Nanyang Technological University

Displaying 1-40 of 199 results

  • White Papers // Jul 2014

    Modeling and Simulation of Networked Low-Power Embedded Systems: A Taxonomy

    Simulation has been widely adopted for the evaluation of novel protocols or other designs for networked low-power embedded systems, especially for Wireless Sensor Networks (WSNs). A large number of simulation tools have been developed for WSNs in the past few years. However, different tools may emphasize on different features. For...

    Provided By Nanyang Technological University

  • White Papers // Dec 2013

    On the Effectiveness of Polynomial Realization of Reed-Solomon Codes for Storage Systems

    There are different ways to realize Reed Solomon (RS) codes. While in the storage community, using the generator matrices to implement RS codes is more popular, in the coding theory community the generator polynomials are typically used to realize RS codes. Prominent exceptions include HDFS-RAID, which uses generator polynomial based...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Analysis of BLAKE2

    The authors present a thorough security analysis of the hash function family BLAKE2, a recently proposed and already in use tweaked version of the SHA-3 finalist BLAKE. They study how existing attacks on BLAKE apply to BLAKE2 and to what extent the modifications impact the attacks. They design and run...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Revocable IBE Systems with Almost Constant-size Key Update

    It is sometimes necessary to remove keying material from use prior to the end of its normal crypto-period (or key lifetime) for reasons that include key compromise, removal of an entity from an organization, and so on. This process is known as key revocation and is used to explicitly revoke...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Developing a Grey Hat C2 and RAT for APT Security Training and Assessment

    A Remote Access Tool/Trojan (RAT) is a program that allows an external (malicious) operator to invisibly control a host. The operator may examine the system contents, transfer files, and run tools such key- and network sniffers to gain further access. RATs are often inserted on targets by forged e-mails or...

    Provided By Nanyang Technological University

  • White Papers // Nov 2013

    Cryptanalysis of Zorro

    At CHES 2013 was presented a new block cipher called zorro. Although it uses only 4 S-boxes per round, the designers showed the resistance of the cipher against various attacks, and concluded the cipher has a large security margin. In this paper, the authors give a key recovery attack on...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    The Resistance of PRESENT-80 Against Related-Key Differential Attacks

    The authors examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search they are able to prove that no related-key differential characteristic exists with probability higher than 2-64 for the full-round PRESENT-80. To overcome the exponential (in the state and key sizes)...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    Kernelet: High-Throughput GPU Kernel Executions With Dynamic Slicing and Scheduling

    Graphics processors, or GPUs, have recently been widely used as accelerators in shared environments such as clusters and clouds. In such shared environments, many kernels are submitted to GPUs from different users, and throughput is an important metric for performance and total ownership cost. Despite recently improved runtime support for...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    AEGIS: A Fast Authenticated Encryption Algorithm

    In this paper the authors introduce a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS- 128L uses eight AES round functions to process a 32-byte message block (one step). AEGIS-128 uses five AES round functions...

    Provided By Nanyang Technological University

  • White Papers // Oct 2013

    Write-Only Oblivious RAM Based Privacy-Preserved Access of Outsourced Data

    Oblivious RAM (ORAM) has recently attracted a lot of interest since it can be used to protect the privacy of data user's data access pattern from (honest but curious) outsourced storage. This is achieved by simulating each original data read or write operation with some read and write operations on...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Toward Monetary Cost Effective Content Placement in Cloud Centric Media Network

    In recent years, technical challenges are emerging on how to efficiently distribute the rapid growing User-Generated Contents (UGCs) with long-tailed nature. To address this issue, the authors have previously proposed Cloud Centric Media Network (CCMN) for cost-efficient UGCs delivery. In this paper, they further study the content placement problem in...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Cryptanalysis of Full RIPEMD-128

    In this paper the authors propose a new cryptanalysis method for double-branch hash functions that they apply on the standard RIPEMD-128, greatly improving over know results. Namely, they were able to build a very good differential path by placing one non-linear differential part in each computation branch of the RIPEMD-128...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    The Parallel-Cut Meet-In-The-Middle Attack

    The authors propose a new type of meet-in-the-middle attack that splits the cryptographic primitive in parallel to the execution of the operations. The result of the division is two primitives that have smaller input sizes and thus require lower attack complexities. However, the division is not completely independent and the...

    Provided By Nanyang Technological University

  • White Papers // Sep 2013

    Medusa: Simplified Graph Processing on GPUs

    Graphs are common data structures for many applications, and efficient graph processing is a must for application performance. Recently, the Graphics Processing Unit (GPU) has been adopted to accelerate various graph processing algorithms such as BFS and shortest paths. However, it is difficult to write correct and efficient GPU programs...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Revisiting Co-Processing for Hash Joins on the Coupled CPU GPU Architecture

    Query co-processing on Graphics Processor Units (GPUs) has become an effective means to improve the performance of main memory databases. However, the relatively low bandwidth and high latency of the PCI-e bus are usually bottleneck issues for co-processing. Recently, coupled CPU-GPU architectures have received a lot of attention, e.g. AMD...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    OmniDB: Towards Portable and Efficient Query Processing on Parallel CPU/GPU Architectures

    Driven by the rapid hardware development of parallel CPU/GPU architectures, the authors have witnessed emerging relational query processing techniques and implementations on those parallel architectures. However, most of those implementations are not portable across different architectures, because they are usually developed from scratch and target at a specific architecture. This...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Parallel Graph Processing on Graphics Processors Made Easy

    In this paper, the authors demonstrate Medusa, a programming frame-work for parallel graph processing on Graphics Processor Units (GPUs). Medusa enables developers to leverage the massive parallelism and other hardware features of GPUs by writing sequential C/C++ code for a small set of APIs. This simplifies the implementation of parallel...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Multiple Limited-Birthday Distinguishers and Applications

    In this paper, the authors propose a new improvement of the rebound techniques, used for crypt-analyzing AES-like permutations during the past years. Their improvement, that allows to reduce the complexity of the attacks, increases the probability of the outbound part by considering a new type of differential paths. Moreover, they...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    On Secret Sharing with Nonlinear Product Reconstruction

    Multiplicative linear secret sharing is a fundamental notion in the area of secure Multi-Party Computation (MPC) and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that \"The product of two secrets is obtained as a linear function of the vector consisting of...

    Provided By Nanyang Technological University

  • White Papers // Aug 2013

    Towards GPU-Accelerated Large-Scale Graph Processing in the Cloud

    Recently, the authors have witnessed that cloud providers start to offer heterogeneous computing environments. There have been wide interests in both cluster and cloud of adopting Graphics Processors Unit (GPUs) as accelerators for various applications. On the other hand, large-scale processing is important for many data-intensive applications in the cloud....

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Characterizations and Construction Methods for Linear Functional-Repair Storage Codes

    The authors present a precise characterization of linear functional-repair storage codes in terms of admissible states, with each state made up from a collection of vector spaces over some fixed finite field. To illustrate the usefulness of their characterization, they provide several applications. They first describe a simple construction of...

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Matrix Codes and Multitone Frequency Shift Keying for Power Line Communications

    Single-tone Frequency Shift Keying (FSK) modulation with permutation codes has been found to be useful in addressing the problem of narrowband noise disturbance in power line communications. However, this modulation scheme is restrictive since the number of frequencies used must be at least as large as the number of symbols...

    Provided By Nanyang Technological University

  • White Papers // Jul 2013

    Implementing Lightweight Block Ciphers on x86 Architectures

    Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many constrained devices communicate with a server, it is also crucial that the cipher has good software performance on the server side. Recent...

    Provided By Nanyang Technological University

  • White Papers // Jun 2013

    Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128

    Block ciphers and hash functions are among the most important primitives in cryptography and while their respective goals are different, they are related in many ways. While the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Streamforce: Outsourcing Access Control Enforcement for Stream Data to the Clouds

    As tremendous amount of data being generated everyday from human activity and from devices equipped with sensing capabilities, cloud computing emerges as a scalable and cost-effective platform to store and manage the data. While benefits of cloud computing are numerous, security concerns arising when data and computation are outsourced to...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Storage Codes: Managing Big Data with Small Overheads

    Erasure coding provides a mechanism to store data redundantly for fault-tolerance in a cost-effective manner. Recently, there has been a renewed interest in designing new erasure coding techniques with different desirable properties, including good repairability and degraded read performance, or efficient redundancy generation processes. Very often, these novel techniques exploit...

    Provided By Nanyang Technological University

  • White Papers // May 2013

    Locally Repairable Codes With Multiple Repair Alternatives

    Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    Network Performance Aware MPI Collective Communication Operations in the Cloud

    In this paper, the authors examine the performance of collective communication operations in Message Passing Interfaces (MPI) in the cloud computing environment. The awareness of network topology has been a key factor in performance optimizations for existing MPI implementations. However, virtualization in the cloud environment not only hides the network...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems

    A mobile cloud computing system is composed of heterogeneous services and resources to be allocated by the cloud service provider to mobile cloud users. On one hand, some of these resources are substitutable (e.g., users can use storage from different places) that they have similar functions to the users. On...

    Provided By Nanyang Technological University

  • White Papers // Apr 2013

    A Real-Time Group Auction System for Efficient Allocation of Cloud Internet Applications

    Increasing number of the cloud-based Internet applications demands for efficient resource and cost management. This paper proposes a real-time group auction system for the cloud instance market. The system is designed based on a combinatorial double auction, and its applicability and effectiveness are evaluated in terms of resource efficiency and...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Towards Optimal Deployment of Cloud-Assisted Video Distribution Services

    For Internet video services, the high fluctuation of user demands in geographically distributed regions results in low resource utilizations of traditional CDN systems. Due to the capability of rapid and elastic resource provisioning, cloud computing emerges as a new paradigm to reshape the model of video distribution over the Internet,...

    Provided By Nanyang Technological University

  • White Papers // Mar 2013

    Optimizing and Auto-Tuning Iterative Stencil Loops for GPUs with the In-Plane Method

    Stencils represent an important class of computations that are used in many scientific disciplines. Increasingly, many of the stencil computations in scientific applications are being offloaded to GPUs to improve running times. Since a large part of the simulation time is spent inside the stencil kernels, optimizing the kernel is...

    Provided By Nanyang Technological University

  • White Papers // Feb 2013

    The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage

    Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term...

    Provided By Nanyang Technological University

  • White Papers // Feb 2013

    In-Network Redundancy Generation for Opportunistic Speedup of Data Backup

    Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Community Detection in Weighted Networks: Algorithms and Applications

    Community detection is an important issue due to its wide use in designing network protocols such as data forwarding in Delay Tolerant Networks (DTN) and worm containment in Online Social Networks (OSN). However, most of the existing community detection algorithms focus on binary networks. Since most networks are weighted such...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Storage Codes - Coding Rate and Repair Locality

    The repair locality of a distributed storage code is the maximum number of nodes that ever needs to be contacted during the repair of a failed node. Having small repair locality is desirable, since it is proportional to the number of disk accesses during repair. However, recent publications show that...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    Green Databases Through Integration of Renewable Energy

    Recently, a lot of energy efficient techniques have been developed to reduce the usage of the carbon intensive energy (brown energy) of databases. There is a new opportunity to reduce the brown energy usage: renewable energy (green energy) has been used to at least partially power computer systems. The key...

    Provided By Nanyang Technological University

  • White Papers // Jan 2013

    An Empirical Investigation of the Impact of Server Virtualization on Energy Efficiency for Green Data Center

    The swift adoption of cloud services is accelerating the deployment of data centers. These data centers are consuming a large amount of energy, which is expected to grow dramatically under the existing technological trends. Therefore, research efforts are in great need to architect green data centers with better energy efficiency....

    Provided By Nanyang Technological University

  • White Papers // Dec 2012

    Robust Performance of Spectrum Sensing in Cognitive Radio Networks

    The successful coexistence of Secondary Users (SUs) and Primary Users (PUs) in cognitive radio networks requires SUs to be spectrum aware and know which spectrum bands are occupied by PUs. Such awareness can be achieved in several ways, one of which is spectrum sensing. While existing spectrum sensing methods usually...

    Provided By Nanyang Technological University

  • White Papers // Dec 2012

    Perceptually Motivated Shape Context Which Uses Shape Interiors

    In this paper, the authors identify some of the limitations of current-day shape matching techniques. They provide examples of how contour-based shape matching techniques cannot provide a good match for certain visually similar shapes. To overcome this limitation, they propose a perceptually motivated variant of the well-known shape context descriptor....

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    Energy Optimizations for Data Center Network: Formulation and Its Solution

    Data center consumes increasing amount of power nowadays, together with expanding number of data centers and upgrading data center scale, its power consumption becomes a knotty issue. While main efforts of this research focus on server and storage power reduction, network devices as part of the key components of data...

    Provided By Nanyang Technological University

  • White Papers // Aug 2012

    Content Routing and Lookup Schemes Using Global Bloom Filter for Content-Delivery-as-a-Service

    Leveraging cloud computing technology, the authors have proposed Content-Delivery-as-a-Service (CoDaaS) to distribute User Generated Content (UGC) in an efficient and economical fashion. However, due to the exponential increases of Internet traffic, traditional hashing-based content routing and lookup scheme suffers from high delay. This paper introduces a global Compressed Counting Bloom...

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    Optimizing Content Retrieval Delay for LT-Based Distributed Cloud Storage Systems

    Among different setups of cloud storage systems, fountain-codes based distributed cloud storage system provides reliable online storage solution through placing coded content fragments into multiple storage nodes. Luby Transform (LT) code is one of the popular fountain codes for storage systems due to its efficient recovery. However, to ensure high...

    Provided By Nanyang Technological University

  • White Papers // Aug 2012

    Socially-Responsible Load Scheduling Algorithms for Sustainable Data Centers Over Smart Grid

    Power consumption of data centers accounts for a significant portion of operational cost for service providers. However, it is not sufficient to minimize electricity cost only. Instead, service providers should also consider the sustainability of data centers. In this paper, the authors investigate the problem of socially-responsible load scheduling for...

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    QoE-Driven Cache Management for HTTP Adaptive Bit Rate (ABR) Streaming Over Wireless Networks

    In this paper, the authors investigate the problem of how to cache a set of media files with optimal streaming rates, under HTTP adaptive bit rate streaming over wireless networks. The design objective is to achieve the optimal expected QoE under a limited storage budget, which is measured by the...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    Efficient Spatial Keyword Search in Trajectory Databases

    An increasing amount of trajectory data is being annotated with text descriptions to better capture the semantics associated with locations. The fusion of spatial locations and text descriptions in trajectories engenders a new type of top-k queries that take into account both aspects. Each trajectory in consideration consists of a...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    Cloud and the City: Facilitating Flexible Access Control over Data Streams

    The proliferation of sensing devices create plethora of data-streams, which in turn can be harnessed to carry out sophisticated analytics to support various real-time applications and services as well as long-term planning, e.g., in the context of intelligent cities or smart homes to name a few prominent ones. A mature...

    Provided By Nanyang Technological University

  • White Papers // Jul 2012

    A GPS Pseudorange Based Cooperative Vehicular Distance Measurement Technique

    Accurate vehicular localization is important for various Cooperative Vehicle Safety (CVS) applications such as collision avoidance, turning assistant, etc. In this paper, the authors propose a cooperative vehicular distance measurement technique based on the sharing of GPS pseudorange measurements and a weighted least squares method. The classic double difference pseudorange...

    Provided By Nanyang Technological University

  • White Papers // Dec 2012

    Cluster-Based Transform Domain Communication Systems for High Spectrum Efficiency

    This paper presents a cluster-based Transform Domain Communication System (TDCS) to improve spectrum efficiency. Unlike the utilities of clusters in Orthogonal Frequency Division Multiplex (OFDM) systems, the cluster-based TDCS framework divides entire unoccupied spectrum bins into L clusters, where each one represents a data steam independently, to achieve L times...

    Provided By Nanyang Technological University

  • White Papers // Dec 2012

    Perceptually Motivated Shape Context Which Uses Shape Interiors

    In this paper, the authors identify some of the limitations of current-day shape matching techniques. They provide examples of how contour-based shape matching techniques cannot provide a good match for certain visually similar shapes. To overcome this limitation, they propose a perceptually motivated variant of the well-known shape context descriptor....

    Provided By Nanyang Technological University

  • White Papers // Nov 2011

    The PHOTON Family of Lightweight Hash Functions

    RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an on-tag hash function is available. In this paper, the authors present the PHOTON lightweight hash-function family, available in many different flavors and suitable for extremely constrained devices such as passive...

    Provided By Nanyang Technological University

  • White Papers // Dec 2011

    Fully Secure Spatial Encryption Under Simple Assumptions With Constant-Size Ciphertexts

    In this paper, the authors propose two new Spatial Encryption (SE) schemes based on existing Inner Product Encryption (IPE) schemes. Both of their SE schemes are fully secure under simple assumptions and in prime order bilinear groups. Moreover, one of their SE schemes has constant-size ciphertexts. Since, SE implies Hierarchical...

    Provided By Nanyang Technological University

  • White Papers // Feb 2012

    MEGCOM: Min-Energy Group COMmunication in Multi-Hop Wireless Networks

    Given the increasing demand from wireless applications, designing energy-efficient group communication protocols is of great importance to multi-hop wireless networks. A group communication session involves a set of member nodes, each of them needs to send a certain number of data packets to all other members. In this paper, the...

    Provided By Nanyang Technological University

  • White Papers // Dec 2011

    Joint Network Coding for Interfering Wireless Multicast Networks

    Interference in wireless networks is one of the key-capacity limiting factor. The multicast capacity of an ad-hoc wireless network decreases with an increasing number of transmitting and/or receiving nodes within a fixed area. Digital Network Coding (DNC) has been shown to improve the multicast capacity of non-interfering wireless network. However...

    Provided By Nanyang Technological University

  • White Papers // Sep 2011

    Cooperative and Distributed Localization for Wireless Sensor Networks in Multipath Environments

    The authors consider the problem of sensor localization in a wireless network in a multipath environment, where time and angle of arrival information are available at each sensor. They propose a distributed algorithm based on belief propagation, which allows sensors to cooperatively self-localize with respect to one single anchor in...

    Provided By Nanyang Technological University

  • White Papers // Sep 2009

    Connectivity, Coverage and Placement in Wireless Sensor Networks

    Wireless communication between sensors allows the formation of flexible sensor networks, which can be deployed rapidly over wide or inaccessible areas. However, the need to gather data from all sensors in the network imposes constraints on the distances between sensors. This paper describes the state of the art in techniques...

    Provided By Nanyang Technological University

  • White Papers // Dec 2008

    Multi-User SISO Precoding Based on Generalized Multi-Unitary Decomposition for Single-Carrier Transmission in Frequency Selective Channel

    MIMO technology has been widely researched in recent years due to its advantages of increasing capacity and diversity gain. With the availability of Channel State Information (CSI) at the transmitter, the multi-antenna techniques can be used to serve multiple users simultaneously, this is because multiple antennas at the transmitter provide...

    Provided By Nanyang Technological University

  • White Papers // Oct 2009

    Max-Min Antenna Selection for Bi-Directional Multi-Antenna Relaying

    In this paper, the authors study the performance of bidirectional (two-way) communication system using two different broadcast schemes with network coding. They propose the use of Max-Min criteria for antenna selection with binary network coding and transmit beamformig without binary network coding. They derive and show that unlike traditional antenna...

    Provided By Nanyang Technological University

  • White Papers // Dec 2009

    Group-Decodable Diversity Embedded Space-Time Code

    Diversity embedded space-time code can be used to simultaneously transmit data streams with different diversity levels embedded. However, the decoding complexity of diversity embedded code is high due to the lack quasi-orthogonal (group-decodable) code structure. In this paper, group-decodable diversity embedded space-time code is proposed and constructed systematically for the...

    Provided By Nanyang Technological University

  • White Papers // Jun 2011

    Understanding the Flooding in Low-Duty-Cycle Wireless Sensor Networks

    In low-duty-cycle networks, sensors stay dormant most of time to save their energy and wake up based on their needs. Such a technique, while prolonging the network lifetime, sets excessive challenges for efficient flooding within the network. Tailored for obtaining short delay in low-duty-cycle networks, recently proposed flooding protocols have...

    Provided By Nanyang Technological University

  • White Papers // Feb 2012

    Energy Minimization Via Dynamic Voltage Scaling for Real-Time Video Encoding on Mobile Devices

    This paper investigates the problem of minimizing energy consumption for real-time video encoding on mobile devices, by dynamically configuring the clock frequency in the CPU via the Dynamic Voltage Scaling (DVS) technology. The problem can be formulated as a constrained optimization problem, whose objective is to minimize the total energy...

    Provided By Nanyang Technological University

  • White Papers // Jan 2012

    Energy Efficiency and Server Virtualization in Data Centers: An Empirical Investigation

    With a growing concern on the considerable energy consumed by data centers, research efforts are targeting toward green data centers with higher energy efficiency. In particular, server virtualization is emerging as the prominent approach to consolidate applications from multiple applications to one server, with an objective to save energy usage....

    Provided By Nanyang Technological University

  • White Papers // Jan 2012

    Energy-Optimal Mobile Application Execution: Taming Resource-Poor Mobile Devices With Cloud Clones

    In this paper, the authors propose to leverage cloud computing to tame resource-poor mobile devices. Specifically, mobile applications can be executed in the mobile device (known as mobile execution) or offloaded to the cloud clone for execution (known as cloud execution), with an objective to conserve energy for mobile device....

    Provided By Nanyang Technological University

  • White Papers // Oct 2011

    CoDaaS: An Experimental Cloud-Centric Content Delivery Platform for User-Generated Contents

    User-Generated Content (UGC) is emerging as one of the dominate forms in global media industry. However, the efficient delivery of UGC faces with massive technical challenges due to its long-tail nature. Content Delivery Networks (CDN) based systems are considered as the potential solutions to deliver UGC. But none of the...

    Provided By Nanyang Technological University

  • White Papers // Sep 2011

    Complexity-Rate-Distortion Evaluation of Video Encoding for Cloud Media Computing

    Cloud computing provides a promising solution to cope with the increased complexity in new video compression standards and the increased data volume in video source. It not only saves the cost of too frequent equipment upgrading but also gives individual users the flexibilities to choose the amount of computing according...

    Provided By Nanyang Technological University

  • White Papers // Oct 2011

    On File Delay Minimization for Content Uploading to Media Cloud Via Collaborative Wireless Network

    This paper investigates the problem of uploading user-generated content files (e.g., video captured on mobile devices) to a media cloud via a cooperative wireless network. The multi-path opportunity inherent to the cooperative network provides a new dimension by optimally allocating all the packets into different paths to improve the user...

    Provided By Nanyang Technological University

  • White Papers // Oct 2010

    Architecting Green Broadband Cable Access Network: Energy-Delay Trade-Off

    The authors propose and investigate an energy-saving algorithm for DOCSIS-3.0 cable access networks. Numerical simulations indicate a possible 17.4% energy-saving for 8000 cable modems, but also reveal a fundamental trade-off between energy and delay. Lately, reducing the energy cost has become one of the daunting challenges in Information and Communication...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    On the (In)Security of IDEA in Various Hashing Modes

    In this paper, the authors study the security of the IDEA block cipher when it is used in various simple-length or double-length hashing modes. Even though this cipher is still considered as secure, they show that one should avoid its use as internal primitive for block cipher based hashing. In...

    Provided By Nanyang Technological University

  • White Papers // Sep 2008

    Fast Visual Saliency Map Extraction From Digital Video

    A fast algorithm to extract the visual saliency map from digital video is proposed in this paper. Since, digital video is stored and/or transmitted in coded form, the authors utilize the Motion Vector Field (MVF) for foreground/background separation and apply an image based contrast model for further performance improvement. The...

    Provided By Nanyang Technological University

  • White Papers // Jul 2011

    Dynamic Service Selection and Bandwidth Allocation in IEEE 802.16m Mobile Relay Networks

    Cooperative relay network will be supported in IEEE 802.16m to improve the coverage and performance of mobile broadband wireless access service. In this paper, the authors jointly consider the problem of dynamic service selection and bandwidth allocation in IEEE 802.16m mobile relay networks. Specifically, the Advanced Mobile Stations (AMSs) perform...

    Provided By Nanyang Technological University

  • White Papers // Apr 2010

    A Ferry Scheme for Geocast in MANETs

    In this paper, the authors propose a fully distributed scheme that uses a subset of nodes, namely ferries, to perform geographical broadcast tasks in a Mobile Ad Hoc NETwork (MANET). This scheme, referred to as the GeoFerry scheme, is to the best of their knowledge, one of the first scheme...

    Provided By Nanyang Technological University

  • White Papers // Oct 2012

    Performance Analysis of Two-Step Bi-Directional Relaying with Multiple Antennas

    In this paper, the authors study decode-and-forward multi-antenna relay systems that achieve bi-directional communication in two time slots. They investigate different downlink broadcast schemes which employ binary or analog network coding at the relay. They also analyze and compare their performances in terms of diversity order and symbol error probability....

    Provided By Nanyang Technological University

  • White Papers // May 2012

    An Pre-Authentication Protocol With Symmetric Keys for Secure Handover in Mobile WiMAX Networks

    Mobile users expect quick and secured handovers to achieve seamless service connection. However, long delay due to the time-consuming authentication procedure is a well-known bottleneck of the mobile WiMAX handover schemes. In this paper, a pre-authentication based handover scheme using symmetric key cryptography is proposed to facilitate fast and secure...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    Spectrum Sensing Under Distribution Uncertainty in Cognitive Radio Networks

    The successful coexistence of cognitive radio systems with licensed system requires the secondary users the capability of interference-awareness, i.e., knowing which spectrum bands are occupied by primary users, i.e., the legacy users. Spectrum sensing thus is a key enabling module, which usually models the sensing process as a binary hypothesis...

    Provided By Nanyang Technological University

  • White Papers // May 2012

    Prompt Congestion Reaction Scheme for Data Center Network Using Multiple Congestion Points

    With recent advocates on end-to-end congestion control, the authors still observe lack of consideration of network congestion status in literature. Since end-to-end congestion control mechanisms are capable of gathering path load information through data paths, taking advantage of this information, network systems have potential capacity to react promptly in presence...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    Dynamic Spectrum Access for Meter Data Transmission in Smart Grid: Analysis of Packet Loss

    The smart grid uses data communications techniques to gather and transfer information for scheduling and decision making so that the electric power can be used more efficiently and economically. To reduce the cost of data communications in smart grid, in this paper, the authors assume that cognitive radio technique is...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    Optimal Admission Control Policy for Mobile Cloud Computing Hotspot With Cloudlet

    The authors consider an admission control problem and adaptive resource allocation for running mobile applications on a cloudlet. They formulate an optimization problem for dynamic resource sharing of mobile users in Mobile Cloud Computing (MCC) hotspot with a cloudlet as a Semi-Markov Decision Process (SMDP). SMDP is transformed into a...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    Real-Time In-Network Single Frequency GPS Processing for Deformation Monitoring

    In this paper, the authors explore the use of Wireless Mesh Networks (WMN) for the purpose of exchanging GPS raw data within GPS stations in a WMN to support real-time in-network processing of low-cost single-frequency GPS devices. A proof of concept deployment with a small number of GPS stations was...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    Subcarrier Assignment in Multi-Cell OFDMA Systems Via Interference Minimization Game

    Fair and efficient subcarrier assignment for an infrastructure-based cellular OFDMA network is a challenging problem due to interferences from neighboring cells. In this paper, the authors investigate this problem using potential game theory, where the utility function adopted is meant for minimizing the co-channel interferences among different players. Each of...

    Provided By Nanyang Technological University

  • White Papers // Mar 2012

    Purpose-Movement Assisted Routing for Group Mobility in Disconnected Mobile Ad Hoc Networks

    As a challenged network, the Delay-Tolerant Network (DTN) generally has unpredictable delay for the packet delivery due to the insufficiency of the network connectivity. Thus, it is inadequate to support some time-sensitive applications. In this paper, the authors aim to mitigate this unpredictability of the delay in DTN to broaden...

    Provided By Nanyang Technological University