Technical University of Denmark

Displaying 1-25 of 25 results

  • White Papers // Jun 2012

    Run-Time Power-Down Strategies for Real-Time SDRAM Memory Controllers

    Powering down SDRAMs at run-time reduces memory energy consumption significantly, but often at the cost of performance. If employed speculatively with real-time memory controllers, power-down mechanisms could impact both the guaranteed bandwidth and the memory latency bounds. This calls for power-down strategies that can hide or bound the performance loss,...

    Provided By Technical University of Denmark

  • White Papers // May 2012

    dAElite: A TDM NoC Supporting QoS, Multicast, and Fast Connection Set-Up

    Network-on-Chips (NoCs) are seen as promising interconnect solutions, offering the advantages of scalability and high frequency operation which the traditional bus interconnects lack. Several NoC implementations have been presented in the literature, some of them having mature tool-flows. The main differentiating factor between the various implementations is the services and...

    Provided By Technical University of Denmark

  • White Papers // Jan 2012

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

    Block ciphers are one of the fundamental primitives in symmetric cryptography. Often called the work horses of cryptography, they form the backbone of today's secure communication. Therefore, their design has been an important research focus over the last 20 years, giving rise to different well-established strategies to prevent large classes...

    Provided By Technical University of Denmark

  • White Papers // Dec 2011

    SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography - optimizing the algorithms to t the most constrained environments - has received a great deal of attention, the recent research being mainly focused on building block ciphers. As opposed to that,...

    Provided By Technical University of Denmark

  • White Papers // Jun 2011

    Expressing Model Constraints Visually With VMQL

    OCL is the de facto standard language for expressing constraints and queries on UML models. However, OCL expressions are very difficult to create, understand, and maintain, even with the sophisticated tool support now available. In this paper, the authors propose to use the Visual Model Query Language (VMQL) for specifying...

    Provided By Technical University of Denmark

  • White Papers // Jun 2011

    Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

    Enforcing security policies to distributed systems is difficult, in particular, to a system containing untrusted components. The authors designed AspectKE, an aspect-oriented programming language based on distributed tuple spaces to tackle this issue. One of the key features in AspectKE is the program analysis predicates and functions that provide information...

    Provided By Technical University of Denmark

  • White Papers // Mar 2011

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in. In this paper the authors propose a meet-in-the-middle technique that allows them to invert the ARMADILLO2 function. Using this technique they are able to perform a key recovery...

    Provided By Technical University of Denmark

  • White Papers // Mar 2011

    Locating Depots for Capacitated Vehicle Routing

    In typical facility location problems, one wishes to locate centers and connect clients directly to centers at minimum cost. On the other hand, the goal in Vehicle Routing Problems (VRPs) is to compute routes for vehicles originating from a given set of depots. Location routing problems represent an integrated approach,...

    Provided By Technical University of Denmark

  • White Papers // Jan 2011

    T2Script Programming Language

    Event-driven programming is used in many fields of modern Computer Science. In event-driven programming languages user interacts with a program by triggering the events. The authors propose a new approach that they denote command-event driven programming in which the user interacts with a program by means of events and commands....

    Provided By Technical University of Denmark

  • White Papers // Jan 2011

    Security-by-Contract-With-Trust for Mobile Devices

    Security-by-Contract (S?C) is a paradigm providing security assurances for mobile applications. In this paper, the authors present the an extension of S?C, called Security-by-Contract-with-Trust (S?C?T). Indeed, they enrich the S?C architecture by integrating a trust model and adding new modules and configurations for managing contracts. Indeed, at deploy-time, their system...

    Provided By Technical University of Denmark

  • White Papers // Nov 2010

    Rank K Cholesky Up/Down-Dating on the GPU: GpucholmodV0.2

    In this note the authors briefly describe the Cholesky modification algorithm for streaming multiprocessor architectures. The implementation is available in C++ with Matlab binding, using CUDA to utilise the Graphics Processing Unit (GPU). Limited speed ups are possible due to the bandwidth bound nature of the problem. Furthermore, a complex...

