University of South Florida

Displaying 1-40 of 114 results

  • White Papers // Apr 2014

    SPARQL Query Verbalization for Explaining Semantic Search Engine Queries

    SPARQL is the W3C recommendation for querying and accessing RDF data. While it has found broad acceptance among semantic application developers, its usage among those who possess limited to no expertise in semantic technologies remains understandably limited. In this paper, the authors introduce Spartiqulation, a system that translates SPARQL queries...

    Provided By University of South Florida

  • White Papers // Jan 2014

    Cost Model-Driven Test Resource Partitioning for SoCs

    The main factors contributing to the cost of System-on-Chip (SoC) manufacturing test are the required number of tester pins, the test application time, the tester memory requirements and the area overhead required by the test resources. These factors contribute with different weights, depending on the cost model of each SOC....

    Provided By University of South Florida

  • White Papers // Jan 2014

    Reducing the Energy Consumption in Fault-tolerant Distributed Embedded Systems with Time-Constraint

    In this paper, the authors address the problem of reducing the energy consumption in distributed embedded systems associated with time-constraints and equipped with fault-tolerant techniques. A greedy heuristic is presented to reduce the energy during task mapping and fault tolerance policy assignment. Fault tolerance is achieved through task re-execution and...

    Provided By University of South Florida

  • White Papers // Jan 2014

    A Dual-Mode Synchronous/Asynchronous CORDIC Processor

    Fourth Generation (4G) wireless and mobile systems are currently the focus of research and development. They will allow new types of services to be universally available to consumers and for industrial applications. For application in a software defined radio a CORDIC processor has been developed that can operate both in...

    Provided By University of South Florida

  • White Papers // Jan 2014

    Implementation of an IEEE 802.11a Compliant Low-Power Baseband Processor

    Fourth Generation (4G) wireless and mobile systems are today very attractive for research and development. New types of services will be universally available to consumers and for industrial applications with the use of 4G devices. Broadband wireless networks will enable packet based high-speed data transfer suitable for video transmission and...

    Provided By University of South Florida

  • White Papers // Dec 2013

    An Improved Instruction-Level Power Model for ARM11 Microprocessor

    Low power consumption is becoming more and more important, because a lot of embedded systems use batteries as energy sources. To make a low power processor, a number of hardware techniques have been developed, such as clock gating and power gating. Software also affects the power consumption, but there is...

    Provided By University of South Florida

  • White Papers // Aug 2013

    Applying of Quality of Experience to System Optimisation

    State-of-the-art mobile devices, such as Smartphone's and tablets, are highly versatile and must deliver high performance across a multitude of applications. The perceived performance and resulting user experience can make or break a design. It is therefore vital that device design and optimization take into account the expectations and perceptions...

    Provided By University of South Florida

  • White Papers // Jun 2013

    Untainted Puncturing for Irregular Low-Density Parity-Check Codes

    Puncturing is a well-known coding technique widely used for constructing rate-compatible codes. In this paper, the authors consider the problem of puncturing low-density parity-check codes and propose a new algorithm for intentional puncturing. The algorithm is based on the puncturing of untainted symbols, i.e. nodes with no punctured symbols within...

    Provided By University of South Florida

  • White Papers // Jun 2013

    On the Viability of Using Liability to Incentivise Internet Security

    Internet use is characterized by externalities, which means that it can be sufficiently pro table for criminal enterprises to flourish. One possible mechanism which could be considered to improve incentives is liability. The authors conduct a review of the literature relating to liability theory, liability online, and security economics in...

    Provided By University of South Florida

  • White Papers // Mar 2013

    Real Time Controller Implementation for an Atomic Force Microscope Using a Digital Signal Processor

    The objective of this contribution is to report a low cost implementation of a control system for an Atomic Force Microscope (AFM). AFMs rely on a feedback controller as an integral part of their operation. Currently the controllers shipped with most commercial AFMs are implemented in a closed source manner...

