This paper presents a very fast yet low power pseudo incrementer structure which may be used in address bus encoders/decoders. This structure, which is based on the ripple carry incrementer, is much faster than the in...
详细信息
This paper presents a very fast yet low power pseudo incrementer structure which may be used in address bus encoders/decoders. This structure, which is based on the ripple carry incrementer, is much faster than the incrementer. Using this structure, the delay and the power of address bus encoders/decoders may be reduced considerably. Analytical and synthesis results show that the structure is faster than current incrementer circuits while its circuit area and power are much smaller than those of current fast incrementers.
Viewing security vulnerabilities as a specific type of software defect allows proven softwareengineering techniques for finding and fixing them to be used early in the development of the product. Finding and fixing t...
详细信息
Viewing security vulnerabilities as a specific type of software defect allows proven softwareengineering techniques for finding and fixing them to be used early in the development of the product. Finding and fixing these problems early (i.e. at the requirements or design phase) mil reduce the overall risk and cost of tee product. This article describes the application of a previously successful early life cycle software inspection approach (perspective-based reading [PBR]) to the problem of software security. Excerpts from this tailored approach are provided along with guidance on it use.
Most segmentation algorithms are based on the assumption of intensity homogeneity within an object. However, in many applications, the object of interest contains more than one homogenous region. Even when the object...
详细信息
Most segmentation algorithms are based on the assumption of intensity homogeneity within an object. However, in many applications, the object of interest contains more than one homogenous region. Even when the object’s shape is known, such object is not effectively extracted. In this paper, we propose a segmentation process for the objects containing 2 homogenous regions. Our method is based on the level set method. We construct the shape model from the set of manually extracted objects. The parameters that represent the shape model are coefficients of PCA basis. Instead of defining a new cost-function based on heterogeneity assumption, we repeatedly form a homogenous region inside the evolving curve and evolve the curve by the level set method. Our experiment on medical images indicated that our method effectively segmented object with one and two homogenous regions.
Most of segmentation algorithms are based on the assumption of intensity homogeneity within an object. However, in many applications, the object of interest contains more than one homogenous-intensity region. Even whe...
详细信息
Most of segmentation algorithms are based on the assumption of intensity homogeneity within an object. However, in many applications, the object of interest contains more than one homogenous-intensity region. Even when the object's shape is known, such object is not effectively extracted. In this paper, we propose a segmentation process for the objects containing 2 homogenous regions. Our method is based on level set method. This method is divided into 2 parts. In the first part, we estimate the pose parameters of the mean shape of the object. In the latter part, the region inside the curve is adjusted to form a homogenous region. Then we segment the adjusted image for the object by level set method. Our experiment on medical images indicated that our method effectively segmented object with one and two homogenous regions.
To support decision-making for security-risk mitigation and the appropriate selection of security countermeasures, we propose a system dynamics model of the security aspects of an enterprise system. We developed such ...
详细信息
To support decision-making for security-risk mitigation and the appropriate selection of security countermeasures, we propose a system dynamics model of the security aspects of an enterprise system. We developed such an executable model, incorporating the concept of archetypes. We present here one archetype for computer security, namely symptomatic fixes (or shifting the burden). Using simulation, we show one instance of how this archetype can be used for recognizing and diagnosing typical situations, as well as for fixing problems. The global effects of changes and behavioral trends are examined, and other instances of symptomatic fixes in security are described as well
Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremental checkpointing mechanism. It requires to record only the state changes and not the complete state. After the creat...
详细信息
ISBN:
(纸本)9781424405015
Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremental checkpointing mechanism. It requires to record only the state changes and not the complete state. After the creation of a checkpoint, state changes are logged incrementally as records in memory, with which an application can spontaneously roll back later. This incrementalism allows us to implement checkpointing with high performance. Only small constant time is required for checkpoint creation and state recording. Rollback requires linear time in the number of recorded state changes, which is bounded by the number of state variables times the number of checkpoints. We implement a Java source transformer that automatically converts an existing application into a behavior-preserving one with checkpointing functionality. This transformation is application-independent and application-transparent. A wide range of applications can benefit from this technique. Currently, it has been used for distributed discrete event simulation using the time warp technique
In this paper we study learning in cooperative object pushing systems. The proposed approach is based on the idea of learning individual skills and then mapping the required cooperative behaviors on the learned skills...
详细信息
In this paper we study learning in cooperative object pushing systems. The proposed approach is based on the idea of learning individual skills and then mapping the required cooperative behaviors on the learned skills. The control point for each individual robot is chosen so as to simplify the design of the reinforcement signal and reduce the role of delayed reward on individual learning in addition to make cooperative protocol simpler. A fuzzy Q-learning system for learning individual object pushing is proposed, together with a method for coordination among the robots to push the object cooperatively. The coordination method takes into account the dynamics of the object and the learned individual skills. The idea of the coordination protocol is based on the notion of ability and active regions defined in this paper. In effect, the cooperation protocol is mapped to a Q-value based policy. Simulation results supportively show that the robots learn individual and cooperative object pushing efficiently
In this paper we discuss a learning approach to distributed object pushing. In the proposed approach, first the required individual skills for single-robot object pushing are learned using a fuzzy reinforcement learni...
详细信息
In this paper we discuss a learning approach to distributed object pushing. In the proposed approach, first the required individual skills for single-robot object pushing are learned using a fuzzy reinforcement learning method. Then, the robots learn how to coordinate their actions to push the object to the desired configuration cooperatively in a distributed manner. The proposed team-level learning benefits from the knowledge, which is in the form of a Q-table, that the agent has gained in its individual learning phase by a special design of reward signal and state-action representation. Each robot learns a threshold on its Q-value using a single state reinforcement learning method and pushes the object when the Q-value of its best action in the current state is above this threshold. The reward signal is designed based on the robots' Q-tables and no external critic is needed for learning cooperation. Simulation results show that the robots learn their individual skills and a cooperation protocol to push the object cooperatively
This paper presents a coherent theory on the nature of collaborative work and their mathematical models in softwareengineering. The formal economic model of softwareengineering costs (FEMSEC) is created based on the...
详细信息
This paper presents a coherent theory on the nature of collaborative work and their mathematical models in softwareengineering. The formal economic model of softwareengineering costs (FEMSEC) is created based on the collaborative work theory. The FEMSEC model provides a theoretical foundation for softwareengineering decision optimizations on the optimal labor allocation, the shortest duration determination, and the lowest workload/effort and costs estimation. Based on the FEMSEC model, a wide range of fundamental problems in software project organization and cost estimation can be solved rigorously
In this paper, a static random access memory (SRAM) cell that reduces the gate leakage power with low access latency is proposed. The technique reduces the gate leakage current both in the zero and in the one states. ...
详细信息
In this paper, a static random access memory (SRAM) cell that reduces the gate leakage power with low access latency is proposed. The technique reduces the gate leakage current both in the zero and in the one states. The efficiency of the design is evaluated by simulating the circuit in a 45-nm CMOS technology. Compared to the conventional SRAM cell, the proposed design reduces the total gate leakage current around 58% for an oxide thickness of 1.4nm. The increase in the area of the proposed cell is minimal compared to the conventional SRAM. The read access time of this SRAM is only 5.6% slower than that of the conventional SRAM
暂无评论