Technische Universiteit Eindhoven

Displaying 1-9 of 9 results

  • White Papers // Jul 2013

    Multicore Reconfiguration Platform an alternative to RAMPSoC

    The current state of the art in processor performance improvement is multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. A novel idea in this research field is introduced by the Runtime Adaptive Multi-Processor System-on-Chip (RAMPSoC) approach. It uses...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Feb 2011

    Carrier Frequency Offset Estimation for Multiuser MIMO OFDM Uplink Using CAZAC Sequences: Performance and Sequence Optimization

    This paper studies Carrier Frequency Offset (CFO) estimation in the uplink of multi-user Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. Conventional maximum likelihood estimator requires computational complexity that increases exponentially with the number of users. To reduce the complexity, the authors propose a suboptimal estimation algorithm using Constant...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2011

    Generalizing Needham-Schroeder-Lowe for Multi-Party Authentication

    The authors propose a protocol for multi-party authentication for any number of parties, which generalizes the well-known Needham-Schroeder-Lowe protocol. They show that the protocol satisfies authentication of the communicating parties (by proving injective synchronisation) and secrecy of the generated challenges. For p parties, the protocol consists of 2p-1 messages, which...

    Provided By Technische Universiteit Eindhoven

  • White Papers // May 2010

    Obtaining Consistent Global State Dumps to Interactively Debug Systems on Chip With Multiple Clocks

    Post-silicon debugging of a System On Chip (SOC) is complex due to the intrinsic limits on the internal observability, the absence of a single global clock, and the need for asynchronous intellectual property (IP) blocks to interact with each other. These aspects prevent the instantaneous capture of a complete and...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Apr 2010

    Budget Allocation For Permanent And Contingent Capacity Under Stochastic Demand

    The authors develop a model of budget allocation for permanent and contingent workforce under stochastic demand. The level of permanent capacity is determined at the beginning of the horizon and is kept constant throughout whereas the number of temporary workers to be hired must be decided in each period. Compared...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    Extracting the Main Content From HTML Documents

    A modern web document typically consists of many kinds of information. Besides the main content which conveys the primary information, a web document also contains noisy contents such as advertisements, headers, footers, decorations, copyright information, navigation menus etc. The presence of noisy contents may affect the performance of applications such...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

    Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jun 2009

    Public Key Cryptography on RFID Tags: "A Survey on the GPS Identification Scheme"

    In the last few years, a lot of research effort has been made in the area of Radio Frequency Identification (RFID) technology. The widespread deployment of RFID tags and their increased usage in open environments brought on surface a need for supporting more advanced security features. Applying public-key cryptography constitutes...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2009

    Analyzing Control-Flow and Data-Flow in Workflow Processes in a Unified Way

    Workflow correctness properties are usually defined based on one workflow perspective only, e.g. the control-flow or the data-flow. In this paper the authors consider workflow correctness criteria looking at the control flow extended with the read/write/destroy information for data items. They formalize some common control-flow errors, and they introduce behavioral...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2009

    Analyzing Control-Flow and Data-Flow in Workflow Processes in a Unified Way

    Workflow correctness properties are usually defined based on one workflow perspective only, e.g. the control-flow or the data-flow. In this paper the authors consider workflow correctness criteria looking at the control flow extended with the read/write/destroy information for data items. They formalize some common control-flow errors, and they introduce behavioral...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

    Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Feb 2011

    Carrier Frequency Offset Estimation for Multiuser MIMO OFDM Uplink Using CAZAC Sequences: Performance and Sequence Optimization

    This paper studies Carrier Frequency Offset (CFO) estimation in the uplink of multi-user Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. Conventional maximum likelihood estimator requires computational complexity that increases exponentially with the number of users. To reduce the complexity, the authors propose a suboptimal estimation algorithm using Constant...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jun 2009

    Public Key Cryptography on RFID Tags: "A Survey on the GPS Identification Scheme"

    In the last few years, a lot of research effort has been made in the area of Radio Frequency Identification (RFID) technology. The widespread deployment of RFID tags and their increased usage in open environments brought on surface a need for supporting more advanced security features. Applying public-key cryptography constitutes...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Sep 2009

    Extracting the Main Content From HTML Documents

    A modern web document typically consists of many kinds of information. Besides the main content which conveys the primary information, a web document also contains noisy contents such as advertisements, headers, footers, decorations, copyright information, navigation menus etc. The presence of noisy contents may affect the performance of applications such...

    Provided By Technische Universiteit Eindhoven

  • White Papers // May 2010

    Obtaining Consistent Global State Dumps to Interactively Debug Systems on Chip With Multiple Clocks

    Post-silicon debugging of a System On Chip (SOC) is complex due to the intrinsic limits on the internal observability, the absence of a single global clock, and the need for asynchronous intellectual property (IP) blocks to interact with each other. These aspects prevent the instantaneous capture of a complete and...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Apr 2010

    Budget Allocation For Permanent And Contingent Capacity Under Stochastic Demand

    The authors develop a model of budget allocation for permanent and contingent workforce under stochastic demand. The level of permanent capacity is determined at the beginning of the horizon and is kept constant throughout whereas the number of temporary workers to be hired must be decided in each period. Compared...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jan 2011

    Generalizing Needham-Schroeder-Lowe for Multi-Party Authentication

    The authors propose a protocol for multi-party authentication for any number of parties, which generalizes the well-known Needham-Schroeder-Lowe protocol. They show that the protocol satisfies authentication of the communicating parties (by proving injective synchronisation) and secrecy of the generated challenges. For p parties, the protocol consists of 2p-1 messages, which...

    Provided By Technische Universiteit Eindhoven

  • White Papers // Jul 2013

    Multicore Reconfiguration Platform an alternative to RAMPSoC

    The current state of the art in processor performance improvement is multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. A novel idea in this research field is introduced by the Runtime Adaptive Multi-Processor System-on-Chip (RAMPSoC) approach. It uses...

    Provided By Technische Universiteit Eindhoven