Huazhong University of Science & Technology

Displaying 1-40 of 56 results

  • White Papers // Mar 2014

    Bandwidth-Aware Scheduling with SDN in Hadoop: A New Trend for Big Data

    Software Defined Networking (SDN) is a revolutionary network architecture that separates out network control functions from the underlying equipment and is an increasingly trend to help enterprises build more manageable data centers where big data processing emerges as an important part of applications. To concurrently process large-scale data, MapReduce with...

    Provided By Huazhong University of Science & Technology

  • White Papers // Oct 2013

    Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It

    The sale of products using the android Operation System (OS) phone is increasing in rate: the fact is that its price is cheaper but its configured hardware is higher, users easily buy it and the approach to this product increases the risk of the spread of mobile malware. The understanding...

    Provided By Huazhong University of Science & Technology

  • White Papers // Sep 2013

    The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength

    There are a vast number of embedded devices in a wireless network, such as wireless routers, handheld terminals and access points. In the fierce competition of the communications and consuming electronics market, there is a real-world problem: A design house takes several years to design an embedded product. In this...

    Provided By Huazhong University of Science & Technology

  • White Papers // Aug 2013

    Harnessing Renewable Energy in Cloud Datacenters: Opportunities and Challenges

    The proliferation of cloud computing has promoted the wide deployment of large-scale datacenters with tremendous power consumption and high carbon emission. To reduce power cost and carbon footprint, an increasing number of cloud service providers have considered green datacenters with renewable energy sources, such as solar or wind. However, unlike...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2013

    Data Security and Privacy in Cloud Storage

    Cloud computing involves the development of distributed processing, parallel processing, and grid computing. In this paper, the authors survey data security and privacy problems created by cloud storage applications and propose cloud storage security architecture. They discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Next Generation Mobile Cloud Gaming

    With the proliferation of smart mobile devices and broadband wireless networks, the mobile gaming market is rapidly expanding among younger generations due to its ubiquitous entertainment features. Cloud-based mobile computing is a promising technology to address the inherent restrictions of mobile devices, such as limited battery lifetime and computational capacity....

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration

    NAT has been design to work with Internet client-server structure. The emerged of Peer-To-Peer (P2P) networks and applications revealed the incompatibility between P2P applications and NAT. Many methods has been developed and implemented to solve connectivity between peers behind NAT devices. Nevertheless, various NATing types can't communicate with one another....

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Speeding Up Searching in B-cloud System

    With the enormous growth in data amount day by day storage demands have been imposed crucial requirements for data center, where data access plays essential role in estimation of data storage systems effectiveness. For that, there were a lot of efforts have been done to speed up searching in huge...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2013

    Adaptation and Barriers of e-Commerce in Tanzania Small and Medium Enterprises

    E-commerce has been predicted to be a new driver of economic growth for developing countries. The SME sector plays a significant role in its contribution to the national economy in terms of the wealth created and the number of people employed. Small and Medium Enterprises (SMEs) in Tanzania represent the...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2013

    Carbon-Aware Load Balancing for Geo-Distributed Cloud Services

    Recently, datacenter carbon emission has become an emerging concern for the cloud service providers. Previous works are limited on cutting down the power consumption of the datacenters to defuse such a concern. In this paper, the authors show how the spatial and temporal variability's of the electricity carbon footprint can...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2013

    MultiGreen: Cost-Minimizing Multi-Source Datacenter Power Supply with Online Control

    Faced by soaring power cost, large footprint of carbon emission and unpredictable power outage, more and more modern Cloud Service Providers (CSPs) begin to mitigate these challenges by equipping their Datacenter Power Supply System (DPSS) with multiple sources: smart grid with time-varying electricity prices, Uninterrupted Power Supply (UPS) of finite...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2013

    SmartDPSS: Cost-Minimizing Multi-Source Power Supply for Datacenters with Arbitrary Demand

    To tackle soaring power costs, significant carbon emission and unexpected power outage, Cloud Service Providers (CSPs) typically equip their Datacenters with a Power Supply System (DPSS) nurtured by multiple sources: smart grid with time-varying electricity prices, uninterrupted power supply (UPS), and renewable energy with intermittent and uncertain supply. It remains...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2013

    Developing an Optimized Application Hosting Framework in Clouds

    A cloud system, which is also often called a data center, may host a large number of application servers (termed as applications for short in this paper) that consume various types of resource, such as CPU, memory, and I/O. In such a scenario, the application placement strategy, which specifies how...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2013

    Integrating Requirements With SLI Layer for Cloud Computing Services to Meet SLA and QoS

    Cloud computing is high technology, which fulfills needs of common as well as enterprise level to meet their information and communication technology requirements and so on. Cloud computing extends existing information technology capabilities and requirements. Many technologies are being merged with cloud computing, same as that orchestrations can boost cloud...

