Nagoya University

Displaying 1-17 of 17 results

  • White Papers // Nov 2013

    Improved Authenticity Bound of EAX, and Refinements

    EAX is a mode of operation for block-ciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2n=2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2n=3) data...

    Provided By Nagoya University

  • White Papers // Oct 2013

    Data Transfer Matters for GPU Computing

    Graphics Processing Units (GPUs) embrace many-core compute devices where massively parallel compute threads are offloaded from CPUs. This heterogeneous nature of GPU computing raises non-trivial data transfer problems especially against latency-critical real-time systems. However even the basic characteristics of data transfers associated with GPU computing are not well studied in...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Towards Partitioned Hierarchical Real-Time Scheduling on Multi-Core Processors

    This paper extends previous work on hierarchical scheduling to multi-core systems. The authors have implemented partitioned multi-core scheduling of servers in the Linux kernel, using the scheduling framework ExSched. Neither ExSched nor the presented scheduler require any modifications to the Linux kernel. Hence, this makes the installation and kernel-version updates...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Naxim: A Fast and Retargetable Network-on-Chip Simulator with QEMU and SystemC

    Systems-on-Chip (SoC) architectures have been shifting from single-core to multi-core solutions, and they are at present evolving towards many-core ones. Network-on-Chip (NoC) is considered as a promising interconnection scheme for many-core SoCs since it offers better scalability than traditional bus-based interconnection. In this paper, the authors have developed a fast...

    Provided By Nagoya University

  • White Papers // Jun 2013

    GPU Implementations of Object Detection Using HOG Features and Deformable Models

    Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses Histograms of Oriented Gradients (HOG) with deformable models to detect a car...

    Provided By Nagoya University

  • White Papers // Jan 2013

    Exploration of Public Education Resource Sharing and Cloud Services

    Education informatization is paid more attention to the development of web technologies recent years. Finding an effective way to make the best of existed public education resource distributed in different areas is an emergent task. Cloud computing technology is popular and utilized in many fields, and many facts show that...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Large Deviation Analysis for Classical and Quantum Security Via Approximate Smoothing

    It is known that the security evaluation can be done by smoothing of Renyi entropy of order 2 in the classical ans quantum settings when, the authors apply universal2 hash functions. This fact can be extended to the case when, they apply almost dual universal2 hash functions. They approximately demonstrate...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Implementing Open-Source CUDA Runtime

    Graphics Processing Units (GPUs) are the state of the art embracing the concept of many-core technology. Their significant advantage in performance and performance per-watt compared to traditional microprocessors has facilitated development of GPUs in many computer applications. However, GPUs are often treated as \"Black-box\" devices due to proprietary strategies of...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Toward GPU-Accelerated Traffic Simulation and Its Real-Time Challenge

    Traffic simulation is a growing domain of computational physics. Many life and industrial applications would benefit from traffic simulation to establish reliable transportation systems. A core challenge of this science research, however, is its unbounded scale of computation. This paper explores an advantage of using the Graphics Processing Unit (GPU)...

    Provided By Nagoya University

  • White Papers // Sep 2012

    Privacy Preservation for Location-Based Services Based on Attribute Visibility

    To provide a high-quality mobile service in a safe way, many techniques for location anonymity have been proposed in recent years. Advanced location-based services such as mobile advertisement services may use not only users' locations but also users' attributes. However, the existing location anonymization methods do not consider attribute information...

    Provided By Nagoya University

  • White Papers // Aug 2012

    Breaking and Repairing GCM Security Proofs

    In this paper, the authors study the security proofs of GCM (Galois/Counter Mode of Operation). They first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based...

    Provided By Nagoya University

  • White Papers // Jul 2012

    Supporting Low-Latency CPS Using GPUs and Direct I/O Schemes

    Graphics Processing Units (GPUs) are increasingly being used for general purpose parallel computing. They provide significant performance gains over multi-core CPU systems, and are an easily accessible alternative to supercomputers. The architecture of General Purpose GPU systems (GPGPU), however, poses challenges in efficiently transferring data among the host and device(s)....

