Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression

Size: px
Start display at page:

Download "Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression"

Transcription

1 Nine-Coded Copression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decopression Mohaad Tehranipour, Mehrdad Nourani Center or Integrated Circuits & Systes The Univ o Texas at Dallas Richardson, TX 7583 Krishnendu Chakrabarty Dept o Electrical and Coputer Engineering Duke University Durha, NC 778 krish@eedukeedu Abstract This paper presents a new test data copression technique based on a copression code that uses exactly nine codewords In spite o its siplicity, it provides signiicant reduction in test data volue and test application tie In addition, the decopression logic is very sall and independent o the precoputed test data set Our technique leaves any don t-care bits unchanged in the copressed test set, and these bits can be illed randoly to detect non-odeled aults The proposed technique can be eiciently adopted or single- or ultiple-scan chain designs to reduce test application tie and pin requireent Experiental results or IAS 89 bencharks illustrate the lexibility and eiciency o the proposed technique I INTRODUCTION Testing today s syste-on-chip (SoC) circuits is diicult due to large test data volue, long test application tie, high power consuption during test, and liited bandwidth o autoatic test equipent (ATE) New techniques are needed to test ebedded cores in an SoC without exceeding liits power, ATE eory and bandwidth These techniques are oten based on test resource partitioning (TRP) to reduce ATE eory and test power and tackle ATE bandwidth liitation There are several techniques to reduce SoC test data volue and test application tie Built-in sel-test (BIST) ethodology reduces the need or an expensive ATE [] In BIST, on-chip pseudo-rando pattern generators and signature copaction are used In practice, BIST cannot replace other test ethods especially or large chips due to the long tie needed to detect rando pattern resistant aults To overcoe these diiculties, deterinistic test patterns need to be transerred ro the ATE to the SoC under test to shorten overall test tie and iprove ault coverage While the ault coverage in BIST can be iproved using techniques such as reseeding [], bit lipping [3] and bit-ixing [4], these techniques need structural inoration or ault siulation and test generation Test data copression techniques are used to speed up the ATE-SoC interaction during test These techniques are used to copress the precoputed test data set T D provided by core vendor to a saller test set T E ( T E T D ) which is then stored in the ATE s eory An on-chip decoder decopresses T E to T D to be applied to the core under test Many copression techniques have been proposed in recent years, however none has becoe standardized or is universally applicable Many o the proposed solutions in the past ew years are proprietary, this reduces lexibility and interoperability aong tools Copression ethods such as statistical coding [5] [6], selective Huan o the Design, coding Autoation [7], Golob and coding Test Europe [8], FDR Conerence coding and Exhibition (DATE 4) Proceedings 53-59/4 $ 4 IEEE [9], alternating run-length coding using FDR [], EFDR coding [], MTC coding [] and VIHC coding [3] have been proposed to reduce test data volue These techniques copress T D without requiring any structural inoration or the test application ro the core vendor There are soe structural ethods or reducing test volue and tie which requires design odiication The proposed Illinois scan architecture (ILS) [4] needs ault siulation and test generation as postprocessing steps to get high ault coverage Other techniques are based on on-chip pattern decopression, such as scan-chain concealent [5], geoetric-priitive based copression [6], utation encoding [7], deterinistic ebedded test (reusing the scan chain o one core in a SoC to copress the patterns or another core) [8], packet-based copression [9] and LFSR reseeding [] [] [] An ebedded deterinistic test technology or low cost test to reduce the scan test data volue and scan test tie is presented in [] Several dictionary-based copression ethods have recently been proposed to reduce test data volue In [6], requently occurring blocks are encoded into variable-length indices using Huan coding A dictionary with ixed-length indices is used to generate all the distinct output vectors in [3] Test data copression techniques based on LZ77 and LZW ethods are proposed in [4] and [5], respectively The orer uses a dynaic dictionary and the latter uses a eory in the on-chip decoder The ethod proposed in [6] is a copression technique using dictionary with ixed-length indices There are usually a large nuber o don t-care bits in a precoputed test data set T D These don t-cares are used to help copression techniques achieve higher copression Generally, ATPG ills don t-cares randoly to have ore chance o detecting non-odeled aults to increase deect coverage Soe o the above proposed techniques replace existing don t-cares in T D with or to generate a saller T E and the on-chip decoder generates T D without don t-care Such copression ay adversely aect the ault coverage o non-odeled aults Thereore, new techniques are required to leave at least a portion o don t-caresunchanged, suchthattheycan bereplaced randoly to help detect non-odeled aults In this paper, we present a new copression technique based on a copression code with only nine codewords Our ethod achieves signiicant copression or precoputed test set, reduces test application tie, and requires a very sall decoder Since we use ixed-length blocks, the proposed ethod oers ease o synchronization between the decoder and ATE The

