Springer Healthcare

Displaying 1-40 of 647 results

  • White Papers // Jun 2014

    Dual-Access Way-Prediction Cache for Embedded Systems

    Way-Prediction (WP) caches have advantages of reducing power consumption and latency for highly associative data caches and thus are favorable for embedded systems. In this paper, the authors propose an enhanced way-prediction cache, Dual-Access Way-Prediction (DAWP) cache, to cope with the weakness of the WP cache. The prediction logic designed...

    Provided By Springer Healthcare

  • White Papers // Apr 2014

    Evaluation Methodology for Data Communication-Aware Application Partitioning

    Heterogeneous multicore architectures appear to be a promising solution to the ever-increasing computational demands of applications in embedded as well as high-performance computing domains. Nevertheless, inefficient application partitioning for such systems may result in a considerable reduction in the anticipated performance improvement. Consequently, proper mechanisms are required to evaluate quality...

    Provided By Springer Healthcare

  • White Papers // Mar 2014

    Hierarchical Approach to Optimization of Parallel Matrix Multiplication on Large-Scale Platforms

    Many state-of-the-art parallel algorithms, which are widely used in scientific applications executed on high-end computing systems, were designed in the twentieth century with relatively small-scale parallelism in mind. Indeed, while in 1990s a system with few hundred cores was considered a powerful supercomputer; modern top supercomputers have millions of cores....

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    DynTunKey: A Dynamic Distributed Group Key Tunneling Management Protocol for Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. Due to the sensitive nature of the data transmitted by these applications, appropriate protection mechanisms are needed to prevent attackers from exploiting the weaknesses of the radio links. In this paper,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    ADLU: A Novel Anomaly Detection and Location-Attribution Algorithm for UWB Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises,...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    Big Data: A Survey

    In this paper, the authors review the background and state-of-the-art of big data. They first introduce the general background of big data and review related technologies, such as could computing, Internet of Things, data centers, and Hadoop. They then focus on the four phases of the value chain of big...

    Provided By Springer Healthcare

  • White Papers // Jan 2014

    InterCloud RAIDer: A Do-It-Yourself Multi-Cloud Private Data Backup System

    In this paper, the authors introduce InterCloud RAIDer, which realizes a multi-cloud private data backup system by composing a data deduplication technique to reduce the overall storage overhead, erasure coding to achieve redundancy at low overhead, which is dispersed across multiple cloud services to realize fault-tolerance against individual service providers,...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    A Decision Framework for Placement of Applications in Clouds That Minimizes Their Carbon Footprint

    Cloud computing gives users much freedom on where they host their computation and storage. However, the CO2 emission of a job depends on the location and the energy efficiency of the data centers where it is run. The authors developed a decision framework that determines to move computation with accompanying...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    An Improved Task Assignment Scheme for Hadoop Running in the Clouds

    Now-a-days, data-intensive problems are so prevalent that numerous organizations in various industries have to face them in their business operation. It is often crucial for enterprises to have the capability of analyzing large volumes of data in an effective and timely manner. MapReduce and its open-source implementation Hadoop dramatically simplified...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Data Management in Cloud Environments: NoSQL and NewSQL Data Stores

    Advances in web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This paper focuses on the storage aspect of cloud computing, specifically on data...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Service Selection in Web Service Compositions Optimizing Energy Consumption and Service Response Time

    A challenging task in web service composition is the runtime binding of a set of interconnected abstract services to concrete ones. This question, formulated as the service selection problem, has been studied in the area of service compositions implementing business processes. Despite the abundance of work on this topic, few...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Catching Modern Botnets Using Active Integrated Evidential Reasoning

    Botnets are now recognized as one of the major security threats to start various security attacks (e.g., spamming, DDoS). Although substantial research has been done towards botnet detection, it is becoming much more difficult today, especially for highly polymorphic, intelligent and stealthy modern botnets. Traditional botnet detection (e.g., signature, anomaly...

