Technische Universiteit Eindhoven

Displaying 1-13 of 13 results

  • White Papers // Jul 2013

    Multicore Reconfiguration Platform an alternative to RAMPSoC

    The current state of the art in processor performance improvement is multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. A novel idea in this research field is introduced by the Runtime Adaptive Multi-Processor System-on-Chip (RAMPSoC) approach. It uses...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Feb 2011

    Carrier Frequency Offset Estimation for Multiuser MIMO OFDM Uplink Using CAZAC Sequences: Performance and Sequence Optimization

    This paper studies Carrier Frequency Offset (CFO) estimation in the uplink of multi-user Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. Conventional maximum likelihood estimator requires computational complexity that increases exponentially with the number of users. To reduce the complexity, the authors propose a suboptimal estimation algorithm using Constant...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2011

    Generalizing Needham-Schroeder-Lowe for Multi-Party Authentication

    The authors propose a protocol for multi-party authentication for any number of parties, which generalizes the well-known Needham-Schroeder-Lowe protocol. They show that the protocol satisfies authentication of the communicating parties (by proving injective synchronisation) and secrecy of the generated challenges. For p parties, the protocol consists of 2p-1 messages, which...

    Provided By Technische Universiteit Eindhoven

  • White Papers // May 2010

    Obtaining Consistent Global State Dumps to Interactively Debug Systems on Chip With Multiple Clocks

    Post-silicon debugging of a System On Chip (SOC) is complex due to the intrinsic limits on the internal observability, the absence of a single global clock, and the need for asynchronous intellectual property (IP) blocks to interact with each other. These aspects prevent the instantaneous capture of a complete and...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Apr 2010

    Budget Allocation For Permanent And Contingent Capacity Under Stochastic Demand

    The authors develop a model of budget allocation for permanent and contingent workforce under stochastic demand. The level of permanent capacity is determined at the beginning of the horizon and is kept constant throughout whereas the number of temporary workers to be hired must be decided in each period. Compared...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    Extracting the Main Content From HTML Documents

    A modern web document typically consists of many kinds of information. Besides the main content which conveys the primary information, a web document also contains noisy contents such as advertisements, headers, footers, decorations, copyright information, navigation menus etc. The presence of noisy contents may affect the performance of applications such...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

    Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jun 2009

    Public Key Cryptography on RFID Tags: "A Survey on the GPS Identification Scheme"

    In the last few years, a lot of research effort has been made in the area of Radio Frequency Identification (RFID) technology. The widespread deployment of RFID tags and their increased usage in open environments brought on surface a need for supporting more advanced security features. Applying public-key cryptography constitutes...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2009

    Analyzing Control-Flow and Data-Flow in Workflow Processes in a Unified Way

    Workflow correctness properties are usually defined based on one workflow perspective only, e.g. the control-flow or the data-flow. In this paper the authors consider workflow correctness criteria looking at the control flow extended with the read/write/destroy information for data items. They formalize some common control-flow errors, and they introduce behavioral...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Dec 2008

    Evaluating a Data Removal Strategy for Grid Environments Using Colored Petri Nets

    In this paper the authors use Colored Petri Nets (CPNs) and the supporting CPN Tools for the modeling and performance analysis of grid architectures. The notation of Petri nets is a well known graphical formalism, able to model concurrency and different types of communication. CPNs extend Petri nets with timing,...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Nov 2008

    Statistical Approach to Software Reliability Certification

    The authors present a sequential software release procedure that certifies with some confidence level that the next error is not occurring within a certain time interval. The procedure is defined in such a way that the release time is optimal for single stages and the global risk can be controlled....

    Provided By Technische Universiteit Eindhoven

  • White Papers // Oct 2008

    Execution Times and Execution Jitter Analysis of Real-Time Tasks Under Fixed-Priority Pre-Emptive Scheduling

    In this paper, the authors present worst-case and best-case execution times and (absolute) execution jitter analysis of independent, periodically activated, hard real-time tasks that are executed on a single processor under Fixed-Priority Pre-emptive Scheduling (FPPS), arbitrary phasing, (absolute) activation jitter, and deadlines at most equal to (worst-case) periods minus activation...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Oct 2008

    A Communication Protocol for Interactively Controlling Software Tools

    The authors present a protocol for interactively using software tools in a loosely coupled tool environment. Such an environment can assist the user in doing tasks that require the use of multiple tools. For example, it can invoke tools on certain input, set processing parameters, await task completion and have...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Oct 2008

