In the development stage of the embedded system, the market demand and system development trend will be influence by the Time to Market. Reliable and fast system deployment is not easy to implement. Reduced price and ...
详细信息
This paper proposes a robust antitamper protection scheme to protect any critical regions of a program from being modified, using possibly a large number of lightweight protection units, called protectors, installed a...
详细信息
The current research project proposes advanced statistical and adaptive threshold techniques for video object detection and segmentation. We present new statistical adaptive threshold techniques to show the advantages...
详细信息
The considerable concern about the high constructing and maintaining costs is the bottleneck of rapid and world-wide fiber-to-the-home (FTTH) deployment. However, it is also important to maintain high communicative pe...
详细信息
This paper reports about the latest instrumentation technique of Gene Expression using DNA Microarray. DNA Microarray Image Analysis is a new and exciting computing paradigm with biological background. It involves the...
详细信息
In this paper we show how a cooperative Medium Access Control (MAC) protocol can help extend the lifetime of Machine to Machine (M2M) networks. A comparison between non-cooperative Automatic Repeat reQuest (ARQ) schem...
详细信息
ISBN:
(纸本)9781457720529
In this paper we show how a cooperative Medium Access Control (MAC) protocol can help extend the lifetime of Machine to Machine (M2M) networks. A comparison between non-cooperative Automatic Repeat reQuest (ARQ) schemes (retransmissions performed only from the source) and a cooperative retransmission scheme (all the stations in the network are spontaneous helpers and assist the destination during the communication) in energy-constrained networks is also presented in this work. The results shown in this paper are discussed in terms of the trade off between the network lifetime and the amount of data delivered, leading to the conditions where it is possible to optimize the lifetime of this kind of networks.
Given a stream of time-stamped events, like alerts in a network monitoring setting, how can we isolate a sequence of alerts that form a network attack? We propose a Sequence Based Attack Detection (SBAD) method, which...
详细信息
D* based navigation algorithms provide robust and real-time means of achieving path planning in dynamic environments. Author of this paper introduces a notion of predictable time-based obstacles. The algorithm propose...
详细信息
This paper proposed an image authentication technique based on a data compression and prediction mechanism in order to verify if a digital image was tampered with over the network. For image blocks, first is to produc...
详细信息
We consider the challenges in writing efficient code for ePUMA, a novel domain-specific heterogeneous multicore architecture with SIMD DSP slave cores, multi-banked on-chip vector register files for parallel access an...
详细信息
暂无评论