Search For:

Displaying 1-20 out of 20 total
Performance Estimation of Pipelined MultiProcessor System-on-Chips (MPSoCs)
Found in: IEEE Transactions on Parallel and Distributed Systems
By Haris Javaid,Aleksander Ignjatovic,Sri Parameswaran
Issue Date:August 2014
pp. 2159-2168
The paradigm of pipelined MPSoC (processors connected in a pipeline) is well suited to data flow nature of multimedia applications. Often design space exploration is performed to optimize execution time, latency or throughput of a pipelined MPSoC where the...
 
Trajectory Approximation for Resource Constrained Mobile Sensor Networks
Found in: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Ghulam Murtaza,Salil S. Kanhere,Aleksandar Ignjatovic,Raja Jurdak,Sanjay Jha
Issue Date:May 2014
pp. 59-66
Low-power compact sensor nodes are being increasingly used to collect trajectory data from moving objects such as wildlife. The size of this data can easily overwhelm the data storage available on these nodes. Moreover, the transmission of this extensive d...
 
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Aleksandar Ignjatovic, Elisa Bertino, Mohsen Rezvani, Sanjay Jha
Issue Date:November 2013
pp. 1-2
In this paper we introduce a novel sophisticated collusion attack scenario against a number of existing iterative filtering algorithms. To address this security issue, we propose an improvement for iterative filtering techniques by providing an initial app...
     
Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chun Tung Chou,Aleksandar Ignjatovic,Wen Hu
Issue Date:August 2013
pp. 1525-1534
Wireless sensor networks (WSNs) enable the collection of physical measurements over a large geographic area. It is often the case that we are interested in computing and tracking the spatial-average of the sensor measurements over a region of the WSN. Unfo...
 
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency
Found in: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Mohsen Rezvani,Aleksandar Ignjatovic,Sanjay Jha
Issue Date:May 2013
pp. 286-288
Discovering high risk network flows and hosts in a high throughput network is a challenging task of network monitoring. Emerging complicated attack scenarios such as DDoS attacks increase the complexity of tracking malicious and high risk network activitie...
 
Quality Control in Crowdsourcing Systems: Issues and Directions
Found in: IEEE Internet Computing
By M. Allahbakhsh,B. Benatallah,A. Ignjatovic,H. R. Motahari-Nezhad,E. Bertino,S. Dustdar
Issue Date:March 2013
pp. 76-81
As a new distributed computing model, crowdsourcing lets people leverage the crowd's intelligence and wisdom toward solving problems. This article proposes a framework for characterizing various dimensions of quality control in crowdsourcing systems, a cri...
 
Optimal synthesis of latency and throughput constrained pipelined MPSoCs targeting streaming applications
Found in: Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis (CODES/ISSS '10)
By Aleksander Ignjatovic, Haris Javaid, Sri Parameswaran, Xin He
Issue Date:October 2010
pp. 75-84
A streaming application, characterized by a kernel that can be broken down into independent tasks which can be executed in a pipelined fashion, inherently allows its implementation on a pipeline of Application Specific Instruction set Processors (ASIPs), c...
     
Model for Voter Scoring and Best Answer Selection in Community Q&A Services
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Chong Tong Lee, Eduarda Mendes Rodrigues, Gabriella Kazai, Nataša Milic-Frayling, Aleksandar Ignjatovic
Issue Date:September 2009
pp. 116-123
Community Question Answering (cQA) services, such as Yahoo! Answers and MSN QnA, facilitate knowledge sharing through question answering by an online community of users. These services include incentive mechanisms to entice participation and self-regulate ...
 
Optimal resource allocation for wireless video sensors with power-rate-distortion model of imager
Found in: Circuits and Systems, Midwest Symposium on
By Malisa Marijan, Wendi Heinzelman, Gaurav Sharma, Zeljko Ignjatovic
Issue Date:August 2009
pp. 256-259
We consider optimal resource allocation for wireless video sensors (WVSs), including the image sensor subsystem into the system analysis. By assigning a power-rate-distortion (P- R-D) characteristic for the image sensor, we build a comprehensive P-R-D fram...
 
An oversampling digital pixel sensor with a charge transfer DAC employing parasitic capacitances
Found in: Circuits and Systems, Midwest Symposium on
By Danijel Maricic, Zeljko Ignjatovic, Mark F. Bocko
Issue Date:August 2009
pp. 415-418
An image sensor design with pixel-level sigma-delta (ΣΔ) conversion employing four transistors at each pixel where the feedback charge transfer is realized through the parasitic capacitances of an inactive transistor is presented. This architecture is a re...
 
