KTH Royal Institute of Technology

Displaying 1-40 of 135 results

  • White Papers // Apr 2014

    ElastMan: Elasticity Manager for Elastic Key-Value Stores in the Cloud

    The increasing spread of elastic cloud services, together with the pay-as-you-go pricing model of cloud computing, has led to the need of an elasticity controller. The controller automatically resizes an elastic service in response to changes in workload, in order to meet Service Level Objectives (SLOs) at a reduced cost....

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2013

    Secure Bluetooth for Trusted m-Commerce

    In this paper, the authors' explain about the digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2013

    Cloud Computing for the Power Grid: From Service Composition to Assured Clouds

    The electric power industry is one of the few industries where cloud computing has not yet found much adoption, even though electric power utilities rely heavily on communications and computation to plan, operate and analyze power systems. In this paper, the authors explore the reasons for this phenomenon. They identify...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2013

    Auction-Based Resource Allocation in Millimeter Wave Wireless Access Networks

    The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave Wireless Access Networks is investigated. The problem is posed as a multi-assignment optimization problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to...

    Provided By KTH Royal Institute of Technology

  • White Papers // Feb 2013

    Optimizing Client Association in 60 GHz Wireless Access Networks

    Millimeter-Wave communications in the 60 GHz band are considered one of the key technologies for enabling multi-gigabit wireless access. However, the high propagation loss in such a band poses major obstacles to the optimal utilization of the wireless resources, where the problem of efficient client association to Access Points (APs)...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Decentralized Minimum-Cost Repair for Distributed Storage Systems

    There have been emerging lots of applications for distributed storage systems e.g., those in wireless sensor networks or cloud storage. Since storage nodes in wireless sensor networks have limited battery, it is valuable to find a repair scheme with optimal transmission costs (e.g., energy). The optimal-cost repair has been recently...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Wi-Fi Sensing: Should Mobiles Sleep Longer as They Age?

    An essential condition precedent to the success of mobile applications based on Wi-Fi (e.g., i-Cloud) is an energy-efficient Wi-Fi sensing. From a user's perspective, a good Wi-Fi sensing policy should depend on both inter-AP arrival and contact duration time distributions. Prior work focuses on limited cases of those two distributions...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Content-Peering Dynamics of Autonomous Caches in a Content-Centric Network

    A future content-centric Internet would likely consist of Autonomous Systems (ASes) just like today's Internet. It would thus be a network of interacting cache networks, each of them optimized for local performance. To understand the influence of interactions between autonomous cache networks, in this paper the authors consider ASes that...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Effects of the Packet Size Distribution on the Packet Loss Process

    Real-time multimedia applications have to use Forward Error Correction (FEC) and error concealment techniques to cope with losses in today's best-effort Internet. The efficiency of these solutions is known however to depend on the correlation between losses in the media stream. In this paper, the authors investigate how the packet...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Power-Law Revisited: A Large Scale Measurement Study of P2P Content Popularity

    The popularity of contents on the Internet is often said to follow a Zipf-like distribution. Different measurement studies showed, however, significantly different distributions depending on the measurement methodology they followed. The authors performed a large-scale measurement of the most popular Peer-To-Peer (P2P) content distribution system, BitTorrent, over eleven months. They...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    A Rate-Distortion Based Comparison of Media-Dependent FEC and MDC for Real-Time Audio

    Applications that require low loss probabilities in today's Internet have to employ some end-to-end error-recovery mechanism. For interactive applications with strict delay constraints, the delay introduced by the applied schemes has to be low as well. In this paper, the authors compare two schemes proposed for error recovery for real-time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Stability of End-Point-Based Multimedia Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. Using the model and via simulations they study the performance of this architecture in the presence...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Asymptotic Behavior of End-Point-Based Multicast Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. They show that this architecture can distribute data to nodes arbitrarily far away from the root...

