Nanyang Technological University
Displaying 1-40 of 165 results
-
Streamforce: Outsourcing Access Control Enforcement for Stream Data to the Clouds
As tremendous amount of data being generated everyday from human activity and from devices equipped with sensing capabilities, cloud computing emerges as a scalable and cost-effective platform to stor...
Provided By Nanyang Technological University
-
Locally Repairable Codes With Multiple Repair Alternatives
Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the requ...
Provided By Nanyang Technological University
-
Network Performance Aware MPI Collective Communication Operations in the Cloud
In this paper, the authors examine the performance of collective communication operations in Message Passing Interfaces (MPI) in the cloud computing environment. The awareness of network topology has ...
Provided By Nanyang Technological University
-
An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems
A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substi...
Provided By Nanyang Technological University
-
A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications
Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The s...
Provided By Nanyang Technological University
-
Towards Optimal Deployment of Cloud-Assisted Video Distribution Services
For Internet video services, the high fluctuation of user demands in geographically distributed regions results in low resource utilizations of traditional CDN systems. Due to the capability of rapid ...
Provided By Nanyang Technological University
-
The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage
Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient ...
Provided By Nanyang Technological University
-
In-Network Redundancy Generation for Opportunistic Speedup of Data Backup
Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a uniq...
Provided By Nanyang Technological University
-
Community Detection in Weighted Networks: Algorithms and Applications
Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OS...
Provided By Nanyang Technological University
-
Green Databases Through Integration of Renewable Energy
Recently, a lot of energy efficient techniques have been developed to reduce the usage of the carbon intensive energy (brown energy) of databases. There is a new opportunity to reduce the brown energy...
Provided By Nanyang Technological University
-
Robust Performance of Spectrum Sensing in Cognitive Radio Networks
The successful coexistence of Secondary Users (SUs) and Primary Users (PUs) in cognitive radio networks requires SUs to be spectrum aware and know which spectrum bands are occupied by PUs. Such awaren...
Provided By Nanyang Technological University
-
Perceptually Motivated Shape Context Which Uses Shape Interiors
In this paper, the authors identify some of the limitations of current-day shape matching techniques. They provide examples of how contour-based shape matching techniques cannot provide a good match f...
Provided By Nanyang Technological University
-
Cluster-Based Transform Domain Communication Systems for High Spectrum Efficiency
This paper presents a cluster-based Transform Domain Communication System (TDCS) to improve spectrum efficiency. Unlike the utilities of clusters in Orthogonal Frequency Division Multiplex (OFDM) syst...
Provided By Nanyang Technological University
-
Unified Handover Authentication Between Heterogeneous Access Systems in LTE Networks
To achieve seamless handovers between the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and other access networks is a challenging task as it requires comprehensive real-time interconne...
Provided By Nanyang Technological University
-
Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey
Though duty-cycling has long been a critical mechanism for energy conservation in wireless sensor networks, it is only recently that research efforts have been put to design data communication protoco...
Provided By Nanyang Technological University
-
The Arithmetic Codex
The authors introduce the notion of an arithmetic codex, or codex for short. Codices encompass several well-established notions from cryptography (various types of arithmetic secret sharing schemes, w...
Provided By Nanyang Technological University
-
Data Insertion & Archiving in Erasure-Coding Based Large-Scale Storage Systems
Given the vast volume of data that needs to be stored reliably, many data-centers and large-scale file systems have started using erasure codes to achieve reliable storage while keeping the storage ov...
Provided By Nanyang Technological University
-
Wireless Compressive Sensing for Energy Harvesting Sensor Nodes
The authors consider the scenario in which multiple sensors send spatially correlated data to a Fusion Center (FC) via independent Rayleigh-fading channels with additive noise. Assuming that the senso...
Provided By Nanyang Technological University
-
Hierarchical Competition for Downlink Power Allocation in OFDMA Femtocell Networks
This paper considers the problem of downlink power allocation in an Orthogonal Frequency-Division Multiple Access (OFDMA) cellular network with macrocells underlaid with femtocells. The Femto-Access P...
Provided By Nanyang Technological University
-
Multi-Receiver Homomorphic Authentication Codes for Network Coding
The authors investigate a new class of Authenticate-codes (A-codes) that support verification by a group of message recipients in the network coding setting. That is, a sender generates an A-code over...
Provided By Nanyang Technological University
-
The LED Block Cipher
The authors present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed...
Provided By Nanyang Technological University
-
Decentralized Erasure Coding for Efficient Data Archival in Distributed Storage Systems
Distributed storage systems usually achieve fault tolerance by replicating data across different nodes. However, redundancy schemes based on erasure codes can provide a storage-efficient alternative t...