    Provided By Technical University of Denmark

  • White Papers // Oct 2010

    History-Sensitive Versus Future-Sensitive Approaches to Security in Distributed Systems

    The authors consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavors of dealing with information...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Fusion of Gait and Fingerprint for User Authentication on Mobile Devices

    A new multi-modal biometric authentication approach using gait signals and fingerprint images as biometric traits is proposed. The individual comparison scores derived from the gait and fingers are normalized using four methods (min-max, z-score, median absolute deviation, tangent hyperbolic) and then four fusion approaches (simple sum, user-weighting, maximum score and...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Biometric Template Data Protection in Mobile Device Environment Using XML-Database

    This paper proposes a non-traditional XML database which supports biometric templates and provides an API which can be used by independent applications in mobile device environments. Until recently biometric systems are becoming more and more visible in mobile phone devices including fingerprint recognition or gait recognition. To gain a real...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Mobility Support in Integrated EPON-WiMAX Network Access Architecture

    In this paper, the authors introduce a mobility-aware control policy for the integrated optical and wireless network. The proposed solution which is compatible to the Ethernet Passive Optical Network (EPON) standard provides cooperative management of radio resources among multiple wireless networks. By enhancing the EPON signaling protocol, the proposed scheme...

    Provided By Technical University of Denmark

  • White Papers // Mar 2010

    AspectKE: Security Aspects With Program Analysis for Distributed Systems

    Enforcing security policies to distributed systems is difficult, in particular, when a system contains untrusted components. The authors designed AspectKE, a distributed AOP language based on a tuple space, to tackle this issue. In AspectKE, aspects can enforce access control policies that depend on future behavior of running processes. One...

    Provided By Technical University of Denmark

  • White Papers // Feb 2010

    Resource Management Framework for QoS Scheduling in IEEE 802.16 WiMAX Networks

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, Radio Resource Management (RRM) still remains an open issue, which plays an important role in QoS provisioning for different...

    Provided By Technical University of Denmark

  • White Papers // Jan 2010

    Providing Resilience for Carrier Ethernet Multicast Traffic

    This paper presents an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, the paper details how multicast traffic, which is essential for e.g. IPTV can be protected. It presents Carrier Ethernet resilience methods for linear and ring networks and show by simulation that the availability...

    Provided By Technical University of Denmark

  • White Papers // Oct 2009

    Near-Optimal Detection in MIMO Systems Using Gibbs Sampling

    In this paper the authors study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to performing Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods for such problems has already been...

    Provided By Technical University of Denmark

  • White Papers // Sep 2009

    Decision Support for the Rolling Stock Dispatcher

    Real-time recovery is receiving a fast growing interest in an increasingly competitive railway operation market. This paper considers the area of rolling stock dispatching which is one of the typical real-time railway dispatching problems. All work of the paper is based on the network and planning processes of the railway...

    Provided By Technical University of Denmark

  • White Papers // Jul 2009

    Optimal Channel Choice for Collaborative Ad-Hoc Dissemination

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others. The authors consider the case where devices have...

    Provided By Technical University of Denmark

  • White Papers // Jun 2009

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

    In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End-by-Hop protocol for securing in-network aggregation...

    Provided By Technical University of Denmark

  • White Papers // Apr 2009

    Workflows for Visualizing Data Mining Results

    The author reviews methods and tools for visualizations in neuroimaging as well as point to some of the problems with interpreting such visualizations. The author furthermore describes Internet-based visualization and information visualization. The author focuses on workflows associated with the Brede Toolbox for display of data mining results. A few...

    Provided By Technical University of Denmark

  • White Papers // Mar 2009

    Mobility Models and Behavioural Equivalence for Wireless Networks

    In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for the successful evaluation of protocols. More recently, wireless protocols have also come into the focus of formal approaches to the modelling and verification...

    Provided By Technical University of Denmark

  • White Papers // Sep 2008

    Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns out to be very useful for low-end devices. Motivated by an attack against a protocol presented at SAC 2003, the current paper...

    Provided By Technical University of Denmark

  • White Papers // Oct 2009

    Near-Optimal Detection in MIMO Systems Using Gibbs Sampling

    In this paper the authors study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to performing Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods for such problems has already been...

