Institute of Electrical & Electronic Engineers

Displaying 1-40 of 9845 results

  • White Papers // Apr 2015

    Supervised Learning Based Model for Predicting Variability-Induced Timing Errors

    Circuit designers typically combat variations in hardware and workload by increasing conservative guardbanding that leads to operational inefficiency. Reducing this excessive guardband is highly desirable, but causes timing errors in synchronous circuits. The authors propose a methodology for supervised learning based models to predict timing errors at bit-level. They show...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2015

    Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

    The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long line of work on excluding these operating systems from the trusted computing base of applications, while retaining many of their benefits. Legacy applications continue to run on the untrusted operating system, while...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2015

    Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks

    In this paper, the authors present a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is Wi-Fi or mobile-connected to the Internet. This security framework establishes a cyber-trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2015

    RF-Powered Cognitive Radio Networks: Technical Challenges and Limitations

    The increasing demand for spectral and energy efficient communication networks has spurred a great interest in Energy Harvesting (EH) Cognitive Radio Networks (CRNs). Such a revolutionary technology represents a paradigm shift in the development of wireless networks, as it can simultaneously enable the efficient use of the available spectrum and...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2015

    Database-Assisted Spectrum Access in Dynamic Networks: A Distributed Learning Solution

    In this paper, the authors investigate the problem of database assisted spectrum access in dynamic TV white spectrum networks, in which the active user set is varying. Since there is no central controller and information exchange, it encounters dynamic and incomplete information constraints. To solve this challenge, they formulate a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2015

    Optimal Adaptive Random Multiaccess in Energy Harvesting Wireless Sensor Networks

    Wireless sensors can integrate rechargeable batteries and Energy-Harvesting (EH) devices to enable long-term, autonomous operation, thus requiring intelligent energy management to limit the adverse impact of energy outages. This paper considers a network of EH wireless sensors, which report packets with a random utility value to a Fusion Center (FC)...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2015

    Sequential Channel State Tracking & SpatioTemporal Channel Prediction in Mobile Wireless Sensor Networks

    In this paper, the authors propose a nonlinear filtering framework for approaching the problems of channel state tracking and spatiotemporal channel gain prediction in mobile wireless sensor networks, in a Bayesian setting. They assume that the wireless channel constitutes an observable (by the sensors/network nodes), spatiotemporal, conditionally Gaussian stochastic process,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack

    In this paper, the authors study the intercept behavior of an industrial Wireless Sensor Network (WSN) consisting of a sink node and multiple sensors in the presence of an eavesdropping attacker, where the sensors transmit their sensed information to the sink node through wireless links. Due to the broadcast nature...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks

    The authors present a joint sub-channel and power allocation framework for downlink transmission in an Orthogonal Frequency-Division Multiple Access (OFDMA)-based cellular network composed of a macrocell overlaid by small cells. In this framework, the Resource Allocation (RA) problems for both the macrocell and small cells are formulated as optimization problems....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Spatial Spectrum and Energy Efficiency of Random Cellular Networks

    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, the authors propose new spatial spectrum and energy efficiency models for Poisson-Voronoi Tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Using Social Sensors for Influence Propagation in Networks with Positive and Negative Relationships

    Online social communities often exhibit complex relationship structures, ranging from close friends to political rivals. As a result, persons are influenced by their friends and foes differently. Future network applications can benefit from integrating these structural differences in propagation schemes through socially aware sensors. In this paper, the authors introduce...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Application-Bypass Reduction for Large-Scale Clusters

    Process skew is an important factor in the performance of parallel applications, especially in large-scale clusters. Reduction is a common collective operation which, by its nature, introduces implicit synchronization between the processes involved in the communication and is therefore highly susceptible to performance degradation due to process skew. A collective...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    On the Nanoscale Electromechanical Wireless Communication in the VHF Band

    Electromagnetic communication at the nanoscale has, to date, been studied in either the Very High Frequency (VHF) (30 - 300MHz) or in the TeraHertz band (0.1 - 10THz). This paper is on electromagnetic communication in the VHF band and determining the Bit Error Rate (BER) performance of nanoscale receivers utilizing...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Evaluation of Hybrid Memory Technologies Using SOT-MRAM for On-Chip Cache Hierarchy

