University of Calgary
Displaying 1-40 of 288 results
-
LogBase: A Scalable Logstructured Database System in the Cloud
Numerous applications such as financial transactions (e.g., stock trading) are write-heavy in nature. The shift from reads to writes in web applications has also been accelerating in recent years. Wri...
Provided By University of Calgary
-
Multi-Path TCP With Network Coding for Mobile Devices in Heterogeneous Networks
Existing mobile devices have the capability to use multiple network technologies simultaneously to help increase performance; but they rarely, if at all, effectively use these technologies in parallel...
Provided By University of Calgary
-
Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation
The authors provide a detailed study of the estimation of probability distributions - discrete and continuous - in a stringent setting in which data is kept private even from the statistician. They gi...
Provided By University of Calgary
-
Decentralizing Network Inference Problems with Multiple-Description Fusion Estimation (MDFE)
Two forms of network inference (or tomography) problems have been studied rigorously: traffic matrix estimation or completion based on link-level traffic measurements, and link-level loss or delay inf...
Provided By University of Calgary
-
Smart Communications Via a Tree-Based Overlay Over Multiple and Heterogeneous (TOMH) Spontaneous Networks
The current networking scenario is characterized by widespread availability of ubiquitous devices with significant processing capabilities, e.g., Smartphones, tablets, and laptops. In addition, the si...
Provided By University of Calgary
-
Interest Flooding Attack and Countermeasures in Named Data Networking
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet, where packets from a large number of compromised hosts thwart the paths to the victim site and/or overload the ...
Provided By University of Calgary
-
Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks
Many practical problems in mobile social networks such as routing, community detection, and social behavior analysis, rely on accurate user contact detection. The frequently used method for detecting ...
Provided By University of Calgary
-
Incentive Design for Heterogeneous User-Generated Content Networks
In User-Generated Content (UGC) networks, users produce content and share it with other users with which they are connected over an (exogenously-determined) underlying topology. Such networks thrive i...
Provided By University of Calgary
-
Inference-Driven Dynamic Access Scheme for Interference Management in Heterogeneous Networks
Recent statistics have shown that more than 50% of voice calls and more than 70% of data traffic originate from indoor cellular subscribers. Yet, historically, substantial activities in wireless resea...
Provided By University of Calgary
-
SoK: Eternal War in Memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the...
Provided By University of Calgary
-
Path Consolidation for Dynamic Right-Sizing of Data Center Networks
Data center topologies typically consist of multi-rooted trees with many equal-cost paths between a given pair of hosts. Existing power optimization techniques do not utilize this property of data cen...
Provided By University of Calgary
-
Disaster-Resilient Virtual-Network Mapping and Adaptation in Optical Networks
Today's Internet applications include grid- and cloud-computing services which can be implemented by mapping Virtual Networks (VNs) over physical infrastructure such as an optical network. VN mapping ...
Provided By University of Calgary
-
Utility-Aware Deferred Load Balancing in the Cloud Driven by Dynamic Pricing of Electricity
Distributed computing resources in a cloud computing environment provides an opportunity to reduce energy and its cost by shifting loads in response to dynamically varying availability of energy. This...
Provided By University of Calgary
-
Content Based Traffic Engineering in Software Defined Information Centric Networks
This paper describes a content centric network architecture which uses software defined networking principles to implement efficient metadata driven services by extracting content metadata at the netw...
Provided By University of Calgary
-
Compressive Link Acquisition in Multiuser Communications
An important receiver operation is to detect the presence specific preamble signals with unknown delays in the presence of scattering, Doppler effects and carrier offsets. This task, referred to as "L...
Provided By University of Calgary
-
Improving Sensor Data Delivery During Disaster Scenarios With Resilient Overlay Networks
In this paper, the authors consider many-to-one communication, in particular Internet-connected sensors and their relation to disaster response. They explore the application of resilient overlay netwo...
Provided By University of Calgary
-
NDN.JS: A JavaScript Client Library for Named Data Networking
NDN.JS is the first JavaScript implementation of a client library for Named Data Networking (NDN). It facilitates NDN experimentation and usage by enabling end nodes to interact with an NDN network wi...
Provided By University of Calgary
-
Tie-Set Based Fault Tolerance for Autonomous Recovery of Double-Link Failures
In this paper, the authors propose a mechanism for coping with double-link failures in an autonomous and distributed manner. They call it Tie-set Based Fault Tolerance (TBFT) because it utilizes tie-s...
Provided By University of Calgary
-
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
The authors consider a very strong notion of Secret Handshakes, namely Affiliation-Hiding Authenticated Key Exchange protocols (AH-AKE), which guarantee security under arbitrary composition of protoco...
