Hong Kong Polytechnic University

Displaying 1-28 of 28 results

  • White Papers // Jul 2013

    Bellini: Ferrying Application Traffic Flows Through Geo-Distributed Datacenters in the Cloud

    Thanks to the \"On-demand\" nature of cloud computing, a large number of applications have been recently migrated to the cloud. To take full advantage of superior connectivities between geo-distributed datacenters, application traffic can be \"Ferried\" through the cloud to provide better service and user experience. However, implementing and deploying such...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2013

    Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

    As an increasing number of Infrastructure-as-a-Service (IaaS) cloud providers start to provide cloud computing services, they form a competition market to compete for users of these services. Due to different resource capacities and service workloads, users may observe different finishing times for their cloud computing tasks and experience different levels...

    Provided By Hong Kong Polytechnic University

  • White Papers // Apr 2013

    Performance Simulation and Analysis for LTE System Using Human Behavior Queue Model

    Understanding the nature of traffic has been a key concern of the researchers particularly over the last two decades and it has been noticed through extensive high quality studies that traffic found in different kinds of IP/wireless IP networks is human operators. Despite the recent findings of real time human...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2013

    NEST: Locality-Aware Approximate Query Service for Cloud Computing

    Cloud computing applications face the challenges of dealing with a huge volume of data that needs the support of fast approximate queries to enhance system scalability and improve quality of service, especially when users are not aware of exact query inputs. Locality-Sensitive Hashing (LSH) can support the approximate queries that...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Simultaneous Information-and-Power Transfer for Broadband Downlink Systems

    Far-field wireless recharging based on Microwave Power Transfer (MPT) will free mobile devices from interruption due to finite battery lives. Integrating MPT with wireless communications to support Simultaneous Information-and-Power Transfer (SIPT) allows the same spectrum to be used for dual purposes without compromising the quality of service. In this paper,...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Group Aware Cooperative Routing for Opportunistic Networks Under Resource Constraints

    Opportunistic networks are a new evolution of mobile ad hoc networks composed of intermittently connected nodes, in which the routing for the dynamic topology is a challenging issue. In opportunistic networks, the mobile nodes with common interest or close relationship may form into groups and move together, which brings them...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Clique Partition Based Relay Placement in WiMAX Mesh Networks

    In WiMAX mesh networks based on IEEE 802.16j, when transmission power of the Base Station (BS) and the number of radios and channels are settled, data rate at the SubScriber (SS) is decided by the distance between the SS and its uplink Relay Station (RS). In this paper, the authors...

    Provided By Hong Kong Polytechnic University

  • White Papers // Oct 2012

    Complete and Fast Unknown Tag Identification in Large RFID Systems

    The RFID technology greatly improves efficiency of many applications including inventory control, object tracking, and supply chain management. In such applications, it is common that new objects are added into the system or existing objects are misplaced in wrong regions. When this happens, fast and complete identification of such tags...

    Provided By Hong Kong Polytechnic University

  • White Papers // Aug 2012

    ML2S: Minimum Length Link Scheduling Under Physical Interference Model

    The authors study a fundamental problem called Minimum Length Link Scheduling (ML2S) which is crucial to the efficient operations of wireless networks. Given a set of communication links of arbitrary length spread and assume each link has one unit of traffic demand in wireless networks, the problem ML2S seeks a...

    Provided By Hong Kong Polytechnic University

  • White Papers // May 2012

    A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing

    The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: extending the access to cloud services to mobile devices; enabling mobile devices to work collaboratively as cloud resource providers; augmenting the execution of...

    Provided By Hong Kong Polytechnic University

  • White Papers // Apr 2011

    Robust Sparse Coding for Face Recognition

    As a powerful tool for statistical signal modeling, sparse representation (or sparse coding) has been successfully used in image processing applications, and recently has led to promising results in face recognition and texture classification. Based on the findings that natural images can be generally coded by structural primitives (e.g., edges...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    Data Aggregation Scheduling in Uncoordinated Duty-Cycled Wireless Sensor Networks Under Protocol Interference Model

    Data aggregation is a critical and widely-used operation in Wireless Sensor Networks (WSNs). Data Aggregation Scheduling (DAS) aims to find an interference-free scheduling for data aggregation with the minimum latency. Most existing algorithms for the DAS problem, unfortunately, assume that nodes are always active, and hence are not suitable for...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    Orientation-Based Wi-Fi Positioning on the Google Nexus One

    While localization systems for indoor areas using the existing Wireless Local Area Network (WLAN) infrastructure have recently been proposed, wireless LAN localization approaches suffer from a number of significant drawbacks. To begin with, there is inaccurate position tracking due to the orientation of the mobile device and signal fluctuation. In...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    A Novel Secure Localization Approach in Wireless Sensor Networks

    Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor networks under the non-adversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied performance under the adversarial scenario. In this...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2010

