Hardware
Stay current with the components, peripherals and physical parts that constitute your IT department.
-
Dell Software Foglight APM 5.9: Introducing Big Data Repository/Reporting Supporting Web Analytics and User-Centric APM
Does your APM tell you enough about your customers? The release of Foglight Application Performance Monitoring 5.9 from Dell has put the growing APM industry into the spotlight again. In contrast to competing APM solutions, most of which focus on technical metrics, Foglight 5.9 delivers detailed information about users, user...
Sponsored By Dell Software
-
Vendor Landscape: Application Delivery Controllers
Application Delivery Controller (ADC) solutions have become much more than simple load balancing. Before the ADC, server traffic load became too great for single servers to handle. The need for several servers, connected together as one, became a necessity to keep business applications running optimally. Read more to understand what’s...
Sponsored By Barracuda Networks
-
Tech Brief: Exchange 2013 Data Loss Prevention
Ensuring that sensitive data does not leave an organization has been one of the most challenging tasks for Exchange administrators. The new DLP (data loss prevention) feature in Exchange 2013 and Exchange Online in Office 365? enables administrators to control the flow of sensitive information within the organization, as well...
Sponsored By Dell Software
-
Fundamentals of SCSI and iSCSI.
SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...
Sponsored By Global Knowledge
-
The End of Fragmentation: How to Keep Windows Systems Running Like New
Imagine a Windows system that maintains optimum performance over time and never needs to be “de-fragged” again. By proactively optimizing I/O at the Windows level, fragmentation is prevented before it ever becomes a problem. As a result, Windows systems continue to run like new. This white paper examines what productive...
Sponsored By Condusiv Technologies
-
openBench: V-locity VM Boosts Virtual Machine Performance over 50% without Additional Hardware
There are inherent behaviors associated with Windows-based VMs that cause a tremendous amount of unnecessary I/O operations to be pushed down into the network and storage. In a virtualized environment, the problem is compounded as multiple VMs share the same storage, resulting in highly random I/O activity. This not only...
Sponsored By Condusiv Technologies
-
IDC Spotlight: Managing the I/O Explosion without Additional Hardware using V-locity
In this Technology Spotlight, IDC provides landmark research into the unexpected I/O explosion brought about by virtualization and offers guidance to organizations looking to eliminate I/O bottlenecks without incurring the cost of extra storage hardware to keep up with application demand. IDC outlines how increased agility of virtualization has compounded...
Sponsored By Condusiv Technologies
-
Guide to 50% Faster VMs - No Hardware Required
For administrators who want to increase application performance in their virtual environment without incurring the cost of additional hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads.
The white paper identifies how the...Sponsored By Condusiv Technologies
-
Introduction to Virtual Desktop Infrastructure with VMware View
Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...
Sponsored By VMware
-
Fundamentals of SCSI and iSCSI
SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...
Sponsored By Global Knowledge
-
Mobile Devices: The New Thin Clients
The nature of business hasn’t changed, but the tools people use to get work done have changed substantially. Today, companies of all sizes are using smartphones, tablets, notebooks and a host of other devices that didn’t exist a few years ago. So it’s no surprise that with all the changes...
Provided By Citrix
-
Designing Circuit Boards for Selective Robotic Coating Application
The Rules for Selective Conformal Coating are straightforward. Follow them and the user can save money and time in their application process. However, if the Rules are not followed, the resultant circuit board design can challenge even the most sophisticated conformal coating system and its operator to achieve the finish...
Provided By sch
-
Video: PC Refresh ROI
PC Fleet Manager John Mahvi talks financial, security and manageability benefits behind a PC refresh cadence.
Provided By Intel Corporation
-
Inside IT: Deploying Ultrabooks™ in the Enterprise
Podcast: Intel IT’s John Mahvi talks about the advantages to IT and employees as Intel offers Ultrabook devices widely to its employees for the first time.
