A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
|
|
- Randell Potter
- 6 years ago
- Views:
Transcription
1 A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul , KOREA {ci.park, pelican, sunghwan.bae, zartoven, shinhank, ABSTRACT flash eory has becoe an indispensable coponent in obile ebedded systes because of its versatile features such as non-volatility, solid-state reliability, low cost and high density. Even though flash eory is gaining popularity as data storage, it can be also exploited as code eory for XIP (execute-in-place). In this paper, we present a new eory architecture which incorporates flash eory into an existing eory hierarchy for code execution. The usefulness of the proposed approach is deonstrated with real ebedded workloads on a real prototyping board. Categories and Subject Descriptors B.3.2 [Meory Structures]: Design Styles Cache eories; D.4.2 [Operating Systes]: Storage Manageent Secondary storage; B.6.1 [Logic Design]: Design Styles Meory control and access. General Ters Algoriths, Measureent, Perforance, Design Keywords Meory architecture, XIP, Priority-based caching 1. INTRODUCTION A eory architecture design is a ain concern to ebedded syste engineers since it doinates the cost, power and perforance of obile ebedded systes. The typical eory architecture of obile ebedded systes consists of ROM for initial bootstrapping and code execution, RAM for working eory, and flash eory for peranent data storage. In particular, eerging eory technology, the flash eory, is becoing an indispensable coponent in obile ebedded systes due to its versatile features: non-volatility, solid-state reliability, low power consuption, etc. Perission to ake digital or hard copies of all or part of this work for personal or classroo use is granted without fee provided that copies are not ade or distributed for profit or coercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific perission and/or a fee. CODES+ISSS 3, October 1-3, 23, Newport Beach, California, USA Copyright 23 ACM /3/1 $5.. The ost popular flash eory types are NOR and. NOR flash is particularly well suited for code storage and execute-inplace (XIP) 1 applications, which require high-speed rando access. While flash provides high density and low-cost data storage, it is not applicable to XIP applications due to the sequential access architecture and long access latency Table 1 shows different characteristics of various eory devices. Mobile SDRAM has advantages in perforance but requires high power consuption over other eories. There is a tradeoff between low power SRAM and fast SRAM in ters of power consuption, perforance and cost. In non-volatile eories, NOR flash provides fast rando access speed and low power consuption, but the cost of NOR flash is high copared to flash. Even though flash shows long rando read latency, it has advantages in power consuption, storage capacity, and erase/write perforance in contrast to NOR flash. Table 1. Characteristics of various eory devices. The values in the table were calculated based on SAMSUNG 23 eory data sheets [1-2]. Current (A) Meory $/Gb idle active Mobile SDRAM Low power SRAM Fast SRAM NOR Rando Access (16bit) read write erase 9ns 55ns 1ns 2ns 1.1us 9ns N.A 55ns N.A 1ns N.A 21.5us 1.2 sec 2.5us 2 s Even though flash eory is widely used for data storage in obile ebedded systes, flash eory researches for code storage are hardly found in industry or acadeia. In this paper, we present a new eory architecture for flash eory to provide XIP functionality. With XIP functionality in flash, the cost of the eory syste can be reduced since the flash can be used not only as data storage but also as code storage for execution. As a result, we can obtain cost-efficient eory systes with reasonable perforance and power consuption. The basic idea of our approach is to exploit the locality of code access pattern and ipleent a cache controller for repeatedly accessed codes. The prefetching cache is used to hide eory latency resulting fro eory access. In this paper we concentrate on code execution even though data eory is also an iportant aspect of eory architecture. There are two ajor 1 XIP is the execution of an application directly fro the flash eory instead of having to download the code into the systes RAM before executing it. 138
