A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A REVIEW OF ALGORITHMS AND HARDWARE IMPLEMENTATIONS IN ELECTRICAL IMPEDANCE TOMOGRAPHY (INVITED)
2020
Electromagnetic Waves
The purpose of this paper is to review state-ofthe-art methods including both algorithms and hardware implementations in EIT. ...
More specifically, for the advanced reconstruction algorithms in mainstream, we offer some insights on classification and comparison. ...
HARDWARE IMPLEMENTS Hardware system design is as fundamental as image reconstruction algorithm in EIT technology. ...
doi:10.2528/pier20120401
fatcat:niwtdmfc5nfyxo3jhgi72nswyq
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection
[chapter]
2014
IFIP Advances in Information and Communication Technology
The entropy H(X) of a variable or distribution is defined as: H(x) = − p(x)log 2 p(x). ...
The second objective of our research was to evaluate the computational speed of the three algorithms by measuring the operational latency of a hardware implementation. ...
doi:10.1007/978-3-662-45355-1_16
fatcat:33txuud7q5gwnc5wtmymgbooym
Uncertainty aware mapping of embedded systems for reliability, performance, and energy
2018
2018 19th International Symposium on Quality Electronic Design (ISQED)
This exploration is implemented as an iterative optimization algorithm. ...
In the beginning, the genetic algorithm requires an initial set of solutions, the initial population, which in our implementation we generate randomly for simplicity. ...
doi:10.1109/isqed.2018.8357284
dblp:conf/isqed/GuanMA18
fatcat:mxplxre2jfak7jyve5y4bhznbu
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities
2020
Proceedings of the IEEE
Relevant techniques include voltage overscaling [40] and frequency overscaling [41] . 2) Deterministic and Non-deterministic: The classification of deterministic and non-deterministic for approximate ...
Approximate Computing for Hardware Security Cryptographic algorithms and protocols depend on hardware implementation to achieve real-time performance and more inherent security than software implementation ...
doi:10.1109/jproc.2020.3030121
fatcat:vgxrxqkoibhgflrwq6rrfz7ofm
SHIM: a deterministic model for heterogeneous embedded systems
2006
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
We present the Tiny-SHIM language for such systems and its semantics, demonstrate how to implement it in hardware and software, and discuss how it can be used to model a real-world system. ...
Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. ...
Most are amalgams of hardware and software; the hardware is often implemented as one or more islands of synchronous logic, while the software may be single-threaded, concurrent, parallel, distributed, ...
doi:10.1109/tvlsi.2006.878473
fatcat:ogrb3aauyvd6dgybwr4e7wqmce
Towards transparent hardening of distributed systems
2013
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems - HotDep '13
For such systems, we focus here on both performance and number of changes to the existing code base. ...
To prevent error propagation in such systems, an efficient and effective technique is to harden processes against Arbitrary State Corruption (ASC) faults through local detection, without replication. ...
A user implementing a PASC-hardened algorithm must define it in terms of three types of objects: one or more messages, one or more event handlers, and a single flat process state object (see Figure 1 ...
doi:10.1145/2524224.2524230
dblp:conf/hotdep/BehrensFJS13
fatcat:yd53zb24cnax5muqjfsgnu6xoa
Particle Filters for Location Estimation in Ubiquitous Computing: A Case Study
[chapter]
2004
Lecture Notes in Computer Science
Using trace logs from a deployed multi-sensor location system, we show that particle filters can be as accurate as common deterministic algorithms. ...
distributions to higher-level services and applications. ...
We appreciate the comments, advice, and insights of our reviewers and especially our shepherd Eric Horvitz. ...
doi:10.1007/978-3-540-30119-6_6
fatcat:4k2rxojncnhm5frutepk5h3vdu
Hardware Implementation of a Bounded Algorithm for Application of Rules in a Transition P-System
2006
2006 Eighth International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
P systems or Membrane Computing are a type of a distributed, massively parallel and non deterministic system based on biological membranes. ...
This work is part of an exhaustive investigation line. The final objective is to implement a HW system that evolves as it makes a transition P-system. ...
In the case of P-systems hardware implementations only can find a few of papers: a Hardware Circuit for Selecting Active Rules [Fernandez 2005b ], connectivity arrays for membrane processors [Arroyo ...
doi:10.1109/synasc.2006.42
dblp:conf/synasc/MartinezAGF06
fatcat:2uucobxiv5cfdovsko2qlv4iwi
Device-Free Localization and Human Mapping for Ambient Assisted Living: Radio Map Approach
2019
2019 IEEE International Conference on Sensors and Nanotechnology
In this paper, we present a probabilistic DFL system using passive radio map method based on a non-parametric histogram-based approach to locate and map the passive target position in an indoor area. ...
