Seoul National University

Displaying 1-40 of 51 results

  • White Papers // Mar 2012

    Accelerating the Final Exponentiation in the Computation of the Tate Pairings

    Non-degenerate bilinear pairings have played a key role in public-key cryptography since they have been used to construct identity-based encryption schemes and one-round three-way key exchange protocols. Because the performance of pairing-based cryptosystems relies heavily on the efficiency of pairing computation, the development of efficient pairings has been an important...

    Provided By Seoul National University

  • White Papers // Jun 2011

    Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    The traditional Radio Frequency IDentification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of...

    Provided By Seoul National University

  • White Papers // May 2011

    Enabling Consolidation and Scaling Down to Provide Power Management for Cloud Computing

    Consolidation and scaling down can be used as enabling techniques to effectively manage power for distributed systems. To support power management for cloud computing with consolidation and scaling down, it is necessary to study the effects of mixed workloads and the consolidation on the performance of application in the virtual...

    Provided By Seoul National University

  • White Papers // Apr 2011

    An Efficient Hybrid Power Control Algorithm for Capacity Improvement of CDMA-Based Fixed Wireless Applications

    In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in...

    Provided By Seoul National University

  • White Papers // Feb 2011

    A Real-Time Localization System Using RFID for Visually Impaired

    Gadgets helping the disabled, especially blind that are in least accessibility of information, use acoustic methods that can cause stress to ear and infringe user's privacy. Even if some project uses embedded Radio Frequency IDentification (RFID) into the sidewalk for blind's free walking, the tag memory design is not specified...

    Provided By Seoul National University

  • White Papers // Feb 2011

    Implementation of Content-Oriented Networking Architecture (CONA): A Focus on DDoS Countermeasure

    In this paper the authors introduce a Content-oriented Networking Architecture (CONA) and describe its implementation on the NetFPGA-OpenFlow platform. CONA seeks to substantiate a content-centric communication model to address accountability. In CONA, an access router is extended to figure out what contents are requested, and hence is called an agent....

    Provided By Seoul National University

  • White Papers // Jan 2011

    Fully Secure Anonymous Hierarchical Identity-Based Encryption With Constant Size Ciphertexts

    Efficient and privacy-preserving constructions for search functionality on encrypted data are important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions, such as ID-based searchable encryption, temporary searchable encryption, and anonymous forward secure...

    Provided By Seoul National University

  • White Papers // Jan 2011

    Cost and Benefit of the SLA Mapping Approach for Defining Standardized Goods in Cloud Computing Markets

    Due to the large variety in computing resources and, consequently, the large number of different types of Service Level Agreements (SLAs), any market for computing resources faces the potential problem of a low market liquidity. To counteract this problem, offering a set of standardized computing resources is appropriate. Each of...

    Provided By Seoul National University

  • White Papers // Dec 2010

    A Cross-Layer Sleep and Rate Adaptation Mechanism for Slotted ALOHA Wireless Sensor Networks

    The spread use of Wireless Sensor Networks (WSNs) in a variety of fields, ranging from the military to environmental protection, has drawn the attention of researchers to this type of networks. Despite their use in interesting applications, such as healthcare and surveillance, many shortcomings derived from their small size and...

    Provided By Seoul National University

  • White Papers // Dec 2010

    Balanced Itinerary Planning for Multiple Mobile Agents In Wireless Sensor Networks

    In this paper, the authors consider the use of multiple mobile software agents to perform different tasks in Wireless Sensor Networks (WSNs). To this regard, determining the number of mobile agents in the WSN remains an open issue in solving Multi-agent Itinerary Planning (MIP) problem. The authors propose a novel...

    Provided By Seoul National University

  • White Papers // Dec 2010

    Multi-Agent Itinerary Planning for Sensor Networks

    Agent-based data collection and aggregation have been proved to be efficient in Wireless Sensor Networks (WSNs). While most of existing work focus on designing various Single agent based Itinerary Planning (SIP) algorithms by considering energy-efficiency and/or aggregation efficiency, this paper identifies the drawbacks of this approach in large scale network,...

    Provided By Seoul National University

  • White Papers // Dec 2010

    Directional Source Grouping for Multi-Agent Itinerary Planning in Wireless Sensor Networks

    As software entities that migrate among nodes, Mobile Agents (MAs) are able to deliver and execute codes for flexible application re-tasking, local processing, and collaborative signal and information processing. In contrast to the conventional wireless sensor network operations based on the client-server computing model, recent research has shown the efficiency...