Provided By Intel Corporation
-
Managing clients with Dell Client Integration Pack 3.0 and Microsoft System Center Configuration Manager 2012
In our tests, we found that Dell client management tools (Dell Client Integration Pack, Dell Client Configuration Toolkit, and Dell OpenManage Client Instrumentation) integrated in a typical SCCM 2012 environment reduced the steps it took to complete client management tasks by as much as 77 percent, and included a number...
Provided By Principled Technologies
-
An Efficient Synchronous Static Memory Design for Embedded System
Custom memory organization are challenging task in the area of VLSI design. This paper aims to design high speed and low power consumption memory for embedded system. Synchronous SRAM has been proposed and analyzed using various simulators. Xilinx simulator simulates the Synchronous SRAM memories which can perform efficient read/write capability...
Provided By International Journal of Computer Applications
-
Design of a Simple General Purpose Microprocessor with Self-Sleep Buffer
In this paper, a general purpose microprocessor is implemented and a self sleep circuit is used to reduce the power. MTCMOS is proven to be the best technique to reduce leakage power in deep submicron regime. Placing sleep transistor in fine grain has its own advantages and disadvantages and global...
Provided By International Journal of Computer Applications
-
Image Processing Based on Embedded Linux
The continuous improvement in development of Linux for the Embedded system makes it secure, table and reliable. Embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper describes...
Provided By IOSR Journal of Engineering
-
BPSK Transmitter Design Using FPGA With DAC and Pulse Shaping Filter to Minimize Inter-Symbol Interference(ISI)
In contrast to the sophisticated implementation of Binary Phase Shift Keying (BPSK) transmitter using Application Specific Integrated Circuit (ASIC), mixer, and Local Oscillator(LO) for carrier signal; Software Defined Radio (SDR) provides a high performance, efficient and re-configurable platform to integrate all these individual functions of BPSK transmitter. This paper presents...
Provided By IOSR Journal of Engineering
-
The Executive's Guide to BYOD and the Consumerization of IT
ZDNet and TechRepublic put together this collection of articles, original research, and real-world examples to help you understand the issues surrounding the BYOD trend and to develop effective strategies for dealing with it in your organization.
Provided By TechRepublic
-
Semi-Automatic Car Anti-Theft Design Using ATMega168 Microcontroller
The design and manufacture of anti-theft systems have become more and more complex due to the rise in complexity of theft in the system. Most of the anti-theft systems available on market, are the alarm types that audibly deter some thieves away but do not prevent one's car from being...
Provided By University of Georgia School of Law
-
Efficient External Sorting on Flash Memory Embedded Devices
Many embedded system applications involve storing and querying large datasets. Existing research in this area has focused on adapting and applying conventional database algorithms to embedded devices. Algorithms designed for processing queries on embedded devices must be able to execute given the small amount of available memory and energy constraints....
Provided By AIRCC
-
Code Size Reduction in Embedded Systems with Redesigned ISA for RISC Processors
Reducing the size of a program is a major goal in modern embedded systems. Large code occupies more space in the Chip and also causes higher power consumption because of increased memory traffic. In this paper, a revised architecture is proposed for embedded processors by replacing the Load-store Architecture with...
Provided By International Journal of Computer Applications
-
Design and Simulation of an Embedded Computer System for Fabric Structure
The ultimate goal of this research paper is to provide a simulation test for a microcontroller based system to be embedded into weaving machine for Monitoring and controlling the design operation. It will replace conventional mechanical methods as a forward step in embedded systems for industrial automation and mechatronics applications....
Provided By International Journal of Computer Applications
-
Automated Uplink Power Control Optimization in LTE-Advanced Relay Networks
Relaying is standardized in 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE)-Advanced Release 10 as a promising cost-efficient enhancement to existing radio access networks. Relay deployments promise to alleviate the limitations of conventional macrocell-only networks such as poor indoor penetration and coverage holes. However, to fully exploit the benefits of...