    Provided By Springer Healthcare

  • White Papers // Dec 2013

    Agile Methods for Embedded Systems Development - A Literature Review and a Mapping Study

    There is a wide area of applications that use embedded systems, and the number of such systems keeps growing. The required functionality and complexity of embedded systems are also constantly increasing, and development of such products is becoming increasingly harder. This requires new thinking on the product development processes, and...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    An Elastic Virtual Infrastructure for Research Applications (ELVIRA)

    Cloud computing infrastructures provide a way for researchers to source the computational and storage resources they require to conduct their work and to collaborate within distributed research teams. The authors provide an overview of a cloud-based elastic virtual infrastructure for research applications that they have established to provide researchers with...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Towards Full Network Virtualization in Horizontal IaaS Federation: Security Issues

    Horizontal IaaS federation exploits datacenter for federation of IaaS provider by supplying virtual nodes (e.g. virtual machines, virtual switches, and virtual routers) and virtual links. Today's datacenters for cloud computing do not supply full network virtualization in terms of user-level network management and user-agreed network topology. The datacenters lack the...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Securing Cloud Using Third Party Threaded IDS

    Cloud computing is universal, staying anywhere in the world user can access the cloud applications. Mainly cloud computing will provide services to the users using Internet. Cloud storage services offer user-friendly, easily accessible and money-saving ways of storing and automatically backing up arbitrary data. These services are available on-demand on...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient and Highly Portable Deterministic Multithreading (DetLock)

    In this paper, the authors present DetLock, a runtime system to ensure deterministic execution of multithreaded programs running on multicore systems. DetLock does not rely on any hardware support or kernel modification to ensure determinism. For tracking the progress of the threads, logical clocks are used. Unlike previous approaches, which...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    A Survey on Securing the Virtual Cloud

    In this paper, the authors present a survey and analysis of the current security measures implemented in cloud computing and the hypervisors that support it. The viability of an efficient virtualization layer has led to an explosive growth in the cloud computing industry, exemplified by Amazon's Elastic Cloud, Apple's iCloud,...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    AppaaS: Offering Mobile Applications as a Cloud Service

    With the huge number of offerings in the mobile application market, the choice of mobile applications that best fit particular objectives is challenging. Therefore, there is a demand for a platform elevating the momentum of mobile applications that can adapt their behavior according to the user's context. This paper proposes...

    Provided By Springer Healthcare

  • White Papers // Nov 2013

    Efficient Parallel Spectral Clustering Algorithm Design for Large Data Sets Under Cloud Computing Environment

    Spectral clustering algorithm has proved be more effective than most traditional algorithms in finding clusters. However, its high computational complexity limits its effect in actual application. This paper combines the spectral clustering with MapReduce, through evaluation of sparse matrix Eigen-value and computation of distributed cluster, puts forward the improvement ideas...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Analytic Performance Modeling and Optimization of Live VM Migration

    Cloud computing is based on largely distributed virtual environments that provide Infrastructure-as-a-Service (IaaS) services to consumers allowing them to lease computing resources that scale to their needs. These services rely on virtualization as an important technology that facilitates dynamic resource management to meet Service Level Agreements (SLA) of disparate applications...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Linearly Homomorphic Structure-Preserving Signatures and their Applications

    Structure-Preserving Signatures (SPS) are signature schemes where messages, signatures and public keys all consist of elements of a group over which a bilinear map is efficiently computable. This property makes them useful in cryptographic protocols as they nicely compose with other algebraic tools (like the celebrated groth-sahai proof systems). In...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    Efficient Cryptosystems from 2k-th Power Residue Symbols

    In this paper, the authors introduced a new generalization of the cryptosystem. The so-obtained cryptosystems are shown to be secure under the quadratic residuosity assumption. Further, they enjoy a number of useful features including fast decryption, optimal ciphertext expansion, and homomorphic property. The authors believe that their proposal is the...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    An Agents and Artifacts Approach to Distributed Data Mining

    In this paper the authors propose a novel Distributed Data Mining (DDM) approach based on the agents and artifacts paradigm, as implemented in CArtAgO, where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to...

