KTH - Royal Institute of Technology

Displaying 1-40 of 193 results

  • White Papers // Apr 2014

    ElastMan: Elasticity Manager for Elastic Key-Value Stores in the Cloud

    The increasing spread of elastic cloud services, together with the pay-as-you-go pricing model of cloud computing, has led to the need of an elasticity controller. The controller automatically resizes an elastic service in response to changes in workload, in order to meet Service Level Objectives (SLOs) at a reduced cost....

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2014

    Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

    The problem of exact repair of a failed node in multi-hop networked distributed storage systems is considered. Contrary to the most of the current studies which model the repair process by the direct links from surviving nodes to the new node, the repair is modeled by considering the multi-hop network...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jun 2013

    Analysis and Evaluation of Circuit Switched NoC and Packet Switched NoC

    Circuit switched NoC has, compared to packet switching, a longer setup time, guaranteed throughput and latency, higher clock frequency, lower HW complexity, and higher energy efficiency. Depending on packet size and throughput requirements they exhibit better or worse performance. In this paper, the authors designed a circuit switched NoC and...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jun 2013

    Secure Bluetooth for Trusted m-Commerce

    In this paper, the authors' explain about the digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2013

    Cloud Computing for the Power Grid: From Service Composition to Assured Clouds

    The electric power industry is one of the few industries where cloud computing has not yet found much adoption, even though electric power utilities rely heavily on communications and computation to plan, operate and analyze power systems. In this paper, the authors explore the reasons for this phenomenon. They identify...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2013

    Auction-Based Resource Allocation in Millimeter Wave Wireless Access Networks

    The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave Wireless Access Networks is investigated. The problem is posed as a multi-assignment optimization problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Feb 2013

    Optimizing Client Association in 60 GHz Wireless Access Networks

    Millimeter-Wave communications in the 60 GHz band are considered one of the key technologies for enabling multi-gigabit wireless access. However, the high propagation loss in such a band poses major obstacles to the optimal utilization of the wireless resources, where the problem of efficient client association to Access Points (APs)...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    Decentralized Minimum-Cost Repair for Distributed Storage Systems

    There have been emerging lots of applications for distributed storage systems e.g., those in wireless sensor networks or cloud storage. Since storage nodes in wireless sensor networks have limited battery, it is valuable to find a repair scheme with optimal transmission costs (e.g., energy). The optimal-cost repair has been recently...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    Repair for Distributed Storage Systems with Erasure Channels

    The authors study the repair problem of distributed storage systems in erasure networks where the packets transmitted from surviving nodes to the new node might be lost. The fundamental storage-bandwidth tradeoff is calculated by multicasting analysis in erasure networks. The optimal tradeoff bound can be asymptotically achieved when the number...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    Wi-Fi Sensing: Should Mobiles Sleep Longer as They Age?

    An essential condition precedent to the success of mobile applications based on Wi-Fi (e.g., i-Cloud) is an energy-efficient Wi-Fi sensing. From a user's perspective, a good Wi-Fi sensing policy should depend on both inter-AP arrival and contact duration time distributions. Prior work focuses on limited cases of those two distributions...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    Content-Peering Dynamics of Autonomous Caches in a Content-Centric Network

    A future content-centric Internet would likely consist of Autonomous Systems (ASes) just like today's Internet. It would thus be a network of interacting cache networks, each of them optimized for local performance. To understand the influence of interactions between autonomous cache networks, in this paper the authors consider ASes that...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    Power-Law Revisited: A Large Scale Measurement Study of P2P Content Popularity

    The popularity of contents on the Internet is often said to follow a Zipf-like distribution. Different measurement studies showed, however, significantly different distributions depending on the measurement methodology they followed. The authors performed a large-scale measurement of the most popular Peer-To-Peer (P2P) content distribution system, BitTorrent, over eleven months. They...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    A Rate-Distortion Based Comparison of Media-Dependent FEC and MDC for Real-Time Audio

    Applications that require low loss probabilities in today's Internet have to employ some end-to-end error-recovery mechanism. For interactive applications with strict delay constraints, the delay introduced by the applied schemes has to be low as well. In this paper, the authors compare two schemes proposed for error recovery for real-time...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    On the Stability of End-Point-Based Multimedia Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. Using the model and via simulations they study the performance of this architecture in the presence...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    On the Asymptotic Behavior of End-Point-Based Multicast Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. They show that this architecture can distribute data to nodes arbitrarily far away from the root...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2013

