Browsing Computer Science and Engineering by Title
Now showing items 1-20 of 89
-
Adaptive computation of impact force under low velocity impact
(1999)A simple and computationally efficient adaptive finite element analysis strategy has been adopted for accurate and reliable evaluation of contact force under low velocity impact. Contact of a spherical and cylindrical ... -
Affine-structure-based facial image encoding
(1999)A real-time algorithm for affine-structure-based video compression for facial images is presented. The face undergoing motion is segmented and triangulated to yield a set of control points. The set of control points generated ... -
An analytical framework for path reliabilities in mobile ad hoc networks
(2003)An ad hoc network is a collection of mobile nodes connected through multi-hop wireless links without the required intervention of any centralized access point or existing infrastructure. In this work, we have developed an ... -
AnO(n) Algorithm for Abelianp-Group Isomorphism and anO(n log n) Algorithm for Abelian Group Isomorphism
(1996)The isomorphism problem for groups is to determine whether two finite groups are isomorphic. The groups are assumed to be epresented by their multiplication tables. Tarjan has shown that this problem can bedone in time ... -
An architectural framework to deploy scatternet-based applications over Bluetooth
(2003)Bluetooth is a promising wireless personal area network technology and is on the verge of being ubiquitously deployed over a wide range of devices. The basic unit of a Bluetooth network is a centralized master-slave topology, ... -
ASIP design methodologies: survey and issues
(2001)Interest in synthesis of Application Specific Instruction Processors or ASIPs has increased considerably and a number of methodologies have been proposed in the last decade. This paper attempts to survey the state of the ... -
The capacity of multi-hop wireless networks with TCP regulated traffic
(2002)We study the dependence of the capacity of multi-hop wireless networks on the transmission range of nodes in the network with TCP regulated traffic. Specifically, we examine the sensitivity of the capacity to the speed of ... -
Characterization of mobility patterns based on cell topography in a cellular radio system
(1999)Teletraffic modelling of users is crucial for cellular system layout and planning, and to evaluate tradeoffs in system design issues. In order to be useful, the model should capture mobility under the most generalized ... -
Circuit partitioning with partial order for mixed simulation emulation environment
(1995)A low-cost hybrid simulator for VLSI circuits has been under development at IIT Delhi. The simulator uses a Reconfigurable System (RS) consisting of a limited number of FPGAs for hardware emulation and blends the ideas of ... -
A complexity effective communication model for behavioral modeling of signal processing applications
(2003)In this paper, we argue that the address space of memory regions that participate in inter task communication is over-specified by the traditional communication models used in behavioral modeling, resulting in sub-optimal ... -
Conditions for on-line scheduling of hard real-time tasks on multiprocessors1
(1998)In this paper we consider the problem of on-line scheduling of hard real-time tasks on multiple processors. For a given set of ready tasks, one can propose many schedules. These schedules, however, may not necessarily be ... -
Data path synthesis with global time constraint
(1992)This paper presents an algorithm and its implementation for performing scheduling and operator allocation for data path synthesis. The main advantage of this approach is that it is capable of handling global time constraint ... -
Design of a kernel for implementing communication protocols
(1995)We describe the design of a kernel for an inexpensive front-end processor to run the lower layers of common communication protocols. Implementing a full fledged kernel on a card requires large memory, expensive hardware ... -
Dynamic access control framework based on events: a demonstration
(2003)Access control policies in the e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can potentially reduce the customer response ... -
Efficient implementation of multiple on-chip signature checking
(1997)Detection latency in a BIST scheme is the delay between the time instant at which a faulty response appears and the time instant at which the fault is detected. Conventional BILBO-BIST schemes suffer from long detection ... -
An Efficient Output-Sensitive Hidden-Surface Removal Algorithm for Polihedral Terrains*
(1995)In this paper, we present an algorithm for hidden surface removal for a class of polyhedral surfaces which have a property that they can be ordered relatively quickly. For example, our results apply directly to terrain ... -
An empirical evaluation of virtual circuit holding times in IP-over-ATM networks
(1994)When carrying Internet Protocol (IP) traffic over an asynchronous transfer mode (ATM) network, the ATM adaptation layer must determine how long to hold a virtual circuit opened to carry an IP datagram. The authors present ... -
Energy efficiency and throughput for TCP traffic in multi-hop wireless networks
(2002)We study the performance metrics associated with TCP-regulated traffic in multi-hop wireless networks that use a common physical channel (e.g., IEEE 802.11). In contrast to earlier analyses, we focus simultaneously on two ... -
An energy-conscious algorithm for memory port allocation
(2002)Multiport memories are extensively used in modern system designs because of the performance advantages they offer. The increased memory access throughput could lead to significantly faster schedules in behavioral synthesis. ... -
Evaluating register file size in ASIP design
(2001)Interest in synthesis of Application Specific Instruction Set Processors or ASIPs has increased considerably and a number of methodologies have been proposed for ASIP design. A key step in ASIP synthesis involves deciding ...