INRIA

Displaying 1-40 of 487 results

  • White Papers // Jan 2015

    Privacy by Design: On the Conformance Between Protocols and Architectures

    In systems design, the authors generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, they talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In this paper, they consider the...

    Provided By INRIA

  • White Papers // Jul 2014

    A Taxonomy and Survey on eScience as a Service in the Cloud

    Cloud computing has recently evolved as a popular computing infrastructure for many applications. Scientific computing, which was mainly hosted in private clusters and grids, has started to migrate development and deployment to the public cloud environment. eScience as a service becomes an emerging and promising direction for science computing. The...

    Provided By INRIA

  • White Papers // Apr 2014

    Bridging Data in the Clouds: An Environment-Aware System for Geographically Distributed Data Transfers

    Today's continuously growing cloud infrastructures provide support for processing ever increasing amounts of scientific data. Cloud resources for computation and storage are spread among globally distributed datacenters. Thus, to leverage the full computation power of the clouds, global data processing across multiple sites has to be fully enabled. However, managing...

    Provided By INRIA

  • White Papers // Mar 2014

    Evaluating Streaming Strategies for Event Processing across Infrastructure Clouds

    Infrastructure clouds revolutionized the way in which the authors approach resource procurement by providing an easy way to lease compute and storage resources on short notice, for a short amount of time, and on a pay-as-you-go basis. This new opportunity, however, introduces new performance trade-offs. Making the right choices in...

    Provided By INRIA

  • White Papers // Mar 2014

    Optimizing Buffer Sizes for Pipeline Workflow Scheduling with Setup Times

    Mapping linear workflow applications onto a set of homogeneous processors can be optimally solved in polynomial time for the throughput objective with fewer processors than stages. This result even holds true, when setup times occur in the execution and homogeneous buffers are available for the storage of intermediate results. In...

    Provided By INRIA

  • White Papers // Mar 2014

    Sum-of-Product Architectures Computing Just Right

    Many digital filters and signal-processing transforms can be expressed as a Sum of Products with Constants (SPC). This paper addresses the automatic construction of low-precision, but high accuracy SPC architectures: these architectures are specified as last-bit accurate with respect to a mathematical definition. In other words, they behave as if...

    Provided By INRIA

  • White Papers // Feb 2014

    Efficient Workstealing for Multicore Event-Driven Systems

    Many high-performance communicating systems are designed using the event-driven paradigm. As multi-core platforms are now pervasive, it becomes crucial for such systems to take advantage of the available hardware parallelism. Event coloring is a promising approach in this regard. First, it allows programmers to simply and progressively inject support for...

    Provided By INRIA

  • White Papers // Feb 2014

    BlobSeer: Bringing High Throughput under Heavy Concurrency to Hadoop Map-Reduce Applications

    Hadoop is a software framework supporting the Map-Reduce programming model. It relies on the Hadoop Distributed File System (HDFS) as its primary storage system. The efficiency of HDFS is crucial for the performance of Map-Reduce applications. The authors substitute the original HDFS layer of Hadoop with a new, concurrency-optimized data...

    Provided By INRIA

  • White Papers // Jan 2014

    Interactive Inference of Join Queries

    The authors investigate the problem of inferring join queries from user interactions. The user is presented with a set of candidate tuples and is asked to label them as positive or negative depending on whether or not she would like the tuples as part of the join result. The goal...

    Provided By INRIA

  • White Papers // Jan 2014

    Context-Aware Top-k Processing using Views

    Search applications where queries are dependent on their context are becoming increasingly relevant in today's online applications. For example, the context may be the location of the user in location-aware search or the social network of the query initiator in social-aware search. Processing such queries efficiently is inherently difficult, and...

    Provided By INRIA

  • White Papers // Jan 2014

    Deduction with Contradictions in Datalog

    The authors study deduction in the presence of inconsistencies. Following previous works, they capture deduction via datalog programs and in-consistencies through violations of Functional Dependencies (FDs). They study and compare two semantics for datalog with FDs: the first, of a logical nature, is based on inferring facts one at a...

