Institute of Electrical and Electronics Engineers

Displaying 1-40 of 6723 results

  • White Papers // May 2015

    SRAM for Error-Tolerant Applications with Dynamic Energy-Quality Management in 28 nm CMOS

    In this paper, a voltage-scaled SRAM for both error-free and error-tolerant applications is presented that dynamically manages the energy/quality trade-off based on application need. Two variation-resilient techniques, write assist and error correcting code, are selectively applied to bit positions having larger impact on the overall quality, while jointly performing voltage...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2015

    Digitally Controlled Leakage-Based Oscillator and Fast Relocking MDLL for Ultra Low Power Sensor Platform

    In this paper, the authors present an all-digital Multiplying Delay-Locked Loop (MDLL) with a leakage-based oscillator for ultra-low-power sensor platforms. The proposed digital control of channel leakage current achieved ultra-low power consumption in frequency generation with a fine resolution. The leakage based oscillator was modeled as an RC-based oscillator, analyzed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    IoT Design Space Challenges: Circuits and Systems

    The Internet of Things (IoTs) is a rapidly emerging application space, poised to become the largest electronics market for the semiconductor industry. IoT devices are focused on sensing and actuating of the authors' physical environment and have a nearly unlimited breadth of uses. In this paper, they explore the IoT...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2015

    Correctness Analysis and Power Optimization for Probabilistic Boolean Circuits

    Traditionally, the authors expect that circuit designs can be executed without errors. However, for error resilient applications such as image processing, 100% correctness is not necessary. By pursuing less than 100% correctness, power consumption can be significantly reduced. Recently, probabilistic CMOS and Probabilistic Boolean Circuits (PBCs) have been proposed to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2015

    Wireless Sensor Network Virtualization: A Survey

    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoTs) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSNs' nodes are becoming more and more powerful, it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    Wireless Sensor Networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2014

    An Ultra-Low Power Fully Integrated Energy Harvester Based on Self-Oscillating Switched-Capacitor Voltage Doubler

    Recent advances in low power circuits have enabled mm-scale wireless systems for wireless sensor networks and implantable devices among other applications. Energy harvesting is an attractive way to power such systems due to the limited energy capacity of batteries at these form factors. However, the same size limitation restricts the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers

    Cloud providers are typically hierarchically organized into interconnected data centers, each with a collection of racks of servers organized into clusters. The communication cost between two servers is a function of their relative location in the cloud infrastructure. Cloud consumers submit allocation requests for virtual machines, of different types and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    TSV-Aware Interconnect Distribution Models for Prediction of Delay and Power Consumption of 3-D Stacked ICs

    3-D Integrated Circuits (3-D ICs) are expected to have shorter wirelength, better performance and less power consumption than 2-D ICs. These benefits come from die stacking and use of Through-Silicon-Vias (TSVs) fabricated for interconnections across dies. However, the use of TSVs has several negative impacts such as area and capacitance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    A Digital Phase Demodulation Technique for Resonant MEMS Gyroscopes

    In this paper, the authors introduce a digital phase demodulation technique for resonant MEMS gyroscopes. The proposed method converts the amplitude-modulated Coriolis signal of the gyroscope into a digital phase-modulated output by utilizing the quadrature component of the sense signal. The rate information is extracted from the digital phase-modulated output...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    A Fully-Integrated 71 nW CMOS Temperature Sensor for Low Power Wireless Sensor Nodes

    The authors propose a fully-integrated temperature sensor for battery-operated, ultra-low power microsystems. Sensor operation is based on temperature independent/dependent current sources that are used with oscillators and counters to generate a digital temperature code. A conventional approach to generate these currents is to drop a temperature sensitive voltage across a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    An 8 Bit 4 GS/s 120 mWCMOS ADC

    For a given resolution, the power consumption of Analog-to-Digital Converters (ADCs) rises linearly with the speed up to some point and then begins to ascend at an increasingly higher rate. A time-interleaved ADC employs four pipelined time-interleaved channels along with a new timing mismatch detection algorithm and a high-resolution variable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Backend Dielectric Reliability Full Chip Simulator

