The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)
Computational offloading has been shown being a promising approach to prolong the battery life of smartphones. To come up with energy-efficient offloading strategies, it is crucial to understand how much energy is used not only for local computation but also for network communication. Therefore, reliable methods to measure the energy consumption of the phones are needed as a fundamental basis. In...
As more and more flash memory technologies quickly improve, NAND flash memory storage system has become more and more used as a non-volatile storage for embedded applications such as smart phones, smart watch, digital camera and so on. The software layer called flash translation layer (FTL) becomes more important since it is a key factor in the overall flash memory system performance. However, the...
Developing and deploying infrastructure-based indoor localization solutions face significant challenges in the need of specialized user devices, costly and elaborative installation, configuration and maintenance, and in some cases, low localization accuracy. In this work, we develop an acoustic indoor localization system that requires little configuration and can localize commercial off-the-shelf...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years. In order to move ahead with research in field of data management and to enable processing of such data, we need benchmark datasets and freely available data which are publicly accessible. Google in May 2011 released a trace of a cluster of 11k machines...
Programming language is one of fundamental issues on software education. Not only knowledge such as grammar but also practical programming experiences are important to the learning of programming languages. In this paper, we classify programming exercises into the following two types: 1) syntax practices for understanding the grammar and 2) semantics practices for understanding the flow of a program,...
The identification of Arabic dialects is considered to be the first pre-processing component by any NLP problem. This identification is useful for automatic translation, information retrieval, opinion mining and sentiment analysis. Most of the work on the identification treat this issue like any classification problem. These work are based on supervised learning. The majority of them are based on...
Sensor networks are a collection of sensor nodes that co-operatively transmit sensed data to a base station. One of the well-known characteristics of Wireless Sensor Networks (WSNs) is its limited resources. Energy consumption of the network's nodes is considered one of the major challenges faced by researchers nowadays. On the other hand, data aggregation helps in reducing the redundant data transferred...
For commercial software in scientific and engineering computing, software licenses are needed when running them in high performance computing systems. Usually, there is a constraint for the number of software licenses. With the traditional software licenses management approaches, there is a prominent issue. The jobs will fail immediately without available software licenses. However, the existing job...
In cryptography, block ciphers are the most fundamental elements in many symmetric-key encryption systems. The Cipher Block Chaining, denoted CBC, presents one of the most famous mode of operation that uses a block cipher to provide confidentiality or authenticity. In this research work, we intend to summarize our results that have been detailed in our previous series of articles. The goal of this...
This paper proposes an intelligent formation control method of the leader and follower agents with nonlinear dynamics using our proposed cerebellar perceptron improved model with auto-structuring mechanism. In the proposed method, each agent can follow the leader, exchanging only information of positions (without velocities) of the observable agents including the leader and taking a predefined formation...
We propose directive-based automatic code generation for a multiple-precision code from a C code with double precision. The multiple-precision code uses the GNU Multiple Precision Arithmetic Library (GMP). Our code generation functions can be separated into binary operations by automatically creating a temporary variable, transforming C mathematical functions into corresponding GMP functions, and...
The purpose of this study is to create a software system to facilitate the organization of and searching for social images acquired from social sites on the Web (such as Facebook or Flikr), taking into account the images' features as well as user preferences. To achieve our goal, we design a solution based on image clustering, grouping together images sharing similar semantic and visual features,...
The exponential growth of video traffic on the Internet calls for the deployment of network management strategies to enhance the quality experienced by the end-users (Quality of Experience - QoE). In this paper, we focus on admission control, in particular we survey two of the main Admission Control (AC) solutions, and we compare their efficiency and QoE-awareness when making admission decisions....
This paper deals with a non-overlapping domain decomposition method involving additional augmented terms along the interface between the sub-domains. The goal of these additional terms is to prevent the singularity of the sub-domain matrix problems, such as rigid body motion in mechanics or resonance frequencies in acoustics. If the definition of these augmented terms requires minor intrusion inside...
FinFET technology has increasingly been adopted for use within integrated circuits thanks to its superior electrical integrity and scalability. However, most recent studies have concluded that FinFET circuits tend to be more vulnerable to negative bias temperature instability (NBTI) compared to planar MOSFET designs as a result of the self-heating effect. In this paper, we contrarily reveal that under...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.