Politecnico di Bari

Displaying 1-40 of 47 results

  • White Papers // Jan 2014

    Variation-Aware Voltage Island Formation for Power Efficient Near-Threshold Manycore Architectures

    The power-wall problem and its dual utilization wall problem are considered among the main barriers to feasible/efficient scaling in the manycore era. Several researchers have proposed the usage of aggressive voltage scaling techniques at the near-threshold voltage region, promising significant improvements in power efficiency at the expense of reduced performance...

    Provided By Politecnico di Bari

  • White Papers // Dec 2012

    Exploiting Linux Control Groups for Effective Run-Time Resource Management

    The extremely high technology process reached by the silicon manufacturing (under the 32nm) has led to production of computational platforms and SoC, featuring a considerable amount of resources. Whilst from one side such multi- and many-core platforms show growing performance capabilities, from the other side they are more and more...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Exploiting Thermal Coupling Information in MPSoC Dynamic Thermal Management

    Temperature profile optimization is one of the most relevant and challenging problems in modern multi-core architectures. Several dynamic thermal management approaches have been proposed in literature, and run-time policies have been designed to direct the allocation of tasks according to temperature constraints. Thermal coupling is recognized to have a role...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Energy-Aware Planning and Management of Wireless Mesh Networks

    The rising demand for pervasive information access is causing the ICT industry to have a significant impact on the world energy consumption, with the telecommunications sector representing almost 50% of the overall power expenses. Green networking has therefore recently emerged as a new way of building and managing communication networks...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    Finding Non-Trivial Malware Naming Inconsistencies

    Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty - more for researchers than for practitioners - for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications...

    Provided By Politecnico di Bari

  • White Papers // Aug 2012

    Thermal/Performance Trade-Off in Network-on-Chip Architectures

    Multi-core architectures are a promising paradigm to exploit the huge integration density reached by high-performance systems. Indeed, integration density and technology scaling are causing undesirable operating temperatures, having net impact on reduced reliability and increased cooling costs. Dynamic Thermal Management (DTM) approaches have been proposed in literature to control temperature...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    AcOS: An Autonomic Management Layer Enhancing Commodity Operating Systems

    Traditionally, operating systems have been in charge of serving as a convenient layer between applications and the bare-metal hardware by both providing an abstraction of hardware itself and allocating available resources to the applications. Both of these roles are becoming ever more important due to the increasing complexity of modern...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    Understanding Decentralized and Dynamic Brokerage in Federated Cloud Environments

    The advent of the cloud computing paradigm offers different ways both to sell services and to exploit external computational resources according to a pay-per-use economic model. Nowadays, cloud computing clients can buy various forms of IaaS, PaaS, and SaaS from cloud providers. Besides this form of pay-per-use, the perspective of...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Efficient OFDM Channel Estimation Via an Information Criterion

    In this paper, the authors consider joint estimation of the channel length and of the impulse response for OFDM systems, exploiting information criteria, to find the best trade-off between noise rejection and channel description accuracy. So far, information criteria have not been considered practical channel estimation methods, due to their...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Low-Carbon Routing Algorithms for Cloud Computing Services in IP-Over-WDM Networks

    Energy consumption in telecommunication networks keeps growing rapidly, mainly due to emergence of new Cloud Computing (CC) services that need to be supported by large data centers that consume a huge amount of energy and, in turn, cause the emission of enormous quantity of CO2. Given the decreasing availability of...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    On the Energy Consumption of IP-Over-WDM Architectures

    Today's "Green thrust" has been completely steering the evolution of the people society. Therefore, since enhancements on telecommunication networks are expected to cope with the growth of traffic demand, energy consumption is becoming a crucial design metric. In this paper, the authors focus on IP over Wavelength Division Multiplexing (IPoWDM)...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    VM Placement Strategies for Cloud Scenarios

    The problem of Virtual Machine (VM) placement in a compute cloud infrastructure is well-studied in the literature. However, the majority of the existing works ignore the dynamic nature of the incoming stream of VM deployment requests that continuously arrive to the cloud provider infrastructure. In this paper, the authors provide...

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures

    Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g., power analysis and fault injection...

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Floorplan-Aware Hierarchical NoC Topology with GALS Interfaces

    Network-on-Chips (NoCs) has been seen as an interconnect solution for complex systems. However, performance and energy issues still represent limiting factors for Multi-Processor System-on-Chip (MPSoC). Complex router architectures can be prohibitive for the embedded domain, once they dissipate too much power and energy. In this paper, they propose a low...