    When Transportation Meets Communication: V2P Over VANETs

    Information interaction is a crucial part of modern transportation activities. In this paper, the authors propose the idea of Vehicle-To-Passenger communication (V2P), which allows direct, instant, and flexible communication between moving vehicles and roadside passengers. With pocket wireless devices, passengers can easily join VANETs as roadside nodes, and express their...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2010

    A Motion Tendency-Based Adaptive Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks

    The Delay Tolerant Mobile Sensor Network (DTMSN) is a new type of sensor network for pervasive information gathering. Although similar to conventional sensor networks in hardware components, DTMSN owns some unique characteristics such as sensor mobility, intermittent connectivity, etc. Therefore, traditional data gathering methods cannot be applied to DTMSN. In...

    Provided By Hong Kong Polytechnic University

  • White Papers // Aug 2009

    A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)

    The prevalence of multimedia data makes its security become more and more important. However, traditional cryptosystems can not protect multimedia data efficiently due to the big differences between texts and multimedia data, such as the bulky sizes and strong correlation between neighboring elements of uncompressed multimedia data. In addition, multimedia...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Breaking a Chaotic Cryptographic Scheme Based on Composition Maps

    The development of information technology makes the transmission of digital data is carried out more and more frequently over all kinds of channels. Meanwhile, the security of digital data become more and more important. So, the demand of secure and fast encryption schemes become urgent. Due to the subtle similarities...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Fuzzy Topographic Modeling in Wireless Signal Tracking Analysis

    Fuzzy logic modelling can be applied to evaluate the behaviour of Wireless Local Area Networks (WLAN) Received Signal Strength (RSS). The behavior study of WLAN signal strength is a pivotal part of WLAN tracking analysis. Previous analytical model has not been addressed effectively for analyzing how the WLAN infrastructure affected...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Breaking a New Substitution-Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps

    With the rapid development of information technology, multimedia data are transmitted over all kinds of wired/wireless networks more and more frequently. Consequently, the security of multimedia data becomes a serious concern of many people. However, the traditional text encryption schemes can not be used in a naive way to protect...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2009

    Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing

    In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be a most disjoint path from the...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2009

    Efficient Event Delivery in Publish/Subscribe Systems for Wireless Mesh Networks

    Publish/Subscribe (Pub/Sub) systems have been widely used in distributed computing systems for event notification and delivery. However, there is no existing work on Pub/Sub systems for Wireless Mesh Networks (WMNs) which are regarded as a promising infrastructure for providing wireless Internet services to a wide area. In this paper, the...

    Provided By Hong Kong Polytechnic University

  • White Papers // Feb 2009

    Mobile Commerce Integrated With RFID Technology in a Container Depot

    This paper presents the findings of a case study on the development of a Radio Frequency Identification (RFID) prototype system that is integrated with mobile commerce (m-commerce) in a container depot. A system architecture capable of integrating mobile commerce and RFID applications is proposed. The system architecture is examined and...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    Detecting Pulsing Denial-of-Service Attacks With Nondeterministic Attack Intervals

    This paper addresses the important problem of detecting Pulsing Denial of Service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, one considers a very broad class of attacks. In particular, the attack model admits...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    The Governance Role Of Institutional Investors In Corporate Investments: Evidence From Real Estate Investment Trusts

    This paper examines corporate governance provided by different types of institutional investors on REIT investment decisions and its impact on firm performance. First, the authors find that property-type Q (firm-specific stock valuation) positively affects REIT investment decisions and such effect is materially influenced by institutional ownerships. Second, they expand Hartzell,...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    An Energy-Aware Routing Protocol in Wireless Sensor Networks

    The most important issue that must be solved in designing a data gathering algorithm for Wireless Sensor Networks (WSNS) is how to save sensor node energy while meeting the needs of applications/users. This paper proposes a novel Energy-Aware routing Protocol (EAP) for a long-lived sensor network. EAP achieves a good...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2008

    Intellectual Property Rights, Technology Transfer And Exports In Developing Countries

    The authors develop a model to analyze one mechanism under which stronger Intellectual Property Rights (IPR) protection may improve the ability of firms in developing countries to break into export markets. A Northern firm with a superior process technology chooses either exports or technology transfer through licensing as its mode...

