Korea University

Displaying 1-40 of 63 results

  • White Papers // Jan 2014

    A Low-Power Architecture for Maximum a Posteriori Decoding

    In this paper, the authors present a novel architecture for Soft-Input Soft-Output (SISO) Maximum A Posteriori (MAP) decoding. The architecture leverages an ASIP (Application Specific Instruction-set Processor) structure, where the datapath has been designed to achieve high-speed performance and low power dissipation. Salient features of this architecture include: delayed renormalization...

    Provided By Korea University

  • White Papers // Nov 2013

    Byte-index Chunking Algorithm for Data Deduplication System

    This paper presents an algorithm and structure for a de-duplication method which can be efficiently used for eliminating identical data between files existing different machines with high rate and performing it within rapid time. The algorithm predicts identical parts between source and destination files very fast, and then assures the...

    Provided By Korea University

  • White Papers // Jul 2013

    Security Scheme for High Capacity USIM-Based Services

    As the USIM technologies are evolving to include high speed CPU, mass storage devices, and high speed serial interfaces, various services are to be available through those technologies. The high capacity USIM card is a combination of IC card and high capacity flash memory. Because the flash memory does not...

    Provided By Korea University

  • White Papers // Jan 2013

    Code Graph for Malware Detection

    When an application program is executed for the first time, the results of its execution are not always predictable. Since the host will be damaged by a malware as soon as it is executed, detecting and blocking the malware before its execution is the most effective means of protection. In...

    Provided By Korea University

  • White Papers // Jan 2013

    A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

    Recently, Malware have been created in order to commit a theft user's permission via C&C botnet and stopover server. It makes information leakage by arbitrarily modifying or creation of system files. It defines the limitation of conventional pattern matching and signature detection of vaccine. Digital forensics techniques that have been...

    Provided By Korea University

  • White Papers // Dec 2012

    Virtual Machines Placement for Network Isolation in Clouds

    Performance isolation is a serious issue in multi-tenant data center because interference among tenants can cause immense service troubles. Therefore, the present data center provides performance isolation among tenants. However, it is limited to system resources, not network resources, nevertheless oversubscription that is caused by network interference entails troubles. Therefore,...

    Provided By Korea University

  • White Papers // Oct 2012

    SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof Memory

    A smart grid is verging on a promising technology for reforming global electrical grids. Currently, attackers compromise security and privacy by maliciously modifying the memory of smart grid devices. To thwart such attacks, software-based attestation protocols ensure the absence of malicious changes. A verifier and a target device locally generate...

    Provided By Korea University

  • White Papers // Oct 2012

    MCSC: Mobile Collaborative Service Cloud Using Instant Adaptive Orchestration and Mashup

    Although, there are various kinds of mobile application technologies, users spend time with their Smartphone mostly surfing the Internet, playing games, and communicating with their friends because the computing power of Smartphone still lags behind other devices in terms of resources such as CPU, memory, etc. Furthermore, in many cases,...

    Provided By Korea University

  • White Papers // Oct 2012

    The Research on Social Influence-Based Cache Replacement Policy Over Wireless Information-Centric Network

    Information-Centric Network (ICN) is a new paradigm, which solve the limitations of the IP network architecture. The one of the advantage in ICN is that it reduces network traffic by using in-network caching. The caching is an important element of the ICN, because the factor that leads to efficient usage...

    Provided By Korea University

  • White Papers // Oct 2012

    Compliance Risk Assessment Measures of Financial Information Security Using System Dynamics

    In this paper, the authors analyze relationships between EFT (Electronic Financial Transaction) Act of Korea and risk assessment standards and propose the map that helps financial institutions determine the priority of security control areas. It is a new method for financial information security risk identification and assessment through correlation analysis...

    Provided By Korea University

  • White Papers // Jul 2012

    Differential Fault Analysis on Block Cipher Piccolo

    Recently, the research on ultra-lightweight block ciphers suitable for the efficient implementation in constrained hardware environments such as RFID tags and sensor nodes has been studied. As a result, KATAN/KTANTAN, PRINTcipher, LED and Piccolo were proposed. A 64-bit block cipher Piccolo proposed in CHES 2011 supports 80- and 128- bit...

