The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed an innovative education platform-VREX (Virtual Reality based Education eXpansion), with combination of online and offline, to improve the curriculum building and teaching experience. VREX is based on Virtual Reality (VR) and we believe VR can revolutionize the education ecosystem. With some trials, we found VR can be used to promote curriculum effectiveness in an immersive environment...
Our lab-based small private online course (SPOC) combined online resources and technology with engagement between faculty and students based on OpenEdX platform. It worked with an auto-grading submission system which could reduce the instructors' burden of evaluation and provide better learners' experience. Different study behaviors were observed from the system tracking logs. Identifying at-risk...
We describe an Open edX-based blended course developed for a reformed Computer Structure course at Beihang University. In three iterations of this laboratory-based course, we dive into key issues that impact students' learning, and then redesign our curriculum, which integrated with virtual laboratory technique into the MOOC platform. We show how certain course design aspects affect students' learning...
Gaussian Filtered Minimum Shift Keying(GMSK) is used extensively in radio communication field nowadays; as frequency of radio signals increases, traditional technology such as DSP and FPGA can't satisfy the real-time requirement due to its complexity and compute-intensive. The development of modern GPU makes this possible. In this paper, a Gaussian Filtered Minimum Shift Keying (GMSK) demodulation...
To find the best memory system for emerging workloads, traces are obtained during application's execution, then caches with different configurations are simulated using these traces. Since program traces can be several gigabytes, simulation of cache performance is a time consuming process. Compute unified device architecture (CUDA) is a software development platform which enables programmers to accelerate...
To meet the growing demand for entertainment, the software running on Digital TV(DTV) becomes more and more powerful and complex. How to efficiently and accurately verify the applications puts a great challenge upon manufactures and application vendors. In this paper, we propose a fully automated system supporting black box test for software on DTV. The objectives and design of the testing system...
With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators...
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obvious way to achieve fast parallel simulation is to simulate the individual independent sets of a cache concurrently on different compute resources. We propose improvements to current trace-driven...
Caches play a major role in the performance of high speed computer systems. Trace driven simulator is the most widely used method to evaluate cache architectures. However, as the cache design moves to more complicated architectures, along with the size of the trace is becoming larger and larger. Traditional simulation methods are no longer practical due to their long simulation cycles. Several techniques...
This paper proposes a basic ARM full system simulation environment, on which one can run and debug system or user-level programs. It has flexible software architecture and good encapsulation. We implemented a remote debugging system based on our simulation kernel, which extends remote serial protocol (RSP) of GDB and using Eclipse as the front-UI to build a platform-independent system. These provide...
In a (t, n) threshold secret sharing scheme, any t- out-of-n participants could recover the shared secret, and any less than t participants could get nothing about the shared secret. Most of the existing secret sharing schemes are not flexible enough for the fixed threshold. In this paper, a new dynamic threshold secret sharing scheme was proposed, which is based on bilinear maps. The basic idea of...
Mobile ad hoc networks are vulnerable to various types of denial of service (DoS) attacks for the absence of fixed network infrastructure. The gray hole attack is a type of DoS attacks. In this attack, an adversary silently drops some or all of the data packets sent to it for further forwarding even when no congestion occurs. Firstly, DSR protocol, aggregate signature algorithm and network model were...
Mobile ad hoc networks are vulnerable to various types of denial of service (DoS) attacks for the absence of fixed network infrastructure. The gray hole attack is a type of DoS attacks. In this attack, an adversary silently drops some or all of the data packets sent to it for further forwarding even when no congestion occurs. In this paper, a new solution against the gray hole attack is proposed....
With the development of mobile computing and pervasive computing, smart mobile devices such as PDAs or smart-phones are gradually becoming an indispensable part of our daily life. However, as the software running on these devices becomes more and more powerful and complex, the testing of these mobile applications poses great challenges for mobile application vendors and phone manufacturers. In this...
Virtual channel flow control is a well-known technique in design of routers in networks-on-chip (NoC). This paper analyzes two typical virtual-channel router architectures with different sized switch fabrics. In either of them, the virtual channels do or do not compete for the channels to the switch fabric, and therefore the scheduler performs in an iterative way or not. As the basis of scheduler,...
Virtual channel flow control is a well-known technique in design of routers in networks-on-chip (NoC). This paper analyzes two typical virtual-channel router architectures with different sized switch fabrics. In either of them, the virtual channels do or do not compete for the channels to the switch fabric, and therefore the scheduler performs in an iterative way or not. As the basis of scheduler,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.