2 technique is quite lexible in reducing test tie and ATE s testpin requireent or single- and ultiple-scan chain designs, respectively Another advantage o the proposed technique is having letover don t-care bits in T E, which can be illed randoly to detect non-odeled aults The rest o this paper is organized as ollows Section II describes the proposed test data copression technique Section III discusses the single- and ultiple-scan chain decoder architectures, and provide test tie analysis The experiental results are shown in Section IV Finally, the paper presents the concluding rearks in Section V II 9C COMPRESSION TECHNIQUE The proposed technique is based on ixed-length-input test data copression Assue that K is thesizeo theixed-length input blocks The input test vectors are partitioned into groups o K bits and encoding is perored on each K-bit block Table I shows the proposed coding or K=8 As shown in the table, each K-bit block is divided into two K halves As shown, there are overall nine codewords For the rows to 4, each hal K-bit is atched with all s or s Rows 5-8 show the isatched bits, which have to be sent along with the codeword (UUUU is called a isatch eaning this hal has ix o and and perhaps don t-care X) Row 9 shows that each hal is a isatch and the entire K-bit block has to be sent along with the codeword The third colun shows a sybol or each case The sixth colun shows the decoder input which can be only a codeword (in the irst our rows) or codeword plus the isatch portion (in the last ive rows) Finally, the last colun shows the inal code size or each case In this technique, regardless o K, we use only nine unique codewords shown in the ith colun in Table I Hence, we call our ethod nine-coded copression, or 9C or short In the 9C technique, the input test vectors are divided into K-bit blocks and each K-bit block is divided into two parts The various cases that can arise are atched with one o the above sybols For exaple, assuing X represents don t-cares in one hal o a block, blocks o, X, X and XX are all atched with sybol Blocks o, X and X are atched with sybol Blocks o XU, U and UX, U are atched with sybols U and U, respectively We acknowledge that ore nuber o unior K-bit blocks (eg,, etc) can be added to Table I However, a systeatic coding in such cases requires 4 7 codewords This ay slightly iprove the copression ratio but results in a ore coplicated and expensive decoder In this paper we ocus on having nine codes since our experientation indicates that it provides the best tradeo between copression and decoder cost Figure Figure III 9C DECOMPRESSION ARCHITECTURE The 9C technique is lexible to be used or copressing input test data or single-scan chain or ultiple-scan chain designs Here, we propose a sall and lexible decopression architecture or each case A Single-Scan Chain Decoder B Multiple-Scan Chain Decoder Figure shows the decoder architecture or a single-scan Proceedings chain Decoder o the decodes Design, Autoation only nine and preix-ree Test in Europe codeword Conerence inde- and Exhibition (DATE 4) 53-59/4 $ 4 IEEE Ack Dec_en Clk_ate FSM Clk_soc Shit_en Sel Cnt_en Inc Done K/-bit shiter log (k/) counter 9C decoder architecture or single-scan chain C3 C C4 Dec_en S4 S C C5 Ack S S3 S5 FSM diagra o 9C decoder C7 C6 S S7 C8 S6 C9 M U X D_out pendent o K value and precoputed test data set _en The decoder consists o a inite-state achine (FSM), a log K - bit counter and an K -bit shiter The FSM takes data ro Data in to ind out which codeword has been entered I the input codeword is C, C, C 3 or C 4,allK bits are generated only with s or s accordingly When the FSM receives the codewords C 5, C 6, C 7, C 8 or C 9, it expects to receive K -bit or K-bit exact data ro Data in As shown in this igure, MUX has three inputs, and Data in which is shited through K -bit shiter Two bits select (Sel) coe ro FSM to MUX The log K -bit counter is used to control sending K -bit into scan chain The FSM sends signals Cnt en and Inc to activate and increent the counter, respectively At the sae tie, it activates signal en to enable the scan chain, hence D out is shited into the scan chain () When counter inishes counting, it sends signal Done to the FSM to send the next Sel and Cnt en Ater sending the second signal Done by counter, FSM sends Ack signal to the ATE to send the next codeword and deactivates signal en Figure shows the state diagra o the 9C decoder Note careully that it is totally independent o K It starts by checking Dec en WhenDec en is active, it receives the Data in which is the codeword ro ATE Maxiu o ive cycles are required or the longest codeword Since a K-bit block is divided into two halves, the FSM sends one Sel or each hal Ater detecting a codeword the required signals are sent to the counter, MUX and scan chain When the job is done or one received codeword, the state controller starts again ro state S Thisis done when Ack signal becoes active, then ATE sends the next codeword Let denote the nuber o scan chains in a circuit under test The 9C technique can be used to copress the input test data