    Provided By Korea University

  • White Papers // May 2012

    An Efficient Linear MMSE Receiver for Wireless Ad Hoc Networks

    Recent works on ad hoc network study have shown that achievable throughput can be made to scale linearly with the number of receive antennas even if the transmitter has only a single antenna. In this paper, the authors propose a non-parametric linear Minimum Mean Square Error (MMSE) receiver for achieving...

    Provided By Korea University

  • White Papers // May 2012

    Channel Quantization Algorithm for MIMO Interference Alignment With Limited Feedback

    When perfect Channel State Information (CSI) is available at each transmitter in K-user Multiple-Input Multiple-Output (MIMO) interference channels, it was shown that Interference Alignment (IA) achieves a full spatial multiplexing gain. However, a significant performance loss is inevitable in the IA when the CSI is fed back from receivers using...

    Provided By Korea University

  • White Papers // May 2012

    An Effective Link Error Prediction Technique for MIMO-OFDM Systems With ML Receiver

    In this paper, the authors propose an accurate link performance abstraction technique for Multiple-Input Multiple-Output (MIMO) orthogonal frequency-division multiplexing systems with Maximum Likelihood (ML) receiver. The performance of ML Detection (MLD) is estimated by using capacity bounds of two simple linear receivers. To this end, they give a simple parametrization...

    Provided By Korea University

  • White Papers // May 2012

    On Feasibility of Interference Alignment and Cancellation for Gaussian Interference Multiple Access Channel

    The feasibility condition for Interference Alignment (IA) with no channel extension has not been known yet. In this paper, for the first time, the authors explore the feasibility of Interference Alignment and Cancellation (IAC) which has been proposed for IA with no channel extension. They investigate IAC for the Gaussian...

    Provided By Korea University

  • White Papers // May 2012

    Detection of Cache Pollution Attacks Using Randomness Checks

    The Internet plays an increasing role in content dissemination as user-generated contents have exploded recently. Cache servers have been deployed to bypass bottlenecks in the network so that contents can be delivered to end users more efficiently. With caches becoming more embedded in the networks, emerging threats follow naturally. A...

    Provided By Korea University

  • White Papers // May 2012

    Limited Feedback Designs for Two-Way Wireless Relaying Channels With Physical Network Coding

    In this paper, the authors propose a limited feedback system for two-way wireless relaying channels with Physical Network Coding (PNC). The optimal system with full feedback has already been studied when a modulo operation is employed for the PNC. In this case, phase and power of channels of two end...

    Provided By Korea University

  • White Papers // May 2012

    On the Capacity of MIMO Distributed Antenna Systems

    In this paper, the authors investigate the ergodic capacity for distributed antenna systems over Rayleigh fadings, including a distance-dependent pathloss model. Based on the proof of asymptotic normality, the mean and the variance of the instantaneous capacity were recently presented as a closed form solution, which includes a root of...

    Provided By Korea University

  • White Papers // May 2012

    Joint Transceiver and Relay Beamforming Design for Multi-Pair Two-Way Relay Systems

    In this paper, the authors propose a simple yet effective beamforming technique for Multiple-Input Multiple-Output (MIMO) multi-pair two-way relay channels. Two key ingredients in their technique are adoption of Signal Space Alignment (SSA) for transmit and receive beamforming and Amplify-and-Forward (AF) relay beamforming based on advanced Zero-Forcing (ZF) criterion. From...

    Provided By Korea University

  • White Papers // Apr 2012

    A Novel Biometric Identification Based on a User's Input Pattern Analysis for Intelligent Mobile Devices

    As intelligent mobile devices become more popular, security threats targeting them are increasing. The resource constraints of mobile devices, such as battery life and computing power, however, make it harder to handle such threats effectively. The existing physical and behavioral biometric identification methods ? looked upon as good alternatives ?...

    Provided By Korea University

  • White Papers // Mar 2012

    Random Access Transport Capacity of Dual-Hop AF Relaying in a Wireless Ad Hoc Network

    To account for randomly distributed nodes in a wireless ad hoc network, the random access transport capacity is defined as the average maximum rate of successful end-to-end transmission over some distance. In this paper, the authors consider a random access transport capacity for a dual-hop relaying to find the end-to-end...