    Provided By Politecnico di Bari

  • White Papers // Sep 2011

    A Fairness Analysis of Content Centric Networks

    In recent years the new vision of data-centric networks has emerged as a natural way to satisfy user needs in the Future Internet. It is based on novel architectures oriented towards data sharing and delivering as opposite to classic host-to-host communications. Among several proposals, Content Centric Networking has been conceived...

    Provided By Politecnico di Bari

  • White Papers // Feb 2011

    Improving First Order Differential Power Attacks Through Digital Signal Processing

    Side-channel attacks pose a critical threat to the deployment of secure embedded systems. Both the academic and industrial communities have devoted considerable effort in order to evaluate the feasibility and effectiveness of these attacks. Differential-power analysis is a well-documented, powerful side-channel attack technique, which relies on measuring the power consumption...

    Provided By Politecnico di Bari

  • White Papers // Jan 2011

    Temporal Resolution Adaptation in Real-Time Bitrate Estimation From Packed Sampled Traffic

    Packet sampling can greatly reduce traffic measurement overhead in high-speed networks. At the same time, this operation introduces estimation errors that have to be carefully handled to ensure a reasonable measurement accuracy. Recently, a frequency-based approach has been proposed to catch the impact of such errors in bit-rate estimation of...

    Provided By Politecnico di Bari

  • White Papers // Nov 2010

    Adaptation Goals for Adaptive Service-Oriented Architectures

    Service-Oriented Architecture supports the definition and execution of complex business processes in a flexible and loosely-coupled way. A service-based application assembles the functionality provided by disparate, remote services in a seamless way. Since the architectural style prescribes that all features are provided remotely, these applications adapt to changes and new...

    Provided By Politecnico di Bari

  • White Papers // Sep 2010

    A Step Toward Exploiting Task-Affinity in Multi-Core Architectures to Improve Determinism of Real-Time Streaming Applications

    Cooperative applications represent a class of multi-tasking programs where different tasks execute concurrently according to a producer-consumer pattern. This class of programs is increasingly adopted on multi-core architectures and especially on multimedia mobile devices based on MPSoCs. Indeed, it allows to better exploit the architectural parallelism. However, the run-time efficient...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Scheduling Strategy for P2P-TV Systems Using Scalable Video Coding

    The adoption of scalable encoders can improve P2P-TV performance in heterogeneous scenarios, where peers with different capabilities coexist. In fact, each peer could dynamically adapt the resolution of the audio/video signals to its computation capabilities and available communication resources. Despite these clear benefits, casting a scalable encoder in a P2P-TV...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries

    Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper, the authors look at the problem of...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    An Optimized Reduction Design to Minimize Atomic Operations in Shared Memory Multiprocessors

    Reduction operations play a key role in modern massively data parallel computation. However, current implementations in shared memory programming APIs such as OpenMP are often cause of computation bottlenecks due to the high number of atomic operations involved. The authors propose a reduction design that takes advantage of the coupling...

    Provided By Politecnico di Bari

  • White Papers // May 2010

    Adaptive Goals for Self-Adaptive Service Compositions

    Service compositions need to continuously self-adapt to cope with unexpected failures. In this paper, adaptation becomes a fundamental requirement that must be elicited along with the other functional and non functional requirements. Besides modeling, effective adaptation also demands means to trigger it at runtime as soon as the actual behavior...

    Provided By Politecnico di Bari

  • White Papers // Mar 2010

    Querying RDF Streams With C-SPARQL

    Continuous SPARQL (C-SPARQL) is a new language for continuous queries over streams of RDF data. CSPARQL queries consider windows, i.e., the most recent triples of such streams, observed while data is continuously flowing. Supporting streams in RDF format guarantees interoperability and opens up important applications, in which reasoners can deal...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    A Two-Level Scheduling Algorithm for QoS Support in the Downlink of LTE Cellular Networks

    Long Term Evolution represents an emerging and promising technology for providing a broadband ubiquitous Internet access. But several aspects have to be considered in order to provide an effective service to users. In particular, in this paper, the authors consider the problem of optimizing the performance of real time down-link...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Voltage Fault Attacks on the RSA Cryptosystem

    Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched,...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Pin-Count Debug Interfaces for Multi-Device Systems

    IEEE Std 1149.1-2001 standard test access port and boundary-scan architecture is widely used as a debug interface, providing a path for a debugger to access debug components in complex System-on-Chips (SoCs). By its very nature JTAG accommodates systems containing multiple devices. However, JTAG was primarily intended as a component and...

    Provided By Politecnico di Bari

  • White Papers // Jan 2010

    DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections

    Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the present, while several algorithms have been conceived to identify them during the lifetime of a TCP connection (e.g., Forward-RTO or Eifel), there is not any tool...

    Provided By Politecnico di Bari

  • White Papers // Dec 2009

    A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling

    In network measurement systems, packet sampling techniques are usually adopted to reduce the overall amount of data to collect and process. Being based on a subset of packets, they hence introduce estimation errors that have to be properly counteracted by a fine tuning of the sampling strategy and sophisticated inversion...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    On the Efficiency of a Game Theoretic Approach to Sparse Regenerator Placement in WDM Networks

    In this paper, the authors provide a mathematical ILP model for the Regeneration Placement Problem (RPP) which minimizes the total number of regeneration nodes allocated in a translucent optical network ensuring that all the node pairs can always reach one another via two link-disjoint light-paths under physical-impairment constraints. Since RPP...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    An Analytical Expression for Service Curves of Fading Channels

    In this paper, the authors develop a method for analyzing time-varying wireless channels in the context of the modern theory of the stochastic network calculus. In particular, their technique is applicable to channels that can be modeled as Markov chains, which is the case of channels subject to Rayleigh fading....

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels

    The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In this paper, the authors propose a communication scheme for ANC able to guarantee the simultaneous transmissions of N-2 interfering terminals...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    SPARE MAC Enhanced: A Dynamic TDMA Protocol for Wireless Sensor Networks

    Wireless Sensor Networks may support heterogeneous applications ranging from classical environmental monitoring, to more demanding integrated surveillance systems based on multimedia traffic. To this extent, the authors argue that the specific MAC layer solutions must be flexible enough to provide differentiated services based on the context of the specific WSN....

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    Fast Disk Encryption Through GPGPU Acceleration

    Data storage encryption has always been a key point in warranting confidentiality, but encrypting large disk volumes imposes a significant computational load on the CPUs. In case of a single host system the CPU time used for encryption is subtracted from the one available for coping with the user's needs....

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    WebRatio BPM: A Tool for Design and Deployment of Business Processes on the Web

    This paper presents WebRatio BPM, an Eclipse-based tool that supports the design and deployment of business processes. The tool applies Model Driven Engineering techniques to complex, multi-actor business processes, mixing tasks executed by humans and by machines. Business processes are described through the standard BPMN 1.2 notation, extended with information...

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    A Mismatch Controller for Implementing High-Speed Rate-Based Transport Protocols

    End-to-end rate-based congestion control algorithms are advocated for audio/video transport over the Internet instead of window-based protocols. Once the congestion controller has computed the sending rate, all rate-based algorithms proposed in the literature schedule packets to be sent spaced at intervals that are equal to the inverse of the desired...

    Provided By Politecnico di Bari

  • White Papers // Jun 2009

    A Methodological Approach to Enable Cooperative Process Design Through Web Services

    Web services are rapidly becoming the key technology for enterprises to enable IT development and modernization. By now, organizations have experienced the Service Oriented Architecture (SOA) technology by developing and using simple internal applications or by searching for information provided by external services, thus enabling the interactions among different organizations....

    Provided By Politecnico di Bari

  • White Papers // Jun 2009

    Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

    The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a...

    Provided By Politecnico di Bari

  • White Papers // Apr 2009

    Semantic-Based Resource Discovery, Composition and Substitution in IEEE 802.11 Mobile Ad Hoc Networks

    The authors present a general framework for resource discovery, composition and substitution in Mobile Ad-hoc NETworks (MANET), exploiting knowledge representation techniques. Key points of the proposed approach are: reuse of discovery information at network layer in order to build a fully unified semantic-based discovery and routing framework; use of semantic...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    On the Efficiency of a Game Theoretic Approach to Sparse Regenerator Placement in WDM Networks

    In this paper, the authors provide a mathematical ILP model for the Regeneration Placement Problem (RPP) which minimizes the total number of regeneration nodes allocated in a translucent optical network ensuring that all the node pairs can always reach one another via two link-disjoint light-paths under physical-impairment constraints. Since RPP...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    Two-factor authentication is widely used by high-value services to prevent adversaries from compromising accounts using stolen credentials. Facebook has recently released a two-factor authentication mechanism, referred to as Social Authentication, which requires users to identify some of their friends in randomly selected photos. A recent study has provided a formal...