    Provided By INRIA

  • White Papers // Dec 2013

    A Fine-grained Approach for Power Consumption Analysis and Prediction

    Power consumption has become a critical concern in modern computing systems for various reasons including financial savings and environmental protection. With battery powered devices, the authors need to care about the available amount of energy since it is limited. For the case of supercomputers, as they imply a large aggregation...

    Provided By INRIA

  • White Papers // Dec 2013

    Toward Better Simulation of MPI Applications on Ethernet/TCP Networks

    In the High Performance Computing (HPC) field, accurately predicting the execution time of parallel applications is of utmost importance to assess their scalability, and this is particularly true for applications slated for deployment on next-generation exascale systems. While much effort has been put towards understanding the high-level behavior of these...

    Provided By INRIA

  • White Papers // Nov 2013

    Extracting UML/OCL Integrity Constraints and Derived Types from Relational Databases

    Relational databases usually enforce relevant organizational business rules. This aspect is ignored by current database reverse engineering approaches which only focus on the extraction of the structural part of the conceptual schema. Other database elements like triggers, views, column constraints, etc. are not considered by those methods. As a result,...

    Provided By INRIA

  • White Papers // Nov 2013

    Reasoning About Pattern-Based XML Queries

    The authors survey results about static analysis of pattern-based queries over XML documents. These queries are analogs of conjunctive queries, their unions and Boolean combinations, in which tree patterns play the role of atomic formulae. As in the relational case, they can be viewed as both queries and incomplete documents,...

    Provided By INRIA

  • White Papers // Nov 2013

    Dynamic Workload-Based Partitioning Algorithms for Continuously Growing Databases

    Applications with very large databases, where data items are continuously appended, are becoming more and more common. Thus, the development of efficient data partitioning is one of the main requirements to yield good performance. In the case of applications that have complex access patterns, e.g. scientific applications, workload-based partitioning could...

    Provided By INRIA

  • White Papers // Nov 2013

    Mapping Applications on Volatile Resources

    In this paper, the authors study the execution of iterative applications on volatile processors such as those found on desktop grids. They envision two models, one where all tasks are assumed to be independent, and another where all tasks are tightly coupled and keep exchanging information throughout the iteration. These...

    Provided By INRIA

  • White Papers // Oct 2013

    On the Performance and Energy Efficiency of Hadoop Deployment Models

    The exponential growth of scientific and business data has resulted in the evolution of the cloud computing and the MapReduce parallel programming model. Cloud computing emphasizes increased utilization and power savings through consolidation while MapReduce enables large scale data analysis. The Hadoop framework has recently evolved to the standard framework...

    Provided By INRIA

  • White Papers // Oct 2013

    WaRG: Warehousing RDF Graphs

    Databases of facts, each characterized by multiple dimensions, whose values are recorded in measures, are at the core of multidimensional Data Warehouses (DWs in short). The facts can then be analyzed by means of aggregating the measures. Data warehouses are typically built to analyze (some aspects of) an enterprise's business...

    Provided By INRIA

  • White Papers // Sep 2013

    Response Time Analysis for Fixed-Priority Tasks with Multiple Probabilistic Parameters

    In this paper, the authors consider a probabilistic model for real-time task systems with probabilistic worst-case execution times, probabilistic minimum inter-arrival times and probabilistic deadlines. They propose an analysis computing response time distributions of the tasks scheduled on one processor under a task-level fixed-priority preemptive scheduling policy. The complexity of...

    Provided By INRIA

  • White Papers // Aug 2013

    Approximation Algorithms for Energy Minimization in Cloud Service Allocation under Reliability Constraints

    The authors consider allocation problems that arise in the context of service allocation in clouds. More specifically, they assume on the one part that each computing resource is associated with a capacity, that can be chosen using the Dynamic Voltage and Frequency Scaling (DVFS) method, and with a probability of...

    Provided By INRIA

  • White Papers // Aug 2013

    Folklore Confirmed: Compiling for Speed = Compiling for Energy

    The main motivations behind the arrival of multi-core processors were power and energy considerations. Increasing power density coupled with heat problems rendered untenable the premise that steadily increased performance could be achieved merely by steadily increasing processor clock speed. Multi-core processors were introduced based on the observation that multiple processors...

