CNRS

Displaying 1-40 of 238 results

  • White Papers // May 2014

    Large Pages May Be Harmful on NUMA Systems

    Application virtual address space is divided into pages, each requiring a virtual-to-physical translation in the page table and the TLB. Large working sets, common among modern applications, necessitate a lot of translations, which increases memory consumption and leads to high TLB and page fault rates. To address this problem, recent...

    Provided By CNRS

  • White Papers // Apr 2014

    Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors

    The authors introduce and experimentally validate a new macro-level model of the CPU temperature/power relationship within nanometer-scale application processors or system-on-chips. By adopting a holistic view, this model is able to take into account many of the physical effects that occur within such systems. Together with two algorithms described in...

    Provided By CNRS

  • White Papers // Mar 2014

    POSH: Paris OpenSHMEM A High-Performance OpenSHMEM Implementation for Shared Memory Systems

    The drive toward many-core architectures has been tremendous during the last decade. Along with this trend, the community has been searching, investigating and looking for programming models that provide both control on the data locality and flexibility of the data handling. In this paper, the authors present the design and...

    Provided By CNRS

  • White Papers // Mar 2014

    Searching for Sinks of Henon Map Using a Multiple-Precision GPU Arithmetic Library

    Today, GPUs represent an important hardware development platform for many problems in dynamical systems, where massive parallel computations are needed. Besides that, many numerical studies of chaotic dynamical systems require a computing precision higher than common Floating Point (FP) formats. One such application is locating invariant sets for chaotic dynamical...

    Provided By CNRS

  • White Papers // Feb 2014

    Query Processing for SPARQL Federations with Data Replication

    Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not...

    Provided By CNRS

  • White Papers // Jan 2014

    Control of Multiple Remote Servers for Quality-Fair Delivery of Multimedia Contents

    This paper proposes a control scheme for the quality-fair delivery of several encoded video streams to mobile users sharing a common wireless resource. Video quality fairness, as well as similar delivery delays is targeted among streams. The proposed controller is implemented within some aggregator located near the bottleneck of the...

    Provided By CNRS

  • White Papers // Jan 2014

    Formal Modeling and Evaluation of Stateful Service-based Business Process Elasticity in the Cloud

    Cloud environments are being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). One of the expected features of cloud environments is elasticity at different levels. It is obvious that provisioning of elastic platforms is not sufficient to provide elasticity of the deployed business process....

    Provided By CNRS

  • White Papers // Jan 2014

    Timing Analysis of an Embedded Memory: SPSMALL

    In this paper, the authors verify the timing consistency of an embedded memory, named SPSMALL: given a transistor-level description of the memory and its interface specification (a datasheet that specifies the timing constraints to be satisfied by the memory), formally prove that the implementation satisfies the specification. This paper proposes...

    Provided By CNRS

  • White Papers // Jan 2014

    A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip

    Networks-on-Chip (NoC) is a critical part of System-on-Chip (SoC). Indeed, the growing size of SoC including many components requires the use of distributed network. The authors present an extension of Duato's necessary and sufficient condition a routing function must satisfy in order to be deadlock-free, to support environment constraints inducing...

    Provided By CNRS

  • White Papers // Jan 2014

    Using CTL Formulae as Component Abstraction in a Design and Verification Flow

    In this paper, the authors take place in the context of hardware modular verification by model checking. Although this latest is not adequate to verify very complex systems, it has been successfully used for medium-sized systems. More precisely, model-checking techniques are well-suited for protocols verification. The verification of global properties...

    Provided By CNRS

  • White Papers // Dec 2013

    Multi-Hop Counter Based Data Dissemination Protocol for Communicating Materials

    The communicating material is a new paradigm of Internet of Things. It is designed to perform efficient product control and ensure an information continuum all along the product life cycle. Therefore, storage of life cycle information and data dissemination in communicating materials are very important issues. This paper provides a...

    Provided By CNRS

  • White Papers // Dec 2013

    Privacy Preserving Minimal Observability for Composite Transactional Services

    For complex services composed of many (component) services, logging is an integral middleware aspect, especially for providing transactions and monitoring. In the event of a failure, the log allows one to deduce the cause of failure (diagnosis) and recover by compensating the executed services (atomicity). However, for heterogeneous services with...