2 contributions in this paper. First, we deonstrate that the XIP is feasible in real-life systes through a real hardware and coercial OS environent. Second, we apply highly optiized caching techniques geared toward the specific features of Flash. The rest of this paper is organized as follows. In the next section, we describe the trend of eory architecture in obile ebedded systes. Section 3 reviews related work in acadeia and industry. In Sections 4 and 5, we present our new eory architecture based on XIP. In Section 6, we deonstrate the proposed architecture with real workloads on a hardware prototyping board and evaluate cost, perforance and power consuption over existing eory architectures. Finally, our conclusions and future work are drawn in Section Motivational Systes: Mobile Systes Voice-centric 2G MCU Data-centric 2.5G MCU 3G & SartPhone MCU NOR SRAM OS NOR SRAM App 1 (data) (code) App 2 Data (a) (b) (c) OS App 1 App 2 DRAM Figure 1. The eory architectures for obile systes Figure 1 shows the trend in eory architecture of obile systes. The first approach is to use NOR for code storage and SRAM for working eory as shown in Figure 1(a). It is appropriate for low-end phones, which require ediu perforance and cost. However, as obile systes evolve into data centric and ultiedia-oriented applications, storage with high perforance and huge capacity has becoe necessary. The second architecture (Figure 1(b)) sees to eet the requireents in ters of storage capacity through flash eory, however its perforance is not enough to accoodate 3G applications which consist of real-tie ultiedia applications. In addition, the increased nuber of coponents increases syste cost. The third architecture (Figure 1(c)) eliinates NOR flash eory and uses only flash eory by using a shadowing 2 technique. Copying all code into RAM offers the best perforance possible, but contributes to the slow boot process. A large aount of DRAM is necessary to hold both the OS and the applications. The higher power consuption fro power hungry DRAM eory is another proble for battery-operated systes. Thus, it is iportant to investigate an efficient eory syste in ters of cost, perforance and power consuption. 3. RELATED WORK In the past, researchers have exploited NOR flash eory as caches for agnetic disks due to its low power consuption and high-speed characteristics. envy focused on developing a persistent storage architecture without agnetic disks [7]. Fred et al showed that NOR flash eory can reduce energy consuption by an order of agnitude, copared to agnetic disk, while providing good read perforance and acceptable write perforance [9]. B. Marsh et al exained the ipact of using NOR flash eory as a second-level file syste buffer cache to reduce power consuption and file access latency on a obile coputer [8]. Li-Pin et al investigated the perforance issue of flash eory storage subsystes with a striping architecture, which uses I/O parallelis [1]. In industry [5], XIP is ipleented using sall size of buffer and I/O interface conversion, but the XIP area is liited to boot code. The OS and application codes should be copied to syste eory at booting tie. In suary, even though several researches have been ade to obtain the axiu perforance and low power consuption fro data storage, few efforts to support XIP in flash are found in acadeia or industry. 4. XIP ARCHITECTURE In this section, we describe XIP architecture. First, we look into the structure of flash eory and illustrate the basic ipleentation of XIP based on caching echanis. 4.1 BACKGROUND A flash eory consists of a fixed nuber of blocks, where each block has 32 pages and each page consists of 512 bytes ain data and 16 bytes spare data as shown in Figure 2. Read/write operation is perfored on page basis. In order to read a page, coand and address are inputted to flash eory through I/O pins. After a fixed delay tie, selected page is loaded into data and spare registers. Spare data can be used to store auxiliary inforation such as bad block identification and error correction code (ECC) for associated ain data. flash eories are subject to a condition called bad block, in which a block cannot be copletely erased or cannot be written due to partial or 2-bit errors. Bad blocks ay exist in flash eory when shipped or ay occur during operation. The syste design ust be able to ask out the invalid blocks via address apping. For exaple, as shown in Figure 3, if block 2 and 5 are initially bad, the bad block nubers and the replaceent block nubers are recorded in a bad block ap table. The bad block ap table is anaged by hardware or software. 1 Block =32 pages I/O bus 512 bytes 16 bytes Main data Data register Spare data Spare register Figure 2. Structure of flash eory 2 During syste booting tie, entire code iage is copied fro peranent storage into systes RAM for execution. 139
3 In order to ipleent the XIP, we should consider the following points. Average eory access tie Worst case handling Bad block anageent The perforance of eory syste is easured by average access tie [3]. In order to ipleent XIP functionality, the average access tie of flash eory should be coparable to that of other eories such as NOR, SRAM and SDRAM. Though average eory access tie is a good etric for perforance evaluation, worst-case handling, or cache iss handling is another proble in practical view since ost obile systes such as cellular phones include tie-critical interrupt handling for call processing. For instance, if the tie-critical interrupt occurs during cache iss handling, the syste ay not satisfy the given deadline and to ake it worse, it ay lose data or connection. Another consideration in XIP is to anage bad blocks because bad blocks cause discontinuous eory space, which is intolerable for code execution. 