    Provided By Technical University of Denmark

  • White Papers // Jul 2009

    Optimal Channel Choice for Collaborative Ad-Hoc Dissemination

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others. The authors consider the case where devices have...

    Provided By Technical University of Denmark

  • White Papers // Feb 2010

    Resource Management Framework for QoS Scheduling in IEEE 802.16 WiMAX Networks

    IEEE 802.16, also known as WiMAX, has received much attention recently for its capability to support multiple types of applications with diverse Quality-of-Service (QoS) requirements. Beyond what the standard has defined, Radio Resource Management (RRM) still remains an open issue, which plays an important role in QoS provisioning for different...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Mobility Support in Integrated EPON-WiMAX Network Access Architecture

    In this paper, the authors introduce a mobility-aware control policy for the integrated optical and wireless network. The proposed solution which is compatible to the Ethernet Passive Optical Network (EPON) standard provides cooperative management of radio resources among multiple wireless networks. By enhancing the EPON signaling protocol, the proposed scheme...

    Provided By Technical University of Denmark

  • White Papers // Mar 2009

    Mobility Models and Behavioural Equivalence for Wireless Networks

    In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for the successful evaluation of protocols. More recently, wireless protocols have also come into the focus of formal approaches to the modelling and verification...

    Provided By Technical University of Denmark

  • White Papers // Jun 2011

    Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

    Enforcing security policies to distributed systems is difficult, in particular, to a system containing untrusted components. The authors designed AspectKE, an aspect-oriented programming language based on distributed tuple spaces to tackle this issue. One of the key features in AspectKE is the program analysis predicates and functions that provide information...

    Provided By Technical University of Denmark

  • White Papers // Mar 2010

    AspectKE: Security Aspects With Program Analysis for Distributed Systems

    Enforcing security policies to distributed systems is difficult, in particular, when a system contains untrusted components. The authors designed AspectKE, a distributed AOP language based on a tuple space, to tackle this issue. In AspectKE, aspects can enforce access control policies that depend on future behavior of running processes. One...

    Provided By Technical University of Denmark

  • White Papers // Jun 2011

    Expressing Model Constraints Visually With VMQL

    OCL is the de facto standard language for expressing constraints and queries on UML models. However, OCL expressions are very difficult to create, understand, and maintain, even with the sophisticated tool support now available. In this paper, the authors propose to use the Visual Model Query Language (VMQL) for specifying...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Fusion of Gait and Fingerprint for User Authentication on Mobile Devices

    A new multi-modal biometric authentication approach using gait signals and fingerprint images as biometric traits is proposed. The individual comparison scores derived from the gait and fingers are normalized using four methods (min-max, z-score, median absolute deviation, tangent hyperbolic) and then four fusion approaches (simple sum, user-weighting, maximum score and...

    Provided By Technical University of Denmark

  • White Papers // Sep 2010

    Biometric Template Data Protection in Mobile Device Environment Using XML-Database

    This paper proposes a non-traditional XML database which supports biometric templates and provides an API which can be used by independent applications in mobile device environments. Until recently biometric systems are becoming more and more visible in mobile phone devices including fingerprint recognition or gait recognition. To gain a real...

    Provided By Technical University of Denmark

  • White Papers // Jan 2011

    Security-by-Contract-With-Trust for Mobile Devices

    Security-by-Contract (S?C) is a paradigm providing security assurances for mobile applications. In this paper, the authors present the an extension of S?C, called Security-by-Contract-with-Trust (S?C?T). Indeed, they enrich the S?C architecture by integrating a trust model and adding new modules and configurations for managing contracts. Indeed, at deploy-time, their system...

    Provided By Technical University of Denmark

  • White Papers // Dec 2011

    SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography - optimizing the algorithms to t the most constrained environments - has received a great deal of attention, the recent research being mainly focused on building block ciphers. As opposed to that,...

    Provided By Technical University of Denmark

  • White Papers // Jan 2012

    Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

    Block ciphers are one of the fundamental primitives in symmetric cryptography. Often called the work horses of cryptography, they form the backbone of today's secure communication. Therefore, their design has been an important research focus over the last 20 years, giving rise to different well-established strategies to prevent large classes...

