This paper introduces a formal description about a new exception detection framework for context-aware systems. This framework aims to encourage application programmers in context-aware systems to write exception desc...
详细信息
This paper introduces a formal description about a new exception detection framework for context-aware systems. This framework aims to encourage application programmers in context-aware systems to write exception description and handling codes by providing a systematic way to do it. In this framework some portions of the formal modeling are applied to performance optimization and to automation of exception detection.
The rapidly increasing variability in circuit performance in highly scaled technologies has given rise to novel “better-than-worst-case” circuit design methods. They aim to overcome worst-case clock timing requireme...
详细信息
The rapidly increasing variability in circuit performance in highly scaled technologies has given rise to novel “better-than-worst-case” circuit design methods. They aim to overcome worst-case clock timing requirements by employing a shorter clock period and allowing occasional errors to occur; these are detected and recovered from by low-cost error detection and correction techniques. We investigate conditions under which timing error detection based on the memory element duplication with delayed capture is reliable even under extreme variations, where the key problem arises from short-path invalidation mechanisms. We consider two known mitigation techniques: buffer padding and latch placement. The derived conditions can yield the interval of clock periods within which an adaptive frequency scaling strategy may reliably operate. We show that buffer padding is impossible if variability exceeds a certain limit, but latch placement always yields a solution, works for more clock frequencies, and tends to incur less area costs, at the cost of clock power.
Traffic in wireless sensor networks (WSN) exhibits a many-to-one pattern in which multiple source nodes send sensing data to a single sink node. Since bandwidth, processor and memory are highly constrained in WSN, pac...
详细信息
Traffic in wireless sensor networks (WSN) exhibits a many-to-one pattern in which multiple source nodes send sensing data to a single sink node. Since bandwidth, processor and memory are highly constrained in WSN, packet loss is common when a great deal of traffic rushes to sink. The system must provide differentiated service to individual traffic classes. In this paper, a pre-emptive multiple queue based congestion control mechanism is proposed. To detect congestion and to provide QoS for high priority traffic multiple buffers are used. Using this mechanism, high system utilization, reduced packet waiting time, and reduced packet drop probability are achieved. An analytical model is developed to predict the performance of the proposed mechanism by calculating the performance measures including system throughput, drop probability of packets, and mean queue length. By comparing analytical and simulation results the effectiveness and accuracy of the model is demonstrated. Markovian process is used to develop the analytical model and ns-2 for evaluating the performance of the mechanism.
A key issue in developing pendular Fabry-Perot interferometers as very accurate displacement measurement devices, is the noise level. The Fabry-Perot pendulums are the most promising device to detect gravitational wav...
详细信息
A key issue in developing pendular Fabry-Perot interferometers as very accurate displacement measurement devices, is the noise level. The Fabry-Perot pendulums are the most promising device to detect gravitational waves, and therefore the background and the internal noise should be accurately measured and reduced. In fact terminal masses generates additional internal noise mainly due to thermal fluctuations and vibrations. We propose to exploit the reflectivity change, that occurs in some special points, to monitor the pendulums free oscillations and possibly estimate the noise level. We find that in spite of long transients, it is an effective method for noise estimate. We also prove that to only retain the sequence of escapes, rather than the whole time dependent dynamics, entails the main characteristics of the phenomenon. Escape times could also be relevant for future gravitational wave detector developments.
Over the last decade or so, significant research has focused on defining Quality of Experience (QoE) of Multimedia Systems and identifying the key factors that collectively determine it. Some consensus thus exists as ...
详细信息
ISBN:
(纸本)9781479982424
Over the last decade or so, significant research has focused on defining Quality of Experience (QoE) of Multimedia Systems and identifying the key factors that collectively determine it. Some consensus thus exists as to the role of System Factors, Human Factors and Context Factors. In this paper, the notion of context is broadened to include information gleaned from simultaneous out-of-band channels, such as social network trend analytics, that can be used if interpreted in a timely manner, to help further optimise QoE. A case study involving simulation of HTTP adaptive streaming (HAS) and load balancing in a content distribution network (CDN) in a flash crowd scenario is presented with encouraging results.
Classification of text documents is one of the most common themes in the field of machine learning. Although a text document expresses a wide range of information, but it lacks the imposed structure of tradition datab...
详细信息
Classification of text documents is one of the most common themes in the field of machine learning. Although a text document expresses a wide range of information, but it lacks the imposed structure of tradition database. Thus, unstructured data, particularly free running text data has to be transferred into a structured data. Hence, in this paper we represent the text document unconventionally by making use of symbolic data analysis concepts. We propose a new method of representing documents based on clustering of term frequency vectors. Term frequency vectors of each cluster are used to form a symbolic representation by the use of Mean and Standard Deviation. Further, term frequency vectors are used in the form a interval valued features. To cluster the term frequency vectors, we make use of Single Linkage, Complete Linkage, Average Linkage, K-Means and Fuzzy C-Means clustering algorithms. To corroborate the efficacy of the proposed model we conducted extensive experimentations on standard datasets like 20 Newsgroup Large, 20 Mini Newsgroup, Vehicles Wikipedia datasets and our own created datasets like Google Newsgroup and Research Article Abstracts. Experimental results reveal that the proposed model gives better results when compared to the state of the art techniques. In addition, as the method is based on a simple matching scheme, it requires a negligible time.
GOST is a well-known block cipher as the official encryption standard for the Russian Federation. A special feature of GOST is that its eight S-boxes can be secret. However, most of the researches on GOST assume that ...
详细信息
ISBN:
(纸本)9781479962938
GOST is a well-known block cipher as the official encryption standard for the Russian Federation. A special feature of GOST is that its eight S-boxes can be secret. However, most of the researches on GOST assume that the design of these S-boxes is known. In this paper, the security of GOST against side-channel attacks is examined with algebraic fault analysis (AFA), which combines the algebraic cryptanalysis with the fault attack. Three AFAs on GOST, which have different attack goals in different scenarios, are investigated. The results show that 8 fault injections are required to recover the secret key when the full design of GOST is known, which is less than 64 fault injections required in previous work. 64 fault injections are required to recover the eight unknown S-boxes assuming the key is known. 270 fault injections are required to recover the key and the eight S-boxes when both are unknown. The results prove that AFA is very effective and keeping some components in a cipher secret cannot guarantee its security against fault attacks.
Electric Vehicles (EVs) are becoming increasingly popular in recent years. Battery Electric Vehicles (BEVs) are a type of EVs use stored energy more efficiently than typical internal combustion engine powered counterp...
详细信息
Screen content video coding is becoming increasingly important in various applications, such as desktop sharing, video conferencing, and remote education. In January 2014, the ITU-T and ISO/IEC MPEG jointly issued cal...
详细信息
A mixed-criticality system consists of multiple components with different criticalities. While mixed-criticality scheduling has been extensively studied for the uniprocessor case, the problem of efficient scheduling f...
详细信息
A mixed-criticality system consists of multiple components with different criticalities. While mixed-criticality scheduling has been extensively studied for the uniprocessor case, the problem of efficient scheduling for the multiprocessor case has largely remained open. We design a fluid model-based multiprocessor mixed-criticality scheduling algorithm, called MC-Fluid, in which each task is executed in proportion to its criticality-dependent rate. We propose an exact schedulability condition for MC-Fluid and an optimal assignment algorithm for criticality-dependent execution rates with polynomial complexity. Since MC-Fluid cannot construct a schedule on real hardware platforms due to the fluid assumption, we propose MC-DP-Fair algorithm, which can generate a non-fluid schedule while preserving the same schedulability properties as MC-Fluid. We show that MC-Fluid has a speedup factor of (1 + v 5)/2 ( 1.618), which is best known in multiprocessor MC scheduling, and simulation results show that MC-DP-Fair outperforms all existing algorithms.
暂无评论