University of California, Davis

Displaying 1-40 of 74 results

  • White Papers // Feb 2014

    Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices

    The authors present a suite of efficient novel TFA protocols which improve upon password-only authentication by a factor of 2t with regards to both the online guessing attack and the offline dictionary attack. To argue the security of the presented protocols, they first provide a formal treatment of TFA schemes...

    Provided By University of California, Davis

  • White Papers // Jan 2014

    Hardware-Dependent Software Synthesis for Many-Core Embedded Systems

    In this paper, the authors present synthesis of Hardware dependent Software (HdS) for multicore and many-core designs using Embedded System Environment (ESE). ESE is a tool set, developed at UC Irvine, for transaction level design of multicore embedded systems. HdS synthesis is a key component of ESE backend design flow....

    Provided By University of California, Davis

  • White Papers // Jan 2014

    MPSoC Verification Using a Unified Random Program Approach

    In this paper, the authors discuss a simulation-based verification approach for Multi-Processor Systems-on-Chip (MPSoC) using a unified random program generator. Similar to design abstraction, they first explain the concept of verification abstraction. Then they analyze the typical bugs encountered in a MPSoC design and levels of verification abstraction at which...

    Provided By University of California, Davis

  • White Papers // Jan 2014

    Early Performance-Cost Estimation of Application-Specific Data Path Pipelining

    Application-Specific Processors (ASPs) are increasingly being adopted for optimized implementation of embedded systems. ASP design automation tools are, therefore, critical for meeting the time-to-market goals for ASP-based embedded systems. This paper targets the problem of determining the optimal data path pipeline configuration from a given application C code. The authors...

    Provided By University of California, Davis

  • White Papers // Sep 2013

    REMEDIATE: A Scalable Fault-tolerant Architecture for Low-Power NUCA Cache in Tiled CMPs

    Technology scaling and process variation severely degrade the reliability of Chip Multi-Processors (CMPs), especially their large cache blocks. To improve cache reliability, the authors propose REMEDIATE, a scalable fault-tolerant architecture for low-power design of shared Non-Uniform Cache Access (NUCA) cache in Tiled CMPs. REMEDIATE achieves fault-tolerance through redundancy from multiple...

    Provided By University of California, Davis

  • White Papers // Aug 2013

    ARGO: Aging-aware GPGPU Register File Allocation

    State-of-the-art General-Purpose Graphic Processing Units (GPGPUs) implemented in nanoscale CMOS technologies offer very high computational throughput for highly-parallel applications using hundreds of integrated on-chip resources. These resources are stressed during application execution, subjecting them to degradation mechanisms such as Negative Bias Temperature Instability (NBTI) that adversely affect their reliability. To...

    Provided By University of California, Davis

  • White Papers // Jun 2013

    A User-level Thread Library Built on Linux Context Functions for Efficient ESL Simulation

    Before the popular use of multiprocessor machines, user-level thread library is widely adopted in multithreading programs to handle multiple concurrent tasks in a time-slice manner. Currently QuickThreads library is widely used in the multi-threaded programs such as Electronic System Level (ESL) simulation. As a user-level thread library, QuickThreads is very...

    Provided By University of California, Davis

  • White Papers // May 2013

    Multicast Packing for Coding Across Multiple Unicasts

    The authors consider the problem of inter-session network coding for multiple unicast flows over directed acyclic graphs. Their approach consists of the following steps: the unicast flows are partitioned into multiple disjoint subsets of unicast flows and each subset of unicast flows is mapped to a multicast flow, and linear...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    An Extended Eclipse Platform for Recoding System-Level Models

    System-level design methodology is developed to manage the increasing design complexity of embedded systems. With proper tools supporting system-level design, engineers can perform early design space exploration and automatic refinements on a high-level specification model of the embedded system. However, creating the initial specification model is a time-consuming process. This...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    RIDE: Recoding Integrated Development Environment

    One solution to address the steadily growing complexity of embedded computer systems is the modeling at higher levels of abstraction using System-Level Description Languages (SLDL) such as SpecC or SystemC. However, writing such executable system models is error-prone and extremely time-consuming. Little has been done to support system designers in...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    Instantly Decodable Network Codes for Real-Time Applications

    The authors consider the scenario of broadcasting for real-time applications and loss recovery via instantly decodable network coding. Past work focused on minimizing the completion delay, which is not the right objective for real-time applications that have strict deadlines. In this paper, they are interested in finding a code that...

