Seoul metropolitan government

Displaying 1-40 of 54 results

  • White Papers // May 2014

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying more memory bandwidth among concurrently executing tasks occurs. In this paper, the authors have presented Bubble...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2014

    Assistive Circuit for Lowering Minimum Operating Voltage and Balancing Read/Write Margins in an SRAM Array

    There is a trade-off between read stability and writability under a full/half-select condition in Static Random Access Memory (SRAM). Another trade-off in the minimum operating voltage between the read and write operation also exists. A new peripheral circuit for SRAM arrays, called a variation sensor, is demonstrated here to balance...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2014

    High Quality Vertical Silicon Channel by Laser-Induced Epitaxial Growth for Nanoscale Memory Integration

    As a versatile processing method for nanoscale memory integration, laser-induced epitaxial growth is proposed for the fabrication of Vertical Si Channel (VSC) transistor. The fabricated VSC transistor with 80 nm gate length and 130 nm pillar diameter exhibited field effect mobility of 300 cm2/Vs, which guarantees \"Device quality\". In addition,...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2014

    Evaluation of Various Node Configurations for Fine-Grain Multithreading on Stock Processors

    It becomes more and more interesting to construct multithreaded parallel machines using stock processors due to their high performance/price ratio. However, no quantitative analysis has been reported on the effectiveness of various node configurations and its impact on the overall performance. In this paper, the authors explore three different node...

    Provided By Seoul metropolitan government

  • White Papers // Oct 2013

    An Approach to Reduce Storage for Homomorphic Computations

    The authors introduce a hybrid homomorphic encryption by combining Public Key Encryption (PKE) and Somewhat Homomorphic Encryption (SHE) to reduce storage for most applications of somewhat or Fully Homomorphic Encryption (FHE). In this model, one encrypts messages with a PKE and computes on encrypted data using a SHE or a...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2013

    Analysis of the Rainbow Trade-Off Algorithm Used in Practice

    Cryptanalytic time memory trade-off is a tool for inverting one-way functions, and the rainbow table method, the best-known tradeoff algorithm, is widely used to recover passwords. Even though extensive research has been performed on the rainbow trade-off, the algorithm actually used in practice differs from the well-studied original algorithm. This...

    Provided By Seoul metropolitan government

  • White Papers // Aug 2013

    Private Over-Threshold Aggregation Protocols Over Distributed Databases

    In this paper, the authors revisit the private over-threshold data aggregation problem, and formally define the problem's security requirements as both data and user privacy goals. To achieve both goals, and to strike a balance between efficiency and functionality, they devise a novel cryptographic construction that comes in two schemes;...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2013

    RAIN: A Reliable Wireless Network Architecture

    Despite years of research and development, pioneering deployments of multihop wireless networks have not proven successful. The performance of routing and transport is often unstable due to contention-induced packet losses, especially when the network is large and the offered load is high. In this paper, the authors propose RAIN, a...

    Provided By Seoul metropolitan government

  • White Papers // May 2013

    Patterns of Innovation in SAAS Networks: Trend Analysis of Node Centralities

    As software vendors provide their Software as a Service (SaaS) and allow users to access the software functions via open interfaces, the innovation style has shifted from local innovation of a software user, to collective innovation of an entire system of users and software. This new innovation trend directs the...

    Provided By Seoul metropolitan government

  • White Papers // May 2013

    Page Mapping Scheme to Support Secure File Deletion for NAND-based Block Devices

    As the amount of digitized private data grows, security requirements such as irrecoverable file deletion are gaining importance. Existing secure file deletion tools, which repeatedly over-write the contents to be deleted, do not work properly with NAND-based block devices because these devices perform out-of-place updates on over-write requests, retaining the...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2013

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    With the expansion of wireless sensor networks, the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of...