    Provided By Korea University

  • White Papers // Mar 2012

    Hybrid Division Cooperative Transmission Scheme for LTE Enterprise Femtocell Networks

    In this paper, the authors propose a Hybrid Division Cooperative Transmission (HDCT) scheme for system throughput enhancement in enterprise femtocell systems. In HDCT scheme, a Cooperative Transmission (CT) scheme is applied to User Equipments (UEs) located at the edge of a serving femtocell Base Station (fBS), whereas conventional scheme is...

    Provided By Korea University

  • White Papers // Dec 2011

    Performance Isolation of Network Virtualization for Cloud Computing

    Network virtualization is a study that supports future internet environment and Cloud computing. The network virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable services. One of typical study of network virtualization is software based router which has many advantages such as relatively low cost,...

    Provided By Korea University

  • White Papers // Dec 2011

    Fingerprint Template Protection: From Theory to Practice

    One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high...

    Provided By Korea University

  • White Papers // Dec 2011

    Parallel Data Processing with MapReduce: A Survey

    A prominent parallel data processing tool MapReduce is gaining significant momentum from both industry and academia as the volume of data to analyze grows rapidly. While MapReduce is used in many areas where massive data analysis is required, there are still debates on its performance, efficiency per node, and simple...

    Provided By Korea University

  • White Papers // Nov 2011

    Traffic Flooding Attack Detection and Classification With SNMP MIB Via SVDD and Sparse Representation

    Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data,...

    Provided By Korea University

  • White Papers // Jun 2011

    Advanced Information Security Management Evaluation System

    Information Security Management Systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs....

    Provided By Korea University

  • White Papers // May 2011

    Detecting Malicious Web Links and Identifying Their Attack Types

    Malicious URLs have been widely used to mount various cyber attacks including spamming, phishing and malware. Detection of malicious URLs and identification of threat types are critical to thwart these attacks. Knowing the type of a threat enables estimation of severity of the attack and helps adopt an effective countermeasure....

    Provided By Korea University

  • White Papers // Mar 2011

    Sign-Select Lookahead CORDIC Based High-Speed QR Decomposition Architecture for MIMO Receiver Applications

    This paper presents a high-speed QR decomposition architecture for the Multi-Input-Multi-Output (MIMO) receiver based on Givens rotation. Under fast-varying channel, since the inverse matrix calculation has to be performed frequently in MIMO receiver, a high performance and low latency QR decomposition module is highly required. The proposed QR decomposition architecture...

    Provided By Korea University

  • White Papers // Jan 2011

    Optimized Fast Handover in Mobile Network

    The Next-Generation Network (NGN) is a new concept commonly used by network designers to depict their vision of future networks. The NGN wireless networks are intended to support new real time application, which have to deal with tight time constraints in order to offer adequate quality of network services. As...

    Provided By Korea University

  • White Papers // Dec 2010

    PolyHype: Towards Poly-Hypervisor Platform for Cloud Computing

    This paper presents PolyHype, a novel architecture that leverages the power of emerging many-core based cloud-on-chip systems to support multiple hypervisors (or virtual machine monitors) on a single physical platform. A PolyHype platform consists of a control plane and multiple hypervisors created on-demand. Each hypervisor can further create multiple guest...

    Provided By Korea University

  • White Papers // Nov 2010

    Efficient Algorithms for Topology Control Problem With Routing Cost Constraints in Wireless Networks

    Topology control is one vital factor to a wireless network's efficiency. A Connected Dominating Set (CDS) can be a useful basis of a backbone topology construction. In this paper, a special CDS, named ��? Minimum rOuting Cost CDS (?-MOC-CDS), will be studied to improve the performance of CDS based broadcasting...

    Provided By Korea University

  • White Papers // Nov 2010

    A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-Based Nested NEMO

    In nested NEMO, a multi-tunneling causes a pinball routing problem. Several solutions proposed to solve the pinball routing problem in NEMO BSP cannot be used at PMIPv6-based NEMO due to different environment such as no route optimization with CN. The authors propose a tunnel compress scheme for multi-tunneling in PMIPv6-based...

    Provided By Korea University

  • White Papers // Oct 2010

    Reactive Clock Synchronization for Wireless Sensor Networks With Asynchronous Wakeup Scheduling

    Most of the existing clock synchronization algorithms for wireless sensor networks can be viewed as proactive clock synchronization since they require nodes to periodically synchronize their clock to a reference node regardless of whether they use time information or not. However, the proactive approach wastes unnecessary energy and bandwidth when...