    Provided By KTH Royal Institute of Technology

  • White Papers // Nov 2012

    Optimal Coordinated Beamforming in the Multicell Downlink with Transceiver Impairments

    Physical wireless transceivers suffer from a variety of impairments that distort the transmitted and received signals. Their degrading impact is particularly evident in modern systems with multiuser transmission, high transmit power, and low-cost devices, but their existence is routinely ignored in the optimization literature for multicell transmission. This paper provides...

    Provided By KTH Royal Institute of Technology

  • White Papers // Oct 2012

    Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT

    The authors study the sum Degrees of Freedom (DoF) of a class of multi-layer relay-aided MIMO broadcast networks with delayed Channel State Information at Transmitters (CSIT). In the assumed network a K-antenna source intends to communicate to K single-antenna destinations, with the help of N-2 layers of K full-duplex single-antenna...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2012

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an l relaxation technique provides an exact optimal solution to this cardinality minimization problem. The...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    A Novel Overlay IDS for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it. That is why intrusion detection architecture for WSN is considerably different and difficult to implement. Most of the current implementations are based on exchanging anomaly signals among the leaf level...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    To Subscribe, or Not to Subscribe: Modeling and Analysis of Service Paradigms in Cellular Markets

    Traditionally customers subscribe to specific providers and are served by accessing Base Stations (BSs) of the network of their provider. Inevitably subscribers with relatively "High" usage pattern and data-rate requirements are subsidized by the ones with lower usage and data-rates. As the wireless technology advances, a diverse set of services...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    Automating Enterprise Architecture Documentation Using an Enterprise Service Bus

    Currently the documentation of Enterprise Architectures (EA) requires manual collection of data resulting in an error prone, expensive, and time consuming process. Recent approaches seek to automate and improve EA documentation by employing the productive system environment of organizations. In this paper, the authors investigate a specific Enterprise Service Bus...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2012

    Tradeoffs in Cloud and Peer-Assisted Content Delivery Systems

    With the proliferation of cloud services, cloud-based systems can become a cost-effective means of on-demand content delivery. In order to make best use of the available cloud bandwidth and storage resources, content distributors need to have a good understanding of the tradeoffs between various system design choices. In this paper,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2012

    Architecture Support and Comparison of Three Memory Consistency Models in NoC Based Systems

    The authors propose a novel hardware support for three relaxed memory models, Release Consistency (RC), Partial Store Ordering (PSO) and Total Store Ordering (TSO) in Network-on-Chip (NoC) based distributed shared memory multi-core systems. The RC model is realized by using a Transaction Counter and an Address Stack based approach to...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Fair Scheduling of Dynamically Provisioned WDM Connections With Differentiated Signal Quality

    Emerging, on-demand applications (e.g., Interactive video, ultra-high definition TV, backup storage and grid computing) are gaining momentum and are becoming increasingly important. Given the high bandwidth required by these applications, Wavelength Division Multiplexing (WDM) networks are seen as the natural choice for their transport technology. Among the various on-line strategies...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Secure Distributed Top-K Aggregation

    In-network aggregation is an efficient and scalable distributed approach to global state approximation. However, security remains an open problem in such systems, especially when the authors consider dynamic network effects, such as mobility, packet loss and churn. In this paper, they consider the resilience of the top-k aggregate to manipulation...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Anytime Reliability of Systematic LDPC Convolutional Codes

    The authors propose a LDPC Convolutional Code ensemble together with an expanding-window message-passing decoder that asymptotically have anytime properties when used for streaming transmission on the binary erasure channel. They show analytically that the decoding erasure probability of these codes decays exponentially over decoding delay and determine the corresponding anytime...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    On Combined Beamforming and OSTBC Over the Cognitive Radio Z-Channel With Partial CSI

    The authors consider a pair of Secondary nodes (SU) coupled, in Z-topology, with multiple pairs of Primary nodes (PU). The secondary (cognitive) transmitter is combining Beamforming with Orthogonal Space-Time Block Coding (BOSTBC) and operates under Quality-of-Service (QoS) constraints that must be guaranteed for the Primary Receivers (PURx). The cognitive link...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Design of Green Optical Networks With Signal Quality Guarantee

