National University of Singapore

Displaying 1-40 of 186 results

  • White Papers // Nov 2014

    Joint Power Control and Fronthaul Rate Allocation for Throughput Maximization in OFDMA-Based Cloud Radio Access Network

    The performance of Cloud Radio Access Network (C-RAN) is constrained by the limited fronthaul link capacity under future heavy data traffic. To tackle this problem, extensive efforts have been devoted to design efficient signal quantization/compression techniques in the fronthaul to maximize the network throughput. However, most of the previous results...

    Provided By National University of Singapore

  • White Papers // Jul 2014

    Recent Advances in Joint Wireless Energy and Information Transfer

    In this paper, the authors provide an overview of the recent advances in microwave-enabled Wireless Energy Transfer (WET) technologies and their applications in wireless communications. Specifically, they divide their discussions into three parts. First, they introduce the state-of-the-art WET technologies and the signal processing techniques to maximize the energy transfer...

    Provided By National University of Singapore

  • White Papers // Apr 2014

    I Know Where You've Been: Geo-Inference Attacks Via the Browser Cache

    Many websites customize their services according to different geo-locations of users, to provide more relevant content and better responsiveness, including Google, Craigslist, etc. Recently, mobile devices further allow web applications to directly read users' geo-location information from GPS sensors. However, if such websites leave location-sensitive content in the browser cache,...

    Provided By National University of Singapore

  • White Papers // Feb 2014

    Effective Multi-Modal Retrieval Based on Stacked Auto-Encoders

    Multi-modal retrieval is emerging as a new search paradigm that enables seamless information retrieval from various types of media. For example, users can simply snap a movie poster to search relevant reviews and trailers. To solve the problem, a set of mapping functions are learned to project high-dimensional features extracted...

    Provided By National University of Singapore

  • White Papers // Jan 2014

    Random Number Conversion and LOCC Conversion via Restricted Storage

    The authors consider Random Number Conversion (RNC) through random number storage with restricted size. They clarify the relation between the performance of RNC and the size of storage in the framework of first- and second-order asymptotics, and derive their rate regions. Then, they show that the results for RNC with...

    Provided By National University of Singapore

  • White Papers // Jan 2014

    Ubiquitous Memory Introspection

    Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to attain. It requires time consuming simulations and detailed modeling of the memory hierarchy, often using long address traces. It is increasingly possible...

    Provided By National University of Singapore

  • White Papers // Dec 2013

    Efficient In-Memory Data Management: An Analysis

    Given the explosion of big data analytics, it is important to understand the performance costs and limitations of existing approaches for in-memory data management. Broadly, in-memory data management covers two main types of roles: supporting analytics operations such as iterative algorithms and supporting storage and retrieval operations on arbitrary key-value...

    Provided By National University of Singapore

  • White Papers // Oct 2013

    Real-time and Low Power Embedded l1-Optimization Solver Design

    Basis Pursuit DeNoising (BPDN) is an optimization method used in cutting edge computer vision and compressive sensing research. Although hosting a BPDN solver on an embedded platform is desirable because analysis can be performed in real-time, existing solvers are generally unsuitable for embedded implementation due to either poor run-time performance...

    Provided By National University of Singapore

  • White Papers // Aug 2013

    A Performance Study of Three Disk-Based Structures for Indexing and Querying Frequent Itemsets

    Frequent itemset mining is an important problem in the data mining area. Extensive efforts have been devoted to developing efficient algorithms for mining frequent itemsets. However, not much attention is paid on managing the large collection of frequent itemsets produced by these algorithms for subsequent analysis and for user exploration....

    Provided By National University of Singapore

  • White Papers // Aug 2013

    Efficient Indexing for Diverse Query Results

    In this paper, the authors examine the problem of computing diverse query results which is useful for browsing search results in online shopping applications. The search results are diversified wrt a sequence of output attributes (termed d-order) where an attribute that appears earlier in the d-order has higher priority for...

    Provided By National University of Singapore

  • White Papers // Aug 2013

    A Quantitative Evaluation of Privilege Separation in Web Browser Designs

    Privilege separation is a fundamental security concept that has been used in designing many secure systems. A number of recent works propose redesigning web browsers with greater privilege separation for better security. However, privilege-separated designs require a fine balance between security benefits and other competing concerns, such as performance. In...

