University of Cumberlands

Displaying 1-11 of 11 results

  • White Papers // Jun 2013

    Measuring the Impact of Adversarial Errors on Packet Scheduling Strategies

    In this paper, the authors explore the problem of achieving efficient packet transmission over unreliable links with worst case occurrence of errors. In such a setup, even an omniscient offline scheduling strategy cannot achieve stability of the packet queue, nor is it able to use up all the available bandwidth....

    Provided By University of Cumberlands

  • White Papers // Apr 2013

    CLODA: A Crowdsourced Linked Open Data Architecture

    In this paper, the authors present their Crowdsourced Linked Open Data Architecture (CLODA), a first attempt to combine crowdsourcing, localization and location-based services to generate, collect, validate and relate real-world, geo-spatial and multidimensional information using smartphones and other mobile devices. CLODA focuses on the construction of URI addressable, interlinked and...

    Provided By University of Cumberlands

  • White Papers // Jun 2012

    Integrating Web-Enabled Energy-Aware Smart Homes to the Smart Grid

    Energy conservation is a global issue with great implications. High energy demands and environmental concerns force the transformation of electricity grids into smart grids, towards more rational utilization of energy. Embedded computing and smart metering transform houses into energy-aware environments, allowing residents to make informed choices about electricity. Web technologies...

    Provided By University of Cumberlands

  • White Papers // May 2012

    A Novel Relay-Assisted Protocol for Cooperative Multiple Access Networks

    A novel cooperative transmission protocol is proposed for multiple access scenarios, where multiple users communicate with a common destination with the assistant of multiple half-duplex relays. The proposed Alternative Relaying Decode-and-Forward (ARDF) protocol can achieve the full diversity gain by applying superposition coding at each transmitter, which also utilizes the...

    Provided By University of Cumberlands

  • White Papers // Apr 2012

    Continuous All K-Nearest Neighbor Querying in Smartphone Networks

    Consider a centralized query operator that identifies to every smartphone user its k geographically nearest neighbors at all times, a query the authors coin Continuous All k-Nearest Neighbor (CAkNN). Such an operator could be utilized to enhance public emergency services, allowing users to send SOS beacons out to the closest...

    Provided By University of Cumberlands

  • White Papers // Mar 2012

    A Scalable Iterative Convex Design for Nonlinear Systems

    A recently developed control scheme for approximately optimal control of nonlinear systems is the so-called Convex Control Design (ConvCD) methodology that transforms the control problem of generic nonlinear systems into a convex optimization problem. The ConvCD approach constructs a polynomial controller approximating the optimal control law: such design does not...

    Provided By University of Cumberlands

  • White Papers // Mar 2012

    Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures

    A key challenge for Grid and Cloud infrastructures is to make their services easily accessible and attractive to end-users. In this paper, the authors introduce tagging capabilities to the Minersoft system, a powerful tool for software search and discovery in order to help end-users locate application software suitable to their...

    Provided By University of Cumberlands

  • White Papers // Sep 2010

    The Wireless Control Network: Monitoring for Malicious Behavior

    The authors consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, they developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear combination of the values in its neighborhood. In this paper, they design an Intrusion Detection System...

    Provided By University of Cumberlands

  • White Papers // Apr 2010

    Proposition for a Sequential Accelerator in Future General-Purpose Manycore Processors and the Problem of Migration-Induced Cache Misses

    As the number of transistors on a chip doubles with every technology generation, the number of on-chip cores also increases rapidly, making possible in a foreseeable future to design processors featuring hundreds of general-purpose cores. However, though a large number of cores speeds up parallel code sections, Amdahl's law requires...

    Provided By University of Cumberlands

  • White Papers // Jul 2009

    Palm Geometry Biometrics: A Score-Based Fusion Approach

    In this paper, the authors present identification and authentication system based on hand geometry. They examine the performance of three different methods that are based on hand silhouette and on binarized hand images and then they investigate approaches for combining the feature vectors, identification-verification scores, and individual acceptance-rejections decisions taken...

    Provided By University of Cumberlands

  • White Papers // Oct 2007

    An Effective Bypass Mechanism to Enhance Branch Predictor for SMT Processors

    Unlike traditional superscalar processors, Simultaneous Multi-Threaded (SMT) processor can explore both instruction level parallelism and thread level parallelism at the same time. With a same fetch width, SMT fetches instructions from a single thread not as deeply as in traditional superscalar processor. Meanwhile, all the instructions from different threads share...

