By Topic

Tsinghua Science and Technology

Issue 6 • Date Dec. 2013

Filter Results

Displaying Results 1 - 13 of 13
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2013, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • SPECIAL SECTION ON MOBILE AND PERVASIVE COMPUTING 
  • A buffer management scheme for packet queues in MANET

    Publication Year: 2013, Page(s):543 - 553
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1490 KB)

    We introduce a new scheme of buffer management to handle packet queues in Mobile Ad hoc Networks (MANETs) for fixed and mobile nodes. In this scheme, we try to achieve efficient queuing in the buffer of a centrally communicating MANET node through an active queue management strategy by assigning dynamic buffer space to all neighboring nodes in proportion to the number of packets received from neig... View full abstract»

    Open Access
  • Integrating a market-based model in trust-based service systems

    Publication Year: 2013, Page(s):554 - 567
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2925 KB)

    The reputation-based trust mechanism is a way to assess the trustworthiness of offered services, based on the feedback obtained from their users. In the absence of appropriate safeguards, service users can still manipulate this feedback. Auction mechanisms have already addressed the problem of manipulation by markettrading participants. When auction mechanisms are applied to trust systems, their i... View full abstract»

    Open Access
  • Reality over web: Pervasive computing meets the web

    Publication Year: 2013, Page(s):568 - 576
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1110 KB)

    Reality over Web (RoW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture... View full abstract»

    Open Access
  • REGULAR ARTICLES 
  • Comparison of parallelization strategies for min-sum decoding of irregular LDPC codes

    Publication Year: 2013, Page(s):577 - 587
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1667 KB)

    Low-Density Parity-Check (LDPC) codes are powerful error correcting codes. LDPC decoders have been implemented as efficient error correction codes on dedicated VLSI hardware architectures in recent years. This paper describes two strategies to parallelize min-sum decoding of irregular LDPC codes. The first implements min-sum LDPC decoders on multicore platforms using OpenMP, while the other uses t... View full abstract»

    Open Access
  • CUDA's mapped memory to support I/O functions on GPU

    Publication Year: 2013, Page(s):588 - 598
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (20389 KB)

    The API interfaces provided by CUDA help programmers to get high performance CUDA applications in GPU, but they cannot support most I/O operations in device codes. The characteristics of CUDA's mapped memory are used here to create a dynamic polling service model in the host which can satisfy most I/O functions such as read/write file and “printf”. The technique to implement these I/... View full abstract»

    Open Access
  • Intermediate spoofing strategies and countermeasures

    Publication Year: 2013, Page(s):599 - 605
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1798 KB)

    Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems (GNSS) receivers, therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications. This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attac... View full abstract»

    Open Access
  • Automatic collecting representative logo images from the Internet

    Publication Year: 2013, Page(s):606 - 617
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2795 KB)

    With the explosive growth of commercial logos, high quality logo images are needed for training logo detection or recognition systems, especially for famous logos or new commercial brands. This paper focuses on automatic collecting representative logo images from the Internet without any human labeling or seed images. We propose multiple dictionary invariant sparse coding to solve this problem. Th... View full abstract»

    Open Access
  • Performance prediction for performance-sensitive queries based on algorithmic complexity

    Publication Year: 2013, Page(s):618 - 628
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (509 KB)

    Performance predictions for database queries allow service providers to determine what resources are needed to ensure their performance. Cost-based or rule-based approaches have been proposed to optimize database query execution plans. However, Virtual Machine (VM)-based database services have little or no sharing of resources or interactions between applications hosted on shared infrastructures. ... View full abstract»

    Open Access
  • Efficient leave-one-out strategy for supervised feature selection

    Publication Year: 2013, Page(s):629 - 635
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (671 KB)

    Feature selection is a key task in statistical pattern recognition. Most feature selection algorithms have been proposed based on specific objective functions which are usually intuitively reasonable but can sometimes be far from the more basic objectives of the feature selection. This paper describes how to select features such that the basic objectives, e.g., classification or clustering accurac... View full abstract»

    Open Access
  • Exploitation of locality for energy efficiency for breadth first search in fine-grain execution models

    Publication Year: 2013, Page(s):636 - 646
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1314 KB)

    In the upcoming exa-scale era, the exploitation of data locality in parallel programs is very important because it benefits both program performance and energy efficiency. However, this is a hard topic for graph algorithms such as the Breadth First Search (BFS) due to the irregular data access patterns. This study analyzes the exploitation of data locality in the BFS and its impact on the energy e... View full abstract»

    Open Access
  • Total contents

    Publication Year: 2013, Page(s):i - iv
    IEEE is not the copyright holder of this material | PDF file iconPDF (56 KB)
    Freely Available from IEEE

Aims & Scope

Tsinghua Science and Technology (Tsinghua Sci Technol) aims to highlight scientific achievements in computer science, electronic engineering, and other IT fields. Contributions all over the world are welcome.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Jiaguang Sun
School of Software
Tsinghua University
Beijing  100084 China
journal@tsinghua.edu.cn
Phone:86-10-62771385