    Energy consumption of communication networks is growing very fast due to the rapidly increasing traffic demand. Consequently, design of green communication networks gained a lot of attention. In this paper, the authors focus on optical Wavelength Division Multiplexing (WDM) networks, able to support this growing traffic demand. Several Energy-Aware Routing...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications

    Distributed processing through ad hoc and sensor networks is having a major impact on scale and applications of computing. The creation of new cyber-physical services based on wireless sensor devices relies heavily on how well communication protocols can be adapted and optimized to meet quality constraints under limited energy resources....

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2012

    Energy-Efficient Deadline-Constrained Maximum Reliability Forwarding in Lossy Networks

    This paper studies the problem of optimal forwarding for reliable and energy-efficient real-time communication over lossy networks. The authors impose a strict per-packet latency bound and develop forwarding policies that maximize the probability that the packet is delivered within the specified deadline minus a transmission energy cost. A solution to...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2012

    Modular Design of Jointly Optimal Controllers and Forwarding Policies for Wireless Control

    The authors consider the joint design of forwarding policies and controllers for wireless control loops where sensor measurements are sent over an unreliable multi-hop wireless network to the controller node. For fixed sampling rate of the control loop, the co-design problem separates into two well-defined and independent sub-problems: transmission scheduling...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Performance Analysis and Optimization of the Joining Protocol for a Platoon of Vehicles

    Platooning of vehicles allows to saving energy and increasing safety provided that there are reliable wireless communication protocols. In this paper, the optimization of the Medium Access Control (MAC) protocol based on IEEE 802.11e for the platoon joining is investigated. The exchange of prosperous dynamic information among vehicles through certain...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    A List of Maximum Period NLFSRs

    Non-Linear Feedback Shift Registers (NLFSRs) are a generalization of Linear Feedback Shift Registers (LFSRs) in which a current state is a nonlinear function of the previous state. While the theory behind LFSRs is well-understood, many fundamental problems related to NLFSRs remain open. Probably the most important one is finding a...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    State-Space Feedback Control for Elastic Distributed Storage in a Cloud Environment

    Elasticity in Cloud computing is an ability of a system to scale up and down (request and release resources) in response to changes in its environment and workload. Elasticity can be achieved manually or automatically. Efforts are being made to automate elasticity in order to improve system performance under dynamic...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Playout Adaptation for Peer-to-Peer Streaming Systems Under Churn

    The authors address the problem of playout adaptation in peer-to-peer streaming systems. They propose two algorithms for playout adaptation: one coordinated and one distributed. The algorithms dynamically adapt the playback delay of the peers so that the playout miss ratio is maintained within a predefined interval. They validate the algorithms...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Modeling and Estimation of Partially Observed WLAN Activity for Cognitive WSNs

    Efficient communication in the crowded ISM band requires the communication networks to be aware of the networking environment and to control their communication protocols accordingly. In this paper, the authors address the issue of efficient WSN communication under WLAN interference. They propose analytic models to describe the WLAN idle time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Minimum-Energy Packet Forwarding Over Lossy Networks Under Deadline and Reliability Constraints

    This paper studies minimum-energy packet forwarding over multi-hop lossy networks under deadline and reliability constraints. The authors assume a routing topology in the form of a directed graph with packet loss processes on links described by finite-state Markov chains, and formulate the forwarding problem as a finite-horizon constrained Markov decision...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Identity-Based Authentication and Access Control in Wireless Sensor Networks

    The application and usage of the wireless sensor network is rapidly growing. Wireless sensor networks are normally deployed into the unattended environment where the intended user can get access of the network. The sensor nodes collect data from this environment. If the data are valuable and confidential then some security...

