KTH Royal Institute of Technology

Displaying 1-40 of 136 results

  • White Papers // Jun 2013

    Secure Bluetooth for Trusted m-Commerce

    In this paper, the authors' explain about the digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2013

    Cloud Computing for the Power Grid: From Service Composition to Assured Clouds

    The electric power industry is one of the few industries where cloud computing has not yet found much adoption, even though electric power utilities rely heavily on communications and computation to plan, operate and analyze power systems. In this paper, the authors explore the reasons for this phenomenon. They identify...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2013

    Auction-Based Resource Allocation in Millimeter Wave Wireless Access Networks

    The resource allocation problem of optimal assignment of the clients to the available access points in 60 GHz millimeterWave Wireless Access Networks is investigated. The problem is posed as a multi-assignment optimization problem. The proposed solution method converts the initial problem to a minimum cost flow problem and allows to...

    Provided By KTH Royal Institute of Technology

  • White Papers // Feb 2013

    Optimizing Client Association in 60 GHz Wireless Access Networks

    Millimeter-Wave communications in the 60 GHz band are considered one of the key technologies for enabling multi-gigabit wireless access. However, the high propagation loss in such a band poses major obstacles to the optimal utilization of the wireless resources, where the problem of efficient client association to Access Points (APs)...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Decentralized Minimum-Cost Repair for Distributed Storage Systems

    There have been emerging lots of applications for distributed storage systems e.g., those in wireless sensor networks or cloud storage. Since storage nodes in wireless sensor networks have limited battery, it is valuable to find a repair scheme with optimal transmission costs (e.g., energy). The optimal-cost repair has been recently...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Wi-Fi Sensing: Should Mobiles Sleep Longer as They Age?

    An essential condition precedent to the success of mobile applications based on Wi-Fi (e.g., i-Cloud) is an energy-efficient Wi-Fi sensing. From a user's perspective, a good Wi-Fi sensing policy should depend on both inter-AP arrival and contact duration time distributions. Prior work focuses on limited cases of those two distributions...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Content-Peering Dynamics of Autonomous Caches in a Content-Centric Network

    A future content-centric Internet would likely consist of Autonomous Systems (ASes) just like today's Internet. It would thus be a network of interacting cache networks, each of them optimized for local performance. To understand the influence of interactions between autonomous cache networks, in this paper the authors consider ASes that...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Effects of the Packet Size Distribution on the Packet Loss Process

    Real-time multimedia applications have to use Forward Error Correction (FEC) and error concealment techniques to cope with losses in today's best-effort Internet. The efficiency of these solutions is known however to depend on the correlation between losses in the media stream. In this paper, the authors investigate how the packet...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Power-Law Revisited: A Large Scale Measurement Study of P2P Content Popularity

    The popularity of contents on the Internet is often said to follow a Zipf-like distribution. Different measurement studies showed, however, significantly different distributions depending on the measurement methodology they followed. The authors performed a large-scale measurement of the most popular Peer-To-Peer (P2P) content distribution system, BitTorrent, over eleven months. They...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    A Rate-Distortion Based Comparison of Media-Dependent FEC and MDC for Real-Time Audio

    Applications that require low loss probabilities in today's Internet have to employ some end-to-end error-recovery mechanism. For interactive applications with strict delay constraints, the delay introduced by the applied schemes has to be low as well. In this paper, the authors compare two schemes proposed for error recovery for real-time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Stability of End-Point-Based Multimedia Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. Using the model and via simulations they study the performance of this architecture in the presence...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Asymptotic Behavior of End-Point-Based Multicast Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. They show that this architecture can distribute data to nodes arbitrarily far away from the root...

    Provided By KTH Royal Institute of Technology

  • White Papers // Nov 2012

    Optimal Coordinated Beamforming in the Multicell Downlink with Transceiver Impairments

    Physical wireless transceivers suffer from a variety of impairments that distort the transmitted and received signals. Their degrading impact is particularly evident in modern systems with multiuser transmission, high transmit power, and low-cost devices, but their existence is routinely ignored in the optimization literature for multicell transmission. This paper provides...