    Magnetic Random Access Memory (MRAM) is a very promising emerging memory technology because of its various advantages such as non-volatility, high density and scalability. In particular, Spin Orbit Torque (SOT) MRAM is gaining interest as it comes along with all the benefits of its predecessor Spin Transfer Torque (STT) MRAM,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Medium Access Control Design for Full-Duplex Wireless Systems: Challenges and Approaches

    Recent advances in self-interference cancellation techniques enable in-band Full-Duplex (FD) transmission in which a wireless node can simultaneously transmit and receive in the same frequency band. However, to fully exploit the benefits of FD technology in a wireless network, in addition to the PHYsical (PHY) layer issues, Medium Access Control...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Lattice QCD with Domain Decomposition on Intel R Xeon Phi Co-Processors

    The gap between the cost of moving data and the cost of computing continues to grow, making it ever harder to design iterative solvers on extreme-scale architectures. This problem can be alleviated by alternative algorithms that reduce the amount of data movement. The authors investigate this in the context of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Throughput of the Magnetic Induction Based Wireless Underground Sensor Networks: Key Optimization Techniques

    Wireless Underground Sensor Networks (WUSNs) present a variety of new research challenges. Recently, a Magneto-Inductive (MI) waveguide technique has been proposed to cope with the very harsh propagation conditions in WUSNs. This relay-based approach allows for an extension of the transmission range, which can be quite limited if relays are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Relay-Selection Improves the Security-Reliability Trade-off in Cognitive Radio Systems

    In this paper, the authors consider a Cognitive Radio (CR) network consisting of a Secondary Transmitter (ST), a Secondary Destination (SD) and multiple Secondary Relays (SRs) in the presence of an eavesdropper, where the ST transmits to the SD with the assistance of SRs, while the eavesdropper attempts to intercept...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Efficient Shared-Memory Implementation of High-Performance Conjugate Gradient Benchmark and Its Application to Unstructured Matrices

    A new sparse High Performance Conjugate Gradient benchmark (HPCG) has been recently released to address challenges in the design of sparse linear solvers for the next generation extreme-scale computing systems. Key computation, data access, and communication pattern in HPCG represent building blocks commonly found in today's HPC applications. While it...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Performance Model to Estimate Execution Time of Scientific Workflows on the Cloud

    Scientific workflows, which capture large computational problems, may be executed on large-scale distributed systems such as clouds. Determining the amount of resources to be provisioned for the execution of scientific workflows is a key component to achieve cost-efficient resource management and good performance. In this paper, a performance prediction model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Coordinated Scheduling for the Downlink of Cloud Radio-Access Networks

    In this paper, the authors address the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a Cloud-Radio Access Network (C-RAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected Base-Stations (BS). The transmitted frame of every BS...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection

    The emergence of Machine-To-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and PHYsical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods and is inherently capable to take advantage of the capture...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System

    Over the past decade, design and implementation of low-power systems has received significant attention. While it started with data centers and battery-operated mobile devices, it has recently branched to core network devices such as routers. However, this emerging need for low-power system design has not been studied for security systems,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization

    A multi-static radar set-up is considered in which distributed receive antennas are connected to a Fusion Center (FC) via limited-capacity backhaul links. Similar to cloud radio access networks in communications, the receive antennas quantize the received baseband signal before transmitting it to the FC. The problem of maximizing the detection...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies

    Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks

    Radio Frequency (RF) energy harvesting is a promising technique to sustain operations of wireless networks. In a cognitive radio network, a secondary user can be equipped with RF energy harvesting capability. In this paper, the authors consider such a network where the secondary user can perform channel access to transmit...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States

    In this paper, a class of information theoretic secrecy problems is addressed where the eavesdropper channel state is completely unknown to the legitimate parties. In particular, a Gaussian MIMO wiretap channel is considered, where the eavesdropper channel state can vary from one channel use to the next, and the overall...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Simple Distributed Power Control Algorithm for Cognitive Radio Networks

    In this paper, the authors study the power control problem for spectrum sharing based Cognitive Radio (CR) networks with multiple secondary Source-to-Destination (SD) pairs. A simple distributed algorithm is proposed for the Secondary Users (SUs) to iteratively adjust their transmit powers to improve the performance of the network. The proposed...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Efficient Embedded Microprocessor

    In this paper, the authors are trying to introduce an embedded microprocessor which is combination of embedded system and microprocessor. These embedded microprocessors are 8 bit devices programmed in assembly language. These processors are used as microcontrollers in devices such as automotive ignition control, digital radio tuning, printers, mobile phones,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Resource Allocation Optimization for Delay-Sensitive Traffic in Fronthaul Constrained Cloud Radio Access Networks