    Provided By Springer Healthcare

  • White Papers // Oct 2013

    A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

    Suppose that a set of multiple users uploads in every time period encrypted values of some data. The considered problem is how an untrusted data aggregator can compute the sum of all users' values but nothing more. However, as advocated by the authors, the proposed encryption scheme suffers from some...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Evaluating the Manageability of Web Browsers Controls

    The proliferation of Smartphone's has introduced new challenges in web browsing security. These devices often have limited resources and small size, which may limit the security 'Arsenal' of their user. This, however, does not seem to deter Smartphone users from accessing the Web via their devices. On the same time,...

    Provided By Springer Healthcare

  • White Papers // Sep 2013

    Federated Authorization for Software-as-a-Service Applications

    Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to control access to data that are located at the provider based on tenant-specific access control policies. To...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    A UHF/UWB Hybrid Silicon RFID Tag With on - Chip Antennas

    In this paper, the authors describe and analyze a miniature wireless Radio Frequency IDentification (RFID) chip with On-Chip Antennas (OCA) and Ultra WideBand (UWB) signaling by real-world measurements. With the on-chip antenna approach, no external antennas are required, and the size of the overall tag is identical to the size...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Formal Analysis of Memory Contention in a Multiprocessor System

    Multi-core processors along with multi-module memories are extensively being used in high performance computers these days. One of the main performance evaluation metrics in such configurations is the memory contention problem and its effect on the overall memory access time. Usually, this problem is analyzed using simulation or numerical methods....

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Trend Mining in Dynamic Attributed Graphs

    Many applications see huge demands of discovering important patterns in dynamic attributed graph. In this paper, the authors introduce the problem of discovering trend sub-graphs in dynamic attributed graphs. This new kind of pattern relies on the graph structure and the temporal evolution of the attribute values. Several interestingness measures...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Towards Cross-Layer Monitoring of Multi-Cloud Service-Based Applications

    Cloud computing is becoming a popular platform to deliver Service-Based Applications (SBAs) based on Service-Oriented Architecture (SOA) principles. Monitoring the performance and functionality of SBAs deployed on multiple cloud providers (in what is also known as multi-cloud setup) and adapting them to variations/events produced by several layers (infrastructure, platform, application,...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    HybridPlan: A Capacity Planning Technique for Projecting Storage Requirements in Hybrid Storage Systems

    Economic forces, driven by the desire to introduce flash into the high-end storage market without changing existing software-base, have resulted in the emergence of Solid-State Drives (SSDs), flash packaged in HDD form factors and capable of working with device drivers and I/O buses designed for HDDs. Unlike the use of...

    Provided By Springer Healthcare

  • White Papers // Aug 2013

    Service Models and Pricing Schemes for Cloud Computing

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. To ensure large-scale adoption of cloud computing by businesses, several challenges including security, privacy, trust, performance and other quality attributes need to be addressed. Also, as with other utility services, adequate...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Why Are Business Processes Not Secure?

    Security is simple to understand but hard to ensure. In the times of Internet, this task has been becoming harder every day. To date, computer science has not solved how to prevent the misuse of business processes. While data objects can be protected, a process cannot. The reason is the...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    A DDS-Based Middleware for Scalable Tracking, Communication and Collaboration of Mobile Nodes

    Applications such as transportation management and logistics, emergency response, environmental monitoring and mobile workforce management employ mobile networks as a means of enabling communication and coordination among a possibly very large set of mobile nodes. The majority of those systems may thus require real-time tracking of the nodes and interaction...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    A Fault Tolerant Hierarchical Network on Chip Router Architecture

    Continuing advances in the processing technology, along with the significant decreases in the feature size of integrated circuits lead to increases in susceptibility to transient errors and permanent faults. Network-on-Chips (NoCs) have come to address the demands for high bandwidth communication among processing elements. The structural redundancy inherited in NoC-based...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Honey, I Shrunk the Cube

