Large combinational circuits need to be partitioned in order to manage scarce resources on k-LUT based FPGAs . Circuit partitioning has multiple applications in VLSI design. One of the most common is that of dividing ...
详细信息
Large combinational circuits need to be partitioned in order to manage scarce resources on k-LUT based FPGAs . Circuit partitioning has multiple applications in VLSI design. One of the most common is that of dividing combinational circuits (usually large ones) that will not fit on a single package among a number of packages. Partitioning is of practical importance for k- LUT based FPGA circuit implementation. In this work is presented a multilevel multi-resource partitioning algorithm for partitioning large combinational circuits using cone-clusters in order to efficiently map existing and commercially available k -LUT based FPGAs packages.
There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with some performance degradation, uncertain Q...
详细信息
There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with some performance degradation, uncertain QoS and loss of functionalities. Meanwhile, many virtualization-enabled features such as online maintenance and fault tolerance do not require virtualization being always on. This paper proposes a technique, called self-virtualization, that supports dynamically attaching and detaching a full-fledged virtual machine monitor (VMM) beneath an operating system, without disturbing applications thereon, and rid the system of potential overhead when the virtualization is not needed. This technique enables HPC clusters to reap most benefits from virtualization without sacrificing performance. This paper presents the design and implementation of Mercury, a working prototype based on Linux and Xen VMM. Our performance measurement shows that Mercury incurs very little overhead: about 0.2 ms to complete a mode switch, and negligible performance degradation compared to Linux.
Transmitting variable-length network layer (IP) packets over satellite links with fixed frame lengths (or lengths depending on the ACM transmission mode) requires (IP) encapsulation. For DVB-S links with fixed-size 18...
详细信息
Transmitting variable-length network layer (IP) packets over satellite links with fixed frame lengths (or lengths depending on the ACM transmission mode) requires (IP) encapsulation. For DVB-S links with fixed-size 188-byte TS packets, MPE and ULE encapsulations are available. DVB-S2 provides a compatibility mode to pack TS packets into the longer base band frames (BBFrames). Thus MPE and ULE are also available for S2, as well as a native generic stream encapsulation (GSE), avoiding the double overhead of TS and BBFrame encapsulation. The present paper gives a short overview on the available encapsulation protocols for DVB-S2, and then provides a mathematical efficiency calculation model for these encapsulations, in order to allow for performing theoretical efficiency simulations. Comparison graphs of the efficiency values are presented, using both the efficiency models and measurements from real satellite traffic.
Determining if a given arbitrary, wide function can be implemented by a programmable logic block, is unfortunately, in general, a very difficult problem, called the Boolean matching problem. We introduce a novel imple...
详细信息
Determining if a given arbitrary, wide function can be implemented by a programmable logic block, is unfortunately, in general, a very difficult problem, called the Boolean matching problem. We introduce a novel implemented algorithm able to map for performance combinational networks using k -LUT based FPGAs. We consider in this paper delay optimum and area optimal k-LUT FPGA mapping algorithms and compare them against a newly developed and recently improved algorithm.
In recent years, the amount of Internet accessible digital audiovisual media files has vastly increased. Therefore the need to describe the media (by way of metadata) has also increased significantly. MPEG-7 (finalize...
详细信息
In recent years, the amount of Internet accessible digital audiovisual media files has vastly increased. Therefore the need to describe the media (by way of metadata) has also increased significantly. MPEG-7 (finalized in 2001) provides a comprehensive and rich metadata standard for the description of multimedia content. Unfortunately, a standardized query format does not exist for MPEG-7, or other multimedia metadata. Such a standard would provide for communications between querying clients and databases, supporting cross-modal and cross-media retrieval. The lSO/lEC SC29WG11 committee decided therefore to contribute to this application space by adding such functionality as a new part of the MPEG-7 series of standards. In response to a Call for Proposals, six proposals were submitted. This paper describes the strengths of each proposal as well as the resulting draft standard for the MPEG-7 query format.
The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provis...
详细信息
The issue of user privacy is constantly brought to the spotlight since an ever increasing number of online services collects and processes personal information from users, in the context of personalized service provision. Although technology makes the collection of data easy, their protection against abuse is left to data protection legislation. However, the privacy requirements, other than being general and abstract terms to be regarded as legislature issues, should be brought down in the technological reality and carefully accounted for in devising technical solutions. In order to limit the disclosure and avoid the misuse of personal data, this paper discusses an architectural proposal for a middleware system that will enforce protection of user privacy through technical means. This goal is facilitated by a combination of a policy framework, a sensible interpretation of regulations into policies and the introduction of a privacy broker, named the Discreet Box.
In the context of high-end computing systems, general-purpose operating systems impose overhead on the applications they support due to unneeded services. Although dedicated operating systems overcome this issue, they...
详细信息
In the context of high-end computing systems, general-purpose operating systems impose overhead on the applications they support due to unneeded services. Although dedicated operating systems overcome this issue, they are difficult to develop or adapt. In this paper, we propose a framework, based on the component programming paradigm, which supports the development and adaptation of such operating systems. This framework makes possible the a la carte construction of operating systems which provide specific high-end computing system characteristics.
Modern communication environments tend to be complex, dynamic and highly distributed. For the provision of messaging in such environments multiple entities, providing different functionalities and located remotely fro...
详细信息
Modern communication environments tend to be complex, dynamic and highly distributed. For the provision of messaging in such environments multiple entities, providing different functionalities and located remotely from each other, must cooperate in order to perform different tasks and provide different kind of information for the completion of the service provision lifecycle. Within this paper we present an implementation analysis of the communication mechanism which was employed in a distributed brokerage framework for the provision of context aware personalized services. The paper focuses on the inter-broker communication mechanism which enables the transparent interaction between components located in different brokers. The mechanism was designed and implemented having in mind relevant requirements such as transparency, modularity and high availability. The design and implementation was based on web service practices and the SOAP protocol.
We present a browser extension to dynamically learn to filter unwanted images (such as advertisements or flashy graphics) based on minimal user feedback. To do so, we apply the weighted majority algorithm using pieces...
详细信息
ISBN:
(纸本)1595930515
We present a browser extension to dynamically learn to filter unwanted images (such as advertisements or flashy graphics) based on minimal user feedback. To do so, we apply the weighted majority algorithm using pieces of the Uniform Resource Locators of such images as predictors. Experimental results tend to confirm that the accuracy of the predictions converges quickly to very high levels.
Due to the convenience of pervasive information environment, many people use various computing devices to perform plenty kinds of tasks. In the field of education, there are various applications to facilitate learner,...
详细信息
ISBN:
(纸本)0769522459
Due to the convenience of pervasive information environment, many people use various computing devices to perform plenty kinds of tasks. In the field of education, there are various applications to facilitate learner, especially for e-learning. However, some computing devices suffer from the limited resources and can not accept rich information content. Therefore, the information content has to be tailored into different kinds of presentation depending on the types of computing devices. Context sensitivity is an application software system's ability to sense and analyze context from various sources. In this paper, we aim to customize static documents using context-sensitive middleware (CSM) to sense the computing device, and then using the agent-based parser to provide suitable content representation dynamically.
暂无评论