    Provided By CNRS

  • White Papers // Dec 2013

    Formally Proved Security of Assembly Code Against Power Analysis

    In the authors keynote speech at CHES 2004, kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is due to the fact that...

    Provided By CNRS

  • White Papers // Nov 2013

    On the Semantics of Object-Oriented Data Structures and Path Expressions

    UML/OCL is perceived as the de-facto standard for specifying object-oriented models in general and data models in particular. Since recently, all data types of UML/OCL comprise two different exception elements: invalid (\"Bottom\" in semantics terminology) and null (for \"Non-existing element\"). This paper has far-reaching consequences on both the logical and...

    Provided By CNRS

  • White Papers // Nov 2013

    Tackling Real-Time Signal Processing Applications on Shared Memory Multicore Architectures Using XPU

    General-purpose shared memory multi-core architectures are becoming widely available. They are likely to stand as attractive alternatives to more specialized processing architectures such as FPGA and DSP-based platforms to perform real-time digital signal processing. In this paper, the authors show how they can ease parallelism expression on shared memory multi-core...

    Provided By CNRS

  • White Papers // Nov 2013

    Efficient Multi-GPU Algorithm for All-Pairs Shortest Paths

    The shortest-path problem is a fundamental computer science problem with applications in diverse areas such as transportation, robotics, network routing, and VLSI design. The problem is to find paths of minimum weight between pairs of nodes in edge-weighted graphs, where the weight of a path p is defined as the...

    Provided By CNRS

  • White Papers // Nov 2013

    A Survey of RDB to RDF Translation Approaches and Tools

    Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, the authors propose a detailed review of RDB-to-RDF methods and tools, considering end-to-end projects that delivered operational tools. The...

    Provided By CNRS

  • White Papers // Oct 2013

    On the Validity of Flow-level TCP Network Models for Grid and Cloud Simulations

    Researchers in the area of grid/cloud computing perform many of their experiments using simulations that must capture network behavior. In this context, packet-level simulations, which are widely used to study network protocols, are too costly given the typical large scales of simulated systems and applications. An alternative is to implement...

    Provided By CNRS

  • White Papers // Oct 2013

    Embedded Data on Intelligent Products - Impact on Real-Time Applications

    New challenges and opportunities arise with the Internet of Things (IoT), making it possible to link any objects of the real world with the virtual one. In recent years, IoT has become increasingly popular in industrial applications (e.g. for the inclusion of data related to the product history). It might...

    Provided By CNRS

  • White Papers // Sep 2013

    Fact Checking and Analyzing the Web

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to...

    Provided By CNRS

  • White Papers // Sep 2013

    Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model

    Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters...

    Provided By CNRS

  • White Papers // Sep 2013

    Query Rewriting for Rule Mining in Databases

    Promoting declarative approaches in data mining is a long standing theme. This paper goes into this direction by proposing a well-founded logical query language, SafeRL, allowing the expression of a wide variety of \"Rules\" to be discovered against the data. SafeRL extends and generalizes functional dependencies in databases to new...

    Provided By CNRS

  • White Papers // Sep 2013

    Visual Analysis of Complex Networks for Business Intelligence with Gephi

    The recent availability of a vast amount of data from Online Social Networks (OSN) and from the Web has opened promising perspectives for the field of Business Intelligence (BI), in particular for the monitoring of brand e-reputation and for the management of customer relationships. Platforms which combine data mining algorithms...

    Provided By CNRS

  • White Papers // Jul 2013

    Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the...

    Provided By CNRS

  • White Papers // Jul 2013

    Towards a Secure Identity Management in Smartphone Environments

    Mobile network operators are providing identification and authentication means to their subscribers through SIM-cards. IDentity Management (IDM) is a hot topic today for mobile network operators and service providers, especially when the terminal is a Smartphone. This paper addresses the encountered security issues of Smartphone's to support identity management. Then...