    Provided By Huazhong University of Science & Technology

  • White Papers // Feb 2013

    Online Control of Datacenter Power Supply Under Uncertain Demand and Renewable Energy

    Modern Cloud Service Providers (CSPs) equip their Datacenter Power Supply System (DPSS) with multisources to mitigate power cost, carbon emission, and power outage: multi-markets grid with time-varying energy prices, finite capacity of Uninterrupted Power Supply (UPS), and certain volumes of intermittent renewable energy. With the presence of uncertain renewable sources...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    On Arbitrating the Power-Performance Tradeoff in SaaS Clouds

    In this paper, the authors present an analytical framework for characterizing and optimizing the power-performance tradeoff in Software-as-a-Service (SaaS) cloud platforms. Their objectives are two-fold: they maximize the operating profit when serving heterogeneous SaaS applications with unpredictable user requests and they minimize the power consumption when processing user requests. To...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    ETime: Energy-Efficient Transmission Between Cloud and Mobile Devices

    Mobile cloud computing, promising to extend the capabilities of resource-constrained mobile devices, is emerging as a new computing paradigm which has fostered a wide range of exciting applications. In this new paradigm, efficient data transmission between the cloud and mobile devices becomes essential. This, however, is highly unreliable and unpredictable...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    An Efficient Distributed Data Extraction Method for Mining Sensor Network's Data

    A wide range of Sensor Networks (SNs) are deployed in real world applications which generate large amount of raw sensory data. Data mining technique to extract useful knowledge from these applications is an emerging research area due to its crucial importance but still it's a challenge to discover knowledge efficiently...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2012

    On the Cryptographic Measures and Chaotic Dynamical Complexity Measures

    The relationship between cryptographic measures and chaotic dynamical complexity measures is studied in this paper, including linear complexity and measure entropy, nonlinear complexity and source entropy. Moreover, a method is presented to guarantee the complexity of chaos-based pseudorandom sequence due to this relationship. This is important to the development of...

    Provided By Huazhong University of Science & Technology

  • White Papers // Nov 2012

    Fault-Tolerant Scheduling for Data Collection in Wireless Sensor Networks

    Wireless sensor networks are expected to be used in many different applications such as disaster relief, environmental control, and intelligent buildings. In this paper, the authors focus on a sensor network that collects environment data from all sensor nodes periodically. To gather the sensing data quickly and reliably, the scheduling...

    Provided By Huazhong University of Science & Technology

  • White Papers // Sep 2012

    Reducing The De-linearization of Data Placement to Improve Deduplication Performance

    Data deduplication is a lossless compression technology that replaces the redundant data chunks with pointers pointing to the already-stored ones. Due to this intrinsic data elimination feature, the deduplication commodity would delinearize the data placement and force the data chunks that belong to the same data object to be divided...

    Provided By Huazhong University of Science & Technology

  • White Papers // Sep 2012

    Lifetime or Energy: Consolidating Servers with Reliability Control in Virtualized Cloud Datacenters

    Server consolidation using virtualization technologies allow cloud-scale datacenters to improve resource utilization and energy efficiency. However, most existing consolidation strategies solely focused on balancing the tradeoff between Service-Level-Agreements (SLAs) desired by cloud applications and energy costs consumed by hosting servers. With the presence of fluctuating workloads in datacenters, the lifetime...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jul 2012

    Distributed Asynchronous Game Theoretic Solutions for Precoding Strategies in Multiuser MIMO Systems

    In this paper, the authors proposed and illustrated a distributed low-complex algorithm for pre-coding strategy selection in a Multi-User Multiple-Input Multiple-Output (MU-MIMO) wireless system using non-cooperative games. They formulate the game as a non-cooperative game for an asynchronous distributed system in multi-user MIMO system known as Partially Asynchronous Distributed Algorithm...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2012

