Summary form only given, as follows. Plasma etching is widely used in patterning semiconductor and the other materials the etching is stimulated by a flux of ions but charging effects occur. A cold cathode generated e...
详细信息
Summary form only given, as follows. Plasma etching is widely used in patterning semiconductor and the other materials the etching is stimulated by a flux of ions but charging effects occur. A cold cathode generated electron beam has already shown its charge neutralization performance on etch surfaces in the reactive ion etching.
Summary form only given. the Unified Power Format (UPF) defines the power intent & specifications of low power designs and it provides designers with efficient methodology for low power design flow. It is supporte...
详细信息
ISBN:
(纸本)9781509057412
Summary form only given. the Unified Power Format (UPF) defines the power intent & specifications of low power designs and it provides designers with efficient methodology for low power design flow. It is supported by most of the EDA tools in the implementation flow. At the same time the UPF itself is getting evolved in terms of becoming more efficient to address gaps & challenges faced in the implementation. In this tutorial we want to share our experience of using supply set based UPF in low power design flow. this tutorial would emphasize how supply set based UPF provides superior solution and adds tremendous value. It addressed many of the challenges which we faced in SOC execution using supply net based UPF for complex low power designs. We would also share our experience of migrating from supply net based UPF to supply set based UPF and some of key challenges faced in low power SOC implementation and how the evolved supply set based UPF methodology addresses these issues.
QCA technology has considerable advantages in comparison with Complementary Metal Oxide Semiconductor (CMOS) technology, such as extremely low power dissipation, high operating frequency, and a small size and can oper...
详细信息
ISBN:
(纸本)9781538681688;9781538681671
QCA technology has considerable advantages in comparison with Complementary Metal Oxide Semiconductor (CMOS) technology, such as extremely low power dissipation, high operating frequency, and a small size and can operate at one Terahertz. the Multiply -Accumulator (MAC) unit is considered as one of the essential operation in Digital Signal Processing (DSP). In the real-time DSP systems, several applications like speech processing, video coding and digital filtering etc, require MAC operations. However, the power dissipation and area are the most significant aspects in these systems. In this paper, low power MAC Unit based on QCA technology is designed. QCADesigner ver 2.0.3 is used to validate the accuracy of the proposed circuit. the power dissipation is estimated using QCAPro tool. the total power consumed by this unit is 4.03 mW. It is found that proposed design is better than other designs based on classical technology. As the works in the field of QCA logic signal processing has started to progress, the suggested contribution will give rise to a new thread of research in the field of real time signal processing.
Data centric applications can benefit heavily from model-based data access abstraction. this fosters understanding, maintainability, as well as independence from persistency mechanisms. Utilizing metadata from the dom...
详细信息
Data centric applications can benefit heavily from model-based data access abstraction. this fosters understanding, maintainability, as well as independence from persistency mechanisms. Utilizing metadata from the domain data model allows to write generic, reusable software modules. However, for a business logic application part, direct, type-safe manipulation of persistent object attributes is more typical. thus, both are important programmatic use cases and coexist in data centric applications. In this paper, we describe the concept of a dynamic and model-based object cache, the entity container (EC), and discuss the needs, design and implementation of a type-safe access layer upon the EC, called TSEC. therefore, providing both access mechanisms to an EC in parallel, dynamic data and metadata access as well as static type-safe access, allows to develop flexible and reusable software modules at different abstraction levels, even independent of particular domain models
Withthe popularization of mobile devices such as smart phones, many device communicate over Wireless Local Area Networks (WLANs). the IEEE 802.11e standard is an important extension of the IEEE 802.11 standard focusi...
详细信息
ISBN:
(纸本)9781509024629
Withthe popularization of mobile devices such as smart phones, many device communicate over Wireless Local Area Networks (WLANs). the IEEE 802.11e standard is an important extension of the IEEE 802.11 standard focusing on QoS that works with any PHY implementation. the IEEE 802.11e standard introduces EDCF and HCCA. Boththese schemes are useful for QoS provisioning to support delay-sensitive voice and video applications. EDCF uses the contention window to differentiate between high priority and low priority services. However, it does not consider the priority of users. In this paper, in order to deal withthis problem, we propose and implement a Fuzzy-based Admission Control System (FACS). We carried out some simulations to evaluate the performance of the proposed system. the simulation results show that our proposed system has good a performance.
In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial enviro...
详细信息
In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial environment such as a battlefield, DTN nodes could be compromised to launch Denial-of-Service (DoS) attacks by generating excess data, to cause an overflow of the limited resources of the legitimate nodes, hence decreasing the network throughput. A node may also display selfish behavior by generating more data than allowed, to increase its throughput and to decrease the latency of its data packets. In this paper, we term such a DoS attack and selfish data generation behavior, a resource-misuse attack. We study two types of resource-misuse attacks, breadth attacks and depth attacks. Accordingly, we propose different schemes to detect these attacks. Trace-driven simulations using both a synthetic and a real-world trace show that our detection schemes have low average detection latency and additionally, probabilistic detection of the depth attack has low false positive and false negative rates.
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers attempt to answer these questions, which...
详细信息
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers attempt to answer these questions, which we call conceptual queries, using a variety of tools. Each type of tool typically highlights one kind of information about the system, such as static structural information or control-flow information. Unfortunately for the programmer, the tools seldom directly answer the programmer's conceptual queries. Instead, the programmer must piece together results from different tools to determine an answer to the initial query. At best, this process is time consuming and at worst, this process can lead to data overload and disorientation. In this paper, we present a model that supports the integration of different sources of information about a program. this model enables the results of concrete queries in separate tools to be brought together to directly answer many of a programmer's conceptual queries. In addition to presenting this model, we present a tool that implements the model, demonstrate the range of conceptual queries supported by this tool, and present the results of use of the conceptual queries in a small field study.
In this paper, we introduce the Python to Kubernetes (PTK) framework, a high-level Python-based programming framework for deploying Python applications on top of Kubernetes clusters. PTK supports a task-based programm...
详细信息
ISBN:
(数字)9798331515966
ISBN:
(纸本)9798331515973
In this paper, we introduce the Python to Kubernetes (PTK) framework, a high-level Python-based programming framework for deploying Python applications on top of Kubernetes clusters. PTK supports a task-based programming approach with extensions for specifying resource requirements and performance constraints. A major goal of PTK is to provide users with high-level control for deploying compute- and data-intensive applications on different types and configurations of heterogeneous clusters, while ensuring performance and/or cost constraints.
Microservices is an architectural style inspired by service-oriented computing that has recently started gainingpopularity. Jolie is a programming language based on the microservices paradigm: the main building block ...
详细信息
ISBN:
(纸本)9781509018598
Microservices is an architectural style inspired by service-oriented computing that has recently started gainingpopularity. Jolie is a programming language based on the microservices paradigm: the main building block of Jolie systems are services, in contrast to, e.g., functions or objects. the primitives offered by the Jolie language elicit many of the recurring patterns found in microservices, like load balancers and structured processes. However, Jolie still lacks some useful constructs for dealing with message types and data manipulation that are present in service-oriented computing. In this paper, we focus on the possibility of expressing choices at the level of data types, a feature well represented in standards for Web Services, e.g., WSDL. We extend Jolie to support such type choices, and enable Jolie processes to act on data generically (without knowing which type it has in the choice). We show the impact of our implementation on some of the typical scenarios found in microservice systems. this shows how computation can move from a process-driven to a data-driven approach, and leads to the preliminary identification of recurring communication patterns that can be shaped as design patterns.
暂无评论