Politecnico di Bari

Displaying 1-40 of 54 results

  • White Papers // Jan 2014

    Variation-Aware Voltage Island Formation for Power Efficient Near-Threshold Manycore Architectures

    The power-wall problem and its dual utilization wall problem are considered among the main barriers to feasible/efficient scaling in the manycore era. Several researchers have proposed the usage of aggressive voltage scaling techniques at the near-threshold voltage region, promising significant improvements in power efficiency at the expense of reduced performance...

    Provided By Politecnico di Bari

  • White Papers // Dec 2013

    FPGA Prototyping of Manycore Multinode Systems for Irregular Applications

    Knowledge discovery applications are an emerging class of irregular applications that exploit graph-based data structures, present poor locality and analyze very big data sets that require multi-node systems for processing. Current commodity clusters, which exploit cache-based processors, usually perform poorly with these applications. To address their requirements, full-custom machines, like...

    Provided By Politecnico di Bari

  • White Papers // Dec 2012

    Exploiting Linux Control Groups for Effective Run-Time Resource Management

    The extremely high technology process reached by the silicon manufacturing (under the 32nm) has led to production of computational platforms and SoC, featuring a considerable amount of resources. Whilst from one side such multi- and many-core platforms show growing performance capabilities, from the other side they are more and more...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Exploiting Thermal Coupling Information in MPSoC Dynamic Thermal Management

    Temperature profile optimization is one of the most relevant and challenging problems in modern multi-core architectures. Several dynamic thermal management approaches have been proposed in literature, and run-time policies have been designed to direct the allocation of tasks according to temperature constraints. Thermal coupling is recognized to have a role...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Energy-Aware Planning and Management of Wireless Mesh Networks

    The rising demand for pervasive information access is causing the ICT industry to have a significant impact on the world energy consumption, with the telecommunications sector representing almost 50% of the overall power expenses. Green networking has therefore recently emerged as a new way of building and managing communication networks...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    A Sensor-Less NBTI Mitigation Methodology for NoC Architectures

    CMOS technology improvement allows increasing the number of cores integrated on a single chip and makes Network-on-Chips (NoCs) a key component from the performance and reliability standpoints. Unfortunately, continuous scaling of CMOS technology poses severe concerns regarding failure mechanisms such as NBTI and stressmigration that are crucial in achieving acceptable...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    Finding Non-Trivial Malware Naming Inconsistencies

    Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty - more for researchers than for practitioners - for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications...

    Provided By Politecnico di Bari

  • White Papers // Aug 2012

    Thermal/Performance Trade-Off in Network-on-Chip Architectures

    Multi-core architectures are a promising paradigm to exploit the huge integration density reached by high-performance systems. Indeed, integration density and technology scaling are causing undesirable operating temperatures, having net impact on reduced reliability and increased cooling costs. Dynamic Thermal Management (DTM) approaches have been proposed in literature to control temperature...

    Provided By Politecnico di Bari

  • White Papers // Jul 2012

    A RTRM Proposal for Multi/Many-Core Platforms and Reconfigurable Applications

    Modern parallel computing architectures have broadened the boundaries of the High Performance Computing (HPC) world, emerging in the Embedded Systems context too. The computational power provided can be translated into higher Quality-of-Experience (QoE) for the users. Emerging multi/many-core architectures, targeting both High Performance Computing (HPC) and mobile devices, increase the...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    AcOS: An Autonomic Management Layer Enhancing Commodity Operating Systems

    Traditionally, operating systems have been in charge of serving as a convenient layer between applications and the bare-metal hardware by both providing an abstraction of hardware itself and allocating available resources to the applications. Both of these roles are becoming ever more important due to the increasing complexity of modern...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    Understanding Decentralized and Dynamic Brokerage in Federated Cloud Environments

    The advent of the cloud computing paradigm offers different ways both to sell services and to exploit external computational resources according to a pay-per-use economic model. Nowadays, cloud computing clients can buy various forms of IaaS, PaaS, and SaaS from cloud providers. Besides this form of pay-per-use, the perspective of...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    On the Energy Consumption of IP-Over-WDM Architectures

    Today's "Green thrust" has been completely steering the evolution of the people society. Therefore, since enhancements on telecommunication networks are expected to cope with the growth of traffic demand, energy consumption is becoming a crucial design metric. In this paper, the authors focus on IP over Wavelength Division Multiplexing (IPoWDM)...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Efficient OFDM Channel Estimation Via an Information Criterion