    Information flooding may occur during an OLAP session when the user drills down her cube up to a very fine-grained level, because the huge number of facts returned makes it very hard to analyze them using a pivot table. To overcome this problem the authors propose a novel OLAP operation,...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets

    Outlier detection has gained considerable interest in several fields of research including various sciences, medical diagnosis, fraud detection, and network intrusion detection. Most existing techniques are either distance based or density based. In this paper, the authors present an effective Reference point based Outlier Detection for Large Datasets technique (RODD)...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Heterogeneous Resource Federation With a Centralized Security Model for Information Extraction

    With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and computation resources capable of processing large amounts of data to allow ad-hoc co-operation becomes ever more important. Unfortunately different communities often...

    Provided By Springer Healthcare

  • White Papers // Jul 2013

    Use of Compiler Optimization of Software Bypassing as a Method to Improve Energy Efficiency of Exposed Data Path Architectures

    In the design of embedded systems, hardware and software need to be co-explored together to meet targets of performance and energy. With the use of application-specific instruction-set processors, as a stand-alone solution or as a part of a system on chip, the customization of processors for a particular application is...

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    A Novel Algorithm for Associative Classification

    Associative classifiers have been the subject of intense research for the last few years. Experiments have shown that they generally result in higher accuracy than decision tree classifiers. In this paper, the authors introduce a novel algorithm for associative classification "Classification based on Association Rules Generated in a Bidirectional Approach"...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-Radio Wireless Networks

    Due to users' fast-growing demands, wireless spectrum is becoming a more and more scarce resource. However, the state of spectrum usage shows that while large chunks of spectrum are left idle at many places, many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    AMPLE: A Novel Incentive Approach to Adaptive-Width Channel Allocation in Multi-Hop, Non-Cooperative Wireless Networks

    Due to the limitation of radio spectrum resource and fast deployment of wireless devices, careful channel allocation is of great importance for mitigating the performance degradation caused by interference among different users in wireless networks. Most of existing work focused on fixed-width channel allocation. However, latest researches have demonstrated that...

    Provided By Springer Healthcare

  • White Papers // Aug 2012

    Exploiting Spectrum Spatial Reusability for Routing in Multi-Hop Wireless Networks

    Routing metrics are essential to achieve a good end-to-end throughput on a min-cost path in multi-hop wireless networks. Originally, most routing algorithms were based on min-hop count metric. Then link-quality aware metrics, ETX and ETT, are proposed. After that, the emergence of opportunistic and any-path routing, leads to metrics such...

    Provided By Springer Healthcare

  • White Papers // Jun 2011

    A Chaotic Encryption Scheme for Real-Time Embedded Systems: Design and Implementation

    Chaotic encryption schemes are believed to provide greater level of security than conventional ciphers. In this paper, a chaotic stream cipher is first constructed and then its hardware implementation details over Xilinx Virtex- 6 FPGA are provided. Logistic map is the simplest chaotic system and has high potential to be...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Fault-Tolerant Relay Deployment Based on Length-Constrained Connectivity and Rerouting Centrality in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are prone to failures. To be robust to failures, the network topology should provide alternative routes to the sinks so when failures occur the routing protocol can still offer reliable delivery. The authors define l-CRC, a new centrality index which measures a node's importance to connectivity...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Snapshot Centrality Indices in Dynamic FIFO Networks

    The paper introduces the concept of snapshot dynamic indices as centrality measures to analyze how the importance of nodes changes over time in dynamic networks. In particular, the dynamic stress-snapshot and dynamic betweenness snapshot are investigated. The authors present theoretical results on dynamic shortest paths in first-in first-out dynamic networks,...

    Provided By Springer Healthcare

  • White Papers // Jul 2011

    A Survey of Visual Sensor Network Platforms

    Recent developments in low-cost CMOS cameras have created the opportunity of bringing imaging capabilities to sensor networks. Various visual sensor platforms have been developed with the aim of integrating visual data to wireless sensor applications. This paper is to survey current visual sensor platforms according to in-network processing and compression/coding...

