Aalto University

Displaying 1-40 of 68 results

  • White Papers // Sep 2013

    Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

    The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates...

    Provided By Aalto University

  • White Papers // Sep 2013

    Device-to-Device Data Storage for Mobile Cellular Systems

    As an alternative to downloading content from a cellular access network, mobile devices could be used to store data files and distribute them through Device-To-Device (D2D) communication. The authors consider a D2D-based storage community that is comprised of mobile users. Assuming that transmitting data from a base station to a...

    Provided By Aalto University

  • White Papers // May 2013

    Theoretical Elaboration of IT Enablement Model in the Era of Customer and Community Digital Innovation

    Research on information systems has demonstrated the strategic potential of Information Technology (IT) through the logic of IT enablement: synergistic relationship between IT assets with organizational resources ensuing IT-enabled resources capable of influencing competitive firm performance. However, this enablement view has largely focused on IT assets and organizational resources within...

    Provided By Aalto University

  • White Papers // Mar 2013

    Distributed Precoding for MISO Interference Channels with Channel Mean Feedback: Algorithms and Analysis

    In this paper, the authors focuses on the design and analysis of distributed stochastic pre-coding algorithms for Multiple-Input Single-Output (MISO) interference channels, where each transmitter is provided with mean information of its intended channel and that of interfering channels. Unlike in cases where exact channel gains are known as in...

    Provided By Aalto University

  • White Papers // Feb 2013

    Authenticated Resource Management in Delay-Tolerant Networks Using Proxy Signatures

    In Delay-Tolerant Networks (DTN), individual nodes with much higher rates of sending new bundles than average can degrade the delivery rate of other nodes substantially. They have a much higher impact on the overall network fairness than in traditional networks because of DTN-specific properties, such as decentralized design and the...

    Provided By Aalto University

  • White Papers // Feb 2013

    Characterizing Content Sharing Properties for Mobile Users in Open City Squares

    For mobile delay-tolerant networks, different mobility models have been utilized to assess the performance of routing algorithms and applications. Substantial work has gone into understanding the contact characteristics of mobile users to allow evaluation under conditions that approximate the real world. One important finding has been recognizing that contacts humans...

    Provided By Aalto University

  • White Papers // Feb 2013

    P2P Media Streaming With HTML5 and WebRTC

    Video-on-Demand (VoD) services, such as YouTube, generate most of the Internet traffic today, and the popularity of video services is growing. Service and CDN providers have to invest more and more in distribution networks, which create pressure to innovate novel approaches. Peer-To-Peer (P2P) streaming is a viable alternative that is...

    Provided By Aalto University

  • White Papers // Dec 2012

    Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock

    Zero-correlation linear attack is a new method for cryptanalysis of block ciphers developed by Bogdanov et al. in 2012. In this paper, the authors adapt the matrix method to find zero-correlation linear approximations. Then they present several zero-correlation linear approximations for 14 rounds of LBlock and describe a cryptanalysis for...

    Provided By Aalto University

  • White Papers // Dec 2012

    New Algorithms for Position Heaps

    Position heaps are data structures for indexed pattern matching in a string, recently introduced as an alternative to suffix trees and suffix arrays. In this paper, the authors show how to modify an algorithm by Bannai, Inenaga and Takeda for computing LZ78 parses, such that it builds position heaps in...

    Provided By Aalto University

  • White Papers // Sep 2012

    Marooned Magic Numbers - An Adaptive Congestion Control Architecture

    TCP and other Internet transport protocols rely on series of hard-coded initial values for their connection state, particularly for the congestion control parameters. For example, recently the initial value of congestion window has been under much debate, as there is a desire to make TCP more efficient for common use...

    Provided By Aalto University

  • White Papers // Sep 2012

    Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment

    Flexible allocation of resources is one of the main benefits of cloud computing. Virtualization is used to achieve this flexibility: one or more virtual machines run on a single physical machine. These virtual machines can be deployed and destroyed as needed. One obstacle to flexibility in current cloud systems is...

    Provided By Aalto University

  • White Papers // Sep 2012

    Energy Cost of Advertisements in Mobile Games on the Android Platform

    Advertisements (ads) are a common source of revenue for monetizing free mobile applications, but increase the energy consumption of a mobile device because the advertisement have to be fetched and displayed. In particular, the radio communication needed for the data transfer is power hungry and therefore advertisement sponsored free applications...