    In this paper, the authors consider joint estimation of the channel length and of the impulse response for OFDM systems, exploiting information criteria, to find the best trade-off between noise rejection and channel description accuracy. So far, information criteria have not been considered practical channel estimation methods, due to their...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Low-Carbon Routing Algorithms for Cloud Computing Services in IP-Over-WDM Networks

    Energy consumption in telecommunication networks keeps growing rapidly, mainly due to emergence of new Cloud Computing (CC) services that need to be supported by large data centers that consume a huge amount of energy and, in turn, cause the emission of enormous quantity of CO2. Given the decreasing availability of...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    VM Placement Strategies for Cloud Scenarios

    The problem of Virtual Machine (VM) placement in a compute cloud infrastructure is well-studied in the literature. However, the majority of the existing works ignore the dynamic nature of the incoming stream of VM deployment requests that continuously arrive to the cloud provider infrastructure. In this paper, the authors provide...

    Provided By Politecnico di Bari

  • White Papers // Mar 2012

    Software Rejuvenation in the Cloud

    In this paper, the authors investigate how software rejuvenation can be used in a cloud environment to increase the availability of a virtualized system composed of a single Virtual Machine Monitor (VMM) on top of which a certain number of Virtual Machines (VMs) can be instantiated. They start from the...

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures

    Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g., power analysis and fault injection...

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Floorplan-Aware Hierarchical NoC Topology with GALS Interfaces

    Network-on-Chips (NoCs) has been seen as an interconnect solution for complex systems. However, performance and energy issues still represent limiting factors for Multi-Processor System-on-Chip (MPSoC). Complex router architectures can be prohibitive for the embedded domain, once they dissipate too much power and energy. In this paper, they propose a low...

    Provided By Politecnico di Bari

  • White Papers // Sep 2011

    A Fairness Analysis of Content Centric Networks

    In recent years the new vision of data-centric networks has emerged as a natural way to satisfy user needs in the Future Internet. It is based on novel architectures oriented towards data sharing and delivering as opposite to classic host-to-host communications. Among several proposals, Content Centric Networking has been conceived...

    Provided By Politecnico di Bari

  • White Papers // Jul 2011

    A Cross-Layer Reliability Metric for Wireless Mesh Networks with Selfish Participants

    Wireless Mesh Networks (WMNs) have emerged as the next generation networking technology that fosters the development of new network paradigms such as Wireless Mesh Community Networks (WMCNs). Many of the applications envisioned to run on WMCNs have high-throughput requirements. Several routing metrics have been proposed in recent years to select...

    Provided By Politecnico di Bari

  • White Papers // Apr 2011

    CPM: A Cross-Layer Framework to Efficiently Support Distributed Resources Management

    Resources management, and thus also energy saving, has become a high priority design goal for embedded multimedia mobile devices such as Smartphone's. Such devices are usually based on platforms using a System-on-Chip (SoC), which embeds a number of peripherals sharing some resources and competing on their usage. These many-processor embedded...

    Provided By Politecnico di Bari

  • White Papers // Mar 2011

    A Bird's Eye View of FPGA-Based Evolvable Hardware

    The era of digital electronics has witnessed many design techniques and approaches aimed at keeping the pace with the increasing number of transistors on a silicon chip. For decades, this trend in silicon technology has been closely following Moore's law. In spite of facilities like powerful Electronic Design Automation (EDA)...

    Provided By Politecnico di Bari

  • White Papers // Feb 2011

    Improving First Order Differential Power Attacks Through Digital Signal Processing

    Side-channel attacks pose a critical threat to the deployment of secure embedded systems. Both the academic and industrial communities have devoted considerable effort in order to evaluate the feasibility and effectiveness of these attacks. Differential-power analysis is a well-documented, powerful side-channel attack technique, which relies on measuring the power consumption...

    Provided By Politecnico di Bari

  • White Papers // Jan 2011

    Temporal Resolution Adaptation in Real-Time Bitrate Estimation From Packed Sampled Traffic

    Packet sampling can greatly reduce traffic measurement overhead in high-speed networks. At the same time, this operation introduces estimation errors that have to be carefully handled to ensure a reasonable measurement accuracy. Recently, a frequency-based approach has been proposed to catch the impact of such errors in bit-rate estimation of...