An Analytic Approach to Reputation Ranking of Participants in Online Transactions
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Aleksandar Ignjatovic, Norman Foo, Chung Tong Lee
Issue Date:December 2008
pp. 587-590
Agents from a community interact in pairwise transactions across discrete time. Each agent reports its evaluation of another agent with which it has just had a transaction to a central system. This system uses these time-sequences of experience evaluations...
 
MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm
Found in: Computer-Aided Design, International Conference on
By Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic
Issue Date:November 2008
pp. 678-684
Side channel attack based upon the analysis of power traces is an effective way of obtaining the encryption key from secure processors. Power traces can be used to detect bitflips which betray the secure key. Balancing the bitflips with opposite bitflips h...
 
Anatomy of Differential Power Analysis for AES
Found in: Symbolic and Numeric Algorithms for Scientific Computing, International Symposium on
By Jude Angelo Ambrose, Naeill Aldon, Aleksandar Ignjatovic, Sri Parameswaran
Issue Date:September 2008
pp. 459-466
Side channel attacks are a significant threat to the deployment of secure embedded systems. Differential Power Analysis is
 
Instruction trace compression for rapid instruction cache simulation
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '07)
By Aleksandar Ignjatovic, Andhi Janapsatya, Joerg Henkel, Sri Parameswaran
Issue Date:April 2007
pp. 803-808
Modern Application Specific Instruction Set Processors (ASIPs) have customizable caches, where the size, associativity and line size can all be customized to suit a particular application. To find the best cache size suited for a particular embedded system...
     
Instruction Trace Compression for Rapid Instruction Cache Simulation
Found in: Design, Automation and Test in Europe Conference and Exhibition
By A. Janapsatya, A. Ignjatovic, J. Henkel
Issue Date:April 2007
pp. 150
Modern application specific instruction set processors (ASIPs) have customizable caches, where the size, associativity and line size can all be customized to suit a particular application. To find the best cache size suited for a particular embedded system...
 
Application specific forwarding network and instruction encoding for multi-pipe ASIPs
Found in: Proceedings of the 4th international conference on Hardware/software codesign and system synthesis (CODES+ISSS '06)
By Aleksandar Ignjatovic, Hui Guo, Sri Parameswaran, Swarnalatha Radhakrishnan
Issue Date:October 2006
pp. 241-246
Small area and code size are two critical design issues in most of embedded system designs. In this paper, we tackle these issues by customizing forwarding networks and instruction encoding schemes for multi-pipe Application Specific Instruction-Set Proces...
     
Application specific forwarding network and instruction encoding for multi-pipe ASIPs
Found in: Hardware/software codesign and system synthesis, International conference on
By Hui Guo, Sri Parameswaran, Aleksandar Ignjatovic, Swarnalatha Radhakrishnan
Issue Date:October 2006
pp. 241-246
Small area and code size are two critical design issues in most of embedded system designs. In this paper, we tackle these issues by customizing forwarding networks and instruction encoding schemes for multi-pipe Application Specific Instruction-Set Proces...
 
Finding optimal L1 cache configuration for embedded systems
Found in: Proceedings of the 2006 conference on Asia South Pacific design automation (ASP-DAC '06)
By Aleksandar Ignjatovic, Andhi Janapsatya, Sri Parameswaran
Issue Date:January 2006
pp. 796-801
Modern embedded system execute a single application or a class of applications repeatedly. A new emerging methodology of designing embedded system utilizes configurable processors where the cache size, associativity, and line size can be chosen by the desi...
     
Hardware/software managed scratchpad memory for embedded system
Found in: Computer-Aided Design, International Conference on
By Andhi Janapsatya, Sri Parameswaran, A. Ignjatovic
Issue Date:November 2004
pp. 370-377
We propose a methodology for energy reduction and performance improvement. The target system comprises of an instruction scratchpad memory instead of an instruction cache. Highly utilized code segments are copied into the scratchpad memory, and are execute...
 
Parallel computable higher type functionals
Found in: Foundations of Computer Science, Annual IEEE Symposium on
By P. Clote, A. Ignjatovic, B. Kapron
Issue Date:November 1993
pp. 72-81
The primary aim of this paper is to introduce higher type analogues of some familiar parallel complexity classes, and to show that these higher type classes can be characterised in significantly different ways. Recursion-theoretic, proof-theoretic and mach...
   
 1