The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Phishing which is a kind of theft that attempting to steal sensitive information, has become a major threat to people's daily life. Some researchers proposed some methods of anti-phishing based on the characteristics of fishing behaviors. This article will firstly introduce the field of phishing and some mature method for anti-phishing. Then, it will propose an effectively phishing website detection...
This article describes an improved competition model named NightMare Agent for Trading Agent Competition Ad Auction which simulate the real Sponsored Search Market. The experiment result shows that the proposed model had satisfactory performance, especially fitted with the high capacity situation. Furthermore, this article also evaluates the results with other classic models, and discusses the future...
The explosively growing amounts of data let many big data applications face the difficulty in maintaining all of the enormous runtime information in main memory. This paper considers a new memory architecture constructed by the emerging non-volatile memory (NVM) technologies, such as phase-chage memory (PCM), to exploit the coexistent advantages for being main memory and secondary storage, so that...
The lifetime degradation of new multi-level cell (MLC) flash devices is becoming more and more serious due to the fast-increasing bit error rate variance among flash pages, where a flash chip consists of multiple blocks and each block consists of a fixed number of pages. Existing works usually discard bad pages in the unit of a block, but result in shortened the device lifetime due to the insufficient...
With the advances of manufacturing technology and aggressive use of multi-level-cell (MLC) for flash memory, flash memory has faced a serious challenge on its device lifetime due to the fast-decreasing capacity caused by worn-out blocks. In contrast to existing works, we propose a block reinforcement scheme to optimize the guaranteed lifetime of flash storage devices by extending the useable period...
This paper presents a 256kb 6T static random access memory (SRAM) with threshold power-gating (TPG), low-swing global read bit-line (GRBL), and charge-sharing write with Vtrip (VTP) tracking and negative source-line (NVSL) write-assists (WA). The TPG facilitates lower NAP mode voltage/power and faster wake-up for the cell array, while low-swing GRBL reduces the dynamic read power. A variation-tolerant...
Phase-change memory (PCM) is a promising candidate as a storage medium to resolve the performance gap between main memory and storage in battery-powered mobile computing systems. However, it is more expensive than flash memory, and thus introduces a more serious storage capacity issue in low-cost solutions. This issue is further exacerbated by the fact that existing file systems are usually designed...
This paper is motivated by the tremendous energy consumption of streaming video servers and the energy-economic nature of solid-state drives. An energy-aware data placement strategy with its associated scheduling policy is proposed for streaming video servers equipped with solid-state drives (SSDs). A skewed energy-aware load over SSDs and disks is adopted with a duplication policy to deal with popular...
Embedded computing systems usually have limited computing power, RAM space, and storage capacity due to the consideration of their cost, energy consumption, and physical size. Some of them such as sensor nodes and embedded consumer electronics only have a small-sized flash memory as their storage with a (simple) file system to manage their data, which are usually of small sizes. However, the existing...
As NAND flash memory has become a major choice of storage media in diversified computing environments, the performance issue of flash memory has been extensively addressed in many excellent designs. Among them, an effective strategy is to adopt multiple channels and flash-memory chips to improve the performance on data accesses. However, the degree of data access parallelism cannot be increased by...
This paper presents micro mirrors and micro assembly mechanisms fabricated by monolithic nickel electroplating. Multiple nickel structural layers were electroplated and patterned with copper as the sacrificial material. A novel side latch design was proposed and demonstrated for 3D micro assembly of micro mirrors by simple push operation of micro probes. Micro mirrors was assembled in about 15 sec...
Nowadays, the design of a secure access authentication protocol in heterogeneous networks achieving seamless roaming across radio access technologies for mobile users (MUs) is a major technical challenge. This paper proposes a Distributed Anonymous Authentication (DAA) protocol to resolve the problems of heavy signaling overheads and long signaling delay when authentication is executed in a centralized...
With the development of integrated circuit manufacturing technology, low power test has become a focus of concern during testing fields. This paper proposes a new low power BIST (built-in self test) scheme based on block encoding which first exploit a block re-encoding method to optimize the test cube, and then a low power test based on LFSR (linear feedback shift register) reseeding is applied. According...
In this paper, we present a new similarity measure between intuitionistic fuzzy sets based on transformation techniques. First, we present a new similarity measure between intuitionistic fuzzy values based on transformation techniques. Then, based on the proposed similarity measure between intuitionistic fuzzy values, we propose a new similarity measure between intuitionistic fuzzy sets based on transformation...
In this paper, an approach for repairing the occluded human skeleton is proposed. Owing to the perception and record abilities of human beings inherently, people see at a glance that they can intuitively retrieve the moving action for any scene. Human being movement often has a self-occlusions or sheltered phenomenon when they walked. As for this occluded problem, so far, there is not a powerful method...
Various cis-regulatory module (CRM) predictors have been proposed in the last decade. Several well-established CRM predictors adopted different categories of prediction strategies, including window clustering, probabilistic modeling and phylogenetic footprinting. Appropriate integration of them has a potential to achieve high quality CRM prediction. This study analyzed four existing CRM predictors...
A 1.1 um pitch pixel array fabricated by 45 nm 3D stacked technology, can be switched to peripheral circuits on same wafer or to other stacked wafer for process and signal integrity verification. It supports through silicon connection or direct connection to increase the flexibility by separating pixel array and sensing circuit. The novel wide operation range VCO and low power serializer are implemented...
This paper proposes a range free localization scheme based on identifying the overlapped communication regions of reference nodes. In the proposed scheme, an unknown node identifies the communication regions of reference nodes from which it can receive beacon messages. The overlapped region of all the communication regions should be the area where the unknown node is located. First, the intersection...
Quantile is one of the major metrics used in risk management. Since qauantile represents the downside risk. In this paper, we present a new variant of Nelder-Mead method (NM) for quantile-based stochastic optimization, called Stochastic Nelder-Mead Simplex Method for Quantile (SNM-Q), that aims to minimize the downside of decisions made in stochastic environments. An extensive numerical study shows...
This paper addresses the minimum transmission broadcast (MTB) problem for the many-to-all scenario in wireless multihop networks and presents a network-coding broadcast protocol with priority-based deadlock prevention. Our main contributions are as follows: First, we relate the many-to-all-with-network-coding MTB problem to a maximum out-degree problem. The solution of the latter can serve as a lower...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.