    Provided By National University of Singapore

  • White Papers // Aug 2013

    MAMPSx: A Design Framework for Rapid Synthesis of Predictable Heterogeneous MPSoCs

    Heterogeneous Multi-Processor System-on-Chip (HMPSoC) is becoming popular as a means of meeting energy efficiency requirements of modern embedded systems. However, as these HMPSoCs run multimedia applications as well, they also need to meet real-time requirements. Designing these predictable HMPSoCs is a key challenge, as the current design methods for these...

    Provided By National University of Singapore

  • White Papers // Aug 2013

    Power-Performance Modeling on Asymmetric Multi-Cores

    Asymmetric multi-core architectures have recently emerged as a promising alternative in a power and thermal constrained environment. They typically integrate cores with different power and performance characteristics, which makes mapping of workloads to appropriate cores a challenging task. Limited number of performance counters and heterogeneous memory hierarchy increase the difficulty...

    Provided By National University of Singapore

  • White Papers // Jul 2013

    Run-Time Mapping for Reliable Many-Cores Based on Energy/Performance Trade-offs

    To accommodate the applications' ever-increasing demands and to achieve and exploit easily-manageable scalability, complex many-core systems are built by integrating low-cost Commercial Off-The-Shelf (COTS) components. Most recent many-core systems consist of processing nodes interconnected via Network-on-Chips (NoCs) in a mesh-based architecture. This paper presents a run-time resource manager for NoC-based...

    Provided By National University of Singapore

  • White Papers // Jul 2013

    Introduction to Malware Analysis

    Malware has become the spotlight of security threats on the virtual world. Many different kind of malware exist. Some have destruction capability such as deletion of data, while the other is more stealthy (eg. log keystrokes). The foremost goal of malware analysis is to understand malware behaviors. Through the understanding...

    Provided By National University of Singapore

  • White Papers // Jul 2013

    Aging-Aware Hardware-Software Task Partitioning for Reliable Reconfigurable Multiprocessor Systems

    Homogeneous multiprocessor systems with reconfigurable area (also known as reconfigurable multiprocessor systems) are emerging as a popular design choice in current and future technology nodes to meet the heterogeneous computing demand of a multitude of applications enabled on these platforms. Application specific mapping decisions on such a platform involve partitioning...

    Provided By National University of Singapore

  • White Papers // Jul 2013

    Enhancing VHDL Learning Through a Light-Weight Integrated Environment for Development and Automated Checking

    The development environments for Hardware Description Languages (HDLs) are essentially meant and designed for highly trained professionals/ engineers and as such are not suitable for use as an introductory tool for students learning HDLs. With students adopting a variety of operating systems, there is a need for a light-weight and...

    Provided By National University of Singapore

  • White Papers // Jun 2013

    Implementation of Core Coalition on FPGAs

    Embedded systems increasingly need to support dynamic and diverse application landscape. In response, performance asymmetric multi-cores, comprising of identical instruction-set architecture but micro-architecturally distinct set of simple and complex cores, have emerged as an attractive alternative to accommodate software diversity. Dynamic heterogeneous multi-core architectures take this concept forward by allowing...

    Provided By National University of Singapore

  • White Papers // Jun 2013

    Incorporating Energy and Throughput Awareness in Design Space Exploration and Run-time Mapping for Heterogeneous MPSoCs

    The advancement in process technology has enabled integration of different types of processing cores into a single chip towards creating heterogeneous Multi-Processor Systems-on-Chip (MPSoCs). While providing high level of computation power to support complex applications, these modern systems also introduce novel challenges for system designers, like managing a huge number...

    Provided By National University of Singapore

  • White Papers // Jun 2013

    Task Scheduling on Adaptive Multi-Core

    Multi-cores have become ubiquitous both in the general-purpose computing and the embedded domain. The current technology trends show that the number of on-chip cores is rapidly increasing, while their complexity is decreasing due to power and thermal constraints. Increasing number of simple cores enable parallel applications benefit from abundant Thread-Level...