    Provided By University of Cumberlands

  • White Papers // Mar 2012

    Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures

    A key challenge for Grid and Cloud infrastructures is to make their services easily accessible and attractive to end-users. In this paper, the authors introduce tagging capabilities to the Minersoft system, a powerful tool for software search and discovery in order to help end-users locate application software suitable to their...

    Provided By University of Cumberlands

  • White Papers // Mar 2012

    A Scalable Iterative Convex Design for Nonlinear Systems

    A recently developed control scheme for approximately optimal control of nonlinear systems is the so-called Convex Control Design (ConvCD) methodology that transforms the control problem of generic nonlinear systems into a convex optimization problem. The ConvCD approach constructs a polynomial controller approximating the optimal control law: such design does not...

    Provided By University of Cumberlands

  • White Papers // Jun 2012

    Integrating Web-Enabled Energy-Aware Smart Homes to the Smart Grid

    Energy conservation is a global issue with great implications. High energy demands and environmental concerns force the transformation of electricity grids into smart grids, towards more rational utilization of energy. Embedded computing and smart metering transform houses into energy-aware environments, allowing residents to make informed choices about electricity. Web technologies...

    Provided By University of Cumberlands

  • White Papers // Jun 2013

    Measuring the Impact of Adversarial Errors on Packet Scheduling Strategies

    In this paper, the authors explore the problem of achieving efficient packet transmission over unreliable links with worst case occurrence of errors. In such a setup, even an omniscient offline scheduling strategy cannot achieve stability of the packet queue, nor is it able to use up all the available bandwidth....

    Provided By University of Cumberlands

  • White Papers // Apr 2012

    Continuous All K-Nearest Neighbor Querying in Smartphone Networks

    Consider a centralized query operator that identifies to every smartphone user its k geographically nearest neighbors at all times, a query the authors coin Continuous All k-Nearest Neighbor (CAkNN). Such an operator could be utilized to enhance public emergency services, allowing users to send SOS beacons out to the closest...

    Provided By University of Cumberlands

  • White Papers // Apr 2013

    CLODA: A Crowdsourced Linked Open Data Architecture

    In this paper, the authors present their Crowdsourced Linked Open Data Architecture (CLODA), a first attempt to combine crowdsourcing, localization and location-based services to generate, collect, validate and relate real-world, geo-spatial and multidimensional information using smartphones and other mobile devices. CLODA focuses on the construction of URI addressable, interlinked and...

    Provided By University of Cumberlands

  • White Papers // Sep 2010

    The Wireless Control Network: Monitoring for Malicious Behavior

    The authors consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, they developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear combination of the values in its neighborhood. In this paper, they design an Intrusion Detection System...

    Provided By University of Cumberlands

  • White Papers // May 2012

    A Novel Relay-Assisted Protocol for Cooperative Multiple Access Networks

    A novel cooperative transmission protocol is proposed for multiple access scenarios, where multiple users communicate with a common destination with the assistant of multiple half-duplex relays. The proposed Alternative Relaying Decode-and-Forward (ARDF) protocol can achieve the full diversity gain by applying superposition coding at each transmitter, which also utilizes the...

    Provided By University of Cumberlands

  • White Papers // Apr 2010

    Proposition for a Sequential Accelerator in Future General-Purpose Manycore Processors and the Problem of Migration-Induced Cache Misses

    As the number of transistors on a chip doubles with every technology generation, the number of on-chip cores also increases rapidly, making possible in a foreseeable future to design processors featuring hundreds of general-purpose cores. However, though a large number of cores speeds up parallel code sections, Amdahl's law requires...

    Provided By University of Cumberlands

  • White Papers // Jul 2009

    Palm Geometry Biometrics: A Score-Based Fusion Approach

    In this paper, the authors present identification and authentication system based on hand geometry. They examine the performance of three different methods that are based on hand silhouette and on binarized hand images and then they investigate approaches for combining the feature vectors, identification-verification scores, and individual acceptance-rejections decisions taken...

    Provided By University of Cumberlands

  • White Papers // Oct 2007

    An Effective Bypass Mechanism to Enhance Branch Predictor for SMT Processors

    Unlike traditional superscalar processors, Simultaneous Multi-Threaded (SMT) processor can explore both instruction level parallelism and thread level parallelism at the same time. With a same fetch width, SMT fetches instructions from a single thread not as deeply as in traditional superscalar processor. Meanwhile, all the instructions from different threads share...

    Provided By University of Cumberlands