    Provided By Seoul National University

  • White Papers // Nov 2010

    How Can an ISP Merge With a CDN?

    As delivering contents has become the dominant usage of Internet, the efficient content distribution is being one of the hottest research areas in network community. In future network, it is anticipated that network entities such as routers will be equipped with in-network storage due to the trend of ever-decreasing storage...

    Provided By Seoul National University

  • White Papers // Oct 2010

    Multi-Party Privacy-Preserving Set Intersection With Quasi-Linear Complexity

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such task could have multiple potential applications, in commerce, health-care, and security. However, all currently known secure set intersection protocols for n >...

    Provided By Seoul National University

  • White Papers // Aug 2010

    Type Classes as Objects and Implicits

    Type classes were originally developed in Haskell as a disciplined alternative to ad-hoc polymorphism. Type classes have been shown to provide a type-safe solution to important challenges in software engineering and programming languages such as, for example, retroactive extension of programs. They are also recognized as a good mechanism for...

    Provided By Seoul National University

  • White Papers // Aug 2010

    A Smart RFID System

    Radio Frequency IDentification (RFID) is a kind of electronic identification technology that is becoming widely deployed. Compared to traditional RFID system, tags in the proposed smart RFID system would store not only the fixed ID information but also some information which is "Active" and encoded in the form of mobile...

    Provided By Seoul National University

  • White Papers // Jul 2010

    Dynamic MDS Matrices for Substantial Cryptographic Strength

    Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers. In block ciphers diffusion is achieved by the use of Maximum Distance Separable (MDS) matrices....

    Provided By Seoul National University

  • White Papers // Jun 2010

    Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks

    As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, the authors carry out empirical traffic measurement of BitTorrent service in various settings (static, bus and subway) in commercial WiMAX networks. To this end, they analyze...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Decentralized and Autonomous Content Overlay Networking (DACON) With WiFi Access Points

    Accessing contents from mobile devices becomes more and more proliferated and hence the need for the content distribution in the pervasive environment is growing. However, distributing contents in such environments taxes wireless network operators substantially. To provide the content distribution service in a reasonable cost, the authors pay attention to...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Host-Oblivious Security for Content-Based Networks

    Network-level security systems rely significantly on network operations. This reliance has led to conventional network-level security systems based on a host-centric architecture because the network operations themselves are based on hosts. However, host-dependent network security schemes are no longer applicable in content-based networks. In this paper, a host-oblivious network security...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Coordinated Transmission of Interference Mitigation and Power Allocation in Two-User Two-Hop MIMO Relay Systems

    This paper considers coordinated transmission for interference mitigation and power allocation in a correlated two-user two-hop Multi-Input Multi-Output (MIMO) relay system. The proposed transmission scheme utilizes statistical Channel State Information (CSI) (e.g., transmit correlation) to minimize the Co-Channel Interference (CCI) caused by the relay. To this end, it is shown...

    Provided By Seoul National University

  • White Papers // Apr 2010

    GA-MIP: Genetic Algorithm Based Multiple Mobile Agents Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Seoul National University

  • White Papers // Apr 2010

    How to Deal With Bot Scum in MMORPGs?

    Nowadays, bots are becoming a critical issue for the online gaming world. Bots give unfair advantages, and are then considered as cheating and undesirable on game servers. Currently, CAPTCHA and human controls are the most commonly chosen strategies to catch bots. However, these methods are intrusive and complicated have proven...

    Provided By Seoul National University

  • White Papers // Mar 2010

    The Effects Of Current Financial Crises On Trade Balances

    Global financial crisis made a huge effect on Korea's trade balance. First, global financial crisis caused the recession of object economy and this recession caused decreasing of Korea's exports. Second, high exchange rate had a positive effect on Korea's exports and negative one on imports. So, in spite of the...

    Provided By Seoul National University

  • White Papers // Mar 2010

    A Content-Oriented Networking Approach for Security and Accountability

    Recently, there are burgeoning efforts to redesign the Internet architecture to solve many problems, to name a few, security, mobility, routing scalability, accountability, etc. One of the noticeable approaches is the content-oriented networking as opposed to the original host-based (or address-based) Internet design. The rationale behind the content-oriented network designs...