    Provided By Hong Kong Polytechnic University

  • White Papers // Oct 2008

    Wireless Sensor Networks for Resources Tracking at Building Construction Sites

    This paper evaluates the technical feasibility of applying emerging wireless network technologies for resources tracking at building construction sites. They first identify practical constraints in solving resource-tracking problems in an enclosed or partially covered environment. They then compare pros and cons of available localization principles and examine the latest wireless...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Group Aware Cooperative Routing for Opportunistic Networks Under Resource Constraints

    Opportunistic networks are a new evolution of mobile ad hoc networks composed of intermittently connected nodes, in which the routing for the dynamic topology is a challenging issue. In opportunistic networks, the mobile nodes with common interest or close relationship may form into groups and move together, which brings them...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Clique Partition Based Relay Placement in WiMAX Mesh Networks

    In WiMAX mesh networks based on IEEE 802.16j, when transmission power of the Base Station (BS) and the number of radios and channels are settled, data rate at the SubScriber (SS) is decided by the distance between the SS and its uplink Relay Station (RS). In this paper, the authors...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2010

    A Motion Tendency-Based Adaptive Data Delivery Scheme for Delay Tolerant Mobile Sensor Networks

    The Delay Tolerant Mobile Sensor Network (DTMSN) is a new type of sensor network for pervasive information gathering. Although similar to conventional sensor networks in hardware components, DTMSN owns some unique characteristics such as sensor mobility, intermittent connectivity, etc. Therefore, traditional data gathering methods cannot be applied to DTMSN. In...

    Provided By Hong Kong Polytechnic University

  • White Papers // May 2012

    A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing

    The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: extending the access to cloud services to mobile devices; enabling mobile devices to work collaboratively as cloud resource providers; augmenting the execution of...

    Provided By Hong Kong Polytechnic University

  • White Papers // Apr 2013

    Performance Simulation and Analysis for LTE System Using Human Behavior Queue Model

    Understanding the nature of traffic has been a key concern of the researchers particularly over the last two decades and it has been noticed through extensive high quality studies that traffic found in different kinds of IP/wireless IP networks is human operators. Despite the recent findings of real time human...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2009

    Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing

    In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be a most disjoint path from the...

    Provided By Hong Kong Polytechnic University

  • White Papers // Oct 2008

    Wireless Sensor Networks for Resources Tracking at Building Construction Sites

    This paper evaluates the technical feasibility of applying emerging wireless network technologies for resources tracking at building construction sites. They first identify practical constraints in solving resource-tracking problems in an enclosed or partially covered environment. They then compare pros and cons of available localization principles and examine the latest wireless...

    Provided By Hong Kong Polytechnic University

  • White Papers // Feb 2009

    Mobile Commerce Integrated With RFID Technology in a Container Depot

    This paper presents the findings of a case study on the development of a Radio Frequency Identification (RFID) prototype system that is integrated with mobile commerce (m-commerce) in a container depot. A system architecture capable of integrating mobile commerce and RFID applications is proposed. The system architecture is examined and...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    Detecting Pulsing Denial-of-Service Attacks With Nondeterministic Attack Intervals

    This paper addresses the important problem of detecting Pulsing Denial of Service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, one considers a very broad class of attacks. In particular, the attack model admits...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    An Energy-Aware Routing Protocol in Wireless Sensor Networks

    The most important issue that must be solved in designing a data gathering algorithm for Wireless Sensor Networks (WSNS) is how to save sensor node energy while meeting the needs of applications/users. This paper proposes a novel Energy-Aware routing Protocol (EAP) for a long-lived sensor network. EAP achieves a good...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Breaking a New Substitution-Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps

    With the rapid development of information technology, multimedia data are transmitted over all kinds of wired/wireless networks more and more frequently. Consequently, the security of multimedia data becomes a serious concern of many people. However, the traditional text encryption schemes can not be used in a naive way to protect...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Breaking a Chaotic Cryptographic Scheme Based on Composition Maps

    The development of information technology makes the transmission of digital data is carried out more and more frequently over all kinds of channels. Meanwhile, the security of digital data become more and more important. So, the demand of secure and fast encryption schemes become urgent. Due to the subtle similarities...

    Provided By Hong Kong Polytechnic University

  • White Papers // Aug 2009

    A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)

    The prevalence of multimedia data makes its security become more and more important. However, traditional cryptosystems can not protect multimedia data efficiently due to the big differences between texts and multimedia data, such as the bulky sizes and strong correlation between neighboring elements of uncompressed multimedia data. In addition, multimedia...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2008

    Intellectual Property Rights, Technology Transfer And Exports In Developing Countries

    The authors develop a model to analyze one mechanism under which stronger Intellectual Property Rights (IPR) protection may improve the ability of firms in developing countries to break into export markets. A Northern firm with a superior process technology chooses either exports or technology transfer through licensing as its mode...