    Provided By Korea University

  • White Papers // Sep 2010

    Network Mobility Support Scheme on PMIPv6 Networks

    NEMO (Network Mobility) is proposed to support node mobility collectively. NEMO BSP is the most popular protocols to support NEMO based on MIPv6. However it does not satisfy requirements of real-time and interactive application due to problems, such as long signaling delay and movement detection time. Also MN should have...

    Provided By Korea University

  • White Papers // Aug 2010

    On Matching Forensic Sketches to Mugshot Photos

    The problem of matching a forensic sketch to a gallery of mugshot images is addressed in this paper. Previous research in sketch matching offered solutions to matching highly accurate sketches that were drawn while looking at the subject. The authors refer to these as viewed sketches. Forensic sketches differ from...

    Provided By Korea University

  • White Papers // Jun 2010

    Efficient In-Network Redundancy Filtering in RFID System Integrated With Wireless Sensor Networks

    RFID promises to revolutionize the process of identifying, tracking, and monitoring physical objects. Additionally, RFID integration with wireless sensor networks helps both in terms of scalability and low cost of networks. However, redundancies in RFID data occur due to two reasons: the methods needed to counteract the unreliable nature of...

    Provided By Korea University

  • White Papers // Jun 2010

    DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks

    Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is the required part of the key management. Among of key revocation schemes,...

    Provided By Korea University

  • White Papers // Mar 2010

    2010 Seoul Summit And Future Of Financial Supervisory Board (FSB) As The Fourth Pillar

    G-20 schedules Seoul Summit in Nov. 2010 two years after Nov. 14-15, 2008 Washington Summit adopted five principles and 26 action items. The most significant action item to be completed by March 2009 was to reinvent the FSF with expanded membership as the FSB - the focal arena to find...

    Provided By Korea University

  • White Papers // Mar 2010

    Controllability of Touch-Screen Phones Based on Various Grip Postures

    The level of competition has reached the limits in cellular phone market and the cellular phone manufacturers started to focus their solution in user interface. Design issues with controllability led the development and renovation of such products to the use of touch-screen phone. Touch-screen phones enhanced controllability through the instinctive...

    Provided By Korea University

  • White Papers // Nov 2008

    An Efficient Content Distribution Method Using Segment Metadata Annotation in CDN

    Recently, user who uses a multimedia files demand a high capacity file via internet. However, it is difficult to guarantee QoS about providing high capacity files by internet because that has an inconstant bandwidth. For guaranteeing the QoS, CDN (Content Delivery Network) is generally used as a method of contents...

    Provided By Korea University

  • White Papers // Oct 2010

    Reactive Clock Synchronization for Wireless Sensor Networks With Asynchronous Wakeup Scheduling

    Most of the existing clock synchronization algorithms for wireless sensor networks can be viewed as proactive clock synchronization since they require nodes to periodically synchronize their clock to a reference node regardless of whether they use time information or not. However, the proactive approach wastes unnecessary energy and bandwidth when...

    Provided By Korea University

  • White Papers // Mar 2010

    2010 Seoul Summit And Future Of Financial Supervisory Board (FSB) As The Fourth Pillar

    G-20 schedules Seoul Summit in Nov. 2010 two years after Nov. 14-15, 2008 Washington Summit adopted five principles and 26 action items. The most significant action item to be completed by March 2009 was to reinvent the FSF with expanded membership as the FSB - the focal arena to find...

    Provided By Korea University

  • White Papers // Dec 2009

    Differential Dynamic Traffic Control for IEEE 802.15.4 Networks

    IEEE 802.15.4 provides beacon enabled and non-beacon enabled modes. Beacon enabled mode is generally used for energy efficiency. However, the main problem of beacon enabled mode is the fixed superframe structure that leads to inefficient transmission in dynamic traffic conditions. Moreover, 802.15.4 does not provide differential service according to traffic...

    Provided By Korea University

  • White Papers // Dec 2010

    PolyHype: Towards Poly-Hypervisor Platform for Cloud Computing

    This paper presents PolyHype, a novel architecture that leverages the power of emerging many-core based cloud-on-chip systems to support multiple hypervisors (or virtual machine monitors) on a single physical platform. A PolyHype platform consists of a control plane and multiple hypervisors created on-demand. Each hypervisor can further create multiple guest...