    Provided By University of South Florida

  • White Papers // Mar 2013

    Maximizing Energy-Efficiency in Multi-Relay OFDMA Cellular Networks

    This contribution presents a method of obtaining the optimal power and subcarrier allocations that maximize the Energy-Efficiency (EE) of a multi-user, multi-relay, Orthogonal Frequency Division Multiple Access (OFDMA) cellular network. Initially, the Objective Function (OF) is formulated as the ratio of the Spectral-Efficiency (SE) over the power consumption of the...

    Provided By University of South Florida

  • White Papers // Mar 2013

    Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks

    Most of the nodes in ad hoc networks rely on batteries, which requires energy saving. Hence, numerous energy-efficient routing algorithms have been proposed for solving this problem. In this paper, the authors exploit the benefits of cross-layer information exchange, such as the knowledge of the Frame Error Rate (FER) in...

    Provided By University of South Florida

  • White Papers // Feb 2013

    Generalized Adaptive Network Coding Aided Successive Relaying for Noncoherent Cooperation

    A Generalized Adaptive Network Coding (GANC) scheme is conceived for a multi-user, multi-relay scenario, where the multiple users transmit independent information streams to a common destination with the aid of multiple relays. The proposed GANC scheme is developed from Adaptive Network Coded Cooperation (ANCC), which aims for a high flexibility...

    Provided By University of South Florida

  • White Papers // Feb 2013

    MC-CDMA Aided Multi-User Space-Time Shift Keying in Wideband Channels

    In this paper, the authors propose Multi-Carrier Code Division Multiple Access (MC-CDMA)-aided Space-Time Shift Keying (STSK) for mitigating the performance erosion of the classic STSK scheme in dispersive channels, while supporting multiple users. The codewords generated by the STSK scheme are appropriately spread in Frequency-Domain (FD) and transmitted over a...

    Provided By University of South Florida

  • White Papers // Jan 2013

    Modelling Interactive Real-Time Applications on Service Oriented Infrastructures

    The European Commission supported IRMOS project is developing tools and techniques that allow real-time applications to be planned and executed on distributed Service Oriented Infrastructures (SOI) operated by third-party service providers. The exemplar applications within the project are all multimedia based and include support for interactive and collaborative film post-production,...

    Provided By University of South Florida

  • White Papers // Jan 2013

    Multilevel Generalized Low-Density Parity-Check Codes

    Multi-Level Coding (MLC) was proposed by Imai and Hirawaki as a bandwidth efficient coded modulation scheme designed for protecting each bit of a non-binary symbol with the aid of binary codes, while maintaining different target Bit Error Rates (BERs). Parallel Independent Decoding (PID) is employed as an efficient decoding strategy...

    Provided By University of South Florida

  • White Papers // Dec 2012

    Near-Capacity Joint Channel Estimation and Three-Stage Turbo Detection for MIMO Systems

    The authors propose a novel joint channel estimation and three-stage iterative detection/decoding scheme for near-capacity MIMO systems. In their scheme, as usual, the detected soft information is first exchanged a number of times within the inner turbo loop between the Unity-Rate-Code (URC) decoder and the MIMO soft-demapper, and the information...

    Provided By University of South Florida

  • White Papers // Nov 2012

    Reduced-Complexity Soft STBC Detection

    Inspired by the scientific breakthrough of Turbo Codes (TCs) proposed, a near-capacity performance has been pursued by numerous researchers in diverse system contexts. However, as the researchers have inched closer and closer to the channel capacity, the complexity of the resultant communication systems was increased. The soft-decision aided MIMO detection...

    Provided By University of South Florida

  • White Papers // Nov 2012

    Iterative Detection and Decoding Using Approximate Bayesian Theorem Based PDA Method Over MIMO Nakagami-M Fading Channels

    In this paper, the design of Iterative Detection and Decoding (IDD) schemes relying on a low-complexity Probabilistic Data Association (PDA) aided method is conceived for turbo-coded Multiple-Input Multiple-Output (MIMO) systems communicating over Nakagami-m fading channels. The known PDA based MIMO detectors typically operate purely in the probability-domain. The authors show...