    Provided By Hong Kong Polytechnic University

  • White Papers // Apr 2011

    Robust Sparse Coding for Face Recognition

    As a powerful tool for statistical signal modeling, sparse representation (or sparse coding) has been successfully used in image processing applications, and recently has led to promising results in face recognition and texture classification. Based on the findings that natural images can be generally coded by structural primitives (e.g., edges...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2009

    The Governance Role Of Institutional Investors In Corporate Investments: Evidence From Real Estate Investment Trusts

    This paper examines corporate governance provided by different types of institutional investors on REIT investment decisions and its impact on firm performance. First, the authors find that property-type Q (firm-specific stock valuation) positively affects REIT investment decisions and such effect is materially influenced by institutional ownerships. Second, they expand Hartzell,...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    Data Aggregation Scheduling in Uncoordinated Duty-Cycled Wireless Sensor Networks Under Protocol Interference Model

    Data aggregation is a critical and widely-used operation in Wireless Sensor Networks (WSNs). Data Aggregation Scheduling (DAS) aims to find an interference-free scheduling for data aggregation with the minimum latency. Most existing algorithms for the DAS problem, unfortunately, assume that nodes are always active, and hence are not suitable for...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    A Novel Secure Localization Approach in Wireless Sensor Networks

    Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor networks under the non-adversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied performance under the adversarial scenario. In this...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2010

    When Transportation Meets Communication: V2P Over VANETs

    Information interaction is a crucial part of modern transportation activities. In this paper, the authors propose the idea of Vehicle-To-Passenger communication (V2P), which allows direct, instant, and flexible communication between moving vehicles and roadside passengers. With pocket wireless devices, passengers can easily join VANETs as roadside nodes, and express their...

    Provided By Hong Kong Polytechnic University

  • White Papers // Mar 2009

    Efficient Event Delivery in Publish/Subscribe Systems for Wireless Mesh Networks

    Publish/Subscribe (Pub/Sub) systems have been widely used in distributed computing systems for event notification and delivery. However, there is no existing work on Pub/Sub systems for Wireless Mesh Networks (WMNs) which are regarded as a promising infrastructure for providing wireless Internet services to a wide area. In this paper, the...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2010

    Orientation-Based Wi-Fi Positioning on the Google Nexus One

    While localization systems for indoor areas using the existing Wireless Local Area Network (WLAN) infrastructure have recently been proposed, wireless LAN localization approaches suffer from a number of significant drawbacks. To begin with, there is inaccurate position tracking due to the orientation of the mobile device and signal fluctuation. In...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2009

    Fuzzy Topographic Modeling in Wireless Signal Tracking Analysis

    Fuzzy logic modelling can be applied to evaluate the behaviour of Wireless Local Area Networks (WLAN) Received Signal Strength (RSS). The behavior study of WLAN signal strength is a pivotal part of WLAN tracking analysis. Previous analytical model has not been addressed effectively for analyzing how the WLAN infrastructure affected...

    Provided By Hong Kong Polytechnic University

  • White Papers // Aug 2012

    ML2S: Minimum Length Link Scheduling Under Physical Interference Model

    The authors study a fundamental problem called Minimum Length Link Scheduling (ML2S) which is crucial to the efficient operations of wireless networks. Given a set of communication links of arbitrary length spread and assume each link has one unit of traffic demand in wireless networks, the problem ML2S seeks a...

    Provided By Hong Kong Polytechnic University

  • White Papers // Nov 2012

    Simultaneous Information-and-Power Transfer for Broadband Downlink Systems

    Far-field wireless recharging based on Microwave Power Transfer (MPT) will free mobile devices from interruption due to finite battery lives. Integrating MPT with wireless communications to support Simultaneous Information-and-Power Transfer (SIPT) allows the same spectrum to be used for dual purposes without compromising the quality of service. In this paper,...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2013

    Bellini: Ferrying Application Traffic Flows Through Geo-Distributed Datacenters in the Cloud

    Thanks to the \"On-demand\" nature of cloud computing, a large number of applications have been recently migrated to the cloud. To take full advantage of superior connectivities between geo-distributed datacenters, application traffic can be \"Ferried\" through the cloud to provide better service and user experience. However, implementing and deploying such...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jul 2013

    Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

    As an increasing number of Infrastructure-as-a-Service (IaaS) cloud providers start to provide cloud computing services, they form a competition market to compete for users of these services. Due to different resource capacities and service workloads, users may observe different finishing times for their cloud computing tasks and experience different levels...

    Provided By Hong Kong Polytechnic University

  • White Papers // Jan 2013

    NEST: Locality-Aware Approximate Query Service for Cloud Computing

    Cloud computing applications face the challenges of dealing with a huge volume of data that needs the support of fast approximate queries to enhance system scalability and improve quality of service, especially when users are not aware of exact query inputs. Locality-Sensitive Hashing (LSH) can support the approximate queries that...

    Provided By Hong Kong Polytechnic University

  • White Papers // Oct 2012

    Complete and Fast Unknown Tag Identification in Large RFID Systems

    The RFID technology greatly improves efficiency of many applications including inventory control, object tracking, and supply chain management. In such applications, it is common that new objects are added into the system or existing objects are misplaced in wrong regions. When this happens, fast and complete identification of such tags...

    Provided By Hong Kong Polytechnic University