    Each technology generation reduces the interconnect dimensions without always reducing the supply voltage in proportion. This results in higher electric fields within the backend dielectric. Simultaneously, as the dielectric constant (k) decreases to reduce parasitic, as prescribed by the international technology roadmap for semiconductors, the porosity of materials must increase,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2014

    Through-Silicon-Via Material Property Variation Impact on Full-Chip Reliability and Timing

    The authors study the impact of material property variations in Through-Silicon-Via (TSV) and its surrounding structures on the reliability and performance of 3D ICs. They focus on Coefficient of Thermal Expansion (CTE) and Young's modulus variations for TSV, barrier and liner materials. Their toolset efficiently handles the complexity of modeling...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Achieving High-Performance On-Chip Networks with Shared-Buffer Routers

    On-chip routers typically have buffers dedicated to their input or output ports for temporarily storing packets in case contention occurs on output physical channels. Buffers, unfortunately, consume significant portions of router area and power budgets. While running a traffic trace, however, not all input ports of routers have incoming packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    An Energy Efficient Full-Frame Feature Extraction Accelerator with Shift-Latch FIFO in 28 nm CMOS

    In this paper, the authors present an energy efficient feature extraction accelerator design aimed at visual navigation. The hardware oriented algorithmic modifications such as a circular-shaped sampling region and unified description are proposed to minimize area and energy consumption while maintaining feature extraction quality. A matched-throughput accelerator employs fully-unrolled filters...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2014

    Analysis of Metastability in Pipelined ADCs

    A critical issue in the design of high-speed ADCs relates to the errors that result from comparator meta-stability. Studied for flash architectures in the past, this phenomenon assumes new dimensions in pipelined converters, creating far more complex error mechanisms. This paper presents a comprehensive analysis of comparator meta-stability effects in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Quaternary Logic Lookup Table in Standard CMOS

    Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this paper, they propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Secure Browser Architecture Based on Hardware Virtualization

    Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation mechanism to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Low-Power High-Throughput LDPC Decoder Using Non-Refresh Embedded DRAM

    The majority of the power consumption of a high-throughput LDPC decoder is spent on memory. Unlike in a general-purpose processor, the memory access in an LDPC decoder is deterministic and the access window is short. The authors take advantage of the unique memory access characteristic to design a non-refresh eDRAM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    A Band-Reject Nested-PLL Clock Cleaner Using a Tunable MEMS Oscillator

    In this paper, the authors present the Band-Reject Nested PLL (BRN-PLL) scheme that simultaneously improves filtering of a noisy input signal and relaxes the requirements for the loop bandwidth. As the architecture employs a modified PLL as a divider of another PLL, a stability analysis is presented to demonstrate suitable...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    GPU-Based JPEG2000 Decoding Scheme for Digital Cinema

    For the digital cinema system specification released by digital cinema initiatives, it was decided to use 2K or 4K images encoded by the JPEG2000 standard. JPEG2000 provides high compression rates and error tolerance, but it is a burden for both encoding and decoding. To improve the decoding performance, a parallel...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Energy-Saving Cloud Computing Platform Based on Micro-Embedded System

    Energy consumption and computing performance are two essential considerations when service providers establish new data centers. The energy-saving cloud computing platform proposed in this study as potential applications in internet network information centers because of its excellent energy efficiency when manage large datasets. Increased data nodes in distributed computing systems...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Balancing Scalability, Performance and Fault Tolerance for Structured Data (BSPF)

    Analytical business applications generate reports that give a trend predicting insight into the organization's future, estimating the financial graphs and risk factors. These applications work on huge amounts of data, which comprises of decades of market and company records and decision logs of an organization. Today, limit of big data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Study on VM-Based Terminal Mobility Management