    Provided By Politecnico di Bari

  • White Papers // Nov 2010

    Adaptation Goals for Adaptive Service-Oriented Architectures

    Service-Oriented Architecture supports the definition and execution of complex business processes in a flexible and loosely-coupled way. A service-based application assembles the functionality provided by disparate, remote services in a seamless way. Since the architectural style prescribes that all features are provided remotely, these applications adapt to changes and new...

    Provided By Politecnico di Bari

  • White Papers // Sep 2010

    A Step Toward Exploiting Task-Affinity in Multi-Core Architectures to Improve Determinism of Real-Time Streaming Applications

    Cooperative applications represent a class of multi-tasking programs where different tasks execute concurrently according to a producer-consumer pattern. This class of programs is increasingly adopted on multi-core architectures and especially on multimedia mobile devices based on MPSoCs. Indeed, it allows to better exploit the architectural parallelism. However, the run-time efficient...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Scheduling Strategy for P2P-TV Systems Using Scalable Video Coding

    The adoption of scalable encoders can improve P2P-TV performance in heterogeneous scenarios, where peers with different capabilities coexist. In fact, each peer could dynamically adapt the resolution of the audio/video signals to its computation capabilities and available communication resources. Despite these clear benefits, casting a scalable encoder in a P2P-TV...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries

    Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper, the authors look at the problem of...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    An Optimized Reduction Design to Minimize Atomic Operations in Shared Memory Multiprocessors

    Reduction operations play a key role in modern massively data parallel computation. However, current implementations in shared memory programming APIs such as OpenMP are often cause of computation bottlenecks due to the high number of atomic operations involved. The authors propose a reduction design that takes advantage of the coupling...

    Provided By Politecnico di Bari

  • White Papers // May 2010

    Adaptive Goals for Self-Adaptive Service Compositions

    Service compositions need to continuously self-adapt to cope with unexpected failures. In this paper, adaptation becomes a fundamental requirement that must be elicited along with the other functional and non functional requirements. Besides modeling, effective adaptation also demands means to trigger it at runtime as soon as the actual behavior...

    Provided By Politecnico di Bari

  • White Papers // Mar 2010

    Querying RDF Streams With C-SPARQL

    Continuous SPARQL (C-SPARQL) is a new language for continuous queries over streams of RDF data. CSPARQL queries consider windows, i.e., the most recent triples of such streams, observed while data is continuously flowing. Supporting streams in RDF format guarantees interoperability and opens up important applications, in which reasoners can deal...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    A Two-Level Scheduling Algorithm for QoS Support in the Downlink of LTE Cellular Networks

    Long Term Evolution represents an emerging and promising technology for providing a broadband ubiquitous Internet access. But several aspects have to be considered in order to provide an effective service to users. In particular, in this paper, the authors consider the problem of optimizing the performance of real time down-link...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Voltage Fault Attacks on the RSA Cryptosystem

    Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched,...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Pin-Count Debug Interfaces for Multi-Device Systems

    IEEE Std 1149.1-2001 standard test access port and boundary-scan architecture is widely used as a debug interface, providing a path for a debugger to access debug components in complex System-on-Chips (SoCs). By its very nature JTAG accommodates systems containing multiple devices. However, JTAG was primarily intended as a component and...

    Provided By Politecnico di Bari

  • White Papers // Jan 2010

    DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections

    Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the present, while several algorithms have been conceived to identify them during the lifetime of a TCP connection (e.g., Forward-RTO or Eifel), there is not any tool...

    Provided By Politecnico di Bari

  • White Papers // Dec 2009

    A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling

    In network measurement systems, packet sampling techniques are usually adopted to reduce the overall amount of data to collect and process. Being based on a subset of packets, they hence introduce estimation errors that have to be properly counteracted by a fine tuning of the sampling strategy and sophisticated inversion...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    On the Efficiency of a Game Theoretic Approach to Sparse Regenerator Placement in WDM Networks

    In this paper, the authors provide a mathematical ILP model for the Regeneration Placement Problem (RPP) which minimizes the total number of regeneration nodes allocated in a translucent optical network ensuring that all the node pairs can always reach one another via two link-disjoint light-paths under physical-impairment constraints. Since RPP...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    An Analytical Expression for Service Curves of Fading Channels

    In this paper, the authors develop a method for analyzing time-varying wireless channels in the context of the modern theory of the stochastic network calculus. In particular, their technique is applicable to channels that can be modeled as Markov chains, which is the case of channels subject to Rayleigh fading....