    Provided By CNRS

  • White Papers // Jul 2013

    Scheduling Analysis from Architectural Models of Embedded Multi-Processor Systems

    As embedded systems need more and more computing power, many products require hardware platforms based on multiple processors. In case of real-time constrained systems, the use of scheduling analysis tools is mandatory to validate the design choices, and to better use the processing capacity of the system. To this end,...

    Provided By CNRS

  • White Papers // Jul 2013

    Deduction Soundness: Prove One, Get Five for Free

    Most computational soundness theorems deal with a limited number of primitives, thereby limiting their applicability. The notion of deduction soundness of cortier and warinschi (CCS'11) aims to facilitate soundness theorems for richer frameworks via composition results: deduction soundness extends, generically, with asymmetric encryption and public data structures. Unfortunately, that paper...

    Provided By CNRS

  • White Papers // Jul 2013

    An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies

    As network attacks become more complex, defence strategies must provide means to handle more flexible and dynamic requirements. The Multiprotocol Label Switching (MPLS) standard is a promising method to properly handle suspicious flows participating in such network attacks. Tasks such as alert data extraction, and MPLS routers configuration present an...

    Provided By CNRS

  • White Papers // Jul 2013

    Surveying Collaborative and Content Management Platforms for Enterprise

    The continuous increasing of the information quantity in enterprises encourages the adoption of an Enterprise Content Management (ECM) that evolves as an integrated approach to information management. By observing the trend toward adoption of Web based collaboration tools in the enterprise, the authors focus, in this paper, on ECM platforms...

    Provided By CNRS

  • White Papers // Jul 2013

    Security for Future Networks : a Prospective Study of AAIs

    The future internet will rely heavily on virtualization and cloud networking. The project security for future networks proposes the design of a framework providing secure identification and authentication, secure data transfer and secure virtualized infrastructure. In this paper, the authors present a comparative study should examine some models and frameworks...

    Provided By CNRS

  • White Papers // Jun 2013

    Fast and Efficient FPGA Implementation of Connected Operators

    The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems....

    Provided By CNRS

  • White Papers // Jun 2013

    Blind Calibration in Compressed Sensing Using Message Passing Algorithms

    In this paper the authors study the so-called blind calibration, i.e. when the training signals that are available to perform the calibration are sparse but unknown. They extend the Approximate Message Passing (AMP) algorithm used in CS to the case of blind calibration. In the calibration-AMP, both the gains on...

    Provided By CNRS

  • White Papers // Jun 2013

    Knowledge Harvesting For Business Intelligence

    Over the past few years and with the continuous and rapid growth of information volume, information access and knowledge management, in the enterprises and on the web have become challenging. With the growth rate of information volume, information access and knowledge management in enterprises has become challenging. This paper aims...

    Provided By CNRS

  • White Papers // Jun 2013

    Symmetry Breaking for Multi-Criteria Mapping and Scheduling on Multicores

    Multiprocessor mapping and scheduling is a long-old difficult problem. In this paper the authors propose a new methodology to perform mapping and scheduling along with buffer memory optimization using an SMT solver. They target split-join graphs, a formalism inspired by Synchronous Data-Flow (SDF) which provides a compact symbolic representation of...

    Provided By CNRS

  • White Papers // May 2013

    PiMM: Parameterized and Interfaced Dataflow Meta-Model for MPSoCs Runtime Reconfiguration

    Dataflow models of computation are widely used for the specification, analysis, and optimization of Digital Signal Processing (DSP) applications. In this paper, a new meta-model called PiMM is introduced to address the important challenge of managing dynamics in DSP-oriented representations. PiMM extends a dataflow model by introducing an explicit parameter...

    Provided By CNRS

  • White Papers // May 2013

    Balanced Task Clustering in Scientific Workflows

    Scientific workflows can be composed of many fine computational granularity tasks. The runtime of these tasks may be shorter than the duration of system overheads, for example, when using multiple resources of a cloud infrastructure. Task clustering is a runtime optimization technique that merges multiple short tasks into a single...

    Provided By CNRS

  • White Papers // May 2013

    Error Resilience Exploration in 3D Systems

    In this paper, the authors will present first features of a new resilient exploration tool, ERX, able to propose robustness improvements for 3D NOCs architectures. The tool is able to deal with embedded multi cores architectures. Based on constraints coming from technology side, such as permanent defect rates or transient...