    Provided By University of California, Davis

  • White Papers // Mar 2013

    Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications

    In this paper, the authors analytically study the regime in which practical full-duplex systems can achieve larger rates than equivalent half-duplex systems. The key challenge in practical full-duplex systems is un-cancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, they first present a signal...

    Provided By University of California, Davis

  • White Papers // Jan 2013

    2.5K-Graphs: From Sampling to Generation

    Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, the authors propose a complete, practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology they target to match are...

    Provided By University of California, Davis

  • White Papers // Dec 2012

    Compositional Stochastic Modeling and Probabilistic Programming

    Probabilistic programming is related to a compositional approach to stochastic modeling by switching from discrete to continuous time dynamics. In continuous time, an operator-algebra semantics is available in which processes proceeding in parallel (and possibly interacting) have summed time-evolution operators. From this foundation, algorithms for simulation, inference and model reduction...

    Provided By University of California, Davis

  • White Papers // Nov 2012

    Variability-Aware Memory Management for Nanoscale Computing

    As the semiconductor industry continues to push the limits of sub-micron technology, the ITRS expects hardware variations to continue increasing over the next few decades. As a result, it is imperative for designers to build variation-aware software stacks that may adapt and opportunistically exploit said variations to increase system performance/responsiveness...

    Provided By University of California, Davis

  • White Papers // May 2012

    Multi-Layer Configuration Exploration of MPSoCs for Streaming Applications

    While integration of configurable components, such as soft processors, in MPSoC design enables further system adaptation to application needs, supporting system level tools need to provide an environment for systematic and efficient configuration exploration. This paper presents a multi-layer configuration exploration framework for streaming applications on MPSoCs. The authors introduce...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    An Embedded Hybrid-Memory-Aware Virtualization Layer for Chip-Multiprocessors

    Hybrid on-chip memories that combine Non-Volatile Memories (NVMs) with SRAMs promise to mitigate the increasing leakage power of traditional on-chip SRAMs. The authors present HaVOC: a run-time memory manager that virtualizes the hybrid on-chip memory space and supports efficient sharing of distributed Scratch-Pad Memories (SPMs) and NVMs. HaVOC allows programmers...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    Virtual Platform Generation Using TECS Software Component and SCE

    In this paper, the authors present a system-level design framework integrating TECS, which is one of the software component technologies for embedded systems, and SCE, which is a System-on-Chip (SoC) environment based on SpecC language, for realizing a higher abstraction level design than prior work. Since TECS implementation is based...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    Recoding Embedded Applications into Flexible System-Level Models

    Given the constantly growing complexity of the digital systems around them, virtual platforms are essential in the design and development of today's embedded systems. Without virtual platforms, efficient design space exploration, effective functional validation, and cost-effective system implementation would not be possible. In this paper, the authors outlined a method...

    Provided By University of California, Davis

  • White Papers // Mar 2011

    Using a Flexible Fault-Tolerant Cache (FFT-Cache) to Improve Reliability in Ultra Low Voltage Operation

    Caches are known to consume a large part of total microprocessor power. Traditionally, voltage scaling has been used to reduce both dynamic and leakage power in caches. However, aggressive voltage reduction causes process-variation-induced failures in cache SRAM arrays, which compromise cache reliability. In this paper, the authors propose Flexible Fault-Tolerant...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Hearing Is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    In cognitive radio networks, an adversary transmits signals whose characteristics emulate those of primary users, in order to prevent secondary users from transmitting. Such an attack is called Primary User Emulation (PUE) attack. There are two main types of primary users in white space: TV towers and wireless microphones. Existing...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Characterizing Packet Audio Streams From Internet Multimedia Applications