    Provided By University of South Florida

  • White Papers // Oct 2012

    User Relay Assisted Traffic Shifting in LTE-Advanced Systems

    In order to deal with uneven load distribution, mobility load balancing adjusts the handover region to shift edge users from a hot-spot cell to the less-loaded neighbouring cells. However, shifted users suffer the reduced signal power from neighbouring cells, which may result in link quality degradation. This paper employs a...

    Provided By University of South Florida

  • White Papers // Sep 2012

    DS-CDMA With M-Ary Orthogonal Modulation for Wireless Sensor Networks Simultaneously Monitoring Multiple Events

    In this paper, the authors propose a novel WSN framework for one fusion center to monitor simultaneously multiple Source Events (SEs), each of which has multiple states. In the proposed WSN, every SE is observed by a range of local sensors, which convey their observations to the fusion center in...

    Provided By University of South Florida

  • White Papers // Sep 2012

    Comparison of Remote Analysis with Statistical Disclosure Control for Protecting the Confidentiality of Business Data

    In this paper the authors concerned with the challenge of allowing statistical analysis of confidential business data while maintaining confidentiality. The most widely-used approach to date is statistical disclosure control, which involves modifying or confidentialising data before releasing it to users. Newer proposed approaches include the release of multiply imputed...

    Provided By University of South Florida

  • White Papers // Aug 2012

    A Hybrid Artificial Immune System and Self Organising Map for Network Intrusion Detection

    Network intrusion detection is the problem of detecting unauthorized use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An anomaly detection system is trained only on examples of normal connections, and thus has the potential to...

    Provided By University of South Florida

  • White Papers // Aug 2012

    Beyond the Hype: Cloud Computing in Analytics

    Machine learning (ML) techniques are becoming commonplace in business and research alike. With the automatization of data collection efforts, evermore data is being captured, rendering the task of extracting insightful patterns increasingly challenging. In addition to this "data avalanche" becoming ever more overwhelming, the usage of more computationally intensive algorithms...

    Provided By University of South Florida

  • White Papers // Jul 2012

    The Business Perspective of Cloud Computing for Small and Medium Enterprises

    Cloud computing has been described as a technological change brought about by the convergence of a number of new and existing technologies. It enables all businesses to get the best of technology at extremely economical costs. Both perspectives of the Cloud are important to be reviewed, of the provider's side...

    Provided By University of South Florida

  • White Papers // May 2012

    Reduced Feedback Links for Power Minimization in Distributed Multicell OFDMA Networks

    In the next generation of multicell networks, adaptive resource allocation techniques will play an important role to improve both quality of service and spectral efficiency. In order to employ distributed power allocation for multicell Orthogonal Frequency-Division Multiple Access (OFDMA) networks, the Channel State Information (CSI) belonging to all users is...

    Provided By University of South Florida

  • White Papers // May 2012

    First-Hop-Quality-Aware Dynamic Resource Allocation for Amplify-and-Forward Opportunistic Relaying Assisted SC-FDMA

    In this paper, the authors exploit the benefits of the diversity gains arising from a cluster of Opportunistic Relays (OR) and from the independently fading subcarriers of multiple users. Their goal is to improve the energy-efficiency of the OR assisted Single-Carrier Frequency-Division Multiple-Access (SC-FDMA) uplink using Amplify-and-Forward (AF), where the...

    Provided By University of South Florida

  • White Papers // May 2012

    Relay Selection Schemes Relying on Adaptive Modulation and Imperfect Channel Knowledge for Cooperative Networks

    Cooperative MAC protocols have been shown to increase the attainable network throughput and to reduce the outage probability when perfect Channel State Information (CSI) is available either at the source station or at candidate relays. This paper investigates the realistically achievable network performance of relay selection schemes under imperfect CSI...

    Provided By University of South Florida

  • White Papers // May 2012

    Efficient Frequency Domain Packet Scheduler for Point-to-Multipoint Transmissions in LTE Networks

    Long Term Evolution (LTE) is the emerging 4G wireless technology developed to provide high quality services in mobile environments. It is foreseen that multimedia services and mobile TV will assume an important role for the LTE proliferation in mobile market. However, several issues are still open and meaningful improvements have...

