Chinese Academy of Sciences

Displaying 1-40 of 94 results

  • White Papers // Jan 2015

    The Classification of Quantum Symmetric-Key Encryption Protocols

    The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption algorithm, there are 32 different kinds of them. Among them, 5 kinds of protocols have already been constructed and studied, and 21 kinds of...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2015

    Quantum McEliece Public-Key Encryption Scheme

    In this paper, the authors investigate a quantum version of McEliece Public-Key Encryption (PKE) scheme, and analyze its security. As is well known, the security of classical McEliece PKE is not stronger than the onewayness of related classical one-way function. They prove the security of quantum McEliece PKE ranks between...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2014

    A Joint Optimization of Operational Cost and Performance Interference in Cloud Data Centers

    Virtual Machine (VM) scheduling is an important technique to efficiently operate the computing resources in a data center. Previous work has mainly focused on consolidating VMs to improve resource utilization and thus to optimize energy consumption. However, the interference between collocated VMs is usually ignored, which can result in very...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking

    Data generation is a key issue in big data benchmarking that aims to generate application-specific data sets to meet the 4V requirements of big data. Specifically, big data generators need to generate scalable data (Volume) of different types (Variety) under controllable generation rates (Velocity) while keeping the important characteristics of...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BigDataBench: a Big Data Benchmark Suite from Internet Services

    As architecture, systems, and data management communities pay greater attention to innovative big data systems and architecture, the pressure of benchmarking and evaluating these systems rises. However, the complexity, diversity, frequently changed workloads, and rapid evolution of big data systems raise great challenges in big data benchmarking. Considering the broad...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2014

    BigOP: Generating Comprehensive Big Data Workloads as a Benchmarking Framework

    Big Data is considered proprietary asset of companies, organizations, and even nations. Turning big data into real treasure requires the support of big data systems. A variety of commercial and open source products have been unleashed for big data storage and processing. While big data users are facing the choice...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    A Hybrid Circular Queue Method for Iterative Stencil Computations on GPUs

    In this paper, the authors present a hybrid circular queue method that can significantly boost the performance of stencil computations on GPU by carefully balancing usage of registers and shared-memory. Unlike earlier methods that rely on circular queues predominantly implemented using indirectly addressable shared memory, their hybrid method exploits a...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2013

    An Empirical Model for Predicting Cross-Core Performance Interference on Multicore Processors

    Despite their widespread adoption in cloud computing, multicore processors are heavily under-utilized in terms of computing resources. To avoid the potential for negative and unpredictable interference, co-location of a latency-sensitive application with others on the same multicore processor is disallowed, leaving many cores idle and causing low machine utilization. To...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Repair Locality with Multiple Erasure Tolerance

    In distributed storage systems, using erasure codes instead of straightforward replication may lead to desirable improvements in storage overhead and reliability. A challenge of the coding technique is to efficiently repair the packets loss caused by node failures so that the system keeps the same level of redundancy. However, traditional...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    A Generic Framework for Anonymous Authentication in Mobile Networks

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, the authors present a generic construction that converts any existing secure password authentication...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2013

    Generalized (Identity-Based) Hash Proof System and its Applications

    In this paper, the authors generalize the paradigm of Hash Proof System (HPS) proposed by Cramer and Shoup. In the central of their generalization, they lift subset membership problem to distribution distinguish problem. Their generalized HPS clarifies and encompass all the known Public-Key Encryption (PKE) schemes that essentially implement the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    Integrated PKE and PEKS - Stronger Security Notions and New Constructions

    In this paper, the authors investigate the security for integrated Public-Key Encryption (PKE) and Public-key Encryption with Keyword Search (PEKS) schemes. They observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    PRE: Stronger Security Notions and Efficient Construction with New Property

    In a Proxy Re-Encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Cryptanalysis of the OKH Authenticated Encryption Scheme

    Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

    Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. The...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

    The general principle for algebraic attack for multi-output stream ciphers was proposed by Courtois. Furthermore, Armknecht, and Krause gave a definition of algebraic immunity for multi-output Boolean functions in, and investigated some construction methods of multi-output Boolean functions with maximal algebraic immunity. In this paper, several new characterizations of algebraic...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting

    Deterministic-Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios (e.g. search on encrypted data) where the latter exhibits inherent drawbacks. In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs. A...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Gradient-Based Multi-Path Routing Protocol for Low Duty-Cycled Wireless Sensor Networks

    Low duty cycled sleep scheduling can largely prolong the lifetime of a Wireless Sensor Network (WSN). However, it also brings big challenge to the design of efficient routing protocols. Inappropriate selection of routes can largely offset the efficiency of a sleep scheduling mechanism. This paper aims to provide a simple...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Coverage Optimization for Femtocell Clusters Using Modified Particle Swarm Optimization