    On the Effects of the Packet Size Distribution on the Packet Loss Process

    Real-time multimedia applications have to use Forward Error Correction (FEC) and error concealment techniques to cope with losses in today's best-effort Internet. The efficiency of these solutions is known however to depend on the correlation between losses in the media stream. In this paper, the authors investigate how the packet...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2012

    Low Complexity Adaptive Antenna Selection for Cognitive Radio MIMO Broadcast Channels

    A multi-antenna cognitive radio network, with a single pair of primary users and a secondary broadcast channel, is considered. Under perfect Channel State Information (CSI), the rate-optimal strategy for the primary link is waterfilling, resulting in possibly unused dimensions. The secondary base station, supplied with perfect and global CSI, employs...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2012

    Optimal Coordinated Beamforming in the Multicell Downlink with Transceiver Impairments

    Physical wireless transceivers suffer from a variety of impairments that distort the transmitted and received signals. Their degrading impact is particularly evident in modern systems with multiuser transmission, high transmit power, and low-cost devices, but their existence is routinely ignored in the optimization literature for multicell transmission. This paper provides...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2012

    Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT

    The authors study the sum Degrees of Freedom (DoF) of a class of multi-layer relay-aided MIMO broadcast networks with delayed Channel State Information at Transmitters (CSIT). In the assumed network a K-antenna source intends to communicate to K single-antenna destinations, with the help of N-2 layers of K full-duplex single-antenna...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2012

    Overload Management in Data Stream Processing Systems With Latency Guarantees

    Stream processing systems are becoming increasingly important to analyze real-time data generated by modern applications such as online social networks. Their main characteristic is to produce a continuous stream of fresh results as new data are being generated at real-time. Resource provisioning of stream processing systems is difficult due to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2012

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an l relaxation technique provides an exact optimal solution to this cardinality minimization problem. The...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2012

    Integrating Conventional ERP System With Cloud Services: From the Perspective of Cloud Service Type

    Integrating conventional ERP system with cloud services is an emerging topic nowadays as IT technologies are developing very fast. It is proved that cloud computing has many benefits, and cloud services with flexible licensing model and cost saving features bring opportunities to enterprise's IT operations. Conventional ERP system, an important...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2012

    To Subscribe, or Not to Subscribe: Modeling and Analysis of Service Paradigms in Cellular Markets

    Traditionally customers subscribe to specific providers and are served by accessing Base Stations (BSs) of the network of their provider. Inevitably subscribers with relatively "High" usage pattern and data-rate requirements are subsidized by the ones with lower usage and data-rates. As the wireless technology advances, a diverse set of services...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2012

    A Novel Overlay IDS for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it. That is why intrusion detection architecture for WSN is considerably different and difficult to implement. Most of the current implementations are based on exchanging anomaly signals among the leaf level...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2012

    Automating Enterprise Architecture Documentation Using an Enterprise Service Bus

    Currently the documentation of Enterprise Architectures (EA) requires manual collection of data resulting in an error prone, expensive, and time consuming process. Recent approaches seek to automate and improve EA documentation by employing the productive system environment of organizations. In this paper, the authors investigate a specific Enterprise Service Bus...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2012

    A Conservation-Law-Based Modular Fluid-Flow Model for Network Congestion Modeling

    A modular fluid-flow model for network congestion analysis and control is proposed. The model is derived from an information conservation law stating that the information is either in transit, lost or received. Mathematical models of network elements such as queues, users, and transmission channels, and network description variables, including sending/...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2012

    Scalability Analysis of Release and Sequential Consistency Models in NoC based Multicore Systems

    The authors analyze the scalability of the Release Consistency (RC) and Sequential Consistency (SC) models which are realized in the Network-on-Chip (NoC) based distributed shared memory multicore systems. The analysis is performed on the basis of workloads mapped on the different sizes of networks with different data sets. The experiments...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jul 2012

    Tradeoffs in Cloud and Peer-Assisted Content Delivery Systems

    With the proliferation of cloud services, cloud-based systems can become a cost-effective means of on-demand content delivery. In order to make best use of the available cloud bandwidth and storage resources, content distributors need to have a good understanding of the tradeoffs between various system design choices. In this paper,...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jun 2012

    Architecture Support and Comparison of Three Memory Consistency Models in NoC Based Systems

