Conferences related to Redundancy

Back to Top

2019 IEEE Pulsed Power & Plasma Science (PPPS)

Combined conference of the IEEE International Conference on Plasma Science and the IEEE International Pulsed Power Conference

2019 IEEE/CVF International Conference on Computer Vision (ICCV)

Early Vision and Sensors Color, Illumination and Texture Segmentation and Grouping Motion and TrackingStereo and Structure from Motion Image -Based Modeling Physics -Based Modeling Statistical Methods and Learning in VisionVideo Surveillance and Monitoring Object, Event and Scene Recognition Vision - Based Graphics Image and Video RetrievalPerformance Evaluation Applications

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.

More Conferences

Periodicals related to Redundancy

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...

Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...

Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)

More Periodicals

Most published Xplore authors for Redundancy

Back to Top

Xplore Articles related to Redundancy

Back to Top

New Framework for Encoder Optimization of Scalable Video Coding

[{u'author_order': 1, u'affiliation': u'Institute for Infocomm Research, Agency for Science, Technology and Research, 21 Heng Mui Keng Terrace, Singapore 119613,', u'full_name': u'Zheng Guo Li'}, {u'author_order': 2, u'affiliation': u'Institute for Infocomm Research, Agency for Science, Technology and Research, 21 Heng Mui Keng Terrace, Singapore 119613,', u'full_name': u'Wei Yao'}, {u'author_order': 3, u'affiliation': u'Institute for Infocomm Research, Agency for Science, Technology and Research, 21 Heng Mui Keng Terrace, Singapore 119613,', u'full_name': u'Susanto Rahardja'}, {u'author_order': 4, u'affiliation': u'Institute for Infocomm Research, Agency for Science, Technology and Research, 21 Heng Mui Keng Terrace, Singapore 119613,', u'full_name': u'Shoulie Xie'}] 2007 IEEE Workshop on Signal Processing Systems, None

In this paper, a new framework is proposed for the encoder optimization of scalable video coding (SVC). It is used to provide guidelines for the design of rate control and fast mode decision at the base layer and base layer selection at enhancement layer for the SVC. It is also pointed out that the coding technology of inter-layer prediction with ...

Reconfiguration of FFT arrays: a flow-driven approach

[{u'author_order': 1, u'affiliation': u'Dipartimento di Elettronica, Politechnico di Milano, Italy', u'full_name': u'A. Antola'}, {u'author_order': 2, u'affiliation': u'Dipartimento di Elettronica, Politechnico di Milano, Italy', u'full_name': u'N. Scarabottolo'}] [1990] Proceedings of the International Conference on Application Specific Array Processors, None

A new reconfiguration algorithm for defect and fault tolerance in fast Fourier transform (FFT) two-dimensional arrays is presented. The reconfiguration scheme is based on the data flow of the algorithm to minimize the overhead due to the re-routing of information in the reconfigured array. Evaluation of the effectiveness of this approach shows a significant increase in system robustness with respect ...

Optimal Node Selection for Data Regeneration in Heterogeneous Distributed Storage Systems

[{u'author_order': 1, u'affiliation': u'Sch. of Comput. Sci., Fudan Univ., Shanghai, China', u'full_name': u'Qingyuan Gong'}, {u'author_order': 2, u'affiliation': u'Sch. of Comput. Sci., Fudan Univ., Shanghai, China', u'full_name': u'Jiaqi Wang'}, {u'author_order': 3, u'affiliation': u'Sch. of Comput. Sci., Fudan Univ., Shanghai, China', u'full_name': u'Dongsheng Wei'}, {u'author_order': 4, u'affiliation': u'Dept. of Comput. Sci. & Technol., Soochow Univ., Suzhou, China', u'full_name': u'Jin Wang'}, {u'author_order': 5, u'affiliation': u'Sch. of Comput. Sci., Fudan Univ., Shanghai, China', u'full_name': u'Xin Wang'}] 2015 44th International Conference on Parallel Processing, None

Distributed storage systems introduce redundancy to protect data from node failures. After a storage node fails, the lost data should be regenerated at a replacement storage node as soon as possible to maintain the same level of redundancy. Minimizing such a regeneration time is critical to the reliability of distributed storage systems. Existing work commits to reduce the regeneration time ...

IEEE Draft Standard for Local and metropolitan area networks -- Frame Replication and Elimination for Reliability

None IEEE P802.1CB/D2.6, August 2016, 2016

This standard specifies procedures, managed objects, and protocols for bridges and end systems that provide identification and replication of packets for redundant transmission, identification of duplicate packets, and elimination of duplicate packets. It is not concerned with the creation of the multiple paths over which the duplicates are transmitted.

An approach to concept-obtained text summarization

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Eng., Guangxi Univ. of Technol., China', u'full_name': u'Meng Wang'}, {u'author_order': 2, u'full_name': u'Xiaorong Wang'}, {u'author_order': 3, u'full_name': u'Chao Xu'}] IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005., None

In this paper, we propose a practical approach for extracting the most relevant sentences from the original document to form a summary. The idea of our approach is to obtain concepts of words based on HowNet, and use concept as feature, instead of word. We use conceptual vector space model to form a rough summarization, and then calculate degree of ...

More Xplore Articles

Educational Resources on Redundancy

Back to Top


No eLearning Articles are currently tagged "Redundancy"


  • N -order Transfer Functions

    This chapter extends the 2nd-order transfer function formulas and applies them to higher-order networks. Dealing with a high-order network with more terms of numerator and denominator is not overly complex. The key to success lies in slicing the network into numerous individual sketches, each representing a particular time constant configuration for _D_ and _N_. The chapter strats with a generalized nth-order expression and quickly delves into complicated circuit analysis up to the 4th order. A binomial expression helps define how many terms form these coefficients. The chapter provides generic formulas to determine the combined time constants present in the coefficients. _n_ th- order numerator and denominator can sometimes be rearranged in a canonical form involving a quality factor Q and a resonant frequency _?>_ 0. Approximate expressions are possible when neglecting certain elements, but often to the detriment of the final dynamic response precision.

