Endre søk
Begrens søket
3456789 251 - 300 of 1999
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 251.
    Brink, Pontus
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Rinnarv, Jonathan
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Machine learning - neuroevolution for designing chip circuits/pathfinding2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Neural Networks have been applied in numeral broad categories of work. Such as classification, data processing, robotics, systemcontrol e.t.c. This thesis compares using traditional methods of the routing process in chip circuit design to using a Neural Network trained with evolution. Constructing and evaluating a chip design is a complicated thing, where a lot of variables have to be accounted for and therefore a simplified evaluation and design process is used in order to train the network and compare the results. This was done by constructing simple test cases and running the algorithms BFS, A*Star and the neural network and comparing the paths each algorithm found using a fitness function. The results were that BFS and A*Star both performed better on complex circuits, but the neural network was able to create better paths on very small and niche circuits. The conclusion of the study is that the neural network approach is not able to compete with the standard industry methods of the routing process, but we do not exclude the possibility that with a better designed Fitness function, this could be possible.

  • 252.
    Brodin, Alexander
    et al.
    Högskolan i Jönköping, Tekniska Högskolan.
    Peterson, Erik
    Högskolan i Jönköping, Tekniska Högskolan.
    Webbaserat ärendehanteringssystem2012Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
  • 253.
    Brorsson, Hannah
    et al.
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Jacobsson, Ingrid
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    Interaktiv vittneskonfrontation: Utvecklandet av ett Directorspel för Internet2002Independent thesis Basic level (professional degree)Oppgave
    Abstract [sv]

    This final-year project has been performed at Strix production Efterlyst. The task has been to make a page under their homepage, with a game application that’s supposed to be interesting and also have a strong connection to the TV- program.

    In the first part of the report, the reader will learn about the preparing work that was done before the work with the final game began. It is in these two test versions all the technical problems were tested, to finally be used or thrown away.

    When all this was done, a lot of effort was made to make an attractive design of the game. The different design alternatives that were made were sent to Strix, so that they could choose what they liked the most.

    After the technical description and the design, comes a part that explains how each frame in the game is constructed. In this part you can also read about the programming that were made to make the game work as it’s supposed to.

    In the end of this report you can follow the difficulties that came up during the project, and how they have been solved.

  • 254.
    Brorsson, Mats
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Collin, Mikael
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikation: Infrastruktur och tjänster, Programvaru- och datorsystem, SCS.
    Adaptive and flexible dictionary code compression for embedded applications2006Inngår i: Proceedings of the 2006 international conference on Compilers, architecture and synthesis for embedded systems, 2006, s. 113-124Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Dictionary code compression is a technique where long instructions in the memory are replaced with shorter code words used as index in a table to look up the original instructions. We present a new view of dictionary code compression for moderately high-performance processors for embedded applications. Previous work with dictionary code compression has shown decent performance and energy savings results which we verify with our own measurement that are more thorough than previously published. We also augment previous work with a more thorough analysis on the effects of cache and line size changes. In addition, we introduce the concept of aggregated profiling to allow for two or more programs to share the same dictionary contents. Finally, we also introduce dynamic dictionaries where the dictionary contents is considered to be part of the context of a process and show that the performance overhead of reloading the dictionary contents on a context switch is negligible while on the same time we can save considerable energy with a more specialized dictionary contents.

  • 255.
    Brundin, Michelle
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Morris, Peter
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Åhlman, Gustav
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Rosén, Emil
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Tekniska sektionen, Institutionen för teknikvetenskaper.
    Implementation av webbsida för rekommendationssystem med användaruppbyggd databas2012Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    The goal of this project was to create a web-based, crowd-sourced, correlational database, that easily allowed users to submit objects and receive correlated objects as results. The webservice was created in the web development languages of HTML, CSS, PHP and Javscript, with MySQL to handle the database. Simultaneous development was kept in check with the aid of the source code management system GIT. Upon completion, the service contained several HTML-views, the ability to add and rate objects, a per-object dedicated page with information parsed from Wikipedia.org, and a view with objects ranked in accordance to the preferences specific to the current user. Roughly a month after the beginning of development, the website was publicly launched and promoted in order to collect data, and improvements were added to the website as needed. Two weeks after the public launch, the collected data was measured and analyzed. The algorithm proved effective and scalable, especially with the introduction of tags and simultaneous computation of object features.

  • 256.
    Bruse, Andreas
    KTH, Skolan för datavetenskap och kommunikation (CSC).
    Exploiting Cloud Resources For Semantic Scene Understanding On Mobile Robots2015Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Modern day mobile robots are constrained in the resources available to them. Only so much hardware can be fit onto the robotic frame and at the same time they are required to perform tasks that require lots of computational resources, access to massive amounts of data and the ability to share knowledge with other robots around it.

    This thesis explores the cloud robotics approach in which complex compu- tations can be offloaded to a cloud service which can have a huge amount of computational resources and access to massive data sets. The Robot Operat- ing System, ROS, is extended to allow the robot to communicate with a high powered cluster and this system is used to test our approach on such a complex task as semantic scene understanding. The benefits of the cloud approach is utilized to connect to a cloud based object detection system and to build a cat- egorization system relying on large scale datasets and a parallel computation model. Finally a method is proposed for building a consistent scene description by exploiting semantic relationships between objects.

  • 257.
    Buckland, Philip I.
    et al.
    Umeå universitet, Humanistiska fakulteten, Institutionen för idé- och samhällsstudier, Miljöarkeologiska laboratoriet.
    Sjölander, Mattias
    Umeå universitet, Humanistiska fakulteten, Institutionen för idé- och samhällsstudier, Miljöarkeologiska laboratoriet.
    Eriksson, Erik J.
    ICT Services and System Development (ITS), Umeå University, Umeå, Sweden.
    Strategic Environmental Archaeology Database (SEAD)2018Inngår i: Encyclopedia of global archaeology / [ed] Smith, C., Cham: Springer, 2018, 2Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Environmental archaeology encompasses a wide range of scientific methods for analyzing the results of past human activities, environments, climates, and perhaps, most importantly, the relationships between these. Many of these methods are referred to as proxy analyses, denoting the illumination of the past as interpreted indirectly through the evidence of fossil organisms or properties. These lines of evidence, or proxy data sources, are assumed to reflect past conditions by way of their dependence on them. For example, a species of beetle may only survive within a specific climate range, and thus its presence in samples indicates this climate at the time of deposition; organic waste deposited around a farmstead will raise soil phosphate levels above those of the surrounding land; and the presence of cereal grains in postholes suggests their local cultivation or import, usage, or storage.

