Beijing Jiaotong University

Displaying 1-27 of 27 results

  • White Papers // May 2014

    Shared Subspace Learning for Latent Representation of Multi-View Data

    The pervasive existence of multi-view data has made conventional single view data analysis methods to confront with great challenge. To exploit new analysis technique for multi-view data has become one of active topics in the field of machine learning. From the point of shared subspace learning, this paper focuses on...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Preserving Private Cloud Service Data Based on Hypergraph Anonymization

    Cloud computing is becoming increasingly popular due to its power in providing high-performance and flexible service capabilities. More and more internet users have accepted this innovative service model and been using various cloud-based services every day. However, these services using data is quite valuable for marketing purposes, as it can...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Privacy-Preserving Ranked Fuzzy Keyword Search Over Encrypted Cloud Data

    As cloud computing becomes popular, more and more data owners prefer to store their data into the cloud for great flexibility and economic savings. In order to protect the data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a challenging task. Although traditional...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Information Security Engineering: a Framework for Research and Practices

    Information security is not a new topic in academics and industry. However, through a comprehensive literature review, the authors found that most research in information security focus on technical perspectives including evaluation methods and mathematical approaches for securities, risk mitigation algorithms, with some research focus on economic perspective of information...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2013

    Simulated-Annealing Load Balancing for Resource Allocation in Cloud Environments

    Recently, the development of cloud computing has received considerable attention. For cloud service providers, packing VMs onto a small number of servers is an effective way to reduce energy costs, so as to improve the efficiency of the data center. However allocating too many VMs on a physical machine may...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2013

    New Construction of Efficient Hierarchical Identity Based Signature in the Standard Model

    In this paper, the authors propose a new efficient Hierarchical Identity Based Signature (HIBS) scheme. Their scheme can be proven probably secure based on a natural hardness assumption (i.e. h-exponent Computational Diffie-Hellman problem (h-CDH)) in the standard model. Their scheme only requires three pairing computations in verification, which has no...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2013

    DHR-CCN, Distributed Hierarchical Routing for Content Centric Network

    The goal of Content Centric Network (CCN) is to provide high-efficient mechanism to store the content which is widely stored at the network center and edge. Content name, rather than IP, is used for data transmission in CCN. It is necessary to identify content, and keep the mapping relation between...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2013

    Cloud Computing Framework for Computer Vision Research: An Introduction

    Cloud computing offers the potential to help scientists to process massive number of computing resources often required in machine learning application such as computer vision problems. This proposal would like to show that which benefits can be obtained from cloud in order to help medical image analysis users (including scientists,...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2013

    An Adaptive Transmission Scheme for Wireless Sensor Networks

    Cooperative communication is a promising technique for combating the effects of channel fading by exploiting diversity gain achieved via node cooperation. However, how to apply it into sensor networks in a feasible and efficient manner still remains as a problem. To address the issue, this paper proposes a new adaptive...

    Provided By Beijing Jiaotong University

  • White Papers // Jan 2013

    Algorithms for Automatic Analysis of SELinux Security Policy

    Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time....

    Provided By Beijing Jiaotong University

  • White Papers // Oct 2012

    A Cross-Layer Protocol for Reliable and Efficient Communication in Wireless Sensor Networks

    It is a practical challenge to provide reliable and efficient communication in Wireless Sensor Networks (WSNs). In this paper, the authors introduce a novel node initiative concept that allows the intrinsic protocol layer functionalities required for successful communication in WSNs to be implemented in a unified protocol framework. Based on...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    Joint Mode/Route Selection and Power Allocation in Cellular Networks With Cooperative Relay

    In a cellular network with cooperative relaying, each node may choose to communicate with the source node directly or use the cooperative communication mode with the assistance of a relay node. The transmission mode (either direct or cooperative) and the transmit power of the source and relay nodes affect not...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    Measurements and Analysis of Short-Term Fading Behavior for High-Speed Rail Viaduct Scenario

    This paper presents a set of 930 MHz measurements conducted along the "Zhengzhou-Xi'an" high-speed rail of China, to characterize short-term fading behavior of the rail viaduct scenario. Three measurement cases covering viaducts with different heights are reported. The analysis results include Fade Depth (FD), Ricean distribution fit and K-factor modeling,...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    A Novel Multichannel Multiple Access Protocol for Vehicular Ad Hoc Networks

    A novel Multichannel Multiple Access (MMA) protocol is proposed for vehicular ad hoc networks in this paper. For increasing channel efficiency, two control channels are utilized in MMA to finish Request-To-Send/Clear-To-Send (RTS/CTS) interactions and ACKnowledgments (ACKs) separately. When a collision happens in the control channel, the waiting period before the...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    A Self-Configurable Power Control Algorithm for Cognitive Radio-Based Industrial Wireless Sensor Networks With Interference Constraints

    With the growth of different design goals and application requirements, Wireless Sensor Networks (WSNs) are receiving sustained attentions in the recent low-cost industrial automation systems. Moreover, Cognitive Radio (CR) technology gives one a possibility to maximize the utilization efficiency of the limited spectrum resources. However, because the wireless devices coexist...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2012

    Network Element Scheduling for Achieving Energy-Aware Data Center Networks

    The goal of data center network is to interconnect a massive number of servers so as to provide reliable and scalable computing and storage infrastructure for cloud-based Internet services and data-intensive scientific applications. Considering unique features of traffic patterns and network topologies in data centers, this paper proposes a novel...

