The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Consider a target search problem on a unit interval where at any given time an agent can choose a region to probe into for the presence of the target in that region. The measurement noise is assumed to be increasing with the size of the search region the agent chooses. In this paper, a single-phase sequential and adaptive search algorithm is proposed and shown to achieve the best possible targeting...
We present explicit algorithms for computing structured matrix-vector products that are optimal in the sense of Strassen, i.e., using a provably minimum number of multiplications. These structures include Toeplitz/Hankel/circulant, symmetric, Toeplitz-plus-Hankel, sparse, and multilevel structures. The last category include BTTB, BHHB, BCCB but also any arbitrarily complicated nested structures built...
In [1], [2], two schemes have been proposed to recover the support of a K-sparse N-dimensional signal from noisy linear measurements. Both schemes use left-regular sparse-graph code based sensing matrices and a simple peeling-based decoding algorithm. Both the schemes require O(K logN) measurements and the first scheme require O(N logN) computations whereas the second scheme requires O(K logN) computations...
Algebraic-geometric (AG) codes have long been considered as a possible candidate to replace Reed-Solomon (RS) codes. However, their decoding remains complex and infeasible to implement. Addressing this challenge, our paper proposes a low-complexity Chase (LCC) decoding algorithm for the most popular class of AG codes - Hermitian codes. The LCC decoding is realised by formulating decoding test-vectors,...
Robust seizure detection and seizure prediction continues to be a challenge. Lempel-Ziv Complexity (LZC) is one of the features that has shown to be relevant in seizure detection. Recent work has shown that augmenting LZC can be beneficial to emphasize variations in amplitude or frequency when analyzing biomedical signals. In this paper, we present a first look into evaluating the feasibility of using...
Chiastic structure is a figure of speech technique which displays symmetric structure of textual units. It is mainly used to convey an important point of speech or writing to the audience effectively. Hence, when it can be discovered computationally, it can add additional value to the understanding of the salient points of the input text. In this paper, we present an efficient linear-time algorithm...
Issues related to verification and security are increasingly important in modern electronic systems. In particular, the huge complexity of electronic systems has led to growth in quality, reliability and security needs in several application domains as well as pressure for low cost products. There is a corresponding increasing demand for costeffective verification techniques and security solutions...
Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the...
Storage backend characterization is vital to the workload aware storage platform which aims at providing optimal mapping between storage workloads and backends. Storage benchmarking as one major activity in the path of backend characterization, is very challenging due to the diversity and complexity of the storage environments. In this paper, we present our storage benchmarking design and implementation...
This track has made significant contribution to advance the current state of the art in enterprise distributed application management across data centers, and clouds public or private. The scale of distributed applications and their management have taken a new dimension demanding tolerance to wild fluctuations both in workloads and available computing resource pools. A new computing model proposing...
Network verification is attracting attention as a key technology to detect configuration errors before deploying the network. In verification, a set of packets to be inspected is usually specified by a window -- a multi-dimensional rectangle defined by packet header fields (e.g., address prefixes and port ranges). Network operators have to know the forwarding behaviors of packets inside the window,...
In this paper an area and power efficient design for 1 bit and 8 bit Carry Select Adder (CSLA) has been proposed. Conventional and other CSLAs are designed using a traditional full adder, which has complexity in terms of area and power consumption. So to overcome this problem a new technique is implemented on the CSLA. Moreover the logic gates are designed based on the Gate Diffusion Input (GDI) technique...
The pipelined architecture has gained popularity due to its ability to achieve high throughput and low hardware complexity, low power consumption. Thus, these architectures are widely used in many applications, mainly for the real-time applications. The fast Fourier transform (FFT) offers optimized design for the complex samples, i.e., complex valued FFT (CFFT) but not for the real input samples,...
Uses, applications and functionalities of Online Social Network (OSN) are continuously changing and adapting to the new habits of users. The massive adoption of smart mobile devices and the appearance of new roles such as community managers have had a strong influence in the wide use of these networks among all sectors of population regardless of age, gender or socio-economic status. Consequently,...
In large project, source code becomes increasing complex and lengthy so program comprehension plays an important and significant role for developers. Sequence diagram generated using static source code or dynamic only approach provides limited execution coverage, additionally contains redundant, dead and fault driven methods, which increase the size of the diagram and complexity. In this paper, to...
When test sets are generated according to a coverage criterion, it is often sufficient to fix values only for some of the inputs to achieve 100% coverage. Other inputs are immaterial and the coverage is achieved with any of their values ("don't care" values). The research question is: How do these "don't care" values (which can reach up to 20% of all input values) influence the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.