    Provided By KTH Royal Institute of Technology

  • White Papers // Oct 2012

    Degrees of Freedom of Multi-Hop MIMO Broadcast Networks with Delayed CSIT

    The authors study the sum Degrees of Freedom (DoF) of a class of multi-layer relay-aided MIMO broadcast networks with delayed Channel State Information at Transmitters (CSIT). In the assumed network a K-antenna source intends to communicate to K single-antenna destinations, with the help of N-2 layers of K full-duplex single-antenna...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2012

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an l relaxation technique provides an exact optimal solution to this cardinality minimization problem. The...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    To Subscribe, or Not to Subscribe: Modeling and Analysis of Service Paradigms in Cellular Markets

    Traditionally customers subscribe to specific providers and are served by accessing Base Stations (BSs) of the network of their provider. Inevitably subscribers with relatively "High" usage pattern and data-rate requirements are subsidized by the ones with lower usage and data-rates. As the wireless technology advances, a diverse set of services...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    A Novel Overlay IDS for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it. That is why intrusion detection architecture for WSN is considerably different and difficult to implement. Most of the current implementations are based on exchanging anomaly signals among the leaf level...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    Automating Enterprise Architecture Documentation Using an Enterprise Service Bus

    Currently the documentation of Enterprise Architectures (EA) requires manual collection of data resulting in an error prone, expensive, and time consuming process. Recent approaches seek to automate and improve EA documentation by employing the productive system environment of organizations. In this paper, the authors investigate a specific Enterprise Service Bus...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2012

    Tradeoffs in Cloud and Peer-Assisted Content Delivery Systems

    With the proliferation of cloud services, cloud-based systems can become a cost-effective means of on-demand content delivery. In order to make best use of the available cloud bandwidth and storage resources, content distributors need to have a good understanding of the tradeoffs between various system design choices. In this paper,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2012

    Architecture Support and Comparison of Three Memory Consistency Models in NoC Based Systems

    The authors propose a novel hardware support for three relaxed memory models, Release Consistency (RC), Partial Store Ordering (PSO) and Total Store Ordering (TSO) in Network-on-Chip (NoC) based distributed shared memory multi-core systems. The RC model is realized by using a Transaction Counter and an Address Stack based approach to...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Fair Scheduling of Dynamically Provisioned WDM Connections With Differentiated Signal Quality

    Emerging, on-demand applications (e.g., Interactive video, ultra-high definition TV, backup storage and grid computing) are gaining momentum and are becoming increasingly important. Given the high bandwidth required by these applications, Wavelength Division Multiplexing (WDM) networks are seen as the natural choice for their transport technology. Among the various on-line strategies...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Secure Distributed Top-K Aggregation

    In-network aggregation is an efficient and scalable distributed approach to global state approximation. However, security remains an open problem in such systems, especially when the authors consider dynamic network effects, such as mobility, packet loss and churn. In this paper, they consider the resilience of the top-k aggregate to manipulation...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Anytime Reliability of Systematic LDPC Convolutional Codes

    The authors propose a LDPC Convolutional Code ensemble together with an expanding-window message-passing decoder that asymptotically have anytime properties when used for streaming transmission on the binary erasure channel. They show analytically that the decoding erasure probability of these codes decays exponentially over decoding delay and determine the corresponding anytime...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    On Combined Beamforming and OSTBC Over the Cognitive Radio Z-Channel With Partial CSI

    The authors consider a pair of Secondary nodes (SU) coupled, in Z-topology, with multiple pairs of Primary nodes (PU). The secondary (cognitive) transmitter is combining Beamforming with Orthogonal Space-Time Block Coding (BOSTBC) and operates under Quality-of-Service (QoS) constraints that must be guaranteed for the Primary Receivers (PURx). The cognitive link...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Design of Green Optical Networks With Signal Quality Guarantee

    Energy consumption of communication networks is growing very fast due to the rapidly increasing traffic demand. Consequently, design of green communication networks gained a lot of attention. In this paper, the authors focus on optical Wavelength Division Multiplexing (WDM) networks, able to support this growing traffic demand. Several Energy-Aware Routing...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2012

    Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications

    Distributed processing through ad hoc and sensor networks is having a major impact on scale and applications of computing. The creation of new cyber-physical services based on wireless sensor devices relies heavily on how well communication protocols can be adapted and optimized to meet quality constraints under limited energy resources....

