Zhejiang Sci-Tech University

Displaying 1-34 of 34 results

  • White Papers // Jul 2013

    Scalable-Grain Pipeline Parallelization Method for Multi-Core Systems

    With the continuous advance of semiconductor technology, the enormous number of transistors available on a single chip enables the integration of tens or hundreds of processing cores on a Multi-Processor System-on-Chips (MPSoCs). How to parallelize the great amount of legacy sequential programs is the most difficult challenge faced by multi-core...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2013

    Complete Fair Tracing E-cash System with Provable Security

    E-cash enables consumers to spend e-coin anonymously in information system, but unconditional anonymity of E-cash may be misused by malicious user, therefore fair E-cash was put forward. In fair E-cash system, the anonymity of customer can be revoked when e-coins are involved in crimes, and e-coin can be traced also....

    Provided By Zhejiang Sci-Tech University

  • White Papers // Feb 2013

    Output SNR Analysis of the LPP-Hough Transform

    In many practical applications, such as radar, sonar, and communications, Linear Frequency Modulated (LFM) signals are of great importance. Since an LFM signal can be described as a straight line in the time-frequency domain, with the help of the Hough transform, the task of tracking an LFM signal can be...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jan 2013

    Design of New Security Using Symmetric and Asymmetric Cryptography Algorithms

    A computer network is any set of computing nodes which has the ability of exchanging data by interacting with each other meaningfully, allowing resource sharing in a proper manner. The collection of computers is interconnected by communication channels, which need to be secure for better information exchange. This field of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jan 2013

    A Novel Energy-Efficient Serializer Design Method for Gigascale Systems

    Serial communication facilitates the high-speed communication in gigascale systems. Serializer designs typically use the current-mode logic to achieve high speed at the cost of large power consumption. For the latches in the serializer, the power-hungry current-mode logic is replaced with differential cascaded pass-gate to reduce the power and delay. For...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Nov 2012

    Block Relay for Physical-Layer Network Coding

    The topic of Two-Way Relay Channels (TWRC) has attracted significant attention recently. In a TWRC system, terminals as transceiving entities, exchange information through the relay. To achieve the spectral efficiency, terminals send symbols to the relay simultaneously first, and then the relay broadcasts the processed symbols back to the terminals....

    Provided By Zhejiang Sci-Tech University

  • White Papers // Nov 2012

    Joint Channel-Network Coding With Rateless Code in Two-Way Relay System

    In this paper, the authors design a joint channel-network coding scheme based on rateless code for the three-stage two-way relay system, where two terminals send messages to each other through a relay between them. Each terminal takes one of the first two stages to encode its message using a Raptor...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Sep 2012

    Improving Energy Efficiency in Femtocell Networks: A Hierarchical Reinforcement Learning Framework

    This paper investigates energy efficiency for two-tier femtocell networks through combining game theory and stochastic learning. With the Stackelberg game formulation, a hierarchical reinforcement learning framework is applied to study the joint average utility maximization of macrocells and femtocells subject to the minimum signal-to-interference-plus-noise-ratio requirements. The macrocells behave as the...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Aug 2012

    Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems With Interference

    This paper presents an analytical investigation on the outage performance of dual-hop multiple antenna amplify-and-forward relaying systems in the presence of interference. For both the fixed-gain and variable-gain relaying schemes, exact analytical expressions for the outage probability of the systems are derived. Moreover, simple outage probability approximations at the high...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2012

    Performance Influence of Live Migration on Multi-Tier Workloads in Virtualization Environments

    Live migration is a widely used technology for load balancing, fault tolerance, and power saving in cloud data centers. Previous research includes significant research work in the performance improvement of live migration. However, little work has been done to investigate the influence of live migration on virtual machine workloads that...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jun 2012

    Strong Roaming Authentication Technique for Wireless and Mobile Networks

    When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Throughput Capacity of VANETs by Exploiting Mobility Diversity