    The authors propose a novel hardware support for three relaxed memory models, Release Consistency (RC), Partial Store Ordering (PSO) and Total Store Ordering (TSO) in Network-on-Chip (NoC) based distributed shared memory multi-core systems. The RC model is realized by using a Transaction Counter and an Address Stack based approach to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    Fair Scheduling of Dynamically Provisioned WDM Connections With Differentiated Signal Quality

    Emerging, on-demand applications (e.g., Interactive video, ultra-high definition TV, backup storage and grid computing) are gaining momentum and are becoming increasingly important. Given the high bandwidth required by these applications, Wavelength Division Multiplexing (WDM) networks are seen as the natural choice for their transport technology. Among the various on-line strategies...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    Secure Distributed Top-K Aggregation

    In-network aggregation is an efficient and scalable distributed approach to global state approximation. However, security remains an open problem in such systems, especially when the authors consider dynamic network effects, such as mobility, packet loss and churn. In this paper, they consider the resilience of the top-k aggregate to manipulation...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    On Combined Beamforming and OSTBC Over the Cognitive Radio Z-Channel With Partial CSI

    The authors consider a pair of Secondary nodes (SU) coupled, in Z-topology, with multiple pairs of Primary nodes (PU). The secondary (cognitive) transmitter is combining Beamforming with Orthogonal Space-Time Block Coding (BOSTBC) and operates under Quality-of-Service (QoS) constraints that must be guaranteed for the Primary Receivers (PURx). The cognitive link...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    Anytime Reliability of Systematic LDPC Convolutional Codes

    The authors propose a LDPC Convolutional Code ensemble together with an expanding-window message-passing decoder that asymptotically have anytime properties when used for streaming transmission on the binary erasure channel. They show analytically that the decoding erasure probability of these codes decays exponentially over decoding delay and determine the corresponding anytime...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    Design of Green Optical Networks With Signal Quality Guarantee

    Energy consumption of communication networks is growing very fast due to the rapidly increasing traffic demand. Consequently, design of green communication networks gained a lot of attention. In this paper, the authors focus on optical Wavelength Division Multiplexing (WDM) networks, able to support this growing traffic demand. Several Energy-Aware Routing...

    Provided By KTH - Royal Institute of Technology

  • White Papers // May 2012

    Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications

    Distributed processing through ad hoc and sensor networks is having a major impact on scale and applications of computing. The creation of new cyber-physical services based on wireless sensor devices relies heavily on how well communication protocols can be adapted and optimized to meet quality constraints under limited energy resources....

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2012

    Energy-Efficient Deadline-Constrained Maximum Reliability Forwarding in Lossy Networks

    This paper studies the problem of optimal forwarding for reliable and energy-efficient real-time communication over lossy networks. The authors impose a strict per-packet latency bound and develop forwarding policies that maximize the probability that the packet is delivered within the specified deadline minus a transmission energy cost. A solution to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2012

    Modular Design of Jointly Optimal Controllers and Forwarding Policies for Wireless Control

    The authors consider the joint design of forwarding policies and controllers for wireless control loops where sensor measurements are sent over an unreliable multi-hop wireless network to the controller node. For fixed sampling rate of the control loop, the co-design problem separates into two well-defined and independent sub-problems: transmission scheduling...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2012

    Performance Analysis and Optimization of the Joining Protocol for a Platoon of Vehicles

    Platooning of vehicles allows to saving energy and increasing safety provided that there are reliable wireless communication protocols. In this paper, the optimization of the Medium Access Control (MAC) protocol based on IEEE 802.11e for the platoon joining is investigated. The exchange of prosperous dynamic information among vehicles through certain...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2012

    A List of Maximum Period NLFSRs

    Non-Linear Feedback Shift Registers (NLFSRs) are a generalization of Linear Feedback Shift Registers (LFSRs) in which a current state is a nonlinear function of the previous state. While the theory behind LFSRs is well-understood, many fundamental problems related to NLFSRs remain open. Probably the most important one is finding a...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2012

    State-Space Feedback Control for Elastic Distributed Storage in a Cloud Environment

    Elasticity in Cloud computing is an ability of a system to scale up and down (request and release resources) in response to changes in its environment and workload. Elasticity can be achieved manually or automatically. Efforts are being made to automate elasticity in order to improve system performance under dynamic...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2004

    Human Capital Development and Competence Structures in Changing Media Production Environments

    This doctoral paper discusses the competence structures and the development of human capital in the graphic arts and media sector. The study has focused on exploring the new media landscape and in particular the structural changes that influence the sector, the print-versus electronic-media debate and the future of print media....

