Fudan University

Displaying 1-24 of 24 results

  • White Papers // Jan 2014

    Mercury: Combining Performance with Dependability Using Self-virtualization

    There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with some performance degradation, uncertain QoS and loss of functionalities. Meanwhile, many virtualization enabled features such as online maintenance and fault tolerance do not...

    Provided By Fudan University

  • White Papers // Feb 2013

    Privacy-Preserving Smart Metering with Regional Statistics and Personal Enquiry Services

    In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, the authors propose a new cryptographic-based solution for the privacy issue...

    Provided By Fudan University

  • White Papers // Jan 2013

    Cooperative Pipelined Regeneration in Distributed Storage Systems

    In distributed storage systems, a substantial volume of data is stored in a distributed fashion, across a large number of storage nodes. To maintain data integrity, when existing storage nodes fail, lost data are regenerated at replacement nodes. Regenerating multiple data losses in batches can reduce the consumption of bandwidth....

    Provided By Fudan University

  • White Papers // Jan 2013

    A Graph Minor Perspective to Network Coding: Connecting Algebraic Coding With Network Topologies

    Network Coding encourages information coding across a communication network. While the necessity, benefit and complexity of network coding are sensitive to the underlying graph structure of a network, existing theory on network coding often treats the network topology as a black box, focusing on algebraic or information theoretic aspects of...

    Provided By Fudan University

  • White Papers // Mar 2012

    Min-Cost Multicast Networks in Euclidean Space

    Space information flow is a new field of research recently proposed by Li and Wu,. It studies the transmission of information in a geometric space, where information flows can be routed along any trajectories, and can be encoded wherever they meet. The goal is to satisfy given end-to-end unicast/multicast throughput...

    Provided By Fudan University

  • White Papers // Feb 2012

    Risk Management Model of Information Security in IC Manufacturing Industry

    Information system has become the indispensable support platform required by daily operations in modern enterprises. IC manufacturing industry is the most important base of advanced information products. Its rich knowledge innovation, complex production process, and high degree of cooperation require particular risk management on information security. On the basis of...

    Provided By Fudan University

  • White Papers // Jan 2012

    Context-Aware Search for Personal Information Management Systems

    With the fast growth of disk capacity in personal computers, keyword search over personal data (a.k.a. desktop search) is becoming increasingly important. Nonetheless, desktop search has been shown to be more challenging than traditional Web search. Modern commercial Web search engines heavily rely on structural information (i.e., hyperlinks between Web...

    Provided By Fudan University

  • White Papers // Nov 2011

    Counting Spanning Trees in Self-Similar Networks by Evaluating Determinants

    Spanning trees are relevant to various aspects of networks. Generally, the number of spanning trees in a network can be obtained by computing a related determinant of the Laplacian matrix of the network. However, for a large generic network, evaluating the relevant determinant is computationally intractable. In this paper, the...

    Provided By Fudan University

  • White Papers // Sep 2011

    Cloudvisor: Retrofitting Protection of Virtual Machines in Multi-Tenant Cloud with Nested Virtualization

    Multi-tenant cloud, which usually leases resources in the form of virtual machines, has been commercially available for years. Unfortunately, with the adoption of commodity virtualized infrastructures, software stacks in typical multi-tenant clouds are non-trivially large and complex, and thus are prone to compromise or abuse from adversaries including the cloud...

    Provided By Fudan University

  • White Papers // Apr 2011

    ORDER: Object CentRic DEterministic Replay for Java

    Deterministic replay systems, which record and replay non-deterministic events during program execution, have many applications such as bug diagnosis, intrusion analysis and fault tolerance. It is well understood how to replay native (e.g., C) programs on multi-processors, while there is little work for concurrent java applications on multicore. State-of-the-art work...

    Provided By Fudan University

  • White Papers // Jan 2011

    Semi-Automatic Video Content Annotation

    Video modeling and annotating are indispensable operations necessary for creating and populating a video database. To annotate video data effectively and accurately, a video content description ontology is first proposed in this paper, the authors then introduce a semi-automatic annotation strategy which utilizes various video processing techniques to help the...

    Provided By Fudan University

  • White Papers // Apr 2010

    Limits on Revocation in VANETs

    The authors examine the limitations on revocation approaches in VANETs, including local revocation and global revocation. Local revocation schemes often use a local vote to identify and revoke an attacker. However, such votes often require that not only a majority of local nodes are honest, but that they also are...