  • 258.
    Buckwalter, Claes
    Linköpings universitet, Institutionen för teknik och naturvetenskap.
    INFLOW: Structured Print Job Delivery2003Independent thesis Basic level (professional degree)Oppgave
    Abstract [en]

    More and more print jobs are delivered from customer to printer digitally over the Internet. Although Internet-based job delivery can be highly efficient, companies in the graphic arts and printing industry often suffer unnecessary costs related to this type of inflow of print jobs to their production workflows. One of the reasons for this is the lack of a well-defined infrastructure for delivering print jobs digitally over the Internet.

    This thesis presents INFLOW - a prototype for a print job delivery system for the graphic arts and printing industry. INFLOW is a web-based job delivery system that is hosted on an Internet-connected server by the organization receiving the print jobs. Focus has been on creating a system that is easy to use, highly customizable, secure, and easy to integrate with existing and future systems from third-party vendors. INFLOW has been implemented using open standards, such as XML and JDF (Job Definition Format).

    The requirements for ease-of-use, high customizability and security are met by choosing a web-based architecture. The client side is implemented using standard web technologies such as HTML, CSS and JavaScript while the serverside is based on J2EE, Java Servlets and Java Server Pages (JSP). Using a web browser as a job delivery client provides a highly customizable user interface and built in support for encrypted file transfers using HTTPS (HTTP over SSL).

    Process automation and easy integration with other print production systems is facilitated with CIP4’s JDF (Job Definition Format). INFLOW also supports"hot folder workflows"for integration with older preflight software and other hot folder-based software common in prepress workflows.

  • 259.
    Burghout, Wilco
    KTH, Tidigare Institutioner                               , Infrastruktur.
    Hybrid microscopic-mesoscopic traffic simulation2004Doktoravhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    Traffic simulation is an important tool for modelling the operations of dynamic traffic systems and helps analyse the causes and potential solutions of traffic problems such as congestion and traffic safety. Microscopic simulation models provide a detailed representation of the traffic process, which makes them most suitable for evaluation of complicated traffic facilities and Intelligent Transportation Systems that often consist of complex traffic management, safety and information systems. Macroscopic and mesoscopic models on the other hand, capture traffic dynamics in lesser detail, but are faster and easier to apply and calibrate than microscopic models. Therefore they are most suitable for modelling large networks, while microscopic models are usually applied to smaller areas.

    The objective of this thesis is to combine the strengths of both modelling approaches and diminish their individual weaknesses by constructing a hybrid mesoscopic-microscopic model that applies microscopic simulation to areas of specific interest, while simulating a surrounding network in lesser detail with a mesoscopic model.

    Earlier attempts at hybrid modelling have concentrated on integrating macroscopic and microscopic models and have proved difficult due to the large difference between the continuous-flow representation of traffic in macroscopic models and the detailed vehicle-and driver-behaviour represented in microscopic models. These problems are solved in this thesis by developing a mesoscopic vehicle-based and event-based model that avoids the (dis)aggregation problems of traffic flows at the inter-model boundaries. In addition, this thesis focuses on the general problems of consistency across the entire hybrid model.

    The requirements are identified that are important for a hybrid model to be consistent across the models at different levels of detail. These requirements vary from network and route-choice consistency to consistency of traffic dynamics across the boundaries of the micro- and mesoscopic submodels. An integration framework is proposed that satisfies these requirements. This integration framework has been implemented in a prototype hybrid model, MiMe, which is used to demonstrate the correctness of the solutions to the various integration issues. The hybrid model integrates MITSIMLab, a microscopic traffic simulation model, and Mezzo, the newly developed mesoscopic model. Both the hybrid model and the new Mezzo model are applied in a number of case studies, including a network in the North of Stockholm, which show their validity and applicability. The results are promising and support both the proposed integration architecture and the importance of integrating microscopic and mesoscopic models.

  • 260.
    Burman, Erik
    et al.
    Department of Mathematics, University College London, London, United Kingdom.
    Hansbo, Peter
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Material och tillverkning.
    Larson, Mats G.
    Department of Mathematics and Mathematical Statistics, Umeå University, Umeå, Sweden.
    A simple finite element method for elliptic bulk problems with embedded surfaces2019Inngår i: Computational Geosciences, ISSN 1420-0597, E-ISSN 1573-1499, Vol. 23, nr 1, s. 189-199Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper, we develop a simple finite element method for simulation of embedded layers of high permeability in a matrix of lower permeability using a basic model of Darcy flow in embedded cracks. The cracks are allowed to cut through the mesh in arbitrary fashion and we take the flow in the crack into account by superposition. The fact that we use continuous elements leads to suboptimal convergence due to the loss of regularity across the crack. We therefore refine the mesh in the vicinity of the crack in order to recover optimal order convergence in terms of the global mesh parameter. The proper degree of refinement is determined based on an a priori error estimate and can thus be performed before the actual finite element computation is started. Numerical examples showing this effect and confirming the theoretical results are provided. The approach is easy to implement and beneficial for rapid assessment of the effect of crack orientation and may for example be used in an optimization loop. 

  • 261.
    Bustos, Sebastian
    et al.
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Grek, Niklas
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Data- och elektroteknik.
    Säkerhetsklassificering av IT-system på Fläkt Woods AB2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    This report presents a method for modelling a computer system from a security perspective. The questions that are going to be treated are:

    • What defines a secure system and how does the company relate to these factors?

    • What are the threats today based on hardware/software, human factors and company routines/policies?

    • What measures should be taken for the organisation to reach a higher level of security for their systems?