    Provided By Beijing Jiaotong University

  • White Papers // Jan 2012

    Efficient Identity-Based Hierarchical Access Authentication Protocol for Mobile Network

    In this paper, the authors present a secure and efficient hierarchical identity-based access authentication protocol for mobile network. First, a new mobile scheme is constructed to improve the registration performance by the port-based vector switching; especially when there are multi-hops and bandwidth between the user and home network, the registration...

    Provided By Beijing Jiaotong University

  • White Papers // Sep 2011

    Research and Implementation of an AAA System for Railway WiMAX Communication Networks

    It is significantly noticeable within the worldwide railway industry that the current trend moves towards the use of train monitor/control systems based on wireless technologies like WiMAX. In such a wireless network, an AAA system must be set up to support security protection and QoS classification. This paper proposes a...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2011

    CALIS-Based Cloud Library Services Platform Model

    Cloud computing has been applied in many fields at home and abroad as a rapidly developing new information technology. This paper introduces cloud computing, which is applied in digital libraries, analyzes current situation and existing problems of the cloud computing in digital library. On this basis, on the combination of...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2011

    Efficient Proxy Re-Encryption With Private Keyword Searching in Untrusted Storage

    Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2011

    On the Capacity of P2P Multipoint Video Conference

    In this paper, the structure of video conference is formulated and the peer-assisted distribution scheme is constructed to achieve optimal video delivery rate in each sub-conference. The capacity of conference is proposed to referee the video rate that can be supported in every possible scenario. The authors have proved that,...

    Provided By Beijing Jiaotong University

  • White Papers // Dec 2010

    Design and Implementation of PMIPv6 Based Multihoming for Make-Before-Break Handover

    Unlike the various existing protocols for IP mobility management such as Mobile IPv6 (MIPv6), Proxy Mobile IPv6 (PMIPv6), which is a network-based approach, has salient features that expedite IP mobility management deployment. However, moving from one access network to another gives rise to a Break-Before-Make handover process that incurs packet...

    Provided By Beijing Jiaotong University

  • White Papers // Dec 2010

    Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme Using Smart Cards, and a Key Agreement Scheme for Two-Party Communication

    The motivation behind development password authentication schemes1 is to help legitimate users or clients to acquire services from a legitimate provider or server. Whenever a user wants a service from a provider, it has to identify itself to the provider by some means. Password authentication has been one of the...

    Provided By Beijing Jiaotong University

  • White Papers // Oct 2010

    N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network

    In this paper, the authors propose a Network-based NEtwork MObility supporting scheme (N-NEMO) in Proxy Mobile IPv6 (PMIPv6) network, which is an issue still up in the air for the basic PMIPv6 protocol. The N-NEMO, like PMIPv6, bases mobility support on network functionality, thus enabling conventional (i.e., not mobility-enabled) IP...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2010

    Real-Time Hierarchical Movement Animation Control for Autonomous Virtual Humans

    Due to the great diversity of individuals, the variety of behaviors, and the potential complexity of environment, creating autonomous virtual human in realistic virtual environment has been a challenging area in virtual reality research. This paper focuses on autonomous movement animation control for synthesizing the life-like actions of virtual human....

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2010

    How Fast Do Identifier-to-Locator Mappings Change in Networks With Identifier/Locator Separation?

    There is a growing consensus that identifier/locator separation is a promising solution to the scalability issue of the current routing infrastructure. After locators are separated from identifiers, end hosts roam from place to place without changing their identifiers. On the other hand, their locators change when they roam from one...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2009

    Research on Doppler Diversity for OFDM High-Speed Mobile Communications

    Broadband Wireless OFDM (Orthogonal Frequency Division Multiplexing) systems receive much concern because of strong resistance on inter-symbol interference. However, when Doppler spread is significant in the wireless channel, OFDM system performance has declined markedly. For the high-speed railway environment, when the trains drive from 250km/h to 500km/h speed, the channel...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2011

    Efficient Proxy Re-Encryption With Private Keyword Searching in Untrusted Storage

    Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2010

    How Fast Do Identifier-to-Locator Mappings Change in Networks With Identifier/Locator Separation?