Provided By EURASIP
-
Efficient Weighted Pattern Generation Technique With Low Hardware Overhead
Weighted pseudorandom Built-In Self Test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result...
Provided By The World
-
PoliSave: Efficient Power Management of Campus PCs
In this paper, the authors study the power consumption of networked devices in a large Campus network, focusing mainly on PC usage. They first define a methodology to monitor host power state, which they then apply to their Campus network. Results show that typically people refrain from turning off their...
Provided By Politecnico di Milano
-
Minimum Mean Squared Error Interference Alignment
To achieve the full multiplexing gain of MIMO interference networks at high SNRs, the interference from different transmitters must be aligned in lower-dimensional subspaces at the receivers. Recently a distributed "Max-SINR" algorithm for precoder optimization has been proposed that achieves interference alignment for sufficiently high SNRs. The authors show that...
Provided By Technische Universitat Ilmenau
-
Software Performance Evaluation of a Polar Satellite Antenna Control Embedded System
Performance evaluation of embedded system software unlike conventional software needs special attention and care. This must be achieved during the design phase of software. Antenna control systems generally, belong to soft real-time system well particular, polar satellite antenna control systems are used mainly in earth observatory systems. The thrust behind...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Design of a Fast and Autonomous Complex Line Tracker and Fully Controlled Robot by Limit Switches
The explosion of microcontrollers and microprocessor applications has led to a rapid growth in the area of robotics especially line follower robots. Controlling line follower robots to travel over a complex race course pose some instability and speed problems. This paper mainly deals with the design of an electronic three...
Provided By International Journal of Computer Applications
-
Design and Implementation of Embedded-Human Machine Interface (HMI) Using PIC24FJ256DA210 Microcontroller
In this paper, the authors are targeted to integrate colour graphic LCD and touch screen for industrial applications such as Human Machine Interface. The main objective is to replace traditional mono-chrome LCDs and mechanical switches, with colour graphical LCD and touch screens. This paper focuses on integration of graphic and...
Provided By International Journal of Computer Applications
-
Design Space Exploration for a Custom VLIW Architecture
The increasing complexity of algorithms and embedded systems constraints has lead to advanced design methodologies. Hardware/Software co-design methodology has made it possible to find an optimal architecture for a given application by exploring the design space before building a real hardware prototype. The Design Space Exploration is basically exploring the...
Provided By International Journal of Computer Applications
-
Development of an Internet Based Embedded System for Smart House Controlling and Monitoring
In this paper, the authors provide an embedded Ethernet system for controlling and monitoring the electrical device at home from anywhere by a specific web application share on the internet. Their solution works on a standard Local Area Network (LAN) using a specially designed hardware interfaced with an embedded Ethernet...
Provided By International Journal of Computer Applications
-
Energy-Efficient Improved Priority Ceiling Protocol for Real Time System
Minimization of energy consumption in the battery operated system is become a major issue. Most of the real-time systems consist of a battery operated microprocessor system with a limited battery life. So, energy consumption is becoming a critical issue in the design of embedded systems because of the popularity of...
Provided By International Journal of Computer Applications
-
Accurate Energy Characterization of OS Services in Embedded Systems
As technology scales for increased circuit density and performance, the management of power consumption in embedded systems is becoming critical. Because the Operating System (OS) is a basic component of the embedded system, the reduction and characterization of its energy consumption is a main challenge for the designers. In this...
Provided By Springer Healthcare
-
Scaling Efficient Code-Based Cryptosystems for Embedded Platforms
QUANTUM computers, should they become a technological reality, will pose a threat to public-key cryptosystems based on certain intractability assumptions, like the integer factorization problem, or IFP (like RSA), and the discrete logarithm problem, or DLP (like Diffie-Hellman or DSA, in their elliptic curve version or otherwise). To face this...
