Sabanci Group

Displaying 1-7 of 7 results

  • White Papers // Nov 2013

    Examination of a New Defense Mechanism: Honeywords

    It has become much easier to crack a password hash with the advancements in the Graphical Processing Unit (GPU) technology. An adversary can recover a user's password using brute-force attack on password hash. Once the password has been recovered no server can detect any illegitimate user authentication (if there is...

    Provided By Sabanci Group

  • White Papers // Sep 2012

    Efficient Wireless Scheduling With Limited Channel Feedback and Performance Guarantees

    It is well known that Max-Weight scheduling provides queue stability whenever this is possible. However, Max-Weight scheduling requires the complete Channel State Information (CSI) to make the best transmission decision at every time slot. The common assumption in this line of research assumes that the network controller has full CSI...

    Provided By Sabanci Group

  • White Papers // Sep 2012

    Gaussian Process Learning for Opportunistic Scheduling in Wireless Networks

    It is well known that opportunistic scheduling algorithms are throughput optimal under dynamic channel and network conditions. However, these algorithms achieve a hypothetical rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot....

    Provided By Sabanci Group

  • White Papers // Mar 2012

    Max-Weight Scheduling Using Hierarchical Modulation

    The authors investigate the network stability problem when two users are scheduled simultaneously. The key idea is to simultaneously transmit to more than one users experiencing different channel conditions by employing hierarchical modulation. For two-user scheduling problem, they develop a throughput optimal algorithm which can stabilize the network whenever traffic...

    Provided By Sabanci Group

  • White Papers // Feb 2012

    Smart Scheduling and Feedback Allocation Over Non-Stationary Wireless Channels

    It is well known that opportunistic scheduling algorithms are throughput optimal under dynamic channel and network conditions. However, these algorithms achieve a hypothetical rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot....

    Provided By Sabanci Group

  • White Papers // Jan 2009

    Multi-Biometric Templates Using Fingerprint and Voice

    As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system...

    Provided By Sabanci Group

  • White Papers // Sep 2008

    Static Analysis of Executables for Collaborative Malware Detection on Android

    Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to Smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As Smartphones become host...

    Provided By Sabanci Group

  • White Papers // Jan 2009

    Multi-Biometric Templates Using Fingerprint and Voice

    As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system...

    Provided By Sabanci Group

  • White Papers // Sep 2008

    Static Analysis of Executables for Collaborative Malware Detection on Android

    Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to Smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As Smartphones become host...

    Provided By Sabanci Group

  • White Papers // Nov 2013

    Examination of a New Defense Mechanism: Honeywords

    It has become much easier to crack a password hash with the advancements in the Graphical Processing Unit (GPU) technology. An adversary can recover a user's password using brute-force attack on password hash. Once the password has been recovered no server can detect any illegitimate user authentication (if there is...

    Provided By Sabanci Group

  • White Papers // Sep 2012

    Efficient Wireless Scheduling With Limited Channel Feedback and Performance Guarantees

    It is well known that Max-Weight scheduling provides queue stability whenever this is possible. However, Max-Weight scheduling requires the complete Channel State Information (CSI) to make the best transmission decision at every time slot. The common assumption in this line of research assumes that the network controller has full CSI...

    Provided By Sabanci Group

  • White Papers // Sep 2012

    Gaussian Process Learning for Opportunistic Scheduling in Wireless Networks

    It is well known that opportunistic scheduling algorithms are throughput optimal under dynamic channel and network conditions. However, these algorithms achieve a hypothetical rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot....

    Provided By Sabanci Group

  • White Papers // Mar 2012

    Max-Weight Scheduling Using Hierarchical Modulation

    The authors investigate the network stability problem when two users are scheduled simultaneously. The key idea is to simultaneously transmit to more than one users experiencing different channel conditions by employing hierarchical modulation. For two-user scheduling problem, they develop a throughput optimal algorithm which can stabilize the network whenever traffic...

    Provided By Sabanci Group

  • White Papers // Feb 2012

    Smart Scheduling and Feedback Allocation Over Non-Stationary Wireless Channels

    It is well known that opportunistic scheduling algorithms are throughput optimal under dynamic channel and network conditions. However, these algorithms achieve a hypothetical rate region which does not take into account the overhead associated with channel probing and feedback required to obtain the full channel state information at every slot....

    Provided By Sabanci Group