Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7098 results

  • White Papers // May 2015

    SRAM for Error-Tolerant Applications with Dynamic Energy-Quality Management in 28 nm CMOS

    In this paper, a voltage-scaled SRAM for both error-free and error-tolerant applications is presented that dynamically manages the energy/quality trade-off based on application need. Two variation-resilient techniques, write assist and error correcting code, are selectively applied to bit positions having larger impact on the overall quality, while jointly performing voltage...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2015

    Digitally Controlled Leakage-Based Oscillator and Fast Relocking MDLL for Ultra Low Power Sensor Platform

    In this paper, the authors present an all-digital Multiplying Delay-Locked Loop (MDLL) with a leakage-based oscillator for ultra-low-power sensor platforms. The proposed digital control of channel leakage current achieved ultra-low power consumption in frequency generation with a fine resolution. The leakage based oscillator was modeled as an RC-based oscillator, analyzed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    IoT Design Space Challenges: Circuits and Systems

    The Internet of Things (IoTs) is a rapidly emerging application space, poised to become the largest electronics market for the semiconductor industry. IoT devices are focused on sensing and actuating of the authors' physical environment and have a nearly unlimited breadth of uses. In this paper, they explore the IoT...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    Correctness Analysis and Power Optimization for Probabilistic Boolean Circuits

    Traditionally, the authors expect that circuit designs can be executed without errors. However, for error resilient applications such as image processing, 100% correctness is not necessary. By pursuing less than 100% correctness, power consumption can be significantly reduced. Recently, probabilistic CMOS and Probabilistic Boolean Circuits (PBCs) have been proposed to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2015

    Wireless Sensor Network Virtualization: A Survey

    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoTs) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSNs' nodes are becoming more and more powerful, it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    Wireless Sensor Networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2014

    An Ultra-Low Power Fully Integrated Energy Harvester Based on Self-Oscillating Switched-Capacitor Voltage Doubler

    Recent advances in low power circuits have enabled mm-scale wireless systems for wireless sensor networks and implantable devices among other applications. Energy harvesting is an attractive way to power such systems due to the limited energy capacity of batteries at these form factors. However, the same size limitation restricts the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers

    Cloud providers are typically hierarchically organized into interconnected data centers, each with a collection of racks of servers organized into clusters. The communication cost between two servers is a function of their relative location in the cloud infrastructure. Cloud consumers submit allocation requests for virtual machines, of different types and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    A Fully-Integrated 71 nW CMOS Temperature Sensor for Low Power Wireless Sensor Nodes

    The authors propose a fully-integrated temperature sensor for battery-operated, ultra-low power microsystems. Sensor operation is based on temperature independent/dependent current sources that are used with oscillators and counters to generate a digital temperature code. A conventional approach to generate these currents is to drop a temperature sensitive voltage across a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    An 8 Bit 4 GS/s 120 mWCMOS ADC

    For a given resolution, the power consumption of Analog-to-Digital Converters (ADCs) rises linearly with the speed up to some point and then begins to ascend at an increasingly higher rate. A time-interleaved ADC employs four pipelined time-interleaved channels along with a new timing mismatch detection algorithm and a high-resolution variable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Achieving High-Performance On-Chip Networks with Shared-Buffer Routers

    On-chip routers typically have buffers dedicated to their input or output ports for temporarily storing packets in case contention occurs on output physical channels. Buffers, unfortunately, consume significant portions of router area and power budgets. While running a traffic trace, however, not all input ports of routers have incoming packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    An Energy Efficient Full-Frame Feature Extraction Accelerator with Shift-Latch FIFO in 28 nm CMOS

    In this paper, the authors present an energy efficient feature extraction accelerator design aimed at visual navigation. The hardware oriented algorithmic modifications such as a circular-shaped sampling region and unified description are proposed to minimize area and energy consumption while maintaining feature extraction quality. A matched-throughput accelerator employs fully-unrolled filters...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    Analysis of Metastability in Pipelined ADCs

    A critical issue in the design of high-speed ADCs relates to the errors that result from comparator meta-stability. Studied for flash architectures in the past, this phenomenon assumes new dimensions in pipelined converters, creating far more complex error mechanisms. This paper presents a comprehensive analysis of comparator meta-stability effects in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Quaternary Logic Lookup Table in Standard CMOS

    Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this paper, they propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Secure Browser Architecture Based on Hardware Virtualization

    Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation mechanism to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Low-Power High-Throughput LDPC Decoder Using Non-Refresh Embedded DRAM

    The majority of the power consumption of a high-throughput LDPC decoder is spent on memory. Unlike in a general-purpose processor, the memory access in an LDPC decoder is deterministic and the access window is short. The authors take advantage of the unique memory access characteristic to design a non-refresh eDRAM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    GPU-Based JPEG2000 Decoding Scheme for Digital Cinema

    For the digital cinema system specification released by digital cinema initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Energy-Saving Cloud Computing Platform Based on Micro-Embedded System

    Energy consumption and computing performance are two essential considerations when service providers establish new data centers. The energy-saving cloud computing platform proposed in this study as potential applications in internet network information centers because of its excellent energy efficiency when manage large datasets. Increased data nodes in distributed computing systems...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Balancing Scalability, Performance and Fault Tolerance for Structured Data (BSPF)

    Analytical business applications generate reports that give a trend predicting insight into the organization's future, estimating the financial graphs and risk factors. These applications work on huge amounts of data, which comprises of decades of market and company records and decision logs of an organization. Today, limit of big data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Study on VM-Based Terminal Mobility Management

    Recently, subscribers are using services utilizing various kinds of virtualization technology. The authors propose Virtual Machine (VM)-based terminal mobility management. The mechanism requires enhanced mobility control procedures and data transmission procedure comparing with the existing mobility management like Access Independent Mobile Service (AIMS). The procedures newly introduce location notification message...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Measurement Results of Frequency Offset in DVB-C2 Receiver

    In this paper, the authors show the measurement results of Frequency Offset (FO) estimation in Digital Video Broadcasting for Cable version 2 (DVB-C2) receiver which uses Orthogonal Frequency-Division Multiplexing (OFDM). Because FO causes Inter-Carrier Interference (ICI) in a multicarrier system, it should be estimated and compensated to improve the performance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Evaluating Team Performance Using Slack Based Data Envelopment Analysis

    In this paper, the authors devise a Data Envelopment Analysis (DEA) model to assess team performance. The DEA model in this paper uses Slack Based Measure (SBM), a method which deals directly with the input excesses and output shortfall. An explanatory example has been given to demonstrate the applicability of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Device Control Protocol Using Mobile Phone

    With rapid development of Smartphone make the authors to face in front of the boundary of the world of ubiquitous computing. The capabilities of Smartphone are raising the interest of the smart home and home network technologies. These have used Smartphone as a remote controller. However, the technologies of each...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Iterative Threshold for Anti-Jamming Algorithm and Its Implementation on FPGA

    Frequency-Domain Anti-Jamming (FDAJ) algorithms achieve prominent performance on interference suppression with simple calculations; and hence they are widely used in many applications. The interference suppression threshold plays a key role in the algorithm and affects system performance greatly. In this paper, the initial interference threshold is derived theoretically and then...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-Based PKI

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "Cloud computing" also increases severe security concerns. Security has remained...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Reconfigurable Architecture for Generic OFDM Modulator Based on FPGA

    OFDM is a special case of multi-carrier modulations, which is of great use in various wireless communications, such as DAB, DVB, HDTV, CMMB, TMMB and 802.11a. The OFDM frame structure is similar to each other. It consists of a number of OFDM symbols following the synchronizing signal with different cyclic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    PCE Implementation and Testing by Using Virtual Machines

    In this paper, the authors describe the way to implement and test a PCE on the virtualized environment. The PCE is a special computational entity that will corporate with similar entities to compute the best possible path through single or multiple domains. Generally, in real network, the testing and implementation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Verification of Reconfigurable Binary Decision Diagram-Based Single-Electron Transistor Arrays

    Recently, Single-Electron Transistors (SETs) have been attracting substantial attention and are considered candidate devices for future integrated circuits due to their ultra-low power consumption. To realize SETs, a binary decision diagram-based SET array is proposed as a suitable candidate for implementing Boolean circuits. Then, some works started developing computer-aided design...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2003