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2012

    Energy-Efficient Deadline-Constrained Maximum Reliability Forwarding in Lossy Networks

    This paper studies the problem of optimal forwarding for reliable and energy-efficient real-time communication over lossy networks. The authors impose a strict per-packet latency bound and develop forwarding policies that maximize the probability that the packet is delivered within the specified deadline minus a transmission energy cost. A solution to...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2012

    Modular Design of Jointly Optimal Controllers and Forwarding Policies for Wireless Control

    The authors consider the joint design of forwarding policies and controllers for wireless control loops where sensor measurements are sent over an unreliable multi-hop wireless network to the controller node. For fixed sampling rate of the control loop, the co-design problem separates into two well-defined and independent sub-problems: transmission scheduling...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Performance Analysis and Optimization of the Joining Protocol for a Platoon of Vehicles

    Platooning of vehicles allows to saving energy and increasing safety provided that there are reliable wireless communication protocols. In this paper, the optimization of the Medium Access Control (MAC) protocol based on IEEE 802.11e for the platoon joining is investigated. The exchange of prosperous dynamic information among vehicles through certain...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    A List of Maximum Period NLFSRs

    Non-Linear Feedback Shift Registers (NLFSRs) are a generalization of Linear Feedback Shift Registers (LFSRs) in which a current state is a nonlinear function of the previous state. While the theory behind LFSRs is well-understood, many fundamental problems related to NLFSRs remain open. Probably the most important one is finding a...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    State-Space Feedback Control for Elastic Distributed Storage in a Cloud Environment

    Elasticity in Cloud computing is an ability of a system to scale up and down (request and release resources) in response to changes in its environment and workload. Elasticity can be achieved manually or automatically. Efforts are being made to automate elasticity in order to improve system performance under dynamic...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Playout Adaptation for Peer-to-Peer Streaming Systems Under Churn

    The authors address the problem of playout adaptation in peer-to-peer streaming systems. They propose two algorithms for playout adaptation: one coordinated and one distributed. The algorithms dynamically adapt the playback delay of the peers so that the playout miss ratio is maintained within a predefined interval. They validate the algorithms...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Modeling and Estimation of Partially Observed WLAN Activity for Cognitive WSNs

    Efficient communication in the crowded ISM band requires the communication networks to be aware of the networking environment and to control their communication protocols accordingly. In this paper, the authors address the issue of efficient WSN communication under WLAN interference. They propose analytic models to describe the WLAN idle time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Minimum-Energy Packet Forwarding Over Lossy Networks Under Deadline and Reliability Constraints

    This paper studies minimum-energy packet forwarding over multi-hop lossy networks under deadline and reliability constraints. The authors assume a routing topology in the form of a directed graph with packet loss processes on links described by finite-state Markov chains, and formulate the forwarding problem as a finite-horizon constrained Markov decision...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Identity-Based Authentication and Access Control in Wireless Sensor Networks

    The application and usage of the wireless sensor network is rapidly growing. Wireless sensor networks are normally deployed into the unattended environment where the intended user can get access of the network. The sensor nodes collect data from this environment. If the data are valuable and confidential then some security...

