American University of Beirut

Displaying 1-20 of 20 results

  • White Papers // Dec 2012

    Enhanced Mobile Digital Video Broadcasting with Distributed Space-Time Coding

    This paper investigates the distributed Space-Time (ST) coding proposals for the future Digital Video Broadcasting - Next Generation Handheld (DVB-NGH) standard. The authors first theoretically show that the distributed MIMO scheme is the best broadcasting scenario in terms of channel capacity. Consequently, they evaluate the performance of several ST coding...

    Provided By American University of Beirut

  • White Papers // May 2012

    The Sum-Capacity of Discrete-Noise Multiple-Access Channels With Single-User Decoding and Identical Codebooks

    The authors consider an additive multiple-access channel model where all users are constrained to use identical codebooks, and where single-user decoding is performed at the receiver. They study the sum-capacity of the channel for an arbitrarily large, but finite, number of users. For a noiseless n-user channel, they construct a...

    Provided By American University of Beirut

  • White Papers // May 2012

    Optimized Energy-Aware Multicasting Over Wireless Cellular Networks With Multihop Cooperation

    Multicasting provides a scalable solution to deliver a common content to a set of requesting mobile terminals in wireless broadband networks. However, the multicasting rate is limited by the worst channel conditions of the mobile terminals which increases the content download time, and consequently, increases the energy consumed from the...

    Provided By American University of Beirut

  • White Papers // May 2012

    A Stable Matching Game for Joint Uplink/Downlink Resource Allocation in OFDMA Wireless Networks

    The emergence of resource-demanding wireless services such as mobile gaming or multimedia applications motivates the introduction of advanced paradigms for resource allocation in next-generation OFDMA-based wireless networks. In this context, while existing literature mainly focused on schemes in which the uplink and downlink resources are considered independently, this paper proposes...

    Provided By American University of Beirut

  • White Papers // Apr 2012

    Particle Swarm Optimization Based Approach to Solve the Multiple Sink Placement Problem in WSNs

    A Wireless Sensor Network (WSN) is a collection of tiny and limited-capability sensor nodes that report their sensed data to a data collector, referred to as a sink node. WSNs are used in many applications, but are challenged by memory and energy constraints. To address these issues, solutions have been...

    Provided By American University of Beirut

  • White Papers // Jan 2012

    Slow Port Scanning Detection

    Port scanning is the most popular reconnaissance technique attackers use to discover services they can break into. Port scanning detection has received a lot of attention by researchers. However a slow port scan attack can deceive most of the existing Intrusion Detection Systems (IDS). In this paper, the authors present...

    Provided By American University of Beirut

  • White Papers // May 2011

    Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing

    The authors present RaaS (Reputation as a Service), a set of accountable reputation ranking schemes for service providers in cloud computing architectures. RaaS provides a secure reputation reporting system producing results and recommendations that can be published as a service and verified by trusted third parties or by the cloud...

    Provided By American University of Beirut

  • White Papers // Jan 2011

    EEIA: Energy Efficient Indexed Aggregation in Smart Wireless Sensor Networks

    The main idea behind in-network aggregation is that, rather than sending individual data items from sensors to sinks, multiple data items are aggregated as they are forwarded by the sensor network. Existing sensor network data aggregation techniques assume that the nodes are preprogrammed and send data to a central sink...

    Provided By American University of Beirut

  • White Papers // Sep 2010

    A Reconfigurable Frequency-Notched UWB Antenna With Split-Ring Resonators

    In this paper, two designs of an ultra-wideband antenna with reconfigurable band notches are presented. The first design is based on several nested complementary split-ring resonators, whereas the second has two identical split-ring resonators. Electronic switches mounted across or along these resonators serve to activate or deactivate their corresponding band...

    Provided By American University of Beirut

  • White Papers // Aug 2010

    Practical Applications and Connectivity Algorithms in Future Wireless Sensor Networks

    Like any sentient organism, a smart environment relies first and foremost on sensory data captured from the real world. The sensory data come from sensor nodes of different modalities deployed on different locations forming a Wireless Sensor Network (WSN). Embedding smart sensors in humans has been a research challenge due...

    Provided By American University of Beirut

  • White Papers // Apr 2010

    A Simple Dual-Port Antenna System for Cognitive Radio Applications

    This paper presents a simple antenna system design for cognitive radio applications. The system comprises two printed monopoles sharing a common partial ground plane. The first monopole is used for channel sensing over the Ultra-WideBand (UWB) frequency range. The second one is frequency-reconfigurable and is used to communicate over a...

    Provided By American University of Beirut

  • White Papers // Feb 2010

    Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures

    In this paper the authors present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors....

    Provided By American University of Beirut

  • White Papers // Jan 2010

    Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures

    In this paper the authors present PLEDGE, an efficient and scalable security ProtocoL for protecting fixed-content objects in ContEnt ADdressable StoraGe (CAS) architEctures. PLEDGE follows an end-to-end policy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of...

