National University of Defense Technology

Displaying 1-34 of 34 results

  • White Papers // Jul 2013

    Towards an Extensible and Secure Cloud Architecture Model for Sensor Information System

    Sensor information system is a specific distributed information management system for applying sensor data and aims to effectively process, manage, and analyze data emanating from sensor networks. Recently, with the development of sensor networks, sensor information system encounters many challenges, such as huge and diverse data, heterogeneous clients, scalability, and...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Periodic Portfolio Scheduler for Scientific Computing in the Data Center

    The popularity of data centers in scientific computing has led to new architectures, new workload structures, and growing customer bases. As a consequence, the selection of efficient scheduling algorithms for the data center is an increasingly costlier and more difficult challenge. To address this challenge, and contrasting previous work on...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Framework of Event-Driven Detection System for Intricate Network Threats

    As the network threats now-a-days turn to be more intricate and diversiform, traditional intrusion detection methods are facing with the challenges of lacking flexibility because that they are just code-actual. This paper summarizes the common correlating features exhibited by the network events from the perspective of the detector, and proposes...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    Eliminate Evading Analysis Tricks in Malware Using Dynamic Slicing

    In order to be a long time alive, modern malware often make anti-emulation check after launched for evading dynamic analysis. Malware authors gain fingerprint information of target environment through several API to detect whether their creations are running in monitored state or not. If an emulated analysis environment is detected,...

    Provided By National University of Defense Technology

  • White Papers // Oct 2012

    Online Optimization of VM Deployment in IaaS Cloud

    Infrastructure-as-a-Service (IaaS) clouds provide on-demand Virtual Machines (VMs) to users. How to improve the quality of IaaS cloud services is important for service providers. Currently, the VMs in an IaaS cloud are usually deployed with respect to the maximum utilization of resources. In this paper, the authors propose an online...

    Provided By National University of Defense Technology

  • White Papers // May 2012

    Understanding the Scheduling Performance in Wireless Networks With Successive Interference Cancellation

    Successive Interference Cancellation (SIC) is an effective way of multi-packet reception to combat interference in wireless networks. The authors focus on link scheduling in wireless networks with SIC, and propose a layered protocol model and a layered physical model to characterize the impact of SIC. In both the interference models,...

    Provided By National University of Defense Technology

  • White Papers // May 2012

    Topology-Aware Deployment of Scientific Applications in Cloud Computing

    Now-a-days, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually topology-aware applications. Therefore, considering the topology of a scientific application during the development will benefit the performance of the application. However,...

    Provided By National University of Defense Technology

  • White Papers // Jan 2012

    Whole Packet Forwarding: Efficient Design of Fully Adaptive Routing Algorithms for Networks-on-Chip

    Routing algorithms for Networks-on-Chip (NoCs) typically only have a small number of Virtual Channels (VCs) at their disposal. Limited VCs pose several challenges to the design of fully adaptive routing algorithms. First, fully adaptive routing algorithms based on previous deadlock-avoidance theories require a conservative VC re-allocation scheme: a VC can...

    Provided By National University of Defense Technology

  • White Papers // Dec 2011

    On the Security of NMAC and Its Variants

    HMAC, a derivative of NMAC, is a practically and commonly used, widely standardized MAC construction nowadays. HMAC has two advantages. First, HMAC can make use of current hash functions, the most widely used ones are based on Merkle-Damgard construction, without modification. Second, it is provable secure under two assumptions that...

    Provided By National University of Defense Technology

  • White Papers // Oct 2011

    Jammer Localization for Wireless Sensor Networks

    Jamming attack can severely affect the performance of Wireless Sensor Networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, they in this paper propose a jammer localization algorithm named as Minimum-circle-covering based localization (MCCL). Comparing with the existing solutions that...