    Automating Keyphrase Extraction With Multi-Objective Genetic Algorithms

    This white paper proposes an automated key phrase extraction algorithm using a non dominated sorting multi-objective genetic algorithm. The "clumping" property of key phrases is used to judge the appropriateness of a phrase and is quantified by a condensation clustering measure proposed by Bookstein. The objective is to find the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2003

    Tumor Detection in the Bladder Wall With a Measurement of Abnormal Thickness in CT Scans

    Virtual cystoscopy is a developing technique for bladder cancer screening. In a conventional cystoscopy, an optical probe is inserted into the bladder and an expert reviews the appearance of the bladder wall. Physical limitations of the probe place restrictions on the examination of the bladder wall. In virtual cystoscopy, a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2003

    Characterizations of Metal - Diamond - Silicon Associations for Active Power Electronics Applications

    This paper presents different grades of CVD diamond substrates and the comparison between them, especially between the natural and other kind of CVD diamond. Dielectric strength investigation and surface conductivity with or without chemical treatment are presented, then the influence of the metal to diamond interface on the electronic properties...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2004

    Improved Watershed Transform for Medical Image Segmentation Using Prior Information

    The watershed transform has interesting properties that make it useful for many different image segmentation applications: it is simple and intuitive, can be parallelized, and always produces a complete division of the image. However, when applied to medical image analysis, it has important drawbacks. They present an improvement to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2000

    Zipper VDSL: A Solution for Robust Duplex Communication Over Telephone Lines

    This paper presents an overview of a digital duplex scheme called Zipper, intended for DMT-based VDSL systems. The Zipper multi-carrier duplex scheme represents a breakthrough toward digital implementation of frequency-division duplexing. A duplex scheme is a method to divide the capacity of a line between the upstream and downstream directions....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2006

    Performance Comparison of IP, MPLS and ATM Based Network Cores Using OPNET

    The core components of a network play vital role in its enhancement. For launching and providing Internet applications and services, vendors have come up with a variety of different technology based network cores and other components of Internet backbone. Among all the challenges for an efficient network core, traffic-routing is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2005

    Mobilizing Customer Relationship Management - A Journey From Strategy to System Design

    The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has recently been renewed interest in mobile business and mobile commerce. Now, however, business managers request detailed and thorough analyses prior to engaging in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    Dynamic Routing With Security Considerations

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, the paper will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Improving Depth Perception With Motion Parallax and Its Application in Teleconferencing

    Depth perception, or 3D perception, can add a lot to the feeling of immersiveness in many applications such as 3D TV, 3D teleconferencing, etc. Stereopsis and motion parallax are two of the most important cues for depth perception. Most of the 3D displays today rely on stereopsis to create 3D...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Empirical Study of Tolerating Denial-of-Service Attacks With the Fosel Architecture

    Filtering techniques are one of the main approaches to protect applications from Denial of Service Attacks (DoS). However filtering techniques suffer from two main challenges: the accuracy detection of DoS traffic and processing time. Fosel (Filtering with the help of an Overlay Security Layer) has been proposed to protect application...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    2D CAD Data Mining Based on Spatial Relation

    This paper proposes CAD data mining technique to obtain semantic elements without prior knowledge about plans being designed. The method consists of two steps. The first step is to extract frequent spatial relations between figure elements in CAD data as clues to the semantic elements. These relations are modeled as...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Dynamic SLA Template Adjustments Based on Service Property Monitoring

    Service Level Agreements (SLAs) are used to manifest guarantees about certain functional and non-functional aspects of service execution. Service providers are confronted with a hard problem when trying to estimate reasonable QoS levels and other default settings for SLA templates. The insufficient use of formal service behaviour descriptions, varying resource...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2008

    History of Wireless Local Area Networks (WLANs) in the Unlicensed Bands

    A brief history of the development of WLAN standards and products is presented in the context of explaining how unlicensed spectrum regulations by the Federal Communications Commission (FCC) have affected the industry. In general, the FCC's initiative to create an "Unlicensed commons" for various forms of wireless communication applications has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Creating Next Generation Cloud Computing Based Network Services and the Contributions of Social Cloud Operation Support System (OSS) to Society