    Provided By American University of Beirut

  • White Papers // Nov 2009

    An Efficient Vehicle Communication Network Topology With an Extensible Framework

    This paper proposes an extensible solution that gives support to recent growth in wireless communication and allows developers outside of the automotive industry to develop applications leveraging vehicle to vehicle communication. The suggested software architecture, which would integrate with the Automotive open Source ARchitecture (AUTOSAR) standard, has primary focus on...

    Provided By American University of Beirut

  • White Papers // Oct 2009

    Recruiting And Training Better 'Bush Pilots': A Research-Based Approach

    Because bush pilots operate on their own in remote areas, they have highly developed aviation knowledge and skills. Recruiting and training them presents peculiar challenges. Qualitative interviews with a group of pilots currently active in Africa revealed the characteristics of successful bush flyers and their orientation towards their profession and...

    Provided By American University of Beirut

  • White Papers // Jun 2009

    Improving Location Management in Mobile IPv4 Networks

    The Mobile IP Standard has been developed to support mobility over the Internet. This standard contains several drawbacks as in the cases where packets are routed via sub-optimal paths and significant amount of signaling messages is generated due to the home registration procedure which keeps the network aware of the...

    Provided By American University of Beirut

  • White Papers // Jun 2009

    Managing Handheld Devices in Ad-Hoc Collaborative Computing Environments

    The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to...

    Provided By American University of Beirut

  • White Papers // Apr 2009

    The Poverty And Equity Implications Of A Rise In The Value Added Tax: A Microeconomic Simulation For Lebanon

    This paper examines the impact of a rise in the Value Added Tax (VAT) on poverty and inequality in Lebanon. To this end, the paper develops an empirical model based on consumer demand theory and uses only household survey data on expenditures and spatial price indexes. The simulation results -...

    Provided By American University of Beirut

  • White Papers // Mar 2009

    Policy-Driven and Content-Based Web Services Security Gateway

    Web services are widely used to provide services and exchange data among business units, customers, partners and suppliers for enterprises. Although web services significantly improve the interaction and development of processes in the business world, they raise several security concerns, since they greatly increase the exposure of critical enterprise data....

    Provided By American University of Beirut

  • White Papers // Sep 2006

    A Policy-Driven, Content-Based Security Protocol for Protecting Audit Logs on Wireless Devices

    In this paper, the authors present PATRIOT, optimized, policy-driven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable...

    Provided By American University of Beirut

  • White Papers // May 2011

    Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing

    The authors present RaaS (Reputation as a Service), a set of accountable reputation ranking schemes for service providers in cloud computing architectures. RaaS provides a secure reputation reporting system producing results and recommendations that can be published as a service and verified by trusted third parties or by the cloud...

    Provided By American University of Beirut

  • White Papers // Sep 2006

    A Policy-Driven, Content-Based Security Protocol for Protecting Audit Logs on Wireless Devices

    In this paper, the authors present PATRIOT, optimized, policy-driven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable...

    Provided By American University of Beirut

  • White Papers // Mar 2009

    Policy-Driven and Content-Based Web Services Security Gateway

    Web services are widely used to provide services and exchange data among business units, customers, partners and suppliers for enterprises. Although web services significantly improve the interaction and development of processes in the business world, they raise several security concerns, since they greatly increase the exposure of critical enterprise data....

    Provided By American University of Beirut

  • White Papers // Oct 2009

    Recruiting And Training Better 'Bush Pilots': A Research-Based Approach

    Because bush pilots operate on their own in remote areas, they have highly developed aviation knowledge and skills. Recruiting and training them presents peculiar challenges. Qualitative interviews with a group of pilots currently active in Africa revealed the characteristics of successful bush flyers and their orientation towards their profession and...

    Provided By American University of Beirut

  • White Papers // Feb 2010

    Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures

    In this paper the authors present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors....

    Provided By American University of Beirut

  • White Papers // Jun 2009

    Improving Location Management in Mobile IPv4 Networks

    The Mobile IP Standard has been developed to support mobility over the Internet. This standard contains several drawbacks as in the cases where packets are routed via sub-optimal paths and significant amount of signaling messages is generated due to the home registration procedure which keeps the network aware of the...

    Provided By American University of Beirut

  • White Papers // Jun 2009

    Managing Handheld Devices in Ad-Hoc Collaborative Computing Environments

    The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to...

    Provided By American University of Beirut

  • White Papers // Apr 2009

    The Poverty And Equity Implications Of A Rise In The Value Added Tax: A Microeconomic Simulation For Lebanon

    This paper examines the impact of a rise in the Value Added Tax (VAT) on poverty and inequality in Lebanon. To this end, the paper develops an empirical model based on consumer demand theory and uses only household survey data on expenditures and spatial price indexes. The simulation results -...