Provided By Nanyang Technological University
-
Performance Analysis of Two-Step Bi-Directional Relaying with Multiple Antennas
In this paper, the authors study decode-and-forward multi-antenna relay systems that achieve bi-directional communication in two time slots. They investigate different downlink broadcast schemes which...
Provided By Nanyang Technological University
-
Wireless Compressive Sensing for Energy Harvesting Sensor Nodes Over Fading Channels
The authors consider the scenario in which multiple sensors send spatially correlated data to the Fusion Center (FC) via independent Rayleigh-fading channels with additive noise. Assuming that the sen...
Provided By Nanyang Technological University
-
Green-Aware Workload Scheduling in Geographically Distributed Data Centers
Renewable (or green) energy, such as solar or wind, has at least partially powered data centers to reduce the environmental impact of traditional energy sources (brown energy with high carbon footprin...
Provided By Nanyang Technological University
-
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs
In 2001, a breakthrough result by Barak [FOCS 2001] showed how to achieve public-coin Zero-Knowledge (ZK) arguments in constant rounds, a feature known to be impossible using black-box simulation. In ...
Provided By Nanyang Technological University
-
Enabling 3-Share Threshold Implementations for Any 4-bit S-Box
Side Channel Attacks (SCA) were introduced in 1997 by Kocher et al. and exploit the fact that while a device is processing data, information about this data is leaked through different channels, e.g.,...
Provided By Nanyang Technological University
-
Socially-Responsible Load Scheduling Algorithms for Sustainable Data Centers Over Smart Grid
Power consumption of data centers accounts for a significant portion of operational cost for service providers. However, it is not sufficient to minimize electricity cost only. Instead, service provid...
Provided By Nanyang Technological University
-
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of t...
Provided By Nanyang Technological University
-
RapidRAID: Pipelined Erasure Codes for Fast Data Archival in Distributed Storage Systems
To achieve reliability in distributed storage systems, data has usually been replicated across different nodes. However the increasing volume of data to be stored has motivated the introduction of era...
Provided By Nanyang Technological University
-
On P2P Mechanisms for VM Image Distribution in Cloud Data Centers: Modeling, Analysis and Improvement
To provide elastic cloud services with QoS guarantee, it is essential for cloud data centers to provision virtual machines rapidly according to user requests. Due to bandwidth bottleneck of centralize...
Provided By Nanyang Technological University
-
Content Routing and Lookup Schemes Using Global Bloom Filter for Content-Delivery-as-a-Service
Leveraging cloud computing technology, the authors have proposed Content-Delivery-as-a-Service (CoDaaS) to distribute User Generated Content (UGC) in an efficient and economical fashion. However, due ...
Provided By Nanyang Technological University
-
Energy Optimizations for Data Center Network: Formulation and Its Solution
Data center consumes increasing amount of power nowadays, together with expanding number of data centers and upgrading data center scale, its power consumption becomes a knotty issue. While main effor...
Provided By Nanyang Technological University
-
Optimizing Content Retrieval Delay for LT-Based Distributed Cloud Storage Systems
Among different setups of cloud storage systems, fountain-codes based distributed cloud storage system provides reliable online storage solution through placing coded content fragments into multiple s...
Provided By Nanyang Technological University
-
QoE-Driven Cache Management for HTTP Adaptive Bit Rate (ABR) Streaming Over Wireless Networks
In this paper, the authors investigate the problem of how to cache a set of media files with optimal streaming rates, under HTTP adaptive bit rate streaming over wireless networks. The design objectiv...
Provided By Nanyang Technological University
-
Transmit Optimization With Improper Gaussian Signaling for Interference Channels
This paper studies the achievable rates of Gaussian interference channels, when the improper or circularly asymmetric complex Gaussian signaling is applied. For the Gaussian Multiple-Input Multiple-Ou...
Provided By Nanyang Technological University
-
Cross-Domain Password-Based Authenticated Key Exchange Revisited
The authors revisit the problem of cross-domain secure communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppos...
Provided By Nanyang Technological University
-
A GPS Pseudorange Based Cooperative Vehicular Distance Measurement Technique
Accurate vehicular localization is important for various Cooperative Vehicle Safety (CVS) applications such as collision avoidance, turning assistant, etc. In this paper, the authors propose a coopera...
Provided By Nanyang Technological University
-
Cloud and the City: Facilitating Flexible Access Control over Data Streams
The proliferation of sensing devices create plethora of data-streams, which in turn can be harnessed to carry out sophisticated analytics to support various real-time applications and services as well...
Provided By Nanyang Technological University
-
A Hierarchical Framework of Dynamic Relay Selection for Mobile Users and Profit Maximization for Service Providers in Wireless Relay Networks
Although, extensive research has been carried out on the issue of how to optimally select relays in wireless relay networks, relay selection for mobile users is still a challenging problem due to the ...