4.2 BASIC IMPLEMENTATION DATA [:7] ADDR [:12] CE#,OE#,WE# BUSY# Syste interface Cache (SRAM) Boot Loader Prefetch Control logic Flash interface Figure 3. XIP controller The proposed architecture consists of a sall aount of SRAM for cache, interface conversion logic, the control logic and flash eory as shown in Figure 3. Interface conversion is necessary to connect the I/O interface of flash eory to eory bus. For cache echanis, direct ap cache with victi cache is adopted based on Jouppi s work in [4] with optiization for flash. In [4], the victi cache is accessed on a ain cache iss; if the address hits the victi cache, the data returned to the CPU and at the sae tie it is prooted to the ain cache; the replaced block in the ain cache is oved to the victi cache, therefore perforing a swap. If the victi cache iss also occurs, flash eory access is perfored; the incoing data fills the ain cache, and the replaced block will be oved to the victi cache. In next section, we odify the above swap algorith using syste eory and page address translation table (PAT). The prefetching cache is used to hide eory latency resulting fro eory access. Several hardware prefetching techniques can be found in literature [13]. In our case, prefetching inforation is analyzed through profiling process and the prefetching inforation is stored in spare data at code iage building tie. 5. INTELLIGENT CACHING: PRIORITY- BASED CACHING Though the basic ipleentation is suitable for application code which shows its spatial and teporal localities, it ay be less effective in systes code which has a coplex functionality, a large size, and interrupt-driven control transfers aong its procedures [14]. Torrellas et al. presented that the operating syste has the characteristics which large sections of its code are rarely accessed and suffers considerable interference within popular execution paths [14]. For exaple, periodic tier interrupt, rarely-executed special-case code and plenty of loopless code disrupt the localities. On the other hand, real-tie applications should be retained as long as possible to satisfy the tiing constraints 3. In this paper, we distinguish the different cache behavior between syste and application codes, and adapt it to the page-based architecture. We apply profile-guided static analysis of code access pattern. Main cache Victi A Page address translation table Control C A B C H L H B SRAM/SDRAM Data bus Address bus Figure 4. Priority-based cache architecture We can divide code pages into three categories depending on their access cost: high priority, id priority and low priority pages. Even though the priority can be deterined by various objectives, we set the priority to pages based on the nuber of references to pages and their criticality. For exaple, if a specific page is referenced ore frequently or has tie critical codes, it is classified as a high-priority page and should be cached or retained in cache to reduce the later access cost in case that the page is in flash eory. OS-related code, syste libraries and realtie applications have high-priority pages. On the other hand, id-priority page is defined to be noral application code which is handled by noral caching policy. Finally, low-priority page corresponds to sequential code such as initialization code, which is rarely executed. PAT is introduced to reap pages in bad blocks to pages in good blocks and to reap requested pages to swapped pages in syste eory. We illustrate the caching echanis in detail in Figure 4. First, when page A with highpriority is requested, it is cached fro flash to ain cache. Next, when page B is requested fro the CPU, it should be oved to ain cache or syste eory. Here assuing that page B is in conflict with page A, page B is oved to syste eory (SRAM/SDRAM) since page B is low priority page ( L in spare area of flash eory eans low-priority). At the sae tie, PAT is updated so that later access to page B is referred to syste eory. Again, when page C is requested and in conflict with page A, page C replaces page A and page A is discarded fro ain cache since C s priority is high. The evicted page A is 3 In this paper, real-tie applications indicate ultiedia applications with soft real-tie constraints. 14