    Provided By University of South Florida

  • White Papers // May 2012

    Selective Relaying in Multi-Relay Networks With Feedback Delays and Adaptive Modulation

    This paper evaluates the performance of adaptive modulation in multi-relay networks with selective relaying, under Nakagami-m fading. In the system model, the source decides independently whether to forward the source message to the destination via the best (partial relay selection) relay path or direct path by comparing the end-to-end instantaneous...

    Provided By University of South Florida

  • White Papers // May 2012

    Characterizing Random CSMA Wireless Networks: A Stochastic Geometry Approach

    The authors characterize the random CSMA wireless networks by statistically quantifying the intensity of simultaneously active nodes and the aggregate interference experienced by a generic node in the network. First, starting from a Poisson point process to model the spatial distribution of the network nodes, they propose a Modified Hard...

    Provided By University of South Florida

  • White Papers // May 2012

    Modeling Random CSMA Wireless Networks in General Fading Environments

    Carrier-Sense Multiple Access (CSMA) protocols coordinate the spectrum access to maximize the spatial frequency reuse and minimize the mutual interference in distributed wireless networks. Since the CSMA protocol correlates the positions of the simultaneously active transmitters, the analytically tractable Poisson Point Process (PPP) cannot be used to model the spatial...

    Provided By University of South Florida

  • White Papers // May 2012

    MQBM: An Autonomic QoS Multicast Routing Protocol for Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a wireless network that consists of a large number of mobile and heterogeneous nodes interconnected by wireless links which move in an arbitrary direction with random velocity. It is characterized by the absence of any pre-existing infrastructure. This makes the transmission more difficult especially,...

    Provided By University of South Florida

  • White Papers // May 2012

    Efficient MIMO Antenna Evaluation Based on MIMO Spatial Channel Simulations

    This paper studies the proposal of using Spatial Channel Model (SCM) for the purpose of MIMO antenna parameter evaluation. The reason of choosing SCM is firstly explained. Then field measurements are conducted for comparison with simulations. The measurements have given preliminary proof to the applicability of the simulation method. To...

    Provided By University of South Florida

  • White Papers // May 2012

    A Novel Ergodic Capacity Analysis of Diversity Combining and Multihop Transmission Systems Over Generalized Composite Fading Channels

    Ergodic capacity is an important performance measure associated with reliable communication at the highest rate at which information can be sent over the channel with a negligible probability of error. In the shadow of this definition, diversity receivers (such as selection combining, equal-gain combining and maximal-ratio combining) and transmission techniques...

    Provided By University of South Florida

  • White Papers // May 2012

    Alternative Concepts of Antenna Deployment and Cell Layout in Mobile Communications

    Cellular communication systems have traditionally been designed according to the paradigm that base stations serve independent sectors for which inter-sector interference should be minimized. Further, multiple base stations serving multiple sectors are traditionally grouped into a minimum number of sites, in order to reuse infrastructure for cooling, battery backup etc....

    Provided By University of South Florida

  • White Papers // May 2012

    Truthful Auction for Cooperative Communications With Revenue Maximization

    Auction theory has been applied to cooperative communications to either efficiently allocate resources or incentivize wireless devices to participate in cooperative communications. However, a common shortcoming of the existing studies is that the revenue generation is neglected. Revenue generation is the ultimate goal of commercial networks, e.g., WiMAX networks. In...

    Provided By University of South Florida

  • White Papers // May 2012

    Iterative Two-Dimensional Error Concealment for Low-Complexity Wireless Video Uplink Transmitters

    Since joint source-channel decoding is capable of exploiting the residual redundancy in the encoded source signals for improving the attainable error resilience, it has attracted substantial attention. Motivated by the principle of exploiting the source redundancy at the receiver, in this treatise the authors paper the application of iterative Error...