    Provided By Technical University of Denmark

  • White Papers // Jan 2011

    T2Script Programming Language

    Event-driven programming is used in many fields of modern Computer Science. In event-driven programming languages user interacts with a program by triggering the events. The authors propose a new approach that they denote command-event driven programming in which the user interacts with a program by means of events and commands....

    Provided By Technical University of Denmark

  • White Papers // Apr 2009

    Workflows for Visualizing Data Mining Results

    The author reviews methods and tools for visualizations in neuroimaging as well as point to some of the problems with interpreting such visualizations. The author furthermore describes Internet-based visualization and information visualization. The author focuses on workflows associated with the Brede Toolbox for display of data mining results. A few...

    Provided By Technical University of Denmark

  • White Papers // Jan 2010

    Providing Resilience for Carrier Ethernet Multicast Traffic

    This paper presents an overview of the Carrier Ethernet technology with specific focus on resilience. In particular, the paper details how multicast traffic, which is essential for e.g. IPTV can be protected. It presents Carrier Ethernet resilience methods for linear and ring networks and show by simulation that the availability...

    Provided By Technical University of Denmark

  • White Papers // Sep 2009

    Decision Support for the Rolling Stock Dispatcher

    Real-time recovery is receiving a fast growing interest in an increasingly competitive railway operation market. This paper considers the area of rolling stock dispatching which is one of the typical real-time railway dispatching problems. All work of the paper is based on the network and planning processes of the railway...

    Provided By Technical University of Denmark

  • White Papers // Mar 2011

    Locating Depots for Capacitated Vehicle Routing

    In typical facility location problems, one wishes to locate centers and connect clients directly to centers at minimum cost. On the other hand, the goal in Vehicle Routing Problems (VRPs) is to compute routes for vehicles originating from a given set of depots. Location routing problems represent an integrated approach,...

    Provided By Technical University of Denmark

  • White Papers // Nov 2010

    Rank K Cholesky Up/Down-Dating on the GPU: GpucholmodV0.2

    In this note the authors briefly describe the Cholesky modification algorithm for streaming multiprocessor architectures. The implementation is available in C++ with Matlab binding, using CUDA to utilise the Graphics Processing Unit (GPU). Limited speed ups are possible due to the bandwidth bound nature of the problem. Furthermore, a complex...

    Provided By Technical University of Denmark

  • White Papers // Oct 2010

    History-Sensitive Versus Future-Sensitive Approaches to Security in Distributed Systems

    The authors consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavors of dealing with information...

    Provided By Technical University of Denmark

  • White Papers // Mar 2011

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in. In this paper the authors propose a meet-in-the-middle technique that allows them to invert the ARMADILLO2 function. Using this technique they are able to perform a key recovery...

    Provided By Technical University of Denmark

  • White Papers // Sep 2008

    Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns out to be very useful for low-end devices. Motivated by an attack against a protocol presented at SAC 2003, the current paper...

    Provided By Technical University of Denmark

  • White Papers // Jun 2009

    Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

    In order to save bandwidth and thus battery power, sensor network measurements are sometimes aggregated en-route while being reported back to the querying server. Authentication of the measurements then becomes a challenge if message integrity is important for the application. At ESAS 2007, the End-by-Hop protocol for securing in-network aggregation...

    Provided By Technical University of Denmark

  • White Papers // May 2012

    dAElite: A TDM NoC Supporting QoS, Multicast, and Fast Connection Set-Up

    Network-on-Chips (NoCs) are seen as promising interconnect solutions, offering the advantages of scalability and high frequency operation which the traditional bus interconnects lack. Several NoC implementations have been presented in the literature, some of them having mature tool-flows. The main differentiating factor between the various implementations is the services and...

    Provided By Technical University of Denmark

  • White Papers // Jun 2012

    Run-Time Power-Down Strategies for Real-Time SDRAM Memory Controllers

    Powering down SDRAMs at run-time reduces memory energy consumption significantly, but often at the cost of performance. If employed speculatively with real-time memory controllers, power-down mechanisms could impact both the guaranteed bandwidth and the memory latency bounds. This calls for power-down strategies that can hide or bound the performance loss,...

    Provided By Technical University of Denmark