    The authors analyzed 70 voice traces collected from IP-telephony applications, multicast lectures, and multimedia conferencing sessions which involve multiple speakers and different dynamics of interaction beyond two-way conversations. Results show that application differences have significant impact on the traffic characteristics. The conventional exponential model, established for telephone conversations, fails to...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Sensor Networks

    This paper investigates the problem of uneven energy consumptions in a large class of many-to-one sensor networks. In a many-to-one sensor network, all sensor nodes generate Constant Bit Rate (CBR) data and send them to a single sink via multihop transmissions. This type of sensor networks has many potential applications...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    APHD: End-to-End Delay Assurance in 802.11e Based MANETs

    This paper presents an Adaptive Per Hop Differentiation (APHD) scheme towards achieving end-to-end delay assurance in multihop wireless networks. The APHD scheme extends the capability of IEEE 802.11e EDCA technique into multihop environments by taking end-to-end delay requirement into consideration. At an intermediate node, based on data packet's end-to-end requirement,...

    Provided By University of California, Davis

  • White Papers // Nov 2010

    Implicit Authentication Through Learning User Behavior

    Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. The authors present implicit authentication - authenticating users based on...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. This paper proposes Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Retransmission-Aware Queuing and Routing for Video Streaming in Wireless Mesh Networks

    The dynamic and shared nature of wireless medium imposes an adverse barrier to supporting QoS for video streaming applications in wireless networks. This paper investigates a case study of video streaming in a wireless mesh network to obtain important observations on the factors which impact video quality in multihop wireless...

    Provided By University of California, Davis

  • White Papers // Sep 2010

    Deterministic Structured Network Coding For WWAN Video Broadcast With Cooperative Peer-to-Peer Repair

    Recent research has exploited the multi-homing property (one terminal with multiple network interfaces) of modern devices to improve communication performance in wireless networks. Cooperative Peer-to-peer Repair (CPR) is one example where given simultaneous connections to both a Wireless Wide Area Network (WWAN) and an ad-hoc Wireless Local Area Network (WLAN),...

    Provided By University of California, Davis

  • White Papers // Aug 2010

    Trustworthy Wireless Networks: Issues and Applications

    Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Adaptive Wireless Channel Probing for Shared Key Generation

    Generating a shared secret key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel probing. Previous works used a constant channel probing rate to generate a key, but they neither consider the tradeoff between the Key Generation...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Identity-Based Attack Detection in Mobile Wireless Networks

    Identity-Based Attacks (IBAs) are one of the most serious threats to wireless networks. Recently, Received Signal Strength (RSS) based detection mechanisms were proposed to detect IBAs in static networks. Although mobility is an inherent property of wireless networks, limited work has addressed IBA detection in mobile scenarios. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Improving Energy Efficiency of Wi-Fi Sensing on Smartphones

    Mobile data usage over cellular networks has been dramatically increasing over the past years. Wi-Fi based wireless networks offer a high-bandwidth alternative for offloading data traffic. However, intermittent connectivity, and battery power drain in handheld devices, inhibits always-on connectivity even in areas with good Wi-Fi coverage. This paper presents WiFisense,...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center

    In a multi-tenant data center environment, the current paradigm for route control customization involves a labor intensive ticketing process, in which tenants submit route control requests to the landlord. This results in a tight-coupling between tenants and landlord, extensive human resource deployment, and long ticket resolution time. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Distributed Scheduling and Routing in Underwater Wireless Networks

    Several underwater network characteristics, including long propagation delays and a bandwidth dependent on distance, provide unique challenges to protocol designers. This paper presents STUMP-WR, a distributed routing and channel scheduling protocol, designed for heavily loaded underwater networks. STUMP-WR selects and schedules links using a distributed algorithm to overlap communications by...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    RRR: Rapid Ring Recovery - Sub-Millisecond Decentralized Recovery for Ethernet Ring

    Ethernet is the indisputable de-facto technology for local area networks due to its simplicity, low cost, and wide scale adoption. In recent times, Ethernet has entered new networking areas such as Metro Area Network (MAN) and Industrial Area Network (IAN) where specialized protocols dominate the market. In addition to the...