3 TABLE I 9C CODING FOR K=8 Case (i) Input Block Sybol Description Codeword (C i ) Decoder Input Size (bits) All s All s 3 Let hal, right hal 5 4 Let hal, right hal 5 5 UUUU U Let hal, right hal isatch UUUU 5+K/=9 6 UUUU U Let hal isatch, right hal UUUU 5+K/=9 7 UUUU U Let hal, right hal isatch UUUU 5+K/=9 8 UUUU U Let hal isatch, right hal UUUU 5+K/=9 9 UUUU UUUU UU All isatch UUUUUUUU 4+K= vertically ie, with respect to chain In this case, the -bit data are divided into groups o K-bit blocks The decoder is shown in Figure 3 The FSM sends Cnt en to enable the log K and log K counters and Shi t en to let the D out to be shited into the -bit shiter The FSM used in ultiple-scan chain decoder is the sae as the one used or single-scan chain decoder A log K counter is used to control shiting bits into the -bit shiter Any tie that log K counter sends K bit into the -bit shiter, signal Done is sent to the FSM to send the next Sel and Cnt en and log K counter to be increented by one When the log K counter is equal to K, eaning bits have been shited into -bit shiter, it sends the signal Load to -bit shiter to load its content into the scan chains to This architecture reduces the input test pins which only one input test pin is required In this case, only one decoder is used or scan chains Assue that the length o scan chain is l Figure 4(a) shows the single-scan chain decoder, used to decode and send the test patterns into a l-bit scan chain In this case, l clock cycles are required to shit l bits into the scan chain Assue that the l bit scan chain is rearranged into groups o -bit scan chains In this case, the length o each scan chain is l Figure 4(b) shows a ultiple-scan chain decoder with one input pin and one decoder The ATE sends codewords through Data in and the decoder drives the detected bits into the -bit shiter This case does not increase test tie copared to single-scan chain, because each detected K-bitisshitedintothe-bitshiterand ater copleting -bit, the content o -bit shiter is sent into scan chains which uses l clock cycles This architecture reduces test pins to while keeping the test application tie unchanged Note that the ultiple-scan chain architecture can be extended to reduce the ATE pin count requireent to any desired raction o as shown in Figure 4(c) For exaple, assue that we use one decoder or each K-bit Instead o having - bit shiter as shown in Figure 3, we need K-bit shiter such that or each K nuber o scan chains only one input pin is required Thereore, or nuber o scan chains, K input pins and decoders are needed which increases hardware overhead but decreases the test tie by a actor o K copared to having only one input test pin (see Figure 4(c)) because K decoders work in parallel In this case, Kl clock cycles are required C Test Application Tie Reduction Reducing the overall test application tie is one o the iportant goals o any test data copression ethod In general, the aount o tie reduction depends on the copression ratio and decopression ethod In this section, we estiate the Figure 3 Ack Dec_en Clk_ate FSM Clk_soc Shit_en Sel Cnt_en Inc Done K/-bit shiter Inc log (k/) counter log (/k) counter M U X Shit_en Load 9C decoder architecture or ultiple-scan chains D_out CUT CUT CUT Decoder (a) Decoder (b) /k -bit shiter Decoder Decoder Decoder (c) k k+ k -k+ Figure 4 Dierent scan architectures: (a) Single-scan single-pin, (b) Multiplescan single-pin (c) Multiple-scan K pins overall test application tie reduction ratio (TAT) or singlescan chain Since 9C is a ixed-block copression technique, the test tie analysis is sipler copared to the variable-block copression techniques Suppose the ATE and SoC scan requencies are and scan ( scan ), respectively TAT is given by TAT% Proceedings o the Design, Autoation and Test in Europe Conerence and Exhibition (DATE 4) 53-59/4 $ 4 IEEE t no cop t cop t no cop where t no cop and t cop are the test application ties or applying uncopressed and copressed test data, respectively Assue that the scan clock requency o the syste under test is p ties that o the ATE s clock requency scan p The test application tie or the case o no copression (t no cop ) depends on the total nuber o input bits (T D )and ATE s working requency t no cop T D p T D scan Ater copressing the test data, the test application tie t cop depends on the occurrence requency (repetitions) o each