    Provided By Seoul metropolitan government

  • White Papers // Nov 2012

    Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff

    Time memory tradeoff algorithms are tools for inverting one-way functions, and they are often used to recover passwords from unsalted password hashes. There are many publicly known tradeoff algorithms, and the rainbow tradeoff is widely believed to be the best algorithm. This paper provides an accurate complexity analysis of the...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    SAN Optimization for High Performance Storage with RDMA Data Transfer

    Today's server environments consist of many machines constructing clusters for distributed computing system or Storage Area Networks (SAN) for effectively processing or saving enormous data. In these kinds of server environments, backend-storages are usually the bottleneck of the overall system. But it is not enough to simply replace the devices...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    D-Fi: A Diversity-Aware Wi-Fi Using An OFDM-based Bloom Filter

    To exploit frequency diversity in Wi-Fi channels, instantaneous channel quality must be estimated. However, there is a trade-off between acquiring channel quality information and improving protocol efficiency because channel estimation consumes time and frequency resource that ideally should be used for data transfer. In this paper, the authors present D-Fi...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Low-latency Memory-mapped I/O for Data-intensive Applications on Fast Storage Devices

    These days, along with read/write, mmap is used to file I/O in data-intensive applications as an alternative method of I/O on emerging low-latency device such as flash-based SSD. Although utilizing memory-mapped file I/O have many advantages, it does not produce much benefit when combined with large data and fast storage...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Multi-Objective Mapping Optimization via Problem Decomposition for Many-Core Systems

    Due to the trend of many-core systems for dynamic multimedia applications, the problem size of mapping optimization gets bigger than ever making conventional metaheuristics no longer effective. Thus, in this paper, the authors propose a problem decomposition approach for large scale optimization problems. They basically follow the divide-and-conquer concept, in...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms

    Analyses of three major time memory tradeoff algorithms were presented by a recent paper in such a way that facilitates comparisons of the algorithm performances at arbitrary choices of the algorithm parameters. The algorithms considered there were the classical Hellman tradeoff and the non-perfect table versions of the distinguished point...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions

    A large portion of radio energy in smartphones is wasted during a special waiting period, known as the tail time, after a transmission is completed. In order to save the wasted energy during the tail time, it is important to accurately predict whether a subsequent transmission will occur in the...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Invertible Polynomial Representation for Private Set Operations

    Privacy-Preserving Set Operations (PPSO) are to compute set operations of participants' dataset without revealing any information other than the result. There has been many proposals to construct PPSO protocols with various techniques such as general MPC, polynomial representations, pseudorandom functions, and blind RSA signatures. While the last two techniques are...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2012

    PMC: Publisher Mobility Support for Mobile Broadcasting in Content Centric Networks

    As the high speed Internet and the smart devices become prevalent, it is expected that the traffic volume of the video conferencing/broadcasting on the mobile devices is increasing explosively. One of the promising solutions for the traffic explosion problem is the Content Centric Networking (CCN), which solves the problem by...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2012

    Scalable Routing for Content Centric Network

    In content centric network, name-based routing may not scale because the number of content names will be orders of magnitude higher than IP prefixes. To address the scalability problem, the authors propose routing schemes that exploits the autonomous system numbers and domain names. For intra-domain routing, routers use the splitted...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    Privacy-Aware Communication for Smartphones Using Vibration

    The authors propose a novel communication method between smart devices using a built-in vibrator and accelerometer. The proposed approach is ideal for low-rate private communication and its communication medium is an object on which smart devices are placed, such as tables and desks. When more than two smart devices are...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    PTL: PCM Translation Layer

    PCM (Phase Change Memory) has been used as NOR flash replacement in embedded systems, and poses interesting system-level challenges for transparent exploitation of these memory structures by embedded systems software. The authors propose such a system-level transparent framework, called PTL (PCM Translation Layer), to efficiently manage PCM. PTL's translation layer...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    A Public Shuffle without Private Permutations

    In TCC 2007, Adida and Wikstrom proposed a novel approach to shuffle, called a public shuffle, in which a shuffler can perform shuffle publicly without needing information kept secret. Their scheme uses an encrypted permutation matrix to shuffle ciphertexts publicly. This approach significantly reduces the cost of constructing a mix-net...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Control Plane Framework Emergence and Its Deployment Cost Estimation