    Provided By University of California, Davis

  • White Papers // Jun 2010

    FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns

    The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. The core challenge is in addressing high amounts of traffic diversity found in today's networks. The problem becomes more challenging if a quick detection...

    Provided By University of California, Davis

  • White Papers // May 2010

    Non-Cryptographic Authentication and Identification in Wireless Networks

    Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This paper provides an overview about various non-cryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. The authors discuss merits and demerits of these authentication/identification schemes...

    Provided By University of California, Davis

  • White Papers // May 2010

    Impact of Security Properties on the Quality of Information in Tactical Military Networks

    The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required...

    Provided By University of California, Davis

  • White Papers // Apr 2010

    Scheduling Prioritized Services in Multihop OFDMA Networks

    Growing popularity of high speed wireless broadband access for real-time applications makes it increasingly relevant to study the admission control and scheduling of flows in a service differentiated manner. Next-generation wireless broadband networks employ Orthogonal Frequency Division Multiple Access (OFDMA) technology that enables multiple users to communicate at the same...

    Provided By University of California, Davis

  • White Papers // Mar 2010

    THEX: Mining Metapatterns From Java

    Design patterns are codified solutions to common Object-Oriented Design (OOD) problems in software development. One of the proclaimed benefits of the use of design patterns is that they decouple functionality and enable different parts of a system to change frequently without undue disruption throughout the system. These OOD patterns have...

    Provided By University of California, Davis

  • White Papers // Dec 2008

    Integration Gain of Heterogeneous WiFi/WiMAX Networks

    The authors study the integrated WiFi/WiMAX networks where users are equipped with dual-radio interfaces that can connect to either a WiFi or a WiMAX network. Previous research on integrated heterogeneous networks (e.g., WiFi/cellular) usually considers one network as the main, and the other as the auxiliary. The performance of the...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Characterizing Packet Audio Streams From Internet Multimedia Applications

    The authors analyzed 70 voice traces collected from IP-telephony applications, multicast lectures, and multimedia conferencing sessions which involve multiple speakers and different dynamics of interaction beyond two-way conversations. Results show that application differences have significant impact on the traffic characteristics. The conventional exponential model, established for telephone conversations, fails to...

    Provided By University of California, Davis

  • White Papers // Jul 2008

    Determining 802.11 Link Quality With Passive Measurements

    Unlike a wired link, a wireless link changes according to the physical environment and the network traffic in the surrounding area. The link quality, capacity and reliability are dependent on the MAC layer parameters and the channel conditions. This paper presents a new passive link quality measurement tool and studies...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Improving Energy Efficiency of Wi-Fi Sensing on Smartphones

    Mobile data usage over cellular networks has been dramatically increasing over the past years. Wi-Fi based wireless networks offer a high-bandwidth alternative for offloading data traffic. However, intermittent connectivity, and battery power drain in handheld devices, inhibits always-on connectivity even in areas with good Wi-Fi coverage. This paper presents WiFisense,...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    RRR: Rapid Ring Recovery - Sub-Millisecond Decentralized Recovery for Ethernet Ring

    Ethernet is the indisputable de-facto technology for local area networks due to its simplicity, low cost, and wide scale adoption. In recent times, Ethernet has entered new networking areas such as Metro Area Network (MAN) and Industrial Area Network (IAN) where specialized protocols dominate the market. In addition to the...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Adaptive Wireless Channel Probing for Shared Key Generation

    Generating a shared secret key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel probing. Previous works used a constant channel probing rate to generate a key, but they neither consider the tradeoff between the Key Generation...