Provided By Universidade de Santiago de Compostela
-
Design of a Configurable Transmission Device for Interface of a High Speed SOC With Low Speed Components
UART is the key component of serial communications subsystem of a computer. Here UART is a configurable transmission device and high speed soc is AHB. AHB is used to connect High speed components.DMA acts as a master and memory acts as a slave. The data is transmitting from DMA to...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Automated Verification of Termination Certificates
In order to increase user confidence, many automated theorem proverbs provide certificates that can be independently verified. In this paper, the authors report on their progress in developing a standalone tool for checking the correctness of certificates for the termination of term rewrite systems, and formally proving its correctness in...
Provided By Cornell University
-
Enhancing VMware View with F5 Solutions
T departments are challenged to ensure high performing, reliable access to virtual desktops as concurrent desktop connections increase, and end users demand flexibility, multiple access options, and desktop customization. With F5, VMware delivers on the promise of flexible, fast, easy, and always available virtual desktops. Together F5 and VMware optimize...
Provided By F5 Networks
-
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
An intensive use of reconfigurable hardware is expected in future embedded systems. This means that the system has to decide which tasks are more suitable for hardware execution. In order to make an efficient use of the FPGA it is convenient to choose one that allows hardware multitasking, which is...
Provided By Academy & Industry Research Collaboration Center
-
The End of Fragmentation: How to Keep Windows Systems Running Like New
Imagine a Windows system that maintains optimum performance over time and never needs to be “de-fragged” again. By proactively optimizing I/O at the Windows level, fragmentation is prevented before it ever becomes a problem. As a result, Windows systems continue to run like new. This white paper examines what productive...
Sponsored By Condusiv Technologies
-
openBench: V-locity VM Boosts Virtual Machine Performance over 50% without Additional Hardware
There are inherent behaviors associated with Windows-based VMs that cause a tremendous amount of unnecessary I/O operations to be pushed down into the network and storage. In a virtualized environment, the problem is compounded as multiple VMs share the same storage, resulting in highly random I/O activity. This not only...
Sponsored By Condusiv Technologies
-
IDC Spotlight: Managing the I/O Explosion without Additional Hardware using V-locity
In this Technology Spotlight, IDC provides landmark research into the unexpected I/O explosion brought about by virtualization and offers guidance to organizations looking to eliminate I/O bottlenecks without incurring the cost of extra storage hardware to keep up with application demand. IDC outlines how increased agility of virtualization has compounded...
Sponsored By Condusiv Technologies
-
Guide to 50% Faster VMs - No Hardware Required
For administrators who want to increase application performance in their virtual environment without incurring the cost of additional hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads.
The white paper identifies how the...Sponsored By Condusiv Technologies
-
Fundamentals of SCSI and iSCSI.
SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...
Sponsored By Global Knowledge
-
Fundamentals of SCSI and iSCSI
SCSI (Small Computer Systems Interface), which is present in all personal, defines an initiator/target client/server relationship that includes addresses, commands, and specified operations. The SCSI model has numerous interfaces, including TCP/IP, fibre channel, directly attached parallel bus, and firewire. Fibre Channel and iSCSI are the two major choices for building...
Sponsored By Global Knowledge
-
Tech Brief: Exchange 2013 Data Loss Prevention
Ensuring that sensitive data does not leave an organization has been one of the most challenging tasks for Exchange administrators. The new DLP (data loss prevention) feature in Exchange 2013 and Exchange Online in Office 365? enables administrators to control the flow of sensitive information within the organization, as well...
Sponsored By Dell Software
-
Dell Software Foglight APM 5.9: Introducing Big Data Repository/Reporting Supporting Web Analytics and User-Centric APM
Does your APM tell you enough about your customers? The release of Foglight Application Performance Monitoring 5.9 from Dell has put the growing APM industry into the spotlight again. In contrast to competing APM solutions, most of which focus on technical metrics, Foglight 5.9 delivers detailed information about users, user...