    Provided By Seoul National University

  • White Papers // Feb 2010

    An Analysis of User Dynamics in P2P Live Streaming Services

    Peer-to-Peer (P2P) live streaming services are getting more popular as the average link capacity in the Internet becomes greater for end hosts. In order to provide a high quality P2P live streaming service, it is essential to handle user dynamics effectively to mitigate streaming disruptions caused by user churn. The...

    Provided By Seoul National University

  • White Papers // Feb 2010

    Idle Mode for Deep Power Save in IEEE 802.11 WLANs

    Along with the wide acceptance of IEEE 802.11 Wireless Local Area Network (WLAN), new applications such as Internet Protocol (IP) telephony over WLAN are fast emerging today. For battery-powered IP phone devices, the life time extension is a key concern for the market acceptance while today's 802.11 is not optimized...

    Provided By Seoul National University

  • White Papers // Feb 2010

    S-ARQ: A New Truncated ARQ for IP-Based Wireless Network

    Automatic Repeat reQuest (ARQ) is a very effective technique against transmission error at the Medium Access Control (MAC) layer. An erroneous MAC Protocol Data Unit (MPDU) can be typically retransmitted within a given limit. In order to improve the IP-level performance, which directly affects the user-perceived Quality-of-Service (QoS), the authors...

    Provided By Seoul National University

  • White Papers // Dec 2009

    Performance Metrics Analysis of Torus Embedded Hypercube Interconnection Network

    The interconnection network is an important component in a parallel computer. A good interconnection network is expected to have least number of links, topological network cost and more reliable. The interconnection network must be able to scale up with a few building blocks and with minimum redesign. The hypercube is...

    Provided By Seoul National University

  • White Papers // Nov 2009

    Energy-Optimal Dynamic Thermal Management For Green Computing

    Existing thermal management systems for microprocessors assume that the thermal resistance of the heat-sink is constant and that the objective of the cooling system is simply to avoid thermal emergencies. But in fact the thermal resistance of the usual forced-convection heat-sink is inversely proportional to the fan speed, and a...

    Provided By Seoul National University

  • White Papers // Oct 2009

    Angle Gap (AG) Based Grouping Algorithm for Multi-Mobile Agents Itinerary Planning in Wireless Sensor Networks

    Compared to the conventional Wireless Sensor Networks (WSNs), Mobile Agent (MA) systems provide new capabilities for energy-efficient data dissemination by flexibly planning its itinerary for facilitating agent-based data collection and aggregation. Most of the existing work focuses on the itinerary for single MA, however, it is obviously that using Multi-Mobile...

    Provided By Seoul National University

  • White Papers // Oct 2009

    Deriving Invariants by Algorithmic Learning, Decision Procedures, and Predicate Abstraction

    Algorithmic learning has been applied to assumption generation in compositional reasoning. In contrast to traditional techniques, the learning approach does not derive assumptions in an off-line manner. It instead finds assumptions by interacting with a model checker progressively. Since assumptions in compositional reasoning are generally not unique, algorithmic learning can...

    Provided By Seoul National University

  • White Papers // Oct 2009

    Service Differentiation Using Mobile Femtocell Virtualization

    This paper proposes a service differentiation architecture using virtualization of mobile femtocell. Network-prefix Division Multiple Access (NDMA) is proposed to enable mobile devices inside a moving space to access the Internet with different service demands. With the NDMA scheme, the authors' architecture provides multiple virtual mobile networks for diverse services...

    Provided By Seoul National University

  • White Papers // Aug 2009

    Resource-Aware Dynamic Spectrum Pricing for Cognitive Radio Networks

    Sharing of spectrum has been identified as a key requirement in Cognitive Radio Networks (CRNs). The authors address the problem of spectrum sharing with spectrum pricing where the primary user wants to sell the spectrum to the secondary users. By equilibrium pricing scheme, each of the players in the spectrum...

    Provided By Seoul National University

  • White Papers // Aug 2009

    MAC-Aware Routing Metric for 802.11 Wireless Mesh Networks

    It developed a new wireless link quality metric, ECOT (Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is being applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. It takes into...

    Provided By Seoul National University

  • White Papers // Jul 2009

    Performance Comparison of Content-Oriented Networking Alternatives: A Tree Versus a Distributed Hash Table

    While the Internet was designed with host-oriented networking applications, recent Internet statistics show that content-oriented traffic has become more and more dominant. Even though content-oriented networking, which tries to resolve this discordance, has received increasing attention, there have been few comprehensive and quantitative studies on how to realize a content-oriented...