    Recently, Vehicular Ad hoc NETworks (VANETs) have been considered as a promising technique that can change the on-the-road daily life of human beings. Generally, VANETs are designed for three major applications, road safety, infotainment delivery, and traffic monitoring and management. To support these applications, VANETs usually consist of two components,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    GM-PAB: A Grid-Based Energy Saving Scheme With Predicted Traffic Load Guidance for Cellular Networks

    In cellular networks, the base station power consumption is not simply proportional to the traffic loads of its coverage. As the traffic load fluctuates spatially and temporally, the base stations consequently suffer from heavy energy wastage when the traffic loads of their coverage are low. In this paper, the authors...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Blind Identification of Multiple Sparse Channels

    In this paper, the authors propose a low-complexity algorithm for the blind identification of multiple sparse channels. The proposed algorithm exploits the sparse structure of the channel impulse responses by posing the channel estimation as a convex optimization problem with L1-minimization. Unlike previous work in the literature for sparse channel...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    An Efficient Differencing Algorithm Based on Suffix Array for Reprogramming Wireless Sensor Networks

    Wireless reprogramming is a crucial technique for managing large-scale Wireless Sensor Networks (WSNs). It is, however, energy intensive to disseminate the code to enable reprogramming. Incremental reprogramming is a promising approach to reduce the dissemination cost. In incremental reprogramming, only the delta between the new code and the old code...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    On the Scalability of Feedback-Based Two-Stage Switch

    The feedback-based two-stage switch does not require a central scheduler and can provide close to 100% throughput. But the number of cross-points required for the two stages of switch fabric is 2N2, and the average packet delay performance (even under light traffic load) is on the order of O(N) slots,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Satellite Based ''Power Utility Intranet~~ for Smart Management of Electric Distribution Networks: The AuRA-NMS Case Study

    Recent research confirms that current slow central control based upon Supervisory Control and Data Acquisition (SCADA) systems is no longer sufficient to support power distribution grid with Distributed Generators (DGs). Distributed Network Operators (DNOs) need novel management mechanisms coupled with advanced communication infrastructure to meet the emerging technical challenges. This...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Conjectural Variations in Multi-Agent Reinforcement Learning for Energy-Efficient Cognitive Wireless Mesh Networks

    As energy saving and environmental protection become an inevitable trend, researchers need to shift their focus to "Green" oriented architecture design. Recent advances in the area of Cognitive Radio (CR) have significant potential towards "Green" communications. One of the critical challenges for operating CRs in a wireless mesh network is...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    An Enhanced Link Adaptation for the MB-OFDM UWB System

    In the paper, an improved link adaptation scheme is proposed for the Wi-Media MB-OFDM UWB system, in which Quality of Service (QoS) support is provided. The proposed scheme consists of three functional blocks: Link Quality Indicator (LQI) calculator, Frame Error Rate (FER) estimator, and Transmitter (TX) parameter selector. Instead of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    A Dual-Active Spatial Cloaking Algorithm for Location Privacy Preserving in Mobile Peer-to-Peer Networks

    Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Queueing Analysis for Cognitive Radio Networks With Lower-Layer Considerations

    In this paper, the queue dynamics of Secondary Users (SUs) in a multi-SU and multi-channel cognitive radio network is analyzed to obtain the expressions of Quality of Service (QoS) metrics. Specially, in the analysis, the authors take several lower-layer mechanisms and settings into account, including Automatic Repeat reQuest (ARQ), finite-size...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Error Exponents for Orthogonal STBC in Generalized-K Fading MIMO Channels

    In this paper, the authors study the error exponent of generalized-K fading Multiple-Input Multiple-Output (MIMO) channels over Orthogonal Space-Time Block Codes (OSTBC). Error exponent sets ultimate bounds on the performance of communication systems employing codes of finite complexity and has been seen as one of the most significant information theoretic...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    A POMDP-Based Optimal Spectrum Sensing and Access Scheme for Cognitive Radio Networks With Hardware Limitation

