Chinese Academy of Sciences

Displaying 1-40 of 109 results

  • White Papers // Feb 2014

    BDGS: A Scalable Big Data Generator Suite in Big Data Benchmarking

    Data generation is a key issue in big data benchmarking that aims to generate application-specific data sets to meet the 4V requirements of big data. Specifically, big data generators need to generate scalable data (Volume) of different types (Variety) under controllable generation rates (Velocity) while keeping the important characteristics of...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2014

    BigDataBench: a Big Data Benchmark Suite from Internet Services

    As architecture, systems, and data management communities pay greater attention to innovative big data systems and architecture, the pressure of benchmarking and evaluating these systems rises. However, the complexity, diversity, frequently changed workloads, and rapid evolution of big data systems raise great challenges in big data benchmarking. Considering the broad...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2014

    BigOP: Generating Comprehensive Big Data Workloads as a Benchmarking Framework

    Big Data is considered proprietary asset of companies, organizations, and even nations. Turning big data into real treasure requires the support of big data systems. A variety of commercial and open source products have been unleashed for big data storage and processing. While big data users are facing the choice...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Repair Locality with Multiple Erasure Tolerance

    In distributed storage systems, using erasure codes instead of straightforward replication may lead to desirable improvements in storage overhead and reliability. A challenge of the coding technique is to efficiently repair the packets loss caused by node failures so that the system keeps the same level of redundancy. However, traditional...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2013

    Algorithms and Stability Analysis for Content Distribution Over Multiple Multicast Trees

    The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By universal swarming, not only all the nodes in the session, but...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    Post-Quantum Security of Encrypted Key Exchange Protocol

    The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2013

    A Generic Framework for Anonymous Authentication in Mobile Networks

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, the authors present a generic construction that converts any existing secure password authentication...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2013

    Generalized (Identity-Based) Hash Proof System and its Applications

    In this paper, the authors generalize the paradigm of Hash Proof System (HPS) proposed by Cramer and Shoup. In the central of their generalization, they lift subset membership problem to distribution distinguish problem. Their generalized HPS clarifies and encompass all the known Public-Key Encryption (PKE) schemes that essentially implement the...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    Integrated PKE and PEKS - Stronger Security Notions and New Constructions

    In this paper, the authors investigate the security for integrated Public-Key Encryption (PKE) and Public-key Encryption with Keyword Search (PEKS) schemes. They observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2012

    PRE: Stronger Security Notions and Efficient Construction with New Property

    In a Proxy Re-Encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Cryptanalysis of the OKH Authenticated Encryption Scheme

    Authenticated Encryption (AE) schemes achieve the security functions of message authentication codes and that of encryption schemes at the same time, i.e. authenticity and privacy. Simply speaking, authenticity guarantees that the ciphertext is really delivered from the sender and not modified by the adversary during the transmission. Privacy guarantees that...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Aggregating User Rating and Service Context for WSN Service Ranking

    Wireless Sensor Networks (WSNs) are always deployed for monitoring and gathering physical information via lots of sensors. For facilitating the internet usage of WSN, Web service is regarded as the most promising technology to wrap the sensor functionality to form WSN service. With the growth of WSN services, making service...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2012

    Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks

    To counter malicious peers in P2P systems, PeerTrust-like schemes take advantage of similarity between peers to compute service provider's trust value. To derive the similarity, there currently exist some approaches documented which however mostly are interested in algorithm or process enhancement, the analytic study in theory for these PeerTrust-like mechanisms...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

    Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. The...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

    The general principle for algebraic attack for multi-output stream ciphers was proposed by Courtois. Furthermore, Armknecht, and Krause gave a definition of algebraic immunity for multi-output Boolean functions in, and investigated some construction methods of multi-output Boolean functions with maximal algebraic immunity. In this paper, several new characterizations of algebraic...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting

    Deterministic-Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios (e.g. search on encrypted data) where the latter exhibits inherent drawbacks. In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs. A...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Gradient-Based Multi-Path Routing Protocol for Low Duty-Cycled Wireless Sensor Networks

    Low duty cycled sleep scheduling can largely prolong the lifetime of a Wireless Sensor Network (WSN). However, it also brings big challenge to the design of efficient routing protocols. Inappropriate selection of routes can largely offset the efficiency of a sleep scheduling mechanism. This paper aims to provide a simple...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    DSRelay: A Scheme of Cooperative Downloading Based on Dynamic Slot

