Nanyang Technological University

Displaying 1-40 of 193 results

  • White Papers // Jan 2015

    Optimal Energy Allocation Policy for Wireless Networks in the Sky

    Google's Project Loon was launched in 2013 with the aim of providing Internet access to rural and remote areas. In the Loon network, balloons travel around the Earth and bring access points to the users who cannot connect directly to the global wired Internet. The signals from the users will...

    Provided By Nanyang Technological University

  • White Papers // Jul 2014

    A Fluid Approach for Performance Analysis of LTE-A Networks with Relays

    In this paper, the authors address the problem of the impact of relays on the performance of a LTE-A based network. In this aim, they propose a new framework, the \"Fluid model for LTE-A networks with relays\". They derive from this model analytical simple formulas for the Signal to Interference...

    Provided By Nanyang Technological University

  • White Papers // Jul 2014

    Modeling and Simulation of Networked Low-Power Embedded Systems: A Taxonomy

    Simulation has been widely adopted for the evaluation of novel protocols or other designs for networked low-power embedded systems, especially for Wireless Sensor Networks (WSNs). A large number of simulation tools have been developed for WSNs in the past few years. However, different tools may emphasize on different features. For...

    Provided By Nanyang Technological University

  • White Papers // Dec 2013

    On the Effectiveness of Polynomial Realization of Reed-Solomon Codes for Storage Systems

    There are different ways to realize Reed Solomon (RS) codes. While in the storage community, using the generator matrices to implement RS codes is more popular, in the coding theory community the generator polynomials are typically used to realize RS codes. Prominent exceptions include HDFS-RAID, which uses generator polynomial based...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Analysis of BLAKE2

    The authors present a thorough security analysis of the hash function family BLAKE2, a recently proposed and already in use tweaked version of the SHA-3 finalist BLAKE. They study how existing attacks on BLAKE apply to BLAKE2 and to what extent the modifications impact the attacks. They design and run...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Revocable IBE Systems with Almost Constant-size Key Update

    It is sometimes necessary to remove keying material from use prior to the end of its normal crypto-period (or key lifetime) for reasons that include key compromise, removal of an entity from an organization, and so on. This process is known as key revocation and is used to explicitly revoke...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Developing a Grey Hat C2 and RAT for APT Security Training and Assessment

    A Remote Access Tool/Trojan (RAT) is a program that allows an external (malicious) operator to invisibly control a host. The operator may examine the system contents, transfer files, and run tools such key- and network sniffers to gain further access. RATs are often inserted on targets by forged e-mails or...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Cryptanalysis of Zorro

    At CHES 2013 was presented a new block cipher called zorro. Although it uses only 4 S-boxes per round, the designers showed the resistance of the cipher against various attacks, and concluded the cipher has a large security margin. In this paper, the authors give a key recovery attack on...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    Kernelet: High-Throughput GPU Kernel Executions With Dynamic Slicing and Scheduling

    Graphics processors, or GPUs, have recently been widely used as accelerators in shared environments such as clusters and clouds. In such shared environments, many kernels are submitted to GPUs from different users, and throughput is an important metric for performance and total ownership cost. Despite recently improved runtime support for...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    The Resistance of PRESENT-80 Against Related-Key Differential Attacks

    The authors examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search they are able to prove that no related-key differential characteristic exists with probability higher than 2-64 for the full-round PRESENT-80. To overcome the exponential (in the state and key sizes)...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    AEGIS: A Fast Authenticated Encryption Algorithm

    In this paper the authors introduce a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS- 128L uses eight AES round functions to process a 32-byte message block (one step). AEGIS-128 uses five AES round functions...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    Write-Only Oblivious RAM Based Privacy-Preserved Access of Outsourced Data

    Oblivious RAM (ORAM) has recently attracted a lot of interest since it can be used to protect the privacy of data user's data access pattern from (honest but curious) outsourced storage. This is achieved by simulating each original data read or write operation with some read and write operations on...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Toward Monetary Cost Effective Content Placement in Cloud Centric Media Network

    In recent years, technical challenges are emerging on how to efficiently distribute the rapid growing User-Generated Contents (UGCs) with long-tailed nature. To address this issue, the authors have previously proposed Cloud Centric Media Network (CCMN) for cost-efficient UGCs delivery. In this paper, they further study the content placement problem in...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    The Parallel-Cut Meet-In-The-Middle Attack

    The authors propose a new type of meet-in-the-middle attack that splits the cryptographic primitive in parallel to the execution of the operations. The result of the division is two primitives that have smaller input sizes and thus require lower attack complexities. However, the division is not completely independent and the...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Cryptanalysis of Full RIPEMD-128

    In this paper the authors propose a new cryptanalysis method for double-branch hash functions that they apply on the standard RIPEMD-128, greatly improving over know results. Namely, they were able to build a very good differential path by placing one non-linear differential part in each computation branch of the RIPEMD-128...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Medusa: Simplified Graph Processing on GPUs

    Graphs are common data structures for many applications, and efficient graph processing is a must for application performance. Recently, the Graphics Processing Unit (GPU) has been adopted to accelerate various graph processing algorithms such as BFS and shortest paths. However, it is difficult to write correct and efficient GPU programs...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Revisiting Co-Processing for Hash Joins on the Coupled CPU GPU Architecture

    Query co-processing on Graphics Processor Units (GPUs) has become an effective means to improve the performance of main memory databases. However, the relatively low bandwidth and high latency of the PCI-e bus are usually bottleneck issues for co-processing. Recently, coupled CPU-GPU architectures have received a lot of attention, e.g. AMD...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    OmniDB: Towards Portable and Efficient Query Processing on Parallel CPU/GPU Architectures

    Driven by the rapid hardware development of parallel CPU/GPU architectures, the authors have witnessed emerging relational query processing techniques and implementations on those parallel architectures. However, most of those implementations are not portable across different architectures, because they are usually developed from scratch and target at a specific architecture. This...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Parallel Graph Processing on Graphics Processors Made Easy

    In this paper, the authors demonstrate Medusa, a programming frame-work for parallel graph processing on Graphics Processor Units (GPUs). Medusa enables developers to leverage the massive parallelism and other hardware features of GPUs by writing sequential C/C++ code for a small set of APIs. This simplifies the implementation of parallel...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Multiple Limited-Birthday Distinguishers and Applications

    In this paper, the authors propose a new improvement of the rebound techniques, used for crypt-analyzing AES-like permutations during the past years. Their improvement, that allows to reduce the complexity of the attacks, increases the probability of the outbound part by considering a new type of differential paths. Moreover, they...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    On Secret Sharing with Nonlinear Product Reconstruction

    Multiplicative linear secret sharing is a fundamental notion in the area of secure Multi-Party Computation (MPC) and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that \"The product of two secrets is obtained as a linear function of the vector consisting of...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Towards GPU-Accelerated Large-Scale Graph Processing in the Cloud

    Recently, the authors have witnessed that cloud providers start to offer heterogeneous computing environments. There have been wide interests in both cluster and cloud of adopting Graphics Processors Unit (GPUs) as accelerators for various applications. On the other hand, large-scale processing is important for many data-intensive applications in the cloud....

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    Single-tone Frequency Shift Keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance in power line communications. However, this modulation scheme is restrictive since the number of frequencies used must be at least as large as the number of symbols...

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Characterizations and Construction Methods for Linear Functional-Repair Storage Codes

    The authors present a precise characterization of linear functional-repair storage codes in terms of admissible states, with each state made up from a collection of vector spaces over some fixed finite field. To illustrate the usefulness of their characterization, they provide several applications. They first describe a simple construction of...

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Implementing Lightweight Block Ciphers on x86 Architectures

    Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many constrained devices communicate with a server, it is also crucial that the cipher has good software performance on the server side. Recent...

    Provided By Nanyang Technological University

  • White Papers // Jun 2013

    Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128

    Block ciphers and hash functions are among the most important primitives in cryptography and while their respective goals are different, they are related in many ways. While the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Streamforce: Outsourcing Access Control Enforcement for Stream Data to the Clouds

    As tremendous amount of data being generated everyday from human activity and from devices equipped with sensing capabilities, cloud computing emerges as a scalable and cost-effective platform to store and manage the data. While benefits of cloud computing are numerous, security concerns arising when data and computation are outsourced to...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Storage Codes: Managing Big Data with Small Overheads

    Erasure coding provides a mechanism to store data redundantly for fault-tolerance in a cost-effective manner. Recently, there has been a renewed interest in designing new erasure coding techniques with different desirable properties, including good repairability and degraded read performance, or efficient redundancy generation processes. Very often, these novel techniques exploit...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Locally Repairable Codes With Multiple Repair Alternatives

    Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    Network Performance Aware MPI Collective Communication Operations in the Cloud

    In this paper, the authors examine the performance of collective communication operations in Message Passing Interfaces (MPI) in the cloud computing environment. The awareness of network topology has been a key factor in performance optimizations for existing MPI implementations. However, virtualization in the cloud environment not only hides the network...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems

    A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications

    Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Towards Optimal Deployment of Cloud-Assisted Video Distribution Services

    For Internet video services, the high fluctuation of user demands in geographically distributed regions results in low resource utilizations of traditional CDN systems. Due to the capability of rapid and elastic resource provisioning, cloud computing emerges as a new paradigm to reshape the model of video distribution over the Internet,...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Optimizing and Auto-Tuning Iterative Stencil Loops for GPUs with the In-Plane Method

    Stencils represent an important class of computations that are used in many scientific disciplines. Increasingly, many of the stencil computations in scientific applications are being offloaded to GPUs to improve running times. Since a large part of the simulation time is spent inside the stencil kernels, optimizing the kernel is...

    Provided By Nanyang Technological University

  • White Papers // Feb 2013

    The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage

    Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term...

    Provided By Nanyang Technological University

  • White Papers // Feb 2013

    In-Network Redundancy Generation for Opportunistic Speedup of Data Backup

    Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Community Detection in Weighted Networks: Algorithms and Applications

    Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are weighted such...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Storage Codes - Coding Rate and Repair Locality

    The repair locality of a distributed storage code is the maximum number of nodes that ever needs to be contacted during the repair of a failed node. Having small repair locality is desirable, since it is proportional to the number of disk accesses during repair. However, recent publications show that...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Green Databases Through Integration of Renewable Energy

    Recently, a lot of energy efficient techniques have been developed to reduce the usage of the carbon intensive energy (brown energy) of databases. There is a new opportunity to reduce the brown energy usage: renewable energy (green energy) has been used to at least partially power computer systems. The key...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center

    The swift adoption of cloud services is accelerating the deployment of data centers. These data centers are consuming a large amount of energy, which is expected to grow dramatically under the existing technological trends. Therefore, research efforts are in great need to architect green data centers with better energy efficiency....

    Provided By Nanyang Technological University

  • White Papers // Feb 2011

    Sequential Pattern Mining: A Survey

    Data mining is the process of extracting interesting (non-trivial, implicit, previously unknown and potentially useful) information or patterns from large information repositories such as: relational database, data warehouses, XML repository, etc. Also data mining is known as one of the core processes of Knowledge Discovery in Database (KDD). Many people...

    Provided By Nanyang Technological University

  • White Papers // Feb 2009

    Tighter and Convex Maximum Margin Clustering

    Maximum margin principle has been successfully applied to many supervised and semi-supervised problems in machine learning. Recently, this principle was extended for clustering, referred to as Maximum Margin Clustering (MMC) and achieved promising performance in recent studies. To avoid the problem of local minima, MMC can be solved globally via...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Storage Codes: Managing Big Data with Small Overheads

    Erasure coding provides a mechanism to store data redundantly for fault-tolerance in a cost-effective manner. Recently, there has been a renewed interest in designing new erasure coding techniques with different desirable properties, including good repairability and degraded read performance, or efficient redundancy generation processes. Very often, these novel techniques exploit...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    Kernelet: High-Throughput GPU Kernel Executions With Dynamic Slicing and Scheduling

    Graphics processors, or GPUs, have recently been widely used as accelerators in shared environments such as clusters and clouds. In such shared environments, many kernels are submitted to GPUs from different users, and throughput is an important metric for performance and total ownership cost. Despite recently improved runtime support for...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Towards GPU-Accelerated Large-Scale Graph Processing in the Cloud

    Recently, the authors have witnessed that cloud providers start to offer heterogeneous computing environments. There have been wide interests in both cluster and cloud of adopting Graphics Processors Unit (GPUs) as accelerators for various applications. On the other hand, large-scale processing is important for many data-intensive applications in the cloud....

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Medusa: Simplified Graph Processing on GPUs

    Graphs are common data structures for many applications, and efficient graph processing is a must for application performance. Recently, the Graphics Processing Unit (GPU) has been adopted to accelerate various graph processing algorithms such as BFS and shortest paths. However, it is difficult to write correct and efficient GPU programs...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Optimizing and Auto-Tuning Iterative Stencil Loops for GPUs with the In-Plane Method

    Stencils represent an important class of computations that are used in many scientific disciplines. Increasingly, many of the stencil computations in scientific applications are being offloaded to GPUs to improve running times. Since a large part of the simulation time is spent inside the stencil kernels, optimizing the kernel is...

    Provided By Nanyang Technological University

  • White Papers // Jul 2011

    Computation and Communication Aware Run-Time Mapping for NoC-based MPSoC Platforms

    Design-time strategies are suited only for mapping predefined set of applications and thus cannot predict dynamic behavior incurred due to the target applications and state of the platform at run-time. This dynamism demands run-time mapping of application tasks to maintain a critical balance between performance and resource optimization. Any disturbance...

    Provided By Nanyang Technological University

  • White Papers // Jan 2010

    Architecture-Aware Custom Instruction Generation for Reconfigurable Processors

    Instruction set extension is becoming extremely popular for meeting the tight design constraints in embedded systems. This mechanism is now widely supported by commercially available FPGA (Field-Programmable Gate Array) based reconfigurable processors. In this paper, the authors present a design flow that automatically enumerates and selects custom instructions from an...

    Provided By Nanyang Technological University

  • White Papers // Nov 2009

    Efficient Task Mapping in Multi-Tasking Heterogeneous MPSoC Platforms

    Real-time requirements of applications can limit the number of tasks executing in a Multi-Processor System-on-Chip (MPSoC) platform. This demand for efficient mapping algorithm that is capable of maximizing computation performance. This paper introduces a multi-tasking heterogeneous MPSoC platform along with two run-time mapping algorithms to maximize the performance by minimizing...

    Provided By Nanyang Technological University

  • White Papers // Jul 2014

    Modeling and Simulation of Networked Low-Power Embedded Systems: A Taxonomy

    Simulation has been widely adopted for the evaluation of novel protocols or other designs for networked low-power embedded systems, especially for Wireless Sensor Networks (WSNs). A large number of simulation tools have been developed for WSNs in the past few years. However, different tools may emphasize on different features. For...

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    Single-tone Frequency Shift Keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance in power line communications. However, this modulation scheme is restrictive since the number of frequencies used must be at least as large as the number of symbols...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    Multi-Receiver Homomorphic Authentication Codes for Network Coding

    The authors investigate a new class of Authenticate-codes (A-codes) that support verification by a group of message recipients in the network coding setting. That is, a sender generates an A-code over a message such that any intermediate node or recipient can check the authenticity of the message, typically to detect...

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    Cross-Domain Password-Based Authenticated Key Exchange Revisited

    The authors revisit the problem of cross-domain secure communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted Certificate Authority (CA), or the associated domain authentication servers...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    The Arithmetic Codex

    The authors introduce the notion of an arithmetic codex, or codex for short. Codices encompass several well-established notions from cryptography (various types of arithmetic secret sharing schemes, which all enjoy additive as well as multiplicative properties) and from algebraic complexity (bilinear complexity of multiplication in algebras) in a single mathematical...

    Provided By Nanyang Technological University

  • White Papers // Apr 2012

    Shorter IBE and Signatures via Asymmetric Pairings

    The authors present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric eXternal Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE and the signature schemes, all parameters have constant numbers of group elements, and are shorter than those of previous constructions based on Decisional LINear (DLIN) assumption....

    Provided By Nanyang Technological University

  • White Papers // Apr 2012

    Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective

    Channel allocation is a crucial concern in variable-width Wireless Local Area Networks (WLANs). This paper aims to obtain the stable and fair non-overlapped variable-width channel allocation for selfish Access Points (APs). In the scenario of single collision domain, the channel allocation problem reduces to a channel-width allocation problem, which can...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    A Hierarchical Framework of Dynamic Relay Selection for Mobile Users and Profit Maximization for Service Providers in Wireless Relay Networks

    Although, extensive research has been carried out on the issue of how to optimally select relays in wireless relay networks, relay selection for mobile users is still a challenging problem due to the requirement that the dynamic selection should adapt to user mobility. Moreover, since the selected relays consume their...

    Provided By Nanyang Technological University

  • White Papers // Jan 2011

    Machine-to-Machine Communications for Home Energy Management System in Smart Grid

    Machine-To-Machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications. This paper presents an investigation of the application of M2M communication in smart grid. First, an overview of M2M communications is given. The enabling technologies and open research...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    Algorithm Design for Data Communications in Duty-Cycled Wireless Sensor Networks: A Survey

    Though duty-cycling has long been a critical mechanism for energy conservation in wireless sensor networks, it is only recently that research efforts have been put to design data communication protocols that perform efficiently in Duty-Cycled Wireless Sensor Networks (DC-WSNs). In this paper, the authors survey these research problems, aiming at...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    DECA: Recovering Fields of Physical Quantities from Incomplete Sensory Data

    Although, Wireless Sensor Networks (WSNs) are powerful in monitoring physical events, the data collected from a WSN are almost always incomplete if the surveyed physical event spreads over a wide area. The reason for this incompleteness is twofold: insufficient network coverage and data aggregation for energy saving. Whereas the existing...

    Provided By Nanyang Technological University

  • White Papers // Apr 2012

    Harmonic Quorum Systems: Data Management in 2D/3D Wireless Sensor Networks With Holes

    With the development of ever-expanding Wireless Sensor Networks (WSNs) that are meant to connect physical worlds with human societies, gathering sensory data at a single point is becoming less and less practical. Unfortunately, the alternative in-network data management schemes may fail to operate in the face of communication voids (or...

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    Transmit Optimization With Improper Gaussian Signaling for Interference Channels

    This paper studies the achievable rates of Gaussian interference channels, when the improper or circularly asymmetric complex Gaussian signaling is applied. For the Gaussian Multiple-Input Multiple-Output Interference Channel (MIMO-IC) with the interference treated as Gaussian noise, the authors show that the user's achievable rate can be expressed as a summation...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    Unified Handover Authentication Between Heterogeneous Access Systems in LTE Networks

    To achieve seamless handovers between the Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and other access networks is a challenging task as it requires comprehensive real-time interconnectivity in the LTE networks. The Third Generation Partnership Project (3GPP) has suggested support the mobility between the E-UTRAN and non-3GPP access networks, which...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    Wireless Compressive Sensing for Energy Harvesting Sensor Nodes

    The authors consider the scenario in which multiple sensors send spatially correlated data to a Fusion Center (FC) via independent Rayleigh-fading channels with additive noise. Assuming that the sensor data is sparse in some basis, they show that the recovery of this sparse signal can be formulated as a Compressive...

    Provided By Nanyang Technological University

  • White Papers // Sep 2012

    Green-Aware Workload Scheduling in Geographically Distributed Data Centers

    Renewable (or green) energy, such as solar or wind, has at least partially powered data centers to reduce the environmental impact of traditional energy sources (brown energy with high carbon footprint). In this paper, the authors propose a holistic workload scheduling algorithm to minimize the brown energy consumption across multiple...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Community Detection in Weighted Networks: Algorithms and Applications

    Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are weighted such...

    Provided By Nanyang Technological University

  • White Papers // Dec 2012

    Robust Performance of Spectrum Sensing in Cognitive Radio Networks

    The successful coexistence of Secondary Users (SUs) and Primary Users (PUs) in cognitive radio networks requires SUs to be spectrum aware and know which spectrum bands are occupied by PUs. Such awareness can be achieved in several ways, one of which is spectrum sensing. While existing spectrum sensing methods usually...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications

    Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and...