    Provided By University of South Florida

  • White Papers // Mar 2012

    Mach-Zehnder Interferometer Based Design of All Optical Reversible Binary Adder

    In recent years reversible logic has emerged as a promising computing model for applications in dissipation less optical computing, low power CMOS, quantum computing, etc. In reversible circuits there exist a one-to-one mapping between the inputs and the outputs resulting in no loss of information. Researchers have implemented reversible logic...

    Provided By University of South Florida

  • White Papers // Mar 2012

    Channel Quantization for Physical Layer Network-Coded Two-Way Relaying

    The design of modulation schemes for the physical layer network-coded two way relaying scenario is considered with the protocol which employs two phases: Multiple access (MA) Phase and Broadcast (BC) phase. It was observed by Koike-Akino et al. that adaptively changing the network coding map used at the relay according...

    Provided By University of South Florida

  • White Papers // May 2010

    Run-Time Enforcement of Nonsafety Policies

    A common mechanism for ensuring that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is attempting to execute a dangerous action, it takes remedial steps to ensure...

    Provided By University of South Florida

  • White Papers // Jun 2010

    A Theory of Runtime Enforcement, With Results

    This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and their results. Because previous work could not model monitors transforming results, MRAs capture realistic behaviors outside the scope of previous models. MRAs also have a...

    Provided By University of South Florida

  • White Papers // Nov 2010

    A Location-Based Policy-Specification Language for Mobile Devices

    The dramatic rise in mobile applications has greatly increased threats to the security and privacy of users. Security mechanisms on mobile devices are currently limited, so users need more expressive ways to ensure that downloaded mobile applications do not act maliciously. Policy-specification languages were created for this purpose; they allow...

    Provided By University of South Florida

  • White Papers // May 2010

    A Packet-Classification Algorithm for Arbitrary Bitmask Rules, With Automatic Time-Space Tradeoffs

    The authors present an algorithm for classifying packets according to arbitrary (including noncontiguous) bitmask rules. As its principal novelty, the algorithm is parameterized by the amount of memory available and can customize its data structures to optimize classification time without exceeding a given memory bound. The algorithm thus automatically trades...

    Provided By University of South Florida

  • White Papers // Jan 2011

    Model-Driven Placement of Compute Tasks and Data in a Networked Utility

    An important problem in resource management for networked resource-sharing systems is the simultaneous allocation of multiple resources to an application. Self-optimizing systems must co-allocate resources in a way that reconciles competing demands and maximizes global system objectives under dynamic conditions. The authors propose a simple model-driven approach to estimate the...

    Provided By University of South Florida

  • White Papers // Jan 2011

    Revisiting Locality of Reference in Scientific Grid Workloads

    This paper revisits a basic question in data management, namely whether locality of reference is an important factor for the performance of caches in grid workloads. The authors answer this question by experimental evaluations using more than two years of real workloads from a science collaboration. The results show that:...

    Provided By University of South Florida

  • White Papers // Jan 2011

    Filecules in High-Energy Physics: Characteristics and Impact on Resource Management

    Grid computing has reached the stage where deployments are mature and many collaborations run in production mode. Mature Grid deployments offer the opportunity for revisiting and perhaps updating traditional beliefs related to workload models, which in turn leads to the re-evaluation of traditional resource management techniques. This paper analyzes usage...

    Provided By University of South Florida

  • White Papers // Mar 2010

    PoliSeer: A Tool for Managing Complex Security Policies

    Few tools exist for decomposing complex security policies into simpler modules. The policy-engineering tools that do exist either encapsulate entire policies as atomic, indecomposable modules or allow ne-grained modularization but are complicated and lack policy visualization capabilities. This paper brie y presents PoliSeer, the first tool the authors are aware...

    Provided By University of South Florida

  • White Papers // Jul 2010

    GDC: Group Discovery Using Co-Location Traces

    Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailable, can be leveraged in applications and protocols, such as recommender systems or delay-tolerant forwarding in ad hoc networks, to enhance the user experience. Group...