    Provided By INRIA

  • White Papers // Aug 2013

    GeCoS: A Framework for Prototyping Custom Hardware Design Flows

    GeCoS is an open source framework that provides a highly productive environment for hardware design. GeCoS primarily targets custom hardware design using High Level Synthesis, distinguishing itself from classical compiler infrastructures. Compiling for custom hardware makes use of domain specific semantics that are not considered by general purpose compilers. Finding...

    Provided By INRIA

  • White Papers // Aug 2013

    Proved Generation of Implementations from Computationally Secure Protocol Specifications

    In order to obtain implementations of security protocols proved secure in the computational model, the authors previously proposed the following approach: they write a specification of the protocol in the input language of the computational protocol verifier CryptoVerif, prove it secure using CryptoVerif, then generate an OCaml implementation of the...

    Provided By INRIA

  • White Papers // Aug 2013

    Collective Mind: Cleaning Up the Research and Experimentation Mess in Computer Engineering Using Crowdsourcing, Big Data and Machine Learning

    Software and hardware co-design and optimization of HPC systems has become intolerably complex, ad-hoc, time consuming and error prone due to enormous number of available design and optimization choices, complex interactions between all software and hardware components, and multiple strict requirements placed on performance, power consumption, size, reliability and cost....

    Provided By INRIA

  • White Papers // Aug 2013

    On the Impact of Network Topology on Wireless Sensor Networks Performances

    Wireless Sensor Networks (WSN) are composed of constrained devices and deployed in unattended and hostile environments. Most papers presenting solutions for WSN evaluate their work over random topologies to highlight some of their \"Good\" performances. They rarely study these behaviors over more than one topology. Yet, the topology used can...

    Provided By INRIA

  • White Papers // Aug 2013

    Reliable Service Allocation in Clouds with Memory and Capacity Constraints

    The authors consider allocation problems that arise in the context of service allocation in clouds. More specifically, on the one part they assume that each Physical Machine (denoted as PM) is offering resources (memory, CPU, disk, network). On the other part, they assume that each application in the IaaS cloud...

    Provided By INRIA

  • White Papers // Jul 2013

    Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions

    In this paper, the authors investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC'12. This new scheme can be provably reduced to the hardness of solving a set of quadratic equations whose coefficients of highest degree are chosen according to a discrete...

    Provided By INRIA

  • White Papers // Jul 2013

    CrystalGPU: Transparent and Efficient Utilization of GPU Power

    The explosion of the amount of data stored in cloud systems calls for more efficient paradigms for redundancy. While replication is widely used to ensure data availability, erasure correcting codes provide a much better trade-off between storage and availability. Regenerating codes are good candidates for they also offer low repair...

    Provided By INRIA

  • White Papers // Jul 2013

    Towards a Framework for Semantic Exploration of Frequent Patterns

    Mining frequent patterns is an essential task in discovering hidden correlations in datasets. Although frequent patterns unveil valuable information, there are some challenges which limit their usability. The number of possible patterns is often very large which hinders their effective exploration. Patterns with many items are hard to read and...

    Provided By INRIA

  • White Papers // Jul 2013

    Probabilistic Real-Time Systems

    Proposed originally as stochastic scheduling, the probabilistic real-time scheduling concerns real-time systems with at least one parameter described by a random variable. Any parameter of the task may have such description, but the existing work concentrates on the probabilistic worst-case execution times. This paper will provide the main results for...

    Provided By INRIA

  • White Papers // Jul 2013

    Privacy in Content-Oriented Networking: Threats and Countermeasures

    As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modern systems and applications. In particular, Content-Oriented Networking (CON) has emerged as promising next-generation Internet architecture: it sets to decouple content from hosts, at the network...

    Provided By INRIA

  • White Papers // Jul 2013

    Towards QoS-Oriented SLA Guarantees for Online Cloud Services

    Cloud computing provides a convenient means of remote on-demand and pay-per-use access to computing resources. However, its ad hoc management of quality-of-service and SLA poses significant challenges to the performance, dependability and costs of online cloud services. The paper precisely addresses this issue and makes a threefold contribution. It introduces...