    Coverage optimization is a main challenge for femtocell clusters which are considered to be a promising solution to provide seamless cellular coverage for large indoor areas. Although Particle Swarm Optimization (PSO) can be employed to solve the coverage optimization of femtocell clusters, it reduces to Single Particle Swarm Optimization (SPSO)...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    DSRelay: A Scheme of Cooperative Downloading Based on Dynamic Slot

    People's growing dependency on the Internet makes them want to access the network anytime and anywhere, even while driving cars. Although 3G or 4G networks can be used to achieve this goal, roadside APs have the advantages of low cost and high bandwidth. At present, however, APs cannot cover all...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2009

    Blog Post Extraction Using Title Finding

    With the development of Web2.0, web mining applications pay more attention to blog pages. In order to prevent noises in blog pages from affecting the precision of web mining algorithms, it is very necessary to acquire posts from blog pages correctly. In this paper, the authors propose a blog post...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2010

    A Calculus for Game-Based Security Proofs

    The game-based approach to security proofs in cryptography is a widely-used methodology for writing proofs rigorously. However a unifying language for writing games is still missing. In this paper the authors show how CSLR, a probabilistic lambda-calculus with a type system that guarantees that computations are probabilistic polynomial time, can...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2009

    An Enhanced Quickest Response Algorithm for Grid Service Discovery

    A computational grid is an emerging computing infrastructure that enables effective access to high performance computing resources. Service discovery is one of the most important research issues of grid computing. However, traditional service discovery algorithms are not suitable for grid environment due to the facts of inherited decentralization and loose...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2010

    A Broadcast Attack Against NTRU Using Ding's Algorithm

    In 1988, Hastad proposed the first broadcast attack against public key cryptosystems. The attack enables an attacker to recover the plaintext sent by a sender to multiple recipients, without requiring any knowledge of the recipient's secret key. In 2009, Plantard and Susilo first considered the broadcast attack against the lattice-based...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2010

    Optimal XOR Based (2,n)-Visual Cryptography Schemes

    The basic principle of Visual Cryptography Scheme (VCS) was first introduced by Naor and Shamir. The idea of the visual cryptography model proposed in [22] is to split an image into two random shares (printed on transparencies) which separately reveal no information about the original secret image other than the...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    Design and Analysis of the REESSE1+ Public Key Cryptosystem

    The authors give the definitions of a coprime sequence and a lever function, and describe five algorithms and six characteristics of a prototypal cryptosystem called REESSE1+, used for encryption and signature, and based on the three new hardnesses: Multivariate Permutation Problem (MPP) Ci ?? (Ai W ?? (i))?? (% M),...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC

    The Isomorphism of Polynomials (IP) is one of the most fundamental problems in Multivariate Public Key Cryptography (MPKC). In this paper, the authors introduce a new framework to study the counting problem associated to IP. Namely, they present tools of finite geometry allowing to investigate the counting problem associated to...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2010

    Embedded Extended Visual Cryptography Schemes

    Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares that distributed to n participants. The beauty of such scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2010

    Loiss: A Byte-Oriented Stream Cipher

    This paper presents a byte-oriented stream cipher - Loiss, which takes a 128-bit initial key and a 128-bit initial vector as inputs, and outputs a key stream of bytes. The algorithm is based on a linear feedback shift register, and uses a structure called BOMM in the filter generator, which...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2010

    Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

    Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2010

    Computational Soundness About Formal Encryption in the Presence of Secret Shares and Key Cycles

    The computational soundness of formal encryption is studied extensively following the work of Abadi and Rogaway. Recent work considers the scenario in which secret sharing is needed, and separately, the scenario when key cycles are present. The novel technique is the use of a co-induction definition of the adversarial knowledge....

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    ECDLP on GPU

    Elliptic Curve Discrete Logarithm Problem (ECDLP) is one of the most important hard problems that modern cryptography, especially public key cryptography, relies on. And many efforts are dedicate to solve this problem. In recent days, GPU technology develops very fast and GPU has become a powerful tool for massive computation....