    Provided By National University of Defense Technology

  • White Papers // Jun 2011

    Evaluation of Deflection Routing on Various NoC Topologies

    In this paper, the authors propose two novel deflection routing algorithms for de Bruijn and Spidergon NoCs and evaluate the performance of the deflection routing on 5 NoC topologies with different synthetic traffic patterns. They also synthesize the routers in various NoC topologies with TSMC 65nm technology. The evaluation results...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Some Observations on MISTY Structure With SPN Round Function

    MISTY structure is a kind of block cipher structure that can provide provable security against differential and linear cryptanalysis. In this paper, the authors present some distinguishing properties of MISTY structure with SPN round function. They first show the existence of 6-round integral distinguishers when the linear transformation in the...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Applying Low-Latency Peer-to-Peer Muliticast to Online Collaborative Language Learning

    Peer-to-Peer computing technology brings satisfactory distance education to a large number of people at anytime anywhere with a low cost. While many online learning systems connect students asynchronously or provide them with recorded lectures, few systems focus on facilitating synchronous collaborative work among learners. Low latency requirement, dynamic group members...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Multi-Channel-Multi-MAC Model Architecture for Multi-Net-Multi-Link Tactical Data Link in NS-2

    Because of the coexistence of multiplex Tactical Data Links (TDLs) it is urgent to study the cooperation of Multi-Net-Multi-Link (MNML) TDL. This paper proposes a Multi-Channel-Multi-MAC (MCMM) model architecture to support MNML TDL simulation. The MCMM model adds several copies of data link layer, network interface and channel which are...

    Provided By National University of Defense Technology

  • White Papers // Feb 2011

    A Game-Theoretic Approach to Joint Modulation, Rate and Power Control for Cognitive CDMA Communications

    A game-theoretic framework was used to study the effect of modulation on the energy efficiency of cognitive CDMA (Code Division Multiple Access) communications for adaptive modulation. The authors designed an adaptive utility function which can link modulation, rate and power control. Since users are selfish and rational, a non-cooperative game...

    Provided By National University of Defense Technology

  • White Papers // Jan 2011

    Fine-Grained Location-Free Planarization in Wireless Sensor Networks

    Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topology extraction are often based on ideal assumptions, such as UDG communication model and accurate node location measurements. To make these protocols work effectively in...

    Provided By National University of Defense Technology

  • White Papers // Dec 2010

    Service-Oriented Simulation Framework: An Overview and Unifying Methodology

    The prevailing net-centric environment demands and enables modeling and simulation to combine efforts from numerous disciplines. Software techniques and methodology, in particular service-oriented architecture, provide such an opportunity. Service-oriented simulation has been an emerging paradigm following on from object- and process-oriented methods. However, the ad-hoc frameworks proposed so far generally...

    Provided By National University of Defense Technology

  • White Papers // Nov 2010

    Power-Efficient Tree-Based Multicast Support for Networks-on-Chip

    In this paper, a novel hardware supporting for multicast on mesh Networks-on-Chip (NoC) is proposed. It supports multicast routing on any shape of tree-based path. Two power-efficient tree-based multicast routing algorithms, OPtimized Tree (OPT) and Left-XY-Right-OPtimized Tree (LXYROPT) are also proposed. XY Tree-based (XYT) algorithm and Multiple Unicast Copies (MUC)...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Space-Time Codes With Block-Orthogonal Structure and Their Simplified ML and Near-ML Decoding

    Existing high-rate full diversity Space-Time Codes (STC) always have high decoding complexity with traditional ML (maximum-likelihood) or near-ML decoding. Hence the decoding scheme with reduced complexity is required. In this paper, block-orthogonal structure is introduced for the first time, and most of the existing STC do have such structure. A...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Delay-Tolerant Cooperative Diversity Routing MANET

    Some Mobile Ad hoc NETworks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup overhead. However, many existing cooperative MANETs have complex MAC protocol and high overhead. In this paper, the authors propose a cross-layer design across the routing,...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Wukong: A Cloud-Oriented File Service for Mobile Internet Devices

    Along with the rapid growth of heterogeneous cloud services and network technologies, more mobile devices use cloud storage services to enlarge the capacity and share data in the daily lives. The authors commonly use cloud storage service clients in a straight forward fashion, since they may easily obtain most client-side...

    Provided By National University of Defense Technology

  • White Papers // Mar 2010

    Block-Orthogonal Space-Time Codes With Decoding Complexity Reduction

    Conventional approaches to high-rate Space-Time Codes (STC) design focus on achieving maximum diversity and spatial multiplexing gains, hence they always have high decoding complexity. In this paper, the authors propose and construct a new class of STC, called Block-Orthogonal STC (BOSTC), which has a simplified ML (Maximum Likelihood) or near-ML...