    Provided By INRIA

  • White Papers // Jun 2013

    Model-driven Extraction and Analysis of Network Security Policies

    Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements,...

    Provided By INRIA

  • White Papers // Jun 2013

    A Prioritized Distributed Mutual Exclusion Algorithm Balancing Priority Inversions and Response Time

    Distributed priority-based mutual exclusion algorithms may present starvation for low priority requests if the shared resource is continuously asked by high priority requests. To address this problem, several existing algorithms dynamically increment the priority of pending low-priority requests. The drawback of this approach is that it may lead to a...

    Provided By INRIA

  • White Papers // Jun 2013

    DB2SNA: An All-in-One Tool for Extraction and Aggregation of Underlying Social Networks From Relational Databases

    In the enterprise context, people need to visualize different types of interactions between heterogeneous objects (e.g. product and site, customers and product, people interaction (social network)...). The existing approaches focus on social networks extraction using web document. However a considerable amount of information is stored in relational databases. Therefore, relational...

    Provided By INRIA

  • White Papers // May 2013

    Adapting Workflows Using Generic Schemas: Application to the Security of Business Processes

    Existing approaches to the adaptation of workflows over web services fall short in two respects. First, they only provide, if ever, limited means for taking into account the execution history of a workflow. Second, they do not support adaptations that require modifications not only at the service composition level but...

    Provided By INRIA

  • White Papers // May 2013

    Advanced Validation of the DVMS Approach to Fully Distributed VM Scheduling

    The holy grail for Infrastructure as a Service (IaaS) providers is to maximize the utilization of their infrastructure while ensuring the Quality of Service (QoS) for the virtual machines they host. Although the frameworks in charge of managing Virtual Machines (VM) on pools of physical ones (PM) have been significantly...

    Provided By INRIA

  • White Papers // May 2013

    Dynamic Scalability of a Consolidation Service

    In the coming years, cloud environments will increasingly face energy saving issues. While consolidating the virtual machines running in a cloud is a well-accepted solution to reduce the energy consumption, ensuring the scalability of the consolidation service remains a challenging issue. In this paper, the authors propose an elastic consolidation...

    Provided By INRIA

  • White Papers // May 2013

    Performance Modeling for Power Consumption Reduction on SCC

    As power is becoming one of the biggest challenge in high performance computing, the authors are proposing a performance model on the Single-chip Cloud Computer in order to predict both power consumption and runtime of regular codes. This model takes into account the frequency at which the cores of the...

    Provided By INRIA

  • White Papers // Jan 2011

    Euclidean Reconstruction: From Paraperspective to Perspective

    In this paper the authors describe a method to perform Euclidean reconstruction with a perspective camera model. It incrementally performs reconstruction with a paraperspective camera in order to converge towards a perspective model. With respect to other methods that compute shape and motion from a sequence of images with a...

    Provided By INRIA

  • White Papers // Oct 2009

    Cloud Computing Resource Management Through a Grid Middleware: A Case Study With DIET and Eucalyptus

    The Cloud phenomenon is quickly growing towards becoming the de facto standard of Internet Computing, storage and hosting both in industry and academia. The large scalability possibilities offered by Cloud platforms can be harnessed not only for services and applications hosting but also as a raw on-demand computing resource. This...

    Provided By INRIA

  • White Papers // Jan 2011

    Unsupervised Robust Clustering for Image Database Categorization

    Content-based image retrieval can be dramatically improved by providing a good initial database overview to the user. To address this issue, the authors present in this paper the Adaptive Robust Competition. This algorithm relies on a non-supervised database categorization, coupled with a selection of prototypes in each resulting category. In...

    Provided By INRIA

  • White Papers // Jan 2011

    A Formal Theory of Key Conjuring

    The authors describe a formalism for key conjuring, the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. This technique has been used to attack the security APIs of several Hardware Security Modules (HSMs), which...