    Provided By Aalto University

  • White Papers // Sep 2012

    Design of Spectrum Sensing Policy for Multi-User Multi-Band Cognitive Radio Network

    Finding an optimal sensing policy for a particular access policy and sensing scheme is a laborious combinatorial problem that requires the system model parameters to be known. In practice the parameters or the model itself may not be completely known making reinforcement learning methods appealing. In this paper a non-parametric...

    Provided By Aalto University

  • White Papers // Aug 2012

    Per-Node Throughput Performance of Overlapping Cognitive Radio Networks

    Multiple Cognitive Radio (CR) networks may exist in the same spatial domain in many cases. In this paper, the authors consider two uncoordinated and geographically overlapping CR networks coexisting together with a primary network. They specifically study the achievable per-node throughput performance of the CR networks. Firstly, an interference model...

    Provided By Aalto University

  • White Papers // Aug 2012

    Follow @grandma: Long-Term Device-Free Localization for Residential Monitoring

    Device-Free Localization (DFL) enables localizing people by monitoring the changes in the Radio Frequency (RF) attenuation field of an area where a wireless network is deployed. Notably, this technology does not require people to participate in the localization effort by carrying any electronic device. This paper presents a DFL system...

    Provided By Aalto University

  • White Papers // Aug 2012

    Enhancing the Accuracy of Radio Tomographic Imaging Using Channel Diversity

    Radio Tomographic Imaging (RTI) is an emerging Device-Free Localization (DFL) technology enabling the localization of people and other objects without requiring them to carry any electronic device. Instead, the RF attenuation field of the deployment area of a wireless network is estimated using the changes in Received Signal Strength (RSS)...

    Provided By Aalto University

  • White Papers // Aug 2012

    Criticality of Large Delay Tolerant Networks Via Directed Continuum Percolation in Space-Time

    Delay-Tolerant Networking (DTN) is a last-resort networking paradigm for mobile nodes when direct and multi-hop connections are infeasible, i.e., the network is not connected and nodes have to carry the messages to the next node (store-carry-forward). The authors study the capacity of DTN to deliver a message to its destination(s)...

    Provided By Aalto University

  • White Papers // Jul 2012

    Secure Networking for Virtual Machines in the Cloud

    Cloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs. However, cloud technology is still proprietary in many cases and is tainted by security issues rooted in the multi-tenant environment of the cloud. For instance, the virtual machines of two competing companies could be served...

    Provided By Aalto University

  • White Papers // Jul 2012

    Tag-Based Improved Search in Peer-to-Peer Overlays

    P2P based file sharing applications have gained immense popularity in recent years. Most content sharing applications search by matching the query with the file name. Some content sharing applications have gone a step further and used metadata assigned to it by the user who shared the content for searching the...

    Provided By Aalto University

  • White Papers // Jun 2012

    Mobile Computation Offloading - Factors Affecting Technology Evolution

    Compared to desktop devices, mobile devices have inherent constraints such as limited processing power, memory, and battery capacity. With the proliferation of resource-hungry applications, researchers are looking for new solutions to address these limitations. One such solution is Mobile Cloud Computing (MCC), which uses cloud infrastructure to enhance the capabilities...

    Provided By Aalto University

  • White Papers // May 2012

    On the Exact Distribution of the Scaled Largest Eigenvalue

    In this paper, the authors study the distribution of the scaled largest eigenvalue of complex Wishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results...

    Provided By Aalto University

  • White Papers // May 2012

    On Finding Multicast Paths in the Internet

    This paper evaluates the so-called Multicasting Via Paths (MVP) protocol. Both an ILP-based (exact) algorithm and a greedy heuristic algorithm for finding MVP paths are presented. By numerical experiments, the authors find that MVP is usually cheaper than IP multicast within ISP networks (in terms of sum of edge costs),...

    Provided By Aalto University

  • White Papers // May 2012

    Towards Robust, Scalable, and Fast Internet Via Explicit Forwarding Engines (EFE)

    This paper argues that the scalability problems of the Internet could be solved, not only in the control plane, but also in the forwarding plane. To this end, an explicit forwarding scheme is presented. The authors' scheme alleviates the Internet routing scalability problem, and facilitates fast forwarding, enforcement of fine-grained...