    Provided By National University of Singapore

  • White Papers // Jun 2013

    RAPIDITAS: RAPId Design-Space-Exploration Incorporating Trace-Based Analysis and Simulation

    Simulation-based Design Space Exploration (DSE) to evaluate all possible mappings for a given application and Multi-Processor System-on-Chip (MPSoC) platform is computationally costly for large problems. Even using efficient exploration methodologies to evaluate the mappings cannot overcome the evaluation time bottleneck. This paper presents a novel DSE methodology that analyzes the...

    Provided By National University of Singapore

  • White Papers // Jun 2013

    Energy-Aware Dynamic Reconfiguration of Communication-Centric Applications for Reliable MPSoCs

    To accommodate the ever increasing demands of applications and for the ease of scalability, Multi-Processor system-on-chips (MPSoCs) are becoming a popular design choice in current and future technologies with streaming multimedia and other communication-centric applications constituting a large fraction of the application space. Mapping and scheduling of these applications on...

    Provided By National University of Singapore

  • White Papers // May 2013

    Converse Bounds for Assorted Codes in the Finite Blocklength Regime

    The authors study converse bounds for unequal error protection codebooks with k > 1 different classes of codewords. They dub these unequal error protection codes "Assorted codes". They extend a finite blocklength converse bound due to Polyanskiy-Poor-Verdu to apply to assorted codes and use this extension to obtain a refined...

    Provided By National University of Singapore

  • White Papers // May 2013

    On the Dispersions of the Discrete Memoryless Interference Channel

    In this paper, achievable dispersions for the Discrete Memoryless Interference Channel (DM-IC) are derived. In other words, they characterize the backoff from the Han-Kobayashi (HK) achievable region, the largest inner bound known to date for the DM-IC. In addition, they also characterize the backoff from Sato's region in the strictly...

    Provided By National University of Singapore

  • White Papers // May 2013

    Communication and Migration Energy Aware Task Mapping for Reliable Multiprocessor Systems

    Heterogeneous Multi-Processor Systems-on-Chip (MPSoCs) are emerging as a promising solution in deep sub-micron technology nodes to satisfy design performance and power requirements. However, shrinking transistor geometry and aggressive voltage scaling are negatively impacting the dependability of these MPSoCs by increasing the chances of failures. This paper proposes an offline (design-time)...

    Provided By National University of Singapore

  • White Papers // May 2013

    Efficient Routing on Multilayered Communication Networks

    The authors study the optimal routing on multilayered communication networks, which are composed of two layers of sub-networks. One is a wireless network, and the other is a wired network. They develop a simple recurrent algorithm to find an optimal routing on this kind of multilayered network, where the single-channel...

    Provided By National University of Singapore

  • White Papers // Apr 2013

    A Formula for the Capacity of the General Gelfand-Pinsker Channel

    The authors consider the Gel'fand-Pinsker problem in which the channel and state are general, i.e., possibly non-stationary, non-memoryless and non-ergodic. Using the information spectrum method and a non-trivial modification of the piggyback coding lemma by Wyner, they prove that the capacity can be expressed as an optimization over the difference...

    Provided By National University of Singapore

  • White Papers // Apr 2013

    Towards General Security Support in the Browser Environment

    The web browser has evolved into a complex execution environment for rich Internet applications, providing support for advanced layout and various executable components. However, the security mechanisms in browsers do not evolve at the same pace to provide adequate protection for web applications. In this paper, the authors give a...

    Provided By National University of Singapore

  • White Papers // Mar 2013

    CoMP Meets Energy Harvesting: A New Communication and Energy Cooperation Paradigm

    In this paper, the authors investigate joint communication and energy cooperation in cellular networks for the Coordinated Multi-Point (CoMP) downlink transmission with Base Stations (BSs) powered by renewable energy. For the purpose of exposition, they consider a simplified CoMP model with two BSs cooperatively serving two Mobile Stations (MSs), where...