    Provided By CNRS

  • White Papers // May 2013

    Secure Information Transmission Based on Physical Principles

    The authors employ physical properties of the real world to design a protocol for secure information transmission where one of the parties is able to transmit secret information to another party over an insecure channel, without any prior secret arrangements between the parties. The distinctive feature of this protocol, compared...

    Provided By CNRS

  • White Papers // Apr 2013

    ID-Based Cryptography for Secure Cloud Data Storage

    In this paper, the authors address the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-based cryptography. Their solution has several advantages....

    Provided By CNRS

  • White Papers // Apr 2013

    Efficient Malware Detection Using Model-Checking

    Over the past decade, malware costs more than $10 billion every year and the cost is still increasing. Classical signature-based and emulation-based methods are becoming insufficient, since malware writers can easily obfuscate existing malware such that new variants cannot be detected by these methods. Thus, it is important to have...

    Provided By CNRS

  • White Papers // Mar 2012

    An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks

    In mobile Delay Tolerant Networks (DTNs), messages are routed in a mobility-assisted manner. Therefore, the willingness of nodes to relay messages for other nodes plays a significant role in the routing process. Moreover, since the resources in mobile devices are generally limited, carriers of mobile devices may be unwilling to...

    Provided By CNRS

  • White Papers // May 2012

    A Self-Regulating Protocol for Efficient Routing in Mobile Delay Tolerant Networks

    In this paper, the authors present a novel routing protocol for mobile delay tolerant networks, called Community-based Adaptive Spray (CAS). How to maximize routing performance (delivery ratio) and minimize resource consumption (number of message copies) is a common goal in these networks. Their protocol considers the following two aspects toward...

    Provided By CNRS

  • White Papers // Apr 2012

    A Privacy Preserving Prediction-Based Routing Protocol for Mobile Delay Tolerant Networks

    A prediction-based routing protocol for mobile delay tolerant networks works by forwarding a message from one intermediate node to another if the latter has higher probability of encountering the destination node. However, this process compromises the privacy of the nodes by revealing their mobility patterns. In this paper, the authors...

    Provided By CNRS

  • White Papers // Jun 2012

    A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model

    Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from the recipient user. A privacy preserving reputation protocol protects users by hiding their individual feedback and revealing only the reputation score. The authors present a privacy preserving reputation protocol for the malicious adversarial model....

    Provided By CNRS

  • White Papers // Jun 2012

    Implicit Tensor-Mass Solver on the GPU

    The realist and interactive simulation of deformable objects has become a challenge in computer graphics. For this, the tensor-mass model enables local solving of mechanical equations, making it easier to handle local control, like collisions, tool interaction, etc. In this paper, the authors propose the GPU implementation of this model...

    Provided By CNRS

  • White Papers // Dec 2012

    GIS Based Service Oriented Architecture Approach for Electric Distribution

    In this age of technological advancements, the electricity distribution operators continuously seek new and innovative ways to create differentiation and increase profits. The customers do not have to wait infinitely to get the service for which they pay, and are ready to switch to service providers who deliver faster. So...

    Provided By CNRS

  • White Papers // Jul 2012

    A Study of Microbial Flora and MRSA Harboured by Mobile Phones of Health Care Personnel

    Mobile phones are increasingly being used by health care workers in day today life. They come in contact with various surfaces while carrying out health care activities and are thus likely to get contaminated by variety of organisms. This paper was carried out to know the microbial flora harbored by...

    Provided By CNRS

  • White Papers // Jan 2013

    Predicting User Dissatisfaction With Internet Application Performance at End-Hosts

    The authors design predictors of user dissatisfaction with the performance of applications that use networking. Their approach combines user-level feedback with low level machine and networking metrics. The main challenges of predicting user dissatisfaction, that arises when networking conditions adversely affect applications, comes from the scarcity of user feedback and...

