Given the multi-rate option in most 802.11 standards, rate adaptation based on dynamic channel condition is crucial to the system performance. This paper presents an efficient self-learning rate adaptation mechanism a...
详细信息
ISBN:
(纸本)9781424413119
Given the multi-rate option in most 802.11 standards, rate adaptation based on dynamic channel condition is crucial to the system performance. This paper presents an efficient self-learning rate adaptation mechanism at MAC layer, called SLRA. SLRA takes both the temporal or spatial correlation and change into account. The rate selection has two steps: one is to evaluate the performance of current rate and decide whether to adjust the rate;the second is to calibrate the decision according to the historical experiments of rate adjustment at similar channel status. We evaluate SLRA in 802.11 network and find that it can choose the right rate at most time and performs better than other sender-side adaptation schemes.
Exudates are the primary signs of diabetic retinopathy which are mainly cause of blindness and could be prevented with an early screening process. Pupil dilation is required in the normal screening process but this af...
详细信息
ISBN:
(纸本)9780889866560
Exudates are the primary signs of diabetic retinopathy which are mainly cause of blindness and could be prevented with an early screening process. Pupil dilation is required in the normal screening process but this affects patients' vision. This paper investigated and proposed automatic methods of exudates detection on low-contrast images taken from non-dilated pupils. The process has two main segmentation steps which are coarse segmentation using Fuzzy C-Means clustering and fine segmentation using morphological reconstruction. Four features, namely intensity, standard deviation on intensity, hue and adapted edge, were selected for coarse segmentation. The detection results are validated by comparing with expert ophthalmologists' hand-drawn ground-truth. The sensitivity and specificity for our exudates detection are 86% and 99% respectively.
The paper focuses on the synthesis of a highly parallel hardware implementation of the main cipher designed for the third generation mobile communication system. The investigated algorithm is the KASUMI block cipher. ...
详细信息
ISBN:
(纸本)9780889866560
The paper focuses on the synthesis of a highly parallel hardware implementation of the main cipher designed for the third generation mobile communication system. The investigated algorithm is the KASUMI block cipher. Currently, KASUMI is well known to be a strong encryption algorithm. The use of such an algorithm within critical applications, such as mobile communication, requires efficient, highly reliable and correct hardware implementation. We will investigate satisfying such requirements by proposing and adopting a step-wise refinement software engineering approach to develop correct hardware circuits. The method uses a formal functional programming notation for specifying algorithms. The parallel behavior is then obtained through the use of a combination of function decomposition strategies, besides, data and process refinement techniques. The refinements are inspired by the operators of Communicating Sequential Processes (CSP) and map easily to programs in Handel-C (a modern C-based high-level langauge with hardware output). In this paper, we obtain several hardware implementations with different performance characteristics by applying different refinements to the algorithm. The developed designs are compiled and tested under Celoxica's RC-1000 reconfigurable computer with its 2 million gates Virtex-E FPGA. Performance analysis and evaluation of these implementations are included.
In this paper, we propose a dynamic and reliability driven real-time fault-tolerant scheduling algorithm on heterogeneous distributed systems (DYFARS). Primary-backup copy scheme is leveraged by DYFARS to tolerate bot...
详细信息
ISBN:
(纸本)9780769529097
In this paper, we propose a dynamic and reliability driven real-time fault-tolerant scheduling algorithm on heterogeneous distributed systems (DYFARS). Primary-backup copy scheme is leveraged by DYFARS to tolerate both hardware and software failures. Most importantly, DYFARS employs reliability costs as its main objective to dynamically schedule independent, non-preemptive aperiodic tasks, therefore system reliability is enhanced without additional hardware costs. A salient difference between our DYFARS and existing scheduling approaches is that DYFARS considers backup copies in both active and passive forms;therefore, DYFARS is more flexible than the existing scheduling schemes in the literature. Finally, simulation experiments are carried out to compare DYFARS with existing similar algorithm, experiment results show that DYFARS is superior to existing algorithm regarding both Schedulability and Reliability.
Wide-area distributed systems like computational grids are emergent infrastructures for high-performance parallel applications. On these systems, communication mechanisms have to deal with many issues, including: priv...