    Provided By American University of Beirut

  • White Papers // Jan 2012

    Slow Port Scanning Detection

    Port scanning is the most popular reconnaissance technique attackers use to discover services they can break into. Port scanning detection has received a lot of attention by researchers. However a slow port scan attack can deceive most of the existing Intrusion Detection Systems (IDS). In this paper, the authors present...

    Provided By American University of Beirut

  • White Papers // May 2012

    The Sum-Capacity of Discrete-Noise Multiple-Access Channels With Single-User Decoding and Identical Codebooks

    The authors consider an additive multiple-access channel model where all users are constrained to use identical codebooks, and where single-user decoding is performed at the receiver. They study the sum-capacity of the channel for an arbitrarily large, but finite, number of users. For a noiseless n-user channel, they construct a...

    Provided By American University of Beirut

  • White Papers // May 2012

    Optimized Energy-Aware Multicasting Over Wireless Cellular Networks With Multihop Cooperation

    Multicasting provides a scalable solution to deliver a common content to a set of requesting mobile terminals in wireless broadband networks. However, the multicasting rate is limited by the worst channel conditions of the mobile terminals which increases the content download time, and consequently, increases the energy consumed from the...

    Provided By American University of Beirut

  • White Papers // May 2012

    A Stable Matching Game for Joint Uplink/Downlink Resource Allocation in OFDMA Wireless Networks

    The emergence of resource-demanding wireless services such as mobile gaming or multimedia applications motivates the introduction of advanced paradigms for resource allocation in next-generation OFDMA-based wireless networks. In this context, while existing literature mainly focused on schemes in which the uplink and downlink resources are considered independently, this paper proposes...

    Provided By American University of Beirut

  • White Papers // Dec 2012

    Enhanced Mobile Digital Video Broadcasting with Distributed Space-Time Coding

    This paper investigates the distributed Space-Time (ST) coding proposals for the future Digital Video Broadcasting - Next Generation Handheld (DVB-NGH) standard. The authors first theoretically show that the distributed MIMO scheme is the best broadcasting scenario in terms of channel capacity. Consequently, they evaluate the performance of several ST coding...

    Provided By American University of Beirut

  • White Papers // Jan 2010

    Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures

    In this paper the authors present PLEDGE, an efficient and scalable security ProtocoL for protecting fixed-content objects in ContEnt ADdressable StoraGe (CAS) architEctures. PLEDGE follows an end-to-end policy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of...

    Provided By American University of Beirut

  • White Papers // Aug 2010

    Practical Applications and Connectivity Algorithms in Future Wireless Sensor Networks

    Like any sentient organism, a smart environment relies first and foremost on sensory data captured from the real world. The sensory data come from sensor nodes of different modalities deployed on different locations forming a Wireless Sensor Network (WSN). Embedding smart sensors in humans has been a research challenge due...

    Provided By American University of Beirut

  • White Papers // Jan 2011

    EEIA: Energy Efficient Indexed Aggregation in Smart Wireless Sensor Networks

    The main idea behind in-network aggregation is that, rather than sending individual data items from sensors to sinks, multiple data items are aggregated as they are forwarded by the sensor network. Existing sensor network data aggregation techniques assume that the nodes are preprogrammed and send data to a central sink...

    Provided By American University of Beirut

  • White Papers // Apr 2010

    A Simple Dual-Port Antenna System for Cognitive Radio Applications

    This paper presents a simple antenna system design for cognitive radio applications. The system comprises two printed monopoles sharing a common partial ground plane. The first monopole is used for channel sensing over the Ultra-WideBand (UWB) frequency range. The second one is frequency-reconfigurable and is used to communicate over a...

    Provided By American University of Beirut

  • White Papers // Sep 2010

    A Reconfigurable Frequency-Notched UWB Antenna With Split-Ring Resonators

    In this paper, two designs of an ultra-wideband antenna with reconfigurable band notches are presented. The first design is based on several nested complementary split-ring resonators, whereas the second has two identical split-ring resonators. Electronic switches mounted across or along these resonators serve to activate or deactivate their corresponding band...

    Provided By American University of Beirut

  • White Papers // Nov 2009

    An Efficient Vehicle Communication Network Topology With an Extensible Framework

    This paper proposes an extensible solution that gives support to recent growth in wireless communication and allows developers outside of the automotive industry to develop applications leveraging vehicle to vehicle communication. The suggested software architecture, which would integrate with the Automotive open Source ARchitecture (AUTOSAR) standard, has primary focus on...

    Provided By American University of Beirut

  • White Papers // Apr 2012

    Particle Swarm Optimization Based Approach to Solve the Multiple Sink Placement Problem in WSNs

    A Wireless Sensor Network (WSN) is a collection of tiny and limited-capability sensor nodes that report their sensed data to a data collector, referred to as a sink node. WSNs are used in many applications, but are challenged by memory and energy constraints. To address these issues, solutions have been...

    Provided By American University of Beirut