    • How do we develop a method for classification of security and what components should it contain?

    • What changes are reasonable and necessary with the respect to the company’s resources?

    The report has been done through interviews and analysis of existing systems on Fläkt Woods AB. From analysis of material, the aspects judged relevant to the subject and to the company’s needs, have been compiled to a document. It is a model for guidelines to work with security classification of IT-systems.

    The combination of the method for information and the security classification has been clear through the work on the rapport. The method that has been developed for work with security classification of IT systems can therefore not be used as an isolated occurrence to reach the wanted results but should be integrated with the existing classification of information.

    Our conclusions are reflected by the complexity of the project together with the fact that computer security is a topic that includes all parts in an IT- supported organisation. The analyses have given us a good picture of the threats to an organisation. It has clearly been shown, that much security related problems are based on direct organisational problems such as the lack of resources and requirements of system specific guidelines and policies.

  • 262.
    Butun, Ismail
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Pereira, Nuno
    Polytechnic Institute of Porto, Porto, Portugal .
    Gidlund, Mikael
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Analysis of LoRaWAN V1.1 Security2018Inngår i: Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS '18)., ACM Digital Library, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    LoRa and the LoRaWAN specification is a technology for Low Power Wide Area Networks (LPWAN) designed to allow connectivity for connected objects, such as remote sensors. Several previous works revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft) and these led to improvements included in LoRaWAN v1.1, released on Oct 11, 2017. In this work, we provide the first look into the security of LoRaWAN v1.1. We present an overview of the protocol and, importantly, present several threats to this new version of the protocol. Besides, we propose our own ramification strategies for the mentioned threats, to be used in developing next version of LoRaWAN. The threats presented were not previously discussed, they are possible even within the security assumptions of the specification and are relevant for practitioners implementing LoRa-based applications as well researchers and the future evolution of the LoRaWAN specification.

  • 263.
    Bygdeson, Andreas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informations- och kommunikationssystem.
    Cartographer: En kartbaserad friluftsapplikation2016Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Målet med det här arbetet har varit att utveckla en friluftsapplikation för människor som rör sig i skog och mark antingen i arbetet eller i privatlivet. Med syfte att låta de skapa och placera ut markörer på en karta med aktivt uppdaterande gps positionering. För att uppnå detta har Google Maps använts som gränssnitt för att hämta och hantera kartinformation och en applikation har designats i flödesscheman utefter kravspecifikationen och i enlighet med Jacob Nielsens användbarhetsprinciper. Hallway test metoden har använts för att utvärdera hur väl användbarhetsdesignen har uppnått sina mål. Applikationen har sedan konstruerats i Java och Android Studio mot Androids mobila plattform. Utvecklingen har följt den planerade designen och uppnått samtliga konkreta mål som specificerades och i synnerhet användbarhetsmålen. Flera funktionella mål har identifierats att kunna optimeras ytterligare och en rad förslag på vidareutveckling av applikationen har tagits fram för eventuella framtida arbeten.

  • 264.
    Bygdeson, Mattias
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationssystem och –teknologi.
    Utvecklingen av Spotalike2019Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    The goal with this assignment has been to study the product Spotalike and develop a new version to make the product more attractive. The studying of the product was done with the help of user data, such as how Spotalike is being used, what target audience it has, why it's being used, etc. The new version of Spotalike was planned by making design sketches and prototypes which were created as a first step in order to get a better picture of what the result would be. The new version is not available to the public, but it is fully functional and works locally. The solution that was concluded was to develop a music player which is built on the founding principles of the old Spotalike. The music player is developed with React and is powered by Spotify. Besides the old functions there are also new functions that has been implemented, and the interface has been redesigned. There is currently no new user data available to determine the result of the development, since the new version of Spotalike hasn't been made public yet.

  • 265.
    Bäckstedt, Dennis
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Felsökning och optimering av trådlöst nätverk IEEE 802.11ac2017Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Trådlösa nätverk växer sig allt starkare och normen är nu mera att man i ett kontorslandskap eller

    hem skall kunna slå sig ner med sin laptop och jobba utan att behöva oroa sig om nätverksuttag

    eller sladdar. Även IP-telefoni och surfplattor är nu en naturlig del i flera användares dagliga liv,

    och just IP-telefoni ställer höga krav på det nätverk som denna är ansluten till. Därför har jag

    valt att i denna denna rapport titta närmare på den trådlösa tekniken 802.11 som är framtagen av

    standardiseringsorganisationen IEEE. Metoden jag valt att använda för att åstadkomma detta är

    att genomföra en mätning av ett befintligt trådlöst nät. Jag kommer därefter att undersöka denna

    data för att förhoppningsvis kunna lämna ett förslag på en bättre nätverksdesign. Som hjälpmedel

    för att genomföra denna mätning har jag utrustning från Ekahau, ett finsk företag vars huvudsyssla

    är just mätning, optimering och felsökning av trådlösa nät. Det jag kom fram till var att det tråd-

    lösa nätverket hade stora brister. Framförallt var täckning det stora bekymret, inte bara bristen på

    täckning utan ibland även för bra täckning vilket resulterat i sticky clients. Jag har därefter presen-

    terat en design som för att minimera kostnaderna och miljöpåverkan använder befintlig utrustning,

    dock kräver denna att det kompletteras med 9 stycken nya accesspunkter.

  • 266.
    Bäckström, David
    Linköpings universitet, Institutionen för datavetenskap.
    Boundary-Scan in the ATCA standard2005Independent thesis Basic level (professional degree), 20 poäng / 30 hpOppgave
    Abstract [en]

    Larger systems today, like telephone and optical switches, are usually based on a multiboard architecture where a set of printed-circuit boards are connected to a backplane board. These systems are also equipped with Boundary-Scan to enable testing, however, the backplane in a multi-board system has a limited wiring capability, which makes the additional backplane Boundary-Scan wiring highly costly. The problem is to access the Boundary-Scan enabled boards with the Boundary-Scan controller located at a central board. In this MSc. thesis project we propose an approach suitable for the Advanced Telecommunication Computing Architecture (ATCA) standard where we make use of the existing Intelligent Platform Management Bus (IPMB) and expands its protocol for application of Boundary-Scan tests. We have also defined a command set as well as a test data format for storing embedded test data on the boards to support the remote execution of Boundary-Scan tests. For validation of the proposed approach we have developed demonstrator.

