WasatchWare

Displaying 1-19 of 19 results

  • White Papers // May 2013

    Centrality-Based Network Coder Placement for Peer-to-Peer Content Distribution

    Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, the authors propose a practical network coder placement algorithm which achieves...

    Provided By WasatchWare

  • White Papers // Apr 2013

    Detection of Influenza Viruses Attached to an Optical Disk

    The authors have examined the detection of 100 nm polystyrene beads and influenza viruses using an optical disk drive tester. They have successfully detected these particles using this method. The results agreed well with images taken by a SEM. This paper indicates that the optical disk technology can be used...

    Provided By WasatchWare

  • White Papers // Nov 2012

    Rarest-First and Coding Are Not Enough

    Network coding has been applied successfully in Peer-To-Peer (P2P) systems to shorten the distribution time. Pieces of data, i.e. blocks, are combined, i.e. encoded, by the sending peers before forwarding to other peers. Even though requiring all peers to encode might achieve shortest distribution time, it is not necessarily optimal...

    Provided By WasatchWare

  • White Papers // Aug 2012

    Fuzzy Clustering Analysis of Data Mining: Application to an Accident Mining System

    In this paper, the authors deal with the application of data transforms and fuzzy clustering to extract useful data. It is possible to distinguish similar information which includes selector and removes clusters of less importance with respect to describing the data. Clustering takes place in the product space of systems...

    Provided By WasatchWare

  • White Papers // May 2012

    Resource Allocation and Access Strategy Selection for QoS Provisioning in Cognitive Networks

    Dynamic Spectrum Access (DSA) strategy selection and the associated resource allocation are critically important issues for cognitive networks, because they need to not only satisfy the interference constraint caused to the Primary Users (PU), but also meet the delay Quality-of-Service (QoS) requirements for the Secondary Users (SU). In this paper,...

    Provided By WasatchWare

  • White Papers // Mar 2012

    A Novel Clipping and Filtering Method Employing Transmit Power Control for OFDM Systems

    This paper proposes a novel clipping and filtering method employing transmit power control to improve the Bit Error Rate (BER) performance in MIMO-OFDM transmission. The feature of the proposed approach is to perform the transmit power control before clipping and filtering to alleviate the BER degradation caused by clipping and...

    Provided By WasatchWare

  • White Papers // Mar 2012

    Cyclic Activated Power-Efficient Scheme Based Upon Dynamic Cell Configuration

    In this paper, the authors propose an energy saving solution for mobile systems based upon dynamic cell configuration for different scenarios. To characterize the optimal energy savings of base stations, they propose an active cell rotating scheme to control the number of active cells with regard to different work patterns...

    Provided By WasatchWare

  • White Papers // Dec 2011

    OSCAR Parallelizing Compiler and API for Real-Time Low Power Heterogeneous Multicores

    Heterogeneous multicores have been attracting much attention to attain high performance keeping power consumption low in wide spread of areas. However, heterogeneous multicores force programmer's very difficult programming. The long application program development period lowers product competitiveness. In order to overcome such a situation, this paper describes OSCAR parallelizing compiler...

    Provided By WasatchWare

  • White Papers // Aug 2011

    Analysis of Redirection Caused by Web-Based Malware

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through Web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By WasatchWare

  • White Papers // Jun 2011

    Power and Delay Aware Synthesis of Multi-Operand Adders Targeting LUT-based FPGAs

    Recent researches have indicated that multi-operand addition on FPGAs can be efficiently realized as the architecture consisting of a compressor tree which reduces the number of operands and a carry-propagate adder like ASIC by utilizing Generalized Parallel Counters (GPCs). This paper addresses power and delay aware synthesis of GPC-based compressor...

    Provided By WasatchWare

  • White Papers // Jun 2011

    An Energy Efficient Data Secrecy Scheme for Wireless Body Sensor Networks

    Data secrecy is one of the key concerns for Wireless Body Sensor Networks (WBSNs). Usually, a data secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face more serious limitations than general wireless networks in terms of energy supply. To address this, in this paper, the authors...

    Provided By WasatchWare

  • White Papers // Feb 2011

    OSCAR API for Real-Time Low-Power Multicores and Its Performance on Multicores and SMP Servers

    Multicore processors have been widely used in a variety of applications such as embedded (consumer electronics) systems, PCs, workstations, and high-performance computers. In consumer electronics applications, various types of multicore processors are used in a wide variety of applications such as image and audio processing, face recognition, and real-time controls....

    Provided By WasatchWare

  • White Papers // Nov 2010

    Parallelizing Compiler Framework and API for Power Reduction and Software Productivity of Real-Time Heterogeneous Multicores

    Heterogeneous multicores have been attracting much attention to attain high performance keeping power consumption low in wide spread of areas. However, heterogeneous multicores force programmer's very difficult programming. The long application program development period lowers product competitiveness. In order to overcome such a situation, this paper proposes a compilation framework...

    Provided By WasatchWare

  • White Papers // Aug 2010

    Parallelizable C and Its Performance on Low Power High Performance Multicore Processors

    As multicore processors are getting popular, demands for automatic parallelization achieving high performance, low power, and short software development period are increasing. However, automatic parallelization of C programs has been difficult due to the pointer analysis. This paper proposes Parallelizable C, which is a kind of programming methods for sequential...

    Provided By WasatchWare

  • White Papers // May 2010

    D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-Order Keystream Generation

    Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable storage service providers. For example, in applications such as cloud computing where data storage is transparent to the owner....

    Provided By WasatchWare

  • White Papers // Oct 2009

    Continuous Contention-Assisted Transmission MAC Protocol for Wireless Ad-Hoc Network

    In this paper, the authors introduce a new MAC protocol called Continuous contention-Assisted Transmission (CAT) for wireless ad-hoc network. This proposed protocol is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) but they have modified the ACK packet and re-designed mobile stations behavior so that they could continuously...

    Provided By WasatchWare

  • White Papers // Jul 2008

    Prottoy Middleware Platform for Smart Object Systems

    In this paper, the authors present a middleware platform, Prottoy for the development of smart object systems. A smart object has some specific characteristics e.g., augmentation variation, perceptual feedback provision, push-pull model, etc. In addition a smart object could be stand-alone, co-operative or associated with an external application. Generic pervasive...

    Provided By WasatchWare

  • White Papers // Oct 2007

    Language Extensions in Support of Compiler Parallelization

    In this paper, the authors propose an approach to automatic compiler parallelization based on language extensions that is applicable to a broader range of program structures and application domains than in past work. As a complement to ongoing work on high productivity languages for explicit parallelism, the basic idea in...

    Provided By WasatchWare

  • White Papers // Jun 2006

    Performance Evaluation of Heterogeneous Chip Multi-Processor with MP3 Audio Encoder

    In this paper, the authors describe processing performance of MP3 audio encoding on a Heterogeneous Chip Multi-Processor (HCMP) that possesses different types of Processing Elements (PEs) such as general-purpose processors and special-purpose processors. The HCMP realizes higher performance than conventional single-core processors or even homogeneous multi-processors for some specific applications...

    Provided By WasatchWare

  • White Papers // Jun 2011

    An Energy Efficient Data Secrecy Scheme for Wireless Body Sensor Networks

    Data secrecy is one of the key concerns for Wireless Body Sensor Networks (WBSNs). Usually, a data secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face more serious limitations than general wireless networks in terms of energy supply. To address this, in this paper, the authors...

    Provided By WasatchWare

  • White Papers // Nov 2012

    Rarest-First and Coding Are Not Enough

    Network coding has been applied successfully in Peer-To-Peer (P2P) systems to shorten the distribution time. Pieces of data, i.e. blocks, are combined, i.e. encoded, by the sending peers before forwarding to other peers. Even though requiring all peers to encode might achieve shortest distribution time, it is not necessarily optimal...

    Provided By WasatchWare

  • White Papers // Aug 2012

    Fuzzy Clustering Analysis of Data Mining: Application to an Accident Mining System

    In this paper, the authors deal with the application of data transforms and fuzzy clustering to extract useful data. It is possible to distinguish similar information which includes selector and removes clusters of less importance with respect to describing the data. Clustering takes place in the product space of systems...

    Provided By WasatchWare

  • White Papers // Oct 2009

    Continuous Contention-Assisted Transmission MAC Protocol for Wireless Ad-Hoc Network

    In this paper, the authors introduce a new MAC protocol called Continuous contention-Assisted Transmission (CAT) for wireless ad-hoc network. This proposed protocol is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) but they have modified the ACK packet and re-designed mobile stations behavior so that they could continuously...

    Provided By WasatchWare

  • White Papers // May 2013

    Centrality-Based Network Coder Placement for Peer-to-Peer Content Distribution

    Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, the authors propose a practical network coder placement algorithm which achieves...

    Provided By WasatchWare

  • White Papers // May 2012

    Resource Allocation and Access Strategy Selection for QoS Provisioning in Cognitive Networks

    Dynamic Spectrum Access (DSA) strategy selection and the associated resource allocation are critically important issues for cognitive networks, because they need to not only satisfy the interference constraint caused to the Primary Users (PU), but also meet the delay Quality-of-Service (QoS) requirements for the Secondary Users (SU). In this paper,...