  • Channel Coding and Capacity

    This chapter contains sections titled: Principles of Channel Coding Linear Block Codes Convolutional Codes Channel Capacity Codes that Approach Capacity Problems References

  • End-to-End Considerations

    End users experience cloud-based applications via their smartphone, tablet, laptop, or other device, and that experience aggregates the service impairments of the cloud-based application, the cloud infrastructure, the wide area and access networks, and the user's device itself. This chapter first talks about ?>End-to-End Service Context,?> where it frames the context and general consideration for service quality actually experienced by end users. Next, it discusses ?>Three-Layer End-to-End Service Model,?> offering a simple model for analyzing end-to-end service impairments. The section on ?>Distributed Cloud Data Centers,?> considers the service quality implications of obtaining service from smaller, nearby cloud data centers compared with larger but more distant regional data centers. The chapter also considers complex solutions that rely on resources in multiple cloud data centers. Finally, the chapter talks about ?>Disaster Recovery and Geographic Redundancy,?> where it considers georedundancy and disaster recovery of cloudbased applications.

  • Advanced Protection and Restoration: Protecting the Service

    This chapter contains sections titled: Introduction The business drivers Failure scenarios Existing solutions Protecting the egress - local protection solution Conclusion References Further reading Study questions

  • Probabilistic Indicators for the Assessment of Reliability and Security of Future Power Systems

    To prevent large blackouts, reliability analysis and reliability management are of the utmost importance. While deterministic approaches and criteria have been used effectively in the past, probabilistic methods will be increasingly applied in the future as these provide more insight into the reliability of the transmission network. This chapter describes how probabilistic reliability analysis is used to study the reliability of large transmission networks. The following are two methods for reliability analysis: state enumeration and Monte Carlo simulation. The chapter introduces the concept of time horizons in the planning and operation of a power system. Several reliability indicators are commonly used in probabilistic reliability analysis. The chapter discusses these indicators. These reliability indicators can be directly related to security‐of‐supply, but can also be additional reliability indicators. The chapter describes a case study of the Dutch transmission network.

  • Communication and Synchronization Utilities

    Our society increasingly depends on computer-based systems; the number of applications deployed has increased dramatically in recent years and this trend is accelerating. Many of these applications are expected to provide their services continuously. The Service Availability Forum has recognized this need and developed a set of specifications to help software designers and developers to focus on the value added function of applications, leaving the availability management functions for the middleware. A practical and informative reference for the Service Availability Forum specifications, this book gives a cohesive explanation of the founding principles, motivation behind the design of the specifications, and the solutions, usage scenarios and limitations that a final system may have. Avoiding complex mathematical explanations, the book takes a pragmatic approach by discussing issues that are as close as possible to the daily software design/development by practitioners, and yet at a level that still takes in the overall picture. As a result, practitioners will be able to use the specifications as intended. * Takes a practical approach, giving guidance on the use of the specifications to explain the architecture, redundancy models and dependencies of the Service Availability (SA) Forum services * Explains how service availability provides fault tolerance at the service level * Clarifies how the SA Forum solution is supported by open source implementations of the middleware * Includes fragments of code, simple example and use cases to give readers a practical understanding of the topic * Provides a stepping stone for applications and system designers, developers and advanced students to help them understand and use the specifications

  • Application of DFMEA to Real-Life Example

    This chapter provides a case study of a Design Failure Modes and Effects Analysis (DFMEA) for an actual telecommunications project. As a result of conducting this DFMEA, design faults were identified that otherwise may not have been discovered. Design changes were introduced to prevent these faults from being discovered after product introduction. Using the initial and revised RPNs, the design improvements can be quantified. The lessons learned from this project were identified and used to improve the effectiveness and efficiency of the subsequent DFMEAs for this project.

  • Parameter Models and Estimators in Soft Decision Source Decoding

    This chapter contains sections titled: Introduction Overview to Soft Decision Source Decoding The Markovian Parameter Model Basic Extrapolative Estimators Joint Extrapolative Estimation of Two Different Parameters Extrapolative Estimation with Repeated Parameter Transmission Interpolative Estimation of a Parameter Discussion and Conclusions Bibliography

  • ASN‐GW High Availability through Cooperative Networking in Mobile WiMAX Deployments

    This chapter contains sections titled: Introduction Classic HA Implementation Network‐based Resiliency Solutions for Routing WiMAX Network Elements R4/R6 Health Management R6 Load Balancing ASN‐GW Failure and Recovery _N_:_N_ Redundancy Multi‐instance ASN‐GW The Proposal Summary Conclusions

  • Application Redundancy and Cloud Computing

    This chapter considers how simplex, traditional (sequential) redundancy and nontraditional (concurrent) redundancy architectures mitigate the application service impacts of virtualized infrastructure impairments. It explains how virtualization technology can improve software restore times, and how virtualization and cloud computing can improve infrastructure restore times. Next, the chapter compares and contrasts sequential redundancy with concurrent redundancy arrangements. It then methodically considers the application service impact of virtualized infrastructure impairments on simplex, sequential redundant, concurrent redundant, and hybrid concurrent redundant architectures. The chapter also explains traditional hardware repair, automatic VM Repair-as-a-Service (RaaS), and discusses the implications of these mechanisms. Finally, the chapter summarizes the advantages and drawbacks of the four redundancy architectures across several dimensions: service quality impact; concurrency control; resource usage; and simplicity.