    Shortcomings of transport network technologies were the main driver behind strong efforts of standardization organizations to develop control plane frameworks since 2001. Despite the findings of previous studies that the control plane framework deployment will lead to a 50 percent decrease in OPEX and despite the fact that transport providers...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Selective and Limited Feedback Method for Network MIMO Systems

    In this paper, the authors propose an efficient channel feedback algorithm for network MIMO systems that selects the proper number of channels for feedback among the whole channels observed by each user and allocates unequal number of feedback bits to the users. The proposed algorithm considers a limited feedback scenario,...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Green Multimedia Communications Over Internet of Things

    In this paper, the authors consider a power-aware multimedia communications over Internet of Things (IoT). Specifically, they consider a generic IoT scenario where a multimedia server provides heterogeneous applications without knowing the application's Quality of Experience (QoE) model and playout period. Their objective aims at dynamically adjusting the power allocation...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2012

    WAVE: Popularity-Based and Collaborative In-Network Caching for Content-Oriented Networks

    In content-oriented networking, content files are typically cached in network nodes, and hence how to cache content files is crucial for the efficient content delivery and cache storage utilization. In this paper, the authors propose a content caching scheme, WAVE, in which the number of chunks to be cached is...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2012

    Shortcut-JFS: A Write Efficient Journaling File System for Phase Change Memory

    Journaling file systems are widely used in modern computer systems as it provides high reliability with reasonable performance. However, existing journaling file systems are not efficient for emerging PCM (Phase Change Memory) storage. Specifically, a large amount of write operations performed by journaling incur serious performance degradation of PCM storage...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2012

    Eigenmode BER Based MU-MIMO Scheduling for Rate Maximization With Linear Precoding and Power Allocation

    In conventional multi-user MIMO systems, Shannon capacity has been used mostly as the performance measure for user selection. In this paper, the authors propose two new MIMO scheduling techniques based on BER instead of capacity as the performance measure for rate maximization with target BER. One of the key contributions...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2012

    Lifetime Management of Flash-Based SSDs Using Recovery-Aware Dynamic Throttling

    NAND flash-based Solid-State Drives (SSDs) are increasingly popular in enterprise server systems because of their advantages over hard disk drives such as higher performance and lower power consumption. However, the limited and unpredictable lifetime of SSDs remains to be a serious obstacle to wider adoption of SSDs in enterprise systems....

    Provided By Seoul metropolitan government

  • White Papers // Dec 2011

    A Triple-Band Transceiver Module for 2.3/2.5/3.5 GHz Mobile WiMAX Applications

    A triple-band transceiver module for 2.3/2.5/3.5 GHz mobile WiMAX, IEEE 802.16e, applications is introduced. The suggested transceiver module consists of RFIC, reconfigurable/multi-resonance MIMO antenna, embedded PCB, mobile WiMAX base band, memory and channel selection front-end module. The RFIC is fabricated in 0.13?m RF CMOS process and has 3.5 dB Noise...

    Provided By Seoul metropolitan government

  • White Papers // Aug 2011

    Traffic Classification Through Joint Distributions of Packet-Level Statistics

    Interest in traffic classification, in both industry and academia, has dramatically grown in the past few years. Research is devoting great efforts to statistical approaches using robust features. In this paper, the authors propose a classification approach based on the joint distribution of Packet Size (PS) and Inter-Packet Time (IPT)...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2011

    Design Approaches of Web Application with Efficient Performance in JAVA

    System implementation using Client/Server based on Web by spreading fast is becoming common. This kind of Web environment introduction solved many problems such as the dependency and distribution difficulty, high cost, etc. Web application and Web Service technology has more closely and effectively developed to maximize the positive point of...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2011

    Charge Migration Efficiency Optimization in Hybrid Electrical Energy Storage (HEES) Systems

    Electrical energy is high-quality form of energy, and thus it is beneficial to store the excessive electric energy in the Electrical Energy Storage (EES) rather than converting into a different type of energy. Like memory devices, no single type of EES element can fulfill all the desirable requirements. Despite active...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2011