    Provided By University of South Florida

  • White Papers // Aug 2009

    Inline Visualization of Concerns

    Code modularization provides benefits throughout the software life cycle; however, the presence of Crosscutting Concerns (CCCs) in software hinders its complete modularization. This paper describes IVCon, a tool with a novel approach for completely modularizing CCCs. IVCon enables users to create, examine, and modify their code in two different views:...

    Provided By University of South Florida

  • White Papers // Nov 2007

    Are Directors Necessary? The Case Of S&P 500 Index Mutual Funds

    The authors provide new evidence linking board characteristics and performance, using S&P 500 index mutual funds. First, funds with higher percentages of board directors who are sponsor officers experience higher returns and lower expenses. Second, in general returns and expense ratios are not impacted by board size, the proportion of...

    Provided By University of South Florida

  • White Papers // Jan 2011

    Link-State Update Policies for All-Optical DWDM Transport Networks

    It has been demonstrated that advertising the availability of wavelength and converter resources in all-optical DWDM transport networks with sparse wavelength conversion capabilities can drastically improve the blocking performance of these networks thus achieving better usage of the network resources. An important aspect with consequences in network performance is when...

    Provided By University of South Florida

  • White Papers // Apr 2010

    A View of Cloud Computing

    Cloud computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Developers with innovative ideas for new Internet services no longer...

    Provided By University of South Florida

  • Presentations // Jan 2003

    Sales: Uniform Commercial Code

    Sale entails exchange of products or services for money or any other asset. In the sale process, a large number of issues arise. In order to amicably settle these issues and address their consequences, it is important to design a formal contract for the sale. In the contract, the guidelines...

    Provided By University of South Florida

  • White Papers // Sep 2010

    Rater Error Bias Training In The Employment Interview And Racioethnicity Biased Perceptions

    Interviewer training in general is an important area of research that has great research potential, since selecting and hiring the most qualified employees is at the root of effective organizations. This study utilizes regression analysis to examine a rater error bias interviewer training program as a tool for reducing Hispanic...

    Provided By University of South Florida

  • White Papers // Mar 2010

    Fundamental Diagnostics for Two-Level Mixed Models: The SAS Macro MIXED_DX

    Multilevel modeling has become a common analytic technique across a variety of disciplines including medicine and the social and behavioral sciences. However, because many researchers who use multilevel modeling in their research do not report if the data were screened for potential violations of distributional assumptions and outliers, it is...

    Provided By University of South Florida

  • White Papers // Jul 2010

    Effect of Variable Bus Speeds on Bus Network Design

    This paper provides a methodology for solving the bus network design problem, covering network design and frequency setting and taking into consideration that commercial speeds of buses vary depending on the aggregated frequency of buses on each corridor. This methodology, referred to as Variable Speed Methodology, uses a variation of...

    Provided By University of South Florida

  • White Papers // Mar 2012

    Mach-Zehnder Interferometer Based Design of All Optical Reversible Binary Adder

    In recent years reversible logic has emerged as a promising computing model for applications in dissipation less optical computing, low power CMOS, quantum computing, etc. In reversible circuits there exist a one-to-one mapping between the inputs and the outputs resulting in no loss of information. Researchers have implemented reversible logic...

    Provided By University of South Florida

  • White Papers // Jan 2012

    Model-Based Trace-Checking

    Trace analysis can be a useful way to discover problems in a program under test. Rather than writing a special purpose trace analysis tool, this paper proposes that traces can usefully be analyzed by checking them against a formal model using a standard model-checker or else an animator for executable...

    Provided By University of South Florida

  • White Papers // Nov 2012

    Reduced-Complexity Soft STBC Detection

    Inspired by the scientific breakthrough of Turbo Codes (TCs) proposed, a near-capacity performance has been pursued by numerous researchers in diverse system contexts. However, as the researchers have inched closer and closer to the channel capacity, the complexity of the resultant communication systems was increased. The soft-decision aided MIMO detection...