Provided By Nanyang Technological University
-
Wireless Compressive Sensing for Energy Harvesting Sensor Nodes Over Fading Channels
The authors consider the scenario in which multiple sensors send spatially correlated data to the Fusion Center (FC) via independent Rayleigh-fading channels with additive noise. Assuming that the sen...
Provided By Nanyang Technological University
-
Hierarchical Competition for Downlink Power Allocation in OFDMA Femtocell Networks
This paper considers the problem of downlink power allocation in an Orthogonal Frequency-Division Multiple Access (OFDMA) cellular network with macrocells underlaid with femtocells. The Femto-Access P...
Provided By Nanyang Technological University
-
SIR Estimation in Hexagonal Cellular Networks With Best Server Policy
The evaluation of the Signal to Interference Ratio (SIR) in cellular networks is of primary importance for network dimensioning. For static studies, which evaluate cell capacity and coverage, as well ...
Provided By Nanyang Technological University
-
Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective
Channel allocation is a crucial concern in variable-width Wireless Local Area Networks (WLANs). This paper aims to obtain the stable and fair non-overlapped variable-width channel allocation for selfi...
Provided By Nanyang Technological University
-
The LED Block Cipher
The authors present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed...
Provided By Nanyang Technological University
-
Enabling 3-Share Threshold Implementations for Any 4-bit S-Box
Side Channel Attacks (SCA) were introduced in 1997 by Kocher et al. and exploit the fact that while a device is processing data, information about this data is leaked through different channels, e.g.,...
Provided By Nanyang Technological University
-
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs
In 2001, a breakthrough result by Barak [FOCS 2001] showed how to achieve public-coin Zero-Knowledge (ZK) arguments in constant rounds, a feature known to be impossible using black-box simulation. In ...
Provided By Nanyang Technological University
-
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for every given access structure is a difficult and long-standing open problem in cryptology. Most of t...
Provided By Nanyang Technological University
-
Multi-Receiver Homomorphic Authentication Codes for Network Coding
The authors investigate a new class of Authenticate-codes (A-codes) that support verification by a group of message recipients in the network coding setting. That is, a sender generates an A-code over...
Provided By Nanyang Technological University
-
Cross-Domain Password-Based Authenticated Key Exchange Revisited
The authors revisit the problem of cross-domain secure communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppos...
Provided By Nanyang Technological University
-
Community Detection in Weighted Networks: Algorithms and Applications
Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OS...
Provided By Nanyang Technological University
-
Robust Performance of Spectrum Sensing in Cognitive Radio Networks
The successful coexistence of Secondary Users (SUs) and Primary Users (PUs) in cognitive radio networks requires SUs to be spectrum aware and know which spectrum bands are occupied by PUs. Such awaren...
Provided By Nanyang Technological University
-
A Hierarchical Framework of Dynamic Relay Selection for Mobile Users and Profit Maximization for Service Providers in Wireless Relay Networks
Although, extensive research has been carried out on the issue of how to optimally select relays in wireless relay networks, relay selection for mobile users is still a challenging problem due to the ...
Provided By Nanyang Technological University
-
Machine-to-Machine Communications for Home Energy Management System in Smart Grid
Machine-To-Machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications. This pap...
Provided By Nanyang Technological University
-
Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey
Though duty-cycling has long been a critical mechanism for energy conservation in wireless sensor networks, it is only recently that research efforts have been put to design data communication protoco...
Provided By Nanyang Technological University
-
DECA: Recovering Fields of Physical Quantities from Incomplete Sensory Data
Although, Wireless Sensor Networks (WSNs) are powerful in monitoring physical events, the data collected from a WSN are almost always incomplete if the surveyed physical event spreads over a wide area...
Provided By Nanyang Technological University
-
Harmonic Quorum Systems: Data Management in 2D/3D Wireless Sensor Networks With Holes
With the development of ever-expanding Wireless Sensor Networks (WSNs) that are meant to connect physical worlds with human societies, gathering sensory data at a single point is becoming less and les...
Provided By Nanyang Technological University
-
Transmit Optimization With Improper Gaussian Signaling for Interference Channels
This paper studies the achievable rates of Gaussian interference channels, when the improper or circularly asymmetric complex Gaussian signaling is applied. For the Gaussian Multiple-Input Multiple-Ou...
Provided By Nanyang Technological University
-
The Arithmetic Codex
The authors introduce the notion of an arithmetic codex, or codex for short. Codices encompass several well-established notions from cryptography (various types of arithmetic secret sharing schemes, w...
Provided By Nanyang Technological University
-
Shorter IBE and Signatures via Asymmetric Pairings
The authors present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric eXternal Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE and the signature ...