    There is a growing consensus that identifier/locator separation is a promising solution to the scalability issue of the current routing infrastructure. After locators are separated from identifiers, end hosts roam from place to place without changing their identifiers. On the other hand, their locators change when they roam from one...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2011

    CALIS-Based Cloud Library Services Platform Model

    Cloud computing has been applied in many fields at home and abroad as a rapidly developing new information technology. This paper introduces cloud computing, which is applied in digital libraries, analyzes current situation and existing problems of the cloud computing in digital library. On this basis, on the combination of...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2010

    Real-Time Hierarchical Movement Animation Control for Autonomous Virtual Humans

    Due to the great diversity of individuals, the variety of behaviors, and the potential complexity of environment, creating autonomous virtual human in realistic virtual environment has been a challenging area in virtual reality research. This paper focuses on autonomous movement animation control for synthesizing the life-like actions of virtual human....

    Provided By Beijing Jiaotong University

  • White Papers // Dec 2010

    Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme Using Smart Cards, and a Key Agreement Scheme for Two-Party Communication

    The motivation behind development password authentication schemes1 is to help legitimate users or clients to acquire services from a legitimate provider or server. Whenever a user wants a service from a provider, it has to identify itself to the provider by some means. Password authentication has been one of the...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2011

    On the Capacity of P2P Multipoint Video Conference

    In this paper, the structure of video conference is formulated and the peer-assisted distribution scheme is constructed to achieve optimal video delivery rate in each sub-conference. The capacity of conference is proposed to referee the video rate that can be supported in every possible scenario. The authors have proved that,...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2009

    Research on Doppler Diversity for OFDM High-Speed Mobile Communications

    Broadband Wireless OFDM (Orthogonal Frequency Division Multiplexing) systems receive much concern because of strong resistance on inter-symbol interference. However, when Doppler spread is significant in the wireless channel, OFDM system performance has declined markedly. For the high-speed railway environment, when the trains drive from 250km/h to 500km/h speed, the channel...

    Provided By Beijing Jiaotong University

  • White Papers // Dec 2010

    Design and Implementation of PMIPv6 Based Multihoming for Make-Before-Break Handover

    Unlike the various existing protocols for IP mobility management such as Mobile IPv6 (MIPv6), Proxy Mobile IPv6 (PMIPv6), which is a network-based approach, has salient features that expedite IP mobility management deployment. However, moving from one access network to another gives rise to a Break-Before-Make handover process that incurs packet...

    Provided By Beijing Jiaotong University

  • White Papers // Oct 2010

    N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network

    In this paper, the authors propose a Network-based NEtwork MObility supporting scheme (N-NEMO) in Proxy Mobile IPv6 (PMIPv6) network, which is an issue still up in the air for the basic PMIPv6 protocol. The N-NEMO, like PMIPv6, bases mobility support on network functionality, thus enabling conventional (i.e., not mobility-enabled) IP...

    Provided By Beijing Jiaotong University

  • White Papers // Sep 2011

    Research and Implementation of an AAA System for Railway WiMAX Communication Networks

    It is significantly noticeable within the worldwide railway industry that the current trend moves towards the use of train monitor/control systems based on wireless technologies like WiMAX. In such a wireless network, an AAA system must be set up to support security protection and QoS classification. This paper proposes a...

    Provided By Beijing Jiaotong University

  • White Papers // Jan 2013

    Algorithms for Automatic Analysis of SELinux Security Policy

    Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time....

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2013

    DHR-CCN, Distributed Hierarchical Routing for Content Centric Network

    The goal of Content Centric Network (CCN) is to provide high-efficient mechanism to store the content which is widely stored at the network center and edge. Content name, rather than IP, is used for data transmission in CCN. It is necessary to identify content, and keep the mapping relation between...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2013

    Cloud Computing Framework for Computer Vision Research: An Introduction

    Cloud computing offers the potential to help scientists to process massive number of computing resources often required in machine learning application such as computer vision problems. This proposal would like to show that which benefits can be obtained from cloud in order to help medical image analysis users (including scientists,...

    Provided By Beijing Jiaotong University

  • White Papers // Jan 2012

    Efficient Identity-Based Hierarchical Access Authentication Protocol for Mobile Network

    In this paper, the authors present a secure and efficient hierarchical identity-based access authentication protocol for mobile network. First, a new mobile scheme is constructed to improve the registration performance by the port-based vector switching; especially when there are multi-hops and bandwidth between the user and home network, the registration...