    Provided By KTH Royal Institute of Technology

  • White Papers // Feb 2012

    Stealthy Pre-Attacks Against Random Key Pre-Distribution Security

    Random Key Pre-Distribution (RKPD) has been investigated for large wireless sensor networks, in order to achieve efficient security and robustness against limited node compromise. While it is possible that an adversary obtains a subset of the symmetric keys in use, it has been unclear how to use those to compromise...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    Vertical Cooperation in Spectrum Sharing Wireless Networks

    The emerging cognitive radio technology enables the introduction of hierarchical spectrum sharing in wireless networks, where the primary users have transmission guarantees, whereas the coexisting secondary users need to be cognitive towards primary activities, and adjust their transmissions to conform the primary constraints. The authors consider large-scale coexisting primary and...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    Cache Capacity Allocation for BitTorrent-Like Systems to Minimize Inter-ISP Traffic

    Many Internet Service Providers (ISPs) have deployed Peer-To-Peer (P2P) caches in their networks in order to decrease costly inter-ISP traffic. A P2P cache stores parts of the most popular contents locally, and if possible serves the requests of local peers to decrease the inter-ISP traffic. Traditionally, P2P cache resource management...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    A Longitudinal Characterization of Local and Global BitTorrentWorkload Dynamics

    Workload characterization is important for understanding how systems and services are used in practice and to help identify design improvements. To better understand the longitudinal workload dynamics of chunk-based content delivery systems, this paper analyzes the BitTorrent usage as observed from two different vantage points. Using two simultaneously collected 48-week...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2011

    Modular Co-Design of Controllers and Transmission Schedules in WirelessHART

    The authors consider the joint design of transmission schedules and controllers for networked control loops that use WirelessHART communication for sensor and actuator data. By parameterizing the design problem in terms of the sampling rate of the control loop, the co-design problem separates into two well-defined sub-problems which admit optimal...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    FPGA-Based Adaptive Computing for Correlated Multi-Stream Processing

    In conventional static implementations for correlated streaming applications, computing resources may be inefficiently utilized since multiple stream processors may supply their sub-results at asynchronous rates for result correlation or synchronization. To enhance the resource utilization efficiency, the authors analyze multi-streaming models and implement an adaptive architecture based on FPGA Partial...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2009

    Hardware/Software Co-Design of an ATCA-Based Computation Platform for Data Acquisition and Triggering

    An ATCA-based computation platform for data acquisition and trigger(TDAQ) applications has been developed for multiple future projects such as PANDA, HADES, and BESIII. Each Compute Node (CN) appears as one of the fourteen Field Replaceable Units (FRU) in an ATCA shelf, which in total features a high performance of 1890...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2010

    Theorem Proving Techniques for the Formal Verification of NoC Communications With Non-Minimal Adaptive Routing

    This paper focuses on the formal verification of communications in Networks on Chip. The authors describe how an enhanced version of the GeNoC proof methodology has been applied to the Nostrum NoC which encompasses various non-trivial features such as a deflective non-minimal routing algorithm. They demonstrate how the features of...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2010

    Entrepreneurship, Innovation And Economic Growth - Past Experience, Current Knowledge And Policy Implications

    Considerable advances, even breakthroughs, have been made during the last decades in the authors' understanding of the relationship between knowledge and growth on one hand, and entrepreneurship and growth on the other. Similarly, more profound insights have also been gained as to how entrepreneurship, innovation and knowledge are interrelated. Yet,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2010

    HetMoC: Heterogeneous Modelling in SystemC

    The authors propose a novel Heterogeneous Model-of-Computation (HetMoC) framework in SystemC for embedded computing systems. As the main contribution, they formally define the computation and communication in multiple domains (continuous-time, discrete-event, synchronous/reactive, and untimed) as polymorphic processes and signals, and present domain interfaces to integrate different domains together for heterogeneous...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2010

    Large Firm Dynamics On The Nordic-Baltic Scene Implications For Innovation And Growth

    This paper investigates the role of the 30 largest firms in the respective Nordic country and in Estonia over the last decade and for some variables between 1975 to 2006. The analysis confirms that the largest firms play a critically important role for industrial dynamics in the Nordic countries. Statistics...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2010

    Scalability of Weak Consistency in NoC Based Multicore Architectures

    In Multicore Network-on-Chip, it is preferable to realize Distributed but Shared Memory (DSM) in order to reuse the huge amount of legacy code. Within DSM systems, memory consistency is a critical issue since it affects not only performance but also the correctness of programs. In this paper, the authors investigate...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2009