    Provided By University of California, Davis

  • White Papers // Jan 2011

    Hearing Is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    In cognitive radio networks, an adversary transmits signals whose characteristics emulate those of primary users, in order to prevent secondary users from transmitting. Such an attack is called Primary User Emulation (PUE) attack. There are two main types of primary users in white space: TV towers and wireless microphones. Existing...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center

    In a multi-tenant data center environment, the current paradigm for route control customization involves a labor intensive ticketing process, in which tenants submit route control requests to the landlord. This results in a tight-coupling between tenants and landlord, extensive human resource deployment, and long ticket resolution time. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Identity-Based Attack Detection in Mobile Wireless Networks

    Identity-Based Attacks (IBAs) are one of the most serious threats to wireless networks. Recently, Received Signal Strength (RSS) based detection mechanisms were proposed to detect IBAs in static networks. Although mobility is an inherent property of wireless networks, limited work has addressed IBA detection in mobile scenarios. This paper proposes...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Retransmission-Aware Queuing and Routing for Video Streaming in Wireless Mesh Networks

    The dynamic and shared nature of wireless medium imposes an adverse barrier to supporting QoS for video streaming applications in wireless networks. This paper investigates a case study of video streaming in a wireless mesh network to obtain important observations on the factors which impact video quality in multihop wireless...

    Provided By University of California, Davis

  • White Papers // Oct 2010

    Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas

    The proliferation of personal wireless devices requires secure connection between them. While it is easy to securely pair electronic devices by wires, it is very challenging to pair them wirelessly when they have no prior association. This paper proposes Good Neighbor, a novel scheme that securely pairs nearby wireless devices...

    Provided By University of California, Davis

  • White Papers // Jul 2010

    Distributed Scheduling and Routing in Underwater Wireless Networks

    Several underwater network characteristics, including long propagation delays and a bandwidth dependent on distance, provide unique challenges to protocol designers. This paper presents STUMP-WR, a distributed routing and channel scheduling protocol, designed for heavily loaded underwater networks. STUMP-WR selects and schedules links using a distributed algorithm to overlap communications by...

    Provided By University of California, Davis

  • White Papers // May 2010

    Non-Cryptographic Authentication and Identification in Wireless Networks

    Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This paper provides an overview about various non-cryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. The authors discuss merits and demerits of these authentication/identification schemes...

    Provided By University of California, Davis

  • White Papers // Apr 2010

    Scheduling Prioritized Services in Multihop OFDMA Networks

    Growing popularity of high speed wireless broadband access for real-time applications makes it increasingly relevant to study the admission control and scheduling of flows in a service differentiated manner. Next-generation wireless broadband networks employ Orthogonal Frequency Division Multiple Access (OFDMA) technology that enables multiple users to communicate at the same...

    Provided By University of California, Davis

  • White Papers // Aug 2010

    Trustworthy Wireless Networks: Issues and Applications

    Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks and also works after detecting considerable damage and provides little protection if one...

    Provided By University of California, Davis

  • White Papers // Dec 2009

    From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network

    Multi-radio nodes in wireless mesh networks introduce extra complexity in utilizing channel resources. Depending on the configuration of the radios, bad mappings between radios to wireless frequencies may result in sub-optimal network topologies. Static channel assignments in wireless mesh networks have been studied in theory and through simulation but very...

    Provided By University of California, Davis

  • White Papers // Jan 2010

    Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

    Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key...

    Provided By University of California, Davis

  • White Papers // Dec 2009

    Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks

    Peak Signal-to-Noise Ratio (PSNR) is the simplest and the most widely used video quality evaluation methodology. However, traditional PSNR calculations do not take the packet loss into account. This shortcoming, which is amplified in wireless networks, contributes to the inaccuracy in evaluating video streaming quality in wireless communications. Such inaccuracy...

    Provided By University of California, Davis

  • White Papers // Aug 2008

    STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol

    This paper proposes the Staggered TDMA Underwater MAC Protocol (STUMP), a scheduled, collision free TDMA-based MAC protocol that increases channel utilization by leveraging node position diversity and the low propagation speed of the underwater channel. STUMP uses propagation delay information to overlap node communication and increase channel utilization. STUMP also...