    Provided By KTH Royal Institute of Technology

  • White Papers // Feb 2012

    Stealthy Pre-Attacks Against Random Key Pre-Distribution Security

    Random Key Pre-Distribution (RKPD) has been investigated for large wireless sensor networks, in order to achieve efficient security and robustness against limited node compromise. While it is possible that an adversary obtains a subset of the symmetric keys in use, it has been unclear how to use those to compromise...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    Vertical Cooperation in Spectrum Sharing Wireless Networks

    The emerging cognitive radio technology enables the introduction of hierarchical spectrum sharing in wireless networks, where the primary users have transmission guarantees, whereas the coexisting secondary users need to be cognitive towards primary activities, and adjust their transmissions to conform the primary constraints. The authors consider large-scale coexisting primary and...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    Cache Capacity Allocation for BitTorrent-Like Systems to Minimize Inter-ISP Traffic

    Many Internet Service Providers (ISPs) have deployed Peer-To-Peer (P2P) caches in their networks in order to decrease costly inter-ISP traffic. A P2P cache stores parts of the most popular contents locally, and if possible serves the requests of local peers to decrease the inter-ISP traffic. Traditionally, P2P cache resource management...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    A Longitudinal Characterization of Local and Global BitTorrentWorkload Dynamics

    Workload characterization is important for understanding how systems and services are used in practice and to help identify design improvements. To better understand the longitudinal workload dynamics of chunk-based content delivery systems, this paper analyzes the BitTorrent usage as observed from two different vantage points. Using two simultaneously collected 48-week...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2011

    Self-Triggered Control of Multiple Loops Over IEEE 802.15.4 Networks

    Given the communication savings offered by self-triggered sampling, it is becoming an essential paradigm for closed-loop control over energy-constrained Wireless Sensor Networks (WSNs). The understanding of the performance of self-triggered control systems when the feedback loops are closed over IEEE 802.15.4 WSNs is of major interest, since the communication standard...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2011

    A Sensor Fusion Algorithm for Mobile Node Localization

    Accurate distributed estimation of the position of network nodes is essential for many applications, including localization, geographic routing, and vehicular networks. When nodes are mobile and their mobility pattern is unknown, there are not yet adequate techniques to achieve high accuracy and low estimation errors. In this paper, a new...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2011

    A Distributed Information Fusion Method for Localization Based on Pareto Optimization

    To overcome the limitations of specific positioning techniques for mobile wireless nodes and achieve a high accuracy, the fusion of heterogeneous sensor information is an appealing strategy. In this paper, the problem of optimal fusion of ranging information typically provided by Ultra-Wideband radio with speed and absolute orientation information is...

    Provided By KTH Royal Institute of Technology

  • White Papers // Feb 2012

    Stealthy Pre-Attacks Against Random Key Pre-Distribution Security

    Random Key Pre-Distribution (RKPD) has been investigated for large wireless sensor networks, in order to achieve efficient security and robustness against limited node compromise. While it is possible that an adversary obtains a subset of the symmetric keys in use, it has been unclear how to use those to compromise...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications

    Distributed processing through ad hoc and sensor networks is having a major impact on scale and applications of computing. The creation of new cyber-physical services based on wireless sensor devices relies heavily on how well communication protocols can be adapted and optimized to meet quality constraints under limited energy resources....

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    A Novel Overlay IDS for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it. That is why intrusion detection architecture for WSN is considerably different and difficult to implement. Most of the current implementations are based on exchanging anomaly signals among the leaf level...