We firstly performed system analysis on the deterministic approach for comparison with the proposed probability approach. ...
THE DEVICE FREE LOCALIZATION AND HUMAN MAPPING ALGORITHMS
Deterministic DFL Approach In the deterministic approach, we proposed an algorithm based on RSSI attenuation for our DFL system as shows in ...
doi:10.1109/sensorsnano44414.2019.8940070
fatcat:wmenjljcnba47lipfnscek6sai
An In Vivo Proposal of Cell Computing Inspired by Membrane Computing
2021
Processes
This paper introduces an in vivo solution that uses the principles of membrane computing and it can produce non-deterministic outputs. ...
The computing generation we are living in forces us to look for an alternative way of computing, as current computers are facing limitations when dealing with complex problems and bigger input data. ...
There are also some ideas about a non-deterministic proposal of universal hardware for any P-system through FP-GAs [29] . The introduced hardware ensures non-determinism and universality. ...
doi:10.3390/pr9030511
fatcat:whyaepruubennhqis6ifj4kq6q
Task-Level Data Model for Hardware Synthesis Based on Concurrent Collections
2012
Journal of Electrical and Computer Engineering
The ever-increasing design complexity of modern digital systems makes it necessary to develop electronic system-level (ESL) methodologies with automation and optimization in the higher abstraction level ...
Polyhedral models are embedded in TLDM for concise expression of task instances, array accesses, and dependencies. ...
Acknowledgement This work is partially funded by the Center for Domain-Specific Computing (NSF Expeditions in Computing Award CCF-0926127), and the Semiconductor Research Corporation under Contract 2009 ...
doi:10.1155/2012/691864
fatcat:p25oxad2e5e3neqpzegft77qhe
Adaptive Distributed Resampling Algorithm with Non-Proportional Allocation
[article]
2013
arXiv
pre-print
The distributed resampling algorithm with proportional allocation (RNA) is key to implementing particle filtering applications on parallel computer systems. ...
The ARNA algorithm requires only a few modifications to the original RNA, and is hence easy to implement. ...
ACKNOWLEDGMENTS The authors would like to thank the MOSAIC Group (MPI-CBG, Dresden) for fruitful discussions and the MadMax cluster team (MPI-CBG, Dresden) for operational support. ...
arXiv:1310.4624v3
fatcat:nz7psyxnxffufec34tg2zgdklq
Multithreading Strategies for Replicated Objects
[chapter]
2008
Lecture Notes in Computer Science
Recent publications have defined deterministic scheduling algorithms that operate at the middleware level and allow multithreading for replicated objects. ...
In addition, we provide an experimental evaluation and performance comparison of the algorithms, indicating the areas in which each algorithm performs best. ...
Motivation Object replication is an important mechanism for implementing reliable distributed applications. Many current object middleware systems support replication. ...
doi:10.1007/978-3-540-89856-6_6
fatcat:6qubbywr2za3ddvpsvvdudxnmi
Optimization of Distributed Multi-Node, Multi-GPU, Heterogeneous System for 3D Image Reconstruction in Electrical Capacitance Tomography
2016
Image Processing & Communications
The research conducted while analysing ECT algorithms has also shown that, although dynamic development of GPU computational capabilities and its recent application for image reconstruction in ECT has ...
Image reconstruction process, especially in case of 3D images, is a very time consuming task (when using classic processors and algorithms), which in turn leads to an unacceptable waiting time and currently ...
For that reason, in this work we propose a set of algorithms for a system that will subdivide data and distribute it across multiple GPUs and CPUs. ...
doi:10.1515/ipc-2016-0018
fatcat:b7tyyzutc5c7bai4kwypnpwp7a
Proposed hardware architectures of particle filter for object tracking
2012
EURASIP Journal on Advances in Signal Processing
In this article, efficient hardware architectures for particle filter (PF) are presented. We propose three different architectures for Sequential Importance Resampling Filter (SIRF) implementation. ...
The third architecture implements the SIRF as a distributed PF composed of several processing elements and central unit. ...
Algorithms and architectures for distributed PFs In this section, we discuss the different resampling algorithms for distributed PFs. ...
doi:10.1186/1687-6180-2012-17
fatcat:dthhsiry7babnpvs6tokktmliy
« Previous
Showing results 1 — 15 out of 27,460 results