Substrate current (Isub) in poly-Si thin film transistors (TFTs) is first investigated by considering their specific substrate contact configuration. When the substrate bias is very small, Isub is driven by the recomb...
详细信息
In recent years, more and more applications in cloud have needed to process large-scale on-line data sets that evolve over time as entries are added or modified. Several programming frameworks, such as Percolator and ...
详细信息
Online social networks are gaining galloping upward momentum in a quick succession ever since from their inception as they lay a sturdy platform to share the information seeping into everyone who is concerned about it...
详细信息
In a world of pervasive computing, embedded systems can be found in a wide range of products and are employed in various heterogeneous domains. The abovementioned devices often need to access, store, manipulate and/or...
详细信息
ISBN:
(纸本)9789897580000
In a world of pervasive computing, embedded systems can be found in a wide range of products and are employed in various heterogeneous domains. The abovementioned devices often need to access, store, manipulate and/or communicate sensitive or even critical information, making the security of their resources and services an important concern in their design process. These issues are further exacerbated by the resource-constrained nature of the devices, in conjunction with the ever-present need for smaller size and lower production costs. This paper aims to provide an overview of the challenges in designing secure embedded systems, covering both node hardware and software issues, as well as relevant network protocols and cryptographic algorithms. Moreover, recent advances in the field are identified, highlighting opportunities for future research.
The task of concealment of information is an important challenge in the context of an advance infrastructure of open and uncontrolled Internet users' communication through computer networks. Various steganographic...
详细信息
This paper aims at comparing and reproducing the predictions of two public available computational auditory models for speaker localization in different simulated environments. The direction-of-arrival (DOA) of sound ...
详细信息
Fuzzy Cognitive Map (FCM) is an efficient knowledge representation and reasoning method, which is based on human knowledge and experience. In this work, a FCM model is constructed to represent users' perceptions o...
详细信息
This paper proposes a new evolutionary algorithm with adaptive penalty coefficient. Firstly, the crossover operator of the new algorithm searches a lower-dimensional neighbor of the parent points, so that the algorith...
详细信息
Chip-Multiprocessors are an appealing architectural choice to exploit increased number of transistors, in an era of diminishing returns in frequency and performance, increasing wire delays, and uncontrollable complexi...
详细信息
ISBN:
(纸本)9290922028
Chip-Multiprocessors are an appealing architectural choice to exploit increased number of transistors, in an era of diminishing returns in frequency and performance, increasing wire delays, and uncontrollable complexity. At the same time, the implementation of multiple processors and memories on a single chip, can provide a high degree of redundancy and hence reliability. We propose a novel computer architecture called HYDRA, tailored for space applications where power, reliability, and disaster recovery are primary concerns. The proposed architecture allows the on-chip memory and processors to act as part of the communication fabric, simplifying the system architecture and providing high bandwidth and low power. At the same time it provides a high degree of redundancy allowing the recovery from multiple faults at any time. Our approach is especially well suited to applications that can be mapped statically in such a way as to maximize the locality of shared references. This attribute is common among communication (streaming media) applications.
With applications including medical image analysis, picture sharpening and restoration, robot vision, pattern recognition, and video processing, among many others, image enhancement is the main topic in image processi...
详细信息
暂无评论