    Provided By Fudan University

  • White Papers // Feb 2010

    Knowledge Management in Multi-Party IS Development Teams - A Case Study at Fudan University

    In this paper, the authors describe how a unique type of information system development team, deploying a computer-mediated collaborative technology, developed a highly complex information system. The uniqueness of the team, what they call MISD teams, (Multi-Party Information System Development teams) was derived from the fact that they were inter-organizational...

    Provided By Fudan University

  • White Papers // Feb 2010

    End-to-End Throughput With Cooperative Communication in Multi-Channel Wireless Networks

    Although cooperative communication has been proposed at the physical layer to address multi-path fading effects, how physical layer gains with cooperative communication can translate to tangible performance benefits in end-to-end flows remains to be an open problem. This paper represents one step forward towards a deeper understanding of the interplay...

    Provided By Fudan University

  • White Papers // Dec 2009

    Tree-Structured Data Regeneration in Distributed Storage Systems With Regenerating Codes

    Distributed storage systems provide large-scale reliable data storage by storing a certain degree of redundancy in a decentralized fashion on a group of storage nodes. To recover from data losses due to the instability of these nodes, whenever a node leaves the system, additional redundancy should be regenerated to compensate...

    Provided By Fudan University

  • White Papers // May 2009

    Tree-Structured Data Regeneration With Network Coding in Distributed Storage Systems

    Distributed storage systems, built on peer-to-peer networks, can provide large-scale data storage and high data reliability by redundant schemes, such as replica, erasure codes and linear network coding. Redundant data may get lost due to the instability of distributed systems, such as permanent node departures, hardware failures, and accidental deletions....

    Provided By Fudan University

  • White Papers // Apr 2009

    Corey: An Operating System for Many Cores

    Multiprocessor application performance can be limited by the operating system when the application uses the operating system frequently and the operating system services use data structures shared and modified by multiple processing cores. If the application does not need the sharing, then the operating system will become an unnecessary bottleneck...

    Provided By Fudan University

  • White Papers // Jan 2009

    Analytical Evaluation of Retransmission Schemes in Wireless Sensor Networks

    Retransmission has been adopted as one of the most popular schemes for improving transmission reliability in wireless sensor networks. Many previous works have been done on reliable transmission issues in experimental ways, however, there is still a lack of analytical techniques to evaluate these solutions. Based on the traffic model,...

    Provided By Fudan University

  • White Papers // Sep 2008

    A QoS-Based Self-Adaptive Scheduling Algorithm for Real-Time Tasks on Heterogeneous Clusters

    Nowadays, providing Quality of Service (QoS) guarantees for some applications such as signal data processing has become a critical issue. In this paper, the authors propose a novel QoS-based self-adaptive scheduling algorithm called QBSA that sufficiently considers the adaptability for real-time tasks with QoS demands on heterogeneous clusters. When the...

    Provided By Fudan University

  • White Papers // Aug 2008

    Analysis of Traffic Splitting Mechanisms for 2D Mesh Sensor Networks

    For many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations within delay bounds and the buffer size of each sensor node is as small as possible. In this paper, the authors firstly introduce the system model of a mesh sensor network. Based...

    Provided By Fudan University

  • White Papers // Jun 2008

    Heterogeneous Live Migration of Virtual Machines

    An indispensable feature enabled by system virtualization is the live migration of Virtual Machines (VMs). By dynamically relocating an entire execution environment including the operating system from one machine to another, a networked system such as data-center and computing grid can benefit from load balancing, online maintenance and fault tolerance....

    Provided By Fudan University

  • White Papers // Sep 2007

    Efficient Algorithms for Node Disjoint Subgraph Homeomorphism Determination

    Recently, great efforts have been dedicated to researches on the management of large scale graph based data such as WWW, social networks, biological networks. In the study of graph based data management, node disjoint sub-graph homeomorphism relation between graphs is more suitable than (sub) graph isomorphism in many cases, especially...

    Provided By Fudan University

  • White Papers // Aug 2007

    VMM-based Process Shepherding

    Processes in commodity operating systems are \"Wild\" in nature: they are usually granted with excessive privileges, yet can be easily compromised and abused. Unfortunately, since commodity operating systems are big, complex, thus inherently untrusted, monitoring process behaviors within them is inherently insecure and could be circumvented or tampered. In this...

    Provided By Fudan University

  • White Papers // Aug 2007

    Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor

    Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, the authors propose an approach that requires only minimal changes...