4 oved to victi cache. In suary, on flash s page deand, the controller discards or swaps existing cache page according to the priority inforation stored in spare area data. The detail algorith is explained in Figure 5. Another usage of spare area data is to store prefetching inforation based on profiling inforation gathered during code execution. This static prefetching technique iproves eory latency hiding without iss penalty fro iss-prediction at run-tie. Cache Cache siulator cache paraeters Pattern analysis Meory Trace eory addresses Priority Caching (address) { page = convert(address); if (isinpat(page)) ain eory hit; else if(isinmaincache(page)) Cache hit; else if(isinvicticache(page)) Victi hit; else { // iss, fetch a page fro flash eory } } page_priority = [page].priority; if (cache[page%cache_size].priority ==HIGH) [page] ain eory; else if (cache[page%cache_size].priority == MID) { cache[page%cache_size] victi; [page] cache[page%cache_size]; } else [page] cache[page%cache_size]; Figure 5. Priority-based cache algorith 6. EXPERIMENTAL SETUP This section presents our experiental environent. Our environent consists of a prototyping board, our in-house cache siulator with pattern analysis and a real workload, or PocketPC[6]. The prototyping board has ARM9-based icrocontroller, SRAM, SDRAM, NOR flash and eories as shown in Figure 6. It is used not only to ipleent a real cache configuration on FPGA but also to gather eory address trace fro running applications for cache siulator. The specification of ain processor and flash eory is shown in Table 2. The cache siulator explores various paraeters such as iss rate, replaceent policy, associativity and cache size based on eory traces fro the prototyping board. The real ebedded workload, PocketPC supports XIP-enabled iage based on the existing ROMFS file systes in which each application can be directly executed without being loaded into RAM. Table 2. The specification of the prototyping board Paraeter Configuration CPU clock L1 Icache 2 MHz 64 way, 32byte line, 8KB Bus width 16 bit = 1 word read initial latency 1 us/512byte serial read tie 5 ns/word SRAM read tie 1 ns/word SDRAM read tie 12 ns/4word NOR read tie 21 ns/4word SRAM FPGA SDRAM ARM9-based Processor Figure 6. Prototyping board for XIP PocketPC 6.1 PERFORMANCE MODELING In general, the eory syste perforance is evaluated by the average access tie: Average eory access tie = hit tie + iss rate * iss penalty. (1) Hit tie is the tie to fill the L1 cache (32byte line) and the iss penalty is the tie to fill the L2 cache fro flash eory. The total energy consued by the syste is the su of energies consued by syste coponents such as processor, bus, eory and the DC-DC converter. In this paper, we concentrate on the energy consuption of the processor and eory syste: E syste = ECPU + Eeory. (2) The energy consuption of CPU is divided into two parts: E CPU = PCPU _ active TCPU _ active + PCPU _ idle TCPU _ idle. (3) T CPU_active is assued to be constant regardless of eory syste since the nuber and execution tie of instructions are fixed. Thus, we are concerned about T CPU_idle which is proportional to off-chip eory access tie. In eory case, the nuber of accesses to the eory is directly proportional to energy consuption. The unit access energy consuption can be estiated fro the active power specified in the data sheet [1-2]: E eory = Eaccess N access. (4) The cost of eory syste is coputed fro paraeters shown on Table 1: N Cost eory _ syste = density unit cost + Cost controller. (5) The Cost controller is coputed based on the synthesis result in Xilinx FPGA: totally 27, gates including 4KB and using offchip SRAM for TAG and cache eory. Finally, booting ties are easured using real-tie easureent tools. 141
5 6.2 EXPERIMENTAL RESULTS In Figure 7, we copare the iss ratio over various configuration paraeters such as associativity, replaceent policy and cache size. We collected address traces fro PocketPC while we were executing various applications such as Media Player and MP3 player since they are popular ebedded ultiedia applications which involve real-tie requireents. Note that the cache size is the ost iportant factor to affect iss ratio as shown in Figure 7. Miss Ratio( Direct ap FIFO LRU rando FIFO LRU rando FIFO LRU 2-w ay 4-w ay 8-w ay Replace ent/associativity Figure 7. Associativity with different replaceent policies and cache sizes versus iss ratio Miss Ratio ( Average Meory Access Ti (CPU cycles) rando Cache Line Size (Bytes) (a) Cache Line Size (Bytes) Energy (ns*w) Cache Line Size (B y te s ) (c) Figure 8. Cache line size versus (a) iss ratio, (b) access tie per 32-byte and (c) energy consuption To analyze the optial cache line size in XIP cache, siulation has been done with the eory trace which is gathered fro the prototyping board. The line size of 256-byte shows better nubers in average eory access tie and energy consuption over all other cache sizes as shown in Figure 8. Therefore, the line size of XIP controller is deterined to be 256-byte hereafter. Average Meory Access Ti e (cycle) Energy (ns* W ) XIP (basic) (a) XIP (priority) SDRAM shadowing ArchitecturalChoices XIP(basic) (b) XIP (priority) SDRAM shadow ing ArchitecturalChoices NOR XIP NOR XIP Figure 9. Overall perforance coparison of different eory architectures: (a) average eory access tie and (b) energy consuption. (b) 142
