitzky-Golay...

    Provided By Institute of Electrical and Electronics Engineers