The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motivated by reduction of computational complexity, this work develops a pipelined adaptive filter architecture using the sign-error least mean square (SELMS) algorithm. The proposed algorithm was implemented with less than half the amount of calculation consumed for the conventional architectures. Besides, the proposed designs derived by retiming technique and with low latency also provide a faster...
In gene expression programming, diversity can be reduced during evolution, sometimes resulting in premature convergence because of non-coding regions, leading to substantial reproduction of repeated individuals. In order to increase the diversity of the population and to avoid premature convergence, we propose a new diversity preservation tournament operator, adopting a tree-based similarity measurement...
The OpenFlow paradigm embraces third-party development efforts, and therefore suffers from potential attacks that usurp the excessive privileges of control plane applications (apps). Such privilege abuse could lead to various attacks impacting the entire administrative domain. In this paper, we present SDNShield, a permission control system that helps network administrators to express and enforce...
Change data capture (CDC) is an approach to data integration that is used to determine and track the data that has changed so that action can be taken using the change data. However, the state of art of change data capture (CDC) in the context of document-oriented NoSQL databases is not mature. Therefore, it is urgent to require a NoSQL CDC solution. Although some manufacturers of NoSQL databases...
The deposit security and the purchasing anonymity are two important issues when consumers do shopping on mobile platforms. However, there is currently no solution to completely address both the issues. In this paper, we propose a lightweight anonymous mobile shopping scheme based on DAA for trusted mobile platform. By fully considering the background of mobile applications, we design the scheme according...
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on cryptography, many schemes for preventing prefix hijacks have been proposed. Securing binding between IP prefix and its owner underlies these schemes. We believe that a scheme for securing this binding should try to satisfy these seven critical requirements: no key escrow, no other secure channel, defending against...
Massive parallel computing performed on many-core Network-on-Chips (NoCs) is the future of the computing. One feasible approach to implement parallel computing is to deploy multiple applications on the NoC simultaneously. In this paper, we propose a multi-application mapping method starting with the application mapping which finds a region on the NoC for each application and then task mapping which...
An intrusion detection system (IDS) implements pattern matching approach on the network traffic to find the malicious packets carrying attack signatures. In this paper, a common field programmable gate array (FPGA) based on-board hardware architecture which is compatible with both ordinary string and perl compatible regular expression (PCRE) pattern matching is proposed to accelerate IDS. Furthermore,...
We present an architecture level low-power design technique called divide and concatenate for universal hash functions based on the following observations. (1) The power consumption of a w-bit array multiplier and associated universal hash data path decreases as O(w4) if its clock rate remains constant. (2) Two universal hash functions are equivalent if they have the same collision probability property...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.