    Recently, subscribers are using services utilizing various kinds of virtualization technology. The authors propose Virtual Machine (VM)-based terminal mobility management. The mechanism requires enhanced mobility control procedures and data transmission procedure comparing with the existing mobility management like Access Independent Mobile Service (AIMS). The procedures newly introduce location notification message...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Measurement Results of Frequency Offset in DVB-C2 Receiver

    In this paper, the authors show the measurement results of Frequency Offset (FO) estimation in Digital Video Broadcasting for Cable version 2 (DVB-C2) receiver which uses Orthogonal Frequency-Division Multiplexing (OFDM). Because FO causes Inter-Carrier Interference (ICI) in a multicarrier system, it should be estimated and compensated to improve the performance...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Evaluating Team Performance Using Slack Based Data Envelopment Analysis

    In this paper, the authors devise a Data Envelopment Analysis (DEA) model to assess team performance. The DEA model in this paper uses Slack Based Measure (SBM), a method which deals directly with the input excesses and output shortfall. An explanatory example has been given to demonstrate the applicability of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    Device Control Protocol Using Mobile Phone

    With rapid development of Smartphone make the authors to face in front of the boundary of the world of ubiquitous computing. The capabilities of Smartphone are raising the interest of the smart home and home network technologies. These have used Smartphone as a remote controller. However, the technologies of each...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Iterative Threshold for Anti-Jamming Algorithm and Its Implementation on FPGA

    Frequency-Domain Anti-Jamming (FDAJ) algorithms achieve prominent performance on interference suppression with simple calculations; and hence they are widely used in many applications. The interference suppression threshold plays a key role in the algorithm and affects system performance greatly. In this paper, the initial interference threshold is derived theoretically and then...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-Based PKI

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "Cloud computing" also increases severe security concerns. Security has remained...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    A Novel Reconfigurable Architecture for Generic OFDM Modulator Based on FPGA

    OFDM is a special case of multi-carrier modulations, which is of great use in various wireless communications, such as DAB, DVB, HDTV, CMMB, TMMB and 802.11a. The OFDM frame structure is similar to each other. It consists of a number of OFDM symbols following the synchronizing signal with different cyclic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2014

    PCE Implementation and Testing by Using Virtual Machines

    In this paper, the authors describe the way to implement and test a PCE on the virtualized environment. The PCE is a special computational entity that will corporate with similar entities to compute the best possible path through single or multiple domains. Generally, in real network, the testing and implementation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Ultra Low Power 2-Tier 3D Stacked Sub-Threshold H.264 Intra Frame Encoder

    Digital circuits used in sensor networks require longer battery life and do not demand a fast frequency of operation. Sub-threshold circuits for such applications are an attractive option. Three Dimensional ICs (3D ICs) on the other hand is an emerging technology which helps in miniaturization and reduction in interconnects, resulting...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2013

    Ultrahigh Density Logic Designs Using Monolithic 3-D Integration

    The nano-scale 3-D interconnects available in monolithic 3-D Integrated Circuit (IC) technology enable ultrahigh density device integration at the individual transistor level. In this paper, the authors investigate the benefits and challenges of monolithic 3-D integration technology for ultrahigh density logic designs. They first build a 3-D standard cell library...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2003

    Automating Keyphrase Extraction With Multi-Objective Genetic Algorithms

    This white paper proposes an automated key phrase extraction algorithm using a non dominated sorting multi-objective genetic algorithm. The "clumping" property of key phrases is used to judge the appropriateness of a phrase and is quantified by a condensation clustering measure proposed by Bookstein. The objective is to find the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2003

    Tumor Detection in the Bladder Wall With a Measurement of Abnormal Thickness in CT Scans

    Virtual cystoscopy is a developing technique for bladder cancer screening. In a conventional cystoscopy, an optical probe is inserted into the bladder and an expert reviews the appearance of the bladder wall. Physical limitations of the probe place restrictions on the examination of the bladder wall. In virtual cystoscopy, a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2003