    Provided By Seoul National University

  • White Papers // Jul 2009

    Analytical Modeling of TCP Dynamics in Infrastructure-Based IEEE 802.11 WLANs

    IEEE 802.11Wireless LAN (WLAN) has become the prevailing solution for wireless Internet access while Transport Control Protocol (TCP) is the dominant transport-layer protocol in the Internet. It is known that, in an infrastructure-based WLAN with multiple stations carrying long-lived TCP flows, the number of TCP stations that are actively contending...

    Provided By Seoul National University

  • White Papers // May 2009

    FIRM: Flow-Based Interference-Aware Route Management in Wireless Mesh Networks

    In IEEE 802.11-based wireless mesh networks, routing is crucial in achieving high throughput in face of both interflow and intra-flow interference. Prior work focuses on finding the maximum available bandwidth path when a new flow enters the network. However, few have considered the effect of the new flow on the...

    Provided By Seoul National University

  • White Papers // Apr 2009

    Moderating Effects Of Group Cohesiveness In Competency- Performance Relationships: A Multi-Level Study

    This study examines the moderating effect of group cohesiveness both at the individual and at the group level. In the individual-level study, moderating effect of group cohesiveness was tested with 249 employees from a Korean manufacturing company. Group cohesiveness turned out to have a negative moderating effect on the individual...

    Provided By Seoul National University

  • White Papers // Apr 2009

    Energy Detection Based Spectrum Sensing for Sensing Error Minimization in Cognitive Radio Networks

    In this paper, the authors investigate an optimization of threshold level with energy detection to improve the spectrum sensing performance. Determining threshold level to minimize spectrum sensing error both reduces collision probability with primary user and enhances usage level of vacant spectrum, resulting in improving total spectrum efficiency. However, when...

    Provided By Seoul National University

  • White Papers // Jan 2011

    Cost and Benefit of the SLA Mapping Approach for Defining Standardized Goods in Cloud Computing Markets

    Due to the large variety in computing resources and, consequently, the large number of different types of Service Level Agreements (SLAs), any market for computing resources faces the potential problem of a low market liquidity. To counteract this problem, offering a set of standardized computing resources is appropriate. Each of...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Coordinated Transmission of Interference Mitigation and Power Allocation in Two-User Two-Hop MIMO Relay Systems

    This paper considers coordinated transmission for interference mitigation and power allocation in a correlated two-user two-hop Multi-Input Multi-Output (MIMO) relay system. The proposed transmission scheme utilizes statistical Channel State Information (CSI) (e.g., transmit correlation) to minimize the Co-Channel Interference (CCI) caused by the relay. To this end, it is shown...

    Provided By Seoul National University

  • White Papers // Aug 2010

    Type Classes as Objects and Implicits

    Type classes were originally developed in Haskell as a disciplined alternative to ad-hoc polymorphism. Type classes have been shown to provide a type-safe solution to important challenges in software engineering and programming languages such as, for example, retroactive extension of programs. They are also recognized as a good mechanism for...

    Provided By Seoul National University

  • White Papers // Mar 2012

    Accelerating the Final Exponentiation in the Computation of the Tate Pairings

    Non-degenerate bilinear pairings have played a key role in public-key cryptography since they have been used to construct identity-based encryption schemes and one-round three-way key exchange protocols. Because the performance of pairing-based cryptosystems relies heavily on the efficiency of pairing computation, the development of efficient pairings has been an important...

    Provided By Seoul National University

  • White Papers // Nov 2010

    How Can an ISP Merge With a CDN?

    As delivering contents has become the dominant usage of Internet, the efficient content distribution is being one of the hottest research areas in network community. In future network, it is anticipated that network entities such as routers will be equipped with in-network storage due to the trend of ever-decreasing storage...

    Provided By Seoul National University

  • White Papers // Dec 2010

    A Cross-Layer Sleep and Rate Adaptation Mechanism for Slotted ALOHA Wireless Sensor Networks

    The spread use of Wireless Sensor Networks (WSNs) in a variety of fields, ranging from the military to environmental protection, has drawn the attention of researchers to this type of networks. Despite their use in interesting applications, such as healthcare and surveillance, many shortcomings derived from their small size and...