  • 267.
    Bäckström, David
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Pulstågsmodul2006Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 268.
    Bäckström, Jonas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Limitations of Azure in GIS Scalability: A performance and migration study2012Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    In this study, the cloud platform Windows Azure has been targeted for test implementations of Geographical Information System (GIS) software in the form of map servers and tile caches. The map servers included were GeoServer, MapNik, MapServer and SharpMap, which together with the tile caches, GeoWebCache, MapCache and TileCache, were installed on Windows Azures three different virtual machine roles (Web, Worker and VM). Furthermore, different techniques for scalingapplications and internal role communication are presented, followed by four sets of performance tests. The performance tests attempt to highlight the differences in request times, how the different role sizes handle the load from the incoming requests, how the different role sizes handle many concurrent TCP-connections and how well the incoming requests are load balanced in between the worker roles. The test implementations showed that all map servers and tile caches were successfully installed in Azure, which leads to the conclusion that Windows Azure is suitable for hosting GIS software with similar installation requirements to the previously mentioned software. Four different approaches (Direct mapping, Public Internal Endpoints, Queue and Worker Role Request Broker) are presented showing how Azure allows different methods in order to scale the internal role communication as well as the external client requests. The performance tests provided somewhat inconclusive test results due to hardware limitations in the test setup. This made it difficult to draw concluding parallels between the final results and the expected values. Minor tendencies in performance gain can be seen when scaling the VM size as well as the number of VMs.

  • 269.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Inbyggda system (CERES).
    Handover in IEEE 802.11p-based delay-sensitive vehicle-to-infrastructure communication2009Rapport (Annet vitenskapelig)
    Abstract [en]

    Based on communication and cooperation between vehicles and roadside infrastructure, Intelligent Transport Systems (ITS) safety applications offer great potential to avoid traffic accidents or at least reduce their impact. As these applications usually are delay-sensitive, the delay introduced by waiting for access to the wireless communication channel should both be reduced and provided with an upper bound. The proposed IEEE 802.11p standard for short to medium range vehicular communication does not offer these guarantees. In previous work, we presented a MAC (Medium Access Control) enhancement supporting delay-sensitive, safety-critical V2I (Vehicle-to-Infrastructure) applications. Since the proposed enhancement requires a deterministic and fast mechanism to associate a vehicle to a roadside unit (RSU) so that it can be integrated into the centralized polling schedule, we now target the handover and connection setup between a vehicle and an RSU. Although the first connection setup with an RSU still underlies the randomness of the original 802.11p MAC method, we provide a deterministic solution to further enhance the handover procedures by introducing a fast, proactive handover mechanism. We show that the overhead of our solution is limited and still allows our MAC protocol to support safety-critical V2I applications in a densely trafficked highway scenario.

  • 270.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Position-based data traffic prioritization in safety-critical, real-time vehicle-to-infrastructure communication2009Inngår i: IEEE International Conference on Communications Workshops, 2009. ICC Workshops 2009 / [ed] IEEE, Piscataway, N.J.: IEEE Press, 2009, s. 205-210Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Future active-safety applications in vehicular networks rely heavily on the support for real-time inter-vehicle communication. The Medium Access Control (MAC) mechanism proposed for the upcoming IEEE 802.11p standard intended for Intelligent Transport Systems (ITS) applications does not offer deterministic real-time support, i.e., the channel access delay is not upper bounded. We therefore propose a vehicle-to-infrastructure (V2I) communication solution extending IEEE 802.11p, by introducing a collision-free MAC phase with an enhanced prioritization mechanism based on vehicle positions and the overall road traffic density. A road side unit using a polling mechanism is then able to provide real-time support such that it can guarantee collision-free channel access within its transmission range. Part of the bandwidth remains unchanged such that best-effort services like ongoing vehicle-to-vehicle (V2V) applications may continue. Our solution guarantees that all communication deadlines of the V2I applications are met, while minimizing the required length of the collision-free phase. This in turn maximizes the amount of bandwidth available for best-effort services and ongoing V2V applications. The position-based prioritization mechanism further improves the throughput of both real-time and best-effort data traffic by focusing the communication resources to the most hazardous areas. The concept is evaluated analytically based on a realistic task set from a V2I merge assistance scenario.

  • 271.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Jonsson, Magnus
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Kunert, Kristina
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    A fibre-optic AWG-based real-time network for high-performance embedded computing2004Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this paper, an architecture and a Medium Access Control (MAC) protocol for a multiwavelength optical communication network, applicable in short range communication systems like System Area Networks (SANs), are proposed. The main focus lies on guaranteed support for hard and soft real-time traffic. The network is based upon a single-hop star topology with an Arrayed Waveguide Grating (AWG) at its center. Traffic scheduling is centralized in one node (residing together with the AWG in a hub), which communicates through a physical control channel. The AWG’s property of spatial wavelength reuse and the combination of fixedtuned and tunable transceivers in the nodes enable simultaneous control and data transmission. A case study with defined real-time communication requirements in the field of Radar Signal Processing (RSP) was carried out and indicates that the proposed system is very suitable for this kind of application.

  • 272.
    Böhm, Annette
    et al.
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Kunert, Kristina
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Data age based MAC scheme for fast and reliable communication within and between platoons of vehicles2016Inngår i: International Conference on Wireless and Mobile Computing, Networking and Communications, Piscataway: IEEE, 2016Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Heavy vehicles driving as platoon with highly reduced inter-vehicle gaps has shown considerable fuel saving potential, but put high timing and reliability requirements on the underlying control data exchange. The recently standardized IEEE 802.11p protocol suite for Vehicular Ad-Hoc Networks (VANETs) and its message types do neither support the demands of a platooning application nor take advantage of its properties. We therefore propose a framework for centralized channel access with retransmission capabilities for safety critical control data exchange based on the data age of earlier received messages, DA-RE (Data Age based REtransmission scheme). A simulation comparison to the 802.11p random access Medium Access Control (MAC) protocol shows that the intelligent assignment of retransmission opportunities considerably improves the reliability of platooning control data. We also propose a power control based scheme for early platoon detection allowing several platoons to temporarily share a channel and show that the safe and reliable operation of their vehicles is not compromised. © 2016 IEEE.

