An <sc>fptas</sc> for Response Time Analysis of Fixed Priority Real-Time Tasks with Resource Augmentation
Response time analysis is required both for on-line admission of applications in dynamic systems and as an integral part of design tools for complex distributed real-time systems. We consider sporadic tasks with fixed-priorities and arbitrary deadlines to ...
An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS
Vehicular Cyber-Physical System (VCPS) provides CPS services via exploring the sensing, computing and communication capabilities on vehicles. VCPS is deeply influenced by the performance of the underlying vehicular network with intermittent connections, ...
CCLS: An Efficient Local Search Algorithm for Weighted Maximum Satisfiability
The maximum satisfiability (MAX-SAT) problem, especially the weighted version, has extensive applications. Weighted MAX-SAT instances encoded from real-world applications may be very large, which calls for efficient approximate methods, mainly stochastic ...
Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing
Recently, much research has proposed to integrate mobile cloud computing (MCC) with wireless sensor networks (WSNs) so that powerful cloud computing can be exploited to process the data gathered by ubiquitous WSNs and share the results with mobile users. ...
Community-Based Event Dissemination with Optimal Load Balancing
Distributed publish/subscribe systems are poised with challenges of performance degradation and poor scalability. This is typically caused by an uneven load distribution of real-world applications and the susceptibility of link failure in networks. ...
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling
In this paper we study data collection in an energy renewable sensor network for scenarios such as traffic monitoring on busy highways, where sensors are deployed along a predefined path (the highway) and a mobile sink travels along the path to collect ...
Design of Hybrid Second-Level Caches
In recent years, embedded dynamic random-access memory (eDRAM) technology has been implemented in last-level caches due to its low leakage energy consumption and high density. However, the fact that eDRAM presents slower access time than static RAM (SRAM) ...
Enabling Concurrent Failure Recovery for Regenerating-Coding-Based Storage Systems: From Theory to Practice
Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life. A key requirement is to minimize the amount of data transferred among nodes when recovering the lost or unavailable data of failed ...
Exploring Server Redundancy in Nonblocking Multicast Data Center Networks
Clos networks and their variations such as folded-Clos networks (fat-trees) have been widely adopted as network topologies in data center networks. Since multicast is an essential communication pattern in many cloud services, nonblocking multicast ...
Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven byMiss Cost Reduction
On-chip cache memories play an important role in resource-constrained embedded systems by filtering out most off-chip memory accesses. Because cache latency and energy consumption are generally proportional to cache sizes, a small cache at the top level ...
Interleaving in Systolic-Arrays: A Throughput Breakthrough
In past years the most common way to improve computers performance was to increase the clock frequency. In recent years this approach suffered the limits of technology scaling, therefore computers architectures are shifting toward the direction of ...
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
Nearly all of the currently used signature schemes, such as RSA or DSA, are based either on the factoring assumption or the presumed intractability of the discrete logarithm problem. As a consequence, the appearance of quantum computers or algorithmic ...
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks
Tracking mobile targets in wireless sensor networks (WSNs) has many important applications. As it is often the case in prior work that the quality of tracking (QoT) heavily depends on high accuracy in localization or distance estimation, which is never ...
Local-Deadline Assignment for Distributed Real-Time Systems
In a distributed real-time system (DRTS), jobs are often executed on a number of processors and must complete by their end-to-end deadlines. Job deadline requirements may be violated if resource competition among different jobs on a given processor is not ...
Mining Associated Patterns from Wireless Sensor Networks
Mining of sensor data for useful knowledge extraction is a very challenging task. Existing works generate sensor association rules using occurrence frequency of patterns to extract the knowledge. These techniques often generate huge number of rules, most ...
Multiplicative Division Employing Independent Factors
We introduce a division procedure where a normalized quotient approximation is derived as a product of four independent closed form factors. Specific derivations of the method for IEEE-754 standard binary single and double precision division are developed ...
New Hardware Implementationsof WG<inline-formula><tex-math notation="LaTeX">$\bf {(29,11)}$</tex-math> <alternatives><inline-graphic xlink:type="simple" xlink:href="elrazouk-ieq1-2346207.gif"/></alternatives></inline-formula> and WG- <inline-formula><tex-math notation="LaTeX">$\bf {16}$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="elrazouk-ieq2-2346207.gif"/></alternatives></inline-formula> StreamCiphers Using Polynomial Basis
The WG stream ciphers are based on the WG (Welch-Gong) transformation and possess proved randomness properties. In this paper we propose nine new hardware designs for the two classes of WG(29,11) and WG-16. For each class, we design and implement three ...
Optimal Checkpoint Selection with Dual-Modular Redundancy Hardening
With the continuous scaling of semiconductor technology, failure rate is increasing significantly so that reliability becomes an important issue in multiprocessor system-on-chip (MPSoC) design. We propose an optimal checkpoint selection with task ...
Optimal Task Placement with QoS Constraints in Geo-Distributed Data Centers Using DVFS
With the rising demands on cloud services, the electricity consumption has been increasing drastically as the main operational expenditure (OPEX) to data center providers. The geographical heterogeneity of electricity prices motivates us to study the task ...
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for debugging or correctness checking in many codes [10]. However, the combination of dynamic ...
STAR: Strategy-Proof Double Auctions for Multi-Cloud, Multi-Tenant Bandwidth Reservation
Bandwidth reservation has been recognized as a value-added service to the cloud provider in recent years. We consider an open market of cloud bandwidth reservation, in which cloud providers offer bandwidth reservation services to cloud tenants, especially ...
Methodology for Cycle-Accurate DRAM Performance Analysis
A new methodology for DRAM performance analysis has been proposed based on accurate characterization of DRAM bus cycles. The proposed methodology allows cycle-accurate performance analysis of arbitrary DRAM traces, obviates the need for functional ...
Non-Binary Orthogonal Latin Square Codes for a Multilevel Phase Charge Memory (PCM)
This manuscript proposes non-binary orthogonal Latin square (OLS) codes that are amenable to a multilevel phase change memory (PCM). This is based on the property that the proposed (n symbols, ksymbols) t-symbol error correcting code uses the same H ...
On Compact Cauchy Matrices for Substitution-Permutation Networks
Maximum distance separable (MDS) matrices are widely used in the design of block ciphers. However, it is highly nontrival to find MDS matrices which could be used in practice. This paper focuses on the design of efficient MDS matrices for substitution-...