In June 2008, the Subversion development team released Subversion 1.5.0. This release contained a number of new features, but arrived only after a long and difficult development, test and release cycle. This protracte...
详细信息
ISBN:
(纸本)9781424437207
In June 2008, the Subversion development team released Subversion 1.5.0. This release contained a number of new features, but arrived only after a long and difficult development, test and release cycle. This protracted process confused and frustrated both users and developers. In this paper, we discuss the events which led to this breakdown, how the release process is being improved, and what lessons other open source projects can learn from the Subversion community's mistakes.
A 1.3 pJ/b inductive coupling transceiver is proposed for Cm-range multimedia data transmission in mobile device applications. Its transmission time control (TTC) scheme and adaptive gain control (AGC) scheme reduce t...
详细信息
A 1.3 pJ/b inductive coupling transceiver is proposed for Cm-range multimedia data transmission in mobile device applications. Its transmission time control (TTC) scheme and adaptive gain control (AGC) scheme reduce the energy consumption below to 1.3 pJ/b. Inductor with self-resonance frequency above 200 MHz achieves the data rate over 50 Mbps. The receiver sensitivity can be enhanced to increase the communication distance up to 7 cm by relative magnitude comparison between two nodes of the receiver inductor. The transceiver consumes only 65 ¿W in total with 1 V supply.
This paper presents the design of a fault-tolerant universal asynchronous receiver transmitter (UART) called micro-FT-UART for safety-critical SoC-based applications. This UART exploits advantages of three fault-toler...
详细信息
This paper presents the design of a fault-tolerant universal asynchronous receiver transmitter (UART) called micro-FT-UART for safety-critical SoC-based applications. This UART exploits advantages of three fault-tolerant techniques to tolerate soft errors. The three techniques are triple modular redundancy (TMR), Hamming code and a new technique called correction by parity storing (CPS). An VHDL model of a micro-UART is simulated by the ModelSim v.6.0 and synthesized by the Synopsys Design Compiler v.X-2005.09-SP2. About 1000 single-bit errors and 1000 multiple-bit errors are injected into different parts of the micro-UART to find out the error sensitivity of each specific part. Considering tradeoff between reliability and power consumption, an optimum fault-tolerant technique is assigned to each part to design the micro-FT-UART. This UART corrects all single-bit errors and on average 24% of multiple-bit errors with about 81% power consumption overhead and 152% area overhead.
The continuous decrease in CMOS technology feature size increases the susceptibility of such circuits to single event transient SET and single event upset SEU, caused by energetic particles striking system wires and f...
详细信息
The continuous decrease in CMOS technology feature size increases the susceptibility of such circuits to single event transient SET and single event upset SEU, caused by energetic particles striking system wires and flip flops. This paper presents a novel SET/SEU-detection technique for I/O ports where different sampling times used to detect the effects of SET/SEUs. The power dissipation, area, reliability, and propagation delay of the SET/SEU-detection I/O port are analyzed by HSPICE v.X-2005.v9 simulation. The results show that this I/O port can detect all SET/SEUs, by consumption of about 113% more power and occupation of 145% more area than simple I/O port.
The evolution of emerging volunteer computing systems is placing an ever greater emphasis on the use of a loosely coupled decentralized architecture, mainly to address concerns of scalability and robustness. We propos...
详细信息
The evolution of emerging volunteer computing systems is placing an ever greater emphasis on the use of a loosely coupled decentralized architecture, mainly to address concerns of scalability and robustness. We propose to build the next generation volunteer computing systems on top of well studied peer-to-peer techniques to fully take advantage of its decentralized characteristic and its very large, shared data storage capacity. This paper sketches the design of such a completely decentralized and fault tolerant volunteer computing system by using a peer-to-peer based tuple space formed by volunteer peers. Both simulation and software prototype evaluation results show support for the proposed design even when all peers are having a high churn rate of Mean Time Before Failure of 2 hours.
Bacteria can be used as computer-controlled bioactuators and means of propulsion for microrobots and other micro-scaled entities to accomplish precise operations as first proposed by our research group in [1] and demo...
详细信息
Bacteria can be used as computer-controlled bioactuators and means of propulsion for microrobots and other micro-scaled entities to accomplish precise operations as first proposed by our research group in [1] and demonstrated later experimentally in [2]. The last reference confirmed that the propulsion force provided by the flagella being connected to molecular motors embedded in the bacterial cell, could be exploited to replace more conventional technologies being presently used in robotics but which could not be implemented at such a scale. In a coherent effort, our group also pioneered a method of not only harnessing instead of mimicking nature by using flagellated bacteria and more specifically Magnetotactic Bacteria (MTB) for propulsion and transport, but also for the controlled steering or computerized directional swimming control of bacterial micronanorobots [3].
Metaschedulers can distribute parts of a bag-of-tasks (BoT) application among various resource providers in order to speed up its execution. When providers cannot disclose private information such as their load and co...
详细信息
Metaschedulers can distribute parts of a bag-of-tasks (BoT) application among various resource providers in order to speed up its execution. When providers cannot disclose private information such as their load and computing power, which are usually heterogeneous, the metascheduler needs to make blind scheduling decisions. We propose three policies for composing resource offers to schedule deadline-constrained BoT applications. Offers act as a mechanism in which resource providers expose their interest in executing an entire BoT or only part of it without revealing their load and total computing power. We also evaluate the amount of information resource providers need to expose to the metascheduler and its impact on the scheduling. Our main findings are: (i) offer-based scheduling produces less delay for jobs that cannot meet deadlines in comparison to scheduling based on load availability (i.e. free time slots); thus it is possible to keep providers' load private when scheduling multi-site BoTs; and (ii) if providers publish their total computing power they can have more local jobs meeting deadlines.
Endoscopic argon plasma coagulation and bipolar electrocautery are currently preferred treatments for chronic radiation proctitis, but ulcerations and strictures frequently occur. Radiofrequency ablation (RFA) has bee...
详细信息
This paper explores the ability to use graphics processing units (GPUs) as co-processors to harness the inherent parallelism of batch operations in systems that require high performance. To this end we have chosen blo...
详细信息
This paper explores the ability to use graphics processing units (GPUs) as co-processors to harness the inherent parallelism of batch operations in systems that require high performance. To this end we have chosen bloom filters (space-efficient data structures that support the probabilistic representation of set membership) as the queries these data structures support are often performed in batches. Bloom filters exhibit low computational cost per amount of data, providing a baseline for more complex batch operations. We implemented BloomGPU a library that supports offloading bloom filter support to the GPU and evaluate this library under realistic usage scenarios. By completely offloading Bloom filter operations to the GPU, BloomGPU outperforms an optimized CPU implementation of the bloom filter as the workload becomes larger.
In this paper, we present a method to trace evolution of trend over multiple data streams and detect the abnormal ones. First of all, a definition of trend for single data stream is provided, the advantage of our defi...
详细信息
暂无评论