Provided By University of Calgary
-
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, clients need to outso...
Provided By University of Calgary
-
Extended Diversity Coding: Coding Protection and Primary Paths for Network Restoration
The technique of diversity coding offers fast recovery against failures in networks while keeping spare capacity comparable to the alternative state-of-the art network restoration techniques. It provi...
Provided By University of Calgary
-
Systematic Treatment of Remote Attestation
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automa...
Provided By University of Calgary
-
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control and NDN
Instrumented environments, such as modern Building Automation Systems (BAS), are becoming commonplace and are increasingly interconnected with (and sometimes by) enterprise networks and the Internet. ...
Provided By University of Calgary
-
FlowSense: Monitoring Network Utilization With Zero Measurement Cost
Flow-based programmable networks must continuously monitor performance metrics, such as link utilization, in order to quickly adapt forwarding rules in response to changes in workload. However, existi...
Provided By University of Calgary
-
Cryptography Using Captcha Puzzles
A Captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, modeling Captcha puzzles (as hard AI problems), was introduced by Ahn, Blum, Hopper, and Langford. De...
Provided By University of Calgary
-
Network Coding With Computation Alignment
Determining the capacity of multi-receiver networks with arbitrary message demands is an open problem in the network coding literature. In this paper, the authors consider a multisource, multi-receive...
Provided By University of Calgary
-
Simultaneous Information and Energy Transfer: A Two-User MISO Interference Channel Case
This paper considers the sum rate maximization problem of a two-user multiple-input single-output interference channel with receivers that can scavenge energy from the radio signals transmitted by the...
Provided By University of Calgary
-
Shadow Chasing Enhancement in Resource Allocation for Heterogeneous Networks
In this paper, the authors propose an enhancement to a resource allocation scheme known as shadow chasing for interference mitigation in heterogeneous networks composed of Macrocell User Equipments (M...
Provided By University of Calgary
-
Robust Multicasting in Micro Base Station Aided Wireless Cellular Networks
Efficient multicasting of critical messages is of essential importance in public safety and commercial multimedia cellular networks. The authors study the effectiveness of using the aid of micro Base ...
Provided By University of Calgary
-
Linear Programming Based Joint Detection of LDPC Coded MIMO Systems
Multiple-Input Multiple-Output (MIMO) communication systems can achieve higher throughput by exploiting diversity in multi-antenna wireless communications. Spatial multiplexing schemes attempts to tak...
Provided By University of Calgary
-
Spectrum Management in Heterogeneous Bandwidth Networks
As optical network continues to evolve, lightpaths will take on different spectrum spaces as opposed to current uniform 50-GHz grid. While lightpaths of heterogeneous bandwidths co-exist, two factors ...
Provided By University of Calgary
-
Cooperative Beamforming in Multiuser MIMO Networks: Fast SINR Fairness Algorithms
This paper studies efficient signal transmission strategies in a multiuser MIMO network where multiple source nodes form a large virtual MIMO array to perform cooperative beamforming. In order to redu...
Provided By University of Calgary
-
Multi-User Detection for Asynchronous Space-Frequency Block Coded Schemes in Frequency Selective Environments
Multi-user detection is an efficient approach proposed to boost the spectral efficiency of a wireless communication system. While multi-user detection in synchronous systems or in flat fading environm...
Provided By University of Calgary
-
The k-BDH Assumption Family: Bilinear Map Cryptography From Progressively Weaker Assumptions
Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In addition to new functionality, the authors have concurrently seen the emergence of many strong assumptio...
Provided By University of Calgary
-
Two Birds and One Stone: Gaussian Interference Channel With a Shared Out-of-Band Relay of Limited Rate
The butterfly network, the coat of arms of network coding, exemplifies a fascinating fact about networks: a single relayed bit may turn into multiple information bits at different destination. In othe...
Provided By University of Calgary
-
Cross-Layer Virtual Observers for Embedded Multiprocessor System-on-Chip (MPSoC)
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware due to manufacturing process variability, exponentially increasing power ...
Provided By University of Calgary
-
DataMods: Programmable File System Services
As applications become more complex, and the level of concurrency in systems continue to rise, developers are struggling to scale complex data models on top of a traditional byte stream interface. Mid...
Provided By University of Calgary
-
How to Garble RAM Programs
Yao's Garbled Circuits is one of the central and one of the most widely used tools in cryptography, both in theory and in practice. It has numerous applications and multiple implementations, as well a...
Provided By University of Calgary
-
Green Cellular Wireless Networks: Where to Begin?
Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency...
Provided By University of Calgary
-
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
This dissertation exploits 2-Tier cloud architecture for rich mobile applications. It is based on the observation that using local resources in close proximity to the user, i.e. local clouds or cloudl...