    Provided By INRIA

  • White Papers // Jan 2010

    Extending INET Framework for Directional and Asymmetrical Wireless Communications

    This paper reports the work on extending the OMNeT++ INET Framework with a directional radio model, putting a special emphasis on the implementation of asymmetrical communications. The authors first analyze the original INET radio model, focusing on its design and components. Then they discuss the modifications that have been done...

    Provided By INRIA

  • White Papers // Jan 2011

    A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines

    This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. The authors describe how to pack the constant pool by deleting entries which are only used during the class loading process. They present some...

    Provided By INRIA

  • White Papers // Jan 2010

    Auction-Based Bandwidth Allocation Mechanisms for Wireless Future Internet

    An important aspect of the Future Internet is the efficient utilization of (wireless) network resources. In order for the - demanding in terms of QoS - Future Internet services to be provided, the current trend is evolving towards an "Integrated" wireless network access model that enables users to en-joy mobility,...

    Provided By INRIA

  • White Papers // Dec 2010

    A Log Auditing Approach for Trust Management in Peer-to-Peer Collaboration

    Nowadays the authors are faced with an increasing popularity of social software including wikis, blogs, micro-blogs and online social networks such as Facebook and MySpace. Unfortunately, the mostly used social services are centralized and personal information is stored at a single vendor. This results in potential privacy problems as users...

    Provided By INRIA

  • White Papers // Feb 2011

    Content Replication and Placement in Mobile Networks

    Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a static network can be cast...

    Provided By INRIA

  • White Papers // Feb 2011

    Key Reduction of McEliece's Cryptosystem Using List Decoding

    Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door to new attacks exploiting the underlying structure. In this paper, the authors show that the dyadic variant can be designed to resist...

    Provided By INRIA

  • White Papers // Mar 2011

    Authentication Planning for XOR Network Coding

    This paper formulates the authentication planning problem when network coding is implemented in a wireless sensor network. The planning problem aims at minimizing the energy consumed by the security application which is guarantied using message authentication codes. This paper proposes a binary non-linear optimization formulation for this planning problem whose...

    Provided By INRIA

  • White Papers // Mar 2011

    Adding Network Coding Capabilities to the WSNet Simulator

    The goal is to study the impact of different Network Coding strategies (NC) on end-to-end service delivery over mobile and wireless Disruption-Tolerant Networks (DTNs). To realize this study, in a first step, the authors simulate a mobile and wireless DTN environment. This report presents the context: DTN, NC and why...

    Provided By INRIA

  • White Papers // Feb 2011

    Predicting the Impact of Measures Against P2P Networks on the Transient Behaviors

    The paper has two objectives. The first is to study rigorously the transient behavior of some Peer-to-Peer (P2P) networks whenever information is replicated and disseminated according to epidemic-like dynamics. The second is to use the insight gained from the previous analysis in order to predict how efficient are measures taken...

    Provided By INRIA

  • White Papers // Mar 2011

    Attacking and Fixing Helios: An Analysis of Ballot Secrecy

    Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this paper, the authors analyse ballot secrecy and discover a vulnerability which allows an adversary to compromise the privacy of voters. This vulnerability has been successfully exploited to break privacy in a...

    Provided By INRIA

  • White Papers // Dec 2009

    An L(1/3) Discrete Logarithm Algorithm for Low Degree Curves

    The authors present an algorithm for solving the discrete logarithm problem in Jacobians of families of plane curves whose degrees in X and Y are low with respect to their genera. The finite base fields Fq are arbitrary, but their sizes should not grow too fast compared to the genus....

    Provided By INRIA

  • White Papers // Apr 2010

    Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials

    Verifiable encryption allows to encrypt a signature and prove that the plaintext is valid. The authors introduce a new primitive called commuting signature that extends verifiable encryption in multiple ways: a signer can encrypt both signature and message and prove validity; more importantly, given a ciphertext, a signer can create...

    Provided By INRIA

  • White Papers // Sep 2010

    OSPF Over Multi-Hop Ad Hoc Wireless Communications

    Efficient OSPF (Open Shortest Path First) operation on multi-hop ad hoc wireless networks has become desirable, as wireless community mesh networks and vehicular networks emerge using OLSR (Optimized Link State Routing), a link state MANET routing protocol similar to OSPF in many aspects. OSPF is already extensively deployed and well...

