<inline-formula><tex-math>$2^n$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="sousa-ieq1-2401026.gif"/></alternatives></inline-formula> RNS Scalers for Extended 4-Moduli Sets
Scaling is a key important arithmetic operation and is difficult to perform in Residue Number Systems (RNS). This paper proposes a comprehensive approach for designing efficient and accurate 2<sup>n</sup> RNS scalers for important classes of moduli sets ...
Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption
System-on-chips (SOCs) and 3D stacked ICs are often tested for manufacturing defects in a modular fashion, enabling us to record the module test pass probability. We use this pass probability to exploit the abort-on-fail feature of automatic test ...
Adaptive ECC Scheme for Hybrid SSD’s
In recent years, multi-level cell flash memory (MLC) has been widely adopted in solid state drives (SSD's) as the major storage medium due to its lower cost and higher density, compared with single-level cell flash memory (SLC). However, MLC has ...
A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes
In this article, we present RE<sup>2</sup>MR, the first hybrid multicast routing protocol that builds on the strengths of existing topology-based, hierarchical and geographic multicast solutions, while addressing their limitations. In RE<sup>2</sup>MR, ...
Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits
The problem of random number generation dates back to Von Neumann's work in 1951. Since then, many algorithms have been developed for generating unbiased bits from complex correlated sources as well as for generating arbitrary distributions from unbiased ...
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds
The success of cloud computing makes an increasing number of real-time applications such as signal processing and weather forecasting run in the cloud. Meanwhile, scheduling for real-time tasks is playing an essential role for a cloud provider to maintain ...
Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching
The crosstalk effect is one of the main problems in deep sub-micron designs of high-speed buses. To mitigate the crosstalk effect, there are several types of crosstalk avoidance codes proposed in the literature. In this paper, we are particularly ...
Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction
Scan tree architecture has been proposed to reduce the test application time of full scan chain by placing multiple scan cells in parallel. Most existing techniques rely on non-compact test pattern sets to construct the scan tree. However, they produce ...
Efficient Attribute-Based Comparable Data Access Control
With the proliferation of mobile devices in recent years, there is a growing concern regarding secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computing ...
Efficient Victim Block Selection for Flash Storage Devices
Motivated by the needs to enhance the performance of garbage collection in low-cost flash storage devices, we propose a victim block selection design to efficiently identify the blocks for erases and reclaim the space of invalid data without extensively ...
Fast Two-Level Address Translation for Virtualized Systems
Recently, there have been several improvements in architectural supports for two-level address translation for virtualized systems. However, those improvements including HW-based two-dimensional (2D) page walkers have extended the traditional multi-level ...
Hyper-Real-Time Ice Simulation and Modeling Using GPGPU
This paper describes the design of an efficient parallel implementation of an ice simulator that simulates the behaviour of a ship operating in pack ice. The main idea of the method is to treat ice as a set of discrete objects with very simple properties, ...
Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network
Software-Defined Network (SDN) is a promising network paradigm that separates the control plane and data plane in the network. It has shown great advantages in simplifying network management such that new functions can be easily supported without physical ...
Multi-Granularity Locality-Sensitive Bloom Filter
In many applications, such as homeland security, image processing, social network, and bioinformatics, it is often required to support an approximate membership query (AMQ) to answer a question like “is an (query) object q near to at least one of ...
Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs
The ever-growing cellular traffic demand has laid a heavy burden on cellular networks. The recent rapid development in vehicle-to-vehicle communication techniques makes vehicular delay-tolerant network (VDTN) an attractive candidate for traffic offloading ...
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm
Green cloud is an emerging new technology in the computing world in which memory is a critical component. Phase-change memory (PCM) is one of the most promising alternative techniques to the dynamic random access memory (DRAM) that faces the scalability ...
Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach
A central challenge in developing cloud datacenters Service Level Agreements is the estimation of downtime distribution of a set of provisioned servers over a service window, which is compounded by three facts. First, while steady-state probabilities have ...
Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures
Network-on-Chips (NoCs) are quickly becoming the standard communication paradigm for the growing number of cores on the chip. While NoCs can deliver sufficient bandwidth and enhance scalability, NoCs suffer from high power consumption due to the router ...
Secure Distributed Deduplication Systems with Improved Reliability
- Jin Li,
- Xiaofeng Chen,
- Xinyi Huang,
- Shaohua Tang,
- Yang Xiang,
- Mohammad Mehedi Hassan,
- Abdulhameed Alelaiwi
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned ...
Simulation and Implication Using a Transfer Function Model for Switching Logic
Transfer functions are concise mathematical models representing the input/output behavior of a system and are widely used in many areas of engineering including system theory and signal analysis. We develop a framework for the construction of transfer ...
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip
Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for early stages of the manufacturing process in order to prevent costly redesigns of a target ...
Using Flexibility in P-Circuits by Boolean Relations
In this paper we study the problem of characterizing and exploiting the complete flexibility of a special logic architecture, called P-circuits, which realize a Boolean function by projecting it onto overlapping subsets given by a generalized Shannon ...
Comments on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding”
Recently, an efficient homomorphic MAC scheme for authentication in network coding is proposed and it is claimed that it achieves a security parameter 1=q<sup>l</sup> where l is selected according to different security requirements. However, in this paper,...