    Weighted Fairness Resource Allocation of Disks in XEN

    Virtualization improves the utilization ratio of resource, saving considerable amount of equipment, energy, management, etc. However, the benefits of virtualization are at the penalty of fairness but inefficient resource sharing. Various tasks in virtual domains often have different demands of resources. Therefore, allocation of resource and scheduling function are particularly...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    A Novel Lifetime-Enhanced Deployment Strategy for Chain-Type Wireless Sensor Networks

    In Chain-type Wireless Sensor Networks (CWSNs), sensor nodes closer to the Base Station (BS) need to receive and transmit more packets, resulting in more energy consumption and shorter lifetime. Due to the friability of the CWSN's topology, the short lifetime of nodes closer to the BS usually limits the CWSN...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Least-Significant-Digit Steganography in Low Bitrate Speech

    For steganography over speech frames, Least Significant-Bit (LSB) approach has been one of the most important alternatives. However, its embedded capacity is quite limited, due to the low redundancy characteristic of low bit-rate speech. Thus, the authors suggest a novel Least Significant Digit (LSD) method in this paper, which makes...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Design of LDPC Codes for Non-Contiguous OFDM-Based Communication Systems

    For Non-Contiguous OFDM (NC-OFDM) a based communication system, especially NC-OFDM-based Cognitive Ratio (CR) systems, one of critical challenges is to establish spectrum synchronization between the transmitter and receiver before data transmission. A Posterior Probability (APP) detection algorithm has been proposed for the receiver to detect the subchannels occupied by the...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Bit Allocation for Multi-Source Multi-Path P2P Video Streaming in VoD Systems Over Wireless Mesh Networks

    In this paper, the authors aim at maximizing quality playback of received video streaming perceived by users in Video on-Demand systems (VoDs) over Wireless Mesh Networks (WMNs). To do so, they exploit the benefits of both Multi-Source Multi-Path (MSMP) delivery scheme and broadcast nature of wireless media in WMNs. In...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Regenerative and Adaptive schemes Based on Network Coding for Wireless Relay Network

    Recent technological advances in wireless communications offer new opportunities and challenges for relay network. To enhance system performance, Demodulate-Network Coding (Dm-NC) scheme has been examined at relay node; it works directly to De-map the received signals and after that forward the mixture to the destination. Simulation analysis has been proven...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2012

    A Practical Framework for T-Out-of-N Oblivious Transfer with Security Against Covert Adversaries

    Oblivious transfer plays a fundamental role in the area of secure distributed computation. In particular, this primitive is used to search items in decentralized databases. Using a variant of smooth projective hash previously presented by Zeng et al., the authors construct a practical framework for t-out-of-n oblivious transfer in the...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2012

    Synchronization-Aware Energy Management for VFI-based Multicore Real-Time Systems

    Multicore processors have emerged to be the popular and powerful computing engines to address the increasing performance demands and energy efficiency requirements of modern real-time applications. Voltage and Frequency Island (VFI) was recently adopted as an effective energy management technique for multicore processors. For a set of periodic real-time tasks...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2012

    A Novel Group Key Transfer Protocol

    Group key transfer protocols depend on a mutually trusted Key Generation Center (KGC) to transport the group key to all group members secretly. This approach requires that a trusted sever be set up, and it incurs communication overhead costs. In addition, the existing group key transfer protocols based on secret...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2011

    Approximate Convex Decomposition Based Localization in Wireless Sensor Networks

    Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research direction for localization is to develop schemes using connectivity information only. These schemes primary apply hop counts to distance estimation. Not surprisingly, they work well only when...

    Provided By Huazhong University of Science & Technology

  • White Papers // Oct 2011

    Throughput Maximization in Cognitive Radio System With Transmission Probability Scheduling and Traffic Pattern Prediction

    In this paper, the authors propose a novel Transmission Probability Scheduling (TPS) scheme for opportunistic spectrum access based cognitive radio system, in which Secondary User (SU) aims to maximize its throughput when the collision probability perceived by Primary User (PU) is constrained under required threshold. Particularly, they first study the...

