Texas A&M International University

Displaying 1-40 of 62 results

  • White Papers // Mar 2014

    QuickRelease: A Throughput-oriented Approach to Release Consistency on GPUs

    Graphics Processing Units (GPUs) have specialized throughput-oriented memory systems optimized for streaming writes with scratchpad memories to capture locality explicitly. Expanding the utility of GPUs beyond graphics encourages designs that simplify programming (e.g., using caches instead of scratchpads) and better support irregular applications with finer-grain synchronization. The authors' hypothesis is...

    Provided By Texas A&M International University

  • White Papers // Feb 2014

    Weakly Secure Regenerating Codes for Distributed Storage

    The authors consider the problem of secure distributed data storage under the paradigm of weak security, in which no meaningful information is leaked to the eavesdropper. More specifically, the eavesdropper cannot get any information about any individual data packet or a small group of packets. The key benefit of the...

    Provided By Texas A&M International University

  • White Papers // Nov 2013

    Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis

    Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android apps. An important part in the...

    Provided By Texas A&M International University

  • White Papers // Sep 2013

    LumiNOC: A Power-Efficient, High-Performance, Photonic Network-on-Chip for Future Parallel Architectures

    To meet energy-efficient performance demands, the computing industry has moved to parallel computer architectures, such as Chip Multi-Processors (CMPs), internally interconnected via Networks-on-Chip (NoC) to meet growing communication needs. Achieving scaling performance as core counts increase to the hundreds in future CMPs, however, will require high performance, yet energy-efficient interconnects....

    Provided By Texas A&M International University

  • White Papers // Aug 2013

    AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks

    Among the leading reference implementations of the Software Defined Networking (SDN) paradigm is the OpenFlow framework, which decouples the control plane into a centralized application. In this paper, the authors consider two aspects of OpenFlow that pose security challenges, and they propose two solutions that could address these concerns. The...

    Provided By Texas A&M International University

  • White Papers // Jun 2013

    E-AMOM: An Energy-Aware Modeling and Optimization Methodology for Scientific Applications

    In this paper, the authors present the Energy-Aware Modeling and Optimization Methodology (E-AMOM) framework, which develops models of runtime and power consumption based upon performance counters and uses these models to identify energy-based optimizations for scientific applications. E-AMOM utilizes predictive models to employ runtime Dynamic Voltage and Frequency Scaling (DVFS)...

    Provided By Texas A&M International University

  • White Papers // May 2013

    The Index Coding Problem: A Game-Theoretical Perspective

    The Index Coding problem has recently attracted a significant interest from the research community. In this problem, a server needs to deliver a set of packets to a group of wireless clients over a noiseless broadcast channel. Each client requests a subset of packets and has another subset given to...

    Provided By Texas A&M International University

  • White Papers // May 2013

    Don't Let RAID Raid the Lifetime of Your SSD Array

    Parity protection at system level is typically employed to compose reliable storage systems. However, careful consideration is required when SSD based systems employ parity protection. First, additional writes are required for parity updates. Second, parity consumes space on the device, which results in write amplification from less efficient garbage collection...

    Provided By Texas A&M International University

  • White Papers // Apr 2013

    First-Passage Time and Large-Deviation Analysis for Erasure Channels With Memory

    This paper considers the performance of digital communication systems transmitting messages over finite-state erasure channels with memory. Information bits are protected from channel erasures using error-correcting codes; successful receptions of code-words are acknowledged at the source through instantaneous feedback. The primary focus of this research is on delay-sensitive applications, codes...

    Provided By Texas A&M International University

  • White Papers // Apr 2013

    AUTOVAC: Towards Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization

    Malware often contains many system-resource sensitive condition checks to avoid any duplicate infection, make sure to obtain required resources, or try to infect only targeted computers, etc. If the authors are able to extract the system resource constraints from malware code, and manipulate the environment state as vaccines, they would...

    Provided By Texas A&M International University

  • White Papers // Apr 2013

    Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Large-Scale Multithreaded BlueGene/Q Supercomputer

    In this paper, the authors investigate the performance characteristics of five hybrid MPI/OpenMP scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake simulation PEQdyna, an aerospace application PMLB and a 3D particle-in-cell application GTC) on a large-scale multithreaded BlueGene/Q supercomputer at Argonne National laboratory, and quantify the...

    Provided By Texas A&M International University

  • White Papers // Mar 2013

    E-LPG: Energy Efficient Location Privacy Scheme Against Global Attackers in Sensor Networks

    Many sensor network security schemes protect the content of messages, while the contextual information is left vulnerable by disclosing the location of the monitored objects. Preserving location privacy is important and one of the most challenging issues in many mission critical sensor network applications. Prior solutions are mostly designed to...

    Provided By Texas A&M International University

  • White Papers // Feb 2013

    An Energy-Aware Protocol for Self-Organizing Heterogeneous LTE Systems

    This paper studies the problem of self-organizing heterogeneous LTE systems. The authors propose a model that jointly considers several important characteristics of heterogeneous LTE system, including the usage of Orthogonal Frequency Division Multiple Access (OFDMA), the frequency-selective fading for each link, the interference among different links, and the different transmission...

