Chinese Academy of Sciences

Displaying 1-40 of 92 results

  • White Papers // Jan 2015

    The Classification of Quantum Symmetric-Key Encryption Protocols

    The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption algorithm, there are 32 different kinds of them. Among them, 5 kinds of protocols have already been constructed and studied, and 21 kinds of...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2015

    Quantum McEliece Public-Key Encryption Scheme

    In this paper, the authors investigate a quantum version of McEliece Public-Key Encryption (PKE) scheme, and analyze its security. As is well known, the security of classical McEliece PKE is not stronger than the onewayness of related classical one-way function. They prove the security of quantum McEliece PKE ranks between...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2014

    A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers

    Virtual Machine (VM) scheduling is an important technique to efficiently operate the computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and thus to optimize energy consumption. However, the interference between collocated VMs is usually ignored, which can result in very...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking

    Data generation is a key issue in big data benchmarking that aims to generate application-specific data sets to meet the 4V requirements of big data. Specifically, big data generators need to generate scalable data (Volume) of different types (Variety) under controllable generation rates (Velocity) while keeping the important characteristics of...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BigDataBench: a Big Data Benchmark Suite from Internet Services

    As architecture, systems, and data management communities pay greater attention to innovative big data systems and architecture, the pressure of benchmarking and evaluating these systems rises. However, the complexity, diversity, frequently changed workloads, and rapid evolution of big data systems raise great challenges in big data benchmarking. Considering the broad...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2014

    BigOP: Generating Comprehensive Big Data Workloads as a Benchmarking Framework

    Big Data is considered proprietary asset of companies, organizations, and even nations. Turning big data into real treasure requires the support of big data systems. A variety of commercial and open source products have been unleashed for big data storage and processing. While big data users are facing the choice...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    A Hybrid Circular Queue Method for Iterative Stencil Computations on GPUs

    In this paper, the authors present a hybrid circular queue method that can significantly boost the performance of stencil computations on GPU by carefully balancing usage of registers and shared-memory. Unlike earlier methods that rely on circular queues predominantly implemented using indirectly addressable shared memory, their hybrid method exploits a...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    An Empirical Model for Predicting Cross-Core Performance Interference on Multicore Processors

    Despite their widespread adoption in cloud computing, multicore processors are heavily under-utilized in terms of computing resources. To avoid the potential for negative and unpredictable interference, co-location of a latency-sensitive application with others on the same multicore processor is disallowed, leaving many cores idle and causing low machine utilization. To...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Repair Locality with Multiple Erasure Tolerance

    In distributed storage systems, using erasure codes instead of straightforward replication may lead to desirable improvements in storage overhead and reliability. A challenge of the coding technique is to efficiently repair the packets loss caused by node failures so that the system keeps the same level of redundancy. However, traditional...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    A Generic Framework for Anonymous Authentication in Mobile Networks

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, the authors present a generic construction that converts any existing secure password authentication...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2013

    Generalized (Identity-Based) Hash Proof System and its Applications

    In this paper, the authors generalize the paradigm of Hash Proof System (HPS) proposed by Cramer and Shoup. In the central of their generalization, they lift subset membership problem to distribution distinguish problem. Their generalized HPS clarifies and encompass all the known Public-Key Encryption (PKE) schemes that essentially implement the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    Integrated PKE and PEKS - Stronger Security Notions and New Constructions

    In this paper, the authors investigate the security for integrated Public-Key Encryption (PKE) and Public-key Encryption with Keyword Search (PEKS) schemes. They observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    PRE: Stronger Security Notions and Efficient Construction with New Property

    In a Proxy Re-Encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Cryptanalysis of the OKH Authenticated Encryption Scheme

    Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

    Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. The...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

    The general principle for algebraic attack for multi-output stream ciphers was proposed by Courtois. Furthermore, Armknecht, and Krause gave a definition of algebraic immunity for multi-output Boolean functions in, and investigated some construction methods of multi-output Boolean functions with maximal algebraic immunity. In this paper, several new characterizations of algebraic...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting

    Deterministic-Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios (e.g. search on encrypted data) where the latter exhibits inherent drawbacks. In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs. A...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Coverage Optimization for Femtocell Clusters Using Modified Particle Swarm Optimization

    Coverage optimization is a main challenge for femtocell clusters which are considered to be a promising solution to provide seamless cellular coverage for large indoor areas. Although Particle Swarm Optimization (PSO) can be employed to solve the coverage optimization of femtocell clusters, it reduces to Single Particle Swarm Optimization (SPSO)...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Gradient-Based Multi-Path Routing Protocol for Low Duty-Cycled Wireless Sensor Networks

    Low duty cycled sleep scheduling can largely prolong the lifetime of a Wireless Sensor Network (WSN). However, it also brings big challenge to the design of efficient routing protocols. Inappropriate selection of routes can largely offset the efficiency of a sleep scheduling mechanism. This paper aims to provide a simple...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    DSRelay: A Scheme of Cooperative Downloading Based on Dynamic Slot

    People's growing dependency on the Internet makes them want to access the network anytime and anywhere, even while driving cars. Although 3G or 4G networks can be used to achieve this goal, roadside APs have the advantages of low cost and high bandwidth. At present, however, APs cannot cover all...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2009

    Single Target Search and Capture Based on Random Sensor Deployment in Mobile Sensor Networks

    This paper addresses the problem of coordinating multiple agents in chasing and capturing a single mobile target, where the objective of a group of agents is to reduce the time of chasing and capturing the target with the aid of wireless sensor networks. Different from the previous algorithms, its research...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2009

    Blog Post Extraction Using Title Finding

    With the development of Web2.0, web mining applications pay more attention to blog pages. In order to prevent noises in blog pages from affecting the precision of web mining algorithms, it is very necessary to acquire posts from blog pages correctly. In this paper, the authors propose a blog post...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2010

    A Calculus for Game-Based Security Proofs

    The game-based approach to security proofs in cryptography is a widely-used methodology for writing proofs rigorously. However a unifying language for writing games is still missing. In this paper the authors show how CSLR, a probabilistic lambda-calculus with a type system that guarantees that computations are probabilistic polynomial time, can...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2010

    Distributed Mobility Management Based on Flat Network Architecture

    Mobility management is crucial for mobile networks to support certain Quality of Service (QoS) requirements. In this paper, the authors developed a flat network architecture rather than traditional two-layer mobility management architecture to reduce network elements and lighten networking load. Based on the proposed flat network structure the concept of...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2011

    A Two-Tiered Reliable Application Layer Multicast

    This paper presents a two-tiered reliable Application Layer Multicast (ALM) solution, called HRALM, to provide lossless ALM services. HRALM builds a domain-based multicast tree, and divides the members into two transport planes (i.e., Plane 1 and Plane 2) in terms of the tree. In any domain, the distance between each...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Coverage Optimization for Femtocell Clusters Using Modified Particle Swarm Optimization

    Coverage optimization is a main challenge for femtocell clusters which are considered to be a promising solution to provide seamless cellular coverage for large indoor areas. Although Particle Swarm Optimization (PSO) can be employed to solve the coverage optimization of femtocell clusters, it reduces to Single Particle Swarm Optimization (SPSO)...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    DSRelay: A Scheme of Cooperative Downloading Based on Dynamic Slot

    People's growing dependency on the Internet makes them want to access the network anytime and anywhere, even while driving cars. Although 3G or 4G networks can be used to achieve this goal, roadside APs have the advantages of low cost and high bandwidth. At present, however, APs cannot cover all...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Gradient-Based Multi-Path Routing Protocol for Low Duty-Cycled Wireless Sensor Networks

    Low duty cycled sleep scheduling can largely prolong the lifetime of a Wireless Sensor Network (WSN). However, it also brings big challenge to the design of efficient routing protocols. Inappropriate selection of routes can largely offset the efficiency of a sleep scheduling mechanism. This paper aims to provide a simple...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2009

    A Fast Geometric Rectification of Remote Sensing Imagery Based on Feature Ground Control Point Database