    People's growing dependency on the Internet makes them want to access the network anytime and anywhere, even while driving cars. Although 3G or 4G networks can be used to achieve this goal, roadside APs have the advantages of low cost and high bandwidth. At present, however, APs cannot cover all...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Coverage Optimization for Femtocell Clusters Using Modified Particle Swarm Optimization

    Coverage optimization is a main challenge for femtocell clusters which are considered to be a promising solution to provide seamless cellular coverage for large indoor areas. Although Particle Swarm Optimization (PSO) can be employed to solve the coverage optimization of femtocell clusters, it reduces to Single Particle Swarm Optimization (SPSO)...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Macroscopic Traffic Flow Models for Shanghai

    Traffic flow models are essential to performance analysis/evaluation for applications/services provided by Intelligent Transportation Systems (ITS)/Vehicular Ad-hoc NETworks (VANET). They are also useful guidance for the deployment of ITS/VANET. Many macroscopic traffic flow models have been proposed in the past few decades on the basis of empirical data collected in...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Sparse Channel Estimation for OFDM Transmission Over Two-Way Relay Networks

    Compressed Sensing (CS) has recently emerged as a powerful signal acquisition paradigm. CS enables the recovery of high-dimensional sparse signals from much fewer samples than usually required. Further, quite a few recent channel measurement experiments show that many wireless channels also tend to exhibit sparsity. In this case, CS theory...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    A Prefiltering Approach to Regular Expression Matching for Network Security Systems

    Regular Expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory,...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2012

    On Efficient Pairings on Elliptic Curves Over Extension Fields

    In implementation of elliptic curve cryptography, three kinds of finite fields have been widely studied, i.e. prime field, binary field and optimal extension field. In pairing-based cryptography, however, pairing-friendly curves are usually chosen among ordinary curves over prime fields and supersingular curves over extension fields with small characteristics. In this...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Short and Efficient Expressive Attribute-Based Signature in the Standard Model

    Attribute-based signature allows the signer to announce his endorsement using a signing policy without revealing the identity, and only the signer whose attributes satisfy the signing policy can generate a valid signature. Attribute-based signature can provide flexible access control policy and has many applications in real scenarios requiring both privacy...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

    Peer-To-Peer (P2P) techniques are broadly adopted in modern applications such as Xunlei and Private Tracker. To address the problem of service availability, techniques such as bundling and implicit uploading are suggested to increase the swarm lifespan, i.e., the duration between the birth and the death of a swarm, by motivating...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives

    Random extractors are proven to be important building blocks in constructing leakage resilient cryptographic primitives. Nevertheless, recent efforts showed that they are likely more leaky than other elementary components (e.g., block ciphers) in unprotected implementations of these primitives, in the context of side-channel attacks. In this context, from the adversary's...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks

    Boolean functions are frequently used in the design of stream ciphers, block ciphers and hash functions. One of the most vital roles in cryptography of Boolean functions is to be used as filter and combination generators of stream ciphers based on Linear Feedback Shift Registers (LFSR). The study of the...

    Provided By Chinese Academy of Sciences

  • White Papers // Feb 2012

    A Massively Parallel Approach for Nonlinear Interdependency Analysis of Multivariate Signals With GPGPU

    Non-Linear Interdependency (NLI) analysis is an effective method for measurement of synchronization among brain regions, which is an important feature of normal and abnormal brain functions. But its application in practice has long been largely hampered by the ultra-high complexity of the NLI algorithms. The authors developed a massively parallel...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Accelerating Sparse Matrix Vector Multiplication on Many-Core GPUs

    Many-core GPUs provide high computing ability and substantial bandwidth; however, optimizing irregular applications like SpMV on GPUs becomes a difficult but meaningful task. In this paper, the authors propose a novel method to improve the performance of SpMV on GPUs. A new storage format called HYB-R is proposed to exploit...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2012

    Exploiting Constructive Interference for Scalable Flooding in Wireless Networks

    Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize millisecond network flooding latency and sub-microsecond time synchronization accuracy, require no network state information and adapt to topology changes. However, constructive interference has a...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2010

    Computational Soundness About Formal Encryption in the Presence of Secret Shares and Key Cycles

    The computational soundness of formal encryption is studied extensively following the work of Abadi and Rogaway. Recent work considers the scenario in which secret sharing is needed, and separately, the scenario when key cycles are present. The novel technique is the use of a co-induction definition of the adversarial knowledge....