    Provided By National University of Singapore

  • White Papers // Mar 2013

    Multiuser MISO Beamforming for Simultaneous Wireless Information and Power Transfer

    In this paper, the authors study a multiuser Multiple-Input Single-Output (MISO) broadcast system for Simultaneous Wireless Information and Power Transfer (SWIPT), where a multi-antenna Access Point (AP) sends information and energy simultaneously via beam-forming to multiple single-antenna receivers. They maximize the weighted sum-power transferred to Energy Harvesting (EH) receivers subject...

    Provided By National University of Singapore

  • White Papers // Feb 2013

    Splash: Fast Data Dissemination With Constructive Interference in Wireless Sensor Networks

    It is well-known that the time taken for disseminating a large data object over a wireless sensor network is dominated by the overhead of resolving the contention for the underlying wireless channel. In this paper, the authors propose a new dissemination protocol called Splash that eliminates the need for contention...

    Provided By National University of Singapore

  • White Papers // Feb 2013

    Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks

    Wireless networks can be self-sustaining by harvesting energy from ambient Radio-Frequency (RF) signals. Recently, researchers have made progress on designing efficient circuits and devices for RF energy harvesting suitable for low-power wireless applications. Motivated by this and building upon the classic Cognitive Radio (CR) network model, this paper proposes a...

    Provided By National University of Singapore

  • White Papers // Feb 2013

    MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer

    Wireless Energy Transfer (WET) is a promising technology to provide virtually perpetual energy supplies to wireless networks. Generally speaking, WET is implementable by either the "Near-field" ElectroMagnetic (EM) induction or the "Far-field" EM radiation, for short and long range applications, respectively. In this paper, the latter case in the particular...

    Provided By National University of Singapore

  • White Papers // Feb 2013

    Wireless Information and Power Transfer: A Dynamic Power Splitting Approach

    Energy harvesting is a promising solution to prolong the operation time of energy-constrained wireless networks. In particular, scavenging energy from ambient radio signals, namely Wireless Energy Harvesting (WEH), has recently drawn significant attention. In this paper, the authors consider a point-to-point wireless link over the flat-fading channel, where the receiver...

    Provided By National University of Singapore

  • White Papers // Jan 2013

    A Novel Mode Switching Scheme Utilizing Random Beamforming for Opportunistic Energy Harvesting

    Since radio signals carry both energy and information simultaneously, a unified study on Simultaneous Wireless Information and Power Transfer (SWIPT) has recently attracted a great deal of attention for providing wireless energy to communication devices. This paper proposes a novel receiver mode switching scheme for SWIPT and the enabling transmitter...

    Provided By National University of Singapore

  • White Papers // Jan 2013

    Energy Cooperation in Cellular Networks With Renewable Powered Base Stations

    In this paper, the authors propose a model for energy cooperation between cellular Base Stations (BSs) with individual renewable energy sources, limited energy storages and connected by resistive power lines for energy sharing. When the renewable energy profile and energy demand profile at all BSs are deterministic or known ahead...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    Speeding Up Ate Pairing Computation in Affine Coordinates

    At Pairing 2010, researcher's analysis showed that Ate pairing computation in affine coordinates may be much faster than projective coordinates at high security levels. In this paper, the authors further investigate techniques to speed up ate pairing computation in affine coordinates. They first analyze ate pairing computation using 4-ary miller...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    Communication and Migration Energy Aware Design Space Exploration for Multicore Systems with Intermittent Faults

    Shrinking feature-size and growing transistor density are negatively impacting the dependability of Multi-Processor System-on-Chips (MPSoCs) by increasing the chances of faults (permanent, intermittent and transient). Recently, intermittent device defects are gaining significant attention among research community. These are a class of hardware faults occurring frequently but irregularly over a period...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    Reliability-Driven Task Mapping for Lifetime Extension of Networks-on-Chip Based Multiprocessor Systems

    Shrinking transistor geometries, aggressive voltage scaling and higher operating frequencies have negatively impacted the lifetime reliability of embedded multi-core systems. In this paper, a convex optimization-based task-mapping technique is proposed to extend the lifetime of a Multi-Processor Systems-on-Chip (MPSoCs). The proposed technique generates mappings for every application enabled on the...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    A Preference Model for Deciding the Market Share of Network Service Providers

    Started with a single best-effort service, the Internet has evolved to an ecosystem where different Service Providers (SPs), e.g., Internet Service Providers (ISPs) and Content Distribution Networks (CDNs) provide different types of services, e.g., IP transit and content caching/distribution. In this paper, the authors propose a preference model on how...