    Provided By Nanyang Technological University

  • White Papers // Oct 2009

    An Interference Minimization Game Theoretic Subcarrier Allocation Algorithm for OFDMA-Based Distributed Systems

    In this paper, the authors consider a scenario where distributed users in an OFDM-based system share the spectrum for transmission. Each network user (player) comprises a pair of transmit and receive nodes and will be allocated a given number of subcarriers. They propose a utility function that aims at efficiently...

    Provided By Nanyang Technological University

  • White Papers // Oct 2009

    Design of Congestion Control Based on Instantaneous Queue Sizes in the Routers

    Recently, eXplicit Control Protocol (XCP), Rate Control Protocol (RCP), and Adaptive Proportional-Integral Rate Control Protocol (API-RCP) have been proposed for congestion control, with the main objective of achieving fair and maximum bandwidth utilization. However, studies reveal that both RCP and XCP may suffer continuous oscillations due to misestimating the bottleneck...

    Provided By Nanyang Technological University

  • White Papers // Feb 2012

    Improved Linear Precoding Over Block Diagonalization in Multi-Cell Cooperative Networks

    In downlink multiuser Multiple-Input Multiple-Output (MIMO) systems, Block Diagonalization (BD) is a practical linear pre-coding scheme which achieves the same Degrees of Freedom (DoF) as the optimal linear/nonlinear pre-coding schemes. However, its sum-rate performance is rather poor in the practical SNR regime due to the transmit power boost problem. In...

    Provided By Nanyang Technological University

  • White Papers // Dec 2011

    A CMOS Frequency Divider for 2.4/5GHz WLAN Applications With a Simplified Structure

    In this paper, a dual-band integer-N frequency divider is proposed for 2.4/5.2 GHz multi-standard wireless local area networks. It consists of a multi-modulus imbalance phase switching prescaler and two all-stage programmable counters. It is able to provide dual-band operation with high resolution while maintaining a low power consumption. This frequency...

    Provided By Nanyang Technological University

  • White Papers // Oct 2009

    Design of Low Hardware Complexity Filter Banks for Communications Systems Employing Folding Number System

    In this paper, a new architecture to compute 1-D Discrete Wavelet Transform (DWT) based on Folding Number System (FNS) is introduced. Numbers for FNS are extracted directly from analog input without any forward converter like in the Residue Number System (RNS) based DWT. The large Dynamic Range makes the FNS...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems

    A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Towards Optimal Deployment of Cloud-Assisted Video Distribution Services

    For Internet video services, the high fluctuation of user demands in geographically distributed regions results in low resource utilizations of traditional CDN systems. Due to the capability of rapid and elastic resource provisioning, cloud computing emerges as a new paradigm to reshape the model of video distribution over the Internet,...

    Provided By Nanyang Technological University

  • White Papers // Aug 2012

    On P2P Mechanisms for VM Image Distribution in Cloud Data Centers: Modeling, Analysis and Improvement

    To provide elastic cloud services with QoS guarantee, it is essential for cloud data centers to provision virtual machines rapidly according to user requests. Due to bandwidth bottleneck of centralized model, P2P model is recently adopted in data centers to relieve server workload by enabling sharing among VM instances. In...

    Provided By Nanyang Technological University

  • White Papers // Nov 2012

    Hierarchical Competition for Downlink Power Allocation in OFDMA Femtocell Networks

    This paper considers the problem of downlink power allocation in an Orthogonal Frequency-Division Multiple Access (OFDMA) cellular network with macrocells underlaid with femtocells. The Femto-Access Points (FAPs) and the Macro-Base Stations (MBSs) in the network are assumed to compete with each other to maximize their capacity under power constraints. This...

    Provided By Nanyang Technological University

  • White Papers // Feb 2012

    SIR Estimation in Hexagonal Cellular Networks With Best Server Policy

    The evaluation of the Signal to Interference Ratio (SIR) in cellular networks is of primary importance for network dimensioning. For static studies, which evaluate cell capacity and coverage, as well as for dynamic studies, which consider arrivals and departures of Mobile Stations (MS), the SIR is always an important input....

    Provided By Nanyang Technological University

  • White Papers // Oct 2012

    The LED Block Cipher

    The authors present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals; they explore the role of an ultra-light (in fact non-existent) key schedule, they consider the...

    Provided By Nanyang Technological University