4 codeword C i LetN i denote occurrence requency o C i Thereore, in our ethod t cop is given by: t cop t t t 3 4 t 5 8 t 9 where t, t, t 3 4, t 5 8 and t 9 are the application tie o codewords C, C, C 3, C 4, C 5, C 6, C 7, C 8 and C 9,respectively Note that t 3 4=t 3 +t 4 and t 5 8=t 5 +t 6 +t 7 +t 8 When codeword C is entered into the FSM, only one ATE s clock is required (because C is one bit), K syste s clocks are needed or applying K s into the scan chain Hence, t = + K scan, where scan =p Due to the lack o space, the details o the estiation approach or all t s are not discussed here However, the tie paraeters will be: t = t = t 3 4 = t 5 8 = t 9 = K C p N K C p N K C 3 p N 3 4 K K C 5 p K K C 9 p N 9 scan N 5 8 where N, N, N 3 4, N 5 8 and N 9 are the occurrence requency o codewords C, C, C 3, C 4, C 5, C 6, C 7, C 8 and C 9, respectively Note that N 3 4=N 3 +N 4 and N 5 8=N 5 +N 6 +N 7 +N 8 C i is the size o codeword C i, that are C =, C =, C 3 = C 4 = C 5 = C 6 = C 7 = C 8 =5 and C 9 =4 IV EXPERIMENTAL RESULTS Table II shows the copression results o IAS89 s bencharks or dierent K s using 9C technique or single-scan chain The copression ratio (CR) is coputed by: CR% = T D T E T D T E = C N C N C 3 N 3 4 K C 5 N 5 8 K C 9 N 9 As seen in Table II, the axiu copression ratio or these bencharks happens in K=8, or 6 When K increases the copression ratio increases to reach a peak at K=8,, or 6 and then it starts to decrease in ost o the cases As shown, K=3 generates less copression ratio copared to other K s The last row shows the average copression ratio or each K on all bencharks and it indicates that K=8 shows ore average copression ratio copared to other K s or these bencharks It eans that having K=8 or all these bencharks, the decoder gives very high copression ratio which is independent o the bencharks and precoputed test sets The FSM has been ipleented by Synopsys Design Copiler [7] and it includes 4 gates Table III shows the letover don t-care (LX) percentage or each benchark or dierent K s These don t-care bitscan be replaced randoly to detect soe o the non-odeled aults The second colun in the table shows the existing don t-care percentage (X%) o each benchark As shown, when K increases the LX increase in which the axiu LXs or all benchark happen in K=3 Note that or K 4 each hal is a 53-59/4 $ 4 IEEE Proceedings o the Design, Autoation and Test in Europe Conerence and Exhibition (DATE 4) very sall -bit block where all don t-cares need to be replaced according to our technique The last row shows the average LX or all bencharks or each K O course, the letover don tcare bits can be also used to reduce the total scan-in power Soe researchers replace the don t-cares with or to iniize the transitions between the consecutive bits Power issue is beyond the scope o this paper Based on Tables II and III, we are able to tradeo between the letover don t-cares (LX) and copression ratio I user asks or a speciic aount o don t-cares to possibly detect soe o the non-odeled aults K is obtained ro Table III and the copression ratio is obtained ro Table II Coparing the 9C technique with the other techniques (FDR [], VIHC [3], MTC [] and Selective Huan [7]) is shown in Table IV As the last row shows the average copression ratio o the 9C technique is ore than others Table V shows the test application tie reduction or IS- CAS89 bencharks or dierent working requencies o the syste under test The next three coluns show the result or p=8, p=6 and p=4, respectively TAT is bounded by CR, eaning as p scan increases, the test application tie approaches copression ratio For exaple, assue that =MHz (a very slow ATE) and SoC requency to shit test data into scan chain scan =6MHz (p=8) The average TAT%=559%, indicates good reduction in test application tie or such a low speed ATE Table VI shows the statistics o occurrence requencies o each codeword (N i ) in the bencharks As the last row in the table shows, codeword C always happens ore requently than the other codewords which it has the iniu codeword size (one bit) C is the second requent codeword which has the second iniu codeword length (two bits) And C 9 is in third place with codeword size our bits The other codeword (C 3, C 4, C 5, C 6, C 7 and C 8 ) have the sae codeword size (ive bits) which occur less requently copared to C, C and C 9 This statistics show that the proposed coding is the best or these bencharks and indicates the coding eiciency or these bencharks and we expect it to be the sae specially or large circuits When the occurrences are dierent, the 9C technique can be eployed using a requency-directed strategy Such statistics or a circuit can be obtained apriori And or a special architecture, codewords can be rearranged according to the real occurrence requencies o codewords in the test pattern set Although or ajority o circuits we expect the order proposed in Table I be the best As shown in Table VI, soe bencharks (eg s5378, s934 and s585) do not coply with the order o occurrence requencies shown in the last row For exaple, or the bencharks s934 and s585 soe other codewords like C 8 (in s934) and C 7 (in s585) have ore occurrence requency than codeword C 9 To get the best copression ratio or these two bencharks, we change the order o codewords as C 8 in s934 and C 7 in s585 to have our bit codeword size, respectively Table VII shows the new copression results based on re-assigned codewords (requency-directed assignent) according to the occurrence requencies in these three bencharks As shown, there are slight iproveents or each K copared to the original results shown in Table II