  • 273.
    Böök, Daniel
    Linköpings universitet, Institutionen för systemteknik, Informationskodning.
    Make it Simpler: Structure-aware mesh decimation of large scale models2019Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    A 3D-model consists out of triangles, and in many cases, the amount of triangles are unnecessarily large for the application of the model. If the camera is far away from a model, why should all triangles be there when in reality it would make sense to only show the contour of the model? Mesh decimation is often used to solve this problem, and its goal is to minimize the amount of triangles while still keep the visual representation intact. Having the decimation algorithm being structure aware, i.e. having the algorithm aware of where the important parts of the model are, such as corners, is of great benefit when doing extreme simplification. The algorithm can then decimate large, almost planar parts, to only a few triangles while keeping the important features detailed. This thesis aims to describe the development of a structure aware decimation algorithm for the company Spotscale, a company specialized in creating 3D-models of drone footage.

  • 274. Calandriello, Giorgio
    et al.
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Lioy, Antonio
    Efficient and Robust Pseudonymous Authentication in VANET2007Inngår i: VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, 2007, s. 19-27Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security and privacy-enhancing mechanisms axe essential for the wide-spread adoption of the VANET technology. In this paper, we are concerned with this problem; and in particular, how to achieve efficient and robust pseudonym-based authentication. We design mechanisms that reduce the security overhead for safety beaconing, and retain robustness for transportation safety, even in adverse network settings. Moreover, we show how to enhance the availability and usability of privacy-enhancing VANET mechanisms: Our proposal enables vehicle on-board units to generate their own pseudonyms, without affecting the system security.

  • 275.
    Carbone, Marco
    et al.
    IT Univ Copenhagen, Rued Langgaards Vej 7, DK-2300 Copenhagen, Denmark..
    Hildebrandt, Thomas
    IT Univ Copenhagen, Rued Langgaards Vej 7, DK-2300 Copenhagen, Denmark..
    Parrow, Joachim
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datalogi.
    Weidlich, Matthias
    Humboldt Univ, Unter Linden 6, D-10099 Berlin, Germany..
    Extended versions of papers presented at WS-FM 2014 and Beat 20142016Inngår i: Formal Aspects of Computing, ISSN 0934-5043, E-ISSN 1433-299X, Vol. 28, nr 4, s. 529-530Artikkel i tidsskrift (Annet vitenskapelig)
  • 276.
    Carlos, Perez Penichet
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Noda, Claro
    Mid-Sweden University, Sweden.
    Varshney, Ambuj
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Voigt, Thiemo
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Battery-free 802.15. 4 Receiver2018Inngår i: 7th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), IEEE, 2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We present the architecture of an 802.15.4 receiver that, for the first time, operates at a few hundred microwatts, enabling new battery-free applications. To reach the required micro-power consumption, the architecture diverges from that of commodity receivers in two important ways. First, it offloads the power-hungry local oscillator to an external device, much like backscatter transmitters do. Second, we avoid the energy cost of demodulating a phase-modulated signal by treating 802.15.4 as a frequency-modulated one, which allows us to receive with a simple passive detector and an energy-efficient thresholding circuit. We describe a prototype that can receive 802.15.4 frames with a power consumption of 361 μW. Our receiver prototype achieves sufficient communication range to integrate with deployed wireless sensor networks (WSNs). We illustrate this integration by pairing the prototype with an 802.15.4 backscatter transmitter and integrating it with unmodified 802.15.4 sensor nodes running the TSCH and Glossy protocols.

  • 277.
    Carlos, Perez Penichet
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Noda, Claro
    Mid-Sweden University, Sweden.
    Varshney, Ambuj
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Voigt, Thiemo
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Demo Abstract: Battery-Free 802.15.4 Receiver2018Inngår i: 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), IEEE, 2018, s. 130-131Konferansepaper (Fagfellevurdert)
    Abstract [en]

    We present the architecture for an 802.15.4 receiver that enables battery-free operation. To reach micro-power consumption, the architecture diverges from that of commodity receivers in the following ways: First, similar to backscatter transmitters, it offloads the power-hungry local oscillator to an external device. Second, we avoid the energy cost of demodulating a phase-modulated signal by treating 802.15.4 as a frequency-modulated one, allowing us to receive with a simple passive detector and an energy-efficient thresholding circuit. We demonstrate an off-the-shelf prototype of our receiver receives 802.15.4 from a distance of 470 cm with the carrier generator 30 cm away. This range is sufficient to integrate with deployed wireless sensor networks (WSNs). We demonstrate this integration by pairing our receiver with a 802.15.4 backscatter transmitter and integrating it with unmodified commodity sensor nodes running the TSCH protocol.