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2010

    Unconditionally Secure Rational Secret Sharing in Standard Communication Networks

    Rational secret sharing protocols in both the two-party and multi-party settings are proposed. These protocols are built in standard communication networks and with unconditional security. Namely, the protocols run over standard point-to-point networks without requiring physical assumptions or simultaneous channels, and even a computationally unbounded player cannot gain more than...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2010

    Embedded Extended Visual Cryptography Schemes

    Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares that distributed to n participants. The beauty of such scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2011

    Impact Of Heterogenous Prior Beliefs And Disclosed Insider Trades

    In this paper, the authors present a multi-period trading model by assuming that traders face not only asymmetric information but also heterogenous prior beliefs, under the requirement that the insider publicly disclose his stock trades after the fact. They show that there is an equilibrium in which the irrational insider...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    Inside Trading, Public Disclosure And Imperfect Competition

    In this paper, the authors present a multi-period trading model in the style of Kyle (1985)'s inside trading model, by assuming that there are at least two insiders in the market with long-lived private information, under the requirement that each insider publicly discloses his stock trades after the fact. Based...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    Financial Rogue Waves Appearing In The Coupled Nonlinear Volatility And Option Pricing Model

    The coupled nonlinear volatility and option pricing model presented recently by Ivancevic is investigated, which generates a leverage effect, i.e., stock volatility is (negatively) correlated to stock returns, and can be regarded as a coupled nonlinear wave alternative of the Black-Scholes option pricing model. In this paper, the authors analytically...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2008

    Software Metrics Analysis With Genetic Algorithm and Affinity Propagation Clustering

    Software metrics are collected in software development process and can be utilized to quantify software products, especially to predict software quality in the early stage of software life cycle. Data mining techniques have been applied to study software quality by analyzing software metrics. And clustering analysis, one of data mining...

    Provided By Chinese Academy of Sciences

  • White Papers // Dec 2009

    Middleware-Based Distributed Systems Software Process

    Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific services. It plays a central and essential role for developing distributed systems. However, middleware is considered a mean rather than core elements of development process in the existing...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2011

    LBlock: A Lightweight Block Cipher

    In this paper, the authors propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. The security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differential...

    Provided By Chinese Academy of Sciences

  • White Papers // Nov 2010

    An Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection

    Network anomaly detection has been a hot topic in the past years. However, high false alarm rate, difficulties in obtaining exact clean data for the modeling of normal patterns and the deterioration of detection rate because of "Unclean" training set always make it not as good as the authors expect....

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2008

    A 3D Reconstruction System of Indoor Scenes With Rotating Platform

    3D reconstruction has a long history, few workable reconstruction systems are available although many magnificent theories and algorithms are reported in literature. In this paper, a 3D reconstruction system for indoor scenes with a rotating platform is reported, including its key components such as system calibration, feature matching and 3D...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2008

    Provide VoD Service in Peer-to-Peer Network Using Offset Ranking and Epidemic Diffusion

    The Peer-to-Peer solution provides a service model that is attractive for Video-On-Demand (VOD). The key idea of using P2P technology is to aggregate storage and bandwidths capacity of peers to alleviate workload on the source server. Compared with P2P live streaming, it is much more challenge for VOD due to...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2008

    Technology Roadmap for Smart Iris Recognition

    Iris recognition has many desirable properties for reliable individual authentication but usability is its largest bottleneck to wide deployment. Thus, smart interface and machine intelligent are the objective of next-generation iris recognition. This paper presents the technology roadmap for Smart Iris Recognition (SIR). Firstly, the concept of SIR is introduced,...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2008

    Palmprint Image Synthesis: A Preliminary Study

    In this paper, the authors present a preliminary study of palmprint image synthesis and propose a framework for synthesizing palmprint texture. They first extract principal lines of real palmprints using edge detection and synthesize wrinkles and ridges of palm using patch-based sampling. Then, they incorporate principal lines, wrinkles and ridges...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2011

    Self-Adaptive Iris Image Acquisition System

    Iris image acquisition is the fundamental step of the iris recognition, but capturing high-resolution iris images in real-time is very difficult. The most common systems have small capture volume and demand users to fully cooperate with machines, which has become the bottleneck of iris recognition's application. In this paper, the...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2008

