Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 64, Issue 12Dec. 2015
Reflects downloads up to 01 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
<inline-formula><tex-math>$2^n$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="sousa-ieq1-2401026.gif"/></alternatives></inline-formula> RNS Scalers for Extended 4-Moduli Sets

Scaling is a key important arithmetic operation and is difficult to perform in Residue Number Systems (RNS). This paper proposes a comprehensive approach for designing efficient and accurate 2<sup>n</sup> RNS scalers for important classes of moduli sets ...

research-article
Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption

System-on-chips (SOCs) and 3D stacked ICs are often tested for manufacturing defects in a modular fashion, enabling us to record the module test pass probability. We use this pass probability to exploit the abort-on-fail feature of automatic test ...

research-article
Adaptive ECC Scheme for Hybrid SSD&#x2019;s

In recent years, multi-level cell flash memory (MLC) has been widely adopted in solid state drives (SSD's) as the major storage medium due to its lower cost and higher density, compared with single-level cell flash memory (SLC). However, MLC has ...

research-article
A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes

In this article, we present RE<sup>2</sup>MR, the first hybrid multicast routing protocol that builds on the strengths of existing topology-based, hierarchical and geographic multicast solutions, while addressing their limitations. In RE<sup>2</sup>MR, ...

research-article
Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits

The problem of random number generation dates back to Von Neumann's work in 1951. Since then, many algorithms have been developed for generating unbiased bits from complex correlated sources as well as for generating arbitrary distributions from unbiased ...

research-article
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds

The success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider to maintain ...

research-article
Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching

The crosstalk effect is one of the main problems in deep sub-micron designs of high-speed buses. To mitigate the crosstalk effect, there are several types of crosstalk avoidance codes proposed in the literature. In this paper, we are particularly ...

research-article
Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction

Scan tree architecture has been proposed to reduce the test application time of full scan chain by placing multiple scan cells in parallel. Most existing techniques rely on non-compact test pattern sets to construct the scan tree. However, they produce ...

research-article
Efficient Attribute-Based Comparable Data Access Control

With the proliferation of mobile devices in recent years, there is a growing concern regarding secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computing ...

research-article
Efficient Victim Block Selection for Flash Storage Devices

Motivated by the needs to enhance the performance of garbage collection in low-cost flash storage devices, we propose a victim block selection design to efficiently identify the blocks for erases and reclaim the space of invalid data without extensively ...

research-article
Fast Two-Level Address Translation for Virtualized Systems

Recently, there have been several improvements in architectural supports for two-level address translation for virtualized systems. However, those improvements including HW-based two-dimensional (2D) page walkers have extended the traditional multi-level ...

research-article
Hyper-Real-Time Ice Simulation and Modeling Using GPGPU

This paper describes the design of an efficient parallel implementation of an ice simulator that simulates the behaviour of a ship operating in pack ice. The main idea of the method is to treat ice as a set of discrete objects with very simple properties, ...

research-article
Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network

Software-Defined Network (SDN) is a promising network paradigm that separates the control plane and data plane in the network. It has shown great advantages in simplifying network management such that new functions can be easily supported without physical ...

research-article
Multi-Granularity Locality-Sensitive Bloom Filter

In many applications, such as homeland security, image processing, social network, and bioinformatics, it is often required to support an approximate membership query (AMQ) to answer a question like &#x201C;is an (query) object q near to at least one of ...

research-article
Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs

The ever-growing cellular traffic demand has laid a heavy burden on cellular networks. The recent rapid development in vehicle-to-vehicle communication techniques makes vehicular delay-tolerant network (VDTN) an attractive candidate for traffic offloading ...

research-article
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm

Green cloud is an emerging new technology in the computing world in which memory is a critical component. Phase-change memory (PCM) is one of the most promising alternative techniques to the dynamic random access memory (DRAM) that faces the scalability ...

research-article
Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach

A central challenge in developing cloud datacenters Service Level Agreements is the estimation of downtime distribution of a set of provisioned servers over a service window, which is compounded by three facts. First, while steady-state probabilities have ...

research-article
Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures

Network-on-Chips (NoCs) are quickly becoming the standard communication paradigm for the growing number of cores on the chip. While NoCs can deliver sufficient bandwidth and enhance scalability, NoCs suffer from high power consumption due to the router ...

research-article
Secure Distributed Deduplication Systems with Improved Reliability

Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned ...

research-article
Simulation and Implication Using a Transfer Function Model for Switching Logic

Transfer functions are concise mathematical models representing the input/output behavior of a system and are widely used in many areas of engineering including system theory and signal analysis. We develop a framework for the construction of transfer ...

research-article
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip

Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for early stages of the manufacturing process in order to prevent costly redesigns of a target ...

research-article
Using Flexibility in P-Circuits by Boolean Relations

In this paper we study the problem of characterizing and exploiting the complete flexibility of a special logic architecture, called P-circuits, which realize a Boolean function by projecting it onto overlapping subsets given by a generalized Shannon ...

research-article
Comments on &#x201C;An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding&#x201D;

Recently, an efficient homomorphic MAC scheme for authentication in network coding is proposed and it is claimed that it achieves a security parameter 1=q<sup>l</sup> where l is selected according to different security requirements. However, in this paper,...

Comments

Please enable JavaScript to view thecomments powered by Disqus.