    Market Experiences And Export Decisions In Heterogeneous Firms

    This empirical analysis focus on the impact of firm characteristics, firms' export experiences and location-specific variables on export decisions in Swedish manufacturing firms. Three choices of export market participation are considered: permanent export, occasional export and no export. The paper also analyzes firms' choice of expanding export activities. The empirical...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2010

    Inter-Process Communication Using Pipes in FPGA-Based Adaptive Computing

    In FPGA-based adaptive computing, Inter-Process Communications (IPC) are required to exchange information among hardware processes which time-multiplex the resources in a same reconfigurable region. In this paper, the authors use pipes for IPC and analyze the performance in terms of throughput, throughput efficiency and latency in switching contexts. They also...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2009

    Small Nordic Enterprises - Developing IPR In Global Competition

    This paper presents the results of a pan-Nordic study to explore how small and medium-size enterprises use IPR. It is a pilot study that demonstrates a commonly developed approach designed to overcome the barriers that hinder study of IPR use by small firms. The pilot study focuses particularly on patenting,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2010

    A Worst Case Performance Model for TDM Virtual Circuit in NoCs

    In Network-on-Chip (NoC), Time-Division-Multiplexing (TDM) Virtual Circuit (VC) is well recognized as being capable to provide guaranteed services in both latency and bandwidth. The authors propose a method of modeling TDM based VC by using Network Calculus. They derive a tight upper bound of end-to-end delay and buffer requirement for...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2009

    Creating Innovations, Productivity And Growth - The Efficiency Of Icelandic Firms

    Iceland is one of the smallest European economies and the country was hit severely by the 2008-financial crisis. This paper considers the economy in the period preceding the collapse. Applying a Data Envelopment Analysis on 204 randomly selected firms, the results suggest that a substantial fraction of the Icelandic firms...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2008

    Implementation of Message Scheduling on TDM Virtual Circuits for Network-on-Chip

    Due to the increasing capacity and complexity of semiconductor technology, current design for System-on-Chip (SoC) faces big challenges from many aspects, such as Deep SubMicron (DSM) Effects, Global Synchrony, Communication Architecture, etc. Network-on-Chip (NoC) is an emerging achievement in recent years to tackle with the crisis of communications within large...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2008

    Is Entrepreneurship The Salvation For Enhanced Economic Growth?

    During the last decades, enhancing entrepreneurship has emerged as commonly used policy-measure in order to improve economic growth. However, is it true that entrepreneurship unambiguously can be claimed to improve economic growth? This paper intends to review the empirical evidence on the relationship between entrepreneurship on three measures of economic...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2010

    FoN: Fault-on-Neighbor Aware Routing Algorithm for Networks-on-Chip

    Reliability has become a key issue of Networks-on-Chip (NoC) as the CMOS technology scales down to the nanoscale domain. This paper proposes a Fault-on-Neighbor (FoN) aware deflection routing algorithm for NoC which makes routing decision based on the link status of neighbor switches within 2 hops to avoid fault links...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2009

    Labor Mobility, Knowledge Diffusion And Regional Growth

    This paper investigates the relationship between inter-firm labor mobility and regional productivity growth. Previous studies have shown that density is positively correlated with growth. The author claims that it is not density in itself, but rather the attributes associated with it that drives economic growth. One such attribute is the...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2010

    Reducing FPGA Reconfiguration Time Overhead Using Virtual Configurations

    Reconfiguration time overhead is a critical factor in determining the system performance of FPGA dynamically reconfigurable designs. To reduce the reconfiguration overhead, the most straightforward way is to increase the reconfiguration throughput, as many previous contributions did. In addition to shortening FPGA reconfiguration time, the authors introduce a new concept...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2009

    Internal Finance And Patents - Evidence From Firm-level Data

    The authors find that internal finance resources at the firm-level, measured by cash flow, play a non-trivial role for the number of patent applications, even after controlling for the standard variables of a patent study. The results are based on estimating panel count-data models on a sample of 2,700 Swedish...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2009

    Scalability of Network-on-Chip Communication Architecture for 3-D Meshes

    Design Constraints imposed by global interconnect delays as well as limitations in integration of disparate technologies make 3-D chip stacks an enticing technology solution for massively integrated electronic systems. The scarcity of vertical interconnects however imposes special constraints on the design of the communication architecture. This paper examines the performance...