  • 278.
    Carlson, Trevor E.
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Heirman, Wim
    Intel, ExaSci Lab, Santa Clara, CA USA..
    Allam, Osman
    Univ Ghent, B-9000 Ghent, Belgium..
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Eeckhout, Lieven
    Univ Ghent, B-9000 Ghent, Belgium..
    The Load Slice Core Microarchitecture2015Inngår i: 2015 ACM/IEEE 42Nd Annual International Symposium On Computer Architecture (ISCA), 2015, s. 272-284Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Driven by the motivation to expose instruction-level parallelism (ILP), microprocessor cores have evolved from simple, in-order pipelines into complex, superscalar out-of-order designs. By extracting ILP, these processors also enable parallel cache and memory operations as a useful side-effect. Today, however, the growing off-chip memory wall and complex cache hierarchies of many-core processors make cache and memory accesses ever more costly. This increases the importance of extracting memory hierarchy parallelism (MHP), while reducing the net impact of more general, yet complex and power-hungry ILP-extraction techniques. In addition, for multi-core processors operating in power- and energy-constrained environments, energy-efficiency has largely replaced single-thread performance as the primary concern. Based on this observation, we propose a core microarchitecture that is aimed squarely at generating parallel accesses to the memory hierarchy while maximizing energy efficiency. The Load Slice Core extends the efficient in-order, stall-on-use core with a second in-order pipeline that enables memory accesses and address-generating instructions to bypass stalled instructions in the main pipeline. Backward program slices containing address-generating instructions leading up to loads and stores are extracted automatically by the hardware, using a novel iterative algorithm that requires no software support or recompilation. On average, the Load Slice Core improves performance over a baseline in-order processor by 53% with overheads of only 15% in area and 22% in power, leading to an increase in energy efficiency (MIPS/Watt) over in-order and out-of-order designs by 43% and over 4.7x, respectively. In addition, for a power- and area-constrained many-core design, the Load Slice Core outperforms both in-order and out-of-order designs, achieving a 53% and 95% higher performance, respectively, thus providing an alternative direction for future many-core processors.

  • 279.
    Carlsson, Arthur
    Linköpings universitet, Institutionen för datavetenskap.
    Integration av AJAX i JDP: En studie i hur WM-data kan utveckla modelleringsstödet i ett webbramverk2008Independent thesis Advanced level (degree of Magister), 20 poäng / 30 hpOppgave
    Abstract [sv]

    På WM-data har man utvecklat ett ramverk som heter Java Development Platform med avsikt att modellera större delar av ett system och därmed minska mängden kod som måste skrivas för hand. Ramverket baseras helt på existerande öppna lösningar och används vid utveckling av webbaserade system och skapar en skiktat lösning med en webbapplikation som presentationslager. Problemet är att webbapplikationen har kommit att bli väldigt svår att modellera i enhet med resten av systemet framför allt på grund av den hårda kopplingen till Struts-ramverket. Samtidigt har man börjat få upp ögonen för AJAX och vad det skulle kunna tillföra ramverket.

    Examensarbetet fokuserar på att utreda de problem som existerar i ramverket samt undersöka integrationen av AJAX ur en synvinkel som gynnar dagens lösning. Detta görs genom litteraturstudier, laborationer och genom att undersöka existerande ramverk och plattformar som löser liknande problem. Fokus ligger även på hur AJAX kan användas för att lösa problemen i modelleringen.

    Resultatet av arbetet mynnar ut i en analys som behandlar de aspekter som krävs för att AJAX ska kunna bli en del av JDP-ramverket. Analysen innefattar också synen på hur AJAX skulle kunna användas för att underlätta modelleringen av webbapplikationen utan att införa något nytt modelleringsverktyg, det vill säga att UML fortfarande kan användas.

  • 280.
    Carlsson, Jonas
    Linköpings universitet, Institutionen för systemteknik. Linköpings universitet, Tekniska högskolan.
    Studies on asynchronous communication ports for GALS systems2005Licentiatavhandling, monografi (Annet vitenskapelig)
    Abstract [en]

    Digital systems generally use a global clock signal for the whole system. A System-on-Chip may have to communicate with the environment, using several different data rates that does not fit well to the single global clock frequency. When designing a digital system, it might be beneficial to divide the system into different clock domains where each domain can operate with its own clock frequency.

    In this thesis, various clocking schemes are discussed. The synchronous clocking schemes that are discussed are mesochronous, plesiochronous, rational, oversampling and arbitrary clocking schemes.

    The thesis focuses on the Globally Asynchronous Locally Synchronous scheme. This scheme transfers information between the different clock domains through dedicated communication channels. These communication channels use asynchronous handshaking protocols to transfer information without the necessity for a clock.

    A communication channel consists of a transmitting and receiving port. Two types of communication ports are proposed in the thesis. The communication ports can be used either in a system with a static schedule or dynamic schedule of transactions. One of the ports can easily be implemented in different CMOS processes, since it only uses standard cells that can be found in most existing CMOS processes standard library.

    A 2-dimensional Discrete Cosine Transform has been implemented using the GALS scheme and one of the proposed communication ports. The 2-D DCT has been implemented using a standard cell library supplied by AMS fora 0.35 µm CMOS process. A few improvements to the implementation are also discussed in the thesis.

  • 281.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    BGP oscillations when peering with loopback addresses2006Inngår i: 20th International Conference on Advanced Information Networking and Applications, Vol 2, Proceedings / [ed] Martin DC, LOS ALAMITOS, USA: IEEE COMPUTER SOC , 2006, s. 712-716Konferansepaper (Fagfellevurdert)
    Abstract [en]

    An oscillating routing protocol will result in increased protocol activity and may lead to increased router CPU activity and memory consumption.  This case study shows that BGP peering using loopback addresses when peering EBGP between two dualhomed ASes will cause BGP to oscillate. It includes a detailed lab report in which several possible setups that will cause BGP to oscillate are presented. It also includes an oscillation event from one of the world's largest production networks that was caused by such a setup.

  • 282.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Improving BGP convergence properties and web content blocking using BGP2006Licentiatavhandling, med artikler (Annet vitenskapelig)
  • 283.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Perceived problems with BGP: a survey2006Rapport (Annet vitenskapelig)
  • 284.
    Carlzon, Malin
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Resetting a damped out route in BGP2006Rapport (Annet vitenskapelig)
  • 285.
    Carlzon, Malin
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Hagsand, Olof
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Widell, Fredrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Danielsson, Björn
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Blocking web contents using BGP: measurements and observations2006Rapport (Annet vitenskapelig)
  • 286. Casoni, E.
    et al.
    Jerusalem, A.
    Samaniego, C.
    Eguzkitza, B.
    Lafortune, P.
    Tjahjanto, Denny
    KTH, Skolan för teknikvetenskap (SCI), Hållfasthetslära (Inst.). IMDEA Materials Institute, Spain .
    Saez, X.
    Houzeaux, G.
    Vazquez, M.
    Alya: Computational Solid Mechanics for Supercomputers2015Inngår i: Archives of Computational Methods in Engineering, ISSN 1134-3060, E-ISSN 1886-1784, Vol. 22, nr 4, s. 557-576Artikkel, forskningsoversikt (Fagfellevurdert)
    Abstract [en]

