Academia.eduAcademia.edu

Software Implementation

3,140 papers
113 followers
AI Powered
Software implementation is the process of deploying and integrating software applications within an organization, encompassing planning, installation, configuration, testing, and user training to ensure the software functions effectively and meets organizational needs.
Matrix computations are both fundamental and ubiquitous in computational science and its vast application areas. Along with the development of more advanced computer systems with complex memory hierarchies, there is a continuing demand... more
De ces Maîtres, je garderai le dynamisme et la disponibilité. Ils m'ont encouragé et donné des conseils sur le plan scientifique et sur le plan humain. Leur sympathie, leur compréhension et leur aide permanente m'ont permis de mener à... more
Hard mathematical problems are at the core of security arguments in cryptography. In this paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely the factorization, representation and balance problems in... more
In this paper we present a hardware architecture with software implementation able to track free swimming single 2µm in diameter MC-1 bacterium. The computer vision system operates at up to 77 fps at full speed and up to 24 fps when... more
As software systems are maintained, their architecture modularity often degrades through architectural erosion and drift. More directly, however, the modularity of software implementations degrades through the introduction of code... more
In this paper we present compiler extensions for the Molen programming paradigm, which is a sequential consistency paradigm for programming custom computing machines (CCM). The compiler supports instruction set extensions and register... more
This paper presents an automated flexible pipeline design algorithm for our unique acceleration technique called Recursive Variable Expansion. The preliminary experimental results on a kernel of real life application shows comparable... more
Mestrado em Engenharia Electrónica e TelecomunicaçõesO presente trabalho apresenta técnicas de processamento digital de sinal, nomeadamente em processamento de vídeo, recorrendo a tecnologia FPGA. Consiste numa introdução teórica sobre... more
An electrocardiogram (ECG) is a signal that describes the heart's electrical activity. Signal processing techniques are necessary to extract meaningful information from ECG signals. Researchers often use large databases like the PhysioNet... more
The central problem in the implementation of a Reed-Solomon code is finding the roots of the error locator polynomial. In 1967, Berlekamp et al. found an algorithm for finding the roots of an affine polynomial in GF(2 m ) that can be used... more
Receiver 2 SOH measurer unit the pack current, determines a TAC corresponding to the total amount of discharge accumulation, and delivers the deter mined TAC to the SOC measurer. The output unit outputs the SOC and SOH to the ECU.
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
Business process analysis and modeling is a crucial step in formulating information systems user requirements. The practice of information technology (IT) development does not indicate a lack of problems in spite of the growing number of... more
We develop reconfigurable designs to support radiosity, a computer graphics algorithm for producing highly realistic images of artificial scenes, but which is computationally expensive. We implement radiosity using stochastic raytracing,... more
A virtual pointer (VP) alignment task at designated probe points on a cylinder real object surface was carried out in a stereoscopic augmented reality environment. The object was to evaluate subjects' sensitivity to surface texture,... more
The novel frequency-multiplexed modulator architecture of the MIT Mark III holo-video display poses a significant challenge in generation of appropriate video signals. Unlike in our previous work, here it is necessary to generate a group... more
Visualizing hierarchical structures is of great importance in many economic and scientific applications. Many different approaches have been developed and enhanced in the last decades. Each of them claims specific advantages over... more
Background: Whole genome shotgun sequencing produces increasingly higher coverage of a genome with random sequence reads. Progressive whole genome assembly and eventual finishing sequencing is a process that typically takes several years... more
The choice of a communication paradigm, or protocol, is central to the design of a largescale multiprocessor system. Unlike traditional multiprocessors, the FLASH machine uses a programmable node controller, called MAGIC, to implement all... more
Statistical agencies have longstanding concern over confidentiality of their data [14, 15]. But agencies must also report information to the public. This tension between confidentiality and dis-semination of statistical information is... more
To predict the radon concentration in a house environment and to understand the role of all factors affecting its behavior, it is necessary to recognize time variation in both air exchange rate and radon entry rate into a house. This... more
The compilation of Esterel into software has mainly targeted uniprocessor execution. The inherent parallelism of the original description would typically have to be compiled away in order for it to be executed sequentially on a processor.... more
This paper investigates performance and energy characteristics of software algorithms for long integer arithmetic. We analyze and compare the number of RISC-like processor instructions (e.g. singleprecision multiplication, addition, load,... more
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups, we developed an ad-hoc arithmetic library, designed to... more