    Provided By Korea University

  • White Papers // May 2009

    On Real-Time Capacity of Event-Driven Data-Gathering Sensor Networks

    Network capacity is a critical feature of wireless ad hoc and sensor networks. It is particularly challenging to determine network capacity when combined with other performance objectives such as timeliness. This paper investigates real-time capacity for event-driven data-gathering sensor networks with unbalanced many-to-one traffic patterns. First, the authors compute the...

    Provided By Korea University

  • White Papers // Dec 2009

    Heterogenous Quorum-Based Wakeup Scheduling in Wireless Sensor Networks

    The authors present heterogeneous quorum-based asynchronous wake-up scheduling schemes for wireless sensor networks. The schemes can ensure that two nodes that adopt different quorum systems as their wake-up schedules can hear each other at least once in bounded time intervals. They propose two such schemes: cyclic quorum system pair (cqs-pair)...

    Provided By Korea University

  • White Papers // Dec 2009

    An Intelligent and Reliable Data Transmission Protocol for Highly Destructible Wireless Sensor Networks

    Destructible Wireless Sensor Network (DWSN) is a type of WSN deployed for a class of special applications that have the common requirement on instantly responding to collecting and transmitting sensory data, e.g., for volcanic eruption monitoring or nuclear leakage detection. In this paper, the authors present an Intelligent and Reliable...

    Provided By Korea University

  • White Papers // Jul 2009

    Energy-Efficient Freshness Transmission Protocol in Wireless Sensor Networks

    Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and...

    Provided By Korea University

  • White Papers // Jan 2011

    Optimized Fast Handover in Mobile Network

    The Next-Generation Network (NGN) is a new concept commonly used by network designers to depict their vision of future networks. The NGN wireless networks are intended to support new real time application, which have to deal with tight time constraints in order to offer adequate quality of network services. As...

    Provided By Korea University

  • White Papers // Jun 2010

    DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks

    Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is the required part of the key management. Among of key revocation schemes,...

    Provided By Korea University

  • White Papers // Jun 2010

    Efficient In-Network Redundancy Filtering in RFID System Integrated With Wireless Sensor Networks

    RFID promises to revolutionize the process of identifying, tracking, and monitoring physical objects. Additionally, RFID integration with wireless sensor networks helps both in terms of scalability and low cost of networks. However, redundancies in RFID data occur due to two reasons: the methods needed to counteract the unreliable nature of...

    Provided By Korea University

  • White Papers // Mar 2009

    A Linear-Complexity Burst Packing Scheme for IEEE 802.16e OFDMA Downlink Frames

    The problem of efficiently shaping downlink data bursts into rectangles and packing them in the OFDMA subframe is not addressed by the IEEE 802.16 standard, and is left as an implementation issue. In this paper, the authors propose a linear complexity bursts packing algorithm to maximize radio resources usage on...

    Provided By Korea University

  • White Papers // Feb 2009

    Throughput Analysis of Band-AMC Scheme in Broadband Wireless OFDMA System

    In broadband wireless Orthogonal Frequency Division Multiple Access (OFDMA) systems where a set of sub-carriers are shared among multiple users, the overall system throughput can be improved by a band-AMC mode that assigns each suband, a set of contiguous sub-carriers within a coherence bandwidth, to individual user with the better...

    Provided By Korea University

  • White Papers // Jun 2011

    Advanced Information Security Management Evaluation System

    Information Security Management Systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs....

    Provided By Korea University

  • White Papers // Dec 2011

    Fingerprint Template Protection: From Theory to Practice

    One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high...

    Provided By Korea University

  • White Papers // Jan 2010

    A Study of Multibiometric Traits of Identical Twins

    The increase in twin births has created a requirement for biometric systems to accurately determine the identity of a person who has an identical twin. The discriminability of some of the identical twin biometric traits, such as fingerprints, iris, and palmprints, is supported by anatomy and the formation process of...

    Provided By Korea University

  • White Papers // Aug 2010

    On Matching Forensic Sketches to Mugshot Photos

    The problem of matching a forensic sketch to a gallery of mugshot images is addressed in this paper. Previous research in sketch matching offered solutions to matching highly accurate sketches that were drawn while looking at the subject. The authors refer to these as viewed sketches. Forensic sketches differ from...

