The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a novel method for point clouds registration. In point clouds, there always exist a large number of surfaces with low curvatures. Let the surface locate in an OXYZ coordinate system, if we rotate the mean normal of the surface parallel with the Z axis, the 3D surface can be projected to 2D image via orthographic projection. Then we can detect and describe SIFT features in...
The clock distribution within Chip-Multiprocessors(CPMs) and System-on-chips (SoCs) come to be difficult as the number of processing elements increasing and the communication between those components are becoming even more critical. In recent years, researchers proposed Globally Synchronous Locally Synchronous (GALS) clocking scheme to reduce clock skew, power, and energy consumption in CPMs and SoCs...
In order to meet the requirements of communications devices in respect of data processing, display control and other aspects, this paper, on the basis of Core Connect bus that IBM proposes, designs and realizes a shared storage type SOPC parallel system by taking advantage of Xilinx's FPGA chip XC4VFX60 embedded two PPC405 processor hard-cores, which effectively improves the data processing capability...
With the rapid growth in mobile and wireless computing technology, location management techniques become a paramount issue to enable the terminals to continuously receive services when moving from one location to another. Future Personal Communication Systems (PCS) will support a huge user's population and a network spanning over a large geographical area. In such systems, the signalling traffic and...
This paper summarizes a process of operating system adaptation to an Intel Atom processor. The main objectives of this project was to adapt a simple micro kernel embedded operating system to a more complicated processor family, without destroying the original modules of system or changing their functionality. Our motivation was the lack of information or techniques regarding operating system migration...
Main memory reliability is an important concern in today's computer systems. Error Correction Codes (ECCs) improve memory reliability but have high area and energy overheads. Furthermore, ECCs cannot be easily applied to memories with wide chips such as stacked memories.
In safety-critical environments it is no longer sufficient to rely on legacy methodologies. Correctness should be built in all the way through the process. This paper presents a toolchain which allows theorem prover output to be interfaced to fault-tolerant FPGA circuitry. We show a shallow embedding of a lambda calculus executing on a Xilinx platform with the assistance of a choice of fault-tolerance...
We propose automatic synthesis of application specific instruction set processors (ASIPs). We use pipeline execution of multi-op machine-instructions, e.g., *(reg1*reg2) = (*reg3)+ (*reg4) (C-syntax) an instruction with three memory pipeline stages and two arithmetic stages. The problem is, for a given set of loops, to find a pipeline configuration and a multi-op ISA that maximizes the IPC (instructions...
Future generation processors are expected to have high soft error rates and will require increased fault detection and fault tolerance. This work focuses on errors in execution units. Hardware or software duplication or triplication, parity, or residue codes could be used to detect errors in execution units. However, hardware duplication/triplication have significant area overhead and, in applications...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly dynamic, and largely opaque eco-system of networks the Internet is. Currently, only two practical solutions are available: (i) equipping packets with the Record Route IP option to register addresses of the traversed routers; (ii) eliciting ICMP Time Exceeded messages by limiting the Time-to-Live of...
The paper describes an efficient method to prove equivalence between two integer arithmetic datapath designs specified at the register transfer level. The method is illustrated with an industrial ALU design. As reported in literature, solving it using a commercial equivalence checking tool required case-splitting, which limits its applicability to larger designs. We show how such a task can be solved...
In the paper, we will propose a crossbar-based controller design for flash memory to configure a variety of possible architectures to investigate the relationship between the controllers and the NAND flash memory chips. Furthermore, the crossbar-based control design can avoid the channel-limit problem. According to experiment results, the design can simulate a variety of possible architectures and...
Internet and online-based social systems are rising as the dominant mode of communication in society. However, the public or semi-private environment under which most online communications operate under do not make them suitable channels for speaking with others about personal or emotional problems. This has led to the emergence of online platforms for emotional support offering free, anonymous, and...
Gyroscopes are used for maintaining orientation or measuring the angle of rotation or the rate of change of angular rotation. This paper compares angular rate measurement between MEMS digital (ADXRS 450) and analog (ADXRS 649) gyroscope. PIC 18F6520 is used to read the extracted angular rate from ADXRS 450. Digital output extracted from the sensor is error free even in noisy condition. Angular rate...
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary codes, providing easy static analysis for vulnerability detection. Compared with existing systems, our tool has four properties: first, it could work on binary codes without source codes,...
Forcing faulty outputs of devices implementing cryptographic primitives in order to reveal some secret information is a well-known attack strategy. Tampering with the clock signal or the supply voltage are two popular techniques for generating erroneous behaviour. In this work we perform an in-depth analysis of the vulnerability of two different microcontroller platforms on clock and supply voltage...
After presenting the basic definition of spiking neural P systems (SN P systems), illustrated with two examples, we recall some results concerning the computing power and the size of universal SN P systems. We end this note with a couple of research topics.
Robotic sailing vehicles can provide the support for carrying out long ocean sampling missions, using solely renewable energy for propulsion and for powering the computing, communication and electromechanical systems. The basic automatic sailing tasks required to visit a sequence of waypoints has already been correctly addressed by various teams. However, an effective system for specifying long term...
After teaching and observing students for several years, we hypothesize that learning programming is difficult for students who cannot imagine concretely how a computer works, or the process by which the CPU accesses memory and I/O via the bus according to coded programs. In this paper, we discuss why we believe it is important for programing education to help students understand how a computer works...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.