    In cognitive radio networks, multiple discontinuous spectrum opportunities are detected by spectrum sensing and utilized together to satisfy the service requirement by spectrum aggregation. In this paper, the authors develop an analytical framework for joint spectrum sensing and access scheme based on Partially Observable Markov Decision Process (POMDP). Considering the...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Bandwidth-Related Optimization in High-Speed Frequency Dividers Using SiGe Technology

    In this paper, the trade-off related to bandwidth of high-speed common-mode logic frequency divider is analyzed in detail. A method to optimize the operating frequency, band-width as well as power consumption is proposed. This method is based on bipolar device characteristics, whereby a negative resistance model can be used to...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2011

    Low Latency and Energy Efficient Multicasting Schemes for 3D NoC-based SoCs

    In this paper, two topology oriented multicast routing algorithms, MXYZ and AL+XYZ, are proposed to support multicasting in 3D Network-on-Chips (NoCs). In specific, MXYZ is a dimension order multicast routing algorithm that targets 3D NoC systems built upon regular topologies, while AL+XYZ is applicable to NoCs with irregular topologies. If...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jun 2011

    Strongly Secure One Round Authenticated Key Exchange Protocol With Perfect Forward Security

    This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security. Currently, there exist no authenticated key exchange protocols which are provably secure in eCK model and meanwhile achieve perfect forward security against active adversary in one round. The authors propose a new...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2011

    A Linear Logic Representation for BPEL Process Protocol

    Business Process Execution Language (BPEL) is a powerful tool for describing web services compositions. The protocol of a BPEL process indicates the order of messages, in which it sends or receives messages, as well as the structure of the internal logic. Although formal methods have been used to model BPEL,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2009

    Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks

    The authors consider the problem of gathering correlated sensor data by a single sink node in a wireless sensor network. They assume that the sensor nodes are energy-constrained and design efficient distributed protocols to maximize the network lifetime. Many existing approaches focus on optimizing the routing layer only, but in...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Networked Ultrasonic Sensors for Target Tracking: An Experimental Study

    As an emerging application, tracking mobile targets using distributed and networked sensors is gaining noticeable attentions in recent years. In this paper, the authors utilize ultrasonic sensors, which are traditionally viewed as basic ranging components, to build target detection and tracking system. An integrated sensor node, with one communication/computation module,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Spectrum Self-Coexistence in Cognitive Wireless Access Networks

    Future Wireless Access Networks, characterized by a large number of small cells densely distributed in metropolitan area, are likely to be the dominating form of future wireless communications. It is expected that the Dynamic Spectrum Access (DSA) enabled by Cognitive Radio (CR) technologies will act as a key for their...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    A Graph Embedding Method for Wireless Sensor Networks Localization

    Wireless sensor location estimation is an important area and attracts considerable research interests. In this paper, the authors present a novel graph embedding method for the localization problem by using signal strengths. They view the wireless sensor nodes as a group of distributed devices, and employ an appropriate kernel function...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Power-Aware Mapping for Network-on-Chip Architectures Under Bandwidth and Latency Constraints

    In this paper, the authors investigate the bandwidth- and latency-constrained IP mapping problem that maps a given set of IP cores onto the tiles of a mesh-based Network-on-Chip (NoC) architecture to minimize the power consumption due to intercore communications. By examining various applications' communication characteristics shown in their communication trace...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2008

    The Business Process Model for IT Service Management

    The paper primary deals with IT Service Management (ITSM) and IT Infrastructure Library (ITIL), as a process based method. Providing IT services with better, guaranteed quality has been the aim of many diverse efforts, undertaken under the common denominator ITSM. To develop architecture for information technology service management and design...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2006

    Research on Integration Technology of ERP and PDM Based on Business Remote Function Call

    To better support ERP system and PDM system integration for independent enterprise network manufacturing system, the characteristics of ERP and PDM integration were analyzed and the technology of business remote function call was presented. The standard or custom functions which supporting remote transfer through BRFC interface could be called by...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jun 2011

    Strongly Secure One Round Authenticated Key Exchange Protocol With Perfect Forward Security