    While solid mechanics codes are now conventional tools both in industry and research, the increasingly more exigent requirements of both sectors are fuelling the need for more computational power and more advanced algorithms. For obvious reasons, commercial codes are lagging behind academic codes often dedicated either to the implementation of one new technique, or the upscaling of current conventional codes to tackle massively large scale computational problems. Only in a few cases, both approaches have been followed simultaneously. In this article, a solid mechanics simulation strategy for parallel supercomputers based on a hybrid approach is presented. Hybrid parallelization exploits the thread-level parallelism of multicore architectures, combining MPI tasks with OpenMP threads. This paper describes the proposed strategy, programmed in Alya, a parallel multi-physics code. Hybrid parallelization is specially well suited for the current trend of supercomputers, namely large clusters of multicores. The strategy is assessed through transient non-linear solid mechanics problems, both for explicit and implicit schemes, running on thousands of cores. In order to demonstrate the flexibility of the proposed strategy under advance algorithmic evolution of computational mechanics, a non-local parallel overset meshes method (Chimera-like) is implemented and the conservation of the scalability is demonstrated.

  • 287.
    Castberg, Miro
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Adaptor Development: An insight to interfacing with electrical energy meters2011Independent thesis Basic level (university diploma), 10 poäng / 15 hpOppgave
    Abstract [en]

    Since energy meters became more advanced and able to send data remotely, energy suppliers have had a need to keep their data managed. This gave birth to energy management systems which gather data from energy meters. However, for every type of meter there needs to be a specialization in the management system.

    Smart Metering Language (SML) is a protocol which was created to transfer meter data in as simple way as possible. Implementing the protocol would result in simpler and less vendor-specific solutions for energy management systems.

    This report follows the process of developing an adaptor between a device using the SML protocol and a system that manages energy meters. The thesis uses different parts of the development process in able to show specializations which were needed by the test device and its vendor. 

    The result sums up the experience of developing an adaptor and the specializations which are needed in the SML protocol.

  • 288. Catalan Rivas, Victoria
    et al.
    Fröjd, Emil
    Homberg, Tobias
    Ragnarsson, Felix
    Rick, Elsa
    Corneo, Lorenzo
    Varshney, Ambuj
    Rohner, Christian
    Voigt, Thiemo
    Gunningberg, Per
    Environmental Control at the Edge2018Konferansepaper (Annet vitenskapelig)
  • 289.
    Ceballos, Germán
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Grass, Thomas
    Hugo, Andra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Analyzing performance variation of task schedulers with TaskInsight2018Inngår i: Parallel Computing, ISSN 0167-8191, E-ISSN 1872-7336, Vol. 75, s. 11-27Artikkel i tidsskrift (Fagfellevurdert)
  • 290.
    Ceballos, Germán
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Grass, Thomas
    Hugo, Andra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    TaskInsight: Understanding task schedules effects on memory and performance2017Inngår i: Proc. 8th International Workshop on Programming Models and Applications for Multicores and Manycores, New York: ACM Press, 2017, s. 11-20Konferansepaper (Fagfellevurdert)
  • 291.
    Ceballos, Germán
    et al.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Sembrant, Andreas
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Carlson, Trevor E.
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Black-Schaffer, David
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Analyzing Graphics Workloads on Tile-based GPUs2017Inngår i: Proc. 20th International Symposium on Workload Characterization, IEEE, 2017, s. 108-109Konferansepaper (Fagfellevurdert)
  • 292. Cebrian, Juan M.
    et al.
    Sanchez, Daniel
    Aragon, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Efficient inter-core power and thermal balancing for multicore processors2013Inngår i: Computing, ISSN 0010-485X, E-ISSN 1436-5057, Vol. 95, nr 7, s. 537-566Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Nowadays the market is dominated by processor architectures that employ multiple cores per chip. These architectures have different behavior depending on the applications running on the processor (parallel, multiprogrammed, sequential), but all happen to meet what is called the power and temperature wall. For future technologies (less than 22 nm) and a fixed die size, it is still uncertain the percentage of processor that can be simultaneously powered on. Power saving and power budget mechanisms can be useful to precisely control the amount of power been dissipated by the processor. After an initial analysis we discover that legacy power saving techniques work properly for matching a power budget in thread-independent and multi-programmed workloads, but not in parallel workloads. When running parallel shared-memory applications sacrificing some performance in a single core (thread) in order to be more energy-efficient can unintentionally delay the rest of cores (threads) due to synchronization points (locks/barriers), having a negative impact on global performance. In order to solve this problem we propose power token balancing (PTB) aimed at accurately matching an external power constraint by balancing the power consumed among the different cores. Experimental results show that PTB matches more accurately a predefined power budget (50 % of the original peak power) than other mechanisms like DVFS. The total energy consumed over the budget is reduced to only 8 % for a 16-core CMP with only a 3 % energy increase (overhead). We also introduce a novel mechanism named "Nitro". Nitro will overclock the core that enters a critical section (delimited by locks) in order to free the lock as soon as possible. Experimental results have shown that Nitro is able to reduce the execution time of lock-intensive applications in more than 4 % by overclocking the frequency by 15 % in selected program phases over a period of time that represents a 22 % of the total execution time. We conclude the work with an analysis of the thermal effects of PTB in different CMP configurations using realistic power numbers and heatsink/fan configurations. Results show how PTB not only balances temperature between the different cores, reducing temperature gradient and increasing signal reliability, but also allows a reduction of 28-30 % of both average and peak temperatures for the studied benchmarks when a peak power budget of 50 % is exceeded.