    Provided By Korea University

  • White Papers // Nov 2011

    Traffic Flooding Attack Detection and Classification With SNMP MIB Via SVDD and Sparse Representation

    Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data,...

    Provided By Korea University

  • White Papers // Oct 2012

    MCSC: Mobile Collaborative Service Cloud Using Instant Adaptive Orchestration and Mashup

    Although, there are various kinds of mobile application technologies, users spend time with their Smartphone mostly surfing the Internet, playing games, and communicating with their friends because the computing power of Smartphone still lags behind other devices in terms of resources such as CPU, memory, etc. Furthermore, in many cases,...

    Provided By Korea University

  • White Papers // Oct 2012

    The Research on Social Influence-Based Cache Replacement Policy Over Wireless Information-Centric Network

    Information-Centric Network (ICN) is a new paradigm, which solve the limitations of the IP network architecture. The one of the advantage in ICN is that it reduces network traffic by using in-network caching. The caching is an important element of the ICN, because the factor that leads to efficient usage...

    Provided By Korea University

  • White Papers // May 2012

    An Efficient Linear MMSE Receiver for Wireless Ad Hoc Networks

    Recent works on ad hoc network study have shown that achievable throughput can be made to scale linearly with the number of receive antennas even if the transmitter has only a single antenna. In this paper, the authors propose a non-parametric linear Minimum Mean Square Error (MMSE) receiver for achieving...

    Provided By Korea University

  • White Papers // May 2012

    Channel Quantization Algorithm for MIMO Interference Alignment With Limited Feedback

    When perfect Channel State Information (CSI) is available at each transmitter in K-user Multiple-Input Multiple-Output (MIMO) interference channels, it was shown that Interference Alignment (IA) achieves a full spatial multiplexing gain. However, a significant performance loss is inevitable in the IA when the CSI is fed back from receivers using...

    Provided By Korea University

  • White Papers // May 2012

    An Effective Link Error Prediction Technique for MIMO-OFDM Systems With ML Receiver

    In this paper, the authors propose an accurate link performance abstraction technique for Multiple-Input Multiple-Output (MIMO) orthogonal frequency-division multiplexing systems with Maximum Likelihood (ML) receiver. The performance of ML Detection (MLD) is estimated by using capacity bounds of two simple linear receivers. To this end, they give a simple parametrization...

    Provided By Korea University

  • White Papers // May 2012

    On Feasibility of Interference Alignment and Cancellation for Gaussian Interference Multiple Access Channel

    The feasibility condition for Interference Alignment (IA) with no channel extension has not been known yet. In this paper, for the first time, the authors explore the feasibility of Interference Alignment and Cancellation (IAC) which has been proposed for IA with no channel extension. They investigate IAC for the Gaussian...

    Provided By Korea University

  • White Papers // May 2012

    Detection of Cache Pollution Attacks Using Randomness Checks

    The Internet plays an increasing role in content dissemination as user-generated contents have exploded recently. Cache servers have been deployed to bypass bottlenecks in the network so that contents can be delivered to end users more efficiently. With caches becoming more embedded in the networks, emerging threats follow naturally. A...

    Provided By Korea University

  • White Papers // Mar 2010

    Controllability of Touch-Screen Phones Based on Various Grip Postures

    The level of competition has reached the limits in cellular phone market and the cellular phone manufacturers started to focus their solution in user interface. Design issues with controllability led the development and renovation of such products to the use of touch-screen phone. Touch-screen phones enhanced controllability through the instinctive...

    Provided By Korea University

  • White Papers // Nov 2010

    Efficient Algorithms for Topology Control Problem With Routing Cost Constraints in Wireless Networks

    Topology control is one vital factor to a wireless network's efficiency. A Connected Dominating Set (CDS) can be a useful basis of a backbone topology construction. In this paper, a special CDS, named ��? Minimum rOuting Cost CDS (?-MOC-CDS), will be studied to improve the performance of CDS based broadcasting...

    Provided By Korea University

  • White Papers // Jun 2009

    Infinite Density At The Median And The Typical Shape Of Stock Return Distributions

    Statistics are developed to test for the presence of an asymptotic discontinuity (or infinite density or peakedness) in a probability density at the median. The approach makes use of work by Knight (1998) on L1 estimation asymptotic in conjunction with non-parametric kernel density estimation methods. The size and power of...

