Institute of Electrical & Electronic Engineers

Displaying 1-40 of 9899 results

  • White Papers // Feb 2015

    Database-Assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution

    In this paper, the authors investigate the problem of database assisted spectrum access in dynamic TV white spectrum networks, in which the active user set is varying. Since there is no central controller and information exchange, it encounters dynamic and incomplete information constraints. To solve this challenge, they formulate a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks

    The authors present a joint sub-channel and power allocation framework for downlink transmission in an Orthogonal Frequency-Division Multiple Access (OFDMA)-based cellular network composed of a macrocell overlaid by small cells. In this framework, the Resource Allocation (RA) problems for both the macrocell and small cells are formulated as optimization problems....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Spatial Spectrum and Energy Efficiency of Random Cellular Networks

    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, the authors propose new spatial spectrum and energy efficiency models for Poisson-Voronoi Tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Using Social Sensors for Influence Propagation in Networks with Positive and Negative Relationships

    Online social communities often exhibit complex relationship structures, ranging from close friends to political rivals. As a result, persons are influenced by their friends and foes differently. Future network applications can benefit from integrating these structural differences in propagation schemes through socially aware sensors. In this paper, the authors introduce...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    On the Nanoscale Electromechanical Wireless Communication in the VHF Band

    Electromagnetic communication at the nanoscale has, to date, been studied in either the Very High Frequency (VHF) (30 - 300MHz) or in the TeraHertz band (0.1 - 10THz). This paper is on electromagnetic communication in the VHF band and determining the Bit Error Rate (BER) performance of nanoscale receivers utilizing...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Evaluation of Hybrid Memory Technologies Using SOT-MRAM for On-Chip Cache Hierarchy

    Magnetic Random Access Memory (MRAM) is a very promising emerging memory technology because of its various advantages such as non-volatility, high density and scalability. In particular, Spin Orbit Torque (SOT) MRAM is gaining interest as it comes along with all the benefits of its predecessor Spin Transfer Torque (STT) MRAM,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Medium Access Control Design for Full-Duplex Wireless Systems: Challenges and Approaches

    Recent advances in self-interference cancellation techniques enable in-band Full-Duplex (FD) transmission in which a wireless node can simultaneously transmit and receive in the same frequency band. However, to fully exploit the benefits of FD technology in a wireless network, in addition to the PHYsical (PHY) layer issues, Medium Access Control...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Lattice QCD with Domain Decomposition on Intel R Xeon Phi Co-Processors

    The gap between the cost of moving data and the cost of computing continues to grow, making it ever harder to design iterative solvers on extreme-scale architectures. This problem can be alleviated by alternative algorithms that reduce the amount of data movement. The authors investigate this in the context of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Throughput of the Magnetic Induction Based Wireless Underground Sensor Networks: Key Optimization Techniques

    Wireless Underground Sensor Networks (WUSNs) present a variety of new research challenges. Recently, a Magneto-Inductive (MI) waveguide technique has been proposed to cope with the very harsh propagation conditions in WUSNs. This relay-based approach allows for an extension of the transmission range, which can be quite limited if relays are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Performance Model to Estimate Execution Time of Scientific Workflows on the Cloud

    Scientific workflows, which capture large computational problems, may be executed on large-scale distributed systems such as clouds. Determining the amount of resources to be provisioned for the execution of scientific workflows is a key component to achieve cost-efficient resource management and good performance. In this paper, a performance prediction model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Coordinated Scheduling for the Downlink of Cloud Radio-Access Networks

    In this paper, the authors address the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a Cloud-Radio Access Network (C-RAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected Base-Stations (BS). The transmitted frame of every BS...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection

    The emergence of Machine-To-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and PHYsical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods and is inherently capable to take advantage of the capture...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System

    Over the past decade, design and implementation of low-power systems has received significant attention. While it started with data centers and battery-operated mobile devices, it has recently branched to core network devices such as routers. However, this emerging need for low-power system design has not been studied for security systems,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization

    A multi-static radar set-up is considered in which distributed receive antennas are connected to a Fusion Center (FC) via limited-capacity backhaul links. Similar to cloud radio access networks in communications, the receive antennas quantize the received baseband signal before transmitting it to the FC. The problem of maximizing the detection...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks

    Radio Frequency (RF) energy harvesting is a promising technique to sustain operations of wireless networks. In a cognitive radio network, a secondary user can be equipped with RF energy harvesting capability. In this paper, the authors consider such a network where the secondary user can perform channel access to transmit...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States

    In this paper, a class of information theoretic secrecy problems is addressed where the eavesdropper channel state is completely unknown to the legitimate parties. In particular, a Gaussian MIMO wiretap channel is considered, where the eavesdropper channel state can vary from one channel use to the next, and the overall...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Simple Distributed Power Control Algorithm for Cognitive Radio Networks

    In this paper, the authors study the power control problem for spectrum sharing based Cognitive Radio (CR) networks with multiple secondary Source-to-Destination (SD) pairs. A simple distributed algorithm is proposed for the Secondary Users (SUs) to iteratively adjust their transmit powers to improve the performance of the network. The proposed...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Efficient Embedded Microprocessor

    In this paper, the authors are trying to introduce an embedded microprocessor which is combination of embedded system and microprocessor. These embedded microprocessors are 8 bit devices programmed in assembly language. These processors are used as microcontrollers in devices such as automotive ignition control, digital radio tuning, printers, mobile phones,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Resource Allocation Optimization for Delay-Sensitive Traffic in Fronthaul Constrained Cloud Radio Access Networks

    The Cloud Radio Access Network (C-RAN) provides high spectral and energy efficiency performances, low expenditures and intelligent centralized system structures to operators, which has attracted intense interests in both academia and industry. In this paper, a Hybrid Coordinated Multi-Point transmission (H-CoMP) scheme is designed for the downlink transmission in C-RANs,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks

    Characterizing user to Remote Radio Head (RRH) association strategies in Cloud Radio Access Networks (C-RANs) is critical for performance optimization. In this letter, the single nearest and N - nearest RRH association strategies are presented and the corresponding impact on the ergodic capacity of CRANs is analyzed, where RRHs are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Sparse Beamforming and User-Centric Clustering for Downlink Cloud Radio Access Network

    In this paper, the authors consider a downlink Cloud Radio Access Network (C-RAN) in which all the Base-Stations (BSs) are connected to a central computing cloud via digital backhaul links with finite capacities. Each user is associated with a user-centric cluster of BSs; the central processor shares the user's data...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Heterogeneous Cloud Radio Access Networks: A New Perspective for Enhancing Spectral and Energy Efficiencies

    To mitigate the severe inter-tier interference and enhance limited cooperative gains resulting from the constrained and non-ideal transmissions between adjacent base stations in Heterogeneous Networks (HetNets), Heterogeneous Cloud Radio Access Networks (H-CRANs) are proposed as cost-efficient potential solutions through incorporating the cloud computing into HetNets. In this paper, state-of-the-art research...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Cross-Layer Control for Worse Case Delay Guarantees in Heterogeneous Powered Wireless Sensor Network Via Lyapunov Optimization

    The delay guarantee is a challenge in Wireless Sensor Networks (WSNs), where energy constraints must be considered. The coexistence of renewable energy and electricity grid is expected as a promising energy supply manner for WSNs to remain function for a potentially infinite lifetime. In this paper, the authors address cross-layer...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms

    Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users' channel state diversity (induced by fast-fading), and are optimal for stationary channel state distributions and an infinite time-horizon. However, mobile users experience a non-stationary channel, due to slow-fading (on the order of seconds), and...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

    Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. The authors propose a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    The Information Funnel: Exploiting Named Data for Information-Maximizing Data Collection

    In this paper, the authors describe the exploitation of hierarchical data names to achieve information-utility maximizing data collection in social sensing applications. They describe a novel transport abstraction, called the information funnel. It encapsulates a data collection protocol for social sensing that maximizes a measure of delivered information utility that...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers

    In this paper, the authors study the resource allocation and user scheduling algorithm for minimizing the energy cost of data transmission in the context of OFDMA Collaborative Mobile Cloud (CMC) with Simultaneous Wireless Information and Power Transfer (SWIPT) receivers. The CMC, which consists of several collaborating MTs offers one potential...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Composite Approach to Self-sustainable Transmissions: Rethinking OFDM

