IFIP

Displaying 1-24 of 24 results

  • White Papers // Jun 2013

    Joint Algorithm Developing and System-Level Design: Case Study on Video Encoding

    System-Level Design Environments (SLDEs) are often utilized for tackling the design complexity of modern embedded systems. SLDEs typically start with a specification capturing core algorithms. Algorithm development itself largely occurs in Algorithm Design Environments (ADE) with little or no hardware concern. Currently, algorithm and system design environments are disjoint; system...

    Provided By IFIP

  • White Papers // Apr 2013

    Formal Deadlock Analysis of SpecC Models Using Satisfiability Modulo Theories

    For a System-on-Chip (SoC) design which may be composed of multiple processing elements running in parallel, improper execution order and communication assignment may lead to problematic consequences, and one of the consequences could be deadlock. In this paper, the authors propose an approach to abstracting SpecC-based system models for formal...

    Provided By IFIP

  • White Papers // Apr 2013

    A Case Study in Formal Verification Using Multiple Explicit Heaps

    In the context of the Key program verifier and the associated dynamic logic for Java the authors discuss the first instance of applying a generalized approach to the treatment of memory heaps in verification. Namely, they allow verified programs to simultaneously modify several different, but possibly location sharing, heaps. In...

    Provided By IFIP

  • White Papers // Dec 2012

    Energy Efficient PONs With Service Delay Guarantees

    Passive Optical access Networks (PONs) are currently the major contributor to the energy consumption budget of fixed optical networks. In PON, the largest part of the energy consumption is due to the equipments at the customer premises. This paper proposes a method for maximizing energy savings while providing services with...

    Provided By IFIP

  • White Papers // Oct 2012

    A Green Framework for Energy Efficient Management in TDMA-Based Wireless Mesh Networks

    Due to the increasing of energy consumption in Information and Communication Technology (ICT), green computing has recently drawn a lot of attention. However, the application of green networking to Wireless Mesh Networks (WMN) has seldom been reported in the literature. In this paper, the authors propose a new framework for...

    Provided By IFIP

  • White Papers // Oct 2012

    Comfort-Aware Home Energy Management Under Market-Based Demand-Response

    To regulate energy consumption and enable Demand-Response programs, effective demand-side management at home is key and an integral part of the future Smart Grid. In essence, the home energy management is a mix between discrete appliance scheduling problem with deadlines and continuous Heating, Ventilation and Cooling (HVC) device control problem....

    Provided By IFIP

  • White Papers // Oct 2012

    MobiCloud: A Geo-Distributed Mobile Cloud Computing Platform

    In a cloud computing environment, users prefer to migrate their locally processing workloads onto the cloud where more resources with better performance can be expected. ProtoGENI and PlanetLab have further improved the current Internet-based resource outsourcing by allowing end users to construct a virtual network system through virtualization and programmable...

    Provided By IFIP

  • White Papers // Aug 2012

    CloudDT: Efficient Tape Resource Management Using Deduplication in Cloud Backup and Archival Services

    Cloud-based backup and archival services use large tape libraries as a cost-effective cold tier in their online storage hierarchy today. These services leverage de-duplication to reduce the disk storage capacity required by their customer data sets, but they usually re-duplicate the data when moving it from disk to tape. De-duplication...

    Provided By IFIP

  • White Papers // Aug 2012

    Energy-Efficient Virtual Machine Scheduling in Performance-Asymmetric Multi-Core Architectures

    Multi-core architectures with asymmetric core performance have recently shown great promise, because applications with different needs can benefit from either the high performance of a fast core or the high parallelism and power efficiency of a group of slow cores. This performance heterogeneity can be particularly beneficial to applications running...

    Provided By IFIP

  • White Papers // Aug 2012

    Failure Analysis of Distributed Scientific Workflows Executing in the Cloud

    This paper presents models characterizing failures observed during the execution of large scientific applications on Amazon EC2. Scientific workflows are used as the underlying abstraction for application representations. As scientific workflows scale to hundreds of thousands of distinct tasks, failures due to software and hardware faults become increasingly common. The...

    Provided By IFIP

  • White Papers // Aug 2012

    Optimizing the Use of Request Distribution and Stored Energy for Cost Reduction in Multi-Site Internet Services

    Electricity bills of large-scale Internet services are a major component in overall operating costs. As a result, it is increasingly important to identify cost-reduction approaches, either through reducing energy consumption or by strategically avoiding periods or data centers with the highest electricity costs. The first group of approaches based on...