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels

    The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In this paper, the authors propose a communication scheme for ANC able to guarantee the simultaneous transmissions of N-2 interfering terminals...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    On the Energy Consumption of IP-Over-WDM Architectures

    Today's "Green thrust" has been completely steering the evolution of the people society. Therefore, since enhancements on telecommunication networks are expected to cope with the growth of traffic demand, energy consumption is becoming a crucial design metric. In this paper, the authors focus on IP over Wavelength Division Multiplexing (IPoWDM)...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries

    Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper, the authors look at the problem of...

    Provided By Politecnico di Bari

  • White Papers // Dec 2012

    Exploiting Linux Control Groups for Effective Run-Time Resource Management

    The extremely high technology process reached by the silicon manufacturing (under the 32nm) has led to production of computational platforms and SoC, featuring a considerable amount of resources. Whilst from one side such multi- and many-core platforms show growing performance capabilities, from the other side they are more and more...

    Provided By Politecnico di Bari

  • White Papers // Aug 2012

    Thermal/Performance Trade-Off in Network-on-Chip Architectures

    Multi-core architectures are a promising paradigm to exploit the huge integration density reached by high-performance systems. Indeed, integration density and technology scaling are causing undesirable operating temperatures, having net impact on reduced reliability and increased cooling costs. Dynamic Thermal Management (DTM) approaches have been proposed in literature to control temperature...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Energy-Aware Planning and Management of Wireless Mesh Networks

    The rising demand for pervasive information access is causing the ICT industry to have a significant impact on the world energy consumption, with the telecommunications sector representing almost 50% of the overall power expenses. Green networking has therefore recently emerged as a new way of building and managing communication networks...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    On the Efficiency of a Game Theoretic Approach to Sparse Regenerator Placement in WDM Networks

    In this paper, the authors provide a mathematical ILP model for the Regeneration Placement Problem (RPP) which minimizes the total number of regeneration nodes allocated in a translucent optical network ensuring that all the node pairs can always reach one another via two link-disjoint light-paths under physical-impairment constraints. Since RPP...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    Finding Non-Trivial Malware Naming Inconsistencies

    Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty - more for researchers than for practitioners - for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    An Analytical Expression for Service Curves of Fading Channels

    In this paper, the authors develop a method for analyzing time-varying wireless channels in the context of the modern theory of the stochastic network calculus. In particular, their technique is applicable to channels that can be modeled as Markov chains, which is the case of channels subject to Rayleigh fading....

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels

    The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In this paper, the authors propose a communication scheme for ANC able to guarantee the simultaneous transmissions of N-2 interfering terminals...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    SPARE MAC Enhanced: A Dynamic TDMA Protocol for Wireless Sensor Networks

    Wireless Sensor Networks may support heterogeneous applications ranging from classical environmental monitoring, to more demanding integrated surveillance systems based on multimedia traffic. To this extent, the authors argue that the specific MAC layer solutions must be flexible enough to provide differentiated services based on the context of the specific WSN....

    Provided By Politecnico di Bari

  • White Papers // May 2012

    VM Placement Strategies for Cloud Scenarios

    The problem of Virtual Machine (VM) placement in a compute cloud infrastructure is well-studied in the literature. However, the majority of the existing works ignore the dynamic nature of the incoming stream of VM deployment requests that continuously arrive to the cloud provider infrastructure. In this paper, the authors provide...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    Understanding Decentralized and Dynamic Brokerage in Federated Cloud Environments

    The advent of the cloud computing paradigm offers different ways both to sell services and to exploit external computational resources according to a pay-per-use economic model. Nowadays, cloud computing clients can buy various forms of IaaS, PaaS, and SaaS from cloud providers. Besides this form of pay-per-use, the perspective of...

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    A Mismatch Controller for Implementing High-Speed Rate-Based Transport Protocols

    End-to-end rate-based congestion control algorithms are advocated for audio/video transport over the Internet instead of window-based protocols. Once the congestion controller has computed the sending rate, all rate-based algorithms proposed in the literature schedule packets to be sent spaced at intervals that are equal to the inverse of the desired...

    Provided By Politecnico di Bari

  • White Papers // Jun 2009

    Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

    The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a...

    Provided By Politecnico di Bari

  • White Papers // Sep 2011

    A Fairness Analysis of Content Centric Networks

    In recent years the new vision of data-centric networks has emerged as a natural way to satisfy user needs in the Future Internet. It is based on novel architectures oriented towards data sharing and delivering as opposite to classic host-to-host communications. Among several proposals, Content Centric Networking has been conceived...

    Provided By Politecnico di Bari

  • White Papers // Jan 2011

    Temporal Resolution Adaptation in Real-Time Bitrate Estimation From Packed Sampled Traffic

    Packet sampling can greatly reduce traffic measurement overhead in high-speed networks. At the same time, this operation introduces estimation errors that have to be carefully handled to ensure a reasonable measurement accuracy. Recently, a frequency-based approach has been proposed to catch the impact of such errors in bit-rate estimation of...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    A Two-Level Scheduling Algorithm for QoS Support in the Downlink of LTE Cellular Networks

    Long Term Evolution represents an emerging and promising technology for providing a broadband ubiquitous Internet access. But several aspects have to be considered in order to provide an effective service to users. In particular, in this paper, the authors consider the problem of optimizing the performance of real time down-link...

    Provided By Politecnico di Bari

  • White Papers // Dec 2009

    A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling

    In network measurement systems, packet sampling techniques are usually adopted to reduce the overall amount of data to collect and process. Being based on a subset of packets, they hence introduce estimation errors that have to be properly counteracted by a fine tuning of the sampling strategy and sophisticated inversion...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Scheduling Strategy for P2P-TV Systems Using Scalable Video Coding

    The adoption of scalable encoders can improve P2P-TV performance in heterogeneous scenarios, where peers with different capabilities coexist. In fact, each peer could dynamically adapt the resolution of the audio/video signals to its computation capabilities and available communication resources. Despite these clear benefits, casting a scalable encoder in a P2P-TV...

    Provided By Politecnico di Bari

  • White Papers // Jan 2010

    DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections

    Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the present, while several algorithms have been conceived to identify them during the lifetime of a TCP connection (e.g., Forward-RTO or Eifel), there is not any tool...

    Provided By Politecnico di Bari

  • White Papers // Apr 2009

    Semantic-Based Resource Discovery, Composition and Substitution in IEEE 802.11 Mobile Ad Hoc Networks

    The authors present a general framework for resource discovery, composition and substitution in Mobile Ad-hoc NETworks (MANET), exploiting knowledge representation techniques. Key points of the proposed approach are: reuse of discovery information at network layer in order to build a fully unified semantic-based discovery and routing framework; use of semantic...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Efficient OFDM Channel Estimation Via an Information Criterion

    In this paper, the authors consider joint estimation of the channel length and of the impulse response for OFDM systems, exploiting information criteria, to find the best trade-off between noise rejection and channel description accuracy. So far, information criteria have not been considered practical channel estimation methods, due to their...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Low-Carbon Routing Algorithms for Cloud Computing Services in IP-Over-WDM Networks

    Energy consumption in telecommunication networks keeps growing rapidly, mainly due to emergence of new Cloud Computing (CC) services that need to be supported by large data centers that consume a huge amount of energy and, in turn, cause the emission of enormous quantity of CO2. Given the decreasing availability of...

    Provided By Politecnico di Bari

  • White Papers // Jul 2011

    A Cross-Layer Reliability Metric for Wireless Mesh Networks with Selfish Participants

    Wireless Mesh Networks (WMNs) have emerged as the next generation networking technology that fosters the development of new network paradigms such as Wireless Mesh Community Networks (WMCNs). Many of the applications envisioned to run on WMCNs have high-throughput requirements. Several routing metrics have been proposed in recent years to select...

    Provided By Politecnico di Bari

  • White Papers // Jun 2007

    Countermeasures Against Branch Target Buffer Attacks

    Timing attacks against secret-key/public-key cryptosystems attempt to recover complete key information by measuring the running time of certain computations during the encryption or decryption processes. Branch prediction analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm....

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures

    Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g., power analysis and fault injection...

    Provided By Politecnico di Bari

  • White Papers // Apr 2011

    CPM: A Cross-Layer Framework to Efficiently Support Distributed Resources Management

    Resources management, and thus also energy saving, has become a high priority design goal for embedded multimedia mobile devices such as Smartphone's. Such devices are usually based on platforms using a System-on-Chip (SoC), which embeds a number of peripherals sharing some resources and competing on their usage. These many-processor embedded...