    Provided By Politecnico di Bari

  • White Papers // Sep 2012

    Finding Non-Trivial Malware Naming Inconsistencies

    Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty - more for researchers than for practitioners - for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    An Analytical Expression for Service Curves of Fading Channels

    In this paper, the authors develop a method for analyzing time-varying wireless channels in the context of the modern theory of the stochastic network calculus. In particular, their technique is applicable to channels that can be modeled as Markov chains, which is the case of channels subject to Rayleigh fading....

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels

    The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In this paper, the authors propose a communication scheme for ANC able to guarantee the simultaneous transmissions of N-2 interfering terminals...

    Provided By Politecnico di Bari

  • White Papers // Oct 2009

    SPARE MAC Enhanced: A Dynamic TDMA Protocol for Wireless Sensor Networks

    Wireless Sensor Networks may support heterogeneous applications ranging from classical environmental monitoring, to more demanding integrated surveillance systems based on multimedia traffic. To this extent, the authors argue that the specific MAC layer solutions must be flexible enough to provide differentiated services based on the context of the specific WSN....

    Provided By Politecnico di Bari

  • White Papers // May 2012

    VM Placement Strategies for Cloud Scenarios

    The problem of Virtual Machine (VM) placement in a compute cloud infrastructure is well-studied in the literature. However, the majority of the existing works ignore the dynamic nature of the incoming stream of VM deployment requests that continuously arrive to the cloud provider infrastructure. In this paper, the authors provide...

    Provided By Politecnico di Bari

  • White Papers // Jun 2012

    Understanding Decentralized and Dynamic Brokerage in Federated Cloud Environments

    The advent of the cloud computing paradigm offers different ways both to sell services and to exploit external computational resources according to a pay-per-use economic model. Nowadays, cloud computing clients can buy various forms of IaaS, PaaS, and SaaS from cloud providers. Besides this form of pay-per-use, the perspective of...

    Provided By Politecnico di Bari

  • White Papers // Nov 2010

    Adaptation Goals for Adaptive Service-Oriented Architectures

    Service-Oriented Architecture supports the definition and execution of complex business processes in a flexible and loosely-coupled way. A service-based application assembles the functionality provided by disparate, remote services in a seamless way. Since the architectural style prescribes that all features are provided remotely, these applications adapt to changes and new...

    Provided By Politecnico di Bari

  • White Papers // Jun 2009

    A Methodological Approach to Enable Cooperative Process Design Through Web Services

    Web services are rapidly becoming the key technology for enterprises to enable IT development and modernization. By now, organizations have experienced the Service Oriented Architecture (SOA) technology by developing and using simple internal applications or by searching for information provided by external services, thus enabling the interactions among different organizations....

    Provided By Politecnico di Bari

  • White Papers // May 2010

    Adaptive Goals for Self-Adaptive Service Compositions

    Service compositions need to continuously self-adapt to cope with unexpected failures. In this paper, adaptation becomes a fundamental requirement that must be elicited along with the other functional and non functional requirements. Besides modeling, effective adaptation also demands means to trigger it at runtime as soon as the actual behavior...

    Provided By Politecnico di Bari

  • White Papers // Feb 2008

    A Timed Extension of WSCoL

    Web service based applications are expected to live in dynamically evolving settings. At run-time, services may undergo changes that could modify their expected behavior. Because of such intrinsic dynamic nature, applications should be designed by adhering to the principles of design-by-contract. Run-time monitoring is needed to check that the contract...

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    WebRatio BPM: A Tool for Design and Deployment of Business Processes on the Web

    This paper presents WebRatio BPM, an Eclipse-based tool that supports the design and deployment of business processes. The tool applies Model Driven Engineering techniques to complex, multi-actor business processes, mixing tasks executed by humans and by machines. Business processes are described through the standard BPMN 1.2 notation, extended with information...

    Provided By Politecnico di Bari

  • White Papers // Feb 2012

    Fault Injection Attacks on Cryptographic Devices: Theory, Practice and Countermeasures

    Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information. Although the current standard cryptographic algorithms proved to withstand exhaustive attacks, their hardware and software implementations have exhibited vulnerabilities to side channel attacks, e.g., power analysis and fault injection...

    Provided By Politecnico di Bari

  • White Papers // Jun 2007

    Countermeasures Against Branch Target Buffer Attacks

    Timing attacks against secret-key/public-key cryptosystems attempt to recover complete key information by measuring the running time of certain computations during the encryption or decryption processes. Branch prediction analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm....

    Provided By Politecnico di Bari

  • White Papers // Mar 2010

    Querying RDF Streams With C-SPARQL

    Continuous SPARQL (C-SPARQL) is a new language for continuous queries over streams of RDF data. CSPARQL queries consider windows, i.e., the most recent triples of such streams, observed while data is continuously flowing. Supporting streams in RDF format guarantees interoperability and opens up important applications, in which reasoners can deal...

    Provided By Politecnico di Bari

  • White Papers // Sep 2009

    A Mismatch Controller for Implementing High-Speed Rate-Based Transport Protocols

    End-to-end rate-based congestion control algorithms are advocated for audio/video transport over the Internet instead of window-based protocols. Once the congestion controller has computed the sending rate, all rate-based algorithms proposed in the literature schedule packets to be sent spaced at intervals that are equal to the inverse of the desired...

    Provided By Politecnico di Bari

  • White Papers // Jun 2009

    Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

    The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a...

    Provided By Politecnico di Bari

  • White Papers // Sep 2011

    A Fairness Analysis of Content Centric Networks

    In recent years the new vision of data-centric networks has emerged as a natural way to satisfy user needs in the Future Internet. It is based on novel architectures oriented towards data sharing and delivering as opposite to classic host-to-host communications. Among several proposals, Content Centric Networking has been conceived...

    Provided By Politecnico di Bari

  • White Papers // Jan 2011

    Temporal Resolution Adaptation in Real-Time Bitrate Estimation From Packed Sampled Traffic

    Packet sampling can greatly reduce traffic measurement overhead in high-speed networks. At the same time, this operation introduces estimation errors that have to be carefully handled to ensure a reasonable measurement accuracy. Recently, a frequency-based approach has been proposed to catch the impact of such errors in bit-rate estimation of...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    A Two-Level Scheduling Algorithm for QoS Support in the Downlink of LTE Cellular Networks

    Long Term Evolution represents an emerging and promising technology for providing a broadband ubiquitous Internet access. But several aspects have to be considered in order to provide an effective service to users. In particular, in this paper, the authors consider the problem of optimizing the performance of real time down-link...

    Provided By Politecnico di Bari

  • White Papers // Dec 2009

    A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling

    In network measurement systems, packet sampling techniques are usually adopted to reduce the overall amount of data to collect and process. Being based on a subset of packets, they hence introduce estimation errors that have to be properly counteracted by a fine tuning of the sampling strategy and sophisticated inversion...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Scheduling Strategy for P2P-TV Systems Using Scalable Video Coding

    The adoption of scalable encoders can improve P2P-TV performance in heterogeneous scenarios, where peers with different capabilities coexist. In fact, each peer could dynamically adapt the resolution of the audio/video signals to its computation capabilities and available communication resources. Despite these clear benefits, casting a scalable encoder in a P2P-TV...

    Provided By Politecnico di Bari

  • White Papers // Jan 2010

    DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections

    Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the present, while several algorithms have been conceived to identify them during the lifetime of a TCP connection (e.g., Forward-RTO or Eifel), there is not any tool...

    Provided By Politecnico di Bari

  • White Papers // Apr 2009

    Semantic-Based Resource Discovery, Composition and Substitution in IEEE 802.11 Mobile Ad Hoc Networks

    The authors present a general framework for resource discovery, composition and substitution in Mobile Ad-hoc NETworks (MANET), exploiting knowledge representation techniques. Key points of the proposed approach are: reuse of discovery information at network layer in order to build a fully unified semantic-based discovery and routing framework; use of semantic...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Efficient OFDM Channel Estimation Via an Information Criterion

    In this paper, the authors consider joint estimation of the channel length and of the impulse response for OFDM systems, exploiting information criteria, to find the best trade-off between noise rejection and channel description accuracy. So far, information criteria have not been considered practical channel estimation methods, due to their...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    Low-Carbon Routing Algorithms for Cloud Computing Services in IP-Over-WDM Networks

    Energy consumption in telecommunication networks keeps growing rapidly, mainly due to emergence of new Cloud Computing (CC) services that need to be supported by large data centers that consume a huge amount of energy and, in turn, cause the emission of enormous quantity of CO2. Given the decreasing availability of...