    Optimized Frame Structure for Interactive Light Field Streaming With Cooperative Caching

    Light field is a large set of spatially correlated images of the same static scene captured using a 2D array of closely spaced cameras. Interactive light field streaming is the application where a client continuously requests successive light field images along a view trajectory of her choosing, and in response...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2011

    IXOR-Intelligent XOR Using Holding-#31; Strategy in Ad Hoc Networks

    Network coding is a promising technology that increases the system throughput via reducing the number of transmissions for the packets delivered from the source node to the destination node in the saturated traffic scenario. Nevertheless, some packets can suffer from the metric of end-to-end delay. Since it takes the queuing...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2011

    Scan: Scalable Content Routing for Content-Aware Networking

    Since Internet routers are not aware of the contents being forwarded, the same content file is often delivered multiple times inefficiently. Similarly, users cannot exploit a nearby copy of the content of interest unless the content file is serviced by costly content delivery networks. Prior studies on the content-aware routing...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2010

    Mitigation of Inter-Femtocell Interference With Adaptive Fractional Frequency Reuse

    In this paper, the authors consider the use of Fractional Frequency Reuse (FFR) to mitigate inter-femtocell interference in multi-femtocell environments. The use of universal frequency reuse can be said optimum in terms of the ergodic system spectral efficiency. However, it may cause inter-femtocell interference near the cell edge, making it...

    Provided By Seoul metropolitan government

  • White Papers // Dec 2009

    Tutorial: Identity Management Systems and Secured Access Control

    Identity management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations; Today's computing environment involves a variety of...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    SAN Optimization for High Performance Storage with RDMA Data Transfer

    Today's server environments consist of many machines constructing clusters for distributed computing system or Storage Area Networks (SAN) for effectively processing or saving enormous data. In these kinds of server environments, backend-storages are usually the bottleneck of the overall system. But it is not enough to simply replace the devices...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions

    A large portion of radio energy in smartphones is wasted during a special waiting period, known as the tail time, after a transmission is completed. In order to save the wasted energy during the tail time, it is important to accurately predict whether a subsequent transmission will occur in the...

    Provided By Seoul metropolitan government

  • White Papers // Nov 2012

    Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff

    Time memory tradeoff algorithms are tools for inverting one-way functions, and they are often used to recover passwords from unsalted password hashes. There are many publicly known tradeoff algorithms, and the rainbow tradeoff is widely believed to be the best algorithm. This paper provides an accurate complexity analysis of the...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms

    Analyses of three major time memory tradeoff algorithms were presented by a recent paper in such a way that facilitates comparisons of the algorithm performances at arbitrary choices of the algorithm parameters. The algorithms considered there were the classical Hellman tradeoff and the non-perfect table versions of the distinguished point...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Invertible Polynomial Representation for Private Set Operations

    Privacy-Preserving Set Operations (PPSO) are to compute set operations of participants' dataset without revealing any information other than the result. There has been many proposals to construct PPSO protocols with various techniques such as general MPC, polynomial representations, pseudorandom functions, and blind RSA signatures. While the last two techniques are...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2013

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    With the expansion of wireless sensor networks, the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    A Public Shuffle without Private Permutations

    In TCC 2007, Adida and Wikstrom proposed a novel approach to shuffle, called a public shuffle, in which a shuffler can perform shuffle publicly without needing information kept secret. Their scheme uses an encrypted permutation matrix to shuffle ciphertexts publicly. This approach significantly reduces the cost of constructing a mix-net...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Control Plane Framework Emergence and Its Deployment Cost Estimation

    Shortcomings of transport network technologies were the main driver behind strong efforts of standardization organizations to develop control plane frameworks since 2001. Despite the findings of previous studies that the control plane framework deployment will lead to a 50 percent decrease in OPEX and despite the fact that transport providers...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2009

    Buffer Caching Algorithms for Storage Class RAMs

    Due to recent advances in semiconductor technologies, Storage Class RAMs (SCRAMs) such as FRAM and PRAM are emerging rapidly. Since SCRAMs are nonvolatile and byte-accessible, there are attempts to use these SCRAMs as part of nonvolatile buffer caches. A nonvolatile buffer cache provides improved consistency of file systems by absorbing...

    Provided By Seoul metropolitan government

  • White Papers // Oct 2009

    Revenue Maximizing Game and its Extension for Multicell Wireless Access Networks

    As the number of wireless service providers increases, competition among them is becoming stronger in Wireless Access Networks. On the other hand, users actively change their behaviors toward the networks to get more network resources such as service time, bandwidth, capacity, etc. That is, each user will actively choose a...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2009

    A Fast RSSI Using Novel Logarithmic Gain Amplifiers for Wireless Communication

    This paper presents a fast Received Signal Strength Indicator (RSSI) circuit for wireless communication application. The proposed circuit is developed using power detectors and an analog-to-digital converter to achieve a fast settling time. The power detector is consisted of a novel logarithmic Variable Gain Amplifier (VGA), a peak detector, and...

    Provided By Seoul metropolitan government

  • White Papers // Dec 2011

    A Triple-Band Transceiver Module for 2.3/2.5/3.5 GHz Mobile WiMAX Applications

    A triple-band transceiver module for 2.3/2.5/3.5 GHz mobile WiMAX, IEEE 802.16e, applications is introduced. The suggested transceiver module consists of RFIC, reconfigurable/multi-resonance MIMO antenna, embedded PCB, mobile WiMAX base band, memory and channel selection front-end module. The RFIC is fabricated in 0.13?m RF CMOS process and has 3.5 dB Noise...

    Provided By Seoul metropolitan government

  • White Papers // Oct 2009

    DAKS: An Efficient Batch Rekeying Scheme for Departure-Aware Multicast Services

    To achieve both access control and service availability, many researchers have attempted to design an efficient key management system for secure multicast services. Periodic and Batch Rekeying (PBR) is well known for its significant improvement in rekeying efficiency for large-scale and highly dynamic groups at the cost of relaxing some...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2012

    WAVE: Popularity-Based and Collaborative In-Network Caching for Content-Oriented Networks

    In content-oriented networking, content files are typically cached in network nodes, and hence how to cache content files is crucial for the efficient content delivery and cache storage utilization. In this paper, the authors propose a content caching scheme, WAVE, in which the number of chunks to be cached is...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2012

    Scalable Routing for Content Centric Network

    In content centric network, name-based routing may not scale because the number of content names will be orders of magnitude higher than IP prefixes. To address the scalability problem, the authors propose routing schemes that exploits the autonomous system numbers and domain names. For intra-domain routing, routers use the splitted...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2012

    PMC: Publisher Mobility Support for Mobile Broadcasting in Content Centric Networks

    As the high speed Internet and the smart devices become prevalent, it is expected that the traffic volume of the video conferencing/broadcasting on the mobile devices is increasing explosively. One of the promising solutions for the traffic explosion problem is the Content Centric Networking (CCN), which solves the problem by...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2011

    Optimized Frame Structure for Interactive Light Field Streaming With Cooperative Caching

    Light field is a large set of spatially correlated images of the same static scene captured using a 2D array of closely spaced cameras. Interactive light field streaming is the application where a client continuously requests successive light field images along a view trajectory of her choosing, and in response...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2011

    Scan: Scalable Content Routing for Content-Aware Networking

    Since Internet routers are not aware of the contents being forwarded, the same content file is often delivered multiple times inefficiently. Similarly, users cannot exploit a nearby copy of the content of interest unless the content file is serviced by costly content delivery networks. Prior studies on the content-aware routing...

    Provided By Seoul metropolitan government

  • White Papers // Aug 2011

    Traffic Classification Through Joint Distributions of Packet-Level Statistics

    Interest in traffic classification, in both industry and academia, has dramatically grown in the past few years. Research is devoting great efforts to statistical approaches using robust features. In this paper, the authors propose a classification approach based on the joint distribution of Packet Size (PS) and Inter-Packet Time (IPT)...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2011

    IXOR-Intelligent XOR Using Holding-#31; Strategy in Ad Hoc Networks

    Network coding is a promising technology that increases the system throughput via reducing the number of transmissions for the packets delivered from the source node to the destination node in the saturated traffic scenario. Nevertheless, some packets can suffer from the metric of end-to-end delay. Since it takes the queuing...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    D-Fi: A Diversity-Aware Wi-Fi Using An OFDM-based Bloom Filter

    To exploit frequency diversity in Wi-Fi channels, instantaneous channel quality must be estimated. However, there is a trade-off between acquiring channel quality information and improving protocol efficiency because channel estimation consumes time and frequency resource that ideally should be used for data transfer. In this paper, the authors present D-Fi...

    Provided By Seoul metropolitan government

  • White Papers // Oct 2009

    Secure Network Coding for a P2P System

    Network coding is a data transmission technique which allows intermediate nodes in a network to re-code data in transit. In contrast to traditional network communication where a node repeats incoming data to its outgoing channel without modifying the payload, a node implementing network coding not only repeats but also alters...

    Provided By Seoul metropolitan government

  • White Papers // Aug 2009

    Massively Parallel Implementation of Cyclic LDPC Codes on a General Purpose Graphics Processing Unit

    Simulation of Low-Density Parity-Check (LDPC) codes frequently takes several days, thus the use of general purpose graphics processing units (GPGPUs) is very promising. However, GPGPUs are designed for compute intensive applications, and they are not optimized for data caching or control management. In LDPC decoding, the parity check matrix H...

    Provided By Seoul metropolitan government

  • White Papers // May 2013

    Patterns of Innovation in SAAS Networks: Trend Analysis of Node Centralities

    As software vendors provide their Software as a Service (SaaS) and allow users to access the software functions via open interfaces, the innovation style has shifted from local innovation of a software user, to collective innovation of an entire system of users and software. This new innovation trend directs the...

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    Privacy-Aware Communication for Smartphones Using Vibration

    The authors propose a novel communication method between smart devices using a built-in vibrator and accelerometer. The proposed approach is ideal for low-rate private communication and its communication medium is an object on which smart devices are placed, such as tables and desks. When more than two smart devices are...

    Provided By Seoul metropolitan government

  • White Papers // Feb 2010

    Mitigation of Inter-Femtocell Interference With Adaptive Fractional Frequency Reuse

    In this paper, the authors consider the use of Fractional Frequency Reuse (FFR) to mitigate inter-femtocell interference in multi-femtocell environments. The use of universal frequency reuse can be said optimum in terms of the ergodic system spectral efficiency. However, it may cause inter-femtocell interference near the cell edge, making it...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Selective and Limited Feedback Method for Network MIMO Systems

    In this paper, the authors propose an efficient channel feedback algorithm for network MIMO systems that selects the proper number of channels for feedback among the whole channels observed by each user and allocates unequal number of feedback bits to the users. The proposed algorithm considers a limited feedback scenario,...

    Provided By Seoul metropolitan government

  • White Papers // May 2012

    Green Multimedia Communications Over Internet of Things

    In this paper, the authors consider a power-aware multimedia communications over Internet of Things (IoT). Specifically, they consider a generic IoT scenario where a multimedia server provides heterogeneous applications without knowing the application's Quality of Experience (QoE) model and playout period. Their objective aims at dynamically adjusting the power allocation...

    Provided By Seoul metropolitan government

  • White Papers // Mar 2012

    Eigenmode BER Based MU-MIMO Scheduling for Rate Maximization With Linear Precoding and Power Allocation

    In conventional multi-user MIMO systems, Shannon capacity has been used mostly as the performance measure for user selection. In this paper, the authors propose two new MIMO scheduling techniques based on BER instead of capacity as the performance measure for rate maximization with target BER. One of the key contributions...

    Provided By Seoul metropolitan government

  • White Papers // Jul 2011

    Design Approaches of Web Application with Efficient Performance in JAVA

    System implementation using Client/Server based on Web by spreading fast is becoming common. This kind of Web environment introduction solved many problems such as the dependency and distribution difficulty, high cost, etc. Web application and Web Service technology has more closely and effectively developed to maximize the positive point of...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2014

    Assistive Circuit for Lowering Minimum Operating Voltage and Balancing Read/Write Margins in an SRAM Array

    There is a trade-off between read stability and writability under a full/half-select condition in Static Random Access Memory (SRAM). Another trade-off in the minimum operating voltage between the read and write operation also exists. A new peripheral circuit for SRAM arrays, called a variation sensor, is demonstrated here to balance...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2014

    High Quality Vertical Silicon Channel by Laser-Induced Epitaxial Growth for Nanoscale Memory Integration

    As a versatile processing method for nanoscale memory integration, laser-induced epitaxial growth is proposed for the fabrication of Vertical Si Channel (VSC) transistor. The fabricated VSC transistor with 80 nm gate length and 130 nm pillar diameter exhibited field effect mobility of 300 cm2/Vs, which guarantees \"Device quality\". In addition,...

    Provided By Seoul metropolitan government

  • White Papers // May 2014

    Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management

    Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying more memory bandwidth among concurrently executing tasks occurs. In this paper, the authors have presented Bubble...

    Provided By Seoul metropolitan government

  • White Papers // Dec 2009

    Tutorial: Identity Management Systems and Secured Access Control

    Identity management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations; Today's computing environment involves a variety of...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2013

    Analysis of the Rainbow Trade-Off Algorithm Used in Practice

    Cryptanalytic time memory trade-off is a tool for inverting one-way functions, and the rainbow table method, the best-known tradeoff algorithm, is widely used to recover passwords. Even though extensive research has been performed on the rainbow trade-off, the algorithm actually used in practice differs from the well-studied original algorithm. This...

    Provided By Seoul metropolitan government

  • White Papers // Apr 2009

    On-Chip Communication Architecture Exploration for Processor-Pool-Based MPSoC

    MPSoC is evolving towards Processor-Pool (PP)-based architectures, which employ hierarchical on-chip network for inter- and intra-PP communication. Since the design space of PP-based MPSoC is extremely wide, application-specific optimization of on-chip communication is a nontrivial task. This paper presents a systematic methodology for on-chip network design of PP-based MPSoC. The...

    Provided By Seoul metropolitan government

  • White Papers // Jan 2012

    Lifetime Management of Flash-Based SSDs Using Recovery-Aware Dynamic Throttling

    NAND flash-based Solid-State Drives (SSDs) are increasingly popular in enterprise server systems because of their advantages over hard disk drives such as higher performance and lower power consumption. However, the limited and unpredictable lifetime of SSDs remains to be a serious obstacle to wider adoption of SSDs in enterprise systems....

    Provided By Seoul metropolitan government

  • White Papers // Jun 2012

    PTL: PCM Translation Layer

    PCM (Phase Change Memory) has been used as NOR flash replacement in embedded systems, and poses interesting system-level challenges for transparent exploitation of these memory structures by embedded systems software. The authors propose such a system-level transparent framework, called PTL (PCM Translation Layer), to efficiently manage PCM. PTL's translation layer...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Low-latency Memory-mapped I/O for Data-intensive Applications on Fast Storage Devices

    These days, along with read/write, mmap is used to file I/O in data-intensive applications as an alternative method of I/O on emerging low-latency device such as flash-based SSD. Although utilizing memory-mapped file I/O have many advantages, it does not produce much benefit when combined with large data and fast storage...

    Provided By Seoul metropolitan government

  • White Papers // Sep 2012

    Multi-Objective Mapping Optimization via Problem Decomposition for Many-Core Systems

    Due to the trend of many-core systems for dynamic multimedia applications, the problem size of mapping optimization gets bigger than ever making conventional metaheuristics no longer effective. Thus, in this paper, the authors propose a problem decomposition approach for large scale optimization problems. They basically follow the divide-and-conquer concept, in...

    Provided By Seoul metropolitan government