    Provided By Aalto University

  • White Papers // May 2012

    Scaling Bloom Filter Based Multicast With Hierarchical Tree Splitting

    Bloom Filter based multicast has been proposed as a source-specific multicast solution to eliminate the multicast state requirements in the routers. However, the inherent limitation, the false positives, in the Bloom filter data structure amplifies the bandwidth wastage when the multicast tree scales to a large number of receivers. In...

    Provided By Aalto University

  • White Papers // May 2012

    The Linux Pseudorandom Number Generator Revisited

    The Linux PseudoRandom Number Generator (PRNG) is a PRNG with entropy inputs which is widely used in many security related applications and protocols. This PRNG is written as an open source code which is subject to regular changes. It was last analyzed in the work of Gutterman et al. in...

    Provided By Aalto University

  • White Papers // May 2012

    Data Center Network Architectures

    Data centers have become increasingly essential part of Internet communications, thus there have been interest in understanding how to better design and manage data centers. In this paper, the authors explain a typical data center network architecture in the industry, the challenges modern data center networks encounter today and introduce...

    Provided By Aalto University

  • White Papers // May 2012

    Exploiting Hardware Heterogeneity Within the Same Instance Type of Amazon EC2

    Cloud computing providers might start with near homogeneous hardware environment. Over time, the homogeneous environment will most likely evolve into heterogeneous one because of possible upgrades and replacement of outdated hardware. In turn, the hardware heterogeneity will result into performance variation. In this paper, the authors look into the hardware...

    Provided By Aalto University

  • White Papers // May 2012

    Continuum Percolation Threshold for Permeable Aligned Cylinders and Opportunistic Networking

    In the continuum percolation problem, objects of given shape are placed according to a k-dimensional Poisson process. Two objects are neighbors if they overlap. The percolation is said to occur if with a positive probability a random object belongs to an infinite cluster, which exists only when the density of...

    Provided By Aalto University

  • White Papers // Apr 2012

    Floating Information With Stationary Nodes

    In the floating content application, mobile nodes collectively store and disseminate messages relevant to a certain area by using the principles of opportunistic networking. The system operates in best effort fashion relying solely on the nodes located in the area of interest, which is referred to as the anchor zone...

    Provided By Aalto University

  • White Papers // Mar 2012

    Minimizing Slowdown in Heterogeneous Size-Aware Dispatching Systems

    The authors consider a system of parallel queues where tasks are assigned (dispatched) to one of the available servers upon arrival. The dispatching decision is based on the full state information, i.e., on the sizes of the new and existing jobs. They are interested in minimizing the so-called mean slowdown...

    Provided By Aalto University

  • White Papers // Mar 2012

    Virtual RTCP: A Case Study of Monitoring and Repair for UDP-Based IPTV Systems

    IPTV systems have seen widespread deployment, but often lack robust mechanisms for monitoring the quality of experience. This makes it difficult for network operators to ensure that their services match the quality of traditional broadcast TV systems, leading to consumer dissatisfaction. The authors present a case study of virtual RTCP,...

    Provided By Aalto University

  • White Papers // Mar 2012

    Performance of Target Tracking Applications in Multi-Channel Wireless Sensor Networks

    Several future wireless communication systems will exploit multiple frequency channels simultaneously to reduce delay, enhance throughput and/or improve robustness. Nevertheless, the impact of multi-channel communications on different applications has not been comprehensively studied even though it is of significant importance to understand the interdependencies between the communication and application parameters....

    Provided By Aalto University

  • White Papers // Mar 2012

    Exploiting Traffic Scheduling Mechanisms to Reduce Transmission Cost on Mobile Devices

    Energy consumption of wireless data transmission heavily depends on the shape of the outgoing traffic of the mobile device. In this paper, the authors propose a traffic scheduler that shapes the packets into consistent bursts based on per-packet performance constraints in order to reduce the overall transmission cost. Their scheduler...

    Provided By Aalto University

  • White Papers // Mar 2012

    Device-to-Device Underlay Cellular Network Based on Rate Splitting

    The authors consider rate splitting and interference cancelation in Device-To-Device (D2D) communications underlaying a cellular network. They assume that a transmitted message is split into a private and a public part, as in Han-Kobayashi scheme. The private part is decodable only by the intended receiver, whereas the public part is...