    Provided By CNRS

  • White Papers // Jan 2012

    Characterizing End-Host Application Performance Across Multiple Networking Environments

    Users today connect to the Internet everywhere - from home, work, airports, friend's homes, and more. This paper characterizes how the performance of networked applications varies across networking environments. Using data from a few dozen end-hosts, the authors compare the distributions of RTTs and download rates across pairs of environments....

    Provided By CNRS

  • White Papers // May 2011

    Joint Decoding of Multiple-Description Network-Coded Data

    This paper considers a transmission scheme combining Multiple Description Coding (MDC) and Network Coding (NC). The authors' aim is to benefit from the property of MDC to provide progressive quality improvement with the number of received packets and from the efficient use of network resources provided by NC. MDC is...

    Provided By CNRS

  • White Papers // Sep 2012

    Finite Dimensional Nested Lattices Based Wyner-Ziv Coding for Two-Way Relay Channel

    Two-Way Relay Channel (TWRC) models a cooperative communication situation performing duplex transmission via a relay station. For this channel, the authors have shown previously that a lattice-based physical layer network coding strategy achieves, at the limit of arbitrarily large dimension, the same rate as that offered by the random coding-based...

    Provided By CNRS

  • White Papers // Oct 2012

    Lattice-Based Wyner-Ziv Coding for Parallel Gaussian Two-Way Relay Channels

    Parallel two-way relay channel models a cooperative communication scenario where a relay helps two terminals to exchange their messages over independent Gaussian channels. For the single channel case, the authors have shown previously that lattice-based physical layer network coding achieves the same rate as compress-and-forward scheme with a random coding...

    Provided By CNRS

  • White Papers // Aug 2012

    Wyner-Ziv Lattice Coding for Two-Way Relay Channel

    A Two-Way Relay Channel (TWRC) in which duplex transmission between two users via a relay station is considered. A physical layer network coding strategy based on compress-and-forward relaying scheme for the TWRC is proposed. In the underlying coding strategy, the authors use nested lattices for Wyner-Ziv coding and decoding. The...

    Provided By CNRS

  • White Papers // Feb 2012

    Enabling Sleep Mode in Backbone IP-Networks: A Criticality-Driven Tradeoff

    The energy consumption of network devices, and, as a consequence, of communication networks, is generally independent from their level of utilization, which results in a waste of energy when the network is lightly loaded. Ideally the consumption of a network should be proportional to the amount of traffic it conveys....

    Provided By CNRS

  • White Papers // Jan 2013

    Optimal Design of Virtual Links in AFDX Networks

    The Avionics Full Duplex Switched Ethernet (AFDX) backbone constitutes one of the major technological breakthroughs in modern avionic architectures. This network is based on routing Ethernet frames through isolated data tunnels referred to as Virtual Links (VL). VLs can be thought of as multicast trees, each serving for data transmission...

    Provided By CNRS

  • White Papers // Feb 2013

    The Strength of Vicinity Annexation in Opportunistic Networking

    Most disruption-tolerant networking protocols available have focused on mere contact and inter-contact characteristics to make forwarding decisions. The authors propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. They investigate how the vicinity of a node evolves through time...

    Provided By CNRS

  • White Papers // Mar 2013

    Optimizing QoS InWireless Sensors Networks Using a Caching Platform

    This paper addresses monitoring and surveillance applications using Wireless Sensors Networks (WSNs). In this context, several remote clients are interested in receiving the information collected by the nodes of a WSN. As WSN devices are most of the time constrained in energy and processing, the authors present a caching architecture...

    Provided By CNRS

  • White Papers // Jan 2013

    A New Class of Hash-Chain Based Key Pre-Distribution Schemes for WSN

    In the last decade, the authors witness a proliferation of potential application domains of Wireless Sensor Networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity of the potential applications that are generally tightly related to the physical world...

    Provided By CNRS

  • White Papers // Oct 2012

    Efficient Compilation of .NET Programs for Embedded Systems

    Compiling under the Closed-World Assumption (CWA) has been shown to be an appropriate way for implementing object-oriented languages such as Java on low-end embedded systems. In this paper, the authors explore the implications of using whole program optimizations such as Rapid Type Analysis (RTA) and coloring on programs targeting the...