Provided By University of Calgary
-
CloudProtect: Managing Data Privacy in Cloud Applications
This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for im...
Provided By University of Calgary
-
Cyclic and Quasi-Cyclic LDPC Codes: New Developments
In this paper, the authors have shown that cyclic and QC descendant codes can be derived from a given cyclic code through decomposition of its parity-check matrix in circulant form using specific colu...
Provided By University of Calgary
-
Non-Binary LDPC Codes Vs. Reed-Solomon Codes
In this paper, the authors investigate the potential of non-binary LDPC codes to replace widely used Reed-Solomon (RS) codes for applications in communication and storage systems for combating mixed t...
Provided By University of Calgary
-
Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation
The error-correcting performance of Low-Density Parity Check (LDPC) codes, when decoded using practical iterative decoding algorithms, is known to be very close to Shannon limits in the asymptotic lim...
Provided By University of Calgary
-
Software Techniques to Improve Virtualized I/O Performance on Multi-Core Systems
Virtualization technology is now widely deployed on high performance networks such as 10-Gigabit Ethernet (10GE). It offers useful features like functional isolation, manageability and live migration....
Provided By University of Calgary
-
Quantitative Evaluation of Secure Network Coding Using Homomorphic Signature/Hashing
Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attac...
Provided By University of Calgary
-
Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac
Intra-session network coding is known to be vulnerable to Byzantine attacks: malicious nodes can inject bogus packets, which get combined with legitimate blocks at downstream nodes, thus preventing de...
Provided By University of Calgary
-
Optimal Bit Allocation of Limited Rate Feedback for Cooperative Jamming
In this paper, the authors investigate bit allocation schemes with limited rate feedback for cooperative jamming. In addition to the transmitter and receiver, they assume a passive eavesdropper and co...
Provided By University of Calgary
-
On the Word Problem for ??-Categories, and the Properties of Two-Way Communication
The word problem for categories with free products and co-products (sums), ??-categories, is directly related to the problem of determining the equivalence of certain processes. Indeed, the maps in th...
Provided By University of Calgary
-
POTSHARDS - A Secure, Recoverable, Long-Term Archival Storage System
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public's desire to digitally record their personal histories. Unfort...
Provided By University of Calgary
-
DataMods: Programmable File System Services
As applications become more complex, and the level of concurrency in systems continue to rise, developers are struggling to scale complex data models on top of a traditional byte stream interface. Mid...
Provided By University of Calgary
-
Compressing Intermediate Keys Between Mappers and Reducers in SciHadoop
In Hadoop mappers send data to reducers in the form of key/value pairs. The default design of Hadoop's process for transmitting this intermediate data can cause a very high overhead, especially for sc...
Provided By University of Calgary
-
End-to-End Performance Management for Scalable Distributed Storage
Many applications - for example, scientific simulation, real-time data acquisition, and distributed reservation systems - have I/O performance requirements, yet most large, distributed storage systems...
Provided By University of Calgary
-
Analyzing User Behavior: A Trace Analysis of the NCAR Archival Storage System
As the need for archival storage systems grows it becomes increasingly more important that the authors examine and understand how existing systems operate and are used under real-world conditions. Wit...
Provided By University of Calgary
-
HANDS: A Heuristically Arranged Non-Backup In-Line Deduplication System
Deduplication on is rarely used on primary storage because of the disk bottleneck problem, which results from the need to keep an index mapping chunks of data to hash values in memory in order to dete...
Provided By University of Calgary
-
Analysis and Construction of Galois Fields for Efficient Storage Reliability
Software-based Galois field implementations are used in the reliability and security components of many storage systems. Unfortunately, multiplication and division operations over Galois fields are ex...
Provided By University of Calgary
-
Dynamic Shortest Path Algorithms for Hypergraphs
A hypergraph is a set V of vertices and a set of non-empty subsets of V, called hyperedges. Unlike graphs, hypergraphs can capture higher-order interactions in social and communication networks that g...
Provided By University of Calgary
-
Provenance Based Rebuild: Using Data Provenance to Improve Reliability
Traditionally, data preservation and reliability have used Error Correcting Codes (ECCs) to ensure data safety. The development of general data provenance tracking systems provides a new opportunity f...
Provided By University of Calgary
-
Tracking Emigrant Data via Transient Provenance
Information leaks are a constant worry for companies and government organizations. After a leak occurs it is very important for the data owner to not only determines the extent of the leak, but who or...
Provided By University of Calgary
-
Accurate Characterization of the Variability in Power Consumption in Modern Mobile Processors
The variability in performance and power consumption is slated to grow further with continued scaling of process technologies. While this variability has been studied and modeled before, there is lack...