    Provided By University of California, Davis

  • White Papers // May 2010

    Impact of Security Properties on the Quality of Information in Tactical Military Networks

    The goal of a tactical military network is to provide information superiority over an opposing force. This information superiority increases mission tempo if the information can be used to make correct decisions within time constraints. To achieve this goal, a sufficient amount of information must be received with a required...

    Provided By University of California, Davis

  • White Papers // Dec 2008

    Advantages of Self-Migration for Distributed Computing

    The authors compare four paradigms that have recently been the subject of recent research: mobile agents, Distributed Shared Memory (DSM), coordination paradigms and self-migrating computations. They place these paradigms in a common framework and demonstrate that self-migrating computations subsume the other three paradigms in terms of their capabilities to organize...

    Provided By University of California, Davis

  • White Papers // Mar 2013

    Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications

    In this paper, the authors analytically study the regime in which practical full-duplex systems can achieve larger rates than equivalent half-duplex systems. The key challenge in practical full-duplex systems is un-cancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, they first present a signal...

    Provided By University of California, Davis

  • White Papers // May 2013

    Multicast Packing for Coding Across Multiple Unicasts

    The authors consider the problem of inter-session network coding for multiple unicast flows over directed acyclic graphs. Their approach consists of the following steps: the unicast flows are partitioned into multiple disjoint subsets of unicast flows and each subset of unicast flows is mapped to a multicast flow, and linear...

    Provided By University of California, Davis

  • White Papers // Apr 2013

    Instantly Decodable Network Codes for Real-Time Applications

    The authors consider the scenario of broadcasting for real-time applications and loss recovery via instantly decodable network coding. Past work focused on minimizing the completion delay, which is not the right objective for real-time applications that have strict deadlines. In this paper, they are interested in finding a code that...

    Provided By University of California, Davis

  • White Papers // Jan 2013

    2.5K-Graphs: From Sampling to Generation

    Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, the authors propose a complete, practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology they target to match are...

    Provided By University of California, Davis

  • White Papers // Jan 2007

    Transaction Level Platform Modeling in SystemC for Multi-Processor Designs

    In this paper, the authors describe transaction level platform modeling in SystemC for MPSoC designs. The MPSoC platform is a net-list of processing elements, busses and bridge elements. The processing elements which can host a process (a C program) or memory. Busses, modeled as Universal Bus Channels (UBCs), offer communication...

    Provided By University of California, Davis

  • White Papers // Mar 2007

    Embedded Software Development in a System-Level Design Flow

    Embedded software plays an important role in today's complex SoCs since it allows to flexibly realizing a large feature set. However, writing software manually is not desirable due to the amount of code and the hardware often not being available in early stages. Therefore, it is highly desirable to address...

    Provided By University of California, Davis

  • White Papers // Mar 2006

    Processor Customization on a Xilinx Multimedia Board

    Performance of applications can be boosted by executing application-specific Instruction Set Extensions (ISEs) on a specialized hardware coupled with a processor core. Many commercially available customizable processors have communication overheads in their interface with the specialized hardware. However, existing ISE generation approaches have not considered customizable processors that have communication...

    Provided By University of California, Davis

  • White Papers // May 2008

    Modeling Process Synchronization in Multiprocessor Systems on Chip (MPSoC)

    Increasing application complexity and short time to market have led to the wide use of transaction level modeling and platform based design of Multi-Processor System-on-Chips (MPSoCs). However, their models use one-case-fits-all communication scheme or leave the communication and process synchronization to be designed manually. In this paper, the authors provide...

    Provided By University of California, Davis

  • White Papers // May 2007

    An Interactive Model Re-Coder for Efficient SoC Specification

    To overcome the complexity in System-on-Chip (SoC) design, researchers have developed sophisticated design flows that significantly reduce the development time through automation. However, while much work has focused on synthesis and exploration tools, little has been done to support the designer in writing and rewriting SoC models. In fact, the...