    Provided By Aalto University

  • White Papers // Mar 2012

    Practical Realisation and Elimination of an ECC-Related Software Bug Attack

    The authors analyze and exploit implementation features in OpenSSL version 0:9:8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via 633 adaptive queries when the NIST curve P-256 is used. One can view it...

    Provided By Aalto University

  • White Papers // Feb 2012

    Energy-And Cost-Efficiency Analysis of ARM-Based Clusters

    General-purpose computing domain has experienced strategy transfer from scale-up to scale-out in the past decade. In this paper, the authors take a step further to analyze ARM-processor based cluster against Intel X86 workstation, from both energy-efficiency and cost-efficiency perspectives. Three applications are selected and evaluated to represent diversified applications, including...

    Provided By Aalto University

  • White Papers // Jan 2012

    Mobility and Service Discovery in Opportunistic Networks

    Past research on opportunistic communications has demonstrated the power of mobile phones as information mediators and content providers to co-located devices. As an extension of opportunistic communication paradigm, opportunistic computing and services research leverages the powerful capabilities and pervasive nature of modern Smartphones to provision services to nearby nodes. When...

    Provided By Aalto University

  • White Papers // Dec 2011

    Towards Mobile Device Cloud

    Although cloud computing has established itself as a novel paradigm, mobile devices have unique characteristics and capabilities that are not inherently made part of a cloud. This paper presents the notion of a mobile device cloud: mobile devices become active members in the cloud, sharing content, resources, and services with...

    Provided By Aalto University

  • White Papers // Dec 2011

    Different Faces of Information Centric Networking

    In this paper, the feasibility of current internet framework for future usage is investigated. Internet has been a huge success. However, the scale of its use has given rise to issues and challenges which were not taken into account when it was created. There is a strong perception in the...

    Provided By Aalto University

  • White Papers // Aug 2011

    A Synchronized Wireless Sensor Network for Experimental Modal Analysis in Structural Health Monitoring

    Structural health monitoring aims to provide an accurate diagnosis of the condition of civil infrastructures during their life span using data acquired by sensors. Wireless sensor networks represent a suitable monitoring technology to collect reliable information about the structure's condition, replacing visual inspections, and reducing installation and maintenance time and...

    Provided By Aalto University

  • White Papers // Dec 2011

    Different Faces of Information Centric Networking

    In this paper, the feasibility of current internet framework for future usage is investigated. Internet has been a huge success. However, the scale of its use has given rise to issues and challenges which were not taken into account when it was created. There is a strong perception in the...

    Provided By Aalto University

  • White Papers // May 2011

    Bankruptcy Prediction with Missing Data

    Bankruptcy prediction has been widely studied as a binary classification problem using financial ratios methodologies. When calculating the ratios, it is common to confront missing data problem. Thus, this paper proposes a classification method Ensemble Nearest Neighbors (ENN) to solve it. ENN uses different nearest neighbors as ensemble classifiers then...

    Provided By Aalto University

  • White Papers // Mar 2013

    Distributed Precoding for MISO Interference Channels with Channel Mean Feedback: Algorithms and Analysis

    In this paper, the authors focuses on the design and analysis of distributed stochastic pre-coding algorithms for Multiple-Input Single-Output (MISO) interference channels, where each transmitter is provided with mean information of its intended channel and that of interfering channels. Unlike in cases where exact channel gains are known as in...

    Provided By Aalto University

  • White Papers // May 2012

    Data Center Network Architectures

    Data centers have become increasingly essential part of Internet communications, thus there have been interest in understanding how to better design and manage data centers. In this paper, the authors explain a typical data center network architecture in the industry, the challenges modern data center networks encounter today and introduce...

    Provided By Aalto University

  • White Papers // Apr 2010

    Reliable Data Delivery for Publish/Subscribe Networks

    Network architectures built completely on publish and subscribe primitives instead of send and receive, have recently attracted many researchers. Pub/sub paradigm changes the networking completely: end-to-end principle breaks, communication channels become unidirectional, and multicast becomes a norm. Although pub/sub has attracted many, the research has been focusing on the network...

