Huge effort has been invested to come up with a wide range of design solutions that help solving the power dissipation problem for synchronous sequential circuits. Particularly, this problem is reduced to optimal codi...
详细信息
Huge effort has been invested to come up with a wide range of design solutions that help solving the power dissipation problem for synchronous sequential circuits. Particularly, this problem is reduced to optimal coding of states of a finite state machine (FSM) by Boolean vectors which present sets of memory element states. Two new methods to solve the state encoding problem are proposed that minimize the average number of signal transitions on the state lines for a general state transition graph (STG). The method of edge cuts is an economical covering of the set of all transitions by weakly crossed edge cuts of the STG that forms set of encoding partitions on the set of the FSM states. The method of quadrates is a visual method that uses matrices of adjacency and Karnaugh maps and consists in constructing a succession of rising configurations of quadrates and edges which could serve as some fragments of the hypercube
The Internet of Things (IoT) is a paradigm where devices, equipped with sensing and data processing capabilities, can communicate with each other seamlessly. In this context, the smartphone, considered as the ultimate...
ISBN:
(数字)9781728187150
ISBN:
(纸本)9781728187167
The Internet of Things (IoT) is a paradigm where devices, equipped with sensing and data processing capabilities, can communicate with each other seamlessly. In this context, the smartphone, considered as the ultimate IoT device, plays a key-role in this environment. These appliances that initially had limited functionality, nowadays are charged with a full set of sensors and capabilities. Service Providers and development companies encourage their community to take advantage of these embedded hardware components through the creation and deployment of mobile applications and thus, offering new services and enhancing user experience. However, to do so, this kind of applications gathers personal data from direct or indirect interaction, most of the times without awareness from the *** performed a qualitative study by conducting semi-structure interviews with participants from different backgrounds, in order to understand user's perception regarding trust in IoT Mobile Applications. With a grounded theory analysis, we concluded that not only people should be recognized as the central entity of any system that seeks the collection of their personal data, but also that trust in IoT technology depends on who controls and has access to it. We believe these results contribute for further application development, concerning the construction of new privacy models and user experience.
In this paper we investigate the idea of applying the emerging world-scale computing paradigm of Web services onto small-area clusters of embedded systems with limited resources. Our goal is to develop a truly standar...
详细信息
In this paper we investigate the idea of applying the emerging world-scale computing paradigm of Web services onto small-area clusters of embedded systems with limited resources. Our goal is to develop a truly standard and architecturally independent interface for aggregating the unused processing power of embedded devices. This power can be used to support ambient intelligence processing in residential areas, as well as exported to external users as commodity. We have used an embedded distributed computing system described in previous work, in order to show how an embedded generic computing Web service can be constructed. We have identified the limited processing power of embedded devices, as well as the dynamic nature of networks of appliances, as impeding factors for the introduction of Web services into small systems and we propose a hierarchical layered grouping of devices as a solution to this problem.
UMTS, the successor of GSM, is evolving toward a future wireless all-IP network. In this paper we present how it supports real-time IP multimedia services, as these services are expected to drive the adoption of wirel...
详细信息
UMTS, the successor of GSM, is evolving toward a future wireless all-IP network. In this paper we present how it supports real-time IP multimedia services, as these services are expected to drive the adoption of wireless all-IP networks. The scheme of real time streaming video is one of the newcomers in wireless data communication and in particular in UMTS, raising a number of novel requirements in both telecommunication and data communication systems. This scheme applies when the mobile user is experiencing real time multimedia content. In this paper, we describe the design and the implementation of a decision feedback scheme, which is based on real time protocols and it is used for streaming video over UMTS transport channels. The decision feedback scheme uses a friendly, to the mobile users, congestion control mechanism to control the transmission rate of the real time video sequence. Furthermore, we evaluate this mechanism through a number of experiments. During these experiments we demonstrate the friendly behavior of the decision feedback scheme to TCP and UDP data streams that coexist in the same channel with the video sequence.
This paper proposes a power control mechanism for the efficient radio bearer selection in the multimedia broadcast/multicast service (MBMS) framework of Universal Mobile Telecommunications System (UMTS). The selection...
详细信息
This paper proposes a power control mechanism for the efficient radio bearer selection in the multimedia broadcast/multicast service (MBMS) framework of Universal Mobile Telecommunications System (UMTS). The selection of the most efficient transport channel in terms of power consumption is a key point for MBMS enabled UMTS networks, since a wrong transport channel selection for the transmission of the MBMS data could result to a significant decrease in the total capacity of the network. Different UMTS transport channels and power saving techniques are examined and an algorithm that selects the most efficient combination of the above parameters is proposed. The proposed MBMS power control mechanism selects the transport channel that minimizes the base station's transmission power in every cell of the network that serves multicast users.
We consider the problem of planning a mixed line rates (MLR) wavelength division multiplexing (WDM) transport optical network. In such networks, different modulation formats are usually employed to support the transmi...
详细信息
We consider the problem of planning a mixed line rates (MLR) wavelength division multiplexing (WDM) transport optical network. In such networks, different modulation formats are usually employed to support the transmission at different line rates. Previously proposed planning algorithms, have used a transmission reach limit for each modulation format/line rate, mainly driven by single line rate systems. However, transmission experiments in MLR networks have shown that physical layer interference phenomena are more significant between transmissions that utilize different modulation formats. Thus, the transmission reach of a connection with a specific modulation format/line rate depends also on the other connections that co-propagate with it in the network. To plan a MLR WDM network, we present routing and wavelength assignment (RWA) algorithms that take into account the adaptation of the transmission reach of each connection according to the use of the modulation formats/line rates in the network. The proposed algorithms are able to plan the network so as to alleviate interference effects, enabling the establishment of connections of acceptable quality over paths that would otherwise be prohibited.
Explainability has become an essential requirement for safe and effective collaborative Human-AI environments, especially when generating recommendations through black-box modality. One goal of eXplainable AI (XAI) is...
详细信息
Since radio-frequency signals are affected signifi-cantly by multipath fading, the localization accuracy they offer cannot meet the sixth generations (6G) demanding specifications. On the other hand, visible light pos...
详细信息
In the traditional service architecture (Service-Oriented Architecture, SOA), the Web Service provider registers its service description in the registry for service consumers to discover and call services. Although th...
详细信息
Signal Strength based position check is all the more encouraging when contrasted with other Sybil assault discovery methods since it is lightweight and doesn't need centralization. Hubs can locally decide their ar...
详细信息
暂无评论