The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Different to former energy minimal scheduling problem, we introduce a new optimization problem for a set of tasks with energy constraint and multiple...
Security and energy are two main concerns for embedded systems, especially in battery-powered security-critical systems. In this paper, we make efforts to identify energy-related characteristics of common security algorithms for data-sensitive embedded real-time systems. Different to traditional researches, this paper focuses on the influences of size of protected data on energy-related factors. We...
Aiming at how to reduce energy consumption and improve the node survival cycle in mobile P2P network, SRDBSM was proposed. It uses the transmission characteristics of spatial node to search the optimal node which is considered as next-hop node within the maximum effective transmission range. It's not only reduces next-hop number and communion time, but also improves the efficiency of resource discovery...
This paper focuses on transmit precoding for multiuser MIMO downlink systems. In multiuser MIMO systems, multiuser interference (MUI) and noise are two well-known factors with respect to the system's performance. Block diagonalization (BD) method is proposed to completely eliminate MUI by placing the intended users in the nullspace of all the unintended users. But the BD method imposes a condition...
Energy and security are hot topics for real-time embedded systems. However, little traditional research consider the two factors together, which leaves a great challenge to guarantee the security of embedded applications running under battery-powered real-time embedded systems. In this paper, we investigate the characteristics of energy consumption for the most popular security algorithms. To precisely...
Under the influence of the lighting condition and some character of water media, the underwater images have low contrast, unbalance gray scales, fuzzy edge of objects and large quantity of noise which will appear with the movement of vehicle. For the mentioned above factors, when traditional methods are used to dispose underwater images, the regions of objects can’t be located exactly, details of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.