详细信息
ISBN:
(纸本)9780769528717
Wide-area distributed systems like computational grids are emergent infrastructures for high-performance parallel applications. On these systems, communication mechanisms have to deal with many issues, including: private networks, heterogeneity, dynamic resource availability, and transient link failures. To address this, we present pi-Spaces, a shared space abstraction of typed pipe objects. These objects, called pi-channels, are asynchronous pipes that combine streaming and persistence for efficient communication while supporting spatial and temporal decoupling. This feature allows pi-channels to be written even in the absence (or failure) of the reader. In this paper, we present the design of pi-Space runtime system and provide some through-put evaluation results with our experimental prototype.
"E-government" refers to the process of using advanced information and communication technology (ICT) for automating both the internal operations of the government agents (G2G) and its external interactions ...
详细信息
ISBN:
(纸本)0769529097
"E-government" refers to the process of using advanced information and communication technology (ICT) for automating both the internal operations of the government agents (G2G) and its external interactions with citizens (G2C) and businesses (G2B). In G2G type, addressing information sharing among government agencies is one of the most important issues for development of national e-government architecture. With efficient information sharing solutions, government agents can be able to predict the security risks and attacks, including terrorist attack similar as 911 attack on American soil. However, building secure information sharing mechanism among government agencies is not trivial because they worry about that their interests may be jeopardized when share their information with other agencies. In this paper, a distributed information sharing model is proposed and the technique standard support of the model is analyzed With the secure e-government information sharing solutions, the cost of coping with government information exchange and agencies cooperation will be lowered and the capability and efficiency of agencies' collaboration will be increased.
Cohesion degree is an important feature in differentiating ambiguous Chinese phrases. At the present time, there are no module in computer-oriented linguistic theories to represent this information and it is represent...
详细信息
ISBN:
(纸本)0769529097
Cohesion degree is an important feature in differentiating ambiguous Chinese phrases. At the present time, there are no module in computer-oriented linguistic theories to represent this information and it is represented by additional statistical modules. The Binary Combinatorial Grammar (BCG) is based on arithmetic computing and integrates the cohesion degree as the priorities between operators. In order to resolve the share space problem and to improve the efficiency of operator precedence shift-reduce parsing algorithm, the notion of precedence is introduced to the CYK algorithm to determine the combinatorial direction and to prune a portion of unnecessary subtrees daring the parsing process. In the experiment of Chinese BCG parsing, all of the spent time, produced edges and result trees in the precedence based CYK algorithm are much less than that of the traditional CYK algorithm and the operator precedence based shift-reduce algorithm.
The proceedings contain 79 papers. The topics discussed include: message dissemination under the multicasting communication mode;e-science in the cloud with CARMEN;exploring biocomplexity: new challenges for high perf...
ISBN:
(纸本)0769530494
The proceedings contain 79 papers. The topics discussed include: message dissemination under the multicasting communication mode;e-science in the cloud with CARMEN;exploring biocomplexity: new challenges for high performance computing;multiprocessor scheduling for distance constrained task systems;task allocation in distributed embedded systems by genetic programming;distant-based resource placement in product networks;monitoring employees' emails without violating their privacy right;email categorization using multi-stage classification technique;a trap-door method for subscription-based mobile content;improved genetic algorithms and list scheduling techniques for independent task scheduling in distributed systems;a remote memory swapping system for cluster computers;a distributed approach for negotiating resource contributions in dynamic collaboration;and performance evaluation of a novel CMP cache structure for hybrid workloads.
Pervasive Augmented Reality Gaming and Mobile P2P are both attracting significant focus and much progress has occurred recently. Augmented reality games extend reality with virtual elements to enhance game experience ...
详细信息
The proceedings contain 98 papers. The topics discussed include: alternative dataflow model;MOOSS2: a CPU with support for HLL memory structures;architecting security: a secure implementation of hardware buffer-overfl...
ISBN:
(纸本)9780889866560
The proceedings contain 98 papers. The topics discussed include: alternative dataflow model;MOOSS2: a CPU with support for HLL memory structures;architecting security: a secure implementation of hardware buffer-overflow protection;design of a two-level hot path Detector for path-based loop optimizations;write-aware buffer cache management scheme for nonvolatile RAM;equivalence checking in C-based system-level design by sequentializing concurrent behaviors;formal equivalence checking for loop optimization in C programs without unrolling;design and simulation for three SEU immune latches in a 0.18μm CMOS commercial process;redesign the 4:2 compressor for partial product reduction;using advanced transaction and workflow models in composing Web services;and assessing the traffic ranking of Websites with artificial neural network.
暂无评论