    Provided By University of California, Davis

  • White Papers // Mar 2012

    An Embedded Hybrid-Memory-Aware Virtualization Layer for Chip-Multiprocessors

    Hybrid on-chip memories that combine Non-Volatile Memories (NVMs) with SRAMs promise to mitigate the increasing leakage power of traditional on-chip SRAMs. The authors present HaVOC: a run-time memory manager that virtualizes the hybrid on-chip memory space and supports efficient sharing of distributed Scratch-Pad Memories (SPMs) and NVMs. HaVOC allows programmers...

    Provided By University of California, Davis

  • White Papers // Jan 2014

    Hardware-Dependent Software Synthesis for Many-Core Embedded Systems

    In this paper, the authors present synthesis of Hardware dependent Software (HdS) for multicore and many-core designs using Embedded System Environment (ESE). ESE is a tool set, developed at UC Irvine, for transaction level design of multicore embedded systems. HdS synthesis is a key component of ESE backend design flow....

    Provided By University of California, Davis

  • White Papers // Mar 2009

    Efficient Simulation of Large-Scale Spiking Neural Networks Using CUDA Graphics Processors

    Neural network simulators that take into account the spiking behavior of neurons are useful for studying brain mechanisms and for engineering applications. Spiking Neural Network (SNN) simulators have been traditionally simulated on large-scale clusters, super-computers, or on dedicated hardware architectures. Alternatively, Graphics Processing Units (GPUs) can provide a low-cost, programmable,...

    Provided By University of California, Davis

  • White Papers // Sep 2008

    Asynchronous Distributed Learning of Topic Models

    Distributed learning is a problem of fundamental interest in machine learning and cognitive science. In this paper, the authors present asynchronous distributed learning algorithms for two well-known unsupervised learning frameworks: Latent Dirichlet Allocation (LDA) and Hierarchical Dirichlet Processes (HDP). In the proposed approach, the data are distributed across P processors,...

    Provided By University of California, Davis

  • White Papers // May 2006

    A Graph Based Algorithm for Data Path Optimization in Custom Processors

    The rising complexity, customization and short time to market of modern digital systems requires automatic methods for generation of high performance architectures for such systems. This paper presents algorithms to automatically create custom data path for a given application that optimizes both resource utilization and performance. The inputs to the...

    Provided By University of California, Davis

  • White Papers // Jun 2008

    Generation of Custom Co-processor Structure from C-Code

    Designers of modern embedded systems may use two approaches for implementing an application: they can select an existing processor and map the application to it using a compiler, or they can design a custom processor for the code. While the approach provides optimality, the first one is cheaper and faster....

    Provided By University of California, Davis

  • White Papers // Feb 2014

    Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices

    The authors present a suite of efficient novel TFA protocols which improve upon password-only authentication by a factor of 2t with regards to both the online guessing attack and the offline dictionary attack. To argue the security of the presented protocols, they first provide a formal treatment of TFA schemes...

    Provided By University of California, Davis

  • White Papers // May 2004

    Supermarket Challenges and Opportunities for Fresh Fruit and Vegetable Producers and Shippers: Lessons From the US Experience

    Structural change continues to transform the global fresh fruit and vegetable (fresh produce) marketing system. There was great fragmentation on both the selling and buying sides with large numbers of local and regional retail grocery chains rather than national chains with large store numbers and buying volumes per chain. Given...

    Provided By University of California, Davis

  • White Papers // Dec 2001

    An Economic Survey of the Wine and Winegrape Industry in the United States and Canada

    The wine industry in the United States and Canada is new by Old World standards but old by New World standards. This document provides a very brief outline of the history of wine production and consumption in the United States up through roughly 1990. It then focuses on the demand...

    Provided By University of California, Davis

  • White Papers // Jan 2010

    QoS-Aware Multicasting in DiffServ Domains

    Although many QoS-based multicast routing protocols have been proposed in recent years, most of them are based on per-flow resource reservation, which cannot be deployed within differentiated services (DiffServ) domains. This paper proposes a new QoS-aware multicast routing protocol called QMD, which is designed for DiffServ environments. QMD can provide...

    Provided By University of California, Davis