    This paper investigates the two-pass authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) with perfect forward security. Currently, there exist no authenticated key exchange protocols which are provably secure in eCK model and meanwhile achieve perfect forward security against active adversary in one round. The authors propose a new...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Throughput Capacity of VANETs by Exploiting Mobility Diversity

    Recently, Vehicular Ad hoc NETworks (VANETs) have been considered as a promising technique that can change the on-the-road daily life of human beings. Generally, VANETs are designed for three major applications, road safety, infotainment delivery, and traffic monitoring and management. To support these applications, VANETs usually consist of two components,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    GM-PAB: A Grid-Based Energy Saving Scheme With Predicted Traffic Load Guidance for Cellular Networks

    In cellular networks, the base station power consumption is not simply proportional to the traffic loads of its coverage. As the traffic load fluctuates spatially and temporally, the base stations consequently suffer from heavy energy wastage when the traffic loads of their coverage are low. In this paper, the authors...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Blind Identification of Multiple Sparse Channels

    In this paper, the authors propose a low-complexity algorithm for the blind identification of multiple sparse channels. The proposed algorithm exploits the sparse structure of the channel impulse responses by posing the channel estimation as a convex optimization problem with L1-minimization. Unlike previous work in the literature for sparse channel...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Conjectural Variations in Multi-Agent Reinforcement Learning for Energy-Efficient Cognitive Wireless Mesh Networks

    As energy saving and environmental protection become an inevitable trend, researchers need to shift their focus to "Green" oriented architecture design. Recent advances in the area of Cognitive Radio (CR) have significant potential towards "Green" communications. One of the critical challenges for operating CRs in a wireless mesh network is...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    An Efficient Differencing Algorithm Based on Suffix Array for Reprogramming Wireless Sensor Networks

    Wireless reprogramming is a crucial technique for managing large-scale Wireless Sensor Networks (WSNs). It is, however, energy intensive to disseminate the code to enable reprogramming. Incremental reprogramming is a promising approach to reduce the dissemination cost. In incremental reprogramming, only the delta between the new code and the old code...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    On the Scalability of Feedback-Based Two-Stage Switch

    The feedback-based two-stage switch does not require a central scheduler and can provide close to 100% throughput. But the number of cross-points required for the two stages of switch fabric is 2N2, and the average packet delay performance (even under light traffic load) is on the order of O(N) slots,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // May 2012

    Satellite Based ''Power Utility Intranet~~ for Smart Management of Electric Distribution Networks: The AuRA-NMS Case Study

    Recent research confirms that current slow central control based upon Supervisory Control and Data Acquisition (SCADA) systems is no longer sufficient to support power distribution grid with Distributed Generators (DGs). Distributed Network Operators (DNOs) need novel management mechanisms coupled with advanced communication infrastructure to meet the emerging technical challenges. This...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    An Enhanced Link Adaptation for the MB-OFDM UWB System

    In the paper, an improved link adaptation scheme is proposed for the Wi-Media MB-OFDM UWB system, in which Quality of Service (QoS) support is provided. The proposed scheme consists of three functional blocks: Link Quality Indicator (LQI) calculator, Frame Error Rate (FER) estimator, and Transmitter (TX) parameter selector. Instead of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    A Dual-Active Spatial Cloaking Algorithm for Location Privacy Preserving in Mobile Peer-to-Peer Networks

    Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Queueing Analysis for Cognitive Radio Networks With Lower-Layer Considerations

    In this paper, the queue dynamics of Secondary Users (SUs) in a multi-SU and multi-channel cognitive radio network is analyzed to obtain the expressions of Quality of Service (QoS) metrics. Specially, in the analysis, the authors take several lower-layer mechanisms and settings into account, including Automatic Repeat reQuest (ARQ), finite-size...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Error Exponents for Orthogonal STBC in Generalized-K Fading MIMO Channels

    In this paper, the authors study the error exponent of generalized-K fading Multiple-Input Multiple-Output (MIMO) channels over Orthogonal Space-Time Block Codes (OSTBC). Error exponent sets ultimate bounds on the performance of communication systems employing codes of finite complexity and has been seen as one of the most significant information theoretic...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    A POMDP-Based Optimal Spectrum Sensing and Access Scheme for Cognitive Radio Networks With Hardware Limitation

    In cognitive radio networks, multiple discontinuous spectrum opportunities are detected by spectrum sensing and utilized together to satisfy the service requirement by spectrum aggregation. In this paper, the authors develop an analytical framework for joint spectrum sensing and access scheme based on Partially Observable Markov Decision Process (POMDP). Considering the...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Aug 2012

    Outage Probability of Dual-Hop Multiple Antenna AF Relaying Systems With Interference

    This paper presents an analytical investigation on the outage performance of dual-hop multiple antenna amplify-and-forward relaying systems in the presence of interference. For both the fixed-gain and variable-gain relaying schemes, exact analytical expressions for the outage probability of the systems are derived. Moreover, simple outage probability approximations at the high...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Networked Ultrasonic Sensors for Target Tracking: An Experimental Study

    As an emerging application, tracking mobile targets using distributed and networked sensors is gaining noticeable attentions in recent years. In this paper, the authors utilize ultrasonic sensors, which are traditionally viewed as basic ranging components, to build target detection and tracking system. An integrated sensor node, with one communication/computation module,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Spectrum Self-Coexistence in Cognitive Wireless Access Networks

    Future Wireless Access Networks, characterized by a large number of small cells densely distributed in metropolitan area, are likely to be the dominating form of future wireless communications. It is expected that the Dynamic Spectrum Access (DSA) enabled by Cognitive Radio (CR) technologies will act as a key for their...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    A Graph Embedding Method for Wireless Sensor Networks Localization

    Wireless sensor location estimation is an important area and attracts considerable research interests. In this paper, the authors present a novel graph embedding method for the localization problem by using signal strengths. They view the wireless sensor nodes as a group of distributed devices, and employ an appropriate kernel function...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jun 2012

    Strong Roaming Authentication Technique for Wireless and Mobile Networks

    When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jan 2013

    Design of New Security Using Symmetric and Asymmetric Cryptography Algorithms

    A computer network is any set of computing nodes which has the ability of exchanging data by interacting with each other meaningfully, allowing resource sharing in a proper manner. The collection of computers is interconnected by communication channels, which need to be secure for better information exchange. This field of...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2012

    Bandwidth-Related Optimization in High-Speed Frequency Dividers Using SiGe Technology

    In this paper, the trade-off related to bandwidth of high-speed common-mode logic frequency divider is analyzed in detail. A method to optimize the operating frequency, band-width as well as power consumption is proposed. This method is based on bipolar device characteristics, whereby a negative resistance model can be used to...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2009

    Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks

    The authors consider the problem of gathering correlated sensor data by a single sink node in a wireless sensor network. They assume that the sensor nodes are energy-constrained and design efficient distributed protocols to maximize the network lifetime. Many existing approaches focus on optimizing the routing layer only, but in...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Feb 2013

    Output SNR Analysis of the LPP-Hough Transform

    In many practical applications, such as radar, sonar, and communications, Linear Frequency Modulated (LFM) signals are of great importance. Since an LFM signal can be described as a straight line in the time-frequency domain, with the help of the Hough transform, the task of tracking an LFM signal can be...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2011

    Low Latency and Energy Efficient Multicasting Schemes for 3D NoC-based SoCs

    In this paper, two topology oriented multicast routing algorithms, MXYZ and AL+XYZ, are proposed to support multicasting in 3D Network-on-Chips (NoCs). In specific, MXYZ is a dimension order multicast routing algorithm that targets 3D NoC systems built upon regular topologies, while AL+XYZ is applicable to NoCs with irregular topologies. If...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Oct 2009

    Power-Aware Mapping for Network-on-Chip Architectures Under Bandwidth and Latency Constraints