    Provided By Aalto University

  • White Papers // Feb 2012

    Energy-And Cost-Efficiency Analysis of ARM-Based Clusters

    General-purpose computing domain has experienced strategy transfer from scale-up to scale-out in the past decade. In this paper, the authors take a step further to analyze ARM-processor based cluster against Intel X86 workstation, from both energy-efficiency and cost-efficiency perspectives. Three applications are selected and evaluated to represent diversified applications, including...

    Provided By Aalto University

  • White Papers // May 2013

    Theoretical Elaboration of IT Enablement Model in the Era of Customer and Community Digital Innovation

    Research on information systems has demonstrated the strategic potential of Information Technology (IT) through the logic of IT enablement: synergistic relationship between IT assets with organizational resources ensuing IT-enabled resources capable of influencing competitive firm performance. However, this enablement view has largely focused on IT assets and organizational resources within...

    Provided By Aalto University

  • White Papers // Jul 2012

    Secure Networking for Virtual Machines in the Cloud

    Cloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs. However, cloud technology is still proprietary in many cases and is tainted by security issues rooted in the multi-tenant environment of the cloud. For instance, the virtual machines of two competing companies could be served...

    Provided By Aalto University

  • White Papers // Jan 2008

    Towards a Financial Ontology - A Comparison of e-Business Process Standards

    Currently, there are multiple standards to support business process integration in different industries, including the financial industry. However, the standards are designed for different purposes and support different processes. Generation of a high-level ontology would provide means to enhance the interoperability between standards and support streamlined processes within the financial...

    Provided By Aalto University

  • White Papers // Sep 2010

    Media Sector Business Drivers In 2020

    In this paper, the authors assume that radical innovations, offering new meanings, supported by radically new technology, will support the most promising business models for the media sector. To facilitate the innovation process they identified the most significant business drivers. They are clustered in nine dimensions, of which the most...

    Provided By Aalto University

  • White Papers // Aug 2010

    Malware Classification Based on Call Graph Clustering

    Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based...

    Provided By Aalto University

  • White Papers // Sep 2013

    Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

    The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates...

    Provided By Aalto University

  • White Papers // Sep 2013

    Device-to-Device Data Storage for Mobile Cellular Systems

    As an alternative to downloading content from a cellular access network, mobile devices could be used to store data files and distribute them through Device-To-Device (D2D) communication. The authors consider a D2D-based storage community that is comprised of mobile users. Assuming that transmitting data from a base station to a...

    Provided By Aalto University

  • White Papers // Oct 2010

    The PASSERINE Public Key Encryption and Authentication Mechanism

    PASSERINE is a lightweight public key encryption mechanism which is based on a hybrid, randomized variant of the Rabin public key encryption scheme. Its design is targeted for extremely low-resource applications such as wireless sensor networks, RFID tags, embedded systems, and smart cards. As is the case with the Rabin...

    Provided By Aalto University

  • White Papers // Nov 2010

    In-depth Breakdown of a 6LOWPAN Stack for Sensor Networks

    There exist several open source 6LoWPAN stacks for researchers to experiment with. However, they often lack sufficient and in-depth description of the internal operation, which makes extending the stacks difficult for many of one. This paper is an extended version of the previous work documenting the internal logic of an...

    Provided By Aalto University

  • White Papers // Sep 2010

    Semantic Interoperability in Electronic Business

    E-business refers to the utilization of Information and Communication Technologies (ICT) in support of all the activities of business. The standards developed for e-business help to facilitate the deployment of e-business. In particular, several organizations in e-business sector have produced standards and representation forms using XML. It serves as an...

    Provided By Aalto University

  • White Papers // Mar 2010

    Competitive Actions And Dynamics In Project Marketing: Identifying Causal Mechanisms

    In project marketing research, there is limited understanding of the mechanisms of how central project marketing actions lead to success and good business performance of the project-based firm. The purpose of this conceptual paper is to extend the understanding of the content and repertoire of (competitive) actions along the project...

    Provided By Aalto University

  • White Papers // Aug 2010

    Holistic Model Of Network Management: Action Research In Elderly Health Care

    Network management is a topic of increasing interest and scope. Trust and commitment have been identified as basic elements of a functioning network and the authors know that there are certain factors that cultivate or discourage their existence. Research on network management has offered various but ultimately partial theoretical and...