    Provided By National University of Defense Technology

  • White Papers // Nov 2009

    RSFB: A Resilient Stochastic Fair Blue Algorithm Against Spoofing DDoS Attacks

    The existing Active Queue Management (AQM) algorithms, including the fairness-aimed ones, are notably vulnerable to spoofing DDoS attacks. The authors propose a Resilient Stochastic Fair Blue (RSFB) algorithm against spoofing DDoS attacks. The basic idea behind RSFB is to record the responsive normal TCP flows and rescue their dropped packets....

    Provided By National University of Defense Technology

  • White Papers // Oct 2009

    A Fair-Priority MAC Design in Networked Control System

    Media Access Control (MAC) protocols in Wireless Networked Control System (WNCS) must minimize the radio energy costs in sensor nodes. Latency and throughput are also important design features for MAC protocols in the applications. But most of them cannot guarantee quality for real-time traffic. This paper studies the state of...

    Provided By National University of Defense Technology

  • White Papers // Sep 2009

    Speedup Analysis of Data-Parallel Applications on Multi-Core NoCs

    As more computing cores are integrated onto a single chip, the effect of network communication latency is becoming more and more significant on multi-core Network-on-Chips (NoCs). For data-parallel applications, the authors study the model of parallel speedup by including network communication latency in Amdahl's law. The speedup analysis considers the...

    Provided By National University of Defense Technology

  • White Papers // Sep 2009

    Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks

    Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions on the network in order to capture the specific (partial) symptom induced by wormholes. Those requirements and assumptions limit the applicability of previous approaches. In...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Fast-Group-Decodable Space-Time Block Code

    To make the implementation of high-rate STBC realistic in practical systems, group-decodable and fast-decodable code structures have been separately introduced into STBC to reduce the sphere decoding complexity. However, no STBC has both the two code structures until now. In this paper, high-rate Fast-Group-Decodable STBC (FGD-STBC, which has both fast-decodable...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Service-Oriented High Level Architecture

    Recently, service-oriented paradigm is emerging as a new pattern following process-oriented and object-oriented ones in systems analysis and software development. Service-Oriented High Level Architecture (SOHLA) refers to the High Level Architecture (HLA) enabled by Service-Oriented Architecture (SOA) and Web Services etc. techniques which supports distributed interoperating services. The detailed comparisons...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Exploiting Spatial Reuse in Multi-Hop MIMO Networks: Models, Algorithms, and Evaluation

    MIMO has great potential for enhancing the throughput of multi-hop wireless networks via spatial multiplexing or spatial reuse techniques. Spatial reuse outperforms spatial multiplexing in terms of potential network throughput and is effective in a wider range of wireless contexts than spatial multiplexing. The network throughput when previous approaches of...

    Provided By National University of Defense Technology

  • White Papers // Jun 2009

    Novel Symbol-Wise ML Decodable STBC for IEEE 802.16e/m Standard

    This paper is novel real symbol-wise ML decodable STBCs with balanced information distribution per codeword are constructed systemically for arbitrary number of transmit antennas. Compared with the existing real symbol-wise ML decodable STBCs in IEEE 802.16e standard, the proposed STBCs also have lower Peak-to-Average Power Ratio (PAPR) and better performance...

    Provided By National University of Defense Technology

  • White Papers // Jun 2009

    Three-Dimensional Conceptual Model for Service-Oriented Simulation

    In this paper, the authors propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between...

    Provided By National University of Defense Technology

  • White Papers // Jan 2009

    Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed resource constrained sensor nodes which can cooperatively monitor physical or environmental conditions. The wide applications of WSN and the challenges in them have attracted many researchers to develop protocols and algorithms. Broadcasts are important network functions in...

    Provided By National University of Defense Technology

  • White Papers // Jan 2006

    Transformation BPEL to CP-Nets for Verifying Web Services Composition

    Web services composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Business Process Execution Language (BPEL) is a promising language describing the Web services composition in form of business processes, but lack of a sound formal semantic, which hinders the formal analysis and verification of...

    Provided By National University of Defense Technology

  • White Papers // Jul 2013

    Towards an Extensible and Secure Cloud Architecture Model for Sensor Information System

    Sensor information system is a specific distributed information management system for applying sensor data and aims to effectively process, manage, and analyze data emanating from sensor networks. Recently, with the development of sensor networks, sensor information system encounters many challenges, such as huge and diverse data, heterogeneous clients, scalability, and...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Framework of Event-Driven Detection System for Intricate Network Threats

    As the network threats now-a-days turn to be more intricate and diversiform, traditional intrusion detection methods are facing with the challenges of lacking flexibility because that they are just code-actual. This paper summarizes the common correlating features exhibited by the network events from the perspective of the detector, and proposes...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    Eliminate Evading Analysis Tricks in Malware Using Dynamic Slicing

    In order to be a long time alive, modern malware often make anti-emulation check after launched for evading dynamic analysis. Malware authors gain fingerprint information of target environment through several API to detect whether their creations are running in monitored state or not. If an emulated analysis environment is detected,...

    Provided By National University of Defense Technology

  • White Papers // Jun 2009

    Novel Symbol-Wise ML Decodable STBC for IEEE 802.16e/m Standard

    This paper is novel real symbol-wise ML decodable STBCs with balanced information distribution per codeword are constructed systemically for arbitrary number of transmit antennas. Compared with the existing real symbol-wise ML decodable STBCs in IEEE 802.16e standard, the proposed STBCs also have lower Peak-to-Average Power Ratio (PAPR) and better performance...

    Provided By National University of Defense Technology

  • White Papers // Jan 2009

    Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed resource constrained sensor nodes which can cooperatively monitor physical or environmental conditions. The wide applications of WSN and the challenges in them have attracted many researchers to develop protocols and algorithms. Broadcasts are important network functions in...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Wukong: A Cloud-Oriented File Service for Mobile Internet Devices

    Along with the rapid growth of heterogeneous cloud services and network technologies, more mobile devices use cloud storage services to enlarge the capacity and share data in the daily lives. The authors commonly use cloud storage service clients in a straight forward fashion, since they may easily obtain most client-side...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Some Observations on MISTY Structure With SPN Round Function

    MISTY structure is a kind of block cipher structure that can provide provable security against differential and linear cryptanalysis. In this paper, the authors present some distinguishing properties of MISTY structure with SPN round function. They first show the existence of 6-round integral distinguishers when the linear transformation in the...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Service-Oriented High Level Architecture

    Recently, service-oriented paradigm is emerging as a new pattern following process-oriented and object-oriented ones in systems analysis and software development. Service-Oriented High Level Architecture (SOHLA) refers to the High Level Architecture (HLA) enabled by Service-Oriented Architecture (SOA) and Web Services etc. techniques which supports distributed interoperating services. The detailed comparisons...

    Provided By National University of Defense Technology

  • White Papers // Jun 2009

    Three-Dimensional Conceptual Model for Service-Oriented Simulation

    In this paper, the authors propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between...

    Provided By National University of Defense Technology

  • White Papers // Dec 2010

    Service-Oriented Simulation Framework: An Overview and Unifying Methodology

    The prevailing net-centric environment demands and enables modeling and simulation to combine efforts from numerous disciplines. Software techniques and methodology, in particular service-oriented architecture, provide such an opportunity. Service-oriented simulation has been an emerging paradigm following on from object- and process-oriented methods. However, the ad-hoc frameworks proposed so far generally...

    Provided By National University of Defense Technology

  • White Papers // Nov 2010

    Power-Efficient Tree-Based Multicast Support for Networks-on-Chip

    In this paper, a novel hardware supporting for multicast on mesh Networks-on-Chip (NoC) is proposed. It supports multicast routing on any shape of tree-based path. Two power-efficient tree-based multicast routing algorithms, OPtimized Tree (OPT) and Left-XY-Right-OPtimized Tree (LXYROPT) are also proposed. XY Tree-based (XYT) algorithm and Multiple Unicast Copies (MUC)...

    Provided By National University of Defense Technology

  • White Papers // Sep 2009

    Speedup Analysis of Data-Parallel Applications on Multi-Core NoCs

    As more computing cores are integrated onto a single chip, the effect of network communication latency is becoming more and more significant on multi-core Network-on-Chips (NoCs). For data-parallel applications, the authors study the model of parallel speedup by including network communication latency in Amdahl's law. The speedup analysis considers the...