    Provided By IFIP

  • White Papers // May 2012

    Energy Minimization in Cooperative Relay Networks With Sleep Modes

    The authors consider a cooperative relay network where a source node communicates to a destination node with the help of multiple Relay Nodes (RNs). RNs are assumed to be able to work in either active mode or sleep mode. To minimize the total energy consumption, working modes of RNs and...

    Provided By IFIP

  • White Papers // May 2012

    Optimal Power Policy and Throughput Analysis in Cognitive Broadcast Networks Under Primary's Outage Constraint

    This paper focuses on a spectrum-sharing based cognitive radio fading Broadcast Channel (BC) with a single-antenna Secondary Base Station (SBS) and M Secondary Receivers (SRs) concurrently utilizing the same spectrum band with one delay-sensitive Primary User (PU). The quality-of-service requirement in the primary network is given by the Primary user's...

    Provided By IFIP

  • White Papers // May 2012

    Efficient Cooperative Relaying in Wireless Multi-Hop Networks With Commodity WiFi Hardware

    In wireless multi-hop networks, cooperative relaying exploits temporal and spatial diversity by additionally transmitting via a relay node and then combining direct and relay transmissions at the receiver. While such relaying improves packet error rates, it also costs an extra transmission. Along multi-hop paths, there often are nodes that can...

    Provided By IFIP

  • White Papers // Apr 2012

    Implementation and Evaluation of an SCA-Resistant Embedded Processor

    Side-Channel Analysis (SCA) attacks are a threat for many embedded applications which have a need for security. With embedded processors being at the very heart of such applications, it is desirable to address SCA attacks with countermeasures which \"Naturally\" fit deployment in those processors. This paper describes the authors' work...

    Provided By IFIP

  • White Papers // Feb 2012

    A Two-Layer Approach for Energy Efficiency in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology and data communications are energy expensive and unaffordable for most MLSA...

    Provided By IFIP

  • White Papers // Jul 2011

    The Trade-Off Between Power Consumption and Latency in Computer Networks

    As the power consumed by computer networks is nearly independent from the load, networks consume much more power than necessary when the load is low. The authors analyze the influence of disabling network components on power consumption and latency of data transfers. They define two power consumption models and compare...

    Provided By IFIP

  • White Papers // Feb 2010

    A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

    Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different...

    Provided By IFIP

  • White Papers // Jul 2009

    NFC-Based Mobile Interactions With Direct-View Displays

    Two NFC-based interactions are described in the paper. The first interaction technique is referred to as Touch & Connect: a process by which an NFC tag is used to rapidly pair a mobile device with a computer. The second interaction technique is referred to as Touch & Select, and considerably...

    Provided By IFIP

  • White Papers // May 2009

    An Approach to Security Policy Configuration Using Semantic Threat Graphs

    Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach,...

    Provided By IFIP

  • White Papers // Apr 2009

    Detection and Prevention of Insider Threats in Database Driven Web Services

    This paper take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. The authors consider both insider and outsider attacks in the third-party web hosting scenarios. This paper present SafeWS, a modular solution that is inserted...

    Provided By IFIP

  • White Papers // Mar 2009

    A Cost-Effective Distributed File Service With QoS Guarantees

    Large-scale, value-added Internet services composed of independent cooperating or competing services will soon become common place. Several groups have addressed the performance, communication, discovery, and description aspects of these services. However, little work has been done on effectively composing paid services and the Quality-of-Service (QoS) guarantees that they provide. Authors...

    Provided By IFIP

  • White Papers // Nov 2008

    pMapper: Power and Migration Cost Aware Application Placement in Virtualized Systems

    Resource provisioning or placement of applications on a set of physical servers to optimize the application Service Level Agreements (SLA) is a well studied problem. Workload placement on servers has been traditionally driven by mainly performance objectives. In this paper, the authors investigate the design, implementation, and evaluation of a...

    Provided By IFIP

  • White Papers // May 2007

    Automatic Parallelization of Sequential Specifications for Symmetric MPSoCs

    In this paper, the authors present an embedded system design toolchain for automatic generation of parallel code runnable on symmetric multiprocessor systems from an initial sequential specification written using the C language. They show how the initial C specification is translated in a modified system dependence graph with feedback edges...