    Provided By National University of Singapore

  • White Papers // Mar 2009

    Optimal Placement-Aware Trace-Based Scheduling of Hardware Reconfigurations for FPGA Accelerators

    Modern use of FPGAs as hardware accelerators involves the partial reconfiguration of hardware resources as the application executes. In this paper, the authors present a polynomial time algorithm for scheduling reconfiguration tasks given a trace of actors (invocations of hardware kernels) that is both provably optimal and placement-aware. In addition,...

    Provided By National University of Singapore

  • White Papers // Nov 2008

    A UML-Based Approach for Heterogeneous IP Integration

    With increasing availability of predefined IP (Intellectual Properties) blocks and inexpensive microprocessors, embedded system designers are faced with more design choices than ever. On the other hand, there is a constant pressure on reducing the time to market. However, as the IP blocks are provided by different vendors, they differ...

    Provided By National University of Singapore

  • White Papers // Aug 2007

    Vosch: Voltage Scaled Cache Hierarchies

    The cache hierarchy of state-of-the-art - especially multicore - microprocessors consumes a significant amount of area and energy. A significant amount of research has been devoted especially to reducing the latter. One of the most important microarchitectural techniques proposed for the energy management is Dynamic Voltage Scaling (DVS). In DVS...

    Provided By National University of Singapore

  • White Papers // Jan 2014

    Ubiquitous Memory Introspection

    Modern memory systems play a critical role in the performance of applications, but a detailed understanding of the application behavior in the memory system is not trivial to attain. It requires time consuming simulations and detailed modeling of the memory hierarchy, often using long address traces. It is increasingly possible...

    Provided By National University of Singapore

  • White Papers // Sep 2006

    Generating Hardware From OpenMP Programs

    Various high level hardware description languages have been invented for the purpose of improving the productivity in the generation of customized hardware. Most of these languages are variants, usually parallel versions, of popular software programming languages. In this paper, the authors describe their effort to generate hardware from OpenMP, a...

    Provided By National University of Singapore

  • White Papers // Sep 2009

    Unified Cache Modeling for WCET Analysis and Layout Optimizations

    Presence of instruction and data caches in processors create lack of predictability in execution timings. Hard real-time systems require absolute guarantees about execution time, and hence the timing effects of caches need to be modeled while estimating the Worst-Case Execution Time (WCET) of a program. In this paper, the authors...

    Provided By National University of Singapore

  • White Papers // Jan 2011

    Bus-Aware Multicore WCET Analysis Through TDMA Offset Bounds

    In the domain of real-time systems, the analysis of the timing behavior of programs is crucial for guaranteeing the schedulability and thus the safeness of a system. Static analyses of the WCET (Worst-Case Execution Time) have proven to be a key element for timing analysis, as they provide safe upper...

    Provided By National University of Singapore

  • White Papers // Oct 2011

    A Unified WCET Analysis Framework for Multi-Core Platforms

    With the advent of multi-core architectures, Worst Case Execution Time (WCET) analysis has become an increasingly difficult problem. In this paper, the authors propose a unified WCET analysis framework for multi-core processors featuring both shared cache and shared bus. Compared to other previous papers, their paper differs by modeling the...

    Provided By National University of Singapore

  • White Papers // Mar 2012

    HRAID6ML: A Hybrid RAID6 Storage Architecture with Mirrored Logging

    The RAID6 provides high reliability using double-parity-update at cost of high write penalty. In this paper, the authors propose HRAID6ML, a new logging architecture for RAID6 systems for enhanced energy efficiency, performance and reliability. HRAID6ML explores a group of Solid State Drives (SSDs) and Hard Disk Drives (HDDs): two HDDs...