    Provided By INRIA

  • White Papers // Jan 2011

    Authenticated Interleaved Encryption

    The authors present AIE (Authenticated Interleaved Encryption), a new scheme that allows nodes of a network to exchange messages securely (i.e. encrypted and authenticated) without sharing a common key or using public key cryptography. The scheme is well adapted to networks, such as ad hoc, overlay or sensor networks, where...

    Provided By INRIA

  • White Papers // Nov 2009

    Optimal Mobile Association on Hybrid Networks: Centralized and Decentralized Case

    This paper proposes a new approach based on optimal transport theory to model network topologies for purpose of strategic planning and optimal design. The authors study the SINR mobile association game: They determine the cells corresponding to each base station, i.e., the locations at which mobile terminals prefer to connect...

    Provided By INRIA

  • White Papers // Jan 2010

    XQueC: Pushing Queries to Compressed XML Data

    Initially proposed as a data interchange format, XML aims also at becoming a format for data storage and management. However, XML documents in their textual form are rather verbose and tend to predate disk space, due to the textual and repetitive nature of the XML tags and of several XML...

    Provided By INRIA

  • White Papers // Sep 2009

    Efficient Soft QoS Guarantee in Mobile Ad Hoc Networks

    More and more Quality of Service (QoS) sensitive applications, such as streaming media, high bandwidth content distribution and VoIP, will be deployed in Mobile Ad hoc Networks (MANETs) as part of the pervasive computing realization. However, traditional QoS guarantee technologies cannot be used directly in MANETs due to the dynamic...

    Provided By INRIA

  • White Papers // Oct 2009

    Integrating Java Support for Routing Protocols in NS2

    This paper presents a modification of the existing tool AgentJ which allows for running a Java routing protocol within the network simulator NS2. When designing a new routing protocol, an important step in its development is often to implement and experiment with it in a network simulator such as NS2....

    Provided By INRIA

  • White Papers // Sep 2010

    Linked Data From Your Pocket: The Android RDFContentProvider

    Smartphones are becoming main personal information repositories. Unfortunately this information is stored in independent silos managed by applications. The authors have seen that already: in the Palm operating system, application "Databases" were only accessible when the application schemas were known and worked by opening other application databases. The goal is...

    Provided By INRIA

  • White Papers // Jun 2011

    Web Information Management With Access Control

    The authors investigate the problem of sharing private information on the Web, where the information is hosted on different machines that may use different access control and distribution schemes. They introduce a distributed knowledge-base model, termed WEBDAMEXCHANGE, which comprises logical statements for specifying data, access control, distribution and knowledge about...

    Provided By INRIA

  • White Papers // Jul 2011

    Automatic Multi-GPU Code Generation Applied to Simulation of Electrical Machines

    The electrical and electronic engineering has used parallel programming to solve its large scale complex problems for performance reasons. However, as parallel programming requires a non-trivial distribution of tasks and data, developers find it hard to implement their applications effectively. Thus, in order to reduce design complexity, the authors propose...

    Provided By INRIA

  • White Papers // Apr 2010

    On the Selection of Cluster Heads in MANETs

    Clustering schemes offer a practical way of providing scalability when dealing with large and dense Mobile Ad hoc NETworks (MANETs). The feasibility of a clustering method can be primarily determined by the complexity of the cluster head selection. Optimizing the cluster head selection allows for the network to be more...

    Provided By INRIA

  • White Papers // Jul 2011

    An Efficient Attack on All Concrete KKS Proposals

    Kabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme based on a couple of random error-correcting codes. A variation of this scheme was proposed recently and was proven to be EUF-1CMA secure in the random oracle model. In this paper, the authors investigate the security of these schemes...

    Provided By INRIA

  • White Papers // May 2010

    A Machine-Checked Formalization of Sigma-Protocols

    Proofs of knowledge are two-party interactive protocols where one party, called the prover, convinces the other one, called the verifier, that she knows something. Typically, both parties share a common input x and something refers to a witness w of membership of the input x to an N P language....