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    Service Concentration Node in Internet Multimedia Subsystem (IMS)

    Convergence of the cellular world to an all-IP domain has stimulated the development of Internet Multimedia Subsystem (IMS) service architecture, which is touted by service providers and vendors as the next generation solution for breaking the barriers not only between cellular and IP worlds, but also between wireline and wireless...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Energy-Efficient Thermal-Aware Autonomic Management of Virtualized HPC Cloud Infrastructure

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency and utilization of datacenter resources, and minimizing undesired thermal behavior while ensuring application performance and other Quality of Service (QoS) guarantees for HPC...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Analysis of Analog Network Coding Based Two-Way Amplify-and-Forward System in Mixed Rician and Nakagami-m Fading Environment

    This paper presents the performance analysis of analog network coding-based two-way amplify-and-forward relaying under mixed Rician and Nakagami-m fading environment. Closed form expressions for both the cumulative distribution function and probability distribution function of the instantaneous end-to-end SNR are derived. Using those, the closed form expressions for the first moment,...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Handoff Management in Communication-Based Train Control Networks Using Stream Control Transmission Protocol and IEEE 802.11p WLANs

    Communication-Based Train Control (CBTC) network is an automated control network for railways that ensures the safe operation of rail vehicles using data communications. CBTC networks have stringent requirements for communication availability and latency. Wireless Local Area Network (WLAN) is a popular choice in CBTC networks due to the available commercial-off-the-shelf...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Systematic Raptor Codes for Safety Broadcast in an Unsaturated Vehicular Highway Environment

    Active safety broadcast is one of the most fundamental services in intelligent transportation systems. The repetition code proposed in Wireless Access for Vehicular Environment (WAVE) standard is inefficient in realistic channel conditions and rapidly changing network topologies. In this paper, the authors propose the use of systematic raptor codes as...

    Provided By Springer Healthcare

  • White Papers // Jul 2012

    Performance Evaluation of Multiple-Antenna IEEE 802.11p Transceivers Using an FPGA-Based MIMO Vehicular Channel Emulator

    The IEEE 802.11p standard has been optimized for low-delay small-bandwidth wireless communications to provide vehicular safety services. However, IEEE 802.11p transceivers can considerably improve their robustness by incorporating MIMO transmission methods. Moreover, multiple antennas can also be used to increase the data transfer rate of IEEE 802.11p transceivers, a requirement...

    Provided By Springer Healthcare

  • White Papers // Mar 2010

    A Novel Frequency Planning for Femtocells in OFDMA-Based Cellular Networks Using Fractional Frequency Reuse

    Femtocells are expected to be one of the emerging technologies for next generation communication systems. For successful deployment of femtocells in the pre-existing macrocell networks, there are some challenges such as the cell planning for interference management, handoff, and power control. In this paper, the authors focus on frequency planning...

    Provided By Springer Healthcare

  • White Papers // Nov 2011

    Resource Allocation With Partitioning Criterion for Macro-Femto Overlay Cellular Networks With Fractional Frequency Reuse

    The interference mitigation technique based on Fractional Frequency Reuse (FFR) provides improved cell-edge performance with similar overall cell capacity as that of systems with the frequency reuse factor of one. Furthermore, frequency sub-band allocation by FFR has the benefit of allowing flexibility for the deployment of femto-cells through frequency partitioning....

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Algorithmic Aspects of Risk Management

    Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In contrast, the authors use risk computation to drive changes in an operating system's security configuration. This allows risk management to occur in...

    Provided By Springer Healthcare

  • White Papers // Feb 2012

    Selections: Internet Voting With Over-the Shoulder Coercion-Resistance

    The present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. The authors say a system provides over-the-shoulder coercion resistance if a voter can undetectably avoid complying with an...