    The Cloud Radio Access Network (C-RAN) provides high spectral and energy efficiency performances, low expenditures and intelligent centralized system structures to operators, which has attracted intense interests in both academia and industry. In this paper, a Hybrid Coordinated Multi-Point transmission (H-CoMP) scheme is designed for the downlink transmission in C-RANs,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    PARDICLE: Parallel Approximate Density-based Clustering

    DBSCAN is a widely used isodensity-based clustering algorithm for particle data well-known for its ability to isolate arbitrarily-shaped clusters and to filter noise data. The algorithm is super-linear (O(nlogn)) and computationally expensive for large datasets. Given the need for speed, the authors propose a fast heuristic algorithm for DBSCAN using...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks

    Characterizing user to Remote Radio Head (RRH) association strategies in Cloud Radio Access Networks (C-RANs) is critical for performance optimization. In this letter, the single nearest and N - nearest RRH association strategies are presented and the corresponding impact on the ergodic capacity of CRANs is analyzed, where RRHs are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Sparse Beamforming and User-Centric Clustering for Downlink Cloud Radio Access Network

    In this paper, the authors consider a downlink Cloud Radio Access Network (C-RAN) in which all the Base-Stations (BSs) are connected to a central computing cloud via digital backhaul links with finite capacities. Each user is associated with a user-centric cluster of BSs; the central processor shares the user's data...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Heterogeneous Cloud Radio Access Networks: A New Perspective for Enhancing Spectral and Energy Efficiencies

    To mitigate the severe inter-tier interference and enhance limited cooperative gains resulting from the constrained and non-ideal transmissions between adjacent base stations in Heterogeneous Networks (HetNets), Heterogeneous Cloud Radio Access Networks (H-CRANs) are proposed as cost-efficient potential solutions through incorporating the cloud computing into HetNets. In this paper, state-of-the-art research...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Cross-Layer Control for Worse Case Delay Guarantees in Heterogeneous Powered Wireless Sensor Network Via Lyapunov Optimization

    The delay guarantee is a challenge in Wireless Sensor Networks (WSNs), where energy constraints must be considered. The coexistence of renewable energy and electricity grid is expected as a promising energy supply manner for WSNs to remain function for a potentially infinite lifetime. In this paper, the authors address cross-layer...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms

    Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users' channel state diversity (induced by fast-fading), and are optimal for stationary channel state distributions and an infinite time-horizon. However, mobile users experience a non-stationary channel, due to slow-fading (on the order of seconds), and...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

    Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. The authors propose a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    The Information Funnel: Exploiting Named Data for Information-Maximizing Data Collection

    In this paper, the authors describe the exploitation of hierarchical data names to achieve information-utility maximizing data collection in social sensing applications. They describe a novel transport abstraction, called the information funnel. It encapsulates a data collection protocol for social sensing that maximizes a measure of delivered information utility that...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Composite Approach to Self-sustainable Transmissions: Rethinking OFDM

    In this paper, the authors propose two novel strategies to extend the battery life of an Orthogonal Frequency Division Multiplexing (OFDM) receiver, by exploiting the concept of Wireless Power Transfer (WPT). First a new receiver architecture is devised that does not discard the Cyclic Prefix (CP), but instead, exploits it...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise with Secrecy Protected Zone

    Recently, the use of artificial noise has attracted considerable attention in enhancing the physical-layer security of wireless systems. However, the interaction between artificially generated noise and the inherent network interference can significantly affect the level of secrecy. In this paper, the authors consider the additional secrecy enhancement with artificial noise...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2014

    Remote Detection of Photoplethysmographic Systolic and Diastolic Peaks Using a Digital Camera

    In this paper, the authors present a new method for measuring PhotoPlethysmoGram (PPG) signals remotely using ambient light and a digital camera that allows for accurate recovery of the waveform morphology (from a distance of 3m). In particular, they show that the peak-to-peak time between the systolic peak and diastolic...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2010

    Maintaining Privacy and Data Quality in Privacy Preserving Association Rule Mining

    Privacy Preserving Data Mining (PPDM) is a novel research direction to preserve privacy for sensitive knowledge from disclosure. Many of the researchers in this area have recently made effort to preserve privacy for sensitive association rules in statistical database. In this paper, the authors propose a heuristic algorithm named DSRRC...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2015

    Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks

    In this paper, the authors present a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is Wi-Fi or mobile-connected to the Internet. This security framework establishes a cyber-trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2013

    Transaction Processing in the Hybrid OLTP&OLAP Main-Memory Database System HyPer

    Two emerging hardware trends have re-initiated the development of in-core database systems: ever increasing main memory capacities and vast multi-core parallel processing power. Main-memory capacities of several TB allow retaining all transactional data of even the largest applications in-memory on one (or a few) servers. The vast computational power in...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2014

    A Real-Time Intelligent Abnormity Diagnosis Platform in Electric Power System

    With the rapid development of smart grid, intelligent electric meters can be seen in most of the households, and the volume of electric energy data is in a rapid growth. This paper mainly aims at introducing an abnormity diagnosis platform in electric power system. It is used to distinguish the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2006

    An Efficient Way of Passing of Data in a Multithreaded Scheduled Dataflow Architecture

    The Scheduled DataFlow (SDF) architecture deviates from current trend of building complex hardware to exploit Instruction Level Parallelism (ILP) by exploring a simpler, yet powerful execution paradigm that is based on dataflow, multithreading and decoupling of memory accesses from execution. A program is partitioned into non-blocking threads and all memory...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2013

    Identifying the Sources of Unpredictability in COTS-based Multicore Systems

    COTS-based multicores are now the preferred choice for hosting embedded applications owing to their immense computational capabilities, small form factor and low power consumption. Many of these embedded applications have real-time requirements and real-time system designers must be able assess them for their predictability and provide guarantees (at design time)...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2014

    Improving Resilience to Timing Errors by Exposing Variability Effects to Software in Tightly-Coupled Processor Clusters

    Manufacturing and environmental variations cause timing errors in microelectronic processors that are typically avoided by ultra-conservative multi-corner design margins or corrected by error detection and recovery mechanisms at the circuit-level. In contrast, the authors present here runtime software support for cost-effective countermeasures against hardware timing failures during system operation. They...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2013

    A Variability-Aware OpenMP Environment for Efficient Execution of Accuracy-Configurable Computation on Shared-FPU Processor Clusters

    In this paper, the authors propose tightly-coupled, multi-core cluster architecture with shared, variation-tolerant, and accuracy-reconfigurable Floating-Point Units (FPUs). The resilient shared-FPUs dynamically characterize FP pipeline Vulnerability (FPV) and expose it as metadata to a software scheduler for reducing the cost of error correction. To further reduce this cost, their programming...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2014

    Workload Shaping to Mitigate Variability in Renewable Power Use by Data Centers

    In this paper, the authors explore the opportunity for energy saving in data centers using the flexibility from the Service Level Agreements (SLAs) and propose a novel approach for scheduling workload that incorporates use of renewable energy sources. They investigate how much renewable power to store and how much workload...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2015

    Supervised Learning Based Model for Predicting Variability-Induced Timing Errors

    Circuit designers typically combat variations in hardware and workload by increasing conservative guardbanding that leads to operational inefficiency. Reducing this excessive guardband is highly desirable, but causes timing errors in synchronous circuits. The authors propose a methodology for supervised learning based models to predict timing errors at bit-level. They show...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2014

    Fuzzy Authorization for Cloud Storage

    By leveraging and modifying Ciphertext-Policy Attribute Based Encryption (CP-ABE) and OAuth, the authors propose a new authorization scheme, called fuzzy authorization, to facilitate an application registered with one cloud party to access data residing in another cloud party. The new proposed scheme enables the fuzziness of authorization to enhance the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2014

    An FPGA-Based Plant-on-Chip Platform for Cyber-Physical System Analysis

    Digital control systems are traditionally designed independent of their implementation platform, assuming constant sensor sampling rates and processor response times. Applications are deployed to processors that are shared amongst control and non-control tasks, to maximize resource utilization. This potentially overlooks that computing mechanisms meant for improving average CPU usage, such...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2013

    High-Performance Dynamic Programming on FPGAs with OpenCL

    Field Programmable Gate Arrays (FPGAs) provide reconfigurable computing fabrics that can be tailored to a wide range of time and power sensitive applications. Traditionally, programming FPGAs required an expertise in complex Hardware Description Languages (HDLs) or proprietary High-Level Synthesis (HLS) tools. Recently, Altera released the world's first OpenCL conformant SDK...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2013