    Provided By Huazhong University of Science & Technology

  • White Papers // Sep 2011

    Modelling Workflow Executions under Role-based Authorisation Control

    Workflows are often used to represent enterprise-type activities, and authorization control is an important security consideration in enterprise-level applications. Role-Based Access Control (RBAC) is a popular authorization control scheme under which users are assigned to certain roles, and the roles are associated with permissions. This paper presents a novel mechanism...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2011

    SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS

    With a significant advance in ciphertext searchability, Public-key Encryption with Keyword Search (PEKS) is the first keyword searchable encryption scheme based on the probabilistic encryption, such that it is more secure than almost all previous schemes. However, there is an open problem in PEKS that its search complexity is linear...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2011

    XenMVM: Exploring Potential Performance of Virtualized Multi-core Systems

    In this paper, the authors propose a computing resource management system, named as XenMVM, for the virtualized multi-core platforms by Xen. It adjusts the computing resource dynamically according to the actual work-load generated by the applications running inside the virtual machines to improve the resource utilization of the computer systems....

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2011

    Practical Frameworks for H-Out-of-N Oblivious Transfer With Security Against Covert and Malicious Adversaries

    The authors present two practical frameworks for h-out-of-n Oblivious Transfer (OTn h). The first one is secure against covert adversaries who are not always willing to cheat at any price. The security is proven under the ideal/real simulation paradigm (call such security fully simulatable security). The second one is secure...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2010

    Unified Fusion Approach With Application to SLAM

    In this paper, the authors propose the pre-processor based on the Evidence Supporting Measure of Similarity (ESMS) filter and also propose the Unified Fusion Approach (UFA) based on the general fusion machine coupled with ESMS filter, which improve the correctness and precision of information fusion in any fields of application....

    Provided By Huazhong University of Science & Technology

  • White Papers // Jul 2010

    VMDriver: A Driver-Based Monitoring Mechanism for Virtualization

    Monitoring Virtual Machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained - monitoring in granularity of VM level or not general - only support specific monitoring functions for particular guest Operating System (OS). Thus, they do not satisfy the monitoring requirement in large-scale server cluster...

    Provided By Huazhong University of Science & Technology

  • White Papers // Feb 2013

    Online Control of Datacenter Power Supply Under Uncertain Demand and Renewable Energy

    Modern Cloud Service Providers (CSPs) equip their Datacenter Power Supply System (DPSS) with multisources to mitigate power cost, carbon emission, and power outage: multi-markets grid with time-varying energy prices, finite capacity of Uninterrupted Power Supply (UPS), and certain volumes of intermittent renewable energy. With the presence of uncertain renewable sources...

    Provided By Huazhong University of Science & Technology

  • White Papers // Nov 2009

    Optimize Performance of Virtual Machine Checkpointing Via Memory Exclusion

    Virtual Machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level checkpoint may be very large and even in the order of gigabytes. This disadvantage causes the VM checkpointing and restart time become very long. To...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2009

    Live Migration of Virtual Machine Based on Full System Trace and Replay

    Live migration of Virtual Machines (VM) across distinct physical hosts provides a significant new benefit for administrators of data centers and clusters. Previous migration schemes focused on transferring the run-time memory state of the VM. Those approaches employed memory pre-copy algorithm to synchronize the migrating VM states, which make VM...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2008

    XenLR: Xen-Based Logging for Deterministic Replay

    Virtual Machine (VM) based logging-and-replay technology has attracted much attention for system security, fault tolerance, and debugging. However, so far there is not a replay system designed on virtual machine monitor Xen. In this paper, XenLR presents the design and implementation of a logging tool for full system replay on...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2011

    SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS

    With a significant advance in ciphertext searchability, Public-key Encryption with Keyword Search (PEKS) is the first keyword searchable encryption scheme based on the probabilistic encryption, such that it is more secure than almost all previous schemes. However, there is an open problem in PEKS that its search complexity is linear...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2011

    Practical Frameworks for H-Out-of-N Oblivious Transfer With Security Against Covert and Malicious Adversaries

    The authors present two practical frameworks for h-out-of-n Oblivious Transfer (OTn h). The first one is secure against covert adversaries who are not always willing to cheat at any price. The security is proven under the ideal/real simulation paradigm (call such security fully simulatable security). The second one is secure...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2010

    Unified Fusion Approach With Application to SLAM

    In this paper, the authors propose the pre-processor based on the Evidence Supporting Measure of Similarity (ESMS) filter and also propose the Unified Fusion Approach (UFA) based on the general fusion machine coupled with ESMS filter, which improve the correctness and precision of information fusion in any fields of application....