As emerging video coding standards, e.g. H.264, aim at high-quality video contents at low bit-rates, the encoding and decoding processes require much more computation than most existing standards do. This paper analyzes software... more
A novel approach for the time-resolved analysis of high -speed sequences of particle images is presented. The proposed method aims at the minimization of PIV errors in the lower velocity range by adjusting locally and dynamically the... more
Wireless network is one of most important modes of communication. So providing security to the information being communicated through wireless networks is very important issue. Classical cryptography provides conditional security which... more
The workloads in a modern CPU are becoming more diversified but a common aspect is beginning to form around the need for cryptographic algorithms.There are a number of different cryptographic algorithms for hashing, block ciphers and... more
Compression of floating-point data will play an important role in high-performance computing as data bandwidth and storage become dominant costs. Lossy compression of floating-point data is powerful, but theoretical results are needed to... more
A novel portable hardware architecture for the Elliptic Curve Method of factoring, designed and optimized for application in the relation collection step of the Number Field Sieve, is described and analyzed. A comparison with an earlier... more
notations et conventions 122 13 Bibliographie 125 choisi un mode de présentation un peu particulier. Plutôt que de donner directement la définition la plus générale possible des fonctions critiques, nous montrons comment, au fur et à... more
notations et conventions 122 13 Bibliographie 125 choisi un mode de présentation un peu particulier. Plutôt que de donner directement la définition la plus générale possible des fonctions critiques, nous montrons comment, au fur et à... more
Authors have proposed the approach to increase performance of software implementation of finite field multiplication algorithm, for 32-bit and 64-bit platforms. The approach is based on delayed carry mechanism of significant bit in sum... more
This paper describes the system parameters and software implementation of a HECDSA cryptosystem based on genus-2 hyperelliptic curves over prime fields. We show how to reduce the computational complexity for special cases and compare the... more
Embedded digital signal processing (DSP) systems are usually associated with real time constraints and/or high data rates such that fully software implementations are often not satisfactory. In that case, mixed hardware/software... more
This paper presents the concept of software boundaries and their automated detection. It describes an objective, high-level assessment technology to support process control of software development. The technique is largely independent of... more
With demographic changes of the aging population and the increasing number of people living alone, pervasive home monitoring is set to play an important role in maintaining the independence and improving the quality of life for the... more
Abstract—Computer vision techniques applied to systems used on road maintenance, which are related either to traffic signs or to the road itself, are playing a major role in many countries because of the higher investment on public works... more
Abstract:-Designing an architecture to handle large conceptual data blocks is very much needed. This paper implements a model for the shape and dimension invariant programming of arrays based on the notation of the Mathematics of Arrays... more
This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The search utilizes the idea of timing attack as computation time information may leak due to different modular operations... more
A new metric distortion over latency (DOL) is proposed in this paper to overcome the deficiency of the traditional metric interaction latency in measuring the interactive performance of the modern remote rendering systems, which are... more
In this paper, we present the ongoing research clone in the field of robots playing "football". Several development aspects are discussed such as the hardware system, followed by the software implementation. We will highlight three... more
GPU architectures are increasingly important in the multi-core era due to their high number of parallel processors. Programming thousands of massively parallel threads is a big challenge for software engineers, but understanding the... more
The Galois Sub-hierarchy (GSH) is a polynomial-size representation of a concept lattice which has been applied to several fields, such as software engineering and linguistics. In this paper, we analyze the performances, in terms of... more
Manufacturing flexibility is a difficult to quantify concept that defies universal definition. This paper presents a novel fuzzy-logic approach for measuring manufacturing flexibility that exploits linguistic variables for quantifying... more
We describe two classes of software systems that release tabular summaries of an underlying database. Table servers respond to user queries for (marginal) sub-tables of the "full" table summarizing the entire database, and are... more
Battery Management System (BMS) is an essential component for lithium-ion battery-based devices. It provides a variety of functionalities that help improve the overall lifespan of the battery, including states estimation algorithms. An... more
Battery Management System (BMS) is an essential component for lithium-ion battery-based devices. It provides a variety of functionalities that help improve the overall lifespan of the battery, including states estimation algorithms. An... more
This paper describes a fault tolerant mechanical architecture with four levels devised and implemented in concert with NASA (Tesar, D. & Sreevijayan, D., Four-level fault tolerance in manipulator design for space operations. In First Int.... more