Nagoya University

Displaying 1-13 of 13 results

  • White Papers // Nov 2013

    Improved Authenticity Bound of EAX, and Refinements

    EAX is a mode of operation for block-ciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2n=2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2n=3) data...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Towards Partitioned Hierarchical Real-Time Scheduling on Multi-Core Processors

    This paper extends previous work on hierarchical scheduling to multi-core systems. The authors have implemented partitioned multi-core scheduling of servers in the Linux kernel, using the scheduling framework ExSched. Neither ExSched nor the presented scheduler require any modifications to the Linux kernel. Hence, this makes the installation and kernel-version updates...

    Provided By Nagoya University

  • White Papers // Jun 2013

    GPU Implementations of Object Detection Using HOG Features and Deformable Models

    Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses Histograms of Oriented Gradients (HOG) with deformable models to detect a car...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Large Deviation Analysis for Classical and Quantum Security Via Approximate Smoothing

    It is known that the security evaluation can be done by smoothing of Renyi entropy of order 2 in the classical ans quantum settings when, the authors apply universal2 hash functions. This fact can be extended to the case when, they apply almost dual universal2 hash functions. They approximately demonstrate...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Implementing Open-Source CUDA Runtime

    Graphics Processing Units (GPUs) are the state of the art embracing the concept of many-core technology. Their significant advantage in performance and performance per-watt compared to traditional microprocessors has facilitated development of GPUs in many computer applications. However, GPUs are often treated as \"Black-box\" devices due to proprietary strategies of...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Toward GPU-Accelerated Traffic Simulation and Its Real-Time Challenge

    Traffic simulation is a growing domain of computational physics. Many life and industrial applications would benefit from traffic simulation to establish reliable transportation systems. A core challenge of this science research, however, is its unbounded scale of computation. This paper explores an advantage of using the Graphics Processing Unit (GPU)...

    Provided By Nagoya University

  • White Papers // Sep 2012

    Privacy Preservation for Location-Based Services Based on Attribute Visibility

    To provide a high-quality mobile service in a safe way, many techniques for location anonymity have been proposed in recent years. Advanced location-based services such as mobile advertisement services may use not only users' locations but also users' attributes. However, the existing location anonymization methods do not consider attribute information...

    Provided By Nagoya University

  • White Papers // Aug 2012

    Breaking and Repairing GCM Security Proofs

    In this paper, the authors study the security proofs of GCM (Galois/Counter Mode of Operation). They first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based...

    Provided By Nagoya University

  • White Papers // Jul 2012

    Supporting Low-Latency CPS Using GPUs and Direct I/O Schemes

    Graphics Processing Units (GPUs) are increasingly being used for general purpose parallel computing. They provide significant performance gains over multi-core CPU systems, and are an easily accessible alternative to supercomputers. The architecture of General Purpose GPU systems (GPGPU), however, poses challenges in efficiently transferring data among the host and device(s)....

    Provided By Nagoya University

  • White Papers // Jan 2011

    Performance Evaluation of H.264 Video Streaming Over Inter-Vehicular 802.11 Ad Hoc Networks

    This paper evaluates the performance of video streaming in inter-vehicular environments using the 802.11 ad hoc network protocol. The authors performed transmission experiments while driving two cars equipped with 802.11b standard devices in urban and highway scenarios. Different sequences, bitrates and packetization policies have been tested. The experiments show that...

    Provided By Nagoya University

  • White Papers // Feb 2010

    Path Resolution for Nested Recursive Modules

    The ML module system facilitates the modular development of large programs, through decomposition, abstraction and reuse. To increase its flexibility, much work has been devoted to extending it with recursion, which is currently prohibited. The introduction of recursion certainly adds expressivity to the module system. However it also brings out...

    Provided By Nagoya University

  • White Papers // Mar 2009

    HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption

    The authors propose the HBS (Hash Block Stealing) mode of operation. This is the first single-key mode that provably achieves the goal of providing deterministic authenticated encryption. The authentication part of HBS utilizes a newly-developed, vector-input polynomial hash function. The encryption part uses a blockcipher-based, counter-like mode. These two parts...

    Provided By Nagoya University

  • White Papers // Oct 2007

    Predicting the Impact on Business Performance of Enhanced Information System Using Business Process Simulation

    The estimation of the impact on performance in Business Process (BP) by introducing an Information System (IS) is an important practical problem in investment appraisal. This paper quantitatively investigates the potential of Business Process Simulation (BPS) as an approach for evaluating an expected IS impact on business performance. By introducing...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Towards Partitioned Hierarchical Real-Time Scheduling on Multi-Core Processors

    This paper extends previous work on hierarchical scheduling to multi-core systems. The authors have implemented partitioned multi-core scheduling of servers in the Linux kernel, using the scheduling framework ExSched. Neither ExSched nor the presented scheduler require any modifications to the Linux kernel. Hence, this makes the installation and kernel-version updates...

    Provided By Nagoya University

  • White Papers // Jul 2012

    Supporting Low-Latency CPS Using GPUs and Direct I/O Schemes

    Graphics Processing Units (GPUs) are increasingly being used for general purpose parallel computing. They provide significant performance gains over multi-core CPU systems, and are an easily accessible alternative to supercomputers. The architecture of General Purpose GPU systems (GPGPU), however, poses challenges in efficiently transferring data among the host and device(s)....

    Provided By Nagoya University

  • White Papers // Nov 2012

    Implementing Open-Source CUDA Runtime

    Graphics Processing Units (GPUs) are the state of the art embracing the concept of many-core technology. Their significant advantage in performance and performance per-watt compared to traditional microprocessors has facilitated development of GPUs in many computer applications. However, GPUs are often treated as \"Black-box\" devices due to proprietary strategies of...

    Provided By Nagoya University

  • White Papers // Jan 2011

    Performance Evaluation of H.264 Video Streaming Over Inter-Vehicular 802.11 Ad Hoc Networks

    This paper evaluates the performance of video streaming in inter-vehicular environments using the 802.11 ad hoc network protocol. The authors performed transmission experiments while driving two cars equipped with 802.11b standard devices in urban and highway scenarios. Different sequences, bitrates and packetization policies have been tested. The experiments show that...

    Provided By Nagoya University

  • White Papers // Feb 2010

    Path Resolution for Nested Recursive Modules

    The ML module system facilitates the modular development of large programs, through decomposition, abstraction and reuse. To increase its flexibility, much work has been devoted to extending it with recursion, which is currently prohibited. The introduction of recursion certainly adds expressivity to the module system. However it also brings out...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Large Deviation Analysis for Classical and Quantum Security Via Approximate Smoothing

    It is known that the security evaluation can be done by smoothing of Renyi entropy of order 2 in the classical ans quantum settings when, the authors apply universal2 hash functions. This fact can be extended to the case when, they apply almost dual universal2 hash functions. They approximately demonstrate...

    Provided By Nagoya University

  • White Papers // Aug 2012

    Breaking and Repairing GCM Security Proofs

    In this paper, the authors study the security proofs of GCM (Galois/Counter Mode of Operation). They first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based...

    Provided By Nagoya University

  • White Papers // Sep 2012

    Privacy Preservation for Location-Based Services Based on Attribute Visibility

    To provide a high-quality mobile service in a safe way, many techniques for location anonymity have been proposed in recent years. Advanced location-based services such as mobile advertisement services may use not only users' locations but also users' attributes. However, the existing location anonymization methods do not consider attribute information...

    Provided By Nagoya University

  • White Papers // Oct 2007

    Predicting the Impact on Business Performance of Enhanced Information System Using Business Process Simulation

    The estimation of the impact on performance in Business Process (BP) by introducing an Information System (IS) is an important practical problem in investment appraisal. This paper quantitatively investigates the potential of Business Process Simulation (BPS) as an approach for evaluating an expected IS impact on business performance. By introducing...

    Provided By Nagoya University

  • White Papers // Nov 2013

    Improved Authenticity Bound of EAX, and Refinements

    EAX is a mode of operation for block-ciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2n=2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2n=3) data...

    Provided By Nagoya University

  • White Papers // Mar 2009

    HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption

    The authors propose the HBS (Hash Block Stealing) mode of operation. This is the first single-key mode that provably achieves the goal of providing deterministic authenticated encryption. The authentication part of HBS utilizes a newly-developed, vector-input polynomial hash function. The encryption part uses a blockcipher-based, counter-like mode. These two parts...

    Provided By Nagoya University

  • White Papers // Jun 2013

    GPU Implementations of Object Detection Using HOG Features and Deformable Models

    Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses Histograms of Oriented Gradients (HOG) with deformable models to detect a car...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Toward GPU-Accelerated Traffic Simulation and Its Real-Time Challenge

    Traffic simulation is a growing domain of computational physics. Many life and industrial applications would benefit from traffic simulation to establish reliable transportation systems. A core challenge of this science research, however, is its unbounded scale of computation. This paper explores an advantage of using the Graphics Processing Unit (GPU)...

    Provided By Nagoya University