    In this paper, the authors propose two novel strategies to extend the battery life of an Orthogonal Frequency Division Multiplexing (OFDM) receiver, by exploiting the concept of Wireless Power Transfer (WPT). First a new receiver architecture is devised that does not discard the Cyclic Prefix (CP), but instead, exploits it...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise with Secrecy Protected Zone

    Recently, the use of artificial noise has attracted considerable attention in enhancing the physical-layer security of wireless systems. However, the interaction between artificially generated noise and the inherent network interference can significantly affect the level of secrecy. In this paper, the authors consider the additional secrecy enhancement with artificial noise...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Beamforming for Cooperative Retransmission via User Relaying in Multiple Antenna Cellular Systems

    The authors propose a novel cooperative user relaying scheme for a two-user multiple antenna downlink cellular system where each user has to receive a certain required amount of information. A user who successfully receives its required amount of information is supposed to help the other user in receiving its required...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Spatial Coverage Cross-Tier Correlation Analysis for Heterogeneous Cellular Networks

    In the search for improved coverage and capacity, cellular networks are currently undergoing a major transformation. A thoroughly planned architecture comprised of macrocells served by large-coverage expensive Base Stations (BSs) is evolving toward a much more heterogeneous architecture where the macro-cell network is underlaid by one or several tiers of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Improving Network Connectivity in the Presence of Heavy-Tailed Interference

    The Heavy Tailed (HT) traffic from wireless users, caused by the emerging Internet and multimedia applications, introduces a HT interference region within which network users will experience unbounded delay with infinite mean and/or variance. Specifically, it is proven that, if the network traffic of primary networks (e.g., cellular and Wi-Fi...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Performance Measurement of the CCNx Synchronization Protocol

    Content-Centric-Networking project (CCNx) is a software implementation of the content-centric networking approach. The motivation behind the CCNx synchronization protocol is to keep a collection of information synchronized between 2 CCNx nodes. An example of a possible synchronized collection is a private music directory that should be kept up-to-date in a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Bayesian Hierarchical Mechanism Design for Cognitive Radio Networks

    In this paper, the authors consider a cognitive radio network where the licensed network, referred to as the Primary User (PU) network, consists of a hierarchical structure in which multiple operators coexist in the same coverage area where each of the operators controls an exclusive set of frequency sub-bands. Unlicensed...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Cooperation in Delay Tolerant Networks with Wireless Energy Transfer: Performance Analysis and Optimization

    The authors consider a Delay Tolerant Network (DTN) whose mobile nodes are assigned to collect packets from data sources and deliver them to a sink (i.e., a gateway). Each mobile node operates by using energy transferred wirelessly from the gateway. This paper addresses two major issues in such a network....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    The Mean Interference-to-Signal Ratio and its Key Role in Cellular and Amorphous Networks

    The authors introduce a simple yet powerful and versatile analytical framework to approximate the SIR distribution in the downlink of cellular systems. It is based on the mean interference to-signal ratio and yields the horizontal gap (SIR gain) between the SIR distribution in question and a reference SIR distribution. As...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Towards a Practical Survivable Intrusion Tolerant Replication System

    The increasing number of cyber attacks against critical infrastructures, which typically require large state and long system lifetimes, necessitates the design of systems that are able to work correctly even if part of them is compromised. The authors present the first practical survivable intrusion tolerant replication system, which defends across...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Device-to-Device Communications Achieve Efficient Load Balancing in LTE-Advanced Networks

    In LTE-advanced networks, besides the overall coverage provided by traditional macrocells, various classes of low-power nodes (LPNs, like pico eNBs, femto eNBs, and relays) can be distributed throughout the macrocells as a more targeted underlay to further enhance the area spectral efficiency, alleviate traffic hot zones, and thus improve the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Backhaul-Constrained Small Cell Networks: Refunding and QoS Provisioning

    Small cell Access Points (SAPs) can offload macrocell traffic, improve indoor coverage and cell-edge user performance, and boost network capacity. In this paper, the authors investigate the problem faced by the Mobile Network Operator (MNO) on how to properly incentivize the existing private SAPs to serve extra roaming macrocell users....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding

    Linear precoding and cooperative jamming for multiuser broadcast channel is studied to enhance the physical layer security. The authors consider the system where multiple independent data streams are transmitted from the base station to multiple legitimate users with the help of a friendly jammer. It is assumed that a normalized...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2010

    Boomerang: Reducing Power Consumption of Response Packets in NoCs with Minimal Performance Impact

    Most power reduction mechanisms for NoC channel buffers rely on on-demand wakeup to transition from a low-power state to the active state. Two drawbacks of on-demand wakeup limit its effectiveness: performance impact caused by wakeup delays and energy and area cost of sleep circuitry itself. What makes the problem harder...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2008

    Branch-Mispredict Level Parallelism (BLP) for Control Independence

    A microprocessor's performance is fundamentally limited by the rate at which it can resolve branch mispredictions. Control Independence (CI) architectures look for useful control and data independent instructions to fetch and execute in the shadow of a branch misprediction. This paper demonstrates that CI architectures can be guided to exploit...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2009

    Efficient Processing of Top-k Queries in Uncertain Databases with x-Relations

    In this paper, the authors introduce novel polynomial algorithms for processing top-k queries in uncertain databases under the generally adopted model of x-relations. An x-relation consists of a number of x-tuples, and each x-tuple randomly instantiates into one tuple from one or more alternatives. Their results significantly improve the best...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2012

    Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage

    Provable Data Possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, the authors address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which they consider the existence of multiple...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Implementation of Data Security and Integrity Verification on Multi-Cloud Storage

    Cloud computing is now at peak point of research. Everyone wants his/her business on cloud environment because of cloud different services. It has changed the traditional way of file systems and database transactions which proved tedious for both the user and the developer. However cloud promised various issues of versatility,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2007

    Power-Efficient Approaches to Redundant Multithreading

    In this paper, the authors have presented novel microarchitectural techniques for reducing the power overheads of RMT. When executing leading and trailing redundant threads, they take advantage of the fact that the leading thread prefetches data and resolves branches for the trailing thread. The results of the leading thread also...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2011

    Evaluating the Impact of Planning Long-term Contracts on the Management of a Hybrid IT Infrastructure

    The cloud computing market has emerged as an alternative for the provisioning of resources on a pay-as-the user-go basis. This flexibility potentially allows clients of cloud computing solutions to reduce the total cost of ownership of their information technology infrastructures. On the other hand, this market-based model is not the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Possibility of Different Threats to Cloud & Web Applications

    The area of cloud computing is now is at research edge. Day-by-day new services are launched to fulfill customer demands. Everyone wants paperless system and data availability at any time. But performance of web and cloud applications based on network stability. If network is not stable and secure then different...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Overview on Cloud Computing Service and Security Models

    Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Detection of Places Based on Place Extraction Algorithm Using Hidden Markov Model

    Metadata, often referred to as \"Data about data,\" provides interesting information that supplements the primary content of digital documents. Metadata has become a powerful tool to organize and search through the growing libraries of image, audio and video content that users are producing and consuming. This is especially important in...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Overview on Security Threats and Solutions in Cloud Computing

    Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. These types of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Ras Issues and Solutions for Cloud Computing

    Cloud computing is becoming as a main choice computing paradigm for the enterprises. Use of cloud computing technologies is increasing by every passing day. It has great advantages of on-demand computing, scalability, proactive resource management, better application throughput, and enhanced security. Due to its openness and adaptability, it can be...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Enhancing Security in Multi Cloud Storage System Using Security Algorithm

    Cloud computing service providers take advantage of virtualization technologies, combined with self-service capabilities, to offer cost-effective access to computing resources via the internet. But major issue in cloud computing is security. Several concerns which identify security requirements in cloud computing. In this paper, the authors have proposed to implements, the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Security for Hibernation Snapshot Images on Linux Platform

    Now-a-days it is common in several laptops that they have a suspend option. It saves the state of the machine to a file system or to a partition and switches to standby mode. Later resuming the machine the saved state is loaded back to RAM and the machine can continue...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Enhancing Security Performance of SOAP in Web Services Using RSA Algorithm