5 TABLE II COMPRESSION RATIO FOR DIFFERENTK S Circuit T D CR% K=4 K=8 K= K=6 K= K=4 K=8 K=3 s s s s s s Avg TABLE III LEFTOVER DON T-CARES (LX) FOR DIFFERENT K S Circuit X% LX% K=4 K=8 K= K=6 K= K=4 K=8 K=3 s s s s s s Avg TABLE IV COMPARISON BETWEEN DIFFERENT TECHNIQUES Circuit K 9C FDR [] VIHC [3] MTC [] Selec Hu [7] s s s s s s Avg TABLE V TEST APPLICATION TIME REDUCTION (TAT%) USING 9C TECHNIQUE Circuit K CR% TAT% scan 8 scan 6 scan 4 s s s s s s Avg TABLE VI CODEWORD STATISTICS OF THE BENCHMARKS Circuit K N N N 3 N 4 N 5 N 6 N 7 N 8 N 9 s s s s s s Avg TABLE VII COMPRESSION RATIO FOR THREE BENCHMARKS AFTER RE-ASSIGNING THE CODEWORDS BASED ON OCCURRENCE FREQUENCIES Circuit CR% K=4 K=8 K= K=6 K= K=4 K=8 K=3 s s Proceedings o the Design, Autoation s585 and Test 658 in Europe 665Conerence and Exhibition 647 (DATE 4) /4 $ 4 IEEE

