Random Access
140 Followers
Recent papers in Random Access
Emerging storage technologies such as flash memories, phase-change memories, and spin-transfer torque memories are poised to close the enormous performance gap between disk-based storage and main memory. We evaluate several approaches to... more
To determine the presence of FSH in unextracted urine of perimenopausal women using a microparticle enzyme immunoassay kit on an AxSYM random access immunoassay analyzer.
A new image compression algorithm is proposed, based on independent Embedded Block Coding with Optimized Truncation of the embedded bit-streams (EBCOT). The algorithm exhibits state-of-the-art compression performance while producing a... more
We consider a model for random-access communication in networks of arbitrary topology. We characterize the efficient (Pareto) boundary of the network throughput region as the family of solutions optimizing weighted proportional fairness... more
The use of large-scale electrophysiology to obtain high spatiotemporal resolution brain recordings (>100 channels) capable of probing the range of neural activity from local field potential oscillations to single neuron action potentials... more
We provide a general tool to improve the real time performance of a broad class of Union-Find algorithms. This is done by minimizing the random access memory that is used and thus to avoid the well-known yon Neumann bottleneck of... more
Flash memory solid-state disks (SSDs) are replacing hard disk drives (HDDs) in mobile computing systems because of their lower power consumption, faster random access, and greater shock resistance. We describe Hydra, a high-performance... more
We compared a new assay for Toxoplasma IgM on the Access™ analyzer (Beckman Coulter, Inc., Chaska, MN, USA), a random access instrument based on the principle of paramagnetic particle enzyme immunoassay with an enzyme-linked immunosorbent... more
The isomorphism problem for graphs G 1 and G 2 is to determine if there exists a oneto-one mapping of the vertices of G 1 onto the vertices of G 2 such that two vertices of G 1 are adjacent if and only if their images in G 2 are adjacent.
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four... more
The resistance switching behaviour of several materials has recently attracted considerable attention for its application in non-volatile memory (NVM) devices, popularly described as resistive random access memories (RRAMs). RRAM is a... more
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four... more
Nonmechanical steering of optical beams will enable revolutionary systems with random access pointing, similar to microwave radar phased arrays. An early approach was birefringent liquid crystals writing a sawtooth phase profile in one... more
A family of CMOS-based active pixel image sensors (APS's) that are inherently compatible with the integration of onchip signal processing circuitry is reported. The image sensors were fabricated using commercially available 2-m CMOS... more
Abstrut-A large number of terminals transmitting data packets over a common radio channel to a central base station is studied. In inhibit sense multiple access (ISMA), the base station broadcasts a busy signal when an incoming packet is... more
We demonstrated that an Al/p-type amorphous silicon ͑p-a-Si͒/Al switching device exhibits stable, nonvolatile resistive switching characteristics as well as reliable data retention at 85°C. It is directly observed that the conducting... more
A novel fuzzy video rate control algorithm (RCA) with delay and quality constraints is proposed for video streaming over DVB-H (Digital Video Broadcasting for Handheld terminals) application. In this application a variable bit rate (VBR)... more
Multiple -output transmitter implementation based on Direct Digital Synthesis (DDS) architecture is presented and investigated. A particular number of identical and independent units compose the proposed device. DDS technology is applied... more
The possibility of deleting a piece of information is very convenient in many programming frameworks. However, this feature is not available in constraint languages such as Constraint Logic Programming or Concurrent Constraint... more
We present a design-space feasibility region, as a function of magnetic tunnel junction (MTJ) characteristics and target memory specifications, to explore the design margin of a one-transistor–one-magnetic-tunnel-junction (1T-1MTJ) memory... more
Two-dimensional microshutter arrays (MSAs) are being developed at the NASA Goddard Space Flight Center for the James Webb Space Telescope (JWST) for use as a programmable aperture mask for object selection for the Near Infrared... more
MPI-2’s One-sided communication interface is being explored in scientific applications. One of the important operations in a one sided model is read-modify-write. MPI-2 semantics provide MPI_Put, MPI_Get and MPI_Accumulate operations... more
The finite battery power of mobile computers represents one of the greatest limitations to the utility of portable computers. Furthermore, portable computers often need to perform power consuming activities, such as transmitting and... more
Aurivillius type bismuth layered materials have received a lot of attention because of their application in ferroelectric non-volatile random access memories. Among bismuth layer structured ferroelectric ceramics SrBi2Ta2O9... more
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
tests in both batch and random access mode are performed. The evaluation studies performed included within-run and between-run precision at four analyte concentrations, method linearity and relative accuracy (comparison studies).
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can also be recovered gradually within a range of pictures... more
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
Multiple access methods in a wireless network allow multiple nodes to share a set of available channels for data transmission. The nodes can either compete or cooperate with each other to access the channel(s) so that either an individual... more
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
Various automated chemiluminescence immunoassay (CLIA) analyzers for the detection of antibodies to hepatitis C virus (HCV) are now commercially available in clinical laboratories and are replacing conventional enzyme immunoassays. We... more
This paper presents and analyzes a new near-optimum medium access control (MAC) protocol. The proposed access scheme is suitable for a CDMA mobile communication environment, and keeps under control and upper bounded the number of... more
This paper examines the impact of having access to a home computer on child and adolescent outcomes. To avoid the bias due to non-random access to home computers, we exploit a unique government program which provided vouchers towards the... more
Optical phased arrays represent an enabling new technology that makes possible simple, affordable, lightweight, optical sensors offering very precise stabilization, random-access pointing, programmable multiple simultaneous beams, a... more
Enterprise WLANs have made a dramatic shift towards centralized architectures in the recent past. The reasons for such a change have been ease of management and better design of various control and security functions. The data path of... more
The Micro-Modem is a compact, low-power, underwater acoustic communications and navigation subsystem. It has the capability to perform low-rate frequency-hopping frequency-shift keying (FH-FSK), variable rate phase-coherent keying (PSK),... more
In this paper, we demonstrate that multiple concurrent asynchronous and uncoordinated Single-Input Multiple-Output (SIMO) transmissions can successfully take place even though the respective receivers do not explicitly null out... more
The continuos improving of CMOS technology allows the realization of digital circuits and in particular Static Random Access Memories that, compared with previous technologies, contain an impressive number of transistors. The use of new... more
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize that a small number of idioms can cover most programming... more
The basic forms of random accessing problems encountered in designing computer communications networks are explored in terms of the Bernoulli finite user model. The problems are classified according to the available channel feedback... more