    Emerging virtualization technologies are making ubiquitous access to on-demand computing, network and storage resources o deliver various applications over public Internet. This paper presents how the telecom Operation Support Systems(OSS) that provide Enterprise to Enterprsie (E2E) transactions, switching management, on-demand service management and scalability have evolved to provide next generation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    A Secure Agent Platform for Active RFID

    RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This paper introduces a platform that allows to combine both technologies and to run a software agent on an active RFID device and as a result gain increased...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Handover Strategy for Mobile Wireless LAN

    Wireless Local Area Network (WLAN) is becoming a new era of wireless networking technology to adapt the user with strong desire for new technology. The main issue is to integrate WLAN with WAN, handover management between the subnet of network should be resolve. Handover within link layer and network layer...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    A 0.35-?m CMOS Solar Energy Scavenger With Power Storage Management System

    This paper presents an integrated solar energy scavenger realized in a 0.35 ?m CMOS technology. The proposed system collects solar energy from the environment through integrated diodes, accumulates it and, delivers it to the load when it is enough to allow proper operation of the CMOS circuitry. The proposed system...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Effective Buffer and Storage Management in DTN Nodes

    Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, from deep space to wireless sensor networks, where TCP fails to operate, as it results in frequent timeouts and intermittent or no connectivity...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Digital Ecosystems in the Clouds: Towards Community Cloud Computing

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns of privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon, and Microsoft. Community Cloud Computing makes use of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures

    Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of software systems. Generally, software services are expected not only to satisfy functional requirements but also to be resistant to malicious attacks. Software attackability is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Incorporating Flexible, Configurable and Scalable Security to the Education Collaborative Environments

    This paper presents a service that provides security through the technology of Web Services. The use of web services to provide security in e-learning systems will complement the features of services developed in language and/or different architectures. Thus, the work is not limited to platforms in which the client (e-learning...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

    The lack of any centralized infrastructure in Mobile Ad hoc NETworks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Phishing Infrastructure Fluxes All the Way

    Fast flux aims to keep phishing and scam campaigns afloat by provisioning a fraudulent Web site's DNS records to make the site resolve to numerous, short-lived IP addresses. Although fast flux hurts take-down efforts, it's possible to detect and defend against it. It performed DNS lookups on each Web server...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    A Collision-Free MAC Scheme for Multimedia Wireless Mesh Backbone

    Wireless mesh networking is a promising wireless technology for future broadband Internet access. In this paper, a novel collision-free Medium Access Control (MAC) scheme supporting multimedia applications is proposed for wireless mesh backbone. The proposed scheme is distributed, simple, and scalable. Benefiting from the fixed locations of wireless routers, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Scalable Feedback Suppression Mechanism for Multicast Service in Wireless TDMA Network

    Hybrid ARQ is deployed in error prone wireless network to provide reliable unicast transmission with the positive or negative acknowledgement report. However, the feedback implosion is a challenging problem for multicast service, wherein multiple receivers send out feedback in a short period of interval. The traditional representative-based or timer-based feedback...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    A Scalable Feedback Suppression Mechanism for Multicast Service in Wireless TDMA Network

    Hybrid ARQ is deployed in error prone wireless network to provide reliable unicast transmission with the positive or negative acknowledgement report. However, the feedback implosion is a challenging problem for multicast service, wherein multiple receivers send out feedback in a short period of interval. The traditional representative-based or timer-based feedback...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    New Contention Resolution Schemes for WiMAX

    The use of Broadband Wireless Access (BWA) technology is increasing due to the use of Internet and multimedia applications with strict requirements of end - to - end delay and jitter, through wireless devices. The IEEE 802.16 standard, which defines the physical (PHY) and the Medium Access Control (MAC) layers,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    A Unified Parallel Radix-4 Turbo Decoder for Mobile WiMAX and 3GPP-LTE