    Provided By IFIP

  • White Papers // Aug 2012

    CloudDT: Efficient Tape Resource Management Using Deduplication in Cloud Backup and Archival Services

    Cloud-based backup and archival services use large tape libraries as a cost-effective cold tier in their online storage hierarchy today. These services leverage de-duplication to reduce the disk storage capacity required by their customer data sets, but they usually re-duplicate the data when moving it from disk to tape. De-duplication...

    Provided By IFIP

  • White Papers // Aug 2012

    Failure Analysis of Distributed Scientific Workflows Executing in the Cloud

    This paper presents models characterizing failures observed during the execution of large scientific applications on Amazon EC2. Scientific workflows are used as the underlying abstraction for application representations. As scientific workflows scale to hundreds of thousands of distinct tasks, failures due to software and hardware faults become increasingly common. The...

    Provided By IFIP

  • White Papers // May 2012

    Energy Minimization in Cooperative Relay Networks With Sleep Modes

    The authors consider a cooperative relay network where a source node communicates to a destination node with the help of multiple Relay Nodes (RNs). RNs are assumed to be able to work in either active mode or sleep mode. To minimize the total energy consumption, working modes of RNs and...

    Provided By IFIP

  • White Papers // Jul 2011

    The Trade-Off Between Power Consumption and Latency in Computer Networks

    As the power consumed by computer networks is nearly independent from the load, networks consume much more power than necessary when the load is low. The authors analyze the influence of disabling network components on power consumption and latency of data transfers. They define two power consumption models and compare...

    Provided By IFIP

  • White Papers // Dec 2012

    Energy Efficient PONs With Service Delay Guarantees

    Passive Optical access Networks (PONs) are currently the major contributor to the energy consumption budget of fixed optical networks. In PON, the largest part of the energy consumption is due to the equipments at the customer premises. This paper proposes a method for maximizing energy savings while providing services with...

    Provided By IFIP

  • White Papers // Oct 2012

    A Green Framework for Energy Efficient Management in TDMA-Based Wireless Mesh Networks

    Due to the increasing of energy consumption in Information and Communication Technology (ICT), green computing has recently drawn a lot of attention. However, the application of green networking to Wireless Mesh Networks (WMN) has seldom been reported in the literature. In this paper, the authors propose a new framework for...

    Provided By IFIP

  • White Papers // Oct 2012

    Comfort-Aware Home Energy Management Under Market-Based Demand-Response

    To regulate energy consumption and enable Demand-Response programs, effective demand-side management at home is key and an integral part of the future Smart Grid. In essence, the home energy management is a mix between discrete appliance scheduling problem with deadlines and continuous Heating, Ventilation and Cooling (HVC) device control problem....

    Provided By IFIP

  • White Papers // Oct 2012

    MobiCloud: A Geo-Distributed Mobile Cloud Computing Platform

    In a cloud computing environment, users prefer to migrate their locally processing workloads onto the cloud where more resources with better performance can be expected. ProtoGENI and PlanetLab have further improved the current Internet-based resource outsourcing by allowing end users to construct a virtual network system through virtualization and programmable...

    Provided By IFIP

  • White Papers // Aug 2012

    Optimizing the Use of Request Distribution and Stored Energy for Cost Reduction in Multi-Site Internet Services

    Electricity bills of large-scale Internet services are a major component in overall operating costs. As a result, it is increasingly important to identify cost-reduction approaches, either through reducing energy consumption or by strategically avoiding periods or data centers with the highest electricity costs. The first group of approaches based on...

    Provided By IFIP

  • White Papers // Apr 2013

    A Case Study in Formal Verification Using Multiple Explicit Heaps

    In the context of the Key program verifier and the associated dynamic logic for Java the authors discuss the first instance of applying a generalized approach to the treatment of memory heaps in verification. Namely, they allow verified programs to simultaneously modify several different, but possibly location sharing, heaps. In...

    Provided By IFIP

  • White Papers // Apr 2012

    Implementation and Evaluation of an SCA-Resistant Embedded Processor

    Side-Channel Analysis (SCA) attacks are a threat for many embedded applications which have a need for security. With embedded processors being at the very heart of such applications, it is desirable to address SCA attacks with countermeasures which \"Naturally\" fit deployment in those processors. This paper describes the authors' work...

