IIT

Displaying 1-13 of 13 results

  • White Papers // Jan 2014

    Software Transactional Memory Friendly Slot Schedulers

    In this paper, the authors discuss the design space of highly concurrent linearizable data structures for slot scheduling. They observe that it is not possible to have high fairness across threads, and maximize throughput of the entire system simultaneously. Lock free algorithms are very fast, yet very unfair, and wait...

    Provided By IIT

  • White Papers // Jan 2014

    OptiKit: An Open Source Kit for Simulation of On-Chip Optical Components

    In this paper the authors present the design of OptiKit - an open source kit for simulating passive optical devices in embedded photonics based chips. OptiKit includes models for waveguides, parallel waveguides, multiple MMI devices, Y junctions, directional couplers, and waveguide bends. They describe the structure, basic physics, possible applications...

    Provided By IIT

  • White Papers // Jan 2014

    A Dual Framework and Algorithms for Targeted Data Delivery

    A variety of emerging wide area applications challenge existing techniques for data delivery to users and applications accessing data from multiple autonomous servers. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints...

    Provided By IIT

  • White Papers // Feb 2013

    Lock-free and Wait-free Slot Scheduling Algorithms

    Scalable scheduling is being increasingly regarded as an important requirement in high performance systems. There is a demand for high throughput schedulers in servers, data-centers, networking hardware, large storage systems, and in multi-cores of the future. In this paper, the authors consider an important subset of schedulers namely slot schedulers...

    Provided By IIT

  • White Papers // Jan 2013

    Security Verification Using Crowd Sourcing

    X-as-a-service is gaining widespread attention in recent years. SECaaS (SECurity-as-a-Service) is no exception. In this paper, the authors propose a secure architecture using crowd sourcing for security verification as a service. This architecture relies on the collaboration and volunteer contribution of resources by various users, to reduce total cost of...

    Provided By IIT

  • White Papers // Aug 2012

    Building Resilient Cloud Over Unreliable Commodity Infrastructure

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of user's idle compute capacity...

    Provided By IIT

  • White Papers // Mar 2012

    Privacy-Preserving Interest-Casting in Opportunistic Networks

    Message forwarding is a fundamental brick to spread information among users in opportunistic networks. In this paper, the authors consider the recently proposed interest-casting networking primitive for opportunistic networks, according to which a packet generated by a sender should be delivered to all users in the network - potentially unknown...

    Provided By IIT

  • White Papers // Dec 2011

    Path Congestion Control in Centralized Autonomous System

    In this paper, the authors analyze the importance of a centralized controller based system with congestion over the network. Some previous researches show validity of the centralized controller by experiments. However, the effectiveness has not proved analytically. Therefore, this paper provides an idea for the congestion control over the path...

    Provided By IIT

  • White Papers // Oct 2011

    UsiFe: An User Space Filesystem with Support for Intra File Encryption

    In this paper, the authors proposes a new paradigm for the design of cryptographic filesystems. Traditionally, cryptographic file systems have mainly focused on encrypting entire files or directories. In this paper, the authors envisage encryption at a finer granularity, i.e. encrypting parts of files. Such an approach is useful for...

    Provided By IIT

  • White Papers // Jun 2011

    Improving Capacity of Soft Handoff Performance in Wireless Mobile Communication Using Macro Diversity

    The soft handoff is a process on transferring the on going call from one radio resource to another radio resource without any interruption. Rather, mobile unit looks next base station for possible new connection without breaking the old connection. This transfer of call takes place, when the mobile unit moves...

    Provided By IIT

  • White Papers // Dec 2010

    Achieving Exponential Diversity With SpatioTemporal Power Allocation With Imperfect Channel State Information

    In this paper, the authors derive conditions under which Spatio-temporal power allocation provides exponential diversity when the quality of Channel State Information at the Transmitter (CSIT) and Receiver (CSIR) degrades. They show that exponential diversity is obtained provided two conditions are satisfied; 1)the feedback rate increases linearly with the Signal-to-Noise...

    Provided By IIT

  • White Papers // Dec 2010

    Cascaded Filtering for Biometric Identification Using Random Projections

    Biometric identification often involves explicit comparison of a probe template against each template stored in a database. This approach becomes extremely time-consuming as the size of the database increases. Filtering approaches use a light-weight comparison to reduce the database to smaller set of candidates for explicit comparison. However, most existing...

    Provided By IIT

  • White Papers // Nov 2008

    Smart Card Library

    Smart cards are one of the most exciting and promising emerging technology in the field of automated identification. Compared to conventional data transmission devices such as magnetic-stripe cards, smart cards offer enhanced security, convenience and economic benefits. They are highly configurable to suit individual needs. But the ultimate utility of...

    Provided By IIT

  • White Papers // Dec 2011

    Path Congestion Control in Centralized Autonomous System

    In this paper, the authors analyze the importance of a centralized controller based system with congestion over the network. Some previous researches show validity of the centralized controller by experiments. However, the effectiveness has not proved analytically. Therefore, this paper provides an idea for the congestion control over the path...

    Provided By IIT

  • White Papers // Nov 2008

    Smart Card Library

    Smart cards are one of the most exciting and promising emerging technology in the field of automated identification. Compared to conventional data transmission devices such as magnetic-stripe cards, smart cards offer enhanced security, convenience and economic benefits. They are highly configurable to suit individual needs. But the ultimate utility of...

    Provided By IIT

  • White Papers // Jun 2011

    Improving Capacity of Soft Handoff Performance in Wireless Mobile Communication Using Macro Diversity

    The soft handoff is a process on transferring the on going call from one radio resource to another radio resource without any interruption. Rather, mobile unit looks next base station for possible new connection without breaking the old connection. This transfer of call takes place, when the mobile unit moves...

    Provided By IIT

  • White Papers // Aug 2012

    Building Resilient Cloud Over Unreliable Commodity Infrastructure

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of user's idle compute capacity...

    Provided By IIT

  • White Papers // Dec 2010

    Achieving Exponential Diversity With SpatioTemporal Power Allocation With Imperfect Channel State Information

    In this paper, the authors derive conditions under which Spatio-temporal power allocation provides exponential diversity when the quality of Channel State Information at the Transmitter (CSIT) and Receiver (CSIR) degrades. They show that exponential diversity is obtained provided two conditions are satisfied; 1)the feedback rate increases linearly with the Signal-to-Noise...

    Provided By IIT

  • White Papers // Dec 2010

    Cascaded Filtering for Biometric Identification Using Random Projections

    Biometric identification often involves explicit comparison of a probe template against each template stored in a database. This approach becomes extremely time-consuming as the size of the database increases. Filtering approaches use a light-weight comparison to reduce the database to smaller set of candidates for explicit comparison. However, most existing...

    Provided By IIT

  • White Papers // Mar 2012

    Privacy-Preserving Interest-Casting in Opportunistic Networks

    Message forwarding is a fundamental brick to spread information among users in opportunistic networks. In this paper, the authors consider the recently proposed interest-casting networking primitive for opportunistic networks, according to which a packet generated by a sender should be delivered to all users in the network - potentially unknown...

    Provided By IIT

  • White Papers // Oct 2011

    UsiFe: An User Space Filesystem with Support for Intra File Encryption

    In this paper, the authors proposes a new paradigm for the design of cryptographic filesystems. Traditionally, cryptographic file systems have mainly focused on encrypting entire files or directories. In this paper, the authors envisage encryption at a finer granularity, i.e. encrypting parts of files. Such an approach is useful for...

    Provided By IIT

  • White Papers // Jan 2014

    A Dual Framework and Algorithms for Targeted Data Delivery

    A variety of emerging wide area applications challenge existing techniques for data delivery to users and applications accessing data from multiple autonomous servers. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints...

    Provided By IIT

  • White Papers // Jan 2013

    Security Verification Using Crowd Sourcing

    X-as-a-service is gaining widespread attention in recent years. SECaaS (SECurity-as-a-Service) is no exception. In this paper, the authors propose a secure architecture using crowd sourcing for security verification as a service. This architecture relies on the collaboration and volunteer contribution of resources by various users, to reduce total cost of...

    Provided By IIT

  • White Papers // Jan 2014

    OptiKit: An Open Source Kit for Simulation of On-Chip Optical Components

    In this paper the authors present the design of OptiKit - an open source kit for simulating passive optical devices in embedded photonics based chips. OptiKit includes models for waveguides, parallel waveguides, multiple MMI devices, Y junctions, directional couplers, and waveguide bends. They describe the structure, basic physics, possible applications...

    Provided By IIT

  • White Papers // Jan 2014

    Software Transactional Memory Friendly Slot Schedulers

    In this paper, the authors discuss the design space of highly concurrent linearizable data structures for slot scheduling. They observe that it is not possible to have high fairness across threads, and maximize throughput of the entire system simultaneously. Lock free algorithms are very fast, yet very unfair, and wait...

    Provided By IIT

  • White Papers // Feb 2013

    Lock-free and Wait-free Slot Scheduling Algorithms

    Scalable scheduling is being increasingly regarded as an important requirement in high performance systems. There is a demand for high throughput schedulers in servers, data-centers, networking hardware, large storage systems, and in multi-cores of the future. In this paper, the authors consider an important subset of schedulers namely slot schedulers...

    Provided By IIT