Sponsored By Dell Software
-
Vendor Landscape: Application Delivery Controllers
Application Delivery Controller (ADC) solutions have become much more than simple load balancing. Before the ADC, server traffic load became too great for single servers to handle. The need for several servers, connected together as one, became a necessity to keep business applications running optimally. Read more to understand what’s...
Sponsored By Barracuda Networks
-
Introduction to Virtual Desktop Infrastructure with VMware View
Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...
Sponsored By VMware
-
A Model-Driven Approach for Hybrid Power Estimation in Embedded Systems Design
As technology scales for increased circuit density and performance, the management of power consumption in System-on-Chip (SoC) is becoming critical. Today, having the appropriate Electronic System Level (ESL) tools for power estimation in the design flow is mandatory. The main challenge for the design of such dedicated tools is to...
Provided By EURASIP
-
The Executive's Guide to BYOD and the Consumerization of IT
ZDNet and TechRepublic put together this collection of articles, original research, and real-world examples to help you understand the issues surrounding the BYOD trend and to develop effective strategies for dealing with it in your organization.
Provided By TechRepublic
-
Dynamic Software Updates for Real-Time Systems
Seamlessly updating software in running systems has recently gained momentum. Dynamically updating the software of real-time embedded systems, however, still poses numerous challenges: such systems must meet hard deadlines, cope with limited resources, and adhere to high safety standards. This paper presents a solution for updating component-based cyclic embedded systems...
Provided By Association for Computing Machinery
-
A Digital Rights Enabled Graphics Processing System
With the emergence of 3D graphics/arts assets commerce on the Internet, to protect their intellectual property and to restrict their usage have become a new design challenge. This paper presents a novel protection model for commercial graphics data by integrating digital rights management into the graphics processing unit and creating...
Provided By EUROGRAPHICS Association
-
A Handy Systematic Method for Data Hazards Detection in an Instruction Set of a Pipelined Microprocessor
In this paper, the author introduced a handy systematic method for enumerating all possible data dependency cases that could occur between any two instructions that might happen to be processed at the same time at different stages of the pipeline. Given instructions of the instruction set, specific information about operands...
Provided By Alexandria University
-
Compiler Generated Systolic Arrays For wavefront Algorithm Acceleration on FPGAs
Wavefront algorithms, such as the Smith-Waterman algorithm, are commonly used in bioinformatics for exact local and global sequence alignment. These algorithms are highly computationally intensive and are therefore excellent candidates for FPGA-based code acceleration. However, there is no standard form of these algorithms, they are used in a wide variety...
Provided By Sandbridge Technologies
-
Wireless Digital Picture Frame Retrieves Live Information From Windows Vista Computers
The Momento digital picture frame needed to stand out from a pack of look-alike products. To differentiate their product from a standalone digital frame, which simply reads photos from memory cards or USB keys, OEM i-mate designed a connected, services-oriented device intended for the high-end segment of the consumer electronics...
Provided By Microsoft Tips
-
It's Microsoft Patch Tuesday: December 2009
Justin James gathers the information you need to make the right decision on applying Microsoft's December 2009 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: January 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's January 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: February 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's February 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: March 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's March 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: April 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's April 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: May 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's May 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: June 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's June 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: July 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's July 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: August 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's August 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
It's Microsoft Patch Tuesday: September 2010
Justin James gathers the information you need to make the right decision on applying Microsoft's September 2010 patches in your organization.
This download is also available as an entry in the TechRepublic Microsoft Windows Blog.
Provided By Justin James
-
How do I... Transfer Access data to an Outlook contact?
How you use data often determines where you store it, which can create a bit of trouble down the line. For instance, you might store contact information in an Access database. If you want the same data available in Outlook, you could find yourself entering it again.
Fortunately, such double...Provided By Susan Harkins
-
How do I... Display multiple values in an Access value list control?
You can populate a list control with an explicit list of values and generally, that list consists of one column, although you can display more. Creating a multi-column value list control is the easy part -- using and updating it takes a bit more effort. Susan Sales Harkins shows you...