    This paper describes the energy-efficient implementation of a high performance parallel radix-4 turbo decoder, which is designed to support multiple fourth-Generation (4G) wireless communication standards such as Mobile WiMAX and 3GPP-LTE. This paper proposes a new hardware architecture that can share hardware resources for the two standards. It mainly consists...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    The Use of Digital Manipulatives in K-12: Robotics, GPS/GIS and Programming

    Faculty from 4-H Youth Development, Biosystems Engineering, and Education have collaborated to develop and implement an innovative robotics and geospatial technologies program, delivered in an informal learning setting of 4-H clubs and afterschool programs. Aimed at middle school youth, the program uses robotics and Global Positioning System (GPS) receivers and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    An Application Dependent Medium Access Protocol for Active RFID Using Dynamic Tuning of the Back-Off Algorithm

    Active Radio Frequency Identification (A-RFID) is a technology where the tags (transponders) carry an on-board energy source for powering the radio, processor circuits, and sensors. Besides offering longer working distance between RFID-reader and tag than passive RFID, this also enables the tags to do sensor measurements, calculations and storage even...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    A Low-IF CMOS Simultaneous GPS Receiver Integrated in a Multimode Transceiver

    Since the FCC mandates the E911 (Enhanced 911) services, carriers using GPS chips to help determine a user's location need to upgrade all handsets in use to GPS-capable models. Meanwhile, the navigation features become much desirable in the personal communication devices such as the cellular phones. This requires the GPS...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    What Networking of Information Can Do for Cloud Computing

    Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Performance Analysis of IEEE 802.11n Under Different STBC Rates Using 64-QAM

    The main focus of current research and development for the next-generation Wireless Local Area Network (WLAN) communication systems is to enhance the link throughput and channel capacity. In this paper, the performance analysis of the ongoing next-generation WLAN standard, IEEE 802.11n high throughput WLAN PHY layer is presented. The design...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Link-Level Measurements of Outdoor 802.11g Links

    802.11 based outdoor community mesh networks have seen several deployments in the last few years. Prior link level studies focus mostly on 802.11b links, and a systematic and detailed link-level study of 802.11g is lacking. This paper presents a study of the link error rate as a function of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Joint Power Control and Link Scheduling in Wireless Networks for Throughput Optimization

    This paper concerns the problem of finding the minimum-length TDMA frame of a power-controlled wireless network subject to traffic demands and SINR (signal-to-interference-plus-noise ratio) constraints. The paper formulates the general joint link scheduling and power control problem as an Integer Linear Programming (ILP) problem. The linear relaxation of the ILP...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    A System Implementation of Pushing Advertisement to Handheld Devices Via Bluetooth

    Almost everyone today has his or her mobile phone and Bluetooth has already become a standard inclusion on most mobile phones, laptops and PDAs. Data transfer through Bluetooth among the handheld devices is common and popular. Bluetooth establishes links in a more convenient manner to facilitate sharing data between devices....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Laydown Yard Optimization Using RFID: A Cost and Time Perspective

    This project reports the use and applications of Radio Frequency Identification (RFID) technique in a laydown yard zone. Every construction site has a laydown yard with equipments and materials worth millions of dollars. The real-time exact tracking and location of these items saves money by avoiding duplicating the equipment and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    The MIMO Wireless Switch: Relaying Can Increase the Multiplexing Gain

    This paper considers an interference network composed of K half-duplex single-antenna pairs of users who wish to establish bi-directional communication with the aid of a Multi-Input-Multi-Output (MIMO) half-duplex relay node. This channel is referred to as the "MIMO Wireless Switch" since, for the sake of simplicity, the model assumes no...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Interval Hash Tree: An Efficient Index Structure for Searching Object Queries in Large Image Databases

    As image databases grow large in size, index structures for fast navigation become important. In particular, when the goal is to locate object queries in image databases under changes in pose, occlusions and spurious data, traditional index structures used in databases become unsuitable. This paper presents a novel index structure...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    P2P Content Distribution to Mobile Bluetooth Users

    Using handheld devices such as cellular phones and smart phones for personal entertainment has become commonplace in today's lifestyle. Virtually all of these devices are equipped with Bluetooth technology that can be used to distribute entertainment contents such as music and movie clips. Mobile users can download content from the...

    Provided By Institute of Electrical and Electronics Engineers