    Provided By Seoul National University

  • White Papers // Feb 2011

    Implementation of Content-Oriented Networking Architecture (CONA): A Focus on DDoS Countermeasure

    In this paper the authors introduce a Content-oriented Networking Architecture (CONA) and describe its implementation on the NetFPGA-OpenFlow platform. CONA seeks to substantiate a content-centric communication model to address accountability. In CONA, an access router is extended to figure out what contents are requested, and hence is called an agent....

    Provided By Seoul National University

  • White Papers // Jun 2010

    Measurement and Analysis of BitTorrent Traffic in Mobile WiMAX Networks

    As mobile Internet environments are becoming dominant, how to revamp P2P operations for mobile hosts is gaining more and more attention. In this paper, the authors carry out empirical traffic measurement of BitTorrent service in various settings (static, bus and subway) in commercial WiMAX networks. To this end, they analyze...

    Provided By Seoul National University

  • White Papers // Dec 2010

    Balanced Itinerary Planning for Multiple Mobile Agents In Wireless Sensor Networks

    In this paper, the authors consider the use of multiple mobile software agents to perform different tasks in Wireless Sensor Networks (WSNs). To this regard, determining the number of mobile agents in the WSN remains an open issue in solving Multi-agent Itinerary Planning (MIP) problem. The authors propose a novel...

    Provided By Seoul National University

  • White Papers // Aug 2010

    A Smart RFID System

    Radio Frequency IDentification (RFID) is a kind of electronic identification technology that is becoming widely deployed. Compared to traditional RFID system, tags in the proposed smart RFID system would store not only the fixed ID information but also some information which is "Active" and encoded in the form of mobile...

    Provided By Seoul National University

  • White Papers // Apr 2010

    How to Deal With Bot Scum in MMORPGs?

    Nowadays, bots are becoming a critical issue for the online gaming world. Bots give unfair advantages, and are then considered as cheating and undesirable on game servers. Currently, CAPTCHA and human controls are the most commonly chosen strategies to catch bots. However, these methods are intrusive and complicated have proven...

    Provided By Seoul National University

  • White Papers // Feb 2010

    An Analysis of User Dynamics in P2P Live Streaming Services

    Peer-to-Peer (P2P) live streaming services are getting more popular as the average link capacity in the Internet becomes greater for end hosts. In order to provide a high quality P2P live streaming service, it is essential to handle user dynamics effectively to mitigate streaming disruptions caused by user churn. The...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Decentralized and Autonomous Content Overlay Networking (DACON) With WiFi Access Points

    Accessing contents from mobile devices becomes more and more proliferated and hence the need for the content distribution in the pervasive environment is growing. However, distributing contents in such environments taxes wireless network operators substantially. To provide the content distribution service in a reasonable cost, the authors pay attention to...

    Provided By Seoul National University

  • White Papers // Mar 2010

    A Content-Oriented Networking Approach for Security and Accountability

    Recently, there are burgeoning efforts to redesign the Internet architecture to solve many problems, to name a few, security, mobility, routing scalability, accountability, etc. One of the noticeable approaches is the content-oriented networking as opposed to the original host-based (or address-based) Internet design. The rationale behind the content-oriented network designs...

    Provided By Seoul National University

  • White Papers // Oct 2009

    Service Differentiation Using Mobile Femtocell Virtualization

    This paper proposes a service differentiation architecture using virtualization of mobile femtocell. Network-prefix Division Multiple Access (NDMA) is proposed to enable mobile devices inside a moving space to access the Internet with different service demands. With the NDMA scheme, the authors' architecture provides multiple virtual mobile networks for diverse services...

    Provided By Seoul National University

  • White Papers // Dec 2010

    Multi-Agent Itinerary Planning for Sensor Networks

    Agent-based data collection and aggregation have been proved to be efficient in Wireless Sensor Networks (WSNs). While most of existing work focus on designing various Single agent based Itinerary Planning (SIP) algorithms by considering energy-efficiency and/or aggregation efficiency, this paper identifies the drawbacks of this approach in large scale network,...

    Provided By Seoul National University

  • White Papers // Jul 2009

    Performance Comparison of Content-Oriented Networking Alternatives: A Tree Versus a Distributed Hash Table

    While the Internet was designed with host-oriented networking applications, recent Internet statistics show that content-oriented traffic has become more and more dominant. Even though content-oriented networking, which tries to resolve this discordance, has received increasing attention, there have been few comprehensive and quantitative studies on how to realize a content-oriented...