    Combine Hierarchical Appearance Statistics for Accurate Palmprint Recognition

    Palmprint recognition is an active member of biometrics in recent years. State-of-the-art algorithms of palmprint recognition describe appearances of palmprints efficiently through local texture analysis. Following this framework, the authors propose a novel approach of palmprint recognition in this paper, which represents palmprint images based on statistics and spatial arrangement...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2008

    Synthesis of Large Realistic Iris Databases Using Patch-Based Sampling

    This paper presents a framework to synthesize large realistic iris databases, providing an alternative to iris database collection. Firstly, iris patch is used as a basic element to characterize visual primitive of iris texture, and patch-based sampling is applied to create an iris prototype. Then, a set of pseudo irises...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2008

    Counterfeit Iris Detection Based on Texture Analysis

    This paper addresses the issue of counterfeit iris detection, which is a liveness detection problem in biometrics. Fake iris mentioned here refers to iris wearing color contact lens with textures printed onto them. The authors propose three measures to detect fake iris: measuring iris edge sharpness, applying Iris-Texton feature for...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    Lazy Caching: A Novel Proxy Caching Algorithm for Peer-to-Peer Live Streaming

    Peer-to-Peer (P2P) live streaming systems are becoming popular and are imposing a heavy burden on Internet Services Providers (ISPs). Proxy caching has been shown to be an effective means of reducing operation costs for ISPs. Although many caching algorithms for conventional web applications and P2P file sharing systems have been...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    A Playback Length Changeable Segmentation Algorithm for SVC-Based P2P Streaming Systems

    In this paper, the authors first probe into the data characteristics of SVC and analyze their impacts on P2P segmentation algorithms. According to their studies, the Equal Playback Length Segmentation (EPLS) algorithm, which is widely used in current SVC-based P2P streaming systems, does not consider the data characteristics of SVC...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2012

    An Adaptive Handover Trigger Scheme for Wireless Communications on High Speed Rail

    Handover triggered probability is the probability of handover triggered before the train arrives at a specific position. A low handover triggered probability at the cell edge will result in serious communication interruptions and call drops. This paper analyzes the impact of overlapped area and user measurement report period on the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Fast Average Consensus in Clustered Wireless Sensor Networks by Superposition Gossiping

    In this paper, the authors propose a gossip algorithm for average consensus in clustered wireless sensor networks called superposition gossiping, where the nodes in each cluster exploit the natural superposition property of wireless multiple-access channels to significantly decrease local averaging times. More precisely, the considered network is organized into single-hop...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Inter-Cell Interference Coordination Through Adaptive Soft Frequency Reuse in LTE Networks

    In 3GPP Long Term Evolution (LTE) networks, the frequency reuse schemes such as Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR) are used to improve system capacity. The allocation of transmit power and subcarriers to each cell in these schemes are fixed prior to network deployment. This limits the...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2012

    Maximum Entropy Based IP-Traffic Classification in Mobile Communication Networks

    In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called "SIPTO"(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2012

    An Optimal Fully Distributed Algorithm to Minimize the Resource Consumption of Cloud Applications

    According to the pay-per-use model adopted in clouds, the more the resources consumed by an application running in a cloud computing environment, the greater the amount of money the owner of the corresponding application will be charged. Therefore, applying intelligent solutions to minimize the resource consumption is of great importance....

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2012

    Distributed Resource Allocation Algorithm Design for Multi-Cell Networks Based on Advanced Decomposition Theory

    In this paper, the authors investigate the resource allocation for downlink multi-cell coordinated OFDMA wireless networks, in which power allocation and subcarrier scheduling are jointly optimized. Aiming at maximizing the Weighted Sum of the Minimal user Rates (WSMR) of coordinated cells under individual power constraints at each base station, an...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2008

    A Hierarchical Model for the Evaluation of Biometric Sample Quality

    The evaluation of biometric sample quality is of great importance in the evaluation of biometric algorithms. In this paper, the authors propose a novel hierarchical model to compute the sample quality on three levels. This model is developed on the basis of three types of influencing factors: global factors, subjective...