    Provided By Nagoya University

  • White Papers // Jan 2011

    Performance Evaluation of H.264 Video Streaming Over Inter-Vehicular 802.11 Ad Hoc Networks

    This paper evaluates the performance of video streaming in inter-vehicular environments using the 802.11 ad hoc network protocol. The authors performed transmission experiments while driving two cars equipped with 802.11b standard devices in urban and highway scenarios. Different sequences, bitrates and packetization policies have been tested. The experiments show that...

    Provided By Nagoya University

  • White Papers // Jul 2010

    Stack Frames Placement in Scratch-Pad Memory for Energy Reduction of Multi-task Applications

    Scratch-Pad Memories (SPM) are small on-chip memory devices whose access is much faster and consumes much less energy than off-chip memories. While SPM are usually too small for containing all the code or data of an application, significant energy consumption reductions can be achieved by assigning to them memory objects...

    Provided By Nagoya University

  • White Papers // Feb 2010

    Path Resolution for Nested Recursive Modules

    The ML module system facilitates the modular development of large programs, through decomposition, abstraction and reuse. To increase its flexibility, much work has been devoted to extending it with recursion, which is currently prohibited. The introduction of recursion certainly adds expressivity to the module system. However it also brings out...

    Provided By Nagoya University

  • White Papers // Mar 2009

    HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption

    The authors propose the HBS (Hash Block Stealing) mode of operation. This is the first single-key mode that provably achieves the goal of providing deterministic authenticated encryption. The authentication part of HBS utilizes a newly-developed, vector-input polynomial hash function. The encryption part uses a blockcipher-based, counter-like mode. These two parts...

    Provided By Nagoya University

  • White Papers // Oct 2007

    Predicting the Impact on Business Performance of Enhanced Information System Using Business Process Simulation

    The estimation of the impact on performance in Business Process (BP) by introducing an Information System (IS) is an important practical problem in investment appraisal. This paper quantitatively investigates the potential of Business Process Simulation (BPS) as an approach for evaluating an expected IS impact on business performance. By introducing...

    Provided By Nagoya University

  • White Papers // Aug 2012

    Breaking and Repairing GCM Security Proofs

    In this paper, the authors study the security proofs of GCM (Galois/Counter Mode of Operation). They first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based...

    Provided By Nagoya University

  • White Papers // Sep 2012

    Privacy Preservation for Location-Based Services Based on Attribute Visibility

    To provide a high-quality mobile service in a safe way, many techniques for location anonymity have been proposed in recent years. Advanced location-based services such as mobile advertisement services may use not only users' locations but also users' attributes. However, the existing location anonymization methods do not consider attribute information...

    Provided By Nagoya University

  • White Papers // Oct 2007

    Predicting the Impact on Business Performance of Enhanced Information System Using Business Process Simulation

    The estimation of the impact on performance in Business Process (BP) by introducing an Information System (IS) is an important practical problem in investment appraisal. This paper quantitatively investigates the potential of Business Process Simulation (BPS) as an approach for evaluating an expected IS impact on business performance. By introducing...

    Provided By Nagoya University

  • White Papers // Nov 2013

    Improved Authenticity Bound of EAX, and Refinements

    EAX is a mode of operation for block-ciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to O(2n=2) data with one verification query. However, this generally guarantees a rather weak bound for the unforgeability under multiple verification queries, i.e., only (2n=3) data...

    Provided By Nagoya University

  • White Papers // Mar 2009

    HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption

    The authors propose the HBS (Hash Block Stealing) mode of operation. This is the first single-key mode that provably achieves the goal of providing deterministic authenticated encryption. The authentication part of HBS utilizes a newly-developed, vector-input polynomial hash function. The encryption part uses a blockcipher-based, counter-like mode. These two parts...

    Provided By Nagoya University

  • White Papers // Jun 2013

    GPU Implementations of Object Detection Using HOG Features and Deformable Models

    Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses Histograms of Oriented Gradients (HOG) with deformable models to detect a car...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Toward GPU-Accelerated Traffic Simulation and Its Real-Time Challenge

    Traffic simulation is a growing domain of computational physics. Many life and industrial applications would benefit from traffic simulation to establish reliable transportation systems. A core challenge of this science research, however, is its unbounded scale of computation. This paper explores an advantage of using the Graphics Processing Unit (GPU)...