6 Architectural Choices NOR XIP SDRAM Shadowing XIP (basic) XIP (priority) Coponents NOR(64MB)+SDRAM(32MB) (64MB)+SDRAM(64MB) XIP(64MB)+SRAM(256KB) Controller+SDRAM(32MB) XIP(64MB)+SRAM(64KB) Controller+SDRAM(32MB) Booting Tie (sec) Cost ($) Figure 1. Overall booting tie and cost coparison of different eory architectures. Figure 9 and 1 show overall perforance coparison aong different eory architectures based on our prototyping results. NOR XIP architecture (NOR+SDRAM) shows fast boot tie and low power consuption at high cost. Even though SDRAM shadowing architecture ( + SDRAM) achieves high perforance, it suffers fro a relatively long booting tie and inefficient eory utilization. Finally, our approach XIP shows reasonable booting tie, perforance and power consuption with outstanding cost efficiency. Two ipleentations of XIP (basic and priority) are also copared. The XIP (basic) is coposed of 256KB cache and 4KB victi cache. On the other hand, the XIP (priority) has 64KB cache, 4KB victi and 2KB PAT. The XIP (priority) has advantage of cache size reduction with the assistance of syste eory and priority based caching. 6.3 Worst Case Handling Even though XIP offers an efficient eory syste, it ay suffer fro worst-case handling, naely cache iss handling. A straightforward solution is to hold the CPU until the requested eory page arrives. This can be ipleented using wait/ready signals handshaking ethod. However, the iss penalty, 35us 4 is not trivial tie especially in case that a fast processor is used. Besides CPU utilization proble, if the tiecritical interrupt request occurs to the syste, the interrupt ay be lost because the processor is waiting for eory s response. In order to solve this proble, a syste-wide approach is needed. First, OS should handle the cache iss as a page fault as in virtual eory anageent. The CPU also should supply abort function to restart the requested instruction after cache iss handling. In analytical approach view, task tiing analysis and schedulability test will be helpful in the doain of real-tie[12]. 7. CONCLUSIONS We presented the new low cost eory architecture with XIP functionality which enables flash eory to be used as code storage as well as data storage. In order to hide a long read access latency, we applied the priority-based caching echanis geared for specific features. As a result, we can accoplish cost and power efficient eory systes with reasonable perforance and booting tie. As future work, copiler s assistance will be helpful to iprove XIP in ebedded eory architectures. Code packing and positioning will be achieved in near future. 4 It is calculated as su of initial delay (1us) + page read (512 x 5ns) REFERENCES [1] Sasung Electronics Co., Flash Meory & SartMedia Data Book, 22. [2] [3] J.L. Hennessy and D.A. Patterson, Coputer Architecture: A Quantitative Approach, 2 nd edition, Morgan Kaufan Publishers, [4] N. Jouppi, Iproving Direct-Mapped Cache Perforance by the Addition of a Sall Fully-Associative Cache and Prefetch Buffers, ISCA-17:ACM/IEEE International Syposiu on Coputer Architecture, pp , May 199. [5] Mobile_DOC_G3_DS_Rev1..pdf [6] Microsoft Co., Pocket PC 22, [7] M. Wu, Willy Zwaenepoel, envy: A Non-Volatile, Main Meory Storage Syste, Proc. Sixth Int l Conf. On Architectural Support for Prograing Languages and Operating Sys. (ASPLOS VI), San Jose, CA, Oct. 1994, pp [8] B. Marsh, F. Douglis, and P. Krishnan, Flash eory file caching for obile coputers, Proc. 27 th Hawaii Conf. On Sys. Sciences, Wailea, HI, Jan. 1993, pp [9] F. Douglis et al., Storage Alternatives for Mobile Coputers, Proc. First USENIX Syp. On Operating Sys. Design and Ipleentation, Monterey, CA, pp 25-37, Nov [1] Li-Pin Chang, Tei-Wei Kuo, "An Adaptive Striping Architecture for Flash Meory Storage Systes of Ebedded Systes," The 8th IEEE Real-Tie and Ebedded Technology and Applications Syposiu (RTAS 22) Septeber, 22. San Jose, California. [11] J. R. Lorch and A. J. Sith, Software Strategies for Portable Coputer Energy Manageent, IEEE Personal Counications, June, [12] C.-G. Lee, K.-P. Lee, J. Hahn, Y.-M. Seo, S.L. Min, R. Ha, S. Hong, C.Y. Park, M. Lee, and C.S. Ki, Bounding Cache-related Preeption Delay for Real-tie Systes, IEEE Transaction on Software Engineering, vol 27, no 9, pp85-826, 21. [13] C. Young, E. Shekita, An Intelligent I-Cache Prefetch Mechanis, in Proceedings of the International Conferences on Coputer Design, pp , Oct [14] Josep Torrellas, Chun Xia, and Russell Daigle, Optiizing Instruction Cache Perforance for Operating Syste Intensive Workload, Proc. HPCA-1: 1st Intl. Syposiu on High-Perforance Coputer Architecture, p.36, January [15] Zhang Yi, Steve Haga and Rajeev Barua, Execution History Guided Instruction Prefetching, Proceedings of the Sixteenth ACM Int l Conference on Supercoputing (ICS), New York City, NY, June,
A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, Shinhan Kim and Bumsoo Kim
A Low-cost Memory Architecture with NAND XP for Mobile Embedded Systems Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, Shinhan Kim and Bumsoo Kim Software Center, SAMSUNG Electronics, Co., Ltd. Seoul
