The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spectrum handoff occurs when the primary users appear in the licensed band occupied by the secondary users. Spectrum handoff procedures aim to help the secondary users to vacate the occupied licensed spectrum and find suitable target channel to resume the unfinished transmission. In this paper, we discuss how to select the target channels to minimize the total service time with multiple spectrum handoffs...
We propose a novel synthesis method of a dual-rail asynchronous two-level logic of reduced cost. It is based on a model that operates under so called modified weak constraints. The logic is implemented as a minimized AND-OR structure, together with the completion detection logic. We formulated and proved the product term minimization constraint that ensures a correct logic behavior. We processed the...
In this letter, we introduce a novel packet scheduling algorithm, so called 2-tier Hierarchical Frame-based Queueing (2tHFQ) that provides a deterministic delay bound without sorting operation complexity. The key idea of 2tHFQ is to divide a given frame into multiple sub-frames with frame indices assigned, and then transmit input packets according to the frame index hierarchy. We analytically predict...
Time slot interchange and signal separator (TSISS) network was introduced to reduce the time slot requirement of TST architecture. In the switching algorithm of the TSISS network, an adjacency matrix was formed and breath-first search (BFS) or depth-first search (DFS) algorithms was applied on the matrix to find optimal input and output time slots. As time complexity of the algorithm for formation...
With technology scaling, vulnerability to soft errors in random logic is increasing. There is a need for on-line error detection and protection for logic gates even at sea level. The error checker is the key element for an on-line detection mechanism. We compare three different checkers for error detection from the point of view of area, power and false error detection rates. We find that the double...
QoS routes need availability assurance. Regardless of the applied protection scheme, there are several heuristic algorithms that can approximate the availability of connections based on the availability parameters of network components along the connection path. Accurate approximation can be achieved with simple and fast calculation only for the most basic protection schemes, the more complex the...
It is generally recognized that asynchronous operation of logic networks offers specific advantages over synchronous operation controlled by a central clock when the network is subject to large or widely varying inter-module propagation delays. In this paper we characterize several previously described techniques for achieving asynchronous operation by a single model. Essential to the model is the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.