  • 293. Cebrian, Juan M.
    et al.
    Sanchez, Daniel
    Aragon, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Managing power constraints in a single-core scenario through power tokens2014Inngår i: Journal of Supercomputing, ISSN 0920-8542, E-ISSN 1573-0484, Vol. 68, nr 1, s. 414-442Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Current microprocessors face constant thermal and power-related problems during their everyday use, usually solved by applying a power budget to the processor/core. Dynamic voltage and frequency scaling (DVFS) has been an effective technique that allowed microprocessors to match a predefined power budget. However, the continuous increase of leakage power due to technology scaling along with low resolution of DVFS makes it less attractive as a technique to match a predefined power budget as technology goes to deep-submicron. In this paper, we propose the use of microarchitectural techniques to accurately match a power constraint while maximizing the energy-efficiency of the processor. We will predict the processor power dissipation at cycle level (power token throttling) or at a basic block level (basic block level mechanism), using the dissipated power translated into tokens to select between different power-saving microarchitectural techniques. We also introduce a two-level approach in which DVFS acts as a coarse-grain technique to lower the average power dissipation towards the power budget, while microarchitectural techniques focus on removing the numerous power spikes. Experimental results show that the use of power-saving microarchitectural techniques in conjunction with DVFS is up to six times more precise, in terms of total energy consumed over the power budget, than only using DVFS to match a predefined power budget.

  • 294. Cebrián, Juan M.
    et al.
    Aragón, Juan L.
    García, José M.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Leakage-efficient design of value predictors through state and non-state preserving techniques2011Inngår i: Journal of Supercomputing, ISSN 0920-8542, E-ISSN 1573-0484, Vol. 55, nr 1, s. 28-50Artikkel i tidsskrift (Fagfellevurdert)
  • 295. Cebrián, Juan M.
    et al.
    Aragón, Juan L.
    Kaxiras, Stefanos
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorteknik.
    Power Token Balancing: Adapting CMPs to power constraints for parallel multithreaded workloads2011Inngår i: Proc. 25th International Parallel and Distributed Processing Symposium, Piscataway, NJ: IEEE , 2011, s. 431-442Konferansepaper (Fagfellevurdert)
  • 296. Cebrián, Juan M.
    et al.
    Fernández-Pascual, Ricardo
    Jimborean, Alexandra
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Datorarkitektur och datorkommunikation.
    Acacio, Manuel E.
    Ros, Alberto
    A dedicated private-shared cache design for scalable multiprocessors2017Inngår i: Concurrency and Computation, ISSN 1532-0626, E-ISSN 1532-0634, Vol. 29, nr 2, artikkel-id e3871Artikkel i tidsskrift (Fagfellevurdert)
  • 297.
    Celik, Hakan
    Linköpings universitet, Institutionen för systemteknik, Informationskodning.
    Detektering och analys av röjande signaler från pekskärmar2019Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This work is about TEMPEST (Transient Electro-Magnetic Pulse Emanation Standard) which is a term for describing the gathering of secret information that leak from a system. The specific observed system is the touchscreen of a smartphone.

    The aim is to firstly examine the information needed for an identification of the touched area on a touchscreen of a smartphone by TEMPEST. Given this information, the work then examines the accuracy of such an identification. The method is based on experimental examinations, observations and measures as well as probability distributions.

    Conclusions from the results are the fact that the accuracy of an identification becomes higher when synchronizing the communication between the smartphone and its display with a measuring instrument. Moreover, the accuracy of an identification varies with chosen measurement method and this work showed that a higher accuracy was achieved when taking measurements with an absorbing clamp compared to a near-field probe.

  • 298.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Finite element methods for surface problems2017Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The purpose of this thesis is to further develop numerical methods for solving surface problems by utilizing tangential calculus and the trace finite element method. Direct computation on the surface is possible by the use of tangential calculus, in contrast to the classical approach of mapping 2D parametric surfaces to 3D surfaces by means of differential geometry operators. Using tangential calculus, the problem formulation is only dependent on the position and normal vectors of the 3D surface. Tangential calculus thus enables a clean, simple and inexpensive formulation and implementation of finite element methods for surface problems. Meshing techniques are greatly simplified from the end-user perspective by utilizing an unfitted finite element method called the Trace Finite Element Method, in which the basic idea is to embed the surface in a higher dimensional mesh and use the shape functions of this background mesh for the discretization of the partial differential equation. This method makes it possible to model surfaces implicitly and solve surface problems without the need for expensive meshing/re-meshing techniques especially for moving surfaces or surfaces embedded in 3D solids, so called embedded interface problems. Using these two approaches, numerical methods for solving three surface problems are proposed: 1) minimal surface problems, in which the form that minimizes the mean curvature was computed by iterative update of a level-set function discretized using TraceFEM and driven by advection, for which the velocity field was given by the mean curvature flow, 2) elastic membrane problems discretized using linear and higher order TraceFEM, which makes it straightforward to embed complex geometries of membrane models into an elastic bulk for reinforcement and 3) stabilized, accurate vertex normal and mean curvature estimation with local refinement on triangulated surfaces. In this thesis the basics of the two main approaches are presented, some aspects such as stabilization and surface reconstruction are further developed, evaluated and numerically analyzed, details on implementations are provided and the current state of work is presented.

  • 299.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Finite element methods on surfaces2015Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    The purpose of this thesis is to improve numerical simulations of surface problems. Two novel computational concepts are analyzed and applied on two surface problems; minimal surface problems and elastic membrane problems. The concept of tangential projection implies that direct computation on the surface is made possible compared to the classical approach of mapping 2D parametric surfaces to 3D surfaces by means of differential geometry operators. The second concept presented is the cut finite element method, in which the basic idea of discretization is to embed the d- 1-dimensional surface in a d-dimensional mesh and use the basis functions of a higher dimensional mesh but integrate over the surface. The aim of this thesis is to present the basics of the two main approaches and to provide details on the implementation.

  • 300.
    Cenanovic, Mirza
    Högskolan i Jönköping, Tekniska Högskolan, JTH, Produktutveckling. Högskolan i Jönköping, Tekniska Högskolan, JTH. Forskningsmiljö Produktutveckling - Simulering och optimering.
    Numerical error estimation for a TraceFEM membrane and distance function on P1 and P2 tetrahedraManuskript (preprint) (Annet vitenskapelig)
3456789 251 - 300 of 1999
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf