Temple Skin Care

Displaying 1-40 of 58 results

  • White Papers // Apr 2014

    Asymptotically-Optimal Incentive-Based En-Route Caching Scheme

    Content caching at intermediate nodes is a very effective way for optimizing the operations of Content Centric Networking, so that future requests can be served without going back to the origin of the content. Several caching techniques have been proposed since the emergence of the concept. However, few of these...

    Provided By Temple Skin Care

  • White Papers // Mar 2014

    Using Elasticity to Improve Inline Data Deduplication Storage Systems

    Data deduplication is a technique used to reduce storage and transmission overhead by identifying and eliminating redundant data segments. Data deduplication plays an important role in existing storage systems, and its importance will continue to grow as the amount of data increases (the growth of data is estimated to reach...

    Provided By Temple Skin Care

  • White Papers // Aug 2013

    A Lightweight Defense Scheme for Mobile Phishing

    Recent years have witnessed the increasing threat of phishing attacks on mobile platforms. In fact, mobile phishing is more dangerous due to the limitations of mobile phones and the mobile user habits. Existing schemes designed for phishing attacks on computers/laptops cannot effectively address phishing attacks on mobile devices. This paper...

    Provided By Temple Skin Care

  • White Papers // May 2013

    Deadlock-Free Fully Adaptive Routing in Irregular Networks Without Virtual Channels

    This paper proposes a new flow control scheme in VCT-switched irregular networks. Based on the new scheme, a novel deadlock-free fully adaptive routing algorithm is introduced. The algorithm does not need any virtual channel. It requires that each input port of a switch holds at least two 1- packet-sized buffers....

    Provided By Temple Skin Care

  • White Papers // May 2013

    Local Monitoring and Maintenance for Operational Wireless Sensor Networks

    One of the key mechanisms underlying a Wireless Sensor Network (WSN) is to monitor the network itself. Many existing approaches perform centralized analysis and maintenance based on a large amount of status reports collected from the WSN, while others use add-on protocols/modules that not only require extra management cost but...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Efficient Symbol-Level Transmission in Error-Prone Wireless Networks

    Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, the authors consider a novel retransmission approach based on the importance of the bits (symbols). They study the problem of maximizing the total...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    User-Based CPU Verification Scheme for Public Cloud Computing

    In this paper, a user-based CPU verification scheme is proposed for cloud cheating detection. In this scheme, a predefined computational task is constructed for the cloud to execute in the authors' cheating detection process. Then, they compare the difference of the actual execution time (recorded by the user) and the...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Energy and Bandwidth-Efficient Wireless Sensor Networks for Monitoring High-Frequency Events

    Wireless Sensor Networks (WSNs) are mostly deployed to detect events (i.e., objects or physical changes) at a high/low frequency sampling that is usually adapted by a central unit (or a sink), thus requiring additional resource usage in WSNs. However, the problem of autonomous adaptive sampling regarding the detection of events...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks

    Maintaining an acceptable level of network performance degradation in the presence of faults has been an active research area in Wireless Sensor Networks (WSNs). This paper proposes a scheme to optimize the total network performance by exploiting fault-aware rate control and multi-path routing in WSNs. The authors use statistical information...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Crowdsensing Maps of On-Street Parking Spaces

    It has been estimated that traffic congestion costs the world economy hundreds of billions of dollars each year, increases pollution, and has a negative impact on the overall quality of life in metropolitan areas. A significant part of congestion in urban areas is due to vehicles searching for on-street parking....

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Whether and When to Share: Spectrum Sensing as an Evolutionary Game

    Cooperative spectrum sensing is an efficient sensing scheme for Cognitive Radio Networks (CRNs), in which Secondary Users (SUs) share sensing results with other SUs to improve the overall sensing performance. For a single SU, if the sensing results are shared early, there is more time for data transmission, which improves...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

    This paper considers a pre-phase of spectrum sensing in Cognitive Radio Networks (CRNs), which is about how to choose a channel for spectrum sensing. The authors take the time dimension, spectrum dimension, and spacial dimension into account and propose a sense-in-order model. In this model, each node maintains four states...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Building a Private HPC Cloud for Compute and Data-Intensive Applications

    Traditional HPC (High Performance Computing) clusters are best suited for well-formed calculations. The orderly batch-oriented HPC cluster offers maximal potential for performance per application, but limits resource efficiency and user flexibility. An HPC cloud can host multiple virtual HPC clusters, giving the scientists unprecedented flexibility for research and development. With...

    Provided By Temple Skin Care

  • White Papers // Mar 2013

    Predictive Scheduling for Spatial-Dependent Tasks in Wireless Sensor Networks

    Recent advances in wireless energy transfer technology propel the developments of renewable sensor networks. To sustain the operation of a sensor network, a mobile charger is used to recharge each node. Consider each node's recharge request as a task with a soft due time, the mobile charger needs to dynamically...

    Provided By Temple Skin Care

  • White Papers // Mar 2013

    Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks

    A Mobile Opportunistic Social Network (MOSN) is a new type of Delay Tolerant Network (DTN), in which the mobile users contact each other opportunistically. Information dissemination is a challenging problem in MOSNs, due to uncertainty and intermittent connectivity. In this paper, the authors propose a distributed social tie strength calculation...

    Provided By Temple Skin Care

  • White Papers // Feb 2013

    Energy-Efficient Contact Probing in Opportunistic Mobile Networks

    In Opportunistic Mobile Networks (OppNets), data is opportunistically exchanged between nodes who encounter each other. In order to enable such data exchanges, nodes in the network have to probe their environment continually, so as to discover neighbor nodes. This can be an extremely energy-consuming process. If nodes probe very frequently,...

    Provided By Temple Skin Care

  • White Papers // Feb 2013

    Trade-Off Between Redundancy and Feedback in Wireless Network Communication

    Feedback is an important control mechanism that provides reliability in most wireless network protocols. However, feedback incurs some overhead, especially in lossy network environments. Many previous works on reliable communication neglect the cost of the feedback messages. In this paper, the authors study the problem of minimum-cost reliable transmission over...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Network Coding Techniques for Wireless and Sensor Networks

    Network coding is a technique where relay nodes mix packets using mathematical operations, which reduces the number of transmitted packets. Network coding was first proposed for wired networks to solve the bottleneck problem and to in-crease the throughput. However, the broadcast nature of wireless networks and the diversity of the...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework

    The buzz-word big-data (application) refers to the large-scale distributed applications that work on unprecedentedly large data sets. Google's MapReduce framework and Apache's Hadoop, its open-source implementation, are the defacto software system for big-data applications. An observation regarding these applications is that they generate a large amount of intermediate data, and...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    TOUR: Time-Sensitive Opportunistic Utility-Based Routing in Delay Tolerant Networks

    In this paper, the authors propose a time-sensitive utility model for Delay Tolerant Networks (DTNs), in which each message has an attached time-sensitive benefit that decays over time. The utility of a message is the benefit minus the transmission cost incurred by delivering the message. This model is analogous to...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Homing Spread: Community Home-Based Multi-Copy Routing in Mobile Social Networks

    A Mobile Social Network (MSN) is a special Delay Tolerant Network (DTN) composed of mobile nodes with social characteristics. Mobile nodes in MSNs generally visit community homes frequently, while other locations are visited less frequently. The authors propose a novel zero-knowledge MSN routing algorithm, Homing Spread (HS). The community homes...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Virtual Backbone Construction for Cognitive Radio Networks Without Common Control Channel

    The advantages of virtual backbones have been proven in wireless networks. In Cognitive Radio Networks (CRNs), virtual backbones can also play a critical role in both routing and data transport. However, the virtual backbone construction for CRNs is more challenging than for traditional wireless networks because of the opportunistic spectrum...

    Provided By Temple Skin Care

  • White Papers // Dec 2012

    A Hierarchical Naming System for Scalable Content Distribution in Large Networks

    The Internet has become a platform for delivering and consuming content. Additionally, mobile devices consume a significant chunk of content, which poses a unique challenge for provisioning efficient content delivery and is not addressed in contemporary infrastructures. In this paper, the authors present a naming system that provides Internet-scale content...

    Provided By Temple Skin Care

  • White Papers // Dec 2012

    Cache Content Placement Using Triangular Network Coding

    Video is one of the main causes of the dramatic increase in data traffic over cellular networks. Caching is an effective mechanism that decreases the download rate from base stations and, as a result, the load on the base station, by storing the most popular files or videos on the...

    Provided By Temple Skin Care

  • White Papers // Nov 2012

    An Efficient and Sustainable Self-Healing Protocol for Unattended Wireless Sensor Networks

    Due to the unattended operation nature, nodes in Unattended Wireless Sensor Networks (UWSNs) are susceptible to physical attacks. Once a sensor is compromised, the adversary will be able to learn all its secrets. While some previous works tried to address the node self-healing issue in UWSNs, little effort has been...

    Provided By Temple Skin Care

  • White Papers // Nov 2012

    Efficient Communications in Mobile Hybrid Wireless Networks

    In this paper, the authors present an efficient routing protocol for Mobile Hybrid Wireless Networks (MHWNs), which consists of an infrastructure wireless network and a few mobile ad hoc networks. MHWNs have several advantages over traditional wireless networks (such as cellular networks and WLANs). For example, MHWNs can achieve higher...

    Provided By Temple Skin Care

  • White Papers // Oct 2012

    Effective Channel Assignments in Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) promise to be the next generation of the key enabling technology that enables Dynamic Spectrum Access (DSA). The Channel Assignment (CA) problem is one of the most important issues in CRNs, with the objective of satisfying the interference constraints, and maximizing the number of nodes with...

    Provided By Temple Skin Care

  • White Papers // Sep 2012

    Improving Cooperative Trajectory Mapping Applications With Encounter-Based Error Correction

    Cooperative trajectory mapping is an emerging technique that allows users to create such a map by using data that is collected from each other's mobile phones. This technique has been proposed for many applications, such as people localization, public transportation tracking, and traffic monitoring. Unlike the traditional GPS, cooperative trajectory...

    Provided By Temple Skin Care

  • White Papers // Sep 2012

    Time-Based Proxy Re-Encryption Scheme for Secure Data Sharing in a Cloud Environment

    A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revocation, existing work combines Attribute-Based Encryption (ABE) and Proxy Re-Encryption (PRE) to delegate the Cloud Service Provider...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    A Survey on PHR Technology

    Personal Health Records are starting to get more attention, as they have the potential to improve the quality of care and reduce healthcare costs. In this paper, the concepts behind PHRs and the advantages of using PHRs compared to other methods of medical record keeping are discussed. In particular, platform...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    Security Analysis of Emerging Remote Obstetrics Monitoring Systems

    Remote obstetrics care monitoring is currently being used in many different countries to improve the quality of prenatal care, with promising results. The next generation of remote monitoring systems take advantage of improvements in wireless communications and mobile phone technologies to incorporate off-the-shelf equipment, such as Android Smartphones, into their...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    Body Sensor Networks in Fetal Monitoring With NFC Enabled Android Devices

    As many areas of the medical field are becoming more and more interested in telemedicine and outpatient care, the authors focused on obstetrics and the monitoring of fetal health as an area of medicine that could benefit greatly from Body Sensor Network (BSN) technology. In this paper, they explore some...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Deadline-Aware Broadcasting in Wireless Networks With Network Coding

    Broadcasting with network coding mixes different packets to minimize the number of transmissions, which improves the energy efficiency of wireless networks. On the other hand, delaying the transmissions increases coding opportunities at the intermediate nodes, but increases the delay of the packets. In this paper, the authors consider these two...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Adaptive Battery Charge Scheduling With Bursty Workloads

    Battery-powered wireless sensor devices need to be charged to provide the desired functionality after deployment. Task or even device failures can occur if the voltage of the battery is low. It is very important to schedule the recharge of batteries in time. Existing battery scheduling algorithms usually charge a battery...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    A Quick and Reliable Routing for Infrastructure Surveillance With Wireless Sensor Networks

    In many applications, WSNs are deployed to monitor the impact of the forces of nature on the infrastructure safety, e.g. bridge collapse detection. It is very important for the routing to send surveillance results without any unnecessary delay, which can be caused by extra transmissions in a detour or an...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    GFG-Assisted Human Tracking Using Smart Phones

    Mobile phones are increasingly being equipped with hardware and software services that allow them to determine their locations; however, support for building location-based applications remains a challenging problem. The most widely used localization technology in smart phones is GPS, but it rarely works indoors and provides low energy efficiency. Cell...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks With Unreliable Links

    Utility-based routing is a special routing approach, which takes the reliability and transmission costs into account at the same time. However, the existing utility-based routing algorithms have not yet considered the delivery delay. Thus, they cannot work well in duty-cycle Wireless sensor Networks (WSNs) since delay is an important factor...

    Provided By Temple Skin Care

  • White Papers // Jun 2012

    Towards Auction-Based HPC Computing in the Cloud

    Cloud computing is expanding widely in the world of IT infrastructure. This is due partly to the cost-saving effect of economies of scale. Fair market conditions can in theory provide a healthy environment to reflect the most reasonable costs of computations. While fixed cloud pricing provides an attractive low entry...

    Provided By Temple Skin Care

  • White Papers // Jun 2012

    Energy-Aware Scheduling for Frame-Based Tasks on Heterogeneous Multiprocessor Platforms

    Modern computational systems have adopted heterogeneous multiprocessors to increase their computation capability. As the performance increases, the energy consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust their supply voltages and execution frequencies to work on different power/energy levels, is...

    Provided By Temple Skin Care

  • White Papers // May 2012

    Two Matrices for Blakley's Secret Sharing Scheme

    The secret sharing scheme was invented by Adi Shamir and George Blakley independently in 1979. In a (k, n)-threshold linear secret sharing scheme, any k-out-of-n participants could recover the shared secret, and any less than k participants could not recover the secret. Shamir's secret sharing scheme is more popular than...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    Wormhole Defense for Cooperative Trajectory Mapping

    Cooperative trajectory mapping is an emerging technique that allows users to collaboratively map a person's movements without using GPS measurements in indoor scenarios. This is accomplished by letting users periodically transmit limited amount of information, collected from their mobile phones, to a central server for processing. Cooperative mapping solutions have...

    Provided By Temple Skin Care

  • White Papers // Apr 2012

    Ticket-Based Multiple Packet Broadcasting in Delay Tolerant Networks

    In Delay Tolerant Networks (DTNs), broadcasting is an important routing function that supports the distribution of data to all users in the network. Efficient broadcasting in DTNs is a challenging problem due to the lack of continuous network connectivity. In this paper, the authors consider the limited bandwidth scenario for...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    GFG-Assisted Human Tracking Using Smart Phones

    Mobile phones are increasingly being equipped with hardware and software services that allow them to determine their locations; however, support for building location-based applications remains a challenging problem. The most widely used localization technology in smart phones is GPS, but it rarely works indoors and provides low energy efficiency. Cell...

    Provided By Temple Skin Care

  • White Papers // Oct 2012

    Effective Channel Assignments in Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) promise to be the next generation of the key enabling technology that enables Dynamic Spectrum Access (DSA). The Channel Assignment (CA) problem is one of the most important issues in CRNs, with the objective of satisfying the interference constraints, and maximizing the number of nodes with...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    Social Feature-Based Multi-Path Routing in Delay Tolerant Networks

    Most routing protocols for delay tolerant networks resort to the sufficient state information, including trajectory and contact information, to ensure routing efficiency. However, state information tends to be dynamic and hard to obtain without a global and/or long-term collection process. In this paper, the authors use the internal social features...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    An Opportunistic Resource Sharing and Topology-Aware Mapping Framework for Virtual Networks

    Network virtualization provides a promising way to overcome Internet ossification. A major challenge is virtual network mapping, i.e., how to embed multiple virtual network requests with resource constraints into a substrate network, such that physical resources are utilized in an efficient and effective manner. Since this problem is known to...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted traffic from being forwarded in Wireless Sensor Networks (WSNs). To provide this service, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    Encounter-Based Noise Cancelation for Cooperative Trajectory Mapping

    Cooperative trajectory mapping is an emerging technique that allows users to create a map by using data collected from each participant's mobile phones. Unlike the traditional localization problem, where GPS is usually required, cooperative mapping only requires information about the relative distance and direction from the previously reported position. In...

    Provided By Temple Skin Care

  • White Papers // Mar 2012

    Universal Opportunistic Routing Scheme Using Network Coding

    Recent research has shown that the performance of opportunistic routing and network coding in wireless networks is greatly impacted by the correlation among the links. However, it is difficult to measure the correlation among the links, especially because of the time-varying behavior of the wireless links. Therefore, it is crucial...

    Provided By Temple Skin Care

  • White Papers // Mar 2012

    A Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth Advertisement Dissemination on Smart Mobile Devices

    The recent penetration of smart mobile devices into the consumer market sets a stage for novel network applications. In particular, the authors envision a paradigm shift in the commercial advertising model facilitated by the widespread use of these devices: advertisements circulate in a word-of-mouth fashion among device users and reach...

    Provided By Temple Skin Care

  • White Papers // Jun 2012

    Energy-Aware Scheduling for Frame-Based Tasks on Heterogeneous Multiprocessor Platforms

    Modern computational systems have adopted heterogeneous multiprocessors to increase their computation capability. As the performance increases, the energy consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust their supply voltages and execution frequencies to work on different power/energy levels, is...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks With Unreliable Links

    Utility-based routing is a special routing approach, which takes the reliability and transmission costs into account at the same time. However, the existing utility-based routing algorithms have not yet considered the delivery delay. Thus, they cannot work well in duty-cycle Wireless sensor Networks (WSNs) since delay is an important factor...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    A Quick and Reliable Routing for Infrastructure Surveillance With Wireless Sensor Networks

    In many applications, WSNs are deployed to monitor the impact of the forces of nature on the infrastructure safety, e.g. bridge collapse detection. It is very important for the routing to send surveillance results without any unnecessary delay, which can be caused by extra transmissions in a detour or an...

    Provided By Temple Skin Care

  • White Papers // Apr 2012

    Clock-Based Proxy Re-Encryption Scheme in Unreliable Clouds

    In this paper, the authors propose a Clock-based Proxy Re-Encryption (C-PRE) scheme to achieve fine-grained access control and scalable user revocation in unreliable clouds. Their scheme, which is built on top of Cipher-text-Policy Attribute-Based Encryption (CP-ABE) and Proxy Re-Encryption (PRE), allows the data owner and the cloud to share a...

    Provided By Temple Skin Care

  • White Papers // Feb 2012

    Cooperative Trajectory-Based Map Construction

    Map construction is an integral part of many location-based services. In this paper, the authors propose a Feedback based Heuristic Map Construction Algorithm (FHMCA). This is a lightweight, cooperative, map construction technique which can accurately capture the unique characteristics of each intersection and the length of every road without requiring...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    A Joint Replication-Migration-Based Routing in Delay Tolerant Networks

    Delay Tolerant Networks (DTNs) use mobility assisted routing, where nodes carry, store, and forward data to each other in order to overcome the intermittent connectivity and limited network capacity of this type of network. In this paper, the authors propose a routing protocol that includes two mechanisms: message replication and...

    Provided By Temple Skin Care

  • White Papers // Jan 2012

    A Connectivity-Based Popularity Prediction Approach for Social Networks

    In social media websites, such as Twitter and Digg, certain content will attract much more visitors than others. Predicting which content will become popular is of interest to website owners and market analysts. In this paper, the authors present a novel technique to predict popularity using the connection features of...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Deadline-Aware Broadcasting in Wireless Networks With Network Coding

    Broadcasting with network coding mixes different packets to minimize the number of transmissions, which improves the energy efficiency of wireless networks. On the other hand, delaying the transmissions increases coding opportunities at the intermediate nodes, but increases the delay of the packets. In this paper, the authors consider these two...

    Provided By Temple Skin Care

  • White Papers // Jul 2012

    Adaptive Battery Charge Scheduling With Bursty Workloads

    Battery-powered wireless sensor devices need to be charged to provide the desired functionality after deployment. Task or even device failures can occur if the voltage of the battery is low. It is very important to schedule the recharge of batteries in time. Existing battery scheduling algorithms usually charge a battery...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    A Survey on PHR Technology

    Personal Health Records are starting to get more attention, as they have the potential to improve the quality of care and reduce healthcare costs. In this paper, the concepts behind PHRs and the advantages of using PHRs compared to other methods of medical record keeping are discussed. In particular, platform...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    Security Analysis of Emerging Remote Obstetrics Monitoring Systems

    Remote obstetrics care monitoring is currently being used in many different countries to improve the quality of prenatal care, with promising results. The next generation of remote monitoring systems take advantage of improvements in wireless communications and mobile phone technologies to incorporate off-the-shelf equipment, such as Android Smartphones, into their...

    Provided By Temple Skin Care

  • White Papers // Aug 2012

    Body Sensor Networks in Fetal Monitoring With NFC Enabled Android Devices

    As many areas of the medical field are becoming more and more interested in telemedicine and outpatient care, the authors focused on obstetrics and the monitoring of fetal health as an area of medicine that could benefit greatly from Body Sensor Network (BSN) technology. In this paper, they explore some...

    Provided By Temple Skin Care

  • White Papers // May 2012

    Two Matrices for Blakley's Secret Sharing Scheme

    The secret sharing scheme was invented by Adi Shamir and George Blakley independently in 1979. In a (k, n)-threshold linear secret sharing scheme, any k-out-of-n participants could recover the shared secret, and any less than k participants could not recover the secret. Shamir's secret sharing scheme is more popular than...

    Provided By Temple Skin Care

  • White Papers // May 2012

    A Distributed Login Framework for Semi-Structured Peer-to-Peer Networks

    In Peer-To-Peer (P2P) networks, security is a challenging issue due to decentralization. In this paper, the authors propose an effective distributed login framework for P2P networks. User profile availability is a critical issue in P2P networks. Within the distributed login framework, they propose a new Reed-Solomon erasure code scheme leveraging...

    Provided By Temple Skin Care

  • White Papers // Dec 2012

    Cache Content Placement Using Triangular Network Coding

    Video is one of the main causes of the dramatic increase in data traffic over cellular networks. Caching is an effective mechanism that decreases the download rate from base stations and, as a result, the load on the base station, by storing the most popular files or videos on the...

    Provided By Temple Skin Care

  • White Papers // Nov 2012

    An Efficient and Sustainable Self-Healing Protocol for Unattended Wireless Sensor Networks

    Due to the unattended operation nature, nodes in Unattended Wireless Sensor Networks (UWSNs) are susceptible to physical attacks. Once a sensor is compromised, the adversary will be able to learn all its secrets. While some previous works tried to address the node self-healing issue in UWSNs, little effort has been...

    Provided By Temple Skin Care

  • White Papers // Nov 2012

    Efficient Communications in Mobile Hybrid Wireless Networks

    In this paper, the authors present an efficient routing protocol for Mobile Hybrid Wireless Networks (MHWNs), which consists of an infrastructure wireless network and a few mobile ad hoc networks. MHWNs have several advantages over traditional wireless networks (such as cellular networks and WLANs). For example, MHWNs can achieve higher...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Building a Private HPC Cloud for Compute and Data-Intensive Applications

    Traditional HPC (High Performance Computing) clusters are best suited for well-formed calculations. The orderly batch-oriented HPC cluster offers maximal potential for performance per application, but limits resource efficiency and user flexibility. An HPC cloud can host multiple virtual HPC clusters, giving the scientists unprecedented flexibility for research and development. With...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Efficient Symbol-Level Transmission in Error-Prone Wireless Networks

    Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, the authors consider a novel retransmission approach based on the importance of the bits (symbols). They study the problem of maximizing the total...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Energy and Bandwidth-Efficient Wireless Sensor Networks for Monitoring High-Frequency Events

    Wireless Sensor Networks (WSNs) are mostly deployed to detect events (i.e., objects or physical changes) at a high/low frequency sampling that is usually adapted by a central unit (or a sink), thus requiring additional resource usage in WSNs. However, the problem of autonomous adaptive sampling regarding the detection of events...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework

    The buzz-word big-data (application) refers to the large-scale distributed applications that work on unprecedentedly large data sets. Google's MapReduce framework and Apache's Hadoop, its open-source implementation, are the defacto software system for big-data applications. An observation regarding these applications is that they generate a large amount of intermediate data, and...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    TOUR: Time-Sensitive Opportunistic Utility-Based Routing in Delay Tolerant Networks

    In this paper, the authors propose a time-sensitive utility model for Delay Tolerant Networks (DTNs), in which each message has an attached time-sensitive benefit that decays over time. The utility of a message is the benefit minus the transmission cost incurred by delivering the message. This model is analogous to...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Virtual Backbone Construction for Cognitive Radio Networks Without Common Control Channel

    The advantages of virtual backbones have been proven in wireless networks. In Cognitive Radio Networks (CRNs), virtual backbones can also play a critical role in both routing and data transport. However, the virtual backbone construction for CRNs is more challenging than for traditional wireless networks because of the opportunistic spectrum...

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Homing Spread: Community Home-Based Multi-Copy Routing in Mobile Social Networks

    A Mobile Social Network (MSN) is a special Delay Tolerant Network (DTN) composed of mobile nodes with social characteristics. Mobile nodes in MSNs generally visit community homes frequently, while other locations are visited less frequently. The authors propose a novel zero-knowledge MSN routing algorithm, Homing Spread (HS). The community homes...

    Provided By Temple Skin Care

  • White Papers // Feb 2013

    Trade-Off Between Redundancy and Feedback in Wireless Network Communication

    Feedback is an important control mechanism that provides reliability in most wireless network protocols. However, feedback incurs some overhead, especially in lossy network environments. Many previous works on reliable communication neglect the cost of the feedback messages. In this paper, the authors study the problem of minimum-cost reliable transmission over...

    Provided By Temple Skin Care

  • White Papers // Sep 2012

    Improving Cooperative Trajectory Mapping Applications With Encounter-Based Error Correction

    Cooperative trajectory mapping is an emerging technique that allows users to create such a map by using data that is collected from each other's mobile phones. This technique has been proposed for many applications, such as people localization, public transportation tracking, and traffic monitoring. Unlike the traditional GPS, cooperative trajectory...

    Provided By Temple Skin Care

  • White Papers // Apr 2013

    Crowdsensing Maps of On-Street Parking Spaces

    It has been estimated that traffic congestion costs the world economy hundreds of billions of dollars each year, increases pollution, and has a negative impact on the overall quality of life in metropolitan areas. A significant part of congestion in urban areas is due to vehicles searching for on-street parking....

    Provided By Temple Skin Care

  • White Papers // Jan 2013

    Network Coding Techniques for Wireless and Sensor Networks

    Network coding is a technique where relay nodes mix packets using mathematical operations, which reduces the number of transmitted packets. Network coding was first proposed for wired networks to solve the bottleneck problem and to in-crease the throughput. However, the broadcast nature of wireless networks and the diversity of the...

    Provided By Temple Skin Care

  • White Papers // Aug 2013

    A Lightweight Defense Scheme for Mobile Phishing

    Recent years have witnessed the increasing threat of phishing attacks on mobile platforms. In fact, mobile phishing is more dangerous due to the limitations of mobile phones and the mobile user habits. Existing schemes designed for phishing attacks on computers/laptops cannot effectively address phishing attacks on mobile devices. This paper...

    Provided By Temple Skin Care

  • White Papers // Jun 2012

    Towards Auction-Based HPC Computing in the Cloud

    Cloud computing is expanding widely in the world of IT infrastructure. This is due partly to the cost-saving effect of economies of scale. Fair market conditions can in theory provide a healthy environment to reflect the most reasonable costs of computations. While fixed cloud pricing provides an attractive low entry...

    Provided By Temple Skin Care