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2011

    Improved Integral Attacks on Reduced Round Camellia

    In this paper a method is presented to extend the length of integral distinguisher of Feistel-SP structure, based on which a new 8-round distinguisher of Camellia is proposed. Moreover, the authors improve integral attacks on reduced round Camellia without FL/FL-1. They attack 11-round Camellia-128 with the data complexity of 2120...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2011

    Impact Of Heterogenous Prior Beliefs And Disclosed Insider Trades

    In this paper, the authors present a multi-period trading model by assuming that traders face not only asymmetric information but also heterogenous prior beliefs, under the requirement that the insider publicly disclose his stock trades after the fact. They show that there is an equilibrium in which the irrational insider...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    Inside Trading, Public Disclosure And Imperfect Competition

    In this paper, the authors present a multi-period trading model in the style of Kyle (1985)'s inside trading model, by assuming that there are at least two insiders in the market with long-lived private information, under the requirement that each insider publicly discloses his stock trades after the fact. Based...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2009

    Middleware-Based Distributed Systems Software Process

    Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific services. It plays a central and essential role for developing distributed systems. However, middleware is considered a mean rather than core elements of development process in the existing...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2011

    LBlock: A Lightweight Block Cipher

    In this paper, the authors propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. The security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differential...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    Self-Adaptive Iris Image Acquisition System

    Iris image acquisition is the fundamental step of the iris recognition, but capturing high-resolution iris images in real-time is very difficult. The most common systems have small capture volume and demand users to fully cooperate with machines, which has become the bottleneck of iris recognition's application. In this paper, the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    Securing the Distributions in P2P Networks With Trusted Platform Modules

    The authors present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2010

    An Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection

    Network anomaly detection has been a hot topic in the past years. However, high false alarm rate, difficulties in obtaining exact clean data for the modeling of normal patterns and the deterioration of detection rate because of "Unclean" training set always make it not as good as the authors expect....

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    Financial Rogue Waves Appearing In The Coupled Nonlinear Volatility And Option Pricing Model

    The coupled nonlinear volatility and option pricing model presented recently by Ivancevic is investigated, which generates a leverage effect, i.e., stock volatility is (negatively) correlated to stock returns, and can be regarded as a coupled nonlinear wave alternative of the Black-Scholes option pricing model. In this paper, the authors analytically...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2009

    FDI, R&D And Innovation Output In The Chinese Automobile Industry

    After joining the World Trade Organization (WTO), China witnessed a major inflow of Foreign Direct Investment (FDI). Many famous automobile firms of developed countries were attracted to invest in China to cooperate with domestic firms. This paper uses firm-level data of the Chinese automobile industry to analyze the determinants of,...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2009

    Phoenix Cloud: Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms

    For a large organization, different departments often maintain dedicated cluster systems for different workloads, for example parallel batch jobs or Web services. This paper designs and implements an innovative cloud computing system software, Phoenix Cloud, to consolidate heterogeneous workloads of the same organization on the cloud computing platform. For Phoenix...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2009

    Single Target Search and Capture Based on Random Sensor Deployment in Mobile Sensor Networks

    This paper addresses the problem of coordinating multiple agents in chasing and capturing a single mobile target, where the objective of a group of agents is to reduce the time of chasing and capturing the target with the aid of wireless sensor networks. Different from the previous algorithms, its research...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives

    Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g., block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary's...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2010

    Adaptive Voice Stream Multicast Over Low-Power Wireless Networks

    Low-power Wireless Networks (LWNs) have become increasingly available for mission-critical applications such as security surveillance and disaster response. In particular, emerging low-power wireless audio platforms provide an economical solution for ad hoc voice communication in emergency scenarios. In this paper, the authors develop a system called Adaptive Stream Multicast (ASM)...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2011

    An Energy-Efficient Scheduling Approach Based on Private Clouds

    With further development and wide acceptance of cloud computing, lots of companies and colleges decide to take advantage of it in their own data centers, which is known as private clouds. Since private clouds have some unique characteristics and special requirements, it is still a challenging problem to effectively schedule...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    A Massively Parallel Approach for Nonlinear Interdependency Analysis of Multivariate Signals With GPGPU

    Non-Linear Interdependency (NLI) analysis is an effective method for measurement of synchronization among brain regions, which is an important feature of normal and abnormal brain functions. But its application in practice has long been largely hampered by the ultra-high complexity of the NLI algorithms. The authors developed a massively parallel...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Accelerating Sparse Matrix Vector Multiplication on Many-Core GPUs

    Many-core GPUs provide high computing ability and substantial bandwidth; however, optimizing irregular applications like SpMV on GPUs becomes a difficult but meaningful task. In this paper, the authors propose a novel method to improve the performance of SpMV on GPUs. A new storage format called HYB-R is proposed to exploit...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2011

    Fully Secure (Doubly-)Spatial Encryption Under Simpler Assumptions

    Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks

    Boolean functions are frequently used in the design of stream ciphers, block ciphers and hash functions. One of the most vital roles in cryptography of Boolean functions is to be used as filter and combination generators of stream ciphers based on Linear Feedback Shift Registers (LFSR). The study of the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences