Linköping University

Displaying 1-12 of 12 results

  • White Papers // Jan 2014

    Benchmarking of On-Chip Interconnection Networks

    More complex on-chip interconnection structures such as networks on chip emerge today. As the number of interconnect architectures rises there is a need to do an impartial evaluation of the performance of the interconnect structure. This is important for both the designer of the interconnect as well as for the...

    Provided By Linköping University

  • White Papers // Mar 2013

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    Information-Theoretically Secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, the authors study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash...

    Provided By Linköping University

  • White Papers // Aug 2012

    Embedded Cyber-Physical Anomaly Detection in Smart Meters

    Smart grid security has many facets, ranging over a spectrum from resisting attacks aimed at supervisory and control systems, to end user privacy concerns while monitored by the utility enterprise. This multi-faceted problem also includes vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location, with...

    Provided By Linköping University

  • White Papers // Aug 2012

    Joint Redundant and Random Network Coding for Robust Video Transmission Over Lossy Networks

    In this paper a novel unequal packet loss protection scheme R2NC based on low-triangular global coding matrix with ladder-shaped partition is presented, which combines redundant and random network coding for robust H.264/SVC video transmission. Firstly, the error-correcting capabilities of redundant network coding makes the authors' scheme resilient to loss. Secondly,...

    Provided By Linköping University

  • White Papers // Dec 2011

    OpenCL for Programming Shared Memory Multicore CPUs

    Shared memory multi-core processor technology is pervasive in mainstream computing. This new architecture challenges programmers to write code that scales over these many cores to exploit the full computational power of these machines. OpenMP and Intel Threading Building Blocks (TBB) are two of the popular frameworks used to program these...

    Provided By Linköping University

  • White Papers // Oct 2011

    Pipelined Parallel Sorting on the Intel SCC

    The Single-chip Cloud Computer (SCC) is an experimental processor created by Intel labs. It comprises 48 Intel-IA32 cores linked by an on-chip high performance mesh network, as well as four DDR3 memory controllers to access an off-chip main memory. The authors investigate the adaptation of sorting onto SCC as an...

    Provided By Linköping University

  • White Papers // Jun 2011

    Impact of Denial of Service Solutions on Network Quality of Service

    The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with Quality of Service (QoS) requirements. As more services are delivered over the Internet, the authors face increasing...

    Provided By Linköping University

  • White Papers // May 2011

    Economic Aspects of Web Authentication

    Now-a-days the web is a comprehensive source of information and a place where communication takes place. However, such wide use of the web for storing and sharing personal and sensitive information leads to a need of strong authentication while web users are communicating with each other. Authentication helps in reducing...

    Provided By Linköping University

  • White Papers // Jun 2010

    Using Self-Employment As Proxy For Entrepreneurship: Some Empirical Caveats

    Research on entrepreneurship has received an increased amount of interest in recent years, with self-employment being used as the most common proxy for "Entrepreneurship" in empirical studies. However, there are various ways of defining self-employment, making it a somewhat dubious proxy. This may flaw the analysis, especially in cross-country studies,...

    Provided By Linköping University

  • White Papers // May 2009

    Hastily Formed Networks for Disaster Response: Technical Heterogeneity and Virtual Pockets of Local Order

    As natural and man-made disasters become increasingly common, ensuring effective disaster response, mitigation and recovery is growing into a high-priority task for governments and administrations globally. This paper describes the challenges of collaboration within multi-organisational hastily formed networks for post-disaster response, which are increasingly relying on emerging ICT infrastructures for...

    Provided By Linköping University

  • White Papers // Aug 2008

    The Roles Of Customers In M&A Integration

    The purpose of this paper is to describe what roles customers play in Merger and Acquisition (M&A) integration. Based on studies of eight M&As, it is concluded that customers may limit integration intentions, be reasons for pre-integration reconsiderations, be used as an argument against integration, not act according to integration...

    Provided By Linköping University

  • White Papers // Nov 2007

    Activity Modalities - A Multi-dimensional Perspective on Coordination, Business Processes and Communication

    This paper is to analyze and reconstruct espoused conceptions of coordination, business processes and communication using the Activity Domain Theory as a guiding framework. The point of departure is shared or communal meaning. Meaning is seen as the link between the individual mind and the social reality in which the...