Provided By Nanyang Technological University
-
On P2P Mechanisms for VM Image Distribution in Cloud Data Centers: Modeling, Analysis and Improvement
To provide elastic cloud services with QoS guarantee, it is essential for cloud data centers to provision virtual machines rapidly according to user requests. Due to bandwidth bottleneck of centralize...
Provided By Nanyang Technological University
-
A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications
Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The s...
Provided By Nanyang Technological University
-
An Interference Minimization Game Theoretic Subcarrier Allocation Algorithm for OFDMA-Based Distributed Systems
In this paper, the authors consider a scenario where distributed users in an OFDM-based system share the spectrum for transmission. Each network user (player) comprises a pair of transmit and receive ...
Provided By Nanyang Technological University
-
Design of Congestion Control Based on Instantaneous Queue Sizes in the Routers
Recently, eXplicit Control Protocol (XCP), Rate Control Protocol (RCP), and Adaptive Proportional-Integral Rate Control Protocol (API-RCP) have been proposed for congestion control, with the main obje...
Provided By Nanyang Technological University
-
Improved Linear Precoding Over Block Diagonalization in Multi-Cell Cooperative Networks
In downlink multiuser Multiple-Input Multiple-Output (MIMO) systems, Block Diagonalization (BD) is a practical linear pre-coding scheme which achieves the same Degrees of Freedom (DoF) as the optimal ...
Provided By Nanyang Technological University
-
Unified Handover Authentication Between Heterogeneous Access Systems in LTE Networks
To achieve seamless handovers between the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and other access networks is a challenging task as it requires comprehensive real-time interconne...
Provided By Nanyang Technological University
-
Wireless Compressive Sensing for Energy Harvesting Sensor Nodes
The authors consider the scenario in which multiple sensors send spatially correlated data to a Fusion Center (FC) via independent Rayleigh-fading channels with additive noise. Assuming that the senso...
Provided By Nanyang Technological University
-
Green-Aware Workload Scheduling in Geographically Distributed Data Centers
Renewable (or green) energy, such as solar or wind, has at least partially powered data centers to reduce the environmental impact of traditional energy sources (brown energy with high carbon footprin...
Provided By Nanyang Technological University
-
Green Databases Through Integration of Renewable Energy
Recently, a lot of energy efficient techniques have been developed to reduce the usage of the carbon intensive energy (brown energy) of databases. There is a new opportunity to reduce the brown energy...
Provided By Nanyang Technological University
-
Streamforce: Outsourcing Access Control Enforcement for Stream Data to the Clouds
As tremendous amount of data being generated everyday from human activity and from devices equipped with sensing capabilities, cloud computing emerges as a scalable and cost-effective platform to stor...
Provided By Nanyang Technological University
-
Network Performance Aware MPI Collective Communication Operations in the Cloud
In this paper, the authors examine the performance of collective communication operations in Message Passing Interfaces (MPI) in the cloud computing environment. The awareness of network topology has ...
Provided By Nanyang Technological University
-
Decentralized Erasure Coding for Efficient Data Archival in Distributed Storage Systems
Distributed storage systems usually achieve fault tolerance by replicating data across different nodes. However, redundancy schemes based on erasure codes can provide a storage-efficient alternative t...
Provided By Nanyang Technological University
-
Locally Repairable Codes With Multiple Repair Alternatives
Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the requ...
Provided By Nanyang Technological University
-
The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage
Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient ...
Provided By Nanyang Technological University
-
A CMOS Frequency Divider for 2.4/5GHz WLAN Applications With a Simplified Structure
In this paper, a dual-band integer-N frequency divider is proposed for 2.4/5.2 GHz multi-standard wireless local area networks. It consists of a multi-modulus imbalance phase switching prescaler and t...
Provided By Nanyang Technological University
-
Design of Low Hardware Complexity Filter Banks for Communications Systems Employing Folding Number System
In this paper, a new architecture to compute 1-D Discrete Wavelet Transform (DWT) based on Folding Number System (FNS) is introduced. Numbers for FNS are extracted directly from analog input without a...
Provided By Nanyang Technological University
-
An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems
A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substi...
Provided By Nanyang Technological University
-
Towards Optimal Deployment of Cloud-Assisted Video Distribution Services
For Internet video services, the high fluctuation of user demands in geographically distributed regions results in low resource utilizations of traditional CDN systems. Due to the capability of rapid ...
Provided By Nanyang Technological University
-
DTD-Miner: A Tool for Mining DTD From XML Documents
XML documents are semistructured and the structure of the documents is embedded in the tags. Although XML documents can be accompanied by a DTD that defines the structure of the documents, the presenc...
Provided By Nanyang Technological University
-
Guest Editorial: Special Issue on Cloud Computing
Cloud computing has been gaining more acceptance thanks to the benefits it offers to customers including increased scalability, higher reliability, cost reduction, and higher accessibility. For exampl...
Provided By Nanyang Technological University