    Provided By National University of Singapore

  • White Papers // Jul 2014

    Recent Advances in Joint Wireless Energy and Information Transfer

    In this paper, the authors provide an overview of the recent advances in microwave-enabled Wireless Energy Transfer (WET) technologies and their applications in wireless communications. Specifically, they divide their discussions into three parts. First, they introduce the state-of-the-art WET technologies and the signal processing techniques to maximize the energy transfer...

    Provided By National University of Singapore

  • White Papers // Nov 2014

    Joint Power Control and Fronthaul Rate Allocation for Throughput Maximization in OFDMA-Based Cloud Radio Access Network

    The performance of Cloud Radio Access Network (C-RAN) is constrained by the limited fronthaul link capacity under future heavy data traffic. To tackle this problem, extensive efforts have been devoted to design efficient signal quantization/compression techniques in the fronthaul to maximize the network throughput. However, most of the previous results...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    AUTHSCAN : Automatic Extraction of Web Authentication Protocols From Implementations

    "Ideally, security protocol implementations should be formally verified before they are deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have been found in web authentication protocol implementations, especially in Single-Sign On (SSO) protocols implementations recently. Much of the prior work on authentication protocol verification has focused on...

    Provided By National University of Singapore

  • White Papers // Apr 2014

    I Know Where You've Been: Geo-Inference Attacks Via the Browser Cache

    Many websites customize their services according to different geo-locations of users, to provide more relevant content and better responsiveness, including Google, Craigslist, etc. Recently, mobile devices further allow web applications to directly read users' geo-location information from GPS sensors. However, if such websites leave location-sensitive content in the browser cache,...

    Provided By National University of Singapore

  • White Papers // Oct 2011

    SSD: A Robust RF Location Fingerprint Addressing Mobile Devices' Heterogeneity

    Fingerprint-based methods are widely adopted for indoor localization purpose because of their cost-effectiveness compared to other infrastructure-based positioning systems. However, the popular location fingerprint, Received Signal Strength (RSS), is observed to differ significantly across different devices' hardware even under the same wireless conditions. The authors derive analytically a robust location...

    Provided By National University of Singapore

  • White Papers // Dec 2009

    SparseTrack: Enhancing Indoor Pedestrian Tracking With Sparse Infrastructure Support

    Accurate indoor pedestrian tracking has wide applications in the healthcare, retail, and entertainment industries. However, existing approaches to indoor tracking have various limitations. For example, location-fingerprinting approaches are labor-intensive and vulnerable to environmental changes. Tri-lateration approaches require at least three Line-of-Sight (LoS) beacons to cover any point in the service...

    Provided By National University of Singapore

  • White Papers // Feb 2010

    Channel Allocation in a Multiple Distributed Vehicular Users Using Game Theory

    In this paper, the authors look into the channel allocation problem for a non-cooperative cognitive vehicular ad-hoc communication network with multiple communicating pairs distributed spatially apart. An algorithm which can search for all pure Nash Equilibrium (NE) solutions is presented. They study how the number of pure NEs grows when...

    Provided By National University of Singapore

  • White Papers // Mar 2012

    Identifying and Analyzing Pointer Misuses for Sophisticated Memory-Corruption Exploit Diagnosis

    Software exploits are one of the major threats to the Internet security. A large family of exploits works by corrupting memory of the victim process to execute malicious code. To quickly respond to these attacks, it is critical to automatically diagnose such exploits to find out how they circumvent existing...

    Provided By National University of Singapore

  • White Papers // May 2011

    Towards Fine-Grained Access Control in JavaScript Contexts

    A typical Web 2.0 application usually includes JavaScript from various sources with different trust. It is critical to properly regulate JavaScript's access to web application resources. Unfortunately, existing protection mechanisms in web browsers do not provide enough granularity in JavaScript access control. Specifically, existing solutions partially mitigate this sort of...

    Provided By National University of Singapore

  • White Papers // May 2012

    Fairness and Social Welfare in Incentivizing Participatory Sensing

    Participatory sensing has emerged recently as a promising approach to large-scale data collection. However, without incentives for users to regularly contribute good quality data, this method is unlikely to be viable in the long run. In this paper, the authors link incentive to users' demand for consuming compelling services, as...