    Provided By KTH Royal Institute of Technology

  • White Papers // Oct 2012

    Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT

    The authors study the sum Degrees of Freedom (DoF) of a class of multi-layer relay-aided MIMO broadcast networks with delayed Channel State Information at Transmitters (CSIT). In the assumed network a K-antenna source intends to communicate to K single-antenna destinations, with the help of N-2 layers of K full-duplex single-antenna...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    State-Space Feedback Control for Elastic Distributed Storage in a Cloud Environment

    Elasticity in Cloud computing is an ability of a system to scale up and down (request and release resources) in response to changes in its environment and workload. Elasticity can be achieved manually or automatically. Efforts are being made to automate elasticity in order to improve system performance under dynamic...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2009

    Policy Based Self-Management in Distributed Environments

    Currently, increasing costs and escalating complexities are primary issues in the distributed system management. The policy based management is introduced to simplify the management and reduce the overhead, by setting up policies to govern system behaviors. Policies are sets of rules that govern the system behaviors and reflect the business...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2010

    Gossip-Based Resource Management for Cloud Environments

    The authors address the problem of resource management for a large-scale cloud environment that hosts sites. Their solution centers around a middleware architecture, the key element of which is a gossip protocol that meets their design goals: fairness of resource allocation with respect to hosted sites, efficient adaptation to load...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Secure Distributed Top-K Aggregation

    In-network aggregation is an efficient and scalable distributed approach to global state approximation. However, security remains an open problem in such systems, especially when the authors consider dynamic network effects, such as mobility, packet loss and churn. In this paper, they consider the resilience of the top-k aggregate to manipulation...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Anytime Reliability of Systematic LDPC Convolutional Codes

    The authors propose a LDPC Convolutional Code ensemble together with an expanding-window message-passing decoder that asymptotically have anytime properties when used for streaming transmission on the binary erasure channel. They show analytically that the decoding erasure probability of these codes decays exponentially over decoding delay and determine the corresponding anytime...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    On Combined Beamforming and OSTBC Over the Cognitive Radio Z-Channel With Partial CSI

    The authors consider a pair of Secondary nodes (SU) coupled, in Z-topology, with multiple pairs of Primary nodes (PU). The secondary (cognitive) transmitter is combining Beamforming with Orthogonal Space-Time Block Coding (BOSTBC) and operates under Quality-of-Service (QoS) constraints that must be guaranteed for the Primary Receivers (PURx). The cognitive link...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Design of Green Optical Networks With Signal Quality Guarantee

    Energy consumption of communication networks is growing very fast due to the rapidly increasing traffic demand. Consequently, design of green communication networks gained a lot of attention. In this paper, the authors focus on optical Wavelength Division Multiplexing (WDM) networks, able to support this growing traffic demand. Several Energy-Aware Routing...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Modeling and Estimation of Partially Observed WLAN Activity for Cognitive WSNs

    Efficient communication in the crowded ISM band requires the communication networks to be aware of the networking environment and to control their communication protocols accordingly. In this paper, the authors address the issue of efficient WSN communication under WLAN interference. They propose analytic models to describe the WLAN idle time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2012

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an l relaxation technique provides an exact optimal solution to this cardinality minimization problem. The...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2010

    On Security Indices for State Estimators in Power Networks

    In this paper, the authors study stealthy false-data attacks against state estimators in power networks. The focus is on applications in SCADA (Supervisory Control And Data Acquisition) systems where measurement data is corrupted by a malicious attacker. They introduce two security indices for the state estimators. The indices quantify the...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2010

    Control Over a Hybrid MAC Wireless Network

    Wireless Sensor Networks and Control Systems are an essential part of the Smart Grid. The authors consider the problem of performing control over large complex networked systems with packet drops. More specifically, they are interested in improving the performance of the regulation of control loops when the communication is made...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2009

    Experimental Validation of a Localization System Based on a Heterogeneous Sensor Network

    The experimental implementation and validation of a localization system based on a heterogeneous sensor network is described. The sensor network consists of ultrasound ranging sensors and web cameras. They are used to localize a mobile robot under sensor communication constraints. Applying a recently proposed sensor fusion algorithm that explicitly takes...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2011

    Analysis of a Simple Feedback Scheme for Error Correction Over a Lossy Network

    A control theoretic analysis of a simple error correction scheme for lossy packet-switched networks is presented. Based on feedback information from the error correction process in the receiver, the sender adjusts the amount of redundancy using a so called extremum-seeking controller, which does not rely on any accurate model of...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2009