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationDatabase Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2
2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationDYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION
www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationGrading Results Total 100
University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationUsing the KressArray for Reconfigurable Computing
Using the KressArray for econfigurable Coputing einer Hartenstein, Michael Herz, Thoas Hoffann, Ulrich Nageldinger University of Kaiserslautern, Erwin-Schroedinger-Strasse, D-67663 Kaiserslautern, Gerany
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications
ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationImplementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer
Ipleenting and Evaluating Various Response-Tie Analyses for Mixed s in CAN using MPS-CAN Analyzer Saad Mubeen, Jukka Mäki-Turja and Mikael Sjödin Mälardalen Real-Tie Research Centre, Mälardalen University,
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationThe Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationA Soft Real-time Scheduling Server on the Windows NT
A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationComputer Architecture A Quantitative Approach, Fifth Edition. Chapter 2. Memory Hierarchy Design. Copyright 2012, Elsevier Inc. All rights reserved.
Computer Architecture A Quantitative Approach, Fifth Edition Chapter 2 Memory Hierarchy Design 1 Introduction Programmers want unlimited amounts of memory with low latency Fast memory technology is more
More informationVirtual Memory. Reading. Sections 5.4, 5.5, 5.6, 5.8, 5.10 (2) Lecture notes from MKP and S. Yalamanchili
Virtual Memory Lecture notes from MKP and S. Yalamanchili Sections 5.4, 5.5, 5.6, 5.8, 5.10 Reading (2) 1 The Memory Hierarchy ALU registers Cache Memory Memory Memory Managed by the compiler Memory Managed
More informationKnowledge Discovery Applied to Agriculture Economy Planning
Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationVision Based Mobile Robot Navigation System
International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationA Network-based Seamless Handover Scheme for Multi-homed Devices
A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationMigration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM
Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More information(12) United States Patent Kumar et al.
(12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationData-driven Hybrid Caching in Hierarchical Edge Cache Networks
Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationA New Generic Model for Vision Based Tracking in Robotics Systems
A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University
More informationA Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation
28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationFlash Memory Based Storage System
Flash Memory Based Storage System References SmartSaver: Turning Flash Drive into a Disk Energy Saver for Mobile Computers, ISLPED 06 Energy-Aware Flash Memory Management in Virtual Memory System, islped
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationUNIT-V MEMORY ORGANIZATION
UNIT-V MEMORY ORGANIZATION 1 The main memory of a computer is semiconductor memory.the main memory unit is basically consists of two kinds of memory: RAM (RWM):Random access memory; which is volatile in
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationEvaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS
Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationPortland State University ECE 587/687. Caches and Memory-Level Parallelism
Portland State University ECE 587/687 Caches and Memory-Level Parallelism Revisiting Processor Performance Program Execution Time = (CPU clock cycles + Memory stall cycles) x clock cycle time For each
More informationFPL Implementation of a SIMD RISC RNS-Enabled DSP
FPL Ipleentation of a SIMD RISC RNS-Enabled DSP J. RAMÍREZ (1), A. GARCÍA (1), P. G. FERNÁNDEZ (2), A. LLORIS (1) (1) Dpt. of Electronics and Coputer Technology (2) Dpt. of Electrical Engineering University
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationProblem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm
Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and
More informationOn the Accuracy of MANET Simulators
On the ccuracy of MNT Siulators avid avin david.cavin@epfl.ch Yoav Sasson yoav.sasson@epfl.ch istributed Systes Laboratory cole Polytechnique Fédérale de Lausanne (PFL) H-115 Lausanne ndré Schiper andre.schiper@epfl.ch
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationEquation Based Congestion Control for Video Transmission over WCDMA Networks
Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationarxiv: v1 [cs.dc] 3 Oct 2018
Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationEnergy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:
More information