    Provided By National University of Singapore

  • White Papers // Oct 2012

    Exploiting Network Cooperation in Green Wireless Communication

    There is a growing interest in energy efficient or so-called "Green" wireless communication to reduce the energy consumption in cellular networks. Since today's wireless terminals are typically equipped with multiple network access interfaces such as Bluetooth, Wi-Fi, and cellular networks, this paper investigates user terminals cooperating with each other in...

    Provided By National University of Singapore

  • White Papers // Jul 2010

    Securing Interactive Sessions Using Mobile Device Through Visual Channel and Visual Inspection

    Communication channel established from a display to a device's camera is known as visual channel, and it is helpful in securing key exchange protocol. In this paper, the authors explain how visual channel can be exploited by a network terminal and mobile device to jointly verify information in an interactive...

    Provided By National University of Singapore

  • White Papers // Jun 2006

    The Adoption of Internet-Based Business-to-Business E-Marketplaces Among Small and Medium-Sized Enterprises in Their International Marketing Practices

    This paper investigates the major reasons for e-marketplace adoption among SMEs in their international marketing practices. Based on organizational innovation theories, resource-based view theories of the firm, and former studies in the IS adoption research, a three match-based framework was proposed for IS innovation adoption among organizations. And based on...

    Provided By National University of Singapore

  • White Papers // Oct 2007

    A Methodology for ERP Misfit Analysis

    Commercial off-the-shelf ERP systems have been adopted by many large companies to support their inter- and intra-business processes. Midsize market firms are now also investing their use. However, research has indicated that about three quarters of attempted ERP projects are unsuccessful: a common problem encountered in adopting ERP software has...

    Provided By National University of Singapore

  • White Papers // Aug 2013

    A Quantitative Evaluation of Privilege Separation in Web Browser Designs

    Privilege separation is a fundamental security concept that has been used in designing many secure systems. A number of recent works propose redesigning web browsers with greater privilege separation for better security. However, privilege-separated designs require a fine balance between security benefits and other competing concerns, such as performance. In...

    Provided By National University of Singapore

  • White Papers // May 2011

    Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing

    Cloud computing is a form of outsourcing, and as such it shares the essential risk profile of all out-sourcing contracts concerning opportunistic behavior, shirking, poaching, and opportunistic renegotiation. Cloud computing is also an advanced techno-logical development effort, and as such it shares all of the risks of large and uncertain...

    Provided By National University of Singapore

  • White Papers // Feb 2011

    Adaptive Routing Algorithms in Unstructured Peer-to-Peer (P2P) Systems

    There are a variety of Peer-To-Peer (P2P) systems for sharing documents currently available. According to their data organization, P2P systems are classified into two categories: structured and unstructured P2P systems. In structured P2P systems, peers are organized according to some mapping techniques, e.g. hashing function. Whereas in unstructured P2P system,...

    Provided By National University of Singapore

  • White Papers // Apr 2009

    Synthesis of Unequally Spaced Antenna Arrays by a New Differential Evolutionary Algorithm

    The Differential Evolution (DE) algorithm with a new differential mutation base strategy, namely best of random, is applied to the synthesis of unequally spaced antenna arrays. In the best of random mutation strategy, the best individual among three randomly chosen individuals is used as the mutation base while the other...

    Provided By National University of Singapore

  • White Papers // Nov 2009

    Illiquidity, Position Limits, And Optimal Investment For Mutual Funds

    Mutual funds are often restricted to allocate certain percentages of fund assets to certain securities that have different degrees of illiquidity. However, the existing literature on how mutual funds should trade has largely ignored the coexistence of position limits and differential illiquidity and thus the optimal trading strategy for a...

    Provided By National University of Singapore

  • White Papers // Jul 2011

    Optical Protection With Pre-Configured Backup Paths and Limited Backup Resource Sharing

    In this paper, the authors consider provisioning protection in WDM optical networks with pre-configured backup paths. In the traditional protection approach, backup resources are not shared among pre-configured backup paths, and thus resources are not utilized efficiently. They propose a protection approach with the use of a switch architecture, which...