    Provided By National University of Defense Technology

  • White Papers // Oct 2009

    A Fair-Priority MAC Design in Networked Control System

    Media Access Control (MAC) protocols in Wireless Networked Control System (WNCS) must minimize the radio energy costs in sensor nodes. Latency and throughput are also important design features for MAC protocols in the applications. But most of them cannot guarantee quality for real-time traffic. This paper studies the state of...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Applying Low-Latency Peer-to-Peer Muliticast to Online Collaborative Language Learning

    Peer-to-Peer computing technology brings satisfactory distance education to a large number of people at anytime anywhere with a low cost. While many online learning systems connect students asynchronously or provide them with recorded lectures, few systems focus on facilitating synchronous collaborative work among learners. Low latency requirement, dynamic group members...

    Provided By National University of Defense Technology

  • White Papers // Oct 2011

    Jammer Localization for Wireless Sensor Networks

    Jamming attack can severely affect the performance of Wireless Sensor Networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, they in this paper propose a jammer localization algorithm named as Minimum-circle-covering based localization (MCCL). Comparing with the existing solutions that...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Exploiting Spatial Reuse in Multi-Hop MIMO Networks: Models, Algorithms, and Evaluation

    MIMO has great potential for enhancing the throughput of multi-hop wireless networks via spatial multiplexing or spatial reuse techniques. Spatial reuse outperforms spatial multiplexing in terms of potential network throughput and is effective in a wider range of wireless contexts than spatial multiplexing. The network throughput when previous approaches of...

    Provided By National University of Defense Technology

  • White Papers // Sep 2009

    Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks

    Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions on the network in order to capture the specific (partial) symptom induced by wormholes. Those requirements and assumptions limit the applicability of previous approaches. In...

    Provided By National University of Defense Technology

  • White Papers // Jan 2011

    Fine-Grained Location-Free Planarization in Wireless Sensor Networks

    Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topology extraction are often based on ideal assumptions, such as UDG communication model and accurate node location measurements. To make these protocols work effectively in...

    Provided By National University of Defense Technology

  • White Papers // Nov 2009

    RSFB: A Resilient Stochastic Fair Blue Algorithm Against Spoofing DDoS Attacks

    The existing Active Queue Management (AQM) algorithms, including the fairness-aimed ones, are notably vulnerable to spoofing DDoS attacks. The authors propose a Resilient Stochastic Fair Blue (RSFB) algorithm against spoofing DDoS attacks. The basic idea behind RSFB is to record the responsive normal TCP flows and rescue their dropped packets....

    Provided By National University of Defense Technology

  • White Papers // Oct 2012

    Online Optimization of VM Deployment in IaaS Cloud

    Infrastructure-as-a-Service (IaaS) clouds provide on-demand Virtual Machines (VMs) to users. How to improve the quality of IaaS cloud services is important for service providers. Currently, the VMs in an IaaS cloud are usually deployed with respect to the maximum utilization of resources. In this paper, the authors propose an online...

    Provided By National University of Defense Technology

  • White Papers // May 2012

    Topology-Aware Deployment of Scientific Applications in Cloud Computing

    Now-a-days, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually topology-aware applications. Therefore, considering the topology of a scientific application during the development will benefit the performance of the application. However,...

    Provided By National University of Defense Technology

  • White Papers // May 2013

    A Periodic Portfolio Scheduler for Scientific Computing in the Data Center

    The popularity of data centers in scientific computing has led to new architectures, new workload structures, and growing customer bases. As a consequence, the selection of efficient scheduling algorithms for the data center is an increasingly costlier and more difficult challenge. To address this challenge, and contrasting previous work on...

    Provided By National University of Defense Technology

  • White Papers // Jan 2006

    Transformation BPEL to CP-Nets for Verifying Web Services Composition

    Web services composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Business Process Execution Language (BPEL) is a promising language describing the Web services composition in form of business processes, but lack of a sound formal semantic, which hinders the formal analysis and verification of...

    Provided By National University of Defense Technology

  • White Papers // Jun 2011

    Evaluation of Deflection Routing on Various NoC Topologies

    In this paper, the authors propose two novel deflection routing algorithms for de Bruijn and Spidergon NoCs and evaluate the performance of the deflection routing on 5 NoC topologies with different synthetic traffic patterns. They also synthesize the routers in various NoC topologies with TSMC 65nm technology. The evaluation results...

    Provided By National University of Defense Technology

  • White Papers // Feb 2011

    A Game-Theoretic Approach to Joint Modulation, Rate and Power Control for Cognitive CDMA Communications

    A game-theoretic framework was used to study the effect of modulation on the energy efficiency of cognitive CDMA (Code Division Multiple Access) communications for adaptive modulation. The authors designed an adaptive utility function which can link modulation, rate and power control. Since users are selfish and rational, a non-cooperative game...

    Provided By National University of Defense Technology

  • White Papers // Apr 2011

    Multi-Channel-Multi-MAC Model Architecture for Multi-Net-Multi-Link Tactical Data Link in NS-2

    Because of the coexistence of multiplex Tactical Data Links (TDLs) it is urgent to study the cooperation of Multi-Net-Multi-Link (MNML) TDL. This paper proposes a Multi-Channel-Multi-MAC (MCMM) model architecture to support MNML TDL simulation. The MCMM model adds several copies of data link layer, network interface and channel which are...

    Provided By National University of Defense Technology

  • White Papers // Dec 2011

    On the Security of NMAC and Its Variants

    HMAC, a derivative of NMAC, is a practically and commonly used, widely standardized MAC construction nowadays. HMAC has two advantages. First, HMAC can make use of current hash functions, the most widely used ones are based on Merkle-Damgard construction, without modification. Second, it is provable secure under two assumptions that...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Space-Time Codes With Block-Orthogonal Structure and Their Simplified ML and Near-ML Decoding

    Existing high-rate full diversity Space-Time Codes (STC) always have high decoding complexity with traditional ML (maximum-likelihood) or near-ML decoding. Hence the decoding scheme with reduced complexity is required. In this paper, block-orthogonal structure is introduced for the first time, and most of the existing STC do have such structure. A...

    Provided By National University of Defense Technology

  • White Papers // May 2010

    Delay-Tolerant Cooperative Diversity Routing MANET

    Some Mobile Ad hoc NETworks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup overhead. However, many existing cooperative MANETs have complex MAC protocol and high overhead. In this paper, the authors propose a cross-layer design across the routing,...

    Provided By National University of Defense Technology

  • White Papers // Aug 2009

    Fast-Group-Decodable Space-Time Block Code

    To make the implementation of high-rate STBC realistic in practical systems, group-decodable and fast-decodable code structures have been separately introduced into STBC to reduce the sphere decoding complexity. However, no STBC has both the two code structures until now. In this paper, high-rate Fast-Group-Decodable STBC (FGD-STBC, which has both fast-decodable...

    Provided By National University of Defense Technology

  • White Papers // Mar 2010

    Block-Orthogonal Space-Time Codes With Decoding Complexity Reduction

    Conventional approaches to high-rate Space-Time Codes (STC) design focus on achieving maximum diversity and spatial multiplexing gains, hence they always have high decoding complexity. In this paper, the authors propose and construct a new class of STC, called Block-Orthogonal STC (BOSTC), which has a simplified ML (Maximum Likelihood) or near-ML...

    Provided By National University of Defense Technology

  • White Papers // Jan 2012

    Whole Packet Forwarding: Efficient Design of Fully Adaptive Routing Algorithms for Networks-on-Chip

    Routing algorithms for Networks-on-Chip (NoCs) typically only have a small number of Virtual Channels (VCs) at their disposal. Limited VCs pose several challenges to the design of fully adaptive routing algorithms. First, fully adaptive routing algorithms based on previous deadlock-avoidance theories require a conservative VC re-allocation scheme: a VC can...

    Provided By National University of Defense Technology

  • White Papers // May 2012

    Understanding the Scheduling Performance in Wireless Networks With Successive Interference Cancellation

    Successive Interference Cancellation (SIC) is an effective way of multi-packet reception to combat interference in wireless networks. The authors focus on link scheduling in wireless networks with SIC, and propose a layered protocol model and a layered physical model to characterize the impact of SIC. In both the interference models,...

    Provided By National University of Defense Technology