Advanced Encryption Standard (AES) is used nowadays extensively in many network and multimedia applications to address security issues. In this paper, a high throughput area efficient FPGA implementation of the latter...
详细信息
Advanced Encryption Standard (AES) is used nowadays extensively in many network and multimedia applications to address security issues. In this paper, a high throughput area efficient FPGA implementation of the latter cryptographic primitive is proposed. It presents the highest performance (in terms of throughput) among competitive academic and commercial implementations. Using a Virtex-II device, a 1.94 Gbps throughput is achieved, while the memory usage remains low (8 BlockRAMs) and the CLB coverage moderate.
Integrating life science Web databases, while important and necessary, is a challenge for current integration systems mainly due to the large number of these databases, their heterogeneity and the fact that their inte...
详细信息
Integrating life science Web databases, while important and necessary, is a challenge for current integration systems mainly due to the large number of these databases, their heterogeneity and the fact that their interfaces may change often. BACIIS, a biological and chemical information integration system, is a tightly coupled federated database system that uses the mediator wrapper method in order to retrieve information from several remote Web databases. BACIIS relies on a semi-automated approach for generating and maintaining wrappers in order to provide a scalable system with a limited maintenance overhead. The semi-automatic wrapper induction in BACIIS is efficient because it is based on, but not limited to a domain knowledge. Tests show that the use of ontology increases the accuracy of the wrapper induction. We also present how the wrapper induction system facilitates wrapper update, and assists in the information extraction. By using a wrapper induction system for creation and maintenance of wrappers, scalability, flexibility, and stability of the integrated information system is easily maintained.
As microarchitectural and system complexity grows, comprehending system behavior becomes increasingly difficult, and often requires obtaining and sifting through voluminous event traces or coordinating results from mu...
详细信息
ISBN:
(纸本)1595930183
As microarchitectural and system complexity grows, comprehending system behavior becomes increasingly difficult, and often requires obtaining and sifting through voluminous event traces or coordinating results from multiple, non-localized sources. Owl is a proposed framework that overcomes limitations faced by traditional performance counters and monitoring facilities in dealing with such complexity by pervasively deploying programmable monitoring elements throughout a system. The design exploits reconfigurable or programmable logic to realize hardware monitors located at event sources, such as memory buses. These monitors run and writeback results autonomously with respect to the CPU, mitigating the system impact of interrupt-driven monitoring or the need to communicate irrelevant events to higher levels of the system. The monitors are designed to snoop any kind of system transaction, e.g., within the core, on a bus, across the wire, or within I/O devices. Copyright 2005 ACM.
Distributed computing is widely expected to become ubiquitous over the next decade. Distributed services such as those provided by Service Oriented Architectures which will support this ubiquity must meet many require...
详细信息
The emerging paradigm of distributed Web services has promised seamless business integration across the Internet that shares not only computing power but also applications. One major challenge is resource allocation t...
详细信息
A complete face authentication system integrating 2D color and 3D depth images is described in this paper. Depth information, acquired by a novel low-cost 3D and color sensor based on the structured light approach, is...
详细信息
A complete face authentication system integrating 2D color and 3D depth images is described in this paper. Depth information, acquired by a novel low-cost 3D and color sensor based on the structured light approach, is used for robust face detection, localization and 3D pose estimation. To cope with illumination and pose variations, 3D information is used for the normalization of the input images. Illumination compensation exploits depth data to recover the illumination of the scene and relight the image under frontal lighting. The performance of the proposed system is tested on a face database of more than 3,000 images, in conditions similar to those encountered in real-world applications. Experimental results show that when normalized images, depicting upright orientation and frontal lighting, are used for authentication, significantly lower error rates are achieved. Moreover, the combination of color and depth data results in increased authentication accuracy, compared to the use of each modality alone.
This paper is concerned with the mixed H∞/D-stability control problem. Since multiobjective control problems are non-convex problems except some cases, it is difficult to obtain the globally optimal solutions. The pu...
详细信息
In agent-mediated marketplaces, autonomous agents deploy automated bidding mechanisms in order to increase revenue for humans. The ability of agents to estimate the next prices to be revealed in an auction, by applyin...
详细信息
We propose a checkpoint store compression method for coarse-grain giga-scale checkpoint/restore. This mechanism can be useful for debugging, post-mortem analysis and error recovery. Our compression method exploits val...
详细信息
ISBN:
(纸本)9780769524290
We propose a checkpoint store compression method for coarse-grain giga-scale checkpoint/restore. This mechanism can be useful for debugging, post-mortem analysis and error recovery. Our compression method exploits value locality in the memory data and address streams. Our compressors require few resources, can be easily pipelined and can process a full cache block per processor cycle. We study two applications of our compressors for post-mortem analysis: (1) using them alone, and (2) using them in-series with a dictionary-based compressor. When used alone they offer competitive compression rates in most cases. When combined with dictionary compressors, they significantly reduce on-chip buffer requirements.
We present a novel scheme for the transmission of H.264/AVC video streams over packet loss networks. The proposed scheme exploits the error resilient features of H.264/AVC codec and employs Reed-Solomon codes to prote...
详细信息
ISBN:
(纸本)0863415954
We present a novel scheme for the transmission of H.264/AVC video streams over packet loss networks. The proposed scheme exploits the error resilient features of H.264/AVC codec and employs Reed-Solomon codes to protect effectively the streams. A novel technique for adaptive classification of macroblocks into three slice groups using Flexible Macroblock Ordering is also proposed. The optimal classification of macroblocks and the optimal channel rate allocation are achieved by iterating two interdependent steps by means of dynamic programming techniques. Simulations clearly demonstrate the superiority of the proposed method over other recent algorithms for transmission of H.264/AVC streams.
暂无评论