    Provided By Korea University

  • White Papers // Jan 2010

    Auctioning Process Innovations When Losers~ Bids Determine Royalty Rates

    The authors consider a licensing mechanism for process innovations that combines a license auction with royalty contracts to those who lose the auction. Firms' bids are dual signals of their cost reductions: the winning bid signals the own cost reduction to rival oligopolists, whereas the losing bid influences the beliefs...

    Provided By Korea University

  • White Papers // Sep 2010

    Network Mobility Support Scheme on PMIPv6 Networks

    NEMO (Network Mobility) is proposed to support node mobility collectively. NEMO BSP is the most popular protocols to support NEMO based on MIPv6. However it does not satisfy requirements of real-time and interactive application due to problems, such as long signaling delay and movement detection time. Also MN should have...

    Provided By Korea University

  • White Papers // Nov 2010

    A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-Based Nested NEMO

    In nested NEMO, a multi-tunneling causes a pinball routing problem. Several solutions proposed to solve the pinball routing problem in NEMO BSP cannot be used at PMIPv6-based NEMO due to different environment such as no route optimization with CN. The authors propose a tunnel compress scheme for multi-tunneling in PMIPv6-based...

    Provided By Korea University

  • White Papers // Jun 2009

    Low Energy Method for Data Delivery in Ubiquitous Network

    Recent advances in wireless sensor networks have led to many routing methods designed for energy-efficiency in wireless sensor networks. Despite that many routing methods have been proposed in USN, a single routing method cannot be energy-efficient if the environment of the ubiquitous sensor network varies. The authors present the controlling...

    Provided By Korea University

  • White Papers // Jun 2009

    A Trust Model Using Fuzzy Logic in Wireless Sensor Network

    Adapting various sensor devices to communicate within sensor networks empowers one by providing range of possibilities. The sensors in sensor networks need to know their measurable belief of trust for efficient and safe communication. In this paper, the authors suggested a trust model using fuzzy logic in sensor network. Trust...

    Provided By Korea University

  • White Papers // Jun 2009

    Bitrate Reduction Using FMO for Video Streaming Over Packet Networks

    Flexible Macroblock Ordering (FMO), adopted in the H.264 standard, allows to partition all MacroBlocks (MBs) in a frame into separate groups of MBs called Slice Groups (SGs). FMO can not only support error-resilience, but also control the size of video packets for different network types. However, it is well-known that...

    Provided By Korea University

  • White Papers // Mar 2011

    Sign-Select Lookahead CORDIC Based High-Speed QR Decomposition Architecture for MIMO Receiver Applications

    This paper presents a high-speed QR decomposition architecture for the Multi-Input-Multi-Output (MIMO) receiver based on Givens rotation. Under fast-varying channel, since the inverse matrix calculation has to be performed frequently in MIMO receiver, a high performance and low latency QR decomposition module is highly required. The proposed QR decomposition architecture...

    Provided By Korea University

  • White Papers // Nov 2009

    On Classifying and Evaluating the Effect of Jamming Attacks

    While various wireless networks have advanced rapidly and become an indispensable infrastructure in the network environment, jamming attacks are the common challenging problem that makes them unavailable. Jamming attack is easy to be launched with little efforts while its damage is severe since it disrupts the communication of all the...

    Provided By Korea University

  • White Papers // May 2011

    Detecting Malicious Web Links and Identifying Their Attack Types

    Malicious URLs have been widely used to mount various cyber attacks including spamming, phishing and malware. Detection of malicious URLs and identification of threat types are critical to thwart these attacks. Knowing the type of a threat enables estimation of severity of the attack and helps adopt an effective countermeasure....

    Provided By Korea University

  • White Papers // Jan 2013

    Code Graph for Malware Detection

    When an application program is executed for the first time, the results of its execution are not always predictable. Since the host will be damaged by a malware as soon as it is executed, detecting and blocking the malware before its execution is the most effective means of protection. In...

    Provided By Korea University

  • White Papers // Dec 2011

    Parallel Data Processing with MapReduce: A Survey

    A prominent parallel data processing tool MapReduce is gaining significant momentum from both industry and academia as the volume of data to analyze grows rapidly. While MapReduce is used in many areas where massive data analysis is required, there are still debates on its performance, efficiency per node, and simple...

    Provided By Korea University