    Provided By KTH Royal Institute of Technology

  • White Papers // Nov 2009

    Cache-to-Cache: Could ISPs Cooperate to Decrease Peer-to-Peer Content Distribution Costs?

    The authors consider whether cooperative caching may reduce the transit traffic costs of Internet Service Providers (ISPs) due to Peer-To-Peer (P2P) content distribution systems. They formulate two game theoretic models for cooperative caching, one in which ISPs follow their selfish interests, and one in which they act altruistically. They show...

    Provided By KTH Royal Institute of Technology

  • White Papers // May 2010

    Interaction Patterns Between P2P Content Distribution Systems and ISPs

    Peer-To-Peer (P2P) content distribution systems are a major source of traffic in the Internet, but the application layer protocols they use are mostly unaware of the underlying network in accordance with the layered structure of the Internet's protocol stack. Nevertheless, the need for improved network efficiency and the business interests...

    Provided By KTH Royal Institute of Technology

  • White Papers // Sep 2008

    Stability and Performance of Overlay Multicast Systems Employing Forward Error Correction

    The two main sources of impairment in overlay multicast systems are packet losses and node churn. Yet, little is known about their effects on the data distribution performance. In this paper, the authors develop an analytical model of a large class of peer-to-peer streaming architectures based on decomposition and non-linear...

    Provided By KTH Royal Institute of Technology

  • White Papers // Oct 2008

    Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming

    A large number of peer-to-peer streaming systems has been proposed and deployed in recent years. Yet, there is no clear understanding of how these systems scale and how multi-path and multi-hop transmission, properties of all recent systems, affect the quality experienced by the peers. In this paper, the authors present...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Effects of the Packet Size Distribution on the Packet Loss Process

    Real-time multimedia applications have to use Forward Error Correction (FEC) and error concealment techniques to cope with losses in today's best-effort Internet. The efficiency of these solutions is known however to depend on the correlation between losses in the media stream. In this paper, the authors investigate how the packet...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Content-Peering Dynamics of Autonomous Caches in a Content-Centric Network

    A future content-centric Internet would likely consist of Autonomous Systems (ASes) just like today's Internet. It would thus be a network of interacting cache networks, each of them optimized for local performance. To understand the influence of interactions between autonomous cache networks, in this paper the authors consider ASes that...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2012

    Tradeoffs in Cloud and Peer-Assisted Content Delivery Systems

    With the proliferation of cloud services, cloud-based systems can become a cost-effective means of on-demand content delivery. In order to make best use of the available cloud bandwidth and storage resources, content distributors need to have a good understanding of the tradeoffs between various system design choices. In this paper,...

    Provided By KTH Royal Institute of Technology

  • White Papers // Mar 2012

    Playout Adaptation for Peer-to-Peer Streaming Systems Under Churn

    The authors address the problem of playout adaptation in peer-to-peer streaming systems. They propose two algorithms for playout adaptation: one coordinated and one distributed. The algorithms dynamically adapt the playback delay of the peers so that the playout miss ratio is maintained within a predefined interval. They validate the algorithms...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    Cache Capacity Allocation for BitTorrent-Like Systems to Minimize Inter-ISP Traffic

    Many Internet Service Providers (ISPs) have deployed Peer-To-Peer (P2P) caches in their networks in order to decrease costly inter-ISP traffic. A P2P cache stores parts of the most popular contents locally, and if possible serves the requests of local peers to decrease the inter-ISP traffic. Traditionally, P2P cache resource management...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2012

    A Longitudinal Characterization of Local and Global BitTorrentWorkload Dynamics

    Workload characterization is important for understanding how systems and services are used in practice and to help identify design improvements. To better understand the longitudinal workload dynamics of chunk-based content delivery systems, this paper analyzes the BitTorrent usage as observed from two different vantage points. Using two simultaneously collected 48-week...