    Optimized Rate Allocation for State Estimation Over Noisy Channels

    Optimal rate allocation in a networked control system with limited communication resources is instrumental to achieve satisfactory overall performance. In this paper, a practical rate allocation technique for state estimation in linear dynamic systems over an erroneous channel is proposed. The method consists of two steps: the overall distortion is...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2011

    Multi-Path Routing Metrics for Reliable Wireless Mesh Routing Topologies

    Several emerging classes of applications that run over wireless networks have a need for mathematical models and tools to systematically characterize the reliability of the network. The authors propose two metrics for measuring the reliability of wireless mesh routing topologies, one for flooding and one for unicast routing. The Flooding...

    Provided By KTH Royal Institute of Technology

  • White Papers // Nov 2010

    Realization and Performance Comparison of Sequential and Weak Memory Consistency Models in Network-on-Chip Based Multi-Core Systems

    This paper studies realization and performance comparison of the sequential and weak consistency models in the Network-on-Chip (NoC) based Distributed Shared Memory (DSM) multi-core systems. Memory consistency constrains the order of shared memory operations for the expected behavior of the multi-core systems. Both the consistency models are realized in the...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2011

    Realization and Scalability of Release and Protected Release Consistency Models in NoC Based Systems

    This paper studies the realization and scalability of release and protected release consistency models in Network-on-Chip (NoC) based Distributed Shared Memory (DSM) multi-core systems. The Protected Release Consistency (PRC) model is proposed as an extension of the Release Consistency (RC) model and provides further relaxation in the shared memory operations....

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2011

    A Low-Overhead Fault-Aware Deflection Routing Algorithm for 3D Network-on-Chip

    This paper proposes a low-overhead fault-tolerant deflection routing algorithm, which uses a layer routing table and two TSV state vectors to make efficient routing decision to avoid both TSV and horizontal link faults, for 3D NoC. The proposed switch is implemented in hardware with TSMC 65nm technology, which can achieve...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2011

    Adaptively Reconfigurable Controller for the Flash Memory

    As the continuous development on the capacity and work frequency, Programmable Logic Devices (PLD) especially Field-Programmable Gate Arrays (FPGA) is playing an increasingly important role in embedded systems designs. The FPGA market has hit about 3 and 4 billion US dollars respectively in 2009 and 2010, and is expected by...

    Provided By KTH Royal Institute of Technology

  • White Papers // Nov 2010

    Memory Architecture and Management in an NoC Platform

    The memory organization and the management of the memory space is a critical part of every NoC based platform design. The authors propose a Data Management Engine (DME), which is a block of programmable hardware and part of every processing element. It off-loads the processing element (CPU, DSP, etc.) by...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    Constrained Global Scheduling of Streaming Applications on MPSoCs

    The authors present a global scheduling framework for Synchronous Data Flow (SDF) streaming applications on MPSoCs, based on optimized computation and contention-free routing. The global scheduling of processors computing and communication transactions are formulated as constraint based problem, to avoid the scheduling overhead in TDMA-like heuristic schemes. A public domain...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    Optimal Regulation of Traffic Flows in Networks-on-Chip

    Integrating IPs into a SoC infrastructure presents challenges because traffic flows from IPs are diverse and typically have stringent performance constraints; the impact of interferences among traffic flows is hard to analyze; due to the cost and power constraint, buffers in the SoC infrastructure must not be over-dimensioned while still...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    Pareto Efficient Design for Reconfigurable Streaming Applications on CPU/FPGAs

    The authors present a Pareto efficient design method for multi-dimensional optimization of run-time reconfigurable streaming applications on CPU/FPGA a platform, which automatically allocates applications with optimized buffer requirement and software/hardware implementation cost. At the same time, application performance is guaranteed with sustainable throughput during run-time reconfigurations. As the main contribution,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    FPGA-Based Adaptive Computing for Correlated Multi-Stream Processing