    Provided By Springer Healthcare

  • White Papers // Mar 2010

    A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search

    For nearest neighbor search, a user queries a server for nearby Points Of Interest (POIs) with his/her location information. The authors' aim is to protect the user's sensitive information against adversaries including the location-based service itself. Most research efforts have elaborated on reasonable trade-offs between privacy and utility. Their propose...

    Provided By Springer Healthcare

  • White Papers // Mar 2009

    A Protocol for Secure Remote Updates of FPGA Configurations

    The authors present a security protocol for the remote update of volatile FPGA configurations stored in non-volatile memory. Their approach can be implemented on existing FPGAs, as it sits entirely in user logic. Their protocol provides for remote attestation of the running configuration and the status of the upload process....

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    A Multi-Objective and Hierarchical Exploration Tool for SoC Performance Estimation

    What makes design of embedded systems highly challenging is the fact that besides presenting a complex functionality, these systems have to comply with ever more severe non-functional constraints in various dimensions. In this paper, the authors present a flexible performance estimation tool called Nessie developed to provide System-on-Chip (SoC) designers...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    Integrated Instruction Scheduling and Fine-Grain Register Allocation for Embedded Processors

    For embedded systems, both speed improvement and code size reduction are important goals of an optimizing compiler. An efficient instruction scheduling is necessary for fast execution while an intelligent register allocator is required for code size reduction. Instruction scheduling and register allocation make a significant impact on each other. Therefore,...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    Preventing Denial-of-Service Attacks in Shared CMP Caches

    Denial-of-Service (DoS) attacks try to exhaust some shared resources (e.g. process tables, functional units) of a service-centric provider. As Chip Multi-Processors (CMPs) are becoming mainstream architecture for server class processors, the need to manage on-chip resources in a way that can provide QoS guarantees becomes a necessity. Shared resources in...

    Provided By Springer Healthcare

  • White Papers // Jul 2008

    An Architecture and Protocol for the Management of Resources in Ubiquitous and Heterogeneous Systems Based on the SVP Model of Concurrency

    In this paper, the authors propose a novel hierarchical architecture and resource-management protocol for the delegation of work within a ubiquitous and heterogeneous environment. The protocol is based on serving an SVP place, where a component of work is delegated together with the responsibility for meeting any non-functional computational requirements...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    An Optimization Methodology for Memory Allocation and Task Scheduling in SoCs Via Linear Programming

    Applications for system on chips become more and more complex. Also the number of available components (DSPs, ASICs, Memories, etc.) rises continuously. These facts necessitate a structured method for selecting components, mapping applications and evaluating the chosen configuration and mapping. In this paper, the authors present a methodology for the...

    Provided By Springer Healthcare

  • White Papers // Oct 2009

    An Experimental Analysis of Joost Peer-to-Peer VoD Service

    Despite strong interest in Peer-To-Peer (P2P) Video-on-Demand (VoD) services, existing studies mostly focus on peer-to-peer or overlay protocol design based on simulations under various topological constraints. The authors believe experimental studies on a real-life P2P VoD system will provide valuable information to ISPs, network administrators, and content owners. In this...

    Provided By Springer Healthcare

  • White Papers // Nov 2008

    A Cross-Layer Approach for Improving TCP Performance in Mobile Environments

    Network-layer mobility protocols have been developed to keep continuous connectivity for mobile hosts while transparent to the higher layers. However, Due to its distinct characteristics of different from traditional TCP/IP environment, mobility poses substantial impacts on TCP performance in mobile environments. This paper proposes a new cross-layer approach, by introducing...

    Provided By Springer Healthcare

  • White Papers // Sep 2011

    Decoupled Power Allocation Through Pricing on a CDMA Reverse Link Shared by Energy-Constrained and Energy-Sufficient Data Terminals

    The authors perform market-oriented management of the reverse link of a CDMA cell populated by data terminals, each with its own data rate, channel gain, willingness to pay (wtp), and link-layer configuration, and with energy supplies that are limited for some, and inexhaustible for others. For both types of energy...