Provided By Susan Harkins
-
Implementation of Combinational and Sequential Functions in Embedded Firmware
The paper addresses firmware implementation of multiple-output combinational and sequential Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means of compact representation of a large class of Boolean functions, which reduces their evaluation to multiple indirect memory accesses. A LUT-oriented decomposition technique...
Provided By Brno University of Technology
-
A Fine Grain Microprocessor Design Education Considering Situated Nature of Learning
This paper proposes a new training method for instructing newcomers in the field of microprocessor design. By using this method, which is an extension of the method known as Legitimate Peripheral Participation (LPP) proposed by Lave and Wenger, the newcomers can obtain creativity beyond the teaching materials in the course....
Provided By Keio University
-
Dynamic Directories: A Mechanism for Reducing On-Chip Interconnect Power in Multicores
On-chip interconnection networks consume a significant fraction of the chip's power, and the rapidly increasing core counts in future technologies is going to further aggravate their impact on the chip's overall power consumption. A large fraction of the traffic originates not from data messages exchanged between sharing cores, but from...
Provided By Northwestern University
-
Detecting/Preventing Information Leakage on the Memory Bus due to Malicious Hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up these systems. Malicious circuitry can be inserted and hidden at several stages of the design process through the use of third-party Intellectual Property (IP), design tools,...
Provided By Northwestern University
-
Learning and Leveraging the Relationship Between Architecture-Level Measurements and Individual User Satisfaction
The ultimate goal of computer design is to satisfy the end-user. In particular computing domains, such as interactive applications, there exists a variation in user expectations and user satisfaction relative to the performance of existing computer systems. In this paper, the authors leverage this variation to develop more efficient architectures...
Provided By Northwestern University
-
Chip Multiprocessor Cooperative Cache Compression and Migration
CMPs are now in common use. Increasing core counts implies increasing demands for instruction and data. However, processor-memory bus throughput has not kept pace. As a result, cache misses are becoming increasingly expensive. Yet the performance benefits of using more cores limits the cache per core, and cache per process,...
Provided By Northwestern University
-
Run-Time Thermal Management of Three-Dimensional Chip-Multiprocessors
Three-dimensional (3D) integration has the potential to improve the communication latency and integration density of chip-level multiprocessors (CMPs). However, the stacked high power density layers of 3D CMPs increase the importance and difficulty of thermal management. In this paper, the authors investigate the 3D CMP run-time thermal management problem and...
Provided By Northwestern University
-
Characterization of Single-Electron Tunneling Transistors for Designing Low-Power Embedded Systems
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultra-low-power designs may even permit embedded systems to operate without batteries by scavenging energy from the environment. Moreover, managing power dissipation is now a key factor in integrated circuit packaging and cooling. As a result,...
Provided By Northwestern University
-
Increasing the Sensitivity of On-Chip Digital Thermal Sensors With Pre-Filtering
Thermal monitoring has been broadly used to protect high-end integrated circuits from over-heating and to identify hot-spots in complex circuits. In this paper, the authors present a method to increase the sensitivity of an on-chip digital thermal sensor. In contrast to the existing mechanisms that characterize the overall temperature profile...
Provided By Virginia Tech
-
Comparing Gesture and Touch for Notification System Interactions
The authors explore some of the characteristics of multimodal input interaction spaces for notification systems within a multi-tasking environment like a command and control center using two promising interaction methods: gestures and touch based input through a laboratory experiment comparing both techniques. Results of the study suggest that gestures are...
Provided By Virginia Tech
-
Multitouch Tables for Collaborative Object-Based Learning
Multitouch technology on tabletop displays allows children to interact with digital objects in collaborative activities. This paper explores both evolutions in hardware and opportunities in software toward supporting the engagement of children, with consideration of impact on user interfaces. The authors outline a demonstration of the Multitouch Education Table (MET),...
Provided By Virginia Tech