    Provided By National University of Singapore

  • White Papers // Jan 2006

    Social Security Policy In An Era Of Globalization And Competition: Challenges For Southeast Asia

    There are several themes which emerge from the comparative analysis of social security systems in Southeast Asia. Each country will need to address the limitations of their respective system in relation to each of the themes outlined. The first theme concerns the need for a multi-tier social security system. The...

    Provided By National University of Singapore

  • White Papers // Aug 2010

    Query Driven Data Collection and Data Forwarding in Intermittently Connected Mobile Sensor Networks

    In sparse and intermittently connected Mobile Sensor Networks (MSNs), the base station cannot easily get the data objects acquired by the mobile sensors in the field. When users query the base station for specific data objects, the base station may not have received the necessary data objects to answer the...

    Provided By National University of Singapore

  • White Papers // Jan 2011

    Optimized Data Sharing in Multicell MIMO With Finite Backhaul Capacity

    This paper addresses cooperation in a multicell environment where Base Stations (BSs) wish to jointly serve multiple users, under a constrained-capacity backhaul. The authors point out that for finite backhaul capacity a trade-off between sharing user data, which allows for full MIMO cooperation, and not doing so, which reduces the...

    Provided By National University of Singapore

  • White Papers // Apr 2009

    Hybrid Property, Path Dependence, Market Segmentation And Financial Exclusion: The Case Of The Banking Industry In China*

    This paper investigates the role of the state in the liberalization of the banking industry in China and the implications for the conventional convergence thesis of market segmentation and financial exclusion. The author argues that the usefulness of the convergence thesis is constrained because it does not take region-specific institutional...

    Provided By National University of Singapore

  • White Papers // Sep 2011

    Towards Efficient Proofs of Retrievability in Cloud Storage

    Backuping data in a cloud storage, for example Amazon Cloud Drive, Microsoft Skydrive, or Drop-box, is gaining popularity recently. The authors are considering scenarios where users may have concerns of the integrity of their data stored in the cloud storage. Such prudent users may not be simply satisfied with the...

    Provided By National University of Singapore

  • White Papers // Jul 2011

    Towards a Model Checker for NesC and Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are expected to run unattendedly for critical tasks. To guarantee the correctness of WSNs is important, but highly nontrivial due to the distributed nature. In this paper, the authors present an automatic approach to directly verify WSNs built with TinyOS applications implemented in the NesC language....

    Provided By National University of Singapore

  • White Papers // Aug 2011

    A Symbolic Model Checking Framework for Hierarchical Systems

    BDD-based symbolic model checking is capable of verifying systems with a large number of states. In this paper, the authors report an extensible framework to facilitate symbolic encoding and checking of hierarchical systems. Firstly, a novel library of symbolic encoding functions for compositional operators (e.g., parallel composition, sequential composition, choice...

    Provided By National University of Singapore

  • White Papers // Jul 2011

    Verification of Orchestration Systems Using Compositional Partial Order Reduction

    Orc is a computation orchestration language which is designed to specify computational services, such as distributed communication and data manipulation, in a concise and elegant way. Four concurrency primitives allow programmers to orchestrate site calls to achieve a goal, while managing timeouts, priorities, and failures. To guarantee the correctness of...

    Provided By National University of Singapore

  • White Papers // Jul 2013

    Introduction to Malware Analysis

    Malware has become the spotlight of security threats on the virtual world. Many different kind of malware exist. Some have destruction capability such as deletion of data, while the other is more stealthy (eg. log keystrokes). The foremost goal of malware analysis is to understand malware behaviors. Through the understanding...

    Provided By National University of Singapore

  • White Papers // Dec 2012

    Speeding Up Ate Pairing Computation in Affine Coordinates

    At Pairing 2010, researcher's analysis showed that Ate pairing computation in affine coordinates may be much faster than projective coordinates at high security levels. In this paper, the authors further investigate techniques to speed up ate pairing computation in affine coordinates. They first analyze ate pairing computation using 4-ary miller...

    Provided By National University of Singapore

  • White Papers // Jan 2011

    Automated Verifying Anonymity and Privacy Properties of Security Protocols

    Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA....

    Provided By National University of Singapore