    Provided By WasatchWare

  • White Papers // Mar 2012

    A Novel Clipping and Filtering Method Employing Transmit Power Control for OFDM Systems

    This paper proposes a novel clipping and filtering method employing transmit power control to improve the Bit Error Rate (BER) performance in MIMO-OFDM transmission. The feature of the proposed approach is to perform the transmit power control before clipping and filtering to alleviate the BER degradation caused by clipping and...

    Provided By WasatchWare

  • White Papers // Mar 2012

    Cyclic Activated Power-Efficient Scheme Based Upon Dynamic Cell Configuration

    In this paper, the authors propose an energy saving solution for mobile systems based upon dynamic cell configuration for different scenarios. To characterize the optimal energy savings of base stations, they propose an active cell rotating scheme to control the number of active cells with regard to different work patterns...

    Provided By WasatchWare

  • White Papers // Aug 2011

    Analysis of Redirection Caused by Web-Based Malware

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through Web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By WasatchWare

  • White Papers // Jul 2008

    Prottoy Middleware Platform for Smart Object Systems

    In this paper, the authors present a middleware platform, Prottoy for the development of smart object systems. A smart object has some specific characteristics e.g., augmentation variation, perceptual feedback provision, push-pull model, etc. In addition a smart object could be stand-alone, co-operative or associated with an external application. Generic pervasive...

    Provided By WasatchWare

  • White Papers // Feb 2011

    OSCAR API for Real-Time Low-Power Multicores and Its Performance on Multicores and SMP Servers

    Multicore processors have been widely used in a variety of applications such as embedded (consumer electronics) systems, PCs, workstations, and high-performance computers. In consumer electronics applications, various types of multicore processors are used in a wide variety of applications such as image and audio processing, face recognition, and real-time controls....

    Provided By WasatchWare

  • White Papers // Aug 2010

    Parallelizable C and Its Performance on Low Power High Performance Multicore Processors

    As multicore processors are getting popular, demands for automatic parallelization achieving high performance, low power, and short software development period are increasing. However, automatic parallelization of C programs has been difficult due to the pointer analysis. This paper proposes Parallelizable C, which is a kind of programming methods for sequential...

    Provided By WasatchWare

  • White Papers // Jun 2006

    Performance Evaluation of Heterogeneous Chip Multi-Processor with MP3 Audio Encoder

    In this paper, the authors describe processing performance of MP3 audio encoding on a Heterogeneous Chip Multi-Processor (HCMP) that possesses different types of Processing Elements (PEs) such as general-purpose processors and special-purpose processors. The HCMP realizes higher performance than conventional single-core processors or even homogeneous multi-processors for some specific applications...

    Provided By WasatchWare

  • White Papers // Oct 2007

    Language Extensions in Support of Compiler Parallelization

    In this paper, the authors propose an approach to automatic compiler parallelization based on language extensions that is applicable to a broader range of program structures and application domains than in past work. As a complement to ongoing work on high productivity languages for explicit parallelism, the basic idea in...

    Provided By WasatchWare

  • White Papers // Nov 2010

    Parallelizing Compiler Framework and API for Power Reduction and Software Productivity of Real-Time Heterogeneous Multicores

    Heterogeneous multicores have been attracting much attention to attain high performance keeping power consumption low in wide spread of areas. However, heterogeneous multicores force programmer's very difficult programming. The long application program development period lowers product competitiveness. In order to overcome such a situation, this paper proposes a compilation framework...

    Provided By WasatchWare

  • White Papers // Dec 2011

    OSCAR Parallelizing Compiler and API for Real-Time Low Power Heterogeneous Multicores

    Heterogeneous multicores have been attracting much attention to attain high performance keeping power consumption low in wide spread of areas. However, heterogeneous multicores force programmer's very difficult programming. The long application program development period lowers product competitiveness. In order to overcome such a situation, this paper describes OSCAR parallelizing compiler...

    Provided By WasatchWare

  • White Papers // May 2010

    D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-Order Keystream Generation

    Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable storage service providers. For example, in applications such as cloud computing where data storage is transparent to the owner....

    Provided By WasatchWare

  • White Papers // Apr 2013

    Detection of Influenza Viruses Attached to an Optical Disk

    The authors have examined the detection of 100 nm polystyrene beads and influenza viruses using an optical disk drive tester. They have successfully detected these particles using this method. The results agreed well with images taken by a SEM. This paper indicates that the optical disk technology can be used...

    Provided By WasatchWare

  • White Papers // Jun 2011

    Power and Delay Aware Synthesis of Multi-Operand Adders Targeting LUT-based FPGAs

    Recent researches have indicated that multi-operand addition on FPGAs can be efficiently realized as the architecture consisting of a compressor tree which reduces the number of operands and a carry-propagate adder like ASIC by utilizing Generalized Parallel Counters (GPCs). This paper addresses power and delay aware synthesis of GPC-based compressor...

    Provided By WasatchWare