    Provided By Beijing Jiaotong University

  • White Papers // Mar 2012

    Network Element Scheduling for Achieving Energy-Aware Data Center Networks

    The goal of data center network is to interconnect a massive number of servers so as to provide reliable and scalable computing and storage infrastructure for cloud-based Internet services and data-intensive scientific applications. Considering unique features of traffic patterns and network topologies in data centers, this paper proposes a novel...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    Joint Mode/Route Selection and Power Allocation in Cellular Networks With Cooperative Relay

    In a cellular network with cooperative relaying, each node may choose to communicate with the source node directly or use the cooperative communication mode with the assistance of a relay node. The transmission mode (either direct or cooperative) and the transmit power of the source and relay nodes affect not...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    Measurements and Analysis of Short-Term Fading Behavior for High-Speed Rail Viaduct Scenario

    This paper presents a set of 930 MHz measurements conducted along the "Zhengzhou-Xi'an" high-speed rail of China, to characterize short-term fading behavior of the rail viaduct scenario. Three measurement cases covering viaducts with different heights are reported. The analysis results include Fade Depth (FD), Ricean distribution fit and K-factor modeling,...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    A Self-Configurable Power Control Algorithm for Cognitive Radio-Based Industrial Wireless Sensor Networks With Interference Constraints

    With the growth of different design goals and application requirements, Wireless Sensor Networks (WSNs) are receiving sustained attentions in the recent low-cost industrial automation systems. Moreover, Cognitive Radio (CR) technology gives one a possibility to maximize the utilization efficiency of the limited spectrum resources. However, because the wireless devices coexist...

    Provided By Beijing Jiaotong University

  • White Papers // May 2012

    A Novel Multichannel Multiple Access Protocol for Vehicular Ad Hoc Networks

    A novel Multichannel Multiple Access (MMA) protocol is proposed for vehicular ad hoc networks in this paper. For increasing channel efficiency, two control channels are utilized in MMA to finish Request-To-Send/Clear-To-Send (RTS/CTS) interactions and ACKnowledgments (ACKs) separately. When a collision happens in the control channel, the waiting period before the...

    Provided By Beijing Jiaotong University

  • White Papers // May 2014

    Shared Subspace Learning for Latent Representation of Multi-View Data

    The pervasive existence of multi-view data has made conventional single view data analysis methods to confront with great challenge. To exploit new analysis technique for multi-view data has become one of active topics in the field of machine learning. From the point of shared subspace learning, this paper focuses on...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2013

    New Construction of Efficient Hierarchical Identity Based Signature in the Standard Model

    In this paper, the authors propose a new efficient Hierarchical Identity Based Signature (HIBS) scheme. Their scheme can be proven probably secure based on a natural hardness assumption (i.e. h-exponent Computational Diffie-Hellman problem (h-CDH)) in the standard model. Their scheme only requires three pairing computations in verification, which has no...

    Provided By Beijing Jiaotong University

  • White Papers // Feb 2013

    An Adaptive Transmission Scheme for Wireless Sensor Networks

    Cooperative communication is a promising technique for combating the effects of channel fading by exploiting diversity gain achieved via node cooperation. However, how to apply it into sensor networks in a feasible and efficient manner still remains as a problem. To address the issue, this paper proposes a new adaptive...

    Provided By Beijing Jiaotong University

  • White Papers // Oct 2012

    A Cross-Layer Protocol for Reliable and Efficient Communication in Wireless Sensor Networks

    It is a practical challenge to provide reliable and efficient communication in Wireless Sensor Networks (WSNs). In this paper, the authors introduce a novel node initiative concept that allows the intrinsic protocol layer functionalities required for successful communication in WSNs to be implemented in a unified protocol framework. Based on...

    Provided By Beijing Jiaotong University

  • White Papers // Jul 2013

    Simulated-Annealing Load Balancing for Resource Allocation in Cloud Environments

    Recently, the development of cloud computing has received considerable attention. For cloud service providers, packing VMs onto a small number of servers is an effective way to reduce energy costs, so as to improve the efficiency of the data center. However allocating too many VMs on a physical machine may...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Privacy-Preserving Ranked Fuzzy Keyword Search Over Encrypted Cloud Data

    As cloud computing becomes popular, more and more data owners prefer to store their data into the cloud for great flexibility and economic savings. In order to protect the data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a challenging task. Although traditional...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Preserving Private Cloud Service Data Based on Hypergraph Anonymization

    Cloud computing is becoming increasingly popular due to its power in providing high-performance and flexible service capabilities. More and more internet users have accepted this innovative service model and been using various cloud-based services every day. However, these services using data is quite valuable for marketing purposes, as it can...

    Provided By Beijing Jiaotong University

  • White Papers // Aug 2013

    Information Security Engineering: a Framework for Research and Practices

    Information security is not a new topic in academics and industry. However, through a comprehensive literature review, the authors found that most research in information security focus on technical perspectives including evaluation methods and mathematical approaches for securities, risk mitigation algorithms, with some research focus on economic perspective of information...

    Provided By Beijing Jiaotong University