The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pixel-domain analysis, the mainstream approach to analyze surveillance video, has always been a hot issue in academy and industry. However, with the increasing volume and resolution of surveillance video, the flexibility and efficiency of fast processing is garnering more significance. Under this circumstance, surveillance video analysis in the compressed domain is indeed of strategic importance from...
Packet-Level Forward Error Correction (PL-FEC) techniques are widely applied to multimedia communications. To deal with the burst loss problem in packet transmissions over networks, PL-FEC 1-D interleaved parity codes are used in Real-time Transport Protocol (RTP), which uses User Datagram Protocol (UDP) to transport packets. However, the codes' error correction performance, encoding rate, decoding...
Dataflow programming models are suitable to express multi-core streaming applications. The design of high-quality embedded systems in that context requires static analysis to ensure the liveness and bounded memory of the application. However, many streaming applications have a dynamic behavior. The previously proposed dataflow models for dynamic applications do not provide any static guarantees or...
Describing Multi-Processor Systems-on-Chip (MPSoC) at the abstract Electronic System Level (ESL) is one task, validating them efficiently is another. Here, fast and accurate system-level simulation is critical. Recently, Parallel Discrete Event Simulation (PDES) has gained significant attraction again as it promises to utilize the existing parallelism in today's multicore CPU hosts. This paper discusses...
At the Electronic System Level (ESL), design validation often relies on discrete event (DE) simulation. Recently, parallel simulators have been proposed which increase simulation speed by using multiple cores available on today's PCs. However, the total order of time in DE simulation is a bottleneck that severely limits the benefits of parallel simulation. This paper presents a new out-of-order simulator...
Hierarchical phrase-based translation is a state-of- the-art model. However, it does not consider the linguistic knowledge deeply as pure syntax-based model. In this paper, we propose a novel head-annotated synchronous context-free grammar for hierarchical phrase- based translation model. Our model contains several nonterminals in the synchronous rules. It can integrate some linguistic knowledge from...
Recent work on unsupervised feature learning has shown that learning on polynomial expansions of input patches, such as on pair-wise products of pixel intensities, can improve the performance of feature learners and extend their applicability to spatio-temporal problems, such as human action recognition or learning of image transformations. Learning of such higher order features, however, has been...
This paper presents an analysis of the concept of capacity for noisy computations, i.e. algorithms implemented by unreliable computing devices (e.g. noisy Turing Machines). The capacity of a noisy computation is defined and justified by companion coding theorems. Under some constraints on the encoding process, capacity is the upper bound of input rates allowing reliable computation, i.e. decodability...
Applications based on Deterministic Finite Automata (DFA) are important for many tasks, including lexing in web browsers, routing in networks, decoding in cryptography and so on. The efficiency of these applications are often critical, but parallelizing them is difficult due to strong dependences among states. Recent years have seen some employment of speculative execution to address that problem...
Vehicular Ad-Hoc Networks (VANETs) have been extensively studied in the last years. Despite the availability of IEEE 802.11p transceivers, most of the literature presents simulation results, rather than real-world measurements. This is mainly due to the capability of simulations to facilitate interpretations of results; in fact any event can be decomposed into basic sub-events and the related causes...
Permutation codes are M-ary codes which can be used, in combination with M-ary FSK, to correct errors in Power Line Communications (PLC). It has been shown in [1] that permutation code trees can be used to correct a single substitution or synchronization error per codeword, without the use of markers. In this paper, we show that, due to the structure of the permutation code tree, adjacent errors can...
This paper is focused on the optimization of the computational efficiency of a multi-stream word recognition system. The aim of this work is to optimize the multi-stream decoding step in order to reduce the recognition time and the complexity to allow combining a large number of streams. Two different multi-stream decoding strategies are compared based on two-level and HMM-recombination algorithms...
This paper presents a novel base station (BS) cooperation scheme to address issues on fatal links experienced by cell-edge users based on bit interleaved repetition coded (BIRC) concatenated structures for downlink OFDM scenarios. A primary focus is on employing independent random interleavers in cooperating BSs following by BS cooperation which may be regarded as the repetition code. In early works...
Adaptation for scalable video is one of the recent challenges in video distribution over modern networks, which are heterogeneous both in terms of available bandwidth and user end terminal capability. Scalable Video Coding offers the possibility to adapt the content following the “quality layer” abstraction. In this work we present a new method to optimally define quality layers using Integer Linear...
Multi-processor Systems on Chip (MPSoCs) execute multiple applications concurrently. These applications may belong to different domains, i.e., may have firm-, soft-, or non-real time requirements. A composable system simplifies system design, integration, and verification by avoiding the inter-application interference. Existing work demonstrates composability for applications expressed using a single...
As semiconductor technology scales into deep submicron regime, transient fault vulnerability of both combinational logic and sequential logic increase rapidly. It is predicted that in 2011 transient fault rate of combinational logic will overtake that of sequential logic in processor. In this paper, particle radiation-induced multi-bit transient faults in decoder unit, representative combinational...
Brain Machine Interfaces (BMI) aim at building a direct communication link between the neural system and external devices. The decoding of neuronal signals is one of the important steps in BMI systems. Existing decoding methods commonly fall into two categories, i.e., linear methods and nonlinear methods. This paper compares the performance between the two kinds of methods in the decoding of motor...
Embedded multimedia and wireless applications require a model-based design approach in order to satisfy stringent quality and cost constraints. The Model-of-Computation (MoC) should appropriately capture system dynamics, support analysis and synthesis, and allow low-overhead model-driven implementations. This combination poses a significant challenge. The Scenario-Aware DataFlow (SADF) MoC has been...
The most well-known utility of network coding is the increase of throughput. The butterfly network is a famous example of this benefit. In this paper, we consider such a network as a noisy channel from the view of multi-user information theory. The butterfly channel combines the features of the multiple access channel, broadcast channel, and relay channel. We study the capacity of this channel with...
When a live streaming video is delivered over a peer-to-peer (P2P) network, the chunk delay is always a problem of great concern. A serious chunk delay can produce obvious discontinuity of the streaming video, resulting in low satisfaction of the service. Video on P2P is divided into several chunks and distributed to the peers. Each chunk has its own playback time deadline. The playback time of a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.