    Provided By University of South Florida

  • White Papers // Nov 2012

    Iterative Detection and Decoding Using Approximate Bayesian Theorem Based PDA Method Over MIMO Nakagami-M Fading Channels

    In this paper, the design of Iterative Detection and Decoding (IDD) schemes relying on a low-complexity Probabilistic Data Association (PDA) aided method is conceived for turbo-coded Multiple-Input Multiple-Output (MIMO) systems communicating over Nakagami-m fading channels. The known PDA based MIMO detectors typically operate purely in the probability-domain. The authors show...

    Provided By University of South Florida

  • White Papers // Aug 2013

    Applying of Quality of Experience to System Optimisation

    State-of-the-art mobile devices, such as Smartphone's and tablets, are highly versatile and must deliver high performance across a multitude of applications. The perceived performance and resulting user experience can make or break a design. It is therefore vital that device design and optimization take into account the expectations and perceptions...

    Provided By University of South Florida

  • White Papers // Jun 2013

    On the Viability of Using Liability to Incentivise Internet Security

    Internet use is characterized by externalities, which means that it can be sufficiently pro table for criminal enterprises to flourish. One possible mechanism which could be considered to improve incentives is liability. The authors conduct a review of the literature relating to liability theory, liability online, and security economics in...

    Provided By University of South Florida

  • White Papers // Mar 2011

    Semantics and Optimization of the SPARQL 1.1 Federation Extension

    The W3C SPARQL working group is defining the new SPARQL 1.1 query language. The SPARQL 1.1 focuses mainly on the description of the language. In this paper, the authors provide a formalization of the syntax and semantics of the SPARQL 1.1 federation extension, an important fragment of the language that...

    Provided By University of South Florida

  • White Papers // Dec 2006

    Energy Optimization of Multiprocessor Systems on Chip by Voltage Selection

    Dynamic voltage selection and adaptive body biasing have been shown to reduce dynamic and leakage power consumption effectively. In this paper, the authors optimally solve the combined supply voltage and body bias selection problem for multi-processor systems with imposed time constraints, explicitly taking into account the transition overheads implied by...

    Provided By University of South Florida

  • White Papers // Sep 2008

    Parallel Execution and Scriptability in Micromagnetic Simulations

    The authors demonstrate the feasibility of an 'Encapsulated parallelism' approach towards micromagnetic simulations that combines offering a high degree of flexibility to the user with the efficient utilization of parallel computing resources. While parallelization is obviously desirable to address the high numerical effort required for realistic micromagnetic simulations through utilizing...

    Provided By University of South Florida

  • White Papers // Mar 2006

    Dynamic Voltage Scaling Aware Delay Fault Testing

    Power management of System-on-Chip (SoCs) has attracted a large body of research; among the most promising power management policies is Dynamic Voltage Scaling (DVS). DVS exploits the fact that the clock frequency of a processor changes proportionally with the supply voltage, while the dynamic energy is proportional to the square...

    Provided By University of South Florida

  • White Papers // Jul 2008

    Hardware Dependability in the Presence of Soft Errors

    Using formal verification for designing hardware designs free from logic design bugs has been an active area of research since the last 15 years. Technology has matured and the authors have a choice of formal tools such as model checkers, equivalence checkers, and a range of theorem provers. Hardware reliability...

    Provided By University of South Florida

  • White Papers // Oct 2011

    Snow White Clouds and the Seven Dwarfs

    With increasing availability of cloud computing services, this paper addresses the challenge consumers of Infrastructure-as-a-Service (IaaS) have in determining which IaaS provider and resources are best suited to run an application that may have specific Quality of Service (QoS) requirements. Utilizing application modeling to predict performance is an attractive concept,...

    Provided By University of South Florida

  • White Papers // Jun 2010

    Investigation Into Low Power and Reliable System-on-Chip Design

    It is likely that the demand for Multi-Processor System-on-Chip (MPSoC) with low power consumption and high reliability in the presence of soft errors will continue to increase. However, low power and reliable MPSoC design is challenging due to conflicting tradeoff between power minimization and reliability objectives. This paper is concerned...