    Provided By Fudan University

  • White Papers // Jan 2013

    A Graph Minor Perspective to Network Coding: Connecting Algebraic Coding With Network Topologies

    Network Coding encourages information coding across a communication network. While the necessity, benefit and complexity of network coding are sensitive to the underlying graph structure of a network, existing theory on network coding often treats the network topology as a black box, focusing on algebraic or information theoretic aspects of...

    Provided By Fudan University

  • White Papers // Mar 2012

    Min-Cost Multicast Networks in Euclidean Space

    Space information flow is a new field of research recently proposed by Li and Wu,. It studies the transmission of information in a geometric space, where information flows can be routed along any trajectories, and can be encoded wherever they meet. The goal is to satisfy given end-to-end unicast/multicast throughput...

    Provided By Fudan University

  • White Papers // Jan 2013

    Cooperative Pipelined Regeneration in Distributed Storage Systems

    In distributed storage systems, a substantial volume of data is stored in a distributed fashion, across a large number of storage nodes. To maintain data integrity, when existing storage nodes fail, lost data are regenerated at replacement nodes. Regenerating multiple data losses in batches can reduce the consumption of bandwidth....

    Provided By Fudan University

  • White Papers // Sep 2011

    Cloudvisor: Retrofitting Protection of Virtual Machines in Multi-Tenant Cloud with Nested Virtualization

    Multi-tenant cloud, which usually leases resources in the form of virtual machines, has been commercially available for years. Unfortunately, with the adoption of commodity virtualized infrastructures, software stacks in typical multi-tenant clouds are non-trivially large and complex, and thus are prone to compromise or abuse from adversaries including the cloud...

    Provided By Fudan University

  • White Papers // Feb 2010

    Knowledge Management in Multi-Party IS Development Teams - A Case Study at Fudan University

    In this paper, the authors describe how a unique type of information system development team, deploying a computer-mediated collaborative technology, developed a highly complex information system. The uniqueness of the team, what they call MISD teams, (Multi-Party Information System Development teams) was derived from the fact that they were inter-organizational...

    Provided By Fudan University

  • White Papers // Sep 2007

    Efficient Algorithms for Node Disjoint Subgraph Homeomorphism Determination

    Recently, great efforts have been dedicated to researches on the management of large scale graph based data such as WWW, social networks, biological networks. In the study of graph based data management, node disjoint sub-graph homeomorphism relation between graphs is more suitable than (sub) graph isomorphism in many cases, especially...

    Provided By Fudan University

  • White Papers // Feb 2012

    Risk Management Model of Information Security in IC Manufacturing Industry

    Information system has become the indispensable support platform required by daily operations in modern enterprises. IC manufacturing industry is the most important base of advanced information products. Its rich knowledge innovation, complex production process, and high degree of cooperation require particular risk management on information security. On the basis of...

    Provided By Fudan University

  • White Papers // Feb 2013

    Privacy-Preserving Smart Metering with Regional Statistics and Personal Enquiry Services

    In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, the authors propose a new cryptographic-based solution for the privacy issue...

    Provided By Fudan University

  • White Papers // Jun 2008

    Heterogeneous Live Migration of Virtual Machines

    An indispensable feature enabled by system virtualization is the live migration of Virtual Machines (VMs). By dynamically relocating an entire execution environment including the operating system from one machine to another, a networked system such as data-center and computing grid can benefit from load balancing, online maintenance and fault tolerance....

    Provided By Fudan University

  • White Papers // Aug 2007

    VMM-based Process Shepherding

    Processes in commodity operating systems are \"Wild\" in nature: they are usually granted with excessive privileges, yet can be easily compromised and abused. Unfortunately, since commodity operating systems are big, complex, thus inherently untrusted, monitoring process behaviors within them is inherently insecure and could be circumvented or tampered. In this...

    Provided By Fudan University

  • White Papers // Aug 2007

    Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor

    Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, the authors propose an approach that requires only minimal changes...

    Provided By Fudan University

  • White Papers // Jan 2014

    Mercury: Combining Performance with Dependability Using Self-virtualization

    There has recently been increasing interests in using system virtualization to improve the dependability of HPC cluster systems. However, it is not cost-free and may come with some performance degradation, uncertain QoS and loss of functionalities. Meanwhile, many virtualization enabled features such as online maintenance and fault tolerance do not...

    Provided By Fudan University

  • White Papers // Jan 2011

    Semi-Automatic Video Content Annotation

    Video modeling and annotating are indispensable operations necessary for creating and populating a video database. To annotate video data effectively and accurately, a video content description ontology is first proposed in this paper, the authors then introduce a semi-automatic annotation strategy which utilizes various video processing techniques to help the...

