IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. This paper proposes two novel BCD adders called carry skip and carry...
详细信息
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multiplications and circuit architectures ar...
详细信息
Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does...
详细信息
Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does not well resolve attribute disclosures. In this paper we focus on the sensitive attribute disclosures in k-anonymity and propose an ordinal distance based sensitivity aware diversity metric. We assume the more diversity the sensitive attribute assumes in an equivalence class in a k-anonymized table, the less inference channel there is in the equivalence class
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu...
详细信息
Recently SOA (service oriented architecture) attracts attention as a technique for effective software development. SOA based systems are commonly implemented with the combination of BPEL4WS and Web services. BPEL4WS i...
详细信息
ISBN:
(纸本)9780769526645
Recently SOA (service oriented architecture) attracts attention as a technique for effective software development. SOA based systems are commonly implemented with the combination of BPEL4WS and Web services. BPEL4WS is used for defining interaction between multiple Web services. Since semantics of SOA based systems are complex, the effective validation of those semantics is essential for effective development of those systems. This paper proposes a simulator and associated development procedure for the effective development of SOA based systems. The simulator can run a UML model equivalent to BPEL4WS definition and can also incorporate existing Web services in simulation. Also, design and implementation of the simulator is explained in this paper
An adaptive threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class's CAC thresholds are solved through establishing a re...
详细信息
An adaptive threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class's CAC thresholds are solved through establishing a reward-penalty model which tries to maximize network's revenue in terms of each class's average new call arrival rate and average handoff call arrival rate, the reward or penalty when network accepts or rejects one class's call etc. To guarantee the real time running of CAC algorithm, an enhanced Genetic Algorithm is designed. Analyses show that the CAC thresholds indeed change adoptively with the average call arrival rate. The performance comparison between the proposed scheme and Mobile IP Reservation(MIR) scheme shows that with the increase of average call arrival rate, the average new Call Blocking Probability(CBP) and the average Handoff Dropping Probability (HDP) within 2000 simulation intervals of the proposed scheme are confined to lower levels, and they show approximatively periodical trends of first rise and then decline. While these two performance metrics of MIR always increase. At last, the analysis shows the proposed scheme outperforms MIR in terms of network's revenue.
In deep-submicron technology (DSM), minimizing the propagation delay and power dissipation on buses is the most important design objective in system-on-chip (SOC) design. In particular, the coupling effects between wi...
详细信息
ISBN:
(纸本)1424408989
In deep-submicron technology (DSM), minimizing the propagation delay and power dissipation on buses is the most important design objective in system-on-chip (SOC) design. In particular, the coupling effects between wires on the bus that can cause serious problems such as cross-talk delay, noise and power dissipation. Most of the researchers have concentrated either on minimizing the power dissipation or minimizing crosstalk delay. In this paper, the authors propose a technique for energy efficient data transmission for on-chip buses and evaluate the effectiveness of our technique by using SPEC 95 benchmarks suit. The authors show that our technique achieves 35% of energy savings over the un-encoded data transmission on the data bus
Formal methods offer the promise of significant improvement on quality and reliability of critical embedded software. B-Method is employed to develop general-service ballistic computer programs in the paper, each of w...
详细信息
Formal methods offer the promise of significant improvement on quality and reliability of critical embedded software. B-Method is employed to develop general-service ballistic computer programs in the paper, each of which can be adapted to a family of service/weapon-specific ballistic computers. Based on the structuring mechanisms of B-method, a unified approach is proposed to systematically control the complexity of ballistic parameters in the process of type and operation refinement, and ultimately a series of high reliable, reusable, and scalable programs are produced. Experiences with the application of the method and tools are also discussed.
The deadline monotonic (DM) priority assignment scheme and distributed priority ceiling resource access protocol (DPCP) work well with real-time CORBA. In practice, a potentially large number of global unique prioriti...
详细信息
The deadline monotonic (DM) priority assignment scheme and distributed priority ceiling resource access protocol (DPCP) work well with real-time CORBA. In practice, a potentially large number of global unique priorities must be mapped to the restricted number of local priorities provided by the operating systems. Most operating systems use first-in-first-out (FIFO) scheduling within the same priority. So, a high global priority task could be blocked by lower global priority tasks ahead of it in the local priority FIFO queue. This causes priority inversion and affects the schedulability of tasks with higher global priority. In addition, the optimal priority assignment requires a search of exponential complexity. This is the priority mapping problem. To solve it, necessary and sufficient conditions are presented for analyzing the schedulability of a task which global priority has been mapped to a local priority. The decreasing global priority mapping (DGPM) algorithm is also provided. It can schedule a task and global critical section (GCS) set that is schedulable under any other direct priority mapping algorithms. DGPM can overlap tasks (map two or more tasks to the same local priority) while not allowing the system to become non-schedulable, or prove that the system is no-schedulable after overlapping. The. conditions and algorithm are used in the projects.
In practice, the schedulability of static priority scheduling may be reduced if priority levels of the system are insufficient. When the priority levels that a task set requires are more than the system can support, m...
详细信息
In practice, the schedulability of static priority scheduling may be reduced if priority levels of the system are insufficient. When the priority levels that a task set requires are more than the system can support, more than one task must be assigned the same priority. The priority mapping algorithms that have been used can augment the worst-case response time of task with higher priority, and may reduce the system schedulability. If keeping system schedulable, these algorithms may require more priority levels than the system can support. With preemption threshold scheduling model, the schedulability is improved as compared to both preemption and non-preemption scheduling models, and all tasks can be handled with the minimum number of event handling threads. But, the number of system priority levels that a thread needs does not be reduced. This paper presents a priority mapping algorithm called TSM (threshold segment mapping) and a thread implementation architecture with event-driven. It is shown that the TSM algorithm can maintain the strict order of tasks' priorities, and does not improve task's worst-case response time. The number of system priority levels used by the algorithm and architecture equals to that of threads. Simulations show that when maintaining system schedulability, the TSM algorithm uses less priority levels than existing priority mapping algorithms.
暂无评论