    Provided By CNRS

  • White Papers // Oct 2010

    Node Coloring and Color Conflict Detection in Wireless Sensor Networks

    In wireless sensor networks, energy efficiency is mainly achieved by making nodes sleep. In this paper, the authors present the combination of SERENA, a new node activity scheduling algorithm based on node coloring, with TDMA/CA, a collision avoidance MAC protocol. They show that the combination of these two protocols enables...

    Provided By CNRS

  • White Papers // Sep 2012

    A Packing Model to Estimate VANET Capacity

    In IEEE 802.11p VANET networks the transmission scheduling is distributed and asynchronous. The number of simultaneous transmitters is thus closely related to the CSMA/CA mechanism which limits the spatial reuse of the channel. The capacity is bounded by a constant C whatever the number of nodes and the type of...

    Provided By CNRS

  • White Papers // Jun 2013

    Blind Calibration in Compressed Sensing Using Message Passing Algorithms

    In this paper the authors study the so-called blind calibration, i.e. when the training signals that are available to perform the calibration are sparse but unknown. They extend the Approximate Message Passing (AMP) algorithm used in CS to the case of blind calibration. In the calibration-AMP, both the gains on...

    Provided By CNRS

  • White Papers // Jul 2010

    Fluctuations of the Mutual Information in Large Distributed Antenna Systems with Colored Noise

    In this paper, the authors explain the fluctuations of the mutual information of a class of Multiple-Input Multiple-Output (MIMO) channels with arbitrary correlated noise in the large system limit. Under the assumption that the channel dimensions grow infinitely large at the same rate, they find a deterministic approximation of the...

    Provided By CNRS

  • White Papers // Dec 2012

    Survey of Security Problems in Cloud Computing Virtual Machines

    Virtualization has become an attractive and widely used technology in today's computing. Indeed, the ability to share the resources of a single physical machine between several isolated Virtual Machines (VM) enabling a more optimized hardware utilization, as well as the easier management and migration of a virtual system compared to...

    Provided By CNRS

  • White Papers // Aug 2012

    Multi-Source Cooperative Communications Using Low-Density Parity-Check Product Codes

    In this paper, the authors investigate the performance of Low-Density Parity-Check (LDPC) product codes in a multisource relay network where multiple sources transmit data to a same destination with the help of a noisy relay. They consider an LDPC product code resulting from the concatenation of Multiple Serially Concatenated Multiple...

    Provided By CNRS

  • White Papers // May 2009

    Data Backup for Mobile Nodes : a Cooperative Middleware and Experimentation Platform

    Finding the right abstractions to design middleware for the provision of dependable distributed applications on mobile devices is still a big challenge. New technical and scientific challenges emerge due to the mobility of users and of their devices, or due to the massive scale of uncontrolled devices that constantly connect/disconnect,...

    Provided By CNRS

  • White Papers // Mar 2011

    A Secure Asynchronous FPGA Architecture, Experimental Results and Some Debug Feedback

    This paper presents an asynchronous FPGA architecture for implementing cryptographic algorithms secured against physical cryptanalysis. The authors discuss the suitability of asynchronous reconfigurable architectures for such applications before proceeding to model the side channel and defining the objectives. The logic block architecture is presented in detail. They discuss several solutions...

    Provided By CNRS

  • White Papers // Jan 2011

    Automated Security Proofs With Sequences of Games

    This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic protocols were up to now reserved to the Dolev-Yao model, which however makes quite strong assumptions on the primitives. On the other hand, with the...

    Provided By CNRS

  • White Papers // Jan 2010

    Research Report : Collaborative Peer 2 Peer Edition: Avoiding Conflicts Is Better Than Solving Conflicts

    Collaborative edition is achieved by distinct sites that work independently on (a copy of) a shared document. Conflicts may arise during this process and must be solved by the collaborative editor. In pure Peer to Peer collaborative editing, no centralization nor locks nor time-stamps are used which make conflict resolution...

    Provided By CNRS

  • White Papers // Aug 2009

    Toward a Gigabit Wireless Communications System

    This paper presented the design and the implementation of a 60 GHz communication system for WPAN applications in point-to-point or point-to-multipoint configurations. The proposed system provides a good trade-off between performance and complexity. An original method used for the byte and frame synchronization is also described. This method allows a...