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2009

    A Cross-Layer Protocol for Wireless Sensor Networks in Control and Automation

    Control applications over Wireless Sensor Networks (WSNs) require timely, reliable, and energy efficient communications. Cross layer interaction is an essential design paradigm to exploit the complex interaction among the layers of the protocol stack and reach a maximum efficiency. Such a design approach is challenging because reliability and latency of...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2009

    MAC Protocol Engine for Sensor Networks

    This paper presents a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based on two steps: First the application specifications (such as network topology and packet generation rate), the requirements for energy consumption, delay...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2009

    CryptoNET: Integrated Secure Workstation

    In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2009

    Live Migration of Virtual Machines: Sustaining Active TCP-Sessions

    Virtualization and the technology associated with it, has attracted quite a lot of attention during the past years. As of 2009, it is estimated that the market for virtualized X86 server solutions will be worth in the vicinity of $1.8 Billion. So far, the main advantages presented by virtual solution...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2010

    An Approach to Network Security Assessment Based on Probalistic Relational Models

    To assist rational decision making regarding network security improvements, decision makers need to be able to assess weaknesses in existing or potential new systems. This paper presents a model based assessment framework for analyzing the network security provided by different architectural scenarios. The framework uses a probabilistic relational model to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2010

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power ows. The estimators are often located in control centers, to...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2010

    Group Message Authentication

    Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the signer. However, despite intensive research in the past years, there is still no fully satisfactory implementation of group signatures in the plain model. The...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jul 2010

    HetMoC: Heterogeneous Modelling in SystemC

    The authors propose a novel Heterogeneous Model-of-Computation (HetMoC) framework in SystemC for embedded computing systems. As the main contribution, they formally define the computation and communication in multiple domains (continuous-time, discrete-event, synchronous/reactive, and untimed) as polymorphic processes and signals, and present domain interfaces to integrate different domains together for heterogeneous...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2010

    Scalability of Weak Consistency in NoC Based Multicore Architectures

    In Multicore Network-on-Chip, it is preferable to realize Distributed but Shared Memory (DSM) in order to reuse the huge amount of legacy code. Within DSM systems, memory consistency is a critical issue since it affects not only performance but also the correctness of programs. In this paper, the authors investigate...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2010

    Inter-Process Communication Using Pipes in FPGA-Based Adaptive Computing

    In FPGA-based adaptive computing, Inter-Process Communications (IPC) are required to exchange information among hardware processes which time-multiplex the resources in a same reconfigurable region. In this paper, the authors use pipes for IPC and analyze the performance in terms of throughput, throughput efficiency and latency in switching contexts. They also...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2010

    Supporting Efficient Synchronization in Multi-Core NoCs Using Dynamic Buffer Allocation Technique

    This paper explores a dynamic buffer allocation technique to guide distributed synchronization architecture to support efficient synchronization on multi-core Network-on-Chips (NoCs). The synchronization architecture features two physical buffers to be able to concurrently queue and handle synchronization requests issued by the local processor and remote processors via the on-chip network....

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jun 2010

    A Worst Case Performance Model for TDM Virtual Circuit in NoCs

    In Network-on-Chip (NoC), Time-Division-Multiplexing (TDM) Virtual Circuit (VC) is well recognized as being capable to provide guaranteed services in both latency and bandwidth. The authors propose a method of modeling TDM based VC by using Network Calculus. They derive a tight upper bound of end-to-end delay and buffer requirement for...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jul 2010

    Handling Shared Variable Synchronization in Multi-Core Network-on-Chips With Distributed Memory

    Parallelized shared variable applications running on multi-core Network-on-Chips (NoCs) require efficient support for synchronization, since communication is on the critical path of system performance and contended synchronization requests may cause large performance penalty. In this paper, the authors propose a dedicated hardware module for synchronization management. This module is called...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jul 2010

    FoN: Fault-on-Neighbor Aware Routing Algorithm for Networks-on-Chip

    Reliability has become a key issue of Networks-on-Chip (NoC) as the CMOS technology scales down to the nanoscale domain. This paper proposes a Fault-on-Neighbor (FoN) aware deflection routing algorithm for NoC which makes routing decision based on the link status of neighbor switches within 2 hops to avoid fault links...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2010

    Reducing FPGA Reconfiguration Time Overhead Using Virtual Configurations

    Reconfiguration time overhead is a critical factor in determining the system performance of FPGA dynamically reconfigurable designs. To reduce the reconfiguration overhead, the most straightforward way is to increase the reconfiguration throughput, as many previous contributions did. In addition to shortening FPGA reconfiguration time, the authors introduce a new concept...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2010

    Run-Time Partitioning of Hybrid Distributed Shared Memory on Multi-Core Network-on-Chips

    On multi-core Network-on-Chips (NoCs), memories are preferably distributed and supporting Distributed Shared Memory (DSM) is essential for the sake of reusing huge amount of legacy code and easy programming. However, the DSM organization imports the inherent overhead of translating virtual memory addresses into physical memory addresses, resulting in negative performance....

