Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Quality of Service (2)
- Admission Control (1)
- Advanced Encryption Standard (1)
- Bandwidth Allocation (1)
- Cloud Computing (1)
-
- Concurrent fault detection (1)
- Cross-Layer (1)
- EPON (1)
- Empirical Study (1)
- Energy Efficiency (1)
- Finite field (1)
- Galois/Counter Mode (1)
- High performance ASIC and FPGA (1)
- Hybrid Network (1)
- IEEE~802.16 (1)
- IEEE~802.16e (1)
- Industry (1)
- MAC Protocol (1)
- MIMO (1)
- Open Source Software (OSS) (1)
- Optical (1)
- Performance analysis (1)
- Privacy (1)
- Privacy as a Service (1)
- QoS (1)
- RPR (1)
- Resource Allocation (1)
- Routing (1)
- Scheduler (1)
- Scheduling Techniques (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene
Energy Efficient Reduced Complexity Multi-Service, Multi-Channel Scheduling Techniques, Dan J. Dechene
Electronic Thesis and Dissertation Repository
The need for energy efficient communications is essential in current and next-generation wireless communications systems. A large component of energy expenditure in mobile devices is in the mobile radio interface. Proper scheduling and resource allocation techniques that exploit instantaneous and long-term average knowledge of the channel, queue state and quality of service parameters can be used to improve the energy efficiency of communication.
This thesis focuses on exploiting queue and channel state information as well as quality of service parameters in order to design energy efficient scheduling techniques. The proposed designs are for multi-stream, multi-channel systems and in general have …
Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani
Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani
Electronic Thesis and Dissertation Repository
The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficient hardware implementations.
In this thesis, first, we investigate the AES algorithm from the concurrent fault detection point of view. We note that in addition to the efficiency requirements of the AES, it must be reliable against transient and permanent internal faults or …
Optical-Wimax Hybrid Networks, Abdou R. A. Ahmed
Optical-Wimax Hybrid Networks, Abdou R. A. Ahmed
Electronic Thesis and Dissertation Repository
The emergence of bandwidth-intensive Internet services, such as
circuit-quality voice transfer and interactive video gaming, create
a high demand for a very qualified next-generation access network.
In addition to high bandwidth, these future access networks should
also provide improved network availability, flexibility, mobility,
reliability, failure protection, quality of service (QoS) support
and cost-effective access. The integration between optical networks
and Worldwide Interoperability for Microwave Access (WiMAX) is a
promising solution for future access networks. Accordingly, a few
different architectures and MAC protocol components have recently
been proposed for the integration between the Ethernet Passive
Optical Network (EPON) and WiMAX. However, …
Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz
Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz
Electrical and Computer Engineering Publications
The evolution of Cloud Computing as a viable business solution for providing hardware and software has created many security concerns. Among these security concerns, privacy is often overlooked. If Cloud Computing is to continue its growth, this privacy concern will need to be addressed. In this work we discuss the current growth of Cloud Computing and the impact the public sector and privacy can have in furthering this growth. To begin to provide privacy protection for Cloud Computing, we introduce privacy constraints that outline privacy preferences. We propose the expansion of Cloud Service Level Agreements (SLAs) to include these privacy …
An Empirical Study Of Open Source Software Usability: The Industrial Perspective, Arif Raza, Luiz Fernando Capretz, Faheem Ahmed
An Empirical Study Of Open Source Software Usability: The Industrial Perspective, Arif Raza, Luiz Fernando Capretz, Faheem Ahmed
Electrical and Computer Engineering Publications
Recent years have seen a sharp increase in the use of open source projects by common novice users; Open Source Software (OSS) is thus no longer a reserved arena for software developers and computer gurus. Although user-centered designs are gaining popularity in OSS, usability is still not considered as one of the prime objectives in many design scenarios. In this paper, we analyze industry users’ perception of usability factors, including understandability, learnability, operability and attractiveness, on OSS usability. The research model of this empirical study establishes the relationship between the key usability factors and OSS usability from industrial perspective. In …