    Recently, web services have generated great interests in both vendors and researchers. A web service, based on existing Internet protocols and open standards, provides a flexible solution to the problem of application integration. With the help of Web Service Description Language (WSDL) and Simple Object Access Protocol (SOAP), web services...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Public Auditability and Data Security in Cloud Computing

    Traditionally and classically IT services are under personnel controls, cloud computing moves the application software's to the data centers, where the security of the data and services may not be fully trustworthy. This attribute, poses new security challenges. In this paper, the authors focus on cloud data storage security with...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Survey on Scalable Scheduling of Updates in Streaming Databases

    In this paper, the authors study update scheduling problem in streaming data warehouse, streaming data warehouse combines the benefits of traditional data warehouses and data stream systems. In this problem jobs corresponds to the processes which loads the new data in to the table, and main is aim is to...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Enhancing Video Updates in VNC under High Latency Conditions Using a Proxy

    Virtual Network Computing (VNC) is a thin client application used to access remote files, documents and applications on the remote computer. In a way it achieves mobile computing. It uses an open protocol - RFB protocol i.e. independent of the computing platform. It consists of a server and clients'. N...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    Predictive Search Engine for Document Searching

    Predictive Search has become a part of the users' daily interactions, helping they search faster, find results quicker for files and documents the authors didn't even know they had. In this paper, they are introduces the concept of predictive search engine into real life scenario for their client based on...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2014

    A Data Hiding Implementation in Encrypted Images for Secure Data Access

    Recently more and more attention is paid towards the data security as there is very big problem of data hacking in the industry. So, various techniques are made available for secure data access. One of the way is to transfer the data through the image, means the image is encrypted...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2013

    Comparative Study of Customized Kernel to Original Kernel

    For many years the developers developed the number of operating systems, like windows and Linux. The main common factors which are used by both operating systems are their kernel. Kernel is a critical part of any operating system. The kernel plays a vital role in operating system concept. Now-a-days, number...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2013

    Data Security Under Authorization Using Batch Programming

    The data security is the most important aspect of today's scenario. Data security means to insure that the data is kept safe from corruption and suitably controlled. It also helps to ensure privacy. Before proposing of this tool the unauthorized user misused the system data. The proposed system aims at...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2013

    Android Teaching Assistant

    The authors have proposed this framework for to reduce the teacher paper work and directly stored the data into the database with the help of the SQL server. It also provides the security to each use has its personal user name password. With the help of this framework the can...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2013

    Scratchpad Memory Aware Task Scheduling With Minimum Number of Preemptions on a Single Processor

    The authors propose a unified approach to the problem of scheduling a set of tasks with individual release times, deadlines and precedence constraints, and allocating the data of each task to the SPM (ScratchPad Memory) on a single processor system. Their approach consists of a task scheduling algorithm and an...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2012

    A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems

    Networked storage systems provide storage services for users over networks. Secure networked storage systems store encrypted data to guarantee data confidentiality. However, using encryption schemes somehow restricts the access control function over stored data. The authors address the access control function for a secure networked storage system by proposing a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2008

    DTA-C: A Decoupled Multi-Threaded Architecture for CMP Systems

    One way to exploit Thread Level Parallelism (TLP) is to use architectures that implement novel multithreaded execution models, like Scheduled Data-Flow (SDF). This latter model promises an elegant decoupled and non-blocking execution of threads. Here, the authors extend that model in order to be used in future scalable CMP systems...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2010

    SCMP Architecture: An Asymmetric Multiprocessor System-on-Chip for Dynamic Applications

    Future systems will have to support multiple and concurrent dynamic compute-intensive applications, while respecting real-time and energy consumption constraints. Within this framework, this paper presents an architecture, named SCMP. This asymmetric multiprocessor can support dynamic migration and preemption of tasks, thanks to a concurrent control of tasks, while offering a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2011

    Green Enterprise Computing Data: Assumptions and Realities

    Until now, green computing research has largely relied on few, short-term power measurements to characterize the energy use of enterprise computing. In this paper, the authors brings new and comprehensive power datasets through Powernet, a hybrid sensor network that monitors the power and utilization of the IT systems in a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2009

    Model-Driven Development of Multi-Core Embedded Software

    Model-driven development is worthy of further research because of its proven capabilities in increasing productivity and ensuring correctness. However, it has not yet been explored for multi-core processor-based embedded systems, whose programming is even more complex and difficult that that for conventional uni-processor systems. The authors propose a new VERTAF/Multi-Core...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Is Shared Memory Programming Attainable on Clusters of Embedded Processors?