    Provided By Chinese Academy of Sciences

  • White Papers // Jan 2009

    Curvature Estimation of 3D Point Cloud Surfaces Through the Fitting of Normal Section Curvatures

    As the technical development of laser scanning and image based modeling, more and more point cloud data are obtained to represent 3D geometric shapes of natural objects. Calculation of differential properties of 3D discrete geometry becomes one fundamental work. Through the relation of discrete normal curvatures and principal curvatures, a...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2008

    Security Enhancement of Biometrics, Cryptography and Data Hiding by Their Combinations

    The security of multimedia information in general and the security of visual information in particular have increasingly become an issue of great concern in the networked society. Biometrics, cryptography and data hiding provide effective and often complementary solutions to information security from different perspectives. In this paper, the authors present...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2008

    Facial Expression Recognition Using Encoded Dynamic Features

    In this paper, the authors propose a novel framework for video-based facial expression recognition, which can handle the data with various time resolutions including a single frame. They first use the haar-like features to represent facial appearance, due to their simplicity and effectiveness. Then, they perform K-Means clustering on the...

    Provided By Chinese Academy of Sciences

  • White Papers // May 2008

    Unsupervised Change Detection in High Spatial Resolution Optical Imagery Based on Modified Hopfield Neural Network

    This paper addresses the problem of unsupervised change detection in high spatial resolution optical remote sensing images based on Hopfield Neural Network (HNN). An optimization relaxation approach based on the analysis of a modified Hopfield neural network is proposed for solving the change detection problem. The modified Hopfield neural network...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2011

    Securing the Distributions in P2P Networks With Trusted Platform Modules

    The authors present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness...

    Provided By Chinese Academy of Sciences

  • White Papers // Mar 2009

    Credit Constraints Under Interaction Of Supply Rationing And Demand Depression: Evidence From Rural Households In China

    This paper analyzes the credit demand depression phenomenon resulting from long-term institutional supply rationing. Under the interaction between imperfect formal credit system and rural households' risk aversion behavior, rural households will be discouraged to depress their credit demand or replace it with informal credit, which the authors call demand-side credit...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2011

    An Energy-Efficient Scheduling Approach Based on Private Clouds

    With further development and wide acceptance of cloud computing, lots of companies and colleges decide to take advantage of it in their own data centers, which is known as private clouds. Since private clouds have some unique characteristics and special requirements, it is still a challenging problem to effectively schedule...

    Provided By Chinese Academy of Sciences

  • White Papers // Sep 2010

    Adaptive Voice Stream Multicast Over Low-Power Wireless Networks

    Low-power Wireless Networks (LWNs) have become increasingly available for mission-critical applications such as security surveillance and disaster response. In particular, emerging low-power wireless audio platforms provide an economical solution for ad hoc voice communication in emergency scenarios. In this paper, the authors develop a system called Adaptive Stream Multicast (ASM)...

    Provided By Chinese Academy of Sciences

  • White Papers // Jul 2011

    A Two-Tiered Reliable Application Layer Multicast

    This paper presents a two-tiered reliable Application Layer Multicast (ALM) solution, called HRALM, to provide lossless ALM services. HRALM builds a domain-based multicast tree, and divides the members into two transport planes (i.e., Plane 1 and Plane 2) in terms of the tree. In any domain, the distance between each...

    Provided By Chinese Academy of Sciences

  • White Papers // Aug 2012

    Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

    Adaptive routing algorithm has been employed in multichip interconnection networks in order to improve network performance. Does a algorithm use local or global network state? This is the key question in adaptive routing. In many traffic patterns, the ignorance of global network state, leading to routing selection based only on...

    Provided By Chinese Academy of Sciences

  • White Papers // Jun 2011

    Precise Propagation of Fault-Failure Correlations in Program Flow Graphs

    Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such techniques can be promising in locating program faults. However, coincidental correctness and execution crashes may make program entities indistinguishable in the execution spectra under study, or cause inaccurate...

    Provided By Chinese Academy of Sciences

  • White Papers // Apr 2010

    Distributed Mobility Management Based on Flat Network Architecture

    Mobility management is crucial for mobile networks to support certain Quality of Service (QoS) requirements. In this paper, the authors developed a flat network architecture rather than traditional two-layer mobility management architecture to reduce network elements and lighten networking load. Based on the proposed flat network structure the concept of...

    Provided By Chinese Academy of Sciences

  • White Papers // Oct 2012

    Genetic Diversity and Population Structure: Implications for Conservation of Wild Soybean (Glycine Soja Sieb. et Zucc) Based on Nuclear and Chloroplast Microsatellite Variation

    Wild soybean (Glycine soja Sieb. et Zucc) is the most important germplasm resource for soybean breeding, and is currently subject to habitat loss, fragmentation and population decline. In order to develop successful conservation strategies, a total of 604 wild soybean accessions from 43 locations sampled across its range in China,...

    Provided By Chinese Academy of Sciences