Provided By University of Calgary
-
Towards Verifying Android Apps for the Absence of No-Sleep Energy Bugs
The Android OS conserves battery life by aggressively turning off components, such as screen and GPS, while allowing application developers to explicitly prevent part of this behavior using the Wake-L...
Provided By University of Calgary
-
Systematic Treatment of Remote Attestation
Embedded computing devices (such as actuators, controllers and sensors of various sizes) increasingly permeate many aspects of modern life: from medical to automotive, from building and factory automa...
Provided By University of Calgary
-
Cryptography Using Captcha Puzzles
A Captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, modeling Captcha puzzles (as hard AI problems), was introduced by Ahn, Blum, Hopper, and Langford. De...
Provided By University of Calgary
-
Towards a Data Analysis Recommendation System
System data is abundant, yet data-driven decision making is currently more of an art than a science. Many organizations rely on data analysis for problem detection and diagnosis, but the process conti...
Provided By University of Calgary
-
The k-BDH Assumption Family: Bilinear Map Cryptography From Progressively Weaker Assumptions
Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In addition to new functionality, the authors have concurrently seen the emergence of many strong assumptio...
Provided By University of Calgary
-
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging
When systems fail in the field, logged error or warning messages are frequently the only evidence available for assessing and diagnosing the underlying cause. Consequently, the efficacy of such loggin...
Provided By University of Calgary
-
How to Garble RAM Programs
Yao's Garbled Circuits is one of the central and one of the most widely used tools in cryptography, both in theory and in practice. It has numerous applications and multiple implementations, as well a...
Provided By University of Calgary
-
An Energy-Efficient Water-Filling Algorithm for OFDM Systems
In this paper, the authors develop an energy-efficient power allocation algorithm for the parallel channels of an OFDM system. This algorithm provides the optimum solution to a nonlinear fractional pr...
Provided By University of Calgary
-
VideoWeb: Design of a Wireless Camera Network for Real-Time Monitoring of Activities
Sensor networks have been a very active area of research in recent years. However, most of the sensors used in the development of these networks have been local and non imaging sensors such as acousti...
Provided By University of Calgary
-
Multi-Hop Progressive Decentralized Estimation of Deterministic Vector in Wireless Sensor Networks
This paper presents a novel scheme for estimating an unknown deterministic vector in a multi-hop progressive decentralized fashion in a wireless sensor network. Under this scheme, each sensor performs...
Provided By University of Calgary
-
Efficient and Scalable Socware Detection in Online Social Networks
Online Social Networks (OSNs) have become the new vector for cybercrime, and hackers are finding new ways to propagate spam and malware on these platforms, which the authors refer to as socware. As th...
Provided By University of Calgary
-
Line-of-sight Visible Light Communication System Design and Demonstration
With the emergence of high lumen output white lighting LEDs, visible light communication has become an intriguing technology to realize low cost data transmission in conjunction with lighting. In this...
Provided By University of Calgary
-
Testing for Neglected Nonlinearity Using Regularized Articial Neural Networks
The Artificial Neural Network (ANN) test of Lee, White and Granger (LWG, 1993) uses the ability of the ANN activation functions in the hidden layer to detect neglected functional misspecification. As ...
Provided By University of Calgary
-
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data in a multiuser enviro...
Provided By University of Calgary
-
Design Implications for Enterprise Storage Systems Via Multi-Dimensional Trace Analysis
Enterprise storage systems are facing enormous challenges due to increasing growth and heterogeneity of the data stored. Designing future storage systems requires comprehensive in-sights that existing...
Provided By University of Calgary
-
Computing and Communications
A recent survey showed that more than half of higher education institutions have seen an increase in the use of high-performance computing, high-performance networking and data storage and are predict...
Provided By University of Calgary
-
Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution
Content distribution systems benefit from network coding in terms of error/loss protection and faster dissemination at the cost of exposing the data to intermediate nodes that are not the intended rec...
Provided By University of Calgary
-
NC-Audit: Auditing for Network Coding Storage
Network coding-based storage has recently received a lot of attention in the network coding community. Independently, another body of work has proposed integrity checking schemes for cloud storage, no...
Provided By University of Calgary
-
Investigating User Privacy in Android Ad Libraries
Recent years have witnessed incredible growth in the popularity and prevalence of smart phones. A flourishing mobile application market has evolved to provide users with additional functionality such ...
Provided By University of Calgary
-
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale
As mobile devices become more widespread and powerful, they store more sensitive data, which includes not only users' personal information but also the data collected via sensors throughout the day. W...
Provided By University of Calgary