6 TABLE VIII COMPRESSION RESULTS FOR TWO LARGE CIRCUITS FROM IBM Circuit X% T D K CKT CKT We also evaluated the copression eiciency o the 9C technique or very large test sets ro IBM previously reported in [6] Circuit CKT contains 36 illion gates, 76 lip lops and requires about 6 Mbit test data Circuit CKT has illion gates, 3 lip lops and needs 4 Mbit test data Table VIII shows the copression ratio or dierent K s As shown, K=48 and K=3 show the axiu copression or CKT and CKT, respectively The style, cost and lexibility o on-chip decopresser have becoe iportant actors in practicality o copression techniques Speciically, soe decoders such as those proposed in [5] [6] [7] [3] [3] are dependent on the precoputed test set and thus are custoized or the circuit under test The decopression logics in [9] [] are independent o the precoputed test set However, since the ethods are based on variablelength coding, the nuber o codewords required to be decoded or the large circuits can be huge Thereore, or having an independent decoder, they have to consider a possible axiu length happening in the test set But, the 9C technique s decoder is totally independent o the circuit under test and precoputed test set In other words, or the circuits using the sae K, the decoder reains the sae, no atter what the precoputed test data set is This eature akes our 9C technique superior in ters o cost, lexibility and design reuse V CONCLUSION A new copression technique using only nine codewords called 9C has been proposed in this paper It signiicantly reduces the test data volue and application tie The letover don t-care bits or -5% o data volue and can be utilized or detecting soe o the non-odeled aults Using the 9C technique, it is possible to tradeo between test volue-tie, pin-count requireent and letover don t-cares Ipleentation o 9C technique on IAS bencharks has shown up to 83% copression The decopression logic is very sall and lexible and independent o the precoputed test data set ACKNOWLEDGEMENTS The work o M Tehranipour and M Nourani was supported in part by the National Science Foundation CAREER Award #CCR-353 The work o K Chakrabarty was supported by the National Science Foundation under grants CCR and CCR-477 REFERENCES [] Y Zorian, E Marinissen and S Dey, Testing Ebedded-Core-Based Syste Chips, Coputer Magazine, 3(6), pp 5-6, 999 [] S Hellebrand, H Linag and H -J Wunderlich, A Mixed-Mode BIST Schee Based on Reseeding o Folding Counters, in Proc Int Test Con (ITC ), pp , [3] H -J Wunderlich and G Kieer, Bit-Flipping BIST, in Proc Int Test Con (ITC ), pp , 996 [4] N Touba and E McCluskey, Altering a Pseudo-Rando Bit Sequence or Scan Based BIST, in Proc Int Test Con (ITC ), pp 67-75, /4 $ 4 IEEE Proceedings o the Design, Autoation and Test in Europe Conerence and Exhibition (DATE 4) [5] V Iyengar, K Chakrabarty and B Murray, Built-In Sel Testing o Sequential Circuits Using Precoputed Test Sets, in Proc VLSI Test Syp (VTS 98), pp 48-43, 998 [6] A Jas, J Ghosh-Dastidar and N Touba, Scan Vector Copression/Decopression Using Statistical Coding, in Proc VLSI Test Syp (VTS 99), pp 4-, 999 [7] A Jas, J Gosh-Dastidar, M Ng and N Touba, An Ei cient Test Vector Copression Schee Using Selective Huan Coding, IEEE Trans on Coputer-Aided Design (TCAD), vol, pp , 3 [8] A Chandra and K Chakrabarty, Syste-on-a-Chip Data Copression and Decopression Architecture Based on Golob Codes, IEEE Trans on Coputer-Aided Design (TCAD), vol, pp , [9] A Chandra and K Chakrabarty, Test Data Copression and Test Resource Partitioning or Syste-on-a-Chip Using Frequency-Directed Run-Length (FDR) Codes, IEEE Trans on Coputers (TCOMP), pp 76-88, 3 [] A Chandra and K Chakrabarty, A Unii ed Approach to Reduce SOC Test Data Volue, Scan Power and Testing Tie, IEEE Trans on Coputer-Aided Design (TCAD), pp , 3 [] A El Maleh and R Al-Abaji, Extended Frequency-Directed Run- Length Codes with Iproved Application to Syste-on-a-Chip Test Data Copression, in Proc Int Con Elect Circuits and Systes (ICECS ), pp , [] P Rosinger, P Gonciari, B Al-Hashii and N Nicolici, Siultaneous Reduction in Volue o Test Data and Power Dissipation or Syste-ona-Chip, Electronics Letters, vol 37, no 4, pp , [3] P Gonciari, B Al-Hashii and N Nicolici, IprovingCopression Ratio, Area Overhead, and Test Application Tie or Syste-on-a-chip Test Data Copression/Decopression, Design, Autoation and Test in Europe (DATE ), pp 64-6, [4] F Hsu, K Butler and J Patel, A Case Study on the Ipleentation o the Illinois Scan Architecture, in Proc Int Test Con (ITC ), pp , [5] I Bayraktaroglu and A Orailoglu, Test Volue and Application Tie Reduction Through Scan Chain Concealent, in Proc Design Autoation Con (DAC ), pp 5-55, [6] A El-Maleh, S Al Zahir and E Khan, A Geoetric-Priitives-Based Copression Schee or Testing Syste-on-Chip, in Proc VLSI Test Syp (VTS ), pp 54-59, [7] S Reda and A Orailoglu, Reducing Test Application Tie Through Test Data Mutation Encoding, in Proc Design, Autoation and Test in Europe (DATE ), pp , [8] L Schaer, R Dorsch and H -J Wunderlich, RESPIN++-Deterinistic Ebedded Test, in Proc European Test Workshop (ETW ), pp 37-44, [9] E Volkerink, A Khoche and S Mitra, Packet-Based Input Test Data Copression Technique, in Proc Int Test Con (ITC ), pp 67-75, [] C Krishna, A Jas and N Touba, Test Vector Encoding Using Partial LFSR Reseeding, in Proc Int Test Con (ITC ), pp , [] E Volkerink and S Mitra, Ei cient Seed Utilization or Reseeding Based Copression, in Proc VLSI Test Syp (VTS 3), pp 3-37, 3 [] J Rajski, et al, Ebedded Deterinistic Test or Low Cost Manuacturing Test, in Proc Int Test Con (ITC ), pp 3-3, [3] S Reddy, K Miyase, S Kajihara and I Poeranz, On Test Data Volue Reduction or Multiple Scan Chain Designs, in Proc VLSI Test Syp (VTS ), pp 3-8, [4] F Wol and C Papachristou, Multiscan-Based Test Copression and Hardware Decopression Using LZ77, in Proc Int Test Con (ITC ), pp , [5] M Knieser, F Wol, C Papachristou, D Weyer and D McIntyre, A Technique or High Ratio LZW Copression, in Proc Design, Autoation and Test in Europe (DATE 3), pp 6-, 3 [6] L Li and K Chakrabarty, Test Data Copression Using Dictionaries with Fixed Length Indices, in Proc VLSI Test Syp (VTS 3), pp 9-4, 3 [7] Synopsys Inc, User Manuals or SYNOPSYS Toolset Version 5, Synopsys, Inc,