    Provided By Seoul National University

  • White Papers // Feb 2009

    Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks

    Compared to conventional Wireless Sensor Networks (WSNs) that are operated based on the client-server computing model, Mobile Agent (MA) systems provide new capabilities for energy-efficient data dissemination by flexibly planning its itinerary for facilitating agent based data collection and aggregation. It has been known that finding the optimal itinerary is...

    Provided By Seoul National University

  • White Papers // May 2009

    FIRM: Flow-Based Interference-Aware Route Management in Wireless Mesh Networks

    In IEEE 802.11-based wireless mesh networks, routing is crucial in achieving high throughput in face of both interflow and intra-flow interference. Prior work focuses on finding the maximum available bandwidth path when a new flow enters the network. However, few have considered the effect of the new flow on the...

    Provided By Seoul National University

  • White Papers // Nov 2008

    Pricing for Heterogeneous Services in OFDMA 802.16 Systems

    The IEEE 802.16 standard is expected to become a successful broadband wireless access solution, especially thanks to its ability to provide high data rates, to differentiate services, and thanks to its interoperability, as promoted by the Worldwide Interoperability for Microwave Access (WiMAX) organization. The authors consider in this paper an...

    Provided By Seoul National University

  • White Papers // Nov 2008

    Regional Token Based Routing for DTNs

    In Delay and Disruption Tolerant Networks (DTNs), there are no stable end-to-end paths because the connectivity of nodes is frequently disrupted by their mobility, power saving or other reasons. Nevertheless nodes can communicate each other by a store-and-forward paradigm if there are end-to-end paths on the union of network snapshots...

    Provided By Seoul National University

  • White Papers // Feb 2009

    A Solicitation-Based IEEE 802.11p MAC Protocol for Roadside to Vehicular Networks

    Recently, vehicular networks have begun to attract much attention in industry as well as academia. In particular, IEEE 802.11-based solutions for vehicular networks are also investigated by IEEE 802.11p. As the original IEEE 802.11 standard is designed only for little mobility, the IEEE 802.11p working group should address important issues...

    Provided By Seoul National University

  • White Papers // Apr 2009

    Energy Detection Based Spectrum Sensing for Sensing Error Minimization in Cognitive Radio Networks

    In this paper, the authors investigate an optimization of threshold level with energy detection to improve the spectrum sensing performance. Determining threshold level to minimize spectrum sensing error both reduces collision probability with primary user and enhances usage level of vacant spectrum, resulting in improving total spectrum efficiency. However, when...

    Provided By Seoul National University

  • White Papers // Mar 2010

    The Effects Of Current Financial Crises On Trade Balances

    Global financial crisis made a huge effect on Korea's trade balance. First, global financial crisis caused the recession of object economy and this recession caused decreasing of Korea's exports. Second, high exchange rate had a positive effect on Korea's exports and negative one on imports. So, in spite of the...

    Provided By Seoul National University

  • White Papers // Feb 2010

    Idle Mode for Deep Power Save in IEEE 802.11 WLANs

    Along with the wide acceptance of IEEE 802.11 Wireless Local Area Network (WLAN), new applications such as Internet Protocol (IP) telephony over WLAN are fast emerging today. For battery-powered IP phone devices, the life time extension is a key concern for the market acceptance while today's 802.11 is not optimized...

    Provided By Seoul National University

  • White Papers // Feb 2010

    S-ARQ: A New Truncated ARQ for IP-Based Wireless Network

    Automatic Repeat reQuest (ARQ) is a very effective technique against transmission error at the Medium Access Control (MAC) layer. An erroneous MAC Protocol Data Unit (MPDU) can be typically retransmitted within a given limit. In order to improve the IP-level performance, which directly affects the user-perceived Quality-of-Service (QoS), the authors...

    Provided By Seoul National University

  • White Papers // Jul 2009

    Analytical Modeling of TCP Dynamics in Infrastructure-Based IEEE 802.11 WLANs

    IEEE 802.11Wireless LAN (WLAN) has become the prevailing solution for wireless Internet access while Transport Control Protocol (TCP) is the dominant transport-layer protocol in the Internet. It is known that, in an infrastructure-based WLAN with multiple stations carrying long-lived TCP flows, the number of TCP stations that are actively contending...

    Provided By Seoul National University

  • White Papers // Aug 2009

    Resource-Aware Dynamic Spectrum Pricing for Cognitive Radio Networks

    Sharing of spectrum has been identified as a key requirement in Cognitive Radio Networks (CRNs). The authors address the problem of spectrum sharing with spectrum pricing where the primary user wants to sell the spectrum to the secondary users. By equilibrium pricing scheme, each of the players in the spectrum...