    Provided By Politecnico di Bari

  • White Papers // Jul 2012

    A RTRM Proposal for Multi/Many-Core Platforms and Reconfigurable Applications

    Modern parallel computing architectures have broadened the boundaries of the High Performance Computing (HPC) world, emerging in the Embedded Systems context too. The computational power provided can be translated into higher Quality-of-Experience (QoE) for the users. Emerging multi/many-core architectures, targeting both High Performance Computing (HPC) and mobile devices, increase the...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    A Sensor-Less NBTI Mitigation Methodology for NoC Architectures

    CMOS technology improvement allows increasing the number of cores integrated on a single chip and makes Network-on-Chips (NoCs) a key component from the performance and reliability standpoints. Unfortunately, continuous scaling of CMOS technology poses severe concerns regarding failure mechanisms such as NBTI and stressmigration that are crucial in achieving acceptable...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Voltage Fault Attacks on the RSA Cryptosystem

    Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched,...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Exploiting Thermal Coupling Information in MPSoC Dynamic Thermal Management

    Temperature profile optimization is one of the most relevant and challenging problems in modern multi-core architectures. Several dynamic thermal management approaches have been proposed in literature, and run-time policies have been designed to direct the allocation of tasks according to temperature constraints. Thermal coupling is recognized to have a role...

    Provided By Politecnico di Bari

  • White Papers // Apr 2009

    Design of a Parallel AES for Graphics Hardware Using the CUDA Framework

    Web servers often need to manage encrypted transfers of data. The encryption activity is computationally intensive, and exposes a significant degree of parallelism. At the same time, cheap multicore processors are readily available on graphics hardware, and toolchains for development of general purpose programs are being released by the vendors....

    Provided By Politecnico di Bari

  • White Papers // Sep 2010

    A Step Toward Exploiting Task-Affinity in Multi-Core Architectures to Improve Determinism of Real-Time Streaming Applications

    Cooperative applications represent a class of multi-tasking programs where different tasks execute concurrently according to a producer-consumer pattern. This class of programs is increasingly adopted on multi-core architectures and especially on multimedia mobile devices based on MPSoCs. Indeed, it allows to better exploit the architectural parallelism. However, the run-time efficient...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    AcOS: An Autonomic Management Layer Enhancing Commodity Operating Systems

    Traditionally, operating systems have been in charge of serving as a convenient layer between applications and the bare-metal hardware by both providing an abstraction of hardware itself and allocating available resources to the applications. Both of these roles are becoming ever more important due to the increasing complexity of modern...

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    Fast Disk Encryption Through GPGPU Acceleration

    Data storage encryption has always been a key point in warranting confidentiality, but encrypting large disk volumes imposes a significant computational load on the CPUs. In case of a single host system the CPU time used for encryption is subtracted from the one available for coping with the user's needs....

    Provided By Politecnico di Bari

  • White Papers // Feb 2011

    Improving First Order Differential Power Attacks Through Digital Signal Processing

    Side-channel attacks pose a critical threat to the deployment of secure embedded systems. Both the academic and industrial communities have devoted considerable effort in order to evaluate the feasibility and effectiveness of these attacks. Differential-power analysis is a well-documented, powerful side-channel attack technique, which relies on measuring the power consumption...

    Provided By Politecnico di Bari

  • White Papers // Jan 2007

    An Application Mapping Methodology and Case Study for Multi-Processor On-Chip Architectures

    In this paper, the authors introduce an application mapping methodology and case study for multi-processor on-chip architectures. Starting from the description of an application in standard sequential code (e.g. in C), first the application is profiled, parallelized when possible, then its components are moved to hardware implementation when necessary to...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Pin-Count Debug Interfaces for Multi-Device Systems

    IEEE Std 1149.1-2001 standard test access port and boundary-scan architecture is widely used as a debug interface, providing a path for a debugger to access debug components in complex System-on-Chips (SoCs). By its very nature JTAG accommodates systems containing multiple devices. However, JTAG was primarily intended as a component and...

    Provided By Politecnico di Bari

  • White Papers // Jul 2008

    ILDJIT: A Parallel Dynamic Compiler

    Multi-core technology is being employed in most recent high-performance architectures. Such architectures need specifically designed multi-threaded software to exploit all the potentialities of their hardware parallelism. At the same time, object code virtualization technologies are achieving a growing popularity, as they allow higher levels of software portability and reuse. Thus,...

    Provided By Politecnico di Bari