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2009

    Optimization of Function Partition Between Hardware and Software Based on United Evolutionary Algorithm

    Partition between hardware and software is a key problem in hardware-software co-design, and global optimums detection of the objective function is of vital importance in hardware/software partitioning. Though stochastic optimization strategies simulating evolution process are proved to be valuable tools, the balance between exploitation and exploration of which is difficult...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2009

    Watermarking Algorithm Research and Implementation Based on DCT Block

    In this paper the watermarking programs based on the Discrete Cosine Transform (DCT) Domain DC Component (DC) is adopted. Through adjusting the block DCT coefficient of the image the watermarks are hidden. And blocking the selected image according to 8?8 pixel, then dividing the selected image into four non-overlapped sub...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2009

    A Flexible Bandwidth Allocation Scheme Using Specified Duration Based Data Acquisition in Heterogeneous Networks

    Measurement and data acquisition get the most accurate indicator, in mobile communication network. Channel occupancy for each cell shows the proportion of current traffic. In addition, call duration is another important target, which more precise estimate the users' usage situation in heterogeneous networks. A Flexible Bandwidth Allocation Scheme (FBS) using...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jul 2010

    VMDriver: A Driver-Based Monitoring Mechanism for Virtualization

    Monitoring Virtual Machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained - monitoring in granularity of VM level or not general - only support specific monitoring functions for particular guest Operating System (OS). Thus, they do not satisfy the monitoring requirement in large-scale server cluster...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jul 2009

    Building Dynamic Integrity Protection for Multiple Independent Authorities in Virtualization-Based Infrastructure

    In grid and cloud computing infrastructures, the integrity of a computing platform is a critical security requirement in order to provide secure and honest computing environments to service providers and resource consumers. However, due to the fact that software components running on a single platform are usually provided and maintained...

    Provided By Huazhong University of Science & Technology

  • White Papers // Oct 2009

    Using P Systems to Solve the Discrete Logarithm Problem Used in Diffie-Hellman Key Exchange Protocol

    The discrete logarithm problem has been used as the basis of several cryptosystems, especially the Diffie-Hellman key exchange protocol. P systems are a cluster of distributed parallel computing devices in a biochemical type. This paper presents a P system with active membranes and strong priority to solve the discrete logarithm...

    Provided By Huazhong University of Science & Technology

  • White Papers // Aug 2009

    Live Virtual Machine Migration With Adaptive Memory Compression

    Live migration of virtual machines has been a powerful tool to facilitate system maintenance, load balancing, fault tolerance, and power-saving, especially in clusters or data centers. Although pre-copy is a predominantly used approach in the state of the art, it is difficult to provide quick migration with low network overhead,...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2010

    AFSO: An Adaptative Frame Size Optimization Mechanism for 802.11 Networks

    In this paper, the authors analyze the impact of different frame types on self-similarity and burstiness characteristics of the aggregated frame traffic from a real 802.11 wireless local area network. They find that characteristics of aggregated frame traffic are affected by both mean frame size and the proportion of specified...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2012

    A Novel Group Key Transfer Protocol

    Group key transfer protocols depend on a mutually trusted Key Generation Center (KGC) to transport the group key to all group members secretly. This approach requires that a trusted sever be set up, and it incurs communication overhead costs. In addition, the existing group key transfer protocols based on secret...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Regenerative and Adaptive schemes Based on Network Coding for Wireless Relay Network

    Recent technological advances in wireless communications offer new opportunities and challenges for relay network. To enhance system performance, Demodulate-Network Coding (Dm-NC) scheme has been examined at relay node; it works directly to De-map the received signals and after that forward the mixture to the destination. Simulation analysis has been proven...