    Provided By Seoul National University

  • White Papers // May 2011

    Enabling Consolidation and Scaling Down to Provide Power Management for Cloud Computing

    Consolidation and scaling down can be used as enabling techniques to effectively manage power for distributed systems. To support power management for cloud computing with consolidation and scaling down, it is necessary to study the effects of mixed workloads and the consolidation on the performance of application in the virtual...

    Provided By Seoul National University

  • White Papers // Apr 2010

    GA-MIP: Genetic Algorithm Based Multiple Mobile Agents Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Seoul National University

  • White Papers // Jun 2010

    Host-Oblivious Security for Content-Based Networks

    Network-level security systems rely significantly on network operations. This reliance has led to conventional network-level security systems based on a host-centric architecture because the network operations themselves are based on hosts. However, host-dependent network security schemes are no longer applicable in content-based networks. In this paper, a host-oblivious network security...

    Provided By Seoul National University

  • White Papers // Apr 2011

    An Efficient Hybrid Power Control Algorithm for Capacity Improvement of CDMA-Based Fixed Wireless Applications

    In Fixed Wireless Applications (FWA), the Code Division Multiple Access (CDMA) is the most promising candidate for wideband data access. The reason is the soft limit on the number of active mobile devices. Many Fixed Wireless Applications impose an upper bound on the BER performance which restricts the increase in...

    Provided By Seoul National University

  • White Papers // Feb 2011

    A Real-Time Localization System Using RFID for Visually Impaired

    Gadgets helping the disabled, especially blind that are in least accessibility of information, use acoustic methods that can cause stress to ear and infringe user's privacy. Even if some project uses embedded Radio Frequency IDentification (RFID) into the sidewalk for blind's free walking, the tag memory design is not specified...

    Provided By Seoul National University

  • White Papers // Jun 2011

    Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    The traditional Radio Frequency IDentification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of...

    Provided By Seoul National University

  • White Papers // Jun 2008

    Raptor Code-Based Video Multicast Over IEEE 802.11 WLAN

    This paper applies a Raptor code-based forward error correcting scheme right above the Medium Access Control (MAC) layer in order to ensure the reliability of the video multicast over IEEE 802.11 Wireless LANs (WLANs). Both Raptor code rate and PHYsical layer (PHY) transmission rate are dynamically adapted according to the...

    Provided By Seoul National University

  • White Papers // Aug 2009

    MAC-Aware Routing Metric for 802.11 Wireless Mesh Networks

    It developed a new wireless link quality metric, ECOT (Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is being applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. It takes into...

    Provided By Seoul National University

  • White Papers // Oct 2009

    Angle Gap (AG) Based Grouping Algorithm for Multi-Mobile Agents Itinerary Planning in Wireless Sensor Networks

    Compared to the conventional Wireless Sensor Networks (WSNs), Mobile Agent (MA) systems provide new capabilities for energy-efficient data dissemination by flexibly planning its itinerary for facilitating agent-based data collection and aggregation. Most of the existing work focuses on the itinerary for single MA, however, it is obviously that using Multi-Mobile...

    Provided By Seoul National University

  • White Papers // Feb 2009

    ID/LOC Separation Network Architecture for Mobility Support in Future Internet

    This paper proposes a novel network architecture for future Internet to solve both routing scalability and mobility. The proposal is based on a LISP+ALT architecture to achieve routing scalability in a global Internet scale. The paper extends the LISP+ALT architecture to provide roaming for global mobility and take a network-based...

    Provided By Seoul National University

  • White Papers // Jan 2009

    Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture

    This paper analyzes an embedded architecture of torus network with the hypercube pertinent to parallel architecture. The product generated from torus and hypercube networks show how good interconnection network can be designed for parallel computation. The advantages of hypercube network and torus topology are used for product network known as...

    Provided By Seoul National University

  • White Papers // Dec 2008

    An Approximate Analysis of Adaptive Routing in Wavelength-Routed Networks

    Authors study an analytical method for computing average blocking probability of adaptive routing in wavelength-routed networks. Authors propose a new data structure called Network-State Tree (NST) to represent a subset of all possible network states, and combine it with a path-blocking model previously known. The approach is the first trial...

    Provided By Seoul National University