    Provided By CNRS

  • White Papers // Jun 2011

    Market Efficiency, Anticipation And The Formation Of Bubbles-crashes

    A dynamical model is introduced for the formation of bullish or bearish trends driving an asset price in a given market. Initially, each agent decides to buy or sell according to its personal opinion, which results from the combination of its own private information, the public information and its own...

    Provided By CNRS

  • White Papers // Dec 2009

    Capital Budgeting Under Relational Contracting: Optimal Ranking And Duration Criteria For Schemes Of Concession, Project-financing And Public-private Partnership

    Project-financing and public-private partnership schemes are joint projects of investment that are generally submitted to investment valuation criteria based on compound discounting. However, the theoretical basis of these criteria is at issue nowadays. According to recent studies on relational contracting economics and behavioral finance, joint projects of investment can be...

    Provided By CNRS

  • White Papers // Nov 2009

    Estimating Maximum and Minimum Delays for Wireless Discrete Networked Control Systems

    The automation architecture consists of actuators, sensors, Programmable Logic Controllers (PLC) and monitoring systems. Some research focuses on how to replace the communication between those entities from wired to wireless communication taking in consideration the industrial constraints, given the advantages of this kind of communication. To study the performance of...

    Provided By CNRS

  • White Papers // Apr 2011

    Data Collection and Management Solution for Wireless Sensor Networks

    Wireless Sensors Networks (WSN) use can be very interesting in agricultural and environmental data collection. The first WSN generations operated in a continuous data stream mode which generates high energy consumption. This paper presents a new WSN platform that limits data exchanges and has an increased lifetime. All of its...

    Provided By CNRS

  • White Papers // Oct 2010

    Advanced List Scheduling Heuristic for Task Scheduling With Communication Contention for Parallel Embedded Systems

    Modern embedded systems tend to use multiple cores or processors for processing parallel applications. This paper indeed aims at task scheduling with communication contention for parallel embedded systems and proposes three advanced techniques to improve the list scheduling heuristic. Five groups of node levels (two existing groups and three new...

    Provided By CNRS

  • White Papers // Jun 2010

    Simulation of Active Products Cooperation for Active Security Management

    Wireless Sensor Networks (WSNs) are a new paradigm of telecommunication networks. WSNs are designed to perform efficient data collection and environment monitoring, among other applications. This paper presents an approach of modelling and simulation of cooperation between active products that are equipped with a platform of sensor networks and ambient...

    Provided By CNRS

  • White Papers // Sep 2009

    JPEG2000-Based Data Hiding and Its Application to 3D Visualization

    This first decade of twenty-first century is witnessing revolution in the form of memory and network speeds as well as computing efficiencies. Simultaneously, the platform and client diversity base is also expanding, with powerful workstations on one extreme and handheld portable device, like smart-phones on the other. The range of...

    Provided By CNRS

  • White Papers // Apr 2010

    Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks

    The Internet user nowadays is no longer the same one as decades ago. Recent unprecedented growth of the mobile technology market, devices support for more than one of a myriad of technologies and operators, and the need to communicate from anywhere and at any time are the challenges of nowadays...

    Provided By CNRS

  • White Papers // May 2009

    HERO: Hierarchical Key Management Protocol for Heterogeneous Wireless Sensor Networks

    Early researches focused on the security of homogenous sensor networks. However, recent works have demonstrated that the presence of heterogeneous sensor nodes gives better performance than homogenous ones in terms of energy consumptions, storage overhead, and network connectivity. In this paper, the authors propose a hierarchical key management scheme named...

    Provided By CNRS

  • White Papers // Jan 2009

    PLATINE: DVB-S2/RCS Enhanced Testbed for Next Generation Satellite Networks

    Emulation is a cost effective and efficient tool to perform performances evaluation and innovative access and network techniques validation. Its ability to interconnect real equipments with real applications provides excellent demonstrations means. The main problem is to overcome the emulation weakness which is the accuracy of the model reproducing the...

    Provided By CNRS