    A Communication Protocol for Interactively Controlling Software Tools

    The authors present a protocol for interactively using software tools in a loosely coupled tool environment. Such an environment can assist the user in doing tasks that require the use of multiple tools. For example, it can invoke tools on certain input, set processing parameters, await task completion and have...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2009

    Analyzing Control-Flow and Data-Flow in Workflow Processes in a Unified Way

    Workflow correctness properties are usually defined based on one workflow perspective only, e.g. the control-flow or the data-flow. In this paper the authors consider workflow correctness criteria looking at the control flow extended with the read/write/destroy information for data items. They formalize some common control-flow errors, and they introduce behavioral...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Dec 2008

    Evaluating a Data Removal Strategy for Grid Environments Using Colored Petri Nets

    In this paper the authors use Colored Petri Nets (CPNs) and the supporting CPN Tools for the modeling and performance analysis of grid architectures. The notation of Petri nets is a well known graphical formalism, able to model concurrency and different types of communication. CPNs extend Petri nets with timing,...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

    Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Feb 2011

    Carrier Frequency Offset Estimation for Multiuser MIMO OFDM Uplink Using CAZAC Sequences: Performance and Sequence Optimization

    This paper studies Carrier Frequency Offset (CFO) estimation in the uplink of multi-user Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. Conventional maximum likelihood estimator requires computational complexity that increases exponentially with the number of users. To reduce the complexity, the authors propose a suboptimal estimation algorithm using Constant...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jun 2009

    Public Key Cryptography on RFID Tags: "A Survey on the GPS Identification Scheme"

    In the last few years, a lot of research effort has been made in the area of Radio Frequency Identification (RFID) technology. The widespread deployment of RFID tags and their increased usage in open environments brought on surface a need for supporting more advanced security features. Applying public-key cryptography constitutes...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    Extracting the Main Content From HTML Documents

    A modern web document typically consists of many kinds of information. Besides the main content which conveys the primary information, a web document also contains noisy contents such as advertisements, headers, footers, decorations, copyright information, navigation menus etc. The presence of noisy contents may affect the performance of applications such...

    Provided By Technische Universiteit Eindhoven

  • White Papers // May 2010

    Obtaining Consistent Global State Dumps to Interactively Debug Systems on Chip With Multiple Clocks

    Post-silicon debugging of a System On Chip (SOC) is complex due to the intrinsic limits on the internal observability, the absence of a single global clock, and the need for asynchronous intellectual property (IP) blocks to interact with each other. These aspects prevent the instantaneous capture of a complete and...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Apr 2010

    Budget Allocation For Permanent And Contingent Capacity Under Stochastic Demand

    The authors develop a model of budget allocation for permanent and contingent workforce under stochastic demand. The level of permanent capacity is determined at the beginning of the horizon and is kept constant throughout whereas the number of temporary workers to be hired must be decided in each period. Compared...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2011

    Generalizing Needham-Schroeder-Lowe for Multi-Party Authentication

    The authors propose a protocol for multi-party authentication for any number of parties, which generalizes the well-known Needham-Schroeder-Lowe protocol. They show that the protocol satisfies authentication of the communicating parties (by proving injective synchronisation) and secrecy of the generated challenges. For p parties, the protocol consists of 2p-1 messages, which...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Oct 2008

    Execution Times and Execution Jitter Analysis of Real-Time Tasks Under Fixed-Priority Pre-Emptive Scheduling

    In this paper, the authors present worst-case and best-case execution times and (absolute) execution jitter analysis of independent, periodically activated, hard real-time tasks that are executed on a single processor under Fixed-Priority Pre-emptive Scheduling (FPPS), arbitrary phasing, (absolute) activation jitter, and deadlines at most equal to (worst-case) periods minus activation...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Nov 2008

    Statistical Approach to Software Reliability Certification

    The authors present a sequential software release procedure that certifies with some confidence level that the next error is not occurring within a certain time interval. The procedure is defined in such a way that the release time is optimal for single stages and the global risk can be controlled....

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jul 2013

    Multicore Reconfiguration Platform an alternative to RAMPSoC

    The current state of the art in processor performance improvement is multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. A novel idea in this research field is introduced by the Runtime Adaptive Multi-Processor System-on-Chip (RAMPSoC) approach. It uses...

    Provided By Technische Universiteit Eindhoven