    Provided By KTH Royal Institute of Technology

  • White Papers // Dec 2011

    Non-Cooperative RSU Deployment in Vehicular Networks

    This paper considers the issue of distributing contents to vehicles through roadside communication infrastructure. Within this scenario, this work studies the dynamics of infrastructure deployment by using game theoretic tools. A strategic game is used to model the case in which the operators perform their deployment decisions concurrently, whereas an...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jul 2011

    Network-Layer Protection Schemes Against Stealth Attacks on State Estimators in Power Systems

    The power system state estimator is an important application used to calculate optimal power flows, to maintain the system in a secure state, and to detect faulty equipment. Its importance in the operation of the smart grid is expected to increase, and therefore its security is an important concern. Based...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jun 2011

    Efficient and Highly Available Peer Discovery: A Case for Independent Trackers and Gossipping

    Tracker-based peer-discovery is used in most commercial peer-to-peer content distribution systems, as it provides performance benefits compared to distributed solutions, and facilitates the control and monitoring of the overlay. But a tracker is a central point of failure, and its deployment and maintenance incur costs; hence an important question is...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2010

    Stealth Attacks and Protection Schemes for State Estimators in Power Systems

    State estimators in power systems are currently used to, for example, detect faulty equipment and to route power flows. It is believed that state estimators will also play an increasingly important role in future smart power grids, as a tool to optimally and more dynamically route power flows. Therefore security...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Power-Law Revisited: A Large Scale Measurement Study of P2P Content Popularity

    The popularity of contents on the Internet is often said to follow a Zipf-like distribution. Different measurement studies showed, however, significantly different distributions depending on the measurement methodology they followed. The authors performed a large-scale measurement of the most popular Peer-To-Peer (P2P) content distribution system, BitTorrent, over eleven months. They...

    Provided By KTH Royal Institute of Technology

  • White Papers // Apr 2009

    Cooperative Caching and Relaying Strategies for Peer-to-Peer Content Delivery

    Peer-to-peer content distribution has become a major source of bandwidth costs for Internet Service Providers (ISPs). One way for ISPs to decrease these costs is to deploy caches for p2p traffic. To make efficient use of the caches, in this paper the authors propose a cooperative caching and relaying scheme...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    A Rate-Distortion Based Comparison of Media-Dependent FEC and MDC for Real-Time Audio

    Applications that require low loss probabilities in today's Internet have to employ some end-to-end error-recovery mechanism. For interactive applications with strict delay constraints, the delay introduced by the applied schemes has to be low as well. In this paper, the authors compare two schemes proposed for error recovery for real-time...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Stability of End-Point-Based Multimedia Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. Using the model and via simulations they study the performance of this architecture in the presence...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    On the Asymptotic Behavior of End-Point-Based Multicast Streaming

    In this paper, the authors propose an analytical model of a resilient, tree-based end-node multicast streaming architecture that employs path diversity and forward error correction for improved resilience to node churns and packet losses. They show that this architecture can distribute data to nodes arbitrarily far away from the root...

    Provided By KTH Royal Institute of Technology

  • White Papers // Aug 2012

    To Subscribe, or Not to Subscribe: Modeling and Analysis of Service Paradigms in Cellular Markets

    Traditionally customers subscribe to specific providers and are served by accessing Base Stations (BSs) of the network of their provider. Inevitably subscribers with relatively "High" usage pattern and data-rate requirements are subsidized by the ones with lower usage and data-rates. As the wireless technology advances, a diverse set of services...

    Provided By KTH Royal Institute of Technology

  • White Papers // Jan 2013

    Wi-Fi Sensing: Should Mobiles Sleep Longer as They Age?

    An essential condition precedent to the success of mobile applications based on Wi-Fi (e.g., i-Cloud) is an energy-efficient Wi-Fi sensing. From a user's perspective, a good Wi-Fi sensing policy should depend on both inter-AP arrival and contact duration time distributions. Prior work focuses on limited cases of those two distributions...

    Provided By KTH Royal Institute of Technology