Unavailability of functional units and their unequal activity makes them performance bottleneck and thermal hot spots units in general-purpose processors. This thesis proposes to use reconfigurable functional units to ...
Crowdsourcing and the wisdom of crowds [5] have established that a large number of
low quality inputs can be reliably aggregated to yield a higher quality output. This thesis
examines whether the wisdom of crowds can be ...
Traffic incidents are a major contributing factor towards traffic congestion. Effective incident response strategies can significantly reduce non-recurrent congestion and thus represent important research topics. In many ...
Multiple large-scale traffic simulators have been developed to represent and analyze the con-
sequences of real-life traffic scenarios. These tools can be used to understand the complexity
of urban traffic situations and ...
Age-dependent branching processes arise in multiple areas of scientific applications such as cell biology, epidemic spread, and medical science. Researchers have shown that the size of the process grows exponentially fast ...
Preferential attachment models arise in several areas of mathematics and scientific applications such as in the analysis of social, financial, and gene regulatory networks. However, inferential questions related to such ...
We provide a novel approach to approximate conditional randomization tests fol-
lowing Efron's randomization procedure by sampling from the conditional reference
set. We use combinatorial algebra to derive the conditional ...
Social media (SM) is used extensively in Saudi Arabia, especially by women for online shopping. The number of active social media users has ranked the country as one of the strongest business markets in the world, and the ...
Glitches are unproductive signal transitions due to unbalanced path delays at the inputs
of a gate. Unlike asynchronous circuits, the functionality of synchronous circuits is not
signi cantly a ected by the presence of ...
Automatic music transcription (AMT) is a relatively new application in the field of music signal processing. The purpose of an AMT algorithm is to transform a raw acoustic
musical signal into a written version, namely a ...
Important to effective use of graphic portrayals of data and information is the science of
communicating effectively with symbols. In general, today’s practice of icon design is
more art than true science. While ...
Growing demand for wireless data and the spectrum congestion in the existing 4G LTE
networks have led the researchers to focus on ways to utilize the large bandwidths available
in the above 6 GHz spectrum. The technology ...
Student retention to successful graduation is an enduring issue in higher education. National
statistics indicate most higher education institutions have four-year degree completion
rates around 50%, or just half of their ...
Underwater target tracking has vital importance in a variety of applications, most notably military surveillance and defense. This work is focused on underwater target tracking
using active sonar. In active sonar, sound ...
We present a method of generating plausible interpolations between frames from ani-
mated pixel art. We do this in the hopes of helping artists working in the style by providing
a simple method of interpolation, which ...
Security at low cost is an important factor for cryptographic hardware implementations.
Unfortunately, the security of cryptographic implementations is threatened by Side
Channel Analysis (SCA). SCA attempts to discover ...
Internet Protocol Security (IPsec) provides essential security against attacks on data
transmitted over the Internet through di erent security services provided by cryptographic
algorithms like encryption modules and ...
Aggressive downsizing of individual transistors continues to improve the perfor-
mance of integrated circuits. However, as the transistors get smaller, they become
more vulnerable to damage by high current and high voltage ...
The Dynamic Voltage Scaling (DVS) technique is the basis of numerous state-of-the-art
energy management schemes proposed for real-time embedded systems. However, recent
research has illustrated the alarmingly negative ...
The number of wireless systems and services has grown tremendously over the last two
decades. As a result, the availability of wireless spectrum has become extremely limited.
Cognitive radio is a new technique to overcome ...