    Provided By Aalto University

  • White Papers // Aug 2010

    Project-Ending Competence In Networks: Two Cases Of Large Inter-Organizational Projects

    Continuing restructure of business driven by global economic change and new technology often requires closure of existing manufacturing facilities. In cases where these terminations are unexpected and premature, the understanding and skills of project management can be applied to the closure. A network perspective that accounts for the influence of...

    Provided By Aalto University

  • White Papers // Nov 2010

    Security Challenges in Hybrid Cloud Infrastructures

    Cloud computing has the potential to significantly change the way enterprises and their IT (Information Technology) systems run, but in order to achieve this current cloud computing model needs to be changed according to the enterprise requirements. These modifications lead to the evolution of the hybrid cloud, which is a...

    Provided By Aalto University

  • White Papers // Mar 2012

    Performance of Target Tracking Applications in Multi-Channel Wireless Sensor Networks

    Several future wireless communication systems will exploit multiple frequency channels simultaneously to reduce delay, enhance throughput and/or improve robustness. Nevertheless, the impact of multi-channel communications on different applications has not been comprehensively studied even though it is of significant importance to understand the interdependencies between the communication and application parameters....

    Provided By Aalto University

  • White Papers // Sep 2012

    Design of Spectrum Sensing Policy for Multi-User Multi-Band Cognitive Radio Network

    Finding an optimal sensing policy for a particular access policy and sensing scheme is a laborious combinatorial problem that requires the system model parameters to be known. In practice the parameters or the model itself may not be completely known making reinforcement learning methods appealing. In this paper a non-parametric...

    Provided By Aalto University

  • White Papers // Dec 2012

    New Algorithms for Position Heaps

    Position heaps are data structures for indexed pattern matching in a string, recently introduced as an alternative to suffix trees and suffix arrays. In this paper, the authors show how to modify an algorithm by Bannai, Inenaga and Takeda for computing LZ78 parses, such that it builds position heaps in...

    Provided By Aalto University

  • White Papers // Mar 2012

    Minimizing Slowdown in Heterogeneous Size-Aware Dispatching Systems

    The authors consider a system of parallel queues where tasks are assigned (dispatched) to one of the available servers upon arrival. The dispatching decision is based on the full state information, i.e., on the sizes of the new and existing jobs. They are interested in minimizing the so-called mean slowdown...

    Provided By Aalto University

  • White Papers // May 2012

    Continuum Percolation Threshold for Permeable Aligned Cylinders and Opportunistic Networking

    In the continuum percolation problem, objects of given shape are placed according to a k-dimensional Poisson process. Two objects are neighbors if they overlap. The percolation is said to occur if with a positive probability a random object belongs to an infinite cluster, which exists only when the density of...

    Provided By Aalto University

  • White Papers // Aug 2012

    Criticality of Large Delay Tolerant Networks Via Directed Continuum Percolation in Space-Time

    Delay-Tolerant Networking (DTN) is a last-resort networking paradigm for mobile nodes when direct and multi-hop connections are infeasible, i.e., the network is not connected and nodes have to carry the messages to the next node (store-carry-forward). The authors study the capacity of DTN to deliver a message to its destination(s)...

    Provided By Aalto University

  • White Papers // Aug 2012

    Per-Node Throughput Performance of Overlapping Cognitive Radio Networks

    Multiple Cognitive Radio (CR) networks may exist in the same spatial domain in many cases. In this paper, the authors consider two uncoordinated and geographically overlapping CR networks coexisting together with a primary network. They specifically study the achievable per-node throughput performance of the CR networks. Firstly, an interference model...

    Provided By Aalto University

  • White Papers // May 2012

    On the Exact Distribution of the Scaled Largest Eigenvalue

    In this paper, the authors study the distribution of the scaled largest eigenvalue of complex Wishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results...

    Provided By Aalto University

  • White Papers // May 2012

    On Finding Multicast Paths in the Internet

    This paper evaluates the so-called Multicasting Via Paths (MVP) protocol. Both an ILP-based (exact) algorithm and a greedy heuristic algorithm for finding MVP paths are presented. By numerical experiments, the authors find that MVP is usually cheaper than IP multicast within ISP networks (in terms of sum of edge costs),...