    Characterizations of Metal - Diamond - Silicon Associations for Active Power Electronics Applications

    This paper presents different grades of CVD diamond substrates and the comparison between them, especially between the natural and other kind of CVD diamond. Dielectric strength investigation and surface conductivity with or without chemical treatment are presented, then the influence of the metal to diamond interface on the electronic properties...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2004

    Improved Watershed Transform for Medical Image Segmentation Using Prior Information

    The watershed transform has interesting properties that make it useful for many different image segmentation applications: it is simple and intuitive, can be parallelized, and always produces a complete division of the image. However, when applied to medical image analysis, it has important drawbacks. They present an improvement to the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2000

    Zipper VDSL: A Solution for Robust Duplex Communication Over Telephone Lines

    This paper presents an overview of a digital duplex scheme called Zipper, intended for DMT-based VDSL systems. The Zipper multi-carrier duplex scheme represents a breakthrough toward digital implementation of frequency-division duplexing. A duplex scheme is a method to divide the capacity of a line between the upstream and downstream directions....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2006

    Performance Comparison of IP, MPLS and ATM Based Network Cores Using OPNET

    The core components of a network play vital role in its enhancement. For launching and providing Internet applications and services, vendors have come up with a variety of different technology based network cores and other components of Internet backbone. Among all the challenges for an efficient network core, traffic-routing is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2005

    Mobilizing Customer Relationship Management - A Journey From Strategy to System Design

    The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has recently been renewed interest in mobile business and mobile commerce. Now, however, business managers request detailed and thorough analyses prior to engaging in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    Dynamic Routing With Security Considerations

    Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, the paper will propose a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Dynamic SLA Template Adjustments Based on Service Property Monitoring

    Service Level Agreements (SLAs) are used to manifest guarantees about certain functional and non-functional aspects of service execution. Service providers are confronted with a hard problem when trying to estimate reasonable QoS levels and other default settings for SLA templates. The insufficient use of formal service behaviour descriptions, varying resource...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2008

    History of Wireless Local Area Networks (WLANs) in the Unlicensed Bands

    A brief history of the development of WLAN standards and products is presented in the context of explaining how unlicensed spectrum regulations by the Federal Communications Commission (FCC) have affected the industry. In general, the FCC's initiative to create an "Unlicensed commons" for various forms of wireless communication applications has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Handover Strategy for Mobile Wireless LAN

    Wireless Local Area Network (WLAN) is becoming a new era of wireless networking technology to adapt the user with strong desire for new technology. The main issue is to integrate WLAN with WAN, handover management between the subnet of network should be resolve. Handover within link layer and network layer...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    A 0.35-?m CMOS Solar Energy Scavenger With Power Storage Management System

    This paper presents an integrated solar energy scavenger realized in a 0.35 ?m CMOS technology. The proposed system collects solar energy from the environment through integrated diodes, accumulates it and, delivers it to the load when it is enough to allow proper operation of the CMOS circuitry. The proposed system...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Effective Buffer and Storage Management in DTN Nodes

    Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, from deep space to wireless sensor networks, where TCP fails to operate, as it results in frequent timeouts and intermittent or no connectivity...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Incorporating Flexible, Configurable and Scalable Security to the Education Collaborative Environments

    This paper presents a service that provides security through the technology of Web Services. The use of web services to provide security in e-learning systems will complement the features of services developed in language and/or different architectures. Thus, the work is not limited to platforms in which the client (e-learning...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

    The lack of any centralized infrastructure in Mobile Ad hoc NETworks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Phishing Infrastructure Fluxes All the Way

    Fast flux aims to keep phishing and scam campaigns afloat by provisioning a fraudulent Web site's DNS records to make the site resolve to numerous, short-lived IP addresses. Although fast flux hurts take-down efforts, it's possible to detect and defend against it. It performed DNS lookups on each Web server...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    The Use of Digital Manipulatives in K-12: Robotics, GPS/GIS and Programming