    Provided By IFIP

  • White Papers // Nov 2008

    pMapper: Power and Migration Cost Aware Application Placement in Virtualized Systems

    Resource provisioning or placement of applications on a set of physical servers to optimize the application Service Level Agreements (SLA) is a well studied problem. Workload placement on servers has been traditionally driven by mainly performance objectives. In this paper, the authors investigate the design, implementation, and evaluation of a...

    Provided By IFIP

  • White Papers // Jun 2013

    Joint Algorithm Developing and System-Level Design: Case Study on Video Encoding

    System-Level Design Environments (SLDEs) are often utilized for tackling the design complexity of modern embedded systems. SLDEs typically start with a specification capturing core algorithms. Algorithm development itself largely occurs in Algorithm Design Environments (ADE) with little or no hardware concern. Currently, algorithm and system design environments are disjoint; system...

    Provided By IFIP

  • White Papers // Apr 2013

    Formal Deadlock Analysis of SpecC Models Using Satisfiability Modulo Theories

    For a System-on-Chip (SoC) design which may be composed of multiple processing elements running in parallel, improper execution order and communication assignment may lead to problematic consequences, and one of the consequences could be deadlock. In this paper, the authors propose an approach to abstracting SpecC-based system models for formal...

    Provided By IFIP

  • White Papers // Aug 2012

    Energy-Efficient Virtual Machine Scheduling in Performance-Asymmetric Multi-Core Architectures

    Multi-core architectures with asymmetric core performance have recently shown great promise, because applications with different needs can benefit from either the high performance of a fast core or the high parallelism and power efficiency of a group of slow cores. This performance heterogeneity can be particularly beneficial to applications running...

    Provided By IFIP

  • White Papers // May 2007

    Automatic Parallelization of Sequential Specifications for Symmetric MPSoCs

    In this paper, the authors present an embedded system design toolchain for automatic generation of parallel code runnable on symmetric multiprocessor systems from an initial sequential specification written using the C language. They show how the initial C specification is translated in a modified system dependence graph with feedback edges...

    Provided By IFIP

  • White Papers // May 2009

    An Approach to Security Policy Configuration Using Semantic Threat Graphs

    Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding and/or management of the overall security policy requirements, which may, in turn, unnecessarily expose the enterprise to known threats. This paper proposes a threat management approach,...

    Provided By IFIP

  • White Papers // Mar 2009

    A Cost-Effective Distributed File Service With QoS Guarantees

    Large-scale, value-added Internet services composed of independent cooperating or competing services will soon become common place. Several groups have addressed the performance, communication, discovery, and description aspects of these services. However, little work has been done on effectively composing paid services and the Quality-of-Service (QoS) guarantees that they provide. Authors...

    Provided By IFIP

  • White Papers // Apr 2009

    Detection and Prevention of Insider Threats in Database Driven Web Services

    This paper take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. The authors consider both insider and outsider attacks in the third-party web hosting scenarios. This paper present SafeWS, a modular solution that is inserted...

    Provided By IFIP

  • White Papers // Jul 2009

    NFC-Based Mobile Interactions With Direct-View Displays

    Two NFC-based interactions are described in the paper. The first interaction technique is referred to as Touch & Connect: a process by which an NFC tag is used to rapidly pair a mobile device with a computer. The second interaction technique is referred to as Touch & Select, and considerably...

    Provided By IFIP

  • White Papers // Feb 2010

    A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

    Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different...

    Provided By IFIP

  • White Papers // Feb 2012

    A Two-Layer Approach for Energy Efficiency in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology and data communications are energy expensive and unaffordable for most MLSA...

    Provided By IFIP

  • White Papers // May 2012

    Optimal Power Policy and Throughput Analysis in Cognitive Broadcast Networks Under Primary's Outage Constraint

    This paper focuses on a spectrum-sharing based cognitive radio fading Broadcast Channel (BC) with a single-antenna Secondary Base Station (SBS) and M Secondary Receivers (SRs) concurrently utilizing the same spectrum band with one delay-sensitive Primary User (PU). The quality-of-service requirement in the primary network is given by the Primary user's...

    Provided By IFIP

  • White Papers // May 2012

    Efficient Cooperative Relaying in Wireless Multi-Hop Networks With Commodity WiFi Hardware

    In wireless multi-hop networks, cooperative relaying exploits temporal and spatial diversity by additionally transmitting via a relay node and then combining direct and relay transmissions at the receiver. While such relaying improves packet error rates, it also costs an extra transmission. Along multi-hop paths, there often are nodes that can...

    Provided By IFIP