    Provided By Aalto University

  • White Papers // May 2012

    Towards Robust, Scalable, and Fast Internet Via Explicit Forwarding Engines (EFE)

    This paper argues that the scalability problems of the Internet could be solved, not only in the control plane, but also in the forwarding plane. To this end, an explicit forwarding scheme is presented. The authors' scheme alleviates the Internet routing scalability problem, and facilitates fast forwarding, enforcement of fine-grained...

    Provided By Aalto University

  • White Papers // May 2012

    Scaling Bloom Filter Based Multicast With Hierarchical Tree Splitting

    Bloom Filter based multicast has been proposed as a source-specific multicast solution to eliminate the multicast state requirements in the routers. However, the inherent limitation, the false positives, in the Bloom filter data structure amplifies the bandwidth wastage when the multicast tree scales to a large number of receivers. In...

    Provided By Aalto University

  • White Papers // Mar 2012

    Exploiting Traffic Scheduling Mechanisms to Reduce Transmission Cost on Mobile Devices

    Energy consumption of wireless data transmission heavily depends on the shape of the outgoing traffic of the mobile device. In this paper, the authors propose a traffic scheduler that shapes the packets into consistent bursts based on per-packet performance constraints in order to reduce the overall transmission cost. Their scheduler...

    Provided By Aalto University

  • White Papers // Mar 2012

    Device-to-Device Underlay Cellular Network Based on Rate Splitting

    The authors consider rate splitting and interference cancelation in Device-To-Device (D2D) communications underlaying a cellular network. They assume that a transmitted message is split into a private and a public part, as in Han-Kobayashi scheme. The private part is decodable only by the intended receiver, whereas the public part is...

    Provided By Aalto University

  • White Papers // Mar 2012

    Practical Realisation and Elimination of an ECC-Related Software Bug Attack

    The authors analyze and exploit implementation features in OpenSSL version 0:9:8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via 633 adaptive queries when the NIST curve P-256 is used. One can view it...

    Provided By Aalto University

  • White Papers // Mar 2012

    Virtual RTCP: A Case Study of Monitoring and Repair for UDP-Based IPTV Systems

    IPTV systems have seen widespread deployment, but often lack robust mechanisms for monitoring the quality of experience. This makes it difficult for network operators to ensure that their services match the quality of traditional broadcast TV systems, leading to consumer dissatisfaction. The authors present a case study of virtual RTCP,...

    Provided By Aalto University

  • White Papers // Feb 2010

    Opportunistic Web Access Via WLAN Hotspots

    Mobile phones are becoming commonplace for consuming Internet content and services. However, availability, affordability, and quality of the supposedly ubiquitous cellular network infrastructure may be limited, so that delay-tolerant web access via WLAN hotspots becomes an interesting alternative, even in urban areas. In this paper, the authors explore mobile web...

    Provided By Aalto University

  • White Papers // Feb 2010

    Towards More Adaptive Voice Applications

    With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this purpose, congestion control mechanisms have been devised for various transport and (partly) application protocols, and application programs may present, e.g., data rate information to the...

    Provided By Aalto University

  • White Papers // Feb 2010

    Mobile Networks Unplugged

    Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand are growing rapidly, both in the number of users and in capacity - since most Internet/web resources continue being tailored for fast fixed line access. A lot of engineering has...

    Provided By Aalto University

  • White Papers // Mar 2011

    Using Buffer Space Advertisements to Avoid Congestion in Mobile Opportunistic DTNs

    This paper investigates congestion control in opportunistic networks that use Delay-Tolerant Networking (DTN) as a basis for communication. The authors propose a mechanism that advertises buffer occupancy information to adjacent nodes and avoids forwarding through nodes with high buffer occupancy. The nodes then achieve global congestion avoidance simply based on...

    Provided By Aalto University

  • White Papers // Dec 2010

    Voice Messaging for Mobile Delay-Tolerant Networks

    Mobile ad-hoc networks, especially when they are sparse, are not well suited for ad-hoc voice communication when using end-to-end real-time audio streams: as paths grow in length, stability and forwarding performance suffer, and sometimes paths may not exist at all. In this paper, the authors suggest using asynchronous voice messaging...

    Provided By Aalto University