    Spatial Memoization: Concurrent Instruction Reuse to Correct Timing Errors in SIMD Architectures

    In this paper, the authors propose a novel technique to alleviate the cost of timing error recovery, building upon the lockstep execution of Single-Instruction-Multiple-Data (SIMD) architectures. To support spatial memoization at the instruction level, they propose a Single-Strong-lane-Multiple-Weak-lane (SSMW) architecture. Spatial memoization exploits the value locality inside parallel programs, memoizes...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2006

    Risk-Resilient Heuristics and Genetic Algorithms for Security-Assured Grid Job Scheduling

    In scheduling a large number of user jobs for parallel execution on an open-resource grid system, the jobs are subject to system failures or delays caused by infected hardware, software vulnerability and distrusted security policy. This paper models the risk and insecure conditions in Grid job scheduling. Three risk-resilient strategies,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2012

    Predictive Handling of Asynchronous Concept Drifts in Distributed Environments

    In a distributed computing environment, peers collaboratively learn to classify concepts of interest from each other. When external changes happen and their concepts drift, the peers should adapt to avoid increase in misclassification errors. The problem of adaptation becomes more difficult when the changes are asynchronous, i.e., when peers experience...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2013

    Dealing With Concept Drifts in Process Mining

    Although most business processes change over time, contemporary process mining techniques tend to analyze these processes as if they are in a steady state. Processes may change suddenly or gradually. The drift may be periodic (e.g., because of seasonal influences) or one-of-a-kind (e.g., the effects of new legislation). For the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    What's Your Current Stress Level? Detection of Stress Patterns from GSR Sensor Data

    The problem of job stress is generally recognized as one of the major factors leading to a spectrum of health problems. People with certain professions, like intensive care specialists or call-center operators, and people in certain phases of their lives, like working parents with young children, are at increased risk...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks

    The problem of cooperative intrusion detection in resource constrained wireless networks (e.g., adhoc, sensor) is challenging, primarily because of the limited resources available to participating nodes. Although the problem has received some attention from the research community, little is known about the tradeoffs among different objectives, e.g., network performance, power...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Asymmetric Event-Driven Node Localization in Wireless Sensor Networks

    Localization of wireless sensor nodes has long been regarded as a problem that is difficult to solve, especially when considering characteristics of real-world environments. This paper formally describes, designs, implements, and evaluates a novel localization system called Spotlight. The system uses spatiotemporal properties of well-controlled events in the network, light...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Network Coding in Duty-Cycled Sensor Networks

    Network coding and duty-cycling are two popular techniques for saving energy in wireless adhoc and sensor networks. To the best of the authors' knowledge, the idea to combine these two techniques, for more aggressive energy savings, has not been explored. One explanation is that these techniques achieve energy efficiency through...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2010

    DistressNet: A Wireless Ad Hoc and Sensor Network Architecture for Situation Management in Disaster Response

    Situational awareness in a disaster is critical to effective response. Disaster responders require timely delivery of high volumes of accurate data to make correct decisions. To meet these needs, the authors present DistressNet, an ad hoc wireless architecture that supports disaster response with distributed collaborative sensing, topology-aware routing using a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    High-Resolution Speech Signal Reconstruction in Wireless Sensor Networks

    Data streaming is an emerging class of applications for sensor networks that has very high bandwidth and processing power requirements. In this paper, a new approach for speech data streaming is proposed, which is based on a distributed scheme. This scheme focuses on balancing the energy consumption among nodes in...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2011

    An Efficient Destination-Based Data Management Policy for Vehicular Networks

    The Vehicular Ad hoc NETwork (VANET) takes the advantage of the relative mobility of the vehicles to opportunistically share dynamic information when they meet, aiming to avoid accidents and traffic jams, get local information of the nearby places, enjoy entertainment applications among others. However, the shared information must be handled...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2011

    A Social P2P Networking Based on Interesting Keywords

    In this paper, the authors introduce a new scheme of interesting keyword based P2P as using neighbor list is not an efficient way to search correct resources in social P2P scheme. In their scheme, P2P maintains interesting keyword management table to search resources more correctly. If a neighbor does not...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2011

    An Efficient MAC Scheme With Modified RTS/CTS of IEEE P1901

    According to multimedia service distribution such as High-Definition TeleVision (HDTV), Internet Protocol TeleVision (IPTV) and Voice Over Internet Protocol (VoIP), the networks are required to guarantee Quality of Service (QoS) and real-time performance. Power Line Communication Technology is used for data transfer as well as the transfer of electric power....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

    In order to improve the throughput performance of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to divide a single shared channel into several sub-channels: one as control sub-channel and the others as data sub-channels. In this paper, the authors analyze and evaluate the maximum achievable...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2011

    Percolation Phenomena in Networks Under Random Dynamics

    The authors show that the probability of source routing success in dynamic networks, where the link up-down dynamics is governed by a time-varying stochastic process, exhibit critical phase-transition (percolation) phenomena as a function of the end-to-end message latency per unit path length. They evaluate the probability of routing success on...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2011

    Transmission Capacity of Two Co-Existing Wireless Ad Hoc Networks With Multiple Antennas

    This paper addresses bounds on the transmission capacities of two coexisting wireless networks (a primary and a secondary network), where each with multiple antennas shares the same spectrum and operates in the same geographic region. In the two coexisting network, the Secondary (SR) network limits its interference to the PRimary...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2011

    Optimal Forwarding in Delay Tolerant Networks With Multiple Destinations

    The authors study the trade-off between delivery delay and energy consumption in a delay tolerant network in which a message (or a file) has to be delivered to each of several destinations by epidemic relaying. In addition to the destinations, there are several other nodes in the network that can...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2011

    Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks

    The authors' work is motivated by geographical forwarding of sporadic alarm packets to a base station in a Wireless Sensor Network (WSN), where the nodes are sleep-wake cycling periodically and asynchronously. They seek to develop local forwarding algorithms that can be tuned so as to trade-off the end-to-end delay against...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2012

    Pilot Contamination for Active Eavesdropping

    Existing studies on physical layer security often assume the availability of perfect Channel State Information (CSI) and overlook the importance of channel training needed for obtaining the CSI. In this paper, the authors discuss how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2010

    OPSM - Opportunistic Power Save Mode for Infrastructure IEEE 802.11 WLAN

    The authors focus on the energy spent in radio communication by the STAtions (STAs) in an IEEE 802.11 infrastructure WLAN. All the STAs are engaged in web browsing, which is characterized by a short file downloads over TCP, with short duration of inactivity or think time in between two file...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2012

    Coordination-Free Safety Messages Dissemination Protocol for Vehicular Network

    Many vehicular safety applications depend on the rapid and reliable dissemination of safety messages to vehicles at risk. In order to allow sufficient reaction time for emergency events in adverse driving and road conditions, disseminating safety messages over multi-hop vehicles is often needed. However, owing to the capacity limitation of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2012

    Hop-by-Hop Traceback in Wireless Sensor Networks

    The authors propose two advancements in the existing Bloom filter based traceback schemes for WSNs (Wireless Sensor Networks): the support of directed queries, and a way of reducing the false positive rate at the nodes nearer to the sink. Simulation results show that the proposed mechanism can efficiently traceback the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2012

    An Accuracy Enhanced IEEE 1588 Synchronization Protocol for Dynamically Changing and Asymmetric Wireless Links

    IEEE 1588 is the clock synchronization protocol for networked measurement and control system, and widely used for both wire-line and wireless network environments. IEEE 1588 was initially considered for wire-line networks, but its application is extended to wireless network especially for indoor wireless networks which can not use Global Positioning...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Mar 2012

    Joint Congestion Control and Power Allocation With Outage Constraint in Wireless Multihop Networks

    The authors consider the problem of joint congestion control and power control with outage constraint in an interference limited multihop wireless network. They transform the original non-convex problem into a convex programming problem and develop a message passing distributed algorithm that can attain the global optimal source rate and link...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Coordinated TCP Westwood Congestion Control for Multiple Paths Over Wireless Networks

    Multi-Path TCP (MPTCP) has just been approved by the IETF. It was designed to be fairly shared with regular TCP, so its performance is equivalent that of a regular TCP flow that on the best path for it. However, regular TCP has been proven its performance very poor in wireless...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Throughput Maximization for the Secondary User Over Multi-Channel Cognitive Radio Networks

    This paper studies average waiting time analysis of opportunistic access in multi-channel cognitive radio networks with a single secondary user and multiple primary users by applying the M/G/1 preemptive priority queueing scheme. By employing convex optimization tool, the secondary user finds the optimal way to distribute the packets to all...

    Provided By Institute of Electrical & Electronic Engineers