Complex real world systems are currently developing to become a decisive instrument for IT-supported problem solving of a great number of problems posed by science, economy and society. By this, we for the first time ...
详细信息
Complex real world systems are currently developing to become a decisive instrument for IT-supported problem solving of a great number of problems posed by science, economy and society. By this, we for the first time face the chance of being able to find new solutions, visions, and strategies for sustainable development on the basis of complex, real world simulations. M3-Simulations is a simulation approach that actively involves man in a simulated world based on scientifically-founded simulation models driven by current data of measurement. This new kind of simulation concept combines reality-based modeling of scientific simulation systems with the intuitive graphic representation, complex communication and interaction structures of virtual worlds in order to support the process of investigation into the possibilities of sustainable development.
作者:
C.M. KaasJ.E. StineVLSI Computer Architecture
Arithmetic and CAD Research Laboratory Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago IL USA
Interval arithmetic provides an efficient method for monitoring and controlling errors in numerical calculations. However, existing software packages for interval arithmetic are often too slow for numerically intensiv...
详细信息
Interval arithmetic provides an efficient method for monitoring and controlling errors in numerical calculations. However, existing software packages for interval arithmetic are often too slow for numerically intensive calculations. This paper presents the design of a comparator that performs either interval or two's complement/floating-point comparisons. This comparator requires only slightly more area than a conventional floating point comparator, and provides a significant performance improvement over software implementations of interval comparisons. Both serial and parallel designs are examined and the results are implemented in AMI 0.60 /spl mu/m technology.
Truncated multiplication can be used to significantly reduce the power dissipation for applications that do not require correctly-rounded results. This paper presents an efficient method for truncated multiplication c...
详细信息
Truncated multiplication can be used to significantly reduce the power dissipation for applications that do not require correctly-rounded results. This paper presents an efficient method for truncated multiplication called hybrid-correction truncation that utilizes the advantages of two previous methods to obtain lower average and maximum absolute error. Comparisons are presented contrasting power, area, and delay for all three methods compared to standard parallel multipliers. Estimates indicate that hybrid truncated multipliers dissipate slightly less power and consume slightly less area than previous methods for truncated multiplication. In addition, utilization of the hybrid truncation method can provide a method for altering the implementation within certain limits to meet a given precision.
Object-orientation supports software reuse via features such as abstraction, information hiding, polymorphism, inheritance and redefinition. However, while libraries of classes do exist, one of the challenges that sti...
详细信息
Object-orientation supports software reuse via features such as abstraction, information hiding, polymorphism, inheritance and redefinition. However, while libraries of classes do exist, one of the challenges that still remains is to locate suitable classes and adapt them to meet the specific requirements of the software developer. Traditional approaches to library retrieval are text-based; it is therefore difficult for the developer to express their requirements in a precise and unambiguous manner. A more promising approach is specification-based retrieval, where library component interfaces and requirements are expressed using a formal specification language. In this case retrieval is based on matching formal specifications. In this paper, we describe how existing approaches to specification matching can be extended to handle object-oriented components.
Text documents can be watermarked by patterning the inter-word spaces. This paper proposes a text watermarking algorithm that exploits the novel concepts of word classification and inter-word space statistics. The wor...
详细信息
ISBN:
(纸本)0769519601
Text documents can be watermarked by patterning the inter-word spaces. This paper proposes a text watermarking algorithm that exploits the novel concepts of word classification and inter-word space statistics. The words are classified using some features. Several adjacent words are grouped into a segment, and the segments are also classified using the word class information. The same amount of information is inserted into each of the segment classes. The information is encoded by modifying some statistics of inter-word spaces of the segments belonging to the same class. Several advantages over the conventional word-shift algorithms are discussed.
Informal presentations are a lightweight means for fast and convenient communication of ideas. People communicate their ideas to others on paper and whiteboards, which afford fluid sketching of graphs, words and other...
详细信息
ISBN:
(纸本)1581136218
Informal presentations are a lightweight means for fast and convenient communication of ideas. People communicate their ideas to others on paper and whiteboards, which afford fluid sketching of graphs, words and other expressive symbols. Unlike existing authoring tools that are designed for formal presentations, we created SketchPoint to help presenters design informal presentations via freeform sketching. In SketchPoint, presenters can quickly author presentations by sketching slide content, overall hierarchical structures and hyperlinks. To facilitate the transition from idea capture to communication, a note-taking workspace was built for accumulating ideas and sketching presentation outlines. Informal feedback showed that SketchPoint is a promising tool for idea communication. Copyright 2003 ACM.
OFDM transmitter diversity systems that do not required a cyclic prefix have recently been proposed as means to improve bandwidth efficiency. For these systems, knowledge of the channel parameters is required at the r...
详细信息
OFDM transmitter diversity systems that do not required a cyclic prefix have recently been proposed as means to improve bandwidth efficiency. For these systems, knowledge of the channel parameters is required at the receivers for interference cancellation, diversity combining, and decoding. In this paper, we propose a low complexity pilot-symbol-assisted channel estimator for OFDM transmitter diversity systems without a cyclic prefix. The pilot symbols are constructed to be periodic within an OFDM symbol interval in order to avoid ISI and ICI and to be non-overlapping in frequency to allow for the simultaneous sounding of the multiple diversity channels. The time-varying channel responses are then tracked by interpolating a set of estimates obtained through periodically transmitted pilot symbols. The effectiveness and limitations of the proposed estimator are verified by computer simulations.
There are many choices of structuring a test and evaluation system in the proving ground. We need systems that are connected and automated to integrate many different components and parts supplied by different manufac...
详细信息
ISBN:
(纸本)0780377850
There are many choices of structuring a test and evaluation system in the proving ground. We need systems that are connected and automated to integrate many different components and parts supplied by different manufacturers. To get a highly optimized system, we need a flexible framework enabling to plug/unplug components in a dynamic fashion, function-based components, and security considerations based on RBAC (role-based access control). OSGi (Open service Gateway initiative) is one solution for a flexible framework. We design the test and evaluation system architecture allowing hot-pluggable function components to be installed/managed and controlled by remote users based on role based access. This system has extensible and scalable characteristics using the OSGi-compatible framework, as well as distributed processing characteristics.
This paper describes a secure execution scheme for mobile programs running in networked appliances. The potential threat we are considering is the malicious behaviour of the mobile programs. Our security architecture,...
详细信息
This paper describes a secure execution scheme for mobile programs running in networked appliances. The potential threat we are considering is the malicious behaviour of the mobile programs. Our security architecture, called Taurus-1, adopts monitored execution as a basic mechanism for enforcing security policies at runtime. To describe a policy for this architecture, we designed an algebraic policy description language Polaris, in which we can specify a policy as a process consisting of abstract events in a monitored program. The program is modified beforehand for effective detection of its malicious behaviour We discuss how Taurus-1 can provide a security enhancement mechanism for context-aware systems such as networked appliances, and discuss how to specify security policies for them.
We make a case for the definition of a family of languages for expressing patterns over both the structure and semantics of source code. Our proposal is unique in that it attempts to provide a unified solution to the ...
详细信息
We make a case for the definition of a family of languages for expressing patterns over both the structure and semantics of source code. Our proposal is unique in that it attempts to provide a unified solution to the problem of searching for patterns in multiple programming languages, and in that it focuses on the semantics of the program rather than on its syntactic structure, all while striving to ensure simplicity and ease-of-use. We present the motivation and the unique difficulties involved in defining such languages, discuss strategies for dealing with these problems, and propose a prototype family of code pattern languages (CPLs).
暂无评论