    Provided By Springer Healthcare

  • White Papers // Dec 2011

    Synchronization Analysis for Wireless TWRC Operated With Physical-Layer Network Coding

    Physical-layer Network Coding (PNC) makes use of the additive nature of the electromagnetic waves to apply network coding arithmetic at the physical layer. With PNC, the destructive effect of interference in wireless networks is eliminated and the capacity of networks can be boosted significantly. This paper addresses a key outstanding...

    Provided By Springer Healthcare

  • White Papers // Sep 2010

    Solving the Multi-Dimensional Multi-Choice Knapsack Problem With the Help of Ants

    In this paper, the authors have proposed two novel algorithms based on Ant Colony Optimization (ACO) for finding near-optimal solutions for the Multi-dimensional Multi-choice Knapsack Problem (MMKP). MMKP is a discrete optimization problem, which is a variant of the classical 0-1 Knapsack Problem and is also an NP-hard problem. Due...

    Provided By Springer Healthcare

  • White Papers // Aug 2010

    A Case Study on Measuring Statistical Data in the Tor Anonymity Network

    The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its large user-base has made it attractive for researchers to analyze usage of a real deployed anonymity network. The recent growth of the network...

    Provided By Springer Healthcare

  • White Papers // Oct 2008

    Byzantine Consensus With Unknown Participants

    Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being widely studied in the context of classical networks, few studies have been conducted in order to solve it in the context of dynamic...

    Provided By Springer Healthcare

  • White Papers // Dec 2010

    CUDACS: Securing the Cloud With CUDA-Enabled Secure Virtualization

    While on the one hand unresolved security issues pose a barrier to the widespread adoption of cloud computing technologies, on the other hand the computing capabilities of even commodity HW are boosting, in particular thanks to the adoption of -core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA)...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    Stochastic Modeling and Analysis Using QPME: Queueing Petri Net Modeling Environment V2.0

    Queueing Petri nets are a powerful formalism that can be exploited for modeling distributed systems and analyzing their performance and scalability. By combining the modeling power and expressiveness of queueing networks and stochastic Petri nets, queueing Petri nets provide a number of advantages. In this paper, the authors present their...

    Provided By Springer Healthcare

  • White Papers // May 2012

    Nudge: Intermediaries' Role in Interdependent Network Security

    By employing an interdependent security game-theoretic framework, the authors study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. They discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies...

    Provided By Springer Healthcare

  • White Papers // Aug 2008

    Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By Springer Healthcare

  • White Papers // Oct 2012

    Capacity Maximization through Energy-Aware Multi-Mode Relaying

    In future wireless mobile networks, data rate and quality of service are expected to be comparable to those of wired deployments. To achieve this target, novel architectures must be adopted, successfully countering the disadvantages of the wireless transmission. Inspired by that, cooperative relaying was proposed because of the various gains...

    Provided By Springer Healthcare

  • White Papers // Jun 2012

    LISP-MN: Mobile Networking Through LISP

    The current internet architecture was not designed to easily accommodate mobility, because IP addresses are used both to identify and locate hosts. The Locator/Identifier Separation Protocol (LISP) decouples them by considering two types of addresses: EIDs that identify hosts, and RLOCs that identify network attachment points and are used as...

    Provided By Springer Healthcare

  • White Papers // Aug 2007

    Power Efficient Co-Simulation Framework for a Wireless Application Using Platform Based SoC

    To yield large-power saving of a target SoC, the designer should make analysis and optimization for power consumption in its early design stage. It can lead to fewer and faster design iterations with aggressive power consumption constraints. Reducing design turn-around-time while better exploring system-level constrains requires efficient and accurate analysis...

    Provided By Springer Healthcare

  • White Papers // Jul 2009

    Experiences with Cell-BE and GPU for Tomography

    Tomography is a powerful technique for three-dimensional imaging that deals with image reconstruction from a series of projection images, acquired along a range of viewing directions. An important part of any tomography system is the reconstruction algorithm. Iterative reconstruction algorithms have many advantages over non-iterative methods, yet their running time...

    Provided By Springer Healthcare