    Provided By KTH - Royal Institute of Technology

  • White Papers // Apr 2010

    Entrepreneurship, Innovation And Economic Growth - Past Experience, Current Knowledge And Policy Implications

    Considerable advances, even breakthroughs, have been made during the last decades in the authors' understanding of the relationship between knowledge and growth on one hand, and entrepreneurship and growth on the other. Similarly, more profound insights have also been gained as to how entrepreneurship, innovation and knowledge are interrelated. Yet,...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2010

    Large Firm Dynamics On The Nordic-Baltic Scene Implications For Innovation And Growth

    This paper investigates the role of the 30 largest firms in the respective Nordic country and in Estonia over the last decade and for some variables between 1975 to 2006. The analysis confirms that the largest firms play a critically important role for industrial dynamics in the Nordic countries. Statistics...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2009

    Market Experiences And Export Decisions In Heterogeneous Firms

    This empirical analysis focus on the impact of firm characteristics, firms' export experiences and location-specific variables on export decisions in Swedish manufacturing firms. Three choices of export market participation are considered: permanent export, occasional export and no export. The paper also analyzes firms' choice of expanding export activities. The empirical...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2009

    Internal Finance And Patents - Evidence From Firm-level Data

    The authors find that internal finance resources at the firm-level, measured by cash flow, play a non-trivial role for the number of patent applications, even after controlling for the standard variables of a patent study. The results are based on estimating panel count-data models on a sample of 2,700 Swedish...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Limitations of Robust Control Over WSN: UFAD Control in Intelligent Buildings

    Intelligent buildings ventilation control is a challenging automation problem with objectives that rise several research problems of immediate actuality, such as the wireless automation and the control of complex interconnected subsystems. The system considered is composed of ventilated rooms, fans, plenums and a wireless network. The complexity arises from the...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jan 2011

    Wireless Networked Control System Co-Design

    A framework for the joint design of wireless network and controllers is proposed. Multiple control systems are considered where the sensor measurements are transmitted to the controller over the IEEE 802.15.4 protocol. The essential issues of wireless Networked Control Systems (NCSs) are investigated to provide an abstraction of the wireless...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Sep 2009

    Protocol Design for Control Applications Using Wireless Sensor Networks

    Given the potential benefits offered by Wireless Sensor Networks (WSNs), they are becoming an appealing technology for process, manufacturing, and industrial control applications. In this paper, the authors propose a novel approach to WSN protocol design for control applications. The protocols are designed to minimize the energy consumption of the...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Adaptive IEEE 802.15.4 Protocol for Reliable and Timely Communications

    The authors present an adaptive Medium Access Control (MAC) design for minimizing the power consumption while guaranteeing reliability and delay constraints, which is developed for the slotted IEEE 802.15.4 standard. By considering the Bianchi's MAC model, they present a generalized Markov chain model and the usage of MAC model in...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2010

    Accurate Delay Analysis of Slotted IEEE 802.15.4 for Control Applications

    To understand the fundamental performance limits and the quality of service offered by the IEEE 802.15.4 standard for control applications, the packet delay distribution plays a major role. Due to the random backoff mechanism employed by the IEEE 802.15.4 medium access protocol (MAC), it is difficult to derive such a...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Aug 2010

    Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks

    An energy-efficient, reliable and timely data transmission is essential for Wireless Sensor Networks (WSNs) employed in scenarios where plant information must be available for control applications. To reach a maximum efficiency, cross layer interaction is a major design paradigm to exploit the complex interaction among the layers of the protocol...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2010

    SIP-Based Context Distribution: Does Aggregation Pay Off?

