The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
By cognitive radio technology, secondary users (SUs) can use licensed bands opportunistically without causing interferences to primary users (PUs). Spectrum sensing is performed by SUs to detect that PUs are present or not. Therefore, spectrum sensing is a key technology for cognitive radio (CR), and sensing time is a critical parameter for spectrum sensing performance. The longer sensing time can...
The architecture of software systems can be naturally modeled as complex networks, where entities of software are nodes and interactions between entities are edges. These edges represent data-flows, instruction-flows and control-flows of the software, and these flows driving hardware circuit is the internal cause of the energy consumption of the software. In this research, we model software systems...
In real-time systems, Functional Reactive Programming (FRP) is already playing an important role and will potentially be more so in the future. Priority-based (preemptive) FRP (P-FRP), a variant of FRP with more real-time characteristics, demands more research in its scheduling and timing analysis. Its Abort-and-Restart (AR) nature indicates that reducing preemptions can be critical for improving...
In a nonsynchronous multicamera system, cameras start to capture pictures at different time. To synchronize cameras, we should know the capture time of each camera and adjust them according to the time. We propose a high precision method to detect the synchronization accuracy by using a FPGA based LED matrix as a detector. The LEDs in the matrix are encoded basing on the carry-flowing encoding (CFE)...
The achievements in underwater robotics and Wireless Sensor Networks make it possible to explore aquatic environment further. Target tracking which combines the mobility of underwater robotics with sensor networks has become an important application area in aquatic environment. This paper employs a Robotic Fish-based Sensor Network (RFSN) as mobile sensing platform to realize the target tracking....
To cope with the increasing scale of data, GPU (Graphic Processing Unit) is integrated with more and more cores to improve processing performance. High performance, however, is at the expense of sustained power consumption. Although current GPUs support concurrent kernel execution to relieve this problem, hardware resource utilization, category of kernels and the order of concurrent kernels issued...
Concurrency bugs are one of the most notorious software bugs and may not be observed easily. Significant work has been done on detection of atomicity violations bugs for high performance systems but there is not much work related to detect these bugs for embedded systems. Although criteria to claim existence of bugs remains same, approach changes a bit for embedded systems. The main focus of this...
The congestion in any regions or the faults in routing nodes, communication links and processing elements(PEs) will affect the NoC performance seriously in the multiprocessor system-on-chip (MPSoC) based on network on chip (NoC). In this paper, the NoC topology is designed which the fault tolerance function is enabled. Its dual-port network interface (NI) makes the key PE have two links with network...
The modern GPU has powerful parallel processing unit and programmable pipeline, therefore GPU has some advantages for non-graphic computing. However, GPU needs a lot of memory access bandwidth. GPU uses memory access coalescing method to reduce memory access requests that have good locality. Paper [1] proposes equivalent memory access coalescing to improve memory access performance when the program's...
Non-Volatile Memory (NVM) has many advantages such as storage density, non-volatility, and lower energy consumption. However, they are constrained by limited write endurance and lack of an efficient mechanism to recovery the error data, which will affect the lifetime of NVM. In this paper, we propose a fault tolerant algorithm for NVM, that inspired by the redundant technology of RAID(Redundant Arrays...
The Subblock-Disabling schemes have obviousadvantages on delays overhead and capacity loss. However, theexistence of cache line "holes" triggers abundant false hits andthe utilization of available cache capacity is low. A subblockdisablingbased no-collision set-level mending cache architectureVFCcache suited for low set-associative L1 cache is proposed. AnAdditional Tag Array is added and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.