    In conventional static implementations for correlated streaming applications, computing resources may be inefficiently utilized since multiple stream processors may supply their sub-results at asynchronous rates for result correlation or synchronization. To enhance the resource utilization efficiency, the authors analyze multi-streaming models and implement an adaptive architecture based on FPGA Partial...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2010

    Theorem Proving Techniques for the Formal Verification of NoC Communications With Non-Minimal Adaptive Routing

    This paper focuses on the formal verification of communications in Networks on Chip. The authors describe how an enhanced version of the GeNoC proof methodology has been applied to the Nostrum NoC which encompasses various non-trivial features such as a deflective non-minimal routing algorithm. They demonstrate how the features of...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2010

    HetMoC: Heterogeneous Modelling in SystemC

    The authors propose a novel Heterogeneous Model-of-Computation (HetMoC) framework in SystemC for embedded computing systems. As the main contribution, they formally define the computation and communication in multiple domains (continuous-time, discrete-event, synchronous/reactive, and untimed) as polymorphic processes and signals, and present domain interfaces to integrate different domains together for heterogeneous...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2010

    Scalability of Weak Consistency in NoC Based Multicore Architectures

    In Multicore Network-on-Chip, it is preferable to realize Distributed but Shared Memory (DSM) in order to reuse the huge amount of legacy code. Within DSM systems, memory consistency is a critical issue since it affects not only performance but also the correctness of programs. In this paper, the authors investigate...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2010

    Inter-Process Communication Using Pipes in FPGA-Based Adaptive Computing

    In FPGA-based adaptive computing, Inter-Process Communications (IPC) are required to exchange information among hardware processes which time-multiplex the resources in a same reconfigurable region. In this paper, the authors use pipes for IPC and analyze the performance in terms of throughput, throughput efficiency and latency in switching contexts. They also...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2010

    A Worst Case Performance Model for TDM Virtual Circuit in NoCs

    In Network-on-Chip (NoC), Time-Division-Multiplexing (TDM) Virtual Circuit (VC) is well recognized as being capable to provide guaranteed services in both latency and bandwidth. The authors propose a method of modeling TDM based VC by using Network Calculus. They derive a tight upper bound of end-to-end delay and buffer requirement for...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2008

    Implementation of Message Scheduling on TDM Virtual Circuits for Network-on-Chip

    Due to the increasing capacity and complexity of semiconductor technology, current design for System-on-Chip (SoC) faces big challenges from many aspects, such as Deep SubMicron (DSM) Effects, Global Synchrony, Communication Architecture, etc. Network-on-Chip (NoC) is an emerging achievement in recent years to tackle with the crisis of communications within large...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2010

    FoN: Fault-on-Neighbor Aware Routing Algorithm for Networks-on-Chip

    Reliability has become a key issue of Networks-on-Chip (NoC) as the CMOS technology scales down to the nanoscale domain. This paper proposes a Fault-on-Neighbor (FoN) aware deflection routing algorithm for NoC which makes routing decision based on the link status of neighbor switches within 2 hops to avoid fault links...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2010

    Reducing FPGA Reconfiguration Time Overhead Using Virtual Configurations

    Reconfiguration time overhead is a critical factor in determining the system performance of FPGA dynamically reconfigurable designs. To reduce the reconfiguration overhead, the most straightforward way is to increase the reconfiguration throughput, as many previous contributions did. In addition to shortening FPGA reconfiguration time, the authors introduce a new concept...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2009

    Scalability of Network-on-Chip Communication Architecture for 3-D Meshes

    Design Constraints imposed by global interconnect delays as well as limitations in integration of disparate technologies make 3-D chip stacks an enticing technology solution for massively integrated electronic systems. The scarcity of vertical interconnects however imposes special constraints on the design of the communication architecture. This paper examines the performance...

    Provided By KTH Royal Institute of Technology