    Context-aware applications need quickly access to current context information, in order to adapt their behavior before this context changes. To achieve this, the context distribution mechanism has to timely discover context sources that can provide a particular context type, then acquire and distribute context information from these sources to the...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Labor Mobility, Knowledge Diffusion And Regional Growth

    This paper investigates the relationship between inter-firm labor mobility and regional productivity growth. Previous studies have shown that density is positively correlated with growth. The author claims that it is not density in itself, but rather the attributes associated with it that drives economic growth. One such attribute is the...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Jun 2010

    Financial Crises And European Regulatory Frameworks

    The current crisis in the financial system has resulted in many calls for approaches to the handling of financial service firms in crisis. Crises in the financial system are not a new phenomenon - some 93 countries have experienced crises in their financial systems since the 1970s - but even...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Oct 2009

    A Reconfigurable Design Framework for FPGA Adaptive Computing

    Partial Reconfiguration (PR) offers the possibility to adaptively change part of the FPGA design without stopping the remaining system. In this paper, the authors present a comprehensive framework for adaptive computing, in which design key points of hardware processes, system interconnections, Operating Systems (OS), device drivers, scheduler software as well...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Scalability of Relaxed Consistency Models in NoC Based Multicore Architectures

    This paper studies realization of relaxed memory consistency models in the network-on-chip based Distributed Shared Memory (DSM) multi-core systems. Within DSM systems, memory consistency is a critical issue since it affects not only the performance but also the correctness of programs. The authors investigate the scalability of the relaxed consistency...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Optimal Regulation of Traffic Flows in Networks-on-Chip

    Integrating IPs into a SoC infrastructure presents challenges because traffic flows from IPs are diverse and typically have stringent performance constraints; the impact of interferences among traffic flows is hard to analyze; due to the cost and power constraint, buffers in the SoC infrastructure must not be over-dimensioned while still...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Pareto Efficient Design for Reconfigurable Streaming Applications on CPU/FPGAs

    The authors present a Pareto efficient design method for multi-dimensional optimization of run-time reconfigurable streaming applications on CPU/FPGA a platform, which automatically allocates applications with optimized buffer requirement and software/hardware implementation cost. At the same time, application performance is guaranteed with sustainable throughput during run-time reconfigurations. As the main contribution,...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    FPGA-Based Adaptive Computing for Correlated Multi-Stream Processing

    In conventional static implementations for correlated streaming applications, computing resources may be inefficiently utilized since multiple stream processors may supply their sub-results at asynchronous rates for result correlation or synchronization. To enhance the resource utilization efficiency, the authors analyze multi-streaming models and implement an adaptive architecture based on FPGA Partial...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Nov 2009

    Supporting Distributed Shared Memory on Multi-Core Network-on-Chips Using a Dual Microcoded Controller

    Supporting Distributed Shared Memory (DSM) is essential for multi-core Network-on-Chips for the sake of reusing huge amount of legacy code and easy programmability. The authors propose a microcoded controller as a hardware module in each node to connect the core, the local memory and the network. The controller is programmable...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2010

    Theorem Proving Techniques for the Formal Verification of NoC Communications With Non-Minimal Adaptive Routing

    This paper focuses on the formal verification of communications in Networks on Chip. The authors describe how an enhanced version of the GeNoC proof methodology has been applied to the Nostrum NoC which encompasses various non-trivial features such as a deflective non-minimal routing algorithm. They demonstrate how the features of...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2011

    Multi-Path Routing Metrics for Reliable Wireless Mesh Routing Topologies

    Several emerging classes of applications that run over wireless networks have a need for mathematical models and tools to systematically characterize the reliability of the network. The authors propose two metrics for measuring the reliability of wireless mesh routing topologies, one for flooding and one for unicast routing. The Flooding...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Mar 2011

    On Designing Optimal Servomechanism Controller With Limited Model Information

    The family of limited model information designs, which construct controllers by accessing the plant's model in a constrained manner, is introduced in this paper. The closed-loop constant-disturbance rejection performance of the best Proportional-Integral (PI) controller that they can produce is investigated. For a class of linear discrete-time time-invariant plants, it...

    Provided By KTH - Royal Institute of Technology

  • White Papers // Dec 2009

    Constrained Global Scheduling of Streaming Applications on MPSoCs

    The authors present a global scheduling framework for Synchronous Data Flow (SDF) streaming applications on MPSoCs, based on optimized computation and contention-free routing. The global scheduling of processors computing and communication transactions are formulated as constraint based problem, to avoid the scheduling overhead in TDMA-like heuristic schemes. A public domain...

    Provided By KTH - Royal Institute of Technology