X86 emulation on heterogeneous processor platform suffers from low performance and other problems, to solve these problems, a kind of high performance IO architecture was presented. This paperdescribes the design and...
详细信息
reconfigurable router with fast look-up table synchronization mechanism is necessary for Next generation network (NGN), which facilitates open and fast deployment of new services. Based on an open architecture, standa...
详细信息
reconfigurable router with fast look-up table synchronization mechanism is necessary for Next generation network (NGN), which facilitates open and fast deployment of new services. Based on an open architecture, standard and highly credible interfaces among modules, a synchronization mechanism of the routing table and FIB (Forwarding information base) is put forward in this paper which is applicable to other look-up tables. This synchronization mechanism overcomes the inconsistency of look-up tables brought by the dynamic loading or unloading of forwarding planes. Anomalies can be rapidly discovered and eliminated by adding the appropriate synchronization messages to multi-queue, calculating the 16-bit Checksum in look-up table andresending parts of look-up table entries to the forwarding planes. A reconfigurable router prototype is built to simulate the scene. The results show that the proposed algorithm can realize high consistency and quick recovery in look-up tables, which improve stability andreliability of the reconfigurable router.
In CBrsystem, the case base is becoming increasingly larger with the incremental learning which results in the decline of case retrieval efficiency and its weaker performance. Aiming at such weakness of CBrsystem, t...
详细信息
Fixed-point simulation is extremely important in the design of fixed-point FPGAs. Float-point simulation is used to verify the arithmetic, while the fixed-point simulation is adopted to evaluate performance and verify...
详细信息
In heterogeneous wireless network, its open and interconnected characteristic challenges current secure mechanisms, To enhance the security andreduce the redundant identifiers of users, An access authentication schem...
详细信息
In heterogeneous wireless network, its open and interconnected characteristic challenges current secure mechanisms, To enhance the security andreduce the redundant identifiers of users, An access authentication scheme based on the nonredundant identifier is proposed. The scheme is to realize identifier authentication, through using identity separating storage, substitute transmission and identifier updating mechanisms, user privacy protection is enhanced. This paper also improves AKA algorithm to enhance the security of access authentication. Finally, security and communication performance of the proposed protocol are analyzed. The result showed that the proposed scheme is efficient and secure met users’ requirements in access security.
The integration of various wireless networks brings some new access security challenges in heterogeneous wireless networks (HWNs). Transaction of the mobile host with an unknown network is more a norm than an exceptio...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
The integration of various wireless networks brings some new access security challenges in heterogeneous wireless networks (HWNs). Transaction of the mobile host with an unknown network is more a norm than an exception. This paper proposes a trust management mechanism and a fuzzy set baseddynamic trust model (FBdTM) to evaluate the trustworthiness of the network in HWNs. In the model, trust is a measure of information imprecision which can be measured by membership degrees to different fuzzy sets. The evaluation incorporates direct trust, recommendation trust, reputation of recommenders and time stamp. direct andrecommendation trusts reflect how well the network has fulfilled the service agreement in the past. By introducing reputation of recommenders, malicious behaviors of the dishonest entities are restrained effectively. Time stamp makes the evaluation pay much attention to the most recent performance records. Based on the trustworthiness, the mechanism helps mobile host make a decision on the access network selection. The simulation results show the FBdTM model can accurately evaluate the trustworthiness of the network and effectively restrain the acts of slander and co-fraud.
due to the use of variable length coding(VLC), the MPEG-2 code is very sensitive to channel disturbances. A single bit error in I frame may propagate up to the rest of the slice until the next resynchronization point ...
详细信息
due to the use of variable length coding(VLC), the MPEG-2 code is very sensitive to channel disturbances. A single bit error in I frame may propagate up to the rest of the slice until the next resynchronization point is reached and may also propagate into temporal domain because of interframe coding. As a result,it leads to noticeable degradation of the decoded video quality. To prevent error propagation, an error correction algorithm to I frame is presented in this paper:moving window error correction *** different from error concealment (EC) methods, it can partly correct some random and outburst errors in the corrupteddiscrete cosine transform (dCT) regions and can recover the original *** methods are used only when the correction algorithm fails. The performance of the proposed scheme proves to be satisfactory and surpasses the only use of EC methods under study.
An efficient Call Admission Control (CAC) arithmetic is essential to guarantee QoS for enhancing the utilization of radio resource in multitraffic CdMA systems. This paper presents a Multi-Class Services dynamic Mixed...
详细信息
An efficient Call Admission Control (CAC) arithmetic is essential to guarantee QoS for enhancing the utilization of radio resource in multitraffic CdMA systems. This paper presents a Multi-Class Services dynamic Mixed Judgment CAC arithmetic. This arithmetic judges a new coming call whether to accept or not based on the remaining resource, the priority of all services and the resource reservation for high priority. When self-similar service is coming, it uses probabilistic access. The results show that this arithmetic can keep better performance.
A memory architecture is proposed to automatically explore the design space consisting of data reuse for sliding window applications, in the context of FPGAtargeted hardware compilation. Sliding window operator is wid...
详细信息
ISBN:
(纸本)9781424458219;9781424458240
A memory architecture is proposed to automatically explore the design space consisting of data reuse for sliding window applications, in the context of FPGAtargeted hardware compilation. Sliding window operator is widely used in the typical applications on reconfigurable system, such as image processing, pattern recognition anddigital signal processing, etc. But the sliding window circuit generated by reconfigurable compilersystem is not so efficiency, limited by redundant storage, waiting operation and so on. In this paper, we present a block-based storage data reuse method to increases data throughput in sliding window applications. Through parallel access the window data, our method can reduce memory access time and improve the performance of hardware circuit. Experiments show that in three typical applications of sliding window, this approach can achieve accelerating of sliding window circuit, the performance of the program enhances 6.5-7.9 times.
暂无评论