    In this paper, the authors presents the basis of the traditional design of database for ground control point, tries to founded a fast auto-correction method of satellite remote sensing imagery based on feature ground control point database which brings local feature points as the effective supplement and aims to achieve...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    An Efficient Direct Anonymous Attestation Scheme with Forward Security

    Direct Anonymous Attestation (DAA) is a cryptographic mechanism adopted by the trusted computing group in its specifications for Trusted Computing Platforms (TCP). In this paper, the authors propose a new DAA scheme and prove it is secure under the strong RSA assumption and the decisional Diffie-Hellman assumption. While satisfying all...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Exploiting Constructive Interference for Scalable Flooding in Wireless Networks

    Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize millisecond network flooding latency and sub-microsecond time synchronization accuracy, require no network state information and adapt to topology changes. However, constructive interference has a...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    Location Prediction Model Based on Bayesian Network Theory

    Location prediction is one of the key technologies of active mobility management in the next generation of mobile communication systems. Most of known location prediction models only take parts of predictive factors into account, which leads to a low prediction success ratio of these models. The motivation of this paper...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    An Efficient Multicast Search Scheme Under 2D Markov Walk Model

    In order to improve the efficiency of paging management, various paging strategies have been proposed for tracking single mobile user in the wireless cellular network. However, most of the schemes have ignored the important problem of efficient search for multiple mobile users under delay and bandwidth constraints. Given the condition...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    On Characterizing PPStream: Measurement and Analysis of P2P IPTV Under Large-Scale Broadcasting

    Despite the recent and remarkable popularity of P2P IPTV systems, the study of their characteristics on largescale broadcasting is rare. In this paper, the authors have undertaken a measurement study on one of the most popular P2P IPTV systems, PPStream, during the 29th Olympics broadcasting. They deployed their dedicated measurement...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    Joint Rate Control and Routing for Energy-Constrained Wireless Sensor Networks with the Real-Time Requirement

    In the this paper, the authors study the tradeoff between network lifetime and network utility for energy-constrained Wireless Sensor Networks (WSNs) with the real-time requirement. By introducing a parameter r, they combine these two objectives into a single weighted objective, and consider rate control and routing in this tradeoff framework...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2010

    Adaptive Voice Stream Multicast Over Low-Power Wireless Networks

    Low-power Wireless Networks (LWNs) have become increasingly available for mission-critical applications such as security surveillance and disaster response. In particular, emerging low-power wireless audio platforms provide an economical solution for ad hoc voice communication in emergency scenarios. In this paper, the authors develop a system called Adaptive Stream Multicast (ASM)...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2011

    Precise Propagation of Fault-Failure Correlations in Program Flow Graphs

    Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such techniques can be promising in locating program faults. However, coincidental correctness and execution crashes may make program entities indistinguishable in the execution spectra under study, or cause inaccurate...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2011

    Load-Aware and Position-Aided Routing in Satellite IP Networks

    Satellite communication is regarded as a promising way to achieve seamless global coverage with an array of advantages over the traditional terrestrial network. However, the non-uniform distribution of users and the highly topological dynamics have been a matter of facts. The traditional load balancing technique is able to guarantee a...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2011

    Clustering Approach Based On Von Neumann Topology Artificial Bee Colony Algorithm

    Article Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. This paper proposes a new variant of the ABC algorithm based on Von Neumann topology structure, namely Von Neumann Neighborhood Article Bee Colony (VABC). VABC significantly improves...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Repair Locality with Multiple Erasure Tolerance

    In distributed storage systems, using erasure codes instead of straightforward replication may lead to desirable improvements in storage overhead and reliability. A challenge of the coding technique is to efficiently repair the packets loss caused by node failures so that the system keeps the same level of redundancy. However, traditional...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2010

    Frequency-Hopping/M-Ary Frequency-Shift Keying for Wireless Sensor Networks: Noncoherent Detection and Performance

    In this paper, a novel WSN framework, namely the FH/MFSK WSN, is proposed, which monitors M-ary events and conveys signals from local sensors to fusion center with the aid of Frequency-Hopping (FH) and M-ary Frequency-Shift Keying (MFSK) techniques. The source events under observation by local sensors are assumed to have...

    Provided By Chinese Academy of Sciences