    Provided By INRIA

  • White Papers // Apr 2011

    Sparse Image Representation With Epitomes

    Sparse coding, which is the decomposition of a vector using only a few basis elements, is widely used in machine learning and image processing. The basis set, also called dictionary, is learned to adapt to specific data. This approach has proven to be very effective in many image processing tasks....

    Provided By INRIA

  • White Papers // Mar 2011

    On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model

    Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictability and collision-resistance) on the set of Related-Key-Deriving (RKD) functions under which an ideal cipher is secure against related-key attacks, and suggested this could be used to derive security goals for...

    Provided By INRIA

  • White Papers // Jan 2011

    Security of Multithreaded Programs by Compilation

    Information security is a pressing challenge for mobile code technologies. In order to claim end-to-end security of mobile code, it is necessary to establish that the code neither intentionally nor accidentally propagates sensitive information to an adversary. Although mobile code is commonly multithreaded low-level code, the literature is lacking enforcement...

    Provided By INRIA

  • White Papers // Jul 2010

    Enforcing Secure Object Initialization in Java

    Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by...

    Provided By INRIA

  • White Papers // Nov 2010

    A Theory of Distributed Aspects

    Distributed applications are more complex to develop than sequential applications, mainly because of synchronization issues and distribution of the code across the network. It has been advocated that traditional programming languages do not allow to separate distribution concerns from standard functional concerns in a satisfactory way. For instance, data replication,...

    Provided By INRIA

  • White Papers // Jan 2011

    OLSR for IPv6 Networks

    Mobile ad-hoc networks are infrastructure-free, highly dynamics wireless networks, which enjoy sustained interest, especially, inside IETF within the MANET working-group. One of the MANET protocols which have been recently promoted to experimental RFC is the OLSR routing protocol, on which this paper focuses. Like many MANET routing protocols, the adaptation...

    Provided By INRIA

  • White Papers // Jan 2011

    Self-Organization in Large Scale Ad Hoc Networks

    Flat ad hoc architectures are not scalable. In order to overcome this major drawback, hierarchical routing is introduced since it is found to be more effective. The main challenge in hierarchical routing is to group nodes into clusters. Each cluster is represented by one cluster head. Conventional methods use either...

    Provided By INRIA

  • White Papers // May 2011

    On Constructing Homomorphic Encryption Schemes From Coding Theory

    Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the recent decades but none of them was based on coding theory. The existence of such schemes would be interesting for several reasons. First, it is well...

    Provided By INRIA

  • White Papers // May 2011

    Learning Structured Prediction Models for Interactive Image Labeling

    The authors propose structured models for image labeling that take into account the dependencies among the image labels explicitly. These models are more expressive than independent label predictors, and lead to more accurate predictions. While the improvement is modest for fully-automatic image labeling, the gain is significant in an interactive...

    Provided By INRIA

  • White Papers // Apr 2010

    Multi-Facet Approach to Reduce Energy Consumption in Clouds and Grids: The GREEN-NET Framework

    This paper presents an integrated framework for energy savings in large scale distributed systems such as grids and clouds. The framework comprises tools and mechanisms: to measure and log data about the energy consumed by resources; to present this information to users; to involve the users in decisions to reduce...

    Provided By INRIA

  • White Papers // Feb 2012

    Worst-Case to Average-Case Reductions for Module Lattices

    Most lattice-based cryptographic schemes are built upon the assumed hardness of the Short Integer Solution (SIS) and Learning With Errors (LWE) problems. Their efficiencies can be drastically improved by switching the hardness assumptions to the more compact Ring-SIS and Ring-LWE problems. However, this change of hardness assumptions comes along with...

    Provided By INRIA

  • White Papers // Jan 2012

    Security Proof With Dishonest Keys

    Symbolic and computational models are the two families of models for rigorously analyzing security protocols. Symbolic models are abstract but offer a high level of automation while computational models are more precise but security proof can be tedious. Since the seminal work of Abadi and Rogaway, a new direction of...

    Provided By INRIA