    Provided By Huazhong University of Science & Technology

  • White Papers // Oct 2011

    Throughput Maximization in Cognitive Radio System With Transmission Probability Scheduling and Traffic Pattern Prediction

    In this paper, the authors propose a novel Transmission Probability Scheduling (TPS) scheme for opportunistic spectrum access based cognitive radio system, in which Secondary User (SU) aims to maximize its throughput when the collision probability perceived by Primary User (PU) is constrained under required threshold. Particularly, they first study the...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2010

    Throughput Maximization for Opportunistic Spectrum Access Via Transmission Probability Scheduling Scheme

    In this paper, the authors propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the proposed scheme, the secondary user's throughput over a single channel is maximized while collision probability perceived by the primary user is constrained under a required threshold since the...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jun 2012

    Weighted Fairness Resource Allocation of Disks in XEN

    Virtualization improves the utilization ratio of resource, saving considerable amount of equipment, energy, management, etc. However, the benefits of virtualization are at the penalty of fairness but inefficient resource sharing. Various tasks in virtual domains often have different demands of resources. Therefore, allocation of resource and scheduling function are particularly...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2010

    Distribution of Peak-to-Average Power Ratio and Its Applications in OFDM Systems With Unequal Power Allocation

    In this paper, the authors propose a general expression of the Peak-to-Average Power Ratio (PAPR) distribution in Orthogonal Frequency Division Multiplexing (OFDM) systems with unequal power allocation strategy, which is based on the extreme value theory for Chi-squared-2 process. The proposed general distribution of the PAPR depends on the number...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    A Novel Lifetime-Enhanced Deployment Strategy for Chain-Type Wireless Sensor Networks

    In Chain-type Wireless Sensor Networks (CWSNs), sensor nodes closer to the Base Station (BS) need to receive and transmit more packets, resulting in more energy consumption and shorter lifetime. Due to the friability of the CWSN's topology, the short lifetime of nodes closer to the BS usually limits the CWSN...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Least-Significant-Digit Steganography in Low Bitrate Speech

    For steganography over speech frames, Least Significant-Bit (LSB) approach has been one of the most important alternatives. However, its embedded capacity is quite limited, due to the low redundancy characteristic of low bit-rate speech. Thus, the authors suggest a novel Least Significant Digit (LSD) method in this paper, which makes...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Design of LDPC Codes for Non-Contiguous OFDM-Based Communication Systems

    For Non-Contiguous OFDM (NC-OFDM) a based communication system, especially NC-OFDM-based Cognitive Ratio (CR) systems, one of critical challenges is to establish spectrum synchronization between the transmitter and receiver before data transmission. A Posterior Probability (APP) detection algorithm has been proposed for the receiver to detect the subchannels occupied by the...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2012

    Bit Allocation for Multi-Source Multi-Path P2P Video Streaming in VoD Systems Over Wireless Mesh Networks

    In this paper, the authors aim at maximizing quality playback of received video streaming perceived by users in Video on-Demand systems (VoDs) over Wireless Mesh Networks (WMNs). To do so, they exploit the benefits of both Multi-Source Multi-Path (MSMP) delivery scheme and broadcast nature of wireless media in WMNs. In...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2009

    An Efficient Quantum Search Engine on Unsorted Database

    The authors consider the problem of finding one or more desired items out of an unsorted database. Patel has shown that if the database permits quantum queries, then mere digitization is sufficient for efficient search for one desired item. The algorithm, called factorized quantum search algorithm, presented by him can...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jul 2012

    Distributed Asynchronous Game Theoretic Solutions for Precoding Strategies in Multiuser MIMO Systems

    In this paper, the authors proposed and illustrated a distributed low-complex algorithm for pre-coding strategy selection in a Multi-User Multiple-Input Multiple-Output (MU-MIMO) wireless system using non-cooperative games. They formulate the game as a non-cooperative game for an asynchronous distributed system in multi-user MIMO system known as Partially Asynchronous Distributed Algorithm...

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2012

    On the Cryptographic Measures and Chaotic Dynamical Complexity Measures

    The relationship between cryptographic measures and chaotic dynamical complexity measures is studied in this paper, including linear complexity and measure entropy, nonlinear complexity and source entropy. Moreover, a method is presented to guarantee the complexity of chaos-based pseudorandom sequence due to this relationship. This is important to the development of...

    Provided By Huazhong University of Science & Technology

  • White Papers // Nov 2012

    Fault-Tolerant Scheduling for Data Collection in Wireless Sensor Networks

    Wireless sensor networks are expected to be used in many different applications such as disaster relief, environmental control, and intelligent buildings. In this paper, the authors focus on a sensor network that collects environment data from all sensor nodes periodically. To gather the sensing data quickly and reliably, the scheduling...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    On Arbitrating the Power-Performance Tradeoff in SaaS Clouds

    In this paper, the authors present an analytical framework for characterizing and optimizing the power-performance tradeoff in Software-as-a-Service (SaaS) cloud platforms. Their objectives are two-fold: they maximize the operating profit when serving heterogeneous SaaS applications with unpredictable user requests and they minimize the power consumption when processing user requests. To...

    Provided By Huazhong University of Science & Technology

  • White Papers // Oct 2009

    Distributed Joint Resource Allocation in Multi-Radio Multi-Channel Wireless Mesh Networks

    In this paper, the authors study how to design distributed resource allocation in multi-radio multi-channel Wireless Mesh Networks with the objective of maximizing the network utility. They address the problem via a cross-layer approach with a joint consideration of multi-path routing, congestion control, scheduling, radio allocation and channel assignment. The...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    An Efficient Distributed Data Extraction Method for Mining Sensor Network's Data

    A wide range of Sensor Networks (SNs) are deployed in real world applications which generate large amount of raw sensory data. Data mining technique to extract useful knowledge from these applications is an emerging research area due to its crucial importance but still it's a challenge to discover knowledge efficiently...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration

    NAT has been design to work with Internet client-server structure. The emerged of Peer-To-Peer (P2P) networks and applications revealed the incompatibility between P2P applications and NAT. Many methods has been developed and implemented to solve connectivity between peers behind NAT devices. Nevertheless, various NATing types can't communicate with one another....

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Next Generation Mobile Cloud Gaming

    With the proliferation of smart mobile devices and broadband wireless networks, the mobile gaming market is rapidly expanding among younger generations due to its ubiquitous entertainment features. Cloud-based mobile computing is a promising technology to address the inherent restrictions of mobile devices, such as limited battery lifetime and computational capacity....

    Provided By Huazhong University of Science & Technology

  • White Papers // Dec 2011

    Approximate Convex Decomposition Based Localization in Wireless Sensor Networks

    Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research direction for localization is to develop schemes using connectivity information only. These schemes primary apply hop counts to distance estimation. Not surprisingly, they work well only when...

    Provided By Huazhong University of Science & Technology

  • White Papers // May 2013

    Speeding Up Searching in B-cloud System

    With the enormous growth in data amount day by day storage demands have been imposed crucial requirements for data center, where data access plays essential role in estimation of data storage systems effectiveness. For that, there were a lot of efforts have been done to speed up searching in huge...

    Provided By Huazhong University of Science & Technology

  • White Papers // Sep 2012

    Lifetime or Energy: Consolidating Servers with Reliability Control in Virtualized Cloud Datacenters

    Server consolidation using virtualization technologies allow cloud-scale datacenters to improve resource utilization and energy efficiency. However, most existing consolidation strategies solely focused on balancing the tradeoff between Service-Level-Agreements (SLAs) desired by cloud applications and energy costs consumed by hosting servers. With the presence of fluctuating workloads in datacenters, the lifetime...

    Provided By Huazhong University of Science & Technology

  • White Papers // Apr 2013

    Carbon-Aware Load Balancing for Geo-Distributed Cloud Services

    Recently, datacenter carbon emission has become an emerging concern for the cloud service providers. Previous works are limited on cutting down the power consumption of the datacenters to defuse such a concern. In this paper, the authors show how the spatial and temporal variability's of the electricity carbon footprint can...

    Provided By Huazhong University of Science & Technology

  • White Papers // Jan 2013

    ETime: Energy-Efficient Transmission Between Cloud and Mobile Devices

    Mobile cloud computing, promising to extend the capabilities of resource-constrained mobile devices, is emerging as a new computing paradigm which has fostered a wide range of exciting applications. In this new paradigm, efficient data transmission between the cloud and mobile devices becomes essential. This, however, is highly unreliable and unpredictable...

    Provided By Huazhong University of Science & Technology

  • White Papers // Mar 2013

    MultiGreen: Cost-Minimizing Multi-Source Datacenter Power Supply with Online Control

    Faced by soaring power cost, large footprint of carbon emission and unpredictable power outage, more and more modern Cloud Service Providers (CSPs) begin to mitigate these challenges by equipping their Datacenter Power Supply System (DPSS) with multiple sources: smart grid with time-varying electricity prices, Uninterrupted Power Supply (UPS) of finite...

    Provided By Huazhong University of Science & Technology