    Provided By Politecnico di Bari

  • White Papers // May 2012

    On the Energy Consumption of IP-Over-WDM Architectures

    Today's "Green thrust" has been completely steering the evolution of the people society. Therefore, since enhancements on telecommunication networks are expected to cope with the growth of traffic demand, energy consumption is becoming a crucial design metric. In this paper, the authors focus on IP over Wavelength Division Multiplexing (IPoWDM)...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries

    Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper, the authors look at the problem of...

    Provided By Politecnico di Bari

  • White Papers // Dec 2012

    Exploiting Linux Control Groups for Effective Run-Time Resource Management

    The extremely high technology process reached by the silicon manufacturing (under the 32nm) has led to production of computational platforms and SoC, featuring a considerable amount of resources. Whilst from one side such multi- and many-core platforms show growing performance capabilities, from the other side they are more and more...

    Provided By Politecnico di Bari

  • White Papers // Aug 2012

    Thermal/Performance Trade-Off in Network-on-Chip Architectures

    Multi-core architectures are a promising paradigm to exploit the huge integration density reached by high-performance systems. Indeed, integration density and technology scaling are causing undesirable operating temperatures, having net impact on reduced reliability and increased cooling costs. Dynamic Thermal Management (DTM) approaches have been proposed in literature to control temperature...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Energy-Aware Planning and Management of Wireless Mesh Networks

    The rising demand for pervasive information access is causing the ICT industry to have a significant impact on the world energy consumption, with the telecommunications sector representing almost 50% of the overall power expenses. Green networking has therefore recently emerged as a new way of building and managing communication networks...

    Provided By Politecnico di Bari

  • White Papers // Feb 2010

    Low Voltage Fault Attacks on the RSA Cryptosystem

    Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched,...

    Provided By Politecnico di Bari

  • White Papers // Nov 2012

    Exploiting Thermal Coupling Information in MPSoC Dynamic Thermal Management

    Temperature profile optimization is one of the most relevant and challenging problems in modern multi-core architectures. Several dynamic thermal management approaches have been proposed in literature, and run-time policies have been designed to direct the allocation of tasks according to temperature constraints. Thermal coupling is recognized to have a role...

    Provided By Politecnico di Bari

  • White Papers // Apr 2009

    Design of a Parallel AES for Graphics Hardware Using the CUDA Framework

    Web servers often need to manage encrypted transfers of data. The encryption activity is computationally intensive, and exposes a significant degree of parallelism. At the same time, cheap multicore processors are readily available on graphics hardware, and toolchains for development of general purpose programs are being released by the vendors....

    Provided By Politecnico di Bari

  • White Papers // Jan 2014

    Variation-Aware Voltage Island Formation for Power Efficient Near-Threshold Manycore Architectures

    The power-wall problem and its dual utilization wall problem are considered among the main barriers to feasible/efficient scaling in the manycore era. Several researchers have proposed the usage of aggressive voltage scaling techniques at the near-threshold voltage region, promising significant improvements in power efficiency at the expense of reduced performance...

    Provided By Politecnico di Bari

  • White Papers // Mar 2006

    An Efficient Synchronization Technique for Multiprocessor Systems On-Chip

    In this paper, the authors explore optimization techniques of the synchronization mechanisms for MPSoCs based on complex interconnect (Network-on-Chip (NoC)), targeted at future mobile systems. They suggest the architecture of the memory controller optimized to minimize synchronization overhead. The proposed solution is based on the idea of performing synchronization operations...

    Provided By Politecnico di Bari

  • White Papers // Jul 2008

    ILDJIT: A Parallel Dynamic Compiler

    Multi-core technology is being employed in most recent high-performance architectures. Such architectures need specifically designed multi-threaded software to exploit all the potentialities of their hardware parallelism. At the same time, object code virtualization technologies are achieving a growing popularity, as they allow higher levels of software portability and reuse. Thus,...

    Provided By Politecnico di Bari

  • White Papers // Aug 2010

    An Optimized Reduction Design to Minimize Atomic Operations in Shared Memory Multiprocessors

    Reduction operations play a key role in modern massively data parallel computation. However, current implementations in shared memory programming APIs such as OpenMP are often cause of computation bottlenecks due to the high number of atomic operations involved. The authors propose a reduction design that takes advantage of the coupling...

    Provided By Politecnico di Bari

  • White Papers // Nov 2006

    Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic Applications

    Tiled architectures are emerging as an architectural platform that allows high levels of instruction level parallelism. Traditional compiler parallelization techniques are usually employed to generate programs for these architectures. However, for specific application domains, the compiler is not able to effectively exploit the domain knowledge. In this paper, the authors...

    Provided By Politecnico di Bari