    Provided By Linköping University

  • White Papers // Aug 2012

    Joint Redundant and Random Network Coding for Robust Video Transmission Over Lossy Networks

    In this paper a novel unequal packet loss protection scheme R2NC based on low-triangular global coding matrix with ladder-shaped partition is presented, which combines redundant and random network coding for robust H.264/SVC video transmission. Firstly, the error-correcting capabilities of redundant network coding makes the authors' scheme resilient to loss. Secondly,...

    Provided By Linköping University

  • White Papers // Nov 2007

    Activity Modalities - A Multi-dimensional Perspective on Coordination, Business Processes and Communication

    This paper is to analyze and reconstruct espoused conceptions of coordination, business processes and communication using the Activity Domain Theory as a guiding framework. The point of departure is shared or communal meaning. Meaning is seen as the link between the individual mind and the social reality in which the...

    Provided By Linköping University

  • White Papers // May 2011

    Economic Aspects of Web Authentication

    Now-a-days the web is a comprehensive source of information and a place where communication takes place. However, such wide use of the web for storing and sharing personal and sensitive information leads to a need of strong authentication while web users are communicating with each other. Authentication helps in reducing...

    Provided By Linköping University

  • White Papers // Jun 2011

    Impact of Denial of Service Solutions on Network Quality of Service

    The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with Quality of Service (QoS) requirements. As more services are delivered over the Internet, the authors face increasing...

    Provided By Linköping University

  • White Papers // Mar 2013

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    Information-Theoretically Secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, the authors study security of an ITS authentication scheme proposed by Wegman& Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash...

    Provided By Linköping University

  • White Papers // Jan 2014

    Benchmarking of On-Chip Interconnection Networks

    More complex on-chip interconnection structures such as networks on chip emerge today. As the number of interconnect architectures rises there is a need to do an impartial evaluation of the performance of the interconnect structure. This is important for both the designer of the interconnect as well as for the...

    Provided By Linköping University

  • White Papers // Jun 2010

    Using Self-Employment As Proxy For Entrepreneurship: Some Empirical Caveats

    Research on entrepreneurship has received an increased amount of interest in recent years, with self-employment being used as the most common proxy for "Entrepreneurship" in empirical studies. However, there are various ways of defining self-employment, making it a somewhat dubious proxy. This may flaw the analysis, especially in cross-country studies,...

    Provided By Linköping University

  • White Papers // Aug 2008

    The Roles Of Customers In M&A Integration

    The purpose of this paper is to describe what roles customers play in Merger and Acquisition (M&A) integration. Based on studies of eight M&As, it is concluded that customers may limit integration intentions, be reasons for pre-integration reconsiderations, be used as an argument against integration, not act according to integration...

    Provided By Linköping University

  • White Papers // May 2009

    Hastily Formed Networks for Disaster Response: Technical Heterogeneity and Virtual Pockets of Local Order

    As natural and man-made disasters become increasingly common, ensuring effective disaster response, mitigation and recovery is growing into a high-priority task for governments and administrations globally. This paper describes the challenges of collaboration within multi-organisational hastily formed networks for post-disaster response, which are increasingly relying on emerging ICT infrastructures for...

    Provided By Linköping University

  • White Papers // Aug 2012

    Embedded Cyber-Physical Anomaly Detection in Smart Meters

    Smart grid security has many facets, ranging over a spectrum from resisting attacks aimed at supervisory and control systems, to end user privacy concerns while monitored by the utility enterprise. This multi-faceted problem also includes vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location, with...

    Provided By Linköping University

  • White Papers // Dec 2011

    OpenCL for Programming Shared Memory Multicore CPUs

    Shared memory multi-core processor technology is pervasive in mainstream computing. This new architecture challenges programmers to write code that scales over these many cores to exploit the full computational power of these machines. OpenMP and Intel Threading Building Blocks (TBB) are two of the popular frameworks used to program these...

    Provided By Linköping University

  • White Papers // Oct 2011

    Pipelined Parallel Sorting on the Intel SCC

    The Single-chip Cloud Computer (SCC) is an experimental processor created by Intel labs. It comprises 48 Intel-IA32 cores linked by an on-chip high performance mesh network, as well as four DDR3 memory controllers to access an off-chip main memory. The authors investigate the adaptation of sorting onto SCC as an...

    Provided By Linköping University