    Faculty from 4-H Youth Development, Biosystems Engineering, and Education have collaborated to develop and implement an innovative robotics and geospatial technologies program, delivered in an informal learning setting of 4-H clubs and afterschool programs. Aimed at middle school youth, the program uses robotics and Global Positioning System (GPS) receivers and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    An Application Dependent Medium Access Protocol for Active RFID Using Dynamic Tuning of the Back-Off Algorithm

    Active Radio Frequency Identification (A-RFID) is a technology where the tags (transponders) carry an on-board energy source for powering the radio, processor circuits, and sensors. Besides offering longer working distance between RFID-reader and tag than passive RFID, this also enables the tags to do sensor measurements, calculations and storage even...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    A Low-IF CMOS Simultaneous GPS Receiver Integrated in a Multimode Transceiver

    Since the FCC mandates the E911 (Enhanced 911) services, carriers using GPS chips to help determine a user's location need to upgrade all handsets in use to GPS-capable models. Meanwhile, the navigation features become much desirable in the personal communication devices such as the cellular phones. This requires the GPS...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    A System Implementation of Pushing Advertisement to Handheld Devices Via Bluetooth

    Almost everyone today has his or her mobile phone and Bluetooth has already become a standard inclusion on most mobile phones, laptops and PDAs. Data transfer through Bluetooth among the handheld devices is common and popular. Bluetooth establishes links in a more convenient manner to facilitate sharing data between devices....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Laydown Yard Optimization Using RFID: A Cost and Time Perspective

    This project reports the use and applications of Radio Frequency Identification (RFID) technique in a laydown yard zone. Every construction site has a laydown yard with equipments and materials worth millions of dollars. The real-time exact tracking and location of these items saves money by avoiding duplicating the equipment and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Wireless Video Multicast in Tactical Environments

    There has been a tremendous increase in demand for real-time video applications over military networks. Multicast provides an efficient solution for simultaneous content delivery to a group of users. It is especially valuable for military applications, as it saves network resources by sharing the data streams across receivers. Even with...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    DMRC: Distortion-Minimizing Rate Control for Wireless Multimedia Sensor Networks

    The availability of inexpensive CMOS cameras and microphones that can ubiquitously capture multimedia content from the environment is fostering the development of Wireless Multimedia Sensor Networks (WMSNs), i.e., distributed systems of wirelessly networked devices that can retrieve video and audio streams, still images, and scalar sensor data. WMSNs require the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Remote Attestation for HDD Files Using Kernel Protection Mechanism

    A remote attestation that measures files on a Hard Disk Drive (HDD) is important for intrusion detection on a data center server. When the server is infected by a rootkit, the kernel may reply with a faked response. Moreover, when a file measurement application or its result are manipulated, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Statistical Decision Making for Authentication and Intrusion Detection

    User authentication and intrusion detection differ from standard classification problems in that while one has data generated from legitimate users, impostor or intrusion data is scarce or non-existent. The paper reviews existing techniques for dealing with this problem and propose a novel alternative based on a principled statistical decision-making view...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Palmprint Recognition Using 3-D Information

    Palmprint has proved to be one of the most unique and stable biometric characteristics. Almost all the current palmprint recognition techniques capture the 2-D image of the palm surface and use it for feature extraction and matching. Although 2-D palmprint recognition can achieve high accuracy, the 2-D palmprint images can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Power Management of Datacenter Workloads Using Per-Core Power Gating

    Dynamic Voltage and Frequency Scaling (DVFS) is one of the most successful power management mechanisms provided by modern processors. Nevertheless, the efficacy of DVFS is limited by its dynamic range, ultimately fixed by the minimum voltage necessary to operate the transistors and the maximum voltage that can be thermally tolerated....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Mems Sugar Enabled Nano-Modeling of Elements in Hard Disk Drive System Along With Reliability Implications

    The paper has demonstrated the impact of developments in nanotechnology to Hard Disk Drive (HDD) technology. The paper has put forth a proposition to enhance the modeling of future storage devices based on innovations in the field of Nanotechnology and MEMS using modeling tools. The paper has elucidated the influence...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    A Practical Look at Micro-Kernels and Virtual Machine Monitors