    Provided By Nagoya University

  • White Papers // Jul 2012

    Supporting Low-Latency CPS Using GPUs and Direct I/O Schemes

    Graphics Processing Units (GPUs) are increasingly being used for general purpose parallel computing. They provide significant performance gains over multi-core CPU systems, and are an easily accessible alternative to supercomputers. The architecture of General Purpose GPU systems (GPGPU), however, poses challenges in efficiently transferring data among the host and device(s)....

    Provided By Nagoya University

  • White Papers // Nov 2012

    Implementing Open-Source CUDA Runtime

    Graphics Processing Units (GPUs) are the state of the art embracing the concept of many-core technology. Their significant advantage in performance and performance per-watt compared to traditional microprocessors has facilitated development of GPUs in many computer applications. However, GPUs are often treated as \"Black-box\" devices due to proprietary strategies of...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Towards Partitioned Hierarchical Real-Time Scheduling on Multi-Core Processors

    This paper extends previous work on hierarchical scheduling to multi-core systems. The authors have implemented partitioned multi-core scheduling of servers in the Linux kernel, using the scheduling framework ExSched. Neither ExSched nor the presented scheduler require any modifications to the Linux kernel. Hence, this makes the installation and kernel-version updates...

    Provided By Nagoya University

  • White Papers // Jan 2013

    Exploration of Public Education Resource Sharing and Cloud Services

    Education informatization is paid more attention to the development of web technologies recent years. Finding an effective way to make the best of existed public education resource distributed in different areas is an emergent task. Cloud computing technology is popular and utilized in many fields, and many facts show that...

    Provided By Nagoya University

  • White Papers // Oct 2013

    Data Transfer Matters for GPU Computing

    Graphics Processing Units (GPUs) embrace many-core compute devices where massively parallel compute threads are offloaded from CPUs. This heterogeneous nature of GPU computing raises non-trivial data transfer problems especially against latency-critical real-time systems. However even the basic characteristics of data transfers associated with GPU computing are not well studied in...

    Provided By Nagoya University

  • White Papers // Jul 2013

    Naxim: A Fast and Retargetable Network-on-Chip Simulator with QEMU and SystemC

    Systems-on-Chip (SoC) architectures have been shifting from single-core to multi-core solutions, and they are at present evolving towards many-core ones. Network-on-Chip (NoC) is considered as a promising interconnection scheme for many-core SoCs since it offers better scalability than traditional bus-based interconnection. In this paper, the authors have developed a fast...

    Provided By Nagoya University

  • White Papers // Jul 2010

    Stack Frames Placement in Scratch-Pad Memory for Energy Reduction of Multi-task Applications

    Scratch-Pad Memories (SPM) are small on-chip memory devices whose access is much faster and consumes much less energy than off-chip memories. While SPM are usually too small for containing all the code or data of an application, significant energy consumption reductions can be achieved by assigning to them memory objects...

    Provided By Nagoya University

  • White Papers // Jan 2011

    Performance Evaluation of H.264 Video Streaming Over Inter-Vehicular 802.11 Ad Hoc Networks

    This paper evaluates the performance of video streaming in inter-vehicular environments using the 802.11 ad hoc network protocol. The authors performed transmission experiments while driving two cars equipped with 802.11b standard devices in urban and highway scenarios. Different sequences, bitrates and packetization policies have been tested. The experiments show that...

    Provided By Nagoya University

  • White Papers // Feb 2010

    Path Resolution for Nested Recursive Modules

    The ML module system facilitates the modular development of large programs, through decomposition, abstraction and reuse. To increase its flexibility, much work has been devoted to extending it with recursion, which is currently prohibited. The introduction of recursion certainly adds expressivity to the module system. However it also brings out...

    Provided By Nagoya University

  • White Papers // Nov 2012

    Large Deviation Analysis for Classical and Quantum Security Via Approximate Smoothing

    It is known that the security evaluation can be done by smoothing of Renyi entropy of order 2 in the classical ans quantum settings when, the authors apply universal2 hash functions. This fact can be extended to the case when, they apply almost dual universal2 hash functions. They approximately demonstrate...

    Provided By Nagoya University