Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple. However, such fragmentation of IoT platforms has made the development of IoT applications very difficult...
In this study, we present a set of new evaluation measures for the track-based multi-camera tracking (T-MCT) task leveraging the clustering measurements. We demonstrate that the proposed evaluation measures provide notable advantages over previous ones. Moreover, a distributed and online T-MCT framework is proposed, where re-identification (Re-id) is embedded in T-MCT, to confirm the validity of the...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Many processors that use energy harvesting devices for low-power computing operations and zero-standby-current power-off storage require embedded nonvolatile memory (eNVM) devices and nonvolatile logics (nvLogics) with low-voltage capability. However, conventional eNVMs and nvLogics are unable to perform low-voltage write operations due to a failure on the part of on-chip charge-pump circuits to provide...
Product EMC compliance requires EMC knowledge of EMC and engineering experience, a consulting service provided by an experienced EMC expert will be helpful for most engineers in industry. However, the Product EMC compliance is a measurement dependent processing and a consulting cannot be offered without making measurement and investigation on product onsite, so that even nowadays the EMC compliance...
This paper proposes innovative methodologies of building a Cloud Computing Platform to help industrial users to reduce product EMC compliance cost and speed up compliance procedure. Computer Guided EMC Compliance Concept and methodology are introduced with embodiments. A novel Cloud Computing Platform composed of Computing-View-Controller units is presented to guide industrial user effectively modifying...
Database as a service (DaaS) is a new paradigm based on the cloud computing platform. With the growing concerns on privacy, the user shope to have a security manner to store their data in the cloud. In order to improve the privacy protecting method for the sensitive data shared in the cloud, this paper proposes a privacy-preserving access control protocol based on multi-levels access control, Feldman...
Many mobile chips with low supply voltage (VDD) require low-voltage embedded nonvolatile memory (eNVM) to enable low-power read operations and zero-standby-current power-off storage. ReRAM has a lower write-voltage (VW), smaller write-current (Iw), and larger resistance-ratio than other NVMs, making it a good candidate for low-VDD eNVM, as long as the following two challenges can be overcome: (1)...
High utility quantitative itemset mining refers to discovering sets of items that carry not only high utilities (e.g., high profits) but also quantitative attributes. Although this topic is very important to many applications, it has not been deeply explored and existing algorithms for mining high utility quantitative itemsets remain computationally expensive. To address this problem, we propose a...
In this paper, optimal training symbols are designed for training-based least-square channel estimation among various constant-envelope orthogonal frequency-division multiplexing (OFDM) systems to provide minimum achievable mean-squared error (MSE) performance under quasi-static multipath fading channels. In particular, the closed-form expressions of optimal training symbols are specifically given...
The 3-D structural fin-like channels of FinFET suppress the leakage current as the sizes of devices get substantially shrunk. In this study, the fin-thickness effects on the electrical performances are mainly observed. Two different kinds of thickness (namely, 110nm, and 120nm) with the same channel length (0.1 micron) are put into comparison. The phosphorus implants of the same dose with different...
MapReduce is a state-of-the-art computation paradigm that is becoming widely used for processing large-scale datasets. Hadoop is an open-source implementation of MapReduce and follows a masterCslave architecture. This architecture makes Hadoop suffer from a single point of failure in the JobTracker. In this paper, we design a solution to resolve the single point of failure of the Job Tracker and then...
Dual threshold voltage (dual-Vth) assignment is recognized as a useful technique to reduce the leakage power. However, as the process technology shrinks to the deep sub-micron regime, the negative bias temperature instability (NBTI) effect becomes a serious concern. The NBTI effect may cause the degradation of threshold voltage over a period of months or years. Since previous dual-Vth assignment techniques...
The MaxBRNN problem finds a region such that setting up a new service site within this region would guarantee the maximum number of customers by proximity. This problem assumes that each customer only uses the service provided by his/her nearest service site. However, in reality, a customer tends to go to his/her k nearest service sites. To handle this, MaxBRNN can be extended to the MaxBRkNN problem...
Because peer-to-peer (P2P) overlay networks are sell organizing, each peer is required to participate in overlay network maintenance operation. However, for a mobile cellular peer, participation in P2P network maintenance is challenging due to its limited battery life and mobility in cellular access networks. A mobile-initiated connectivity maintenance scheme is proposed for mobile cellular peers...
Internet technologies are making rapid progress, but achieving high performance of network application over the WAN remains a challenge. When branch office's workers access enterprise applications locating in data center, the performances drop dramatically. To solve this problem, many hardware accelerators are produced. In this paper, we introduce a Software-only IP Network Application Accelerator...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.