    In this paper, the authors investigate the bandwidth- and latency-constrained IP mapping problem that maps a given set of IP cores onto the tiles of a mesh-based Network-on-Chip (NoC) architecture to minimize the power consumption due to intercore communications. By examining various applications' communication characteristics shown in their communication trace...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Mar 2011

    A Linear Logic Representation for BPEL Process Protocol

    Business Process Execution Language (BPEL) is a powerful tool for describing web services compositions. The protocol of a BPEL process indicates the order of messages, in which it sends or receives messages, as well as the structure of the internal logic. Although formal methods have been used to model BPEL,...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2006

    Research on Integration Technology of ERP and PDM Based on Business Remote Function Call

    To better support ERP system and PDM system integration for independent enterprise network manufacturing system, the characteristics of ERP and PDM integration were analyzed and the technology of business remote function call was presented. The standard or custom functions which supporting remote transfer through BRFC interface could be called by...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Dec 2008

    The Business Process Model for IT Service Management

    The paper primary deals with IT Service Management (ITSM) and IT Infrastructure Library (ITIL), as a process based method. Providing IT services with better, guaranteed quality has been the aim of many diverse efforts, undertaken under the common denominator ITSM. To develop architecture for information technology service management and design...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2012

    Performance Influence of Live Migration on Multi-Tier Workloads in Virtualization Environments

    Live migration is a widely used technology for load balancing, fault tolerance, and power saving in cloud data centers. Previous research includes significant research work in the performance improvement of live migration. However, little work has been done to investigate the influence of live migration on virtual machine workloads that...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Sep 2012

    Improving Energy Efficiency in Femtocell Networks: A Hierarchical Reinforcement Learning Framework

    This paper investigates energy efficiency for two-tier femtocell networks through combining game theory and stochastic learning. With the Stackelberg game formulation, a hierarchical reinforcement learning framework is applied to study the joint average utility maximization of macrocells and femtocells subject to the minimum signal-to-interference-plus-noise-ratio requirements. The macrocells behave as the...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Nov 2012

    Block Relay for Physical-Layer Network Coding

    The topic of Two-Way Relay Channels (TWRC) has attracted significant attention recently. In a TWRC system, terminals as transceiving entities, exchange information through the relay. To achieve the spectral efficiency, terminals send symbols to the relay simultaneously first, and then the relay broadcasts the processed symbols back to the terminals....

    Provided By Zhejiang Sci-Tech University

  • White Papers // Nov 2012

    Joint Channel-Network Coding With Rateless Code in Two-Way Relay System

    In this paper, the authors design a joint channel-network coding scheme based on rateless code for the three-stage two-way relay system, where two terminals send messages to each other through a relay between them. Each terminal takes one of the first two stages to encode its message using a Raptor...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2013

    Complete Fair Tracing E-cash System with Provable Security

    E-cash enables consumers to spend e-coin anonymously in information system, but unconditional anonymity of E-cash may be misused by malicious user, therefore fair E-cash was put forward. In fair E-cash system, the anonymity of customer can be revoked when e-coins are involved in crimes, and e-coin can be traced also....

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jul 2013

    Scalable-Grain Pipeline Parallelization Method for Multi-Core Systems

    With the continuous advance of semiconductor technology, the enormous number of transistors available on a single chip enables the integration of tens or hundreds of processing cores on a Multi-Processor System-on-Chips (MPSoCs). How to parallelize the great amount of legacy sequential programs is the most difficult challenge faced by multi-core...

    Provided By Zhejiang Sci-Tech University

  • White Papers // Jan 2013

    A Novel Energy-Efficient Serializer Design Method for Gigascale Systems

    Serial communication facilitates the high-speed communication in gigascale systems. Serializer designs typically use the current-mode logic to achieve high speed at the cost of large power consumption. For the latches in the serializer, the power-hungry current-mode logic is replaced with differential cascaded pass-gate to reduce the power and delay. For...

    Provided By Zhejiang Sci-Tech University