    Provided By University of South Florida

  • White Papers // Mar 2013

    Real Time Controller Implementation for an Atomic Force Microscope Using a Digital Signal Processor

    The objective of this contribution is to report a low cost implementation of a control system for an Atomic Force Microscope (AFM). AFMs rely on a feedback controller as an integral part of their operation. Currently the controllers shipped with most commercial AFMs are implemented in a closed source manner...

    Provided By University of South Florida

  • White Papers // Mar 2008

    MPEG-Based Performance Comparison Between Network-on-Chip and AMBA MPSoC

    Network-on-Chip (NoC) is emerging as a viable on-chip communication infrastructure for Multi-Processor System-on-Chip (MPSoC). Video streaming is seen as a key feature of future MPSoC and MPEG video decoding is a major component of these systems. Using analytical and simulation results, this paper presents comparative analyses between network on chip...

    Provided By University of South Florida

  • White Papers // Dec 2013

    An Improved Instruction-Level Power Model for ARM11 Microprocessor

    Low power consumption is becoming more and more important, because a lot of embedded systems use batteries as energy sources. To make a low power processor, a number of hardware techniques have been developed, such as clock gating and power gating. Software also affects the power consumption, but there is...

    Provided By University of South Florida

  • White Papers // Jan 2014

    Reducing the Energy Consumption in Fault-tolerant Distributed Embedded Systems with Time-Constraint

    In this paper, the authors address the problem of reducing the energy consumption in distributed embedded systems associated with time-constraints and equipped with fault-tolerant techniques. A greedy heuristic is presented to reduce the energy during task mapping and fault tolerance policy assignment. Fault tolerance is achieved through task re-execution and...

    Provided By University of South Florida

  • White Papers // Jan 2014

    A Dual-Mode Synchronous/Asynchronous CORDIC Processor

    Fourth Generation (4G) wireless and mobile systems are currently the focus of research and development. They will allow new types of services to be universally available to consumers and for industrial applications. For application in a software defined radio a CORDIC processor has been developed that can operate both in...

    Provided By University of South Florida

  • White Papers // Dec 2009

    A Communication Infrastructure for a Million Processor Machine

    The SpiNNaker machine is a massively parallel computing system, consisting of 1,000,000 cores. From one perspective, it has a place in Flynns' taxonomy: it is a straightforward MIMD machine. However, there is no interconnecting bus structure, and there is no attempt to maintain coherency between any of the memory banks....

    Provided By University of South Florida

  • White Papers // Jan 2014

    Implementation of an IEEE 802.11a Compliant Low-Power Baseband Processor

    Fourth Generation (4G) wireless and mobile systems are today very attractive for research and development. New types of services will be universally available to consumers and for industrial applications with the use of 4G devices. Broadband wireless networks will enable packet based high-speed data transfer suitable for video transmission and...

    Provided By University of South Florida

  • White Papers // Jul 2011

    On Proving With Event-B That a Pipelined Processor Model Implements its ISA Specification

    Microprocessor pipelining is a well-established technique that improves performance and reduces power consumption by overlapping instruction execution. Verifying, however, that an implementation meets this ISA specification is complex and time-consuming. One of the key verification issues that must be addressed is that of overlapping instruction execution. This paper can introduce...

    Provided By University of South Florida

  • White Papers // Oct 2006

    On the Hardware Reduction of Z-Datapath of Vectoring CORDIC

    In this paper, the authors present a novel design of a hardware optimal vectoring CORDIC processor. They present a mathematical theory to show that using bipolar binary notation it is possible to eliminate all the arithmetic computations required along the z-datapath. Using this technique it is possible to achieve three...

    Provided By University of South Florida

  • White Papers // Nov 2006

    Thermal-Aware SoC Test Scheduling with Test Set Partitioning and Interleaving

    High temperature has become a major problem for System-on-Chip (SoC) testing. In order to reduce the test time while keeping the temperature of the chip under test within a safe range, a thermal-aware test scheduling technique is required. This paper presents an approach to minimize the test time and, at...

    Provided By University of South Florida