    This paper looks at two different approaches used to provide embedded system support for virtualization and virtual machine monitors for consumer electronics and mobile devices. The paper compares the micro-kernel approach, which has been a popular choice for building embedded operating systems with the Virtual Machine Monitor (VMM) or hypervisor...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    TCP-Aware Power Control in Wireless Networks

    Modern cellular networks commonly deploy rapid channel rate adaptation to vary the wireless capacity in response to channel conditions while maintaining a fixed target error rate (Typically 1%). Although desirable in terms of throughput for inelastic applications that do not adapt to network conditions, a low fixed target error rate...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Time Stamping for IEEE 1588 Based Clock Synchronization in Wireless LAN

    Clock synchronization is one of the enabling technologies for real-time networking. This paper is motivated by the need for WLAN support of real-time factory automation networks. These networks need synchronized clocks for the typical time-slotted arbitration schemes. As this type of service is not yet available wireless LANs, this work...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Analytical Models for Energy Consumption in Infrastructure WLAN STAs Carrying TCP Traffic

    The authors develop analytical models for estimating the energy spent by Stations (STAs) in infrastructure WLANs when performing TCP controlled file downloads. The authors focus on the energy spent in radio communication when the STAs are in the Continuously Active Mode (CAM), or in the Static Power Save Mode (PSM)....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    SLA-Driven Elastic Cloud Hosting Provider

    It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. In this work the authors address the use of this emerging computing paradigm into web hosting providers in order...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Open Cirrus: A Global Cloud Computing Testbed

    Open Cirrus is a cloud computing testbed that, unlike existing alternatives, federates distributed data centers. It aims to spur innovation in systems and applications research and catalyze development of an open source service stack for the cloud. There is growing interest in cloud computing within the systems and applications research...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Tracking Encrypted VoIP Calls Via Robust Hashing of Network Flows

    In this work the authors propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP flow is identified by a short binary string, called the robust hash, using variations on the flow's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2009

    Detailed Analysis of Skype Traffic

    Skype is beyond any doubt the VoIP application in the current Internet application spectrum. Its amazing success has drawn the attention of telecom operators and the research community, both interested in knowing its internal mechanisms, characterizing its traffic, understanding its users' behavior. This paper investigates the characteristics of traffic streams...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Rateless Coding for Hybrid Free-Space Optical and Radio-Frequency Communication

    Free-Space Optical (FSO) transmission systems enable high-speed communication with relatively small deployment costs. However, FSO suffers a critical disadvantage, namely susceptibility to fog, smoke, and conditions alike. A possible solution to this dilemma is the use of hybrid systems employing FSO and Radio Frequency (RF) transmission. In this paper authors...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Free-Space Optical Modules for Interconnecting 2D-Photonic VLSI Circuitry Over Inter-Chip Distances

    In this paper authors present different configurations for a compact Free-Space Optical Interconnection (FSOI) module by combining two radial Gradient Refractive Index lenses (GRIN) and/or two arrays of refractive microlenses. Based on the findings with ray-tracing and radiometric analysis authors discuss how authors select the proper optical system configurations and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    An Efficient Mechanism for Debugging RTL Description

    In this paper, an efficient algorithm to diagnose design errors in RTL description is proposed. The diagnosis algorithm exploits the hierarchy available in RTL designs to locate design errors. Using data-path to reduce the number of error candidates and ensure that true errors are included in. According to the estimated...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Managing Verification Error Traces With Bounded Model Debugging

    Managing long verification error traces is one of the key challenges of automated debugging engines. Today, debuggers rely on the iterative logic array to model sequential behavior which drastically limits their application. This work presents Bounded Model Debugging, an iterative, systematic and practical methodology to allow debuggers to tackle larger...

    Provided By Institute of Electrical and Electronics Engineers