    Provided By Fudan University

  • White Papers // May 2009

    Tree-Structured Data Regeneration With Network Coding in Distributed Storage Systems

    Distributed storage systems, built on peer-to-peer networks, can provide large-scale data storage and high data reliability by redundant schemes, such as replica, erasure codes and linear network coding. Redundant data may get lost due to the instability of distributed systems, such as permanent node departures, hardware failures, and accidental deletions....

    Provided By Fudan University

  • White Papers // Dec 2009

    Tree-Structured Data Regeneration in Distributed Storage Systems With Regenerating Codes

    Distributed storage systems provide large-scale reliable data storage by storing a certain degree of redundancy in a decentralized fashion on a group of storage nodes. To recover from data losses due to the instability of these nodes, whenever a node leaves the system, additional redundancy should be regenerated to compensate...

    Provided By Fudan University

  • White Papers // Apr 2009

    Corey: An Operating System for Many Cores

    Multiprocessor application performance can be limited by the operating system when the application uses the operating system frequently and the operating system services use data structures shared and modified by multiple processing cores. If the application does not need the sharing, then the operating system will become an unnecessary bottleneck...

    Provided By Fudan University

  • White Papers // Jan 2009

    Analytical Evaluation of Retransmission Schemes in Wireless Sensor Networks

    Retransmission has been adopted as one of the most popular schemes for improving transmission reliability in wireless sensor networks. Many previous works have been done on reliable transmission issues in experimental ways, however, there is still a lack of analytical techniques to evaluate these solutions. Based on the traffic model,...

    Provided By Fudan University

  • White Papers // Feb 2010

    End-to-End Throughput With Cooperative Communication in Multi-Channel Wireless Networks

    Although cooperative communication has been proposed at the physical layer to address multi-path fading effects, how physical layer gains with cooperative communication can translate to tangible performance benefits in end-to-end flows remains to be an open problem. This paper represents one step forward towards a deeper understanding of the interplay...

    Provided By Fudan University

  • White Papers // Apr 2010

    Limits on Revocation in VANETs

    The authors examine the limitations on revocation approaches in VANETs, including local revocation and global revocation. Local revocation schemes often use a local vote to identify and revoke an attacker. However, such votes often require that not only a majority of local nodes are honest, but that they also are...

    Provided By Fudan University

  • White Papers // Apr 2011

    ORDER: Object CentRic DEterministic Replay for Java

    Deterministic replay systems, which record and replay non-deterministic events during program execution, have many applications such as bug diagnosis, intrusion analysis and fault tolerance. It is well understood how to replay native (e.g., C) programs on multi-processors, while there is little work for concurrent java applications on multicore. State-of-the-art work...

    Provided By Fudan University

  • White Papers // Nov 2011

    Counting Spanning Trees in Self-Similar Networks by Evaluating Determinants

    Spanning trees are relevant to various aspects of networks. Generally, the number of spanning trees in a network can be obtained by computing a related determinant of the Laplacian matrix of the network. However, for a large generic network, evaluating the relevant determinant is computationally intractable. In this paper, the...

    Provided By Fudan University

  • White Papers // Aug 2008

    Analysis of Traffic Splitting Mechanisms for 2D Mesh Sensor Networks

    For many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations within delay bounds and the buffer size of each sensor node is as small as possible. In this paper, the authors firstly introduce the system model of a mesh sensor network. Based...

    Provided By Fudan University

  • White Papers // Jan 2012

    Context-Aware Search for Personal Information Management Systems

    With the fast growth of disk capacity in personal computers, keyword search over personal data (a.k.a. desktop search) is becoming increasingly important. Nonetheless, desktop search has been shown to be more challenging than traditional Web search. Modern commercial Web search engines heavily rely on structural information (i.e., hyperlinks between Web...

    Provided By Fudan University

  • White Papers // Sep 2008

    A QoS-Based Self-Adaptive Scheduling Algorithm for Real-Time Tasks on Heterogeneous Clusters

    Nowadays, providing Quality of Service (QoS) guarantees for some applications such as signal data processing has become a critical issue. In this paper, the authors propose a novel QoS-based self-adaptive scheduling algorithm called QBSA that sufficiently considers the adaptability for real-time tasks with QoS demands on heterogeneous clusters. When the...

    Provided By Fudan University