    The wide increase of total processing cores in commodity processors tends to lighten the need for computer performance by the classical scientific problems as well as by the modern multimedia and every day embedded applications. Nevertheless, the introduction of this powerful and promising technology seems to inherit and in some...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Programming GPU Clusters with Shared Memory Abstraction in Software

    As many-core graphics processors gain an increasingly important position concerning the advancements on modern highly concurrent processors, the authors are experiencing the deployment of the first heterogeneous clusters that are based on GPUs. The attempts to match future expectations in computational power and energy saving with hybrid - GPU-based -...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Accelerating Data Clustering on GPU-based Clusters under Shared Memory Abstraction

    Many-core graphics processors are playing today an important role in the advancements of modern highly concurrent processors. Their ability to accelerate computation is being explored under several scientific fields. In the paper the authors present the acceleration of a widely used data clustering algorithm, K-means, in the context of high...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Acceleration of a High Order Accurate Method for Compressible Flows on SDSM based GPU Clusters

    The recent advent of multi-core processors, and especially the introduction of many-core GPUs, opens new horizons to large-scale, high-resolution, simulations for a broad range of scientific fields. Among them, the scientific area of CFD appears to be one of the candidates that could significantly benefit from the utilization of many-core...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2009

    Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup

    Power consumption has become a major concern in designing IP lookup engines for next generation routers. Although TCAMs dominate today's high-end routers, they are not scalable in terms of clock rate and power consumption. SRAM-based pipeline solutions are considered promising alternatives for high-speed IP lookup engines. However, existing SRAM-based pipeline...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2008

    High-Performance Designs for Linear Algebra Operations on Reconfigurable Hardware

    Numerical linear algebra operations are key primitives in scientific computing. Performance optimizations of such operations have been extensively investigated. With the rapid advances in technology, hardware acceleration of linear algebra applications using Field-Programmable Gate Arrays (FPGAs) has become feasible. In this paper, the authors propose FPGA-based designs for several basic...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2009

    Data Component Based Management of Reservoir Simulation Models

    The management of reservoir simulation models has been an important need of engineers in petroleum industry. However, due to data sharing among reservoir simulation models, data replication is common and poses many challenges to model management, including management efficiency and data consistency. In this paper, the authors propose a data...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2009

    Matrix Computations on Heterogeneous Reconfigurable Systems

    Reconfigurable computing systems have been built that combine FPGAs and general-purpose processors to achieve high performance. The nodes in these systems can have different compute capacities based on the processors and FPGAs within them. In this paper, the authors study the algorithm design on heterogeneous reconfigurable systems for two key...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2007

    High-Performance Reduction Circuits Using Deeply Pipelined Operators on FPGAs

    Field-Programmable Gate Arrays (FPGAs) have become an attractive option for accelerating scientific applications. Many scientific operations such as matrix-vector multiplication and dot product involve the reduction of a sequentially produced stream of values. Unfortunately, because of the pipelining in FPGA-based floating-point units, data hazards may occur during these sequential reduction...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2009

    Buffer Sizing for Rate-Optimal Single-Rate Dataflow Scheduling Revisited

    Single-Rate DataFlow (SRDF) graphs, also known as Homogeneous Synchronous DataFlow (HSDF) graphs or Marked Graphs, are often used to model the implementation and do temporal analysis of concurrent DSP and multimedia applications. An important problem in implementing applications expressed as SRDF graphs is the computation of the minimal amount of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2011

    Scalable Tree-based Architectures for IPv4/v6 Lookup Using Prefix Partitioning

    Memory efficiency and dynamically updateable data structures for Internet Protocol (IP) lookup have regained much interest in the research community. In this paper, the authors revisit the classic tree-based approach for solving the Longest Prefix Matching (LPM) problem used in IP lookup. In particular, they target their solutions for a...

    Provided By Institute of Electrical & Electronic Engineers