Test Resource Partitioning and Reduced Pin-Count Testing Based on Test Data Compression

Test Resource Partitioning and Reduced Pin-Count Testing Based on Test Data Compression Test esource Partitioning and educed Pin-Count Testing Based on Test Data Compression nshuman Chandra and Krishnendu Chakrabarty Department of Electrical and Computer Engineering Duke University, Durham,

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Comparison of Gamma and Passive Neutron Non-Destructive Assay Total Measurement Uncertainty Using the High Efficiency Neutron Counter

Comparison of Gamma and Passive Neutron Non-Destructive Assay Total Measurement Uncertainty Using the High Efficiency Neutron Counter Coparison o Gaa and Passive Neutron Non-Destructive Assay Total Measureent Uncertainty Using the High Eiciency Neutron Counter John M. Veilleux Los Alaos National Laboratory Los Alaos, NM 87545, USA 505/667-7434

More information

Nonlinear Control Design of Shunt Flexible AC Transmission System Devices for Damping Power System Oscillation

Nonlinear Control Design of Shunt Flexible AC Transmission System Devices for Damping Power System Oscillation Journal o Coputer Science 7 (6): 854-858, ISSN 549-3636 Science Publications Nonlinear Control Design o Shunt Flexible AC Transission Syste Devices or Daping Power Syste Oscillation Prechanon Kukratug

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access

Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access Database ecurity ione FischerHübner Applied ecurity, DAVC7 Overview eantic Integrity Controls Access Control Rules Multilevel ecure Databases RBAC in Coercial DBM tatistical Database ecurity Relational

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths

An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths N. KRANITIS M. PSARAKIS D. GIZOPOULOS 2 A. PASCHALIS 3 Y. ZORIAN 4 Institute of Informatics & Telecommunications, NCSR

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

They may be based on a number of simplifying assumptions, and their use in design should tempered with extreme caution!

