The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The industry's first 10nm low power high performance mobile SoC has been successfully ramped in production. Thanks to a thorough design-technology co-development, 10nm SoC is 16% faster, 37% smaller, and 30% lower power than its 14nm predecessor. The latest SoC features a gigabit class modem and is set to advance AR/VR, AJ, machine learning, and computing. 10nm FinFet technology scaling challenges...
Both capacity and energy efficiency are crucial for next-generation wireless networks. This paper investigates energy efficiency in cooperative cellular networks. Based on the double auction theory, we model the optimal relay assignment problem, which aims at improving the performance of cell-edge users (CEUs) with energy efficiency optimization. In the proposed auction-based model, the selfish nature...
This paper proposes an automated virtual security testing platform for Android mobile apps. The testing platform includes three key components: customizing Android OS to include mobile app trace information, creating a virtual testing platform using the customized OS, and developing static and dynamic analyzing techniques for mobile malware detection. The proposed testing platform is a server-side...
Mobile devices such as smartphones and tablets are widely used for personal and business purposes. A mobile device may carry sensitive data and becomes an easy target for cyber criminals. Mobile security is thus important. Mobile security testing targets to detect vulnerabilities and malicious apps on a mobile device. In this paper, we present four testing approaches for mobile security: mobile forensic,...
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job satisfaction for the employee. However, it also creates challenges in terms of security as new vulnerabilities arise. In particular, these challenges include space isolation, data confidentiality, and policy compliance as well as handling the resource constraints of mobile devices...
The emergence of cloud computing as an efficient means of providing computing as a form of utility can already be felt with the burgeoning of cloud service companies. Notable examples including Amazon EC2, Rackspace, Google App and Microsoft Azure have already attracted an increasing number of users over the Internet. However, due to the dynamic behaviors of some users, the traditional cloud pricing...
In RFID systems, tag anti-collision algorithm is significantly important for fast tag identification, especial in mobile scenarios. In this paper, we propose group strategy for remaining tags algorithm (GSRA for short). The theoretic analysis shows that the system efficiency only concerns rate of migration and static system efficiency, and is not related with the number of tags. The simulation result...
This article consists of a collection of slides from the author's conference presentation on the special features, system design and architectures, processing capabilities, and targeted markets for Baidu's family of software defined accelerator products (SDA) for large scale deep neural network (DNN) systems.
Mobile devices such as smartphones and tablets are widely used for personal and business uses. Compared to personal mobile subscribers, enterprises have more concerns about mobile device security. The challenges an enterprise may face include unlimited access to corporate resources, lack of encryption on corporate data, unwillingness to backup data, etc. Many of these issues have been resolved by...
Mobile malware has gained significant ground since the dawning of smartphones and handheld devices. TrendLabs estimated that there were 718,000 malicious and high risk Android apps in the second quarter of 2013. Mobile malware malicious infections arise through various techniques such as installing repackaged legitimate apps with malware, updating current apps that piggy back malicious variants, or...
Because of their unique characteristics, smartphones present challenges requiring new business models that offer countermeasures to help ensure their security.
Based on the large-scale distributed application supporting mobile component for adapting available resource , a fault-tolerance framework was proposed. Improved index-based quasi-synchronous checkpoint algorithm by shadow chain and notebook mechanisms, that system can take checkpoints at the lower price and was rollbacked to a latest global consistent state. Tested experimentation prototype, that...
In this paper, a novel OFDM symbol timing recovery method, which is robust to doubly selective fading channels and carrier frequency offset, is proposed for the mobile terminals of CMMB system. The time slot timing synchronization is accomplished by using the inverse sliding correlation between the segmenting Sync sequences, which possess the inverse conjugate symmetry (ICS) characteristic. Furthermore,...
Sensing deployment is an important issue addressed in wireless sensor network (WSN). This paper proposes a virtual force directed co-evolutionary particle swarm optimization (VFCPSO) algorithm, which uses a combined objective function to achieve the tradeoff of coverage and energy consumption. By considering deployment as an optimization problem, VFCPSO is more reliable and flexible for WSN, since...
In this paper, we proposed a three-layer dynamic gateway strategy, which integrates mobile IP and AODV protocol. This is one kind of multi-gateway mechanisms. By using irregular nodes not attached fixed gateway as gateway in Ad Hoc network, network overload will decreased. And the efficiency of the network will increased. According to the distance, the registered number of nodes and traffic-weighted...
Routing protocol is a key problem and critical to mobile wireless ad hoc networks. These instructions give you basic guidelines for preparing papers for conference proceedings. Routing, as an important part of ad hoc network, its performance has a vital effect on the system. In this paper, we discuss the all distributed routing algorithm and simulated this algorithm by using Matlab language. Layered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.