They may be based on a number of simplifying assumptions, and their use in design should tempered with extreme caution! 'Rules o Mixtures' are atheatical expressions which give soe property o the coposite in ters o the properties, quantity and arrangeent o its constituents. They ay be based on a nuber o sipliying assuptions,

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

The Fundamentals of Modal Testing

The Fundamentals of Modal Testing The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013

Calculation Method for evaluating Solar Assisted Heat Pump Systems in SAP 2009. 15 July 2013 Calculation Method for evaluating Solar Assisted Heat Pup Systes in SAP 2009 15 July 2013 Page 1 of 17 1 Introduction This docuent describes how Solar Assisted Heat Pup Systes are recognised in the National

More information

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters

Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Conerters Yang Qiu, Ming Xu, Jinjun Liu, and Fred C. Lee Center for Power Electroni Systes The Bradley Departent of Electrical

More information

Lesson 44: Acceleration, Velocity, and Period in SHM

Lesson 44: Acceleration, Velocity, and Period in SHM Lesson 44: Acceleration, Velocity, and Period in SHM Since there is a restoring force acting on objects in SHM it akes sense that the object will accelerate. In Physics 20 you are only required to explain

More information

Power Reduction Techniques in the SoC Clock Network. Clock Power

Power Reduction Techniques in the SoC Clock Network. Clock Power Power Reduction Techniques in the SoC Network Low Power Design for SoCs ASIC Tutorial SoC.1 Power Why clock power is important/large» Generally the signal with the highest frequency» Typically drives a

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Properties of Pure Substances

Properties of Pure Substances ure Substance roperties o ure Substances A substance that has a ixed cheical coposition throuhout is called a pure substance such as water, air, and nitroen. A pure substance does not hae to be o a sinle

More information

Arbitrary Density Pattern (ADP) Based Reduction of Testing Time in Scan-BIST VLSI Circuits

Arbitrary Density Pattern (ADP) Based Reduction of Testing Time in Scan-BIST VLSI Circuits Arbitrary Density Pattern (ADP) Based Reduction of Testing Time in Scan-BIST VLSI Circuits G. Naveen Balaji S. Vinoth Vijay Abstract Test power reduction done by Arbitrary Density Patterns (ADP) in which

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

Botnets Detection Based on IRC-Community

Botnets Detection Based on IRC-Community Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca

More information

AN EFFICIENT ALGORITHM FOR WRAPPER AND TAM CO-OPTIMIZATION TO REDUCE TEST APPLICATION TIME IN CORE BASED SOC

AN EFFICIENT ALGORITHM FOR WRAPPER AND TAM CO-OPTIMIZATION TO REDUCE TEST APPLICATION TIME IN CORE BASED SOC International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 7, Issue 2, March-April 2016, pp. 09-17, Article ID: IJECET_07_02_002 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=2

More information

Online Community Detection for Large Complex Networks

Online Community Detection for Large Complex Networks Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Online Counity Detection for Large Coplex Networks Wangsheng Zhang, Gang Pan, Zhaohui Wu, Shijian Li Departent

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms , March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving

More information

Doppler effect, moving sources/receivers

Doppler effect, moving sources/receivers Goals: Lecture 29 Chapter 20 Work with a ew iportant characteristics o sound waves. (e.g., Doppler eect) Chapter 21 Recognize standing waves are the superposition o two traveling waves o sae requency Study

More information

Using Bloom Filters to Refine Web Search Results

Using Bloom Filters to Refine Web Search Results Using Bloo Filters to Refine Web Search Results Navendu Jain Departent of Coputer Sciences University of Texas at Austin Austin, TX, 78712 nav@cs.utexas.edu Mike Dahlin Departent of Coputer Sciences University

More information

A New Multi-site Test for System-on-Chip Using Multi-site Star Test Architecture

A New Multi-site Test for System-on-Chip Using Multi-site Star Test Architecture A New Multi-site Test for System-on-Chip Using Multi-site Star Test Architecture Dongkwan Han, Yong Lee, and Sungho Kang As the system-on-chip (SoC) design becomes more complex, the test costs are increasing.

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Design Verification & Testing Design for Testability and Scan

Design Verification & Testing Design for Testability and Scan Overview esign for testability (FT) makes it possible to: Assure the detection of all faults in a circuit Reduce the cost and time associated with test development Reduce the execution time of performing

More information

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search 8 The Open Bioinforatics Journal, 28, 2, 8-89 Open Access odeling Cooperative Gene Regulation Using Fast Orthogonal Search Ian inz* and ichael J. Korenberg* Departent of Electrical and Coputer Engineering,

More information