    Provided By Texas A&M International University

  • White Papers // Feb 2013

    Design of Optimal LDPC Code for the System of GMSK Concatenated with LDPC Codes

    GMSK is continuous-phase signals, which pre-filters incoming data with Gaussion low-band filter. This paper mainly concerns on the continuous phase modulation system of GMSK concatenated with LDPC codes. Decomposing GMSK signal into differential coding and PAM modulating manner, the authors analyze the iterative demodulating and decoding principle and design optimal...

    Provided By Texas A&M International University

  • White Papers // Jan 2013

    FRESCO: Modular Composable Security Services for Software-Defined Networks

    OpenFlow is an open standard that has gained tremendous interest in the last few years within the network community. It is an embodiment of the software-defined networking paradigm, in which higher-level flow routing decisions are derived from a control layer that, unlike classic network switch implementations, is separated from the...

    Provided By Texas A&M International University

  • White Papers // Jan 2013

    NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System

    Comment spam has become a popular means for spammers to attract direct visits to target websites, or to manipulate search ranks of the target websites. Through posting a small number of spam messages on each victim website (e.g., normal websites such as forums, wikis, guest-books, and blogs, which the authors...

    Provided By Texas A&M International University

  • White Papers // Dec 2012

    Incentives for P2P-Assisted Content Distribution: If You Can't Beat 'Em, Join 'Em

    The rapid growth of content distribution on the Internet has brought with it proportional increases in the costs of distributing content. Adding to distribution costs is the fact that digital content is easily duplicable, and hence can be shared in an illicit Peer-To-Peer (P2P) manner that generates no revenue for...

    Provided By Texas A&M International University

  • White Papers // Dec 2012

    A Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding

    This paper studies the problem of content distribution in wireless peer-to-peer networks where all nodes are selfish and non-cooperative. The authors propose a model that considers both the broadcast nature of wireless channels and the incentives of nodes, where each node aims to increase its own download rate and reduce...

    Provided By Texas A&M International University

  • White Papers // Nov 2012

    Joint Spectrum and Power Efficiencies Optimization for Statistical QoS Provisionings in Wireless Networks

    Spectrum and power efficiencies are both crucial to design efficient wireless networks. In past two decades, spectrum and power efficiencies of wireless networks are optimized separately. However, to increase the spectrum efficiency and reduce the energy consumption, it is necessary to jointly optimize spectrum and power efficiencies of wireless networks....

    Provided By Texas A&M International University

  • White Papers // Nov 2012

    A Novel Security-Oriented Cooperative Scheme for Wireless Relay Networks in Presence of Eavesdroppers

    In order to conserve energy and achieve better Quality of Service (QoS) provisioning, this paper proposes a Novel Security-Oriented Cooperative (NSOC) scheme for distributed wireless relay networks in presence of eavesdroppers. The authors' scheme includes two parts. In part one, they model the wireless relay network and analyze the secure...

    Provided By Texas A&M International University

  • White Papers // Sep 2012

    CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks (or: How to Provide Security Monitoring as a Service in Clouds?)

    Cloud computing is becoming a popular paradigm. Many recent new services are based on cloud environments, and a lot of people are using cloud networks. Since many diverse hosts and network configurations coexist in a cloud network, it is essential to protect each of them in the cloud network from...

    Provided By Texas A&M International University

  • White Papers // Jul 2012

    Bit-Fixing Codes for Multi-Level Cells

    Multi-Level Cell (MLC) nonvolatile memories have become increasing important for storage in recent years. A well-known example is flash memory, where cells with q = 4 and 8 levels are already widely used. Emerging nonvolatile memories, such as phase-change memory, are also embracing the MLC technology. Generally speaking, every cell...

    Provided By Texas A&M International University

  • White Papers // Jun 2012

    PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks

    Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. While most current related paper focuses on measuring or detecting specific search poisoning attacks in the crawled...

    Provided By Texas A&M International University

  • White Papers // Jun 2012

    Tightening the Net: Examining and Demonstrating Commonly Available Network Security Tools

    Network security tools must be developed and improved rapidly to defend against increasingly sophisticated and determined attackers. This paper examines the rationale and methodology behind \"Defense in depth\" network security systems, the design and functioning of these systems, and provides examples of network security tools that can be configured and...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Reactive Relay Selection in Underlay Cognitive Networks With Fixed Gain Relays

    Best relay selection is a bandwidth efficient technique for multiple relay environments without compromising the system performance. The problem of relay selection is more challenging in underlay cognitive networks due to strict interference constraints to the primary users. Generally, relay selection is done on the basis of maximum end-to-end Signal...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Delay-Constrained Gaussian Relay Channel With Energy Harvesting Nodes

    This paper considers the use of energy harvesters, instead of conventional time-invariant energy sources, in wireless cooperative communication. For the purpose of exposition, the authors study the classic three-node Gaussian relay channel with Decode-and-Forward (DF) relaying, in which the source and relay nodes transmit with power drawn from energy-harvesting sources....

    Provided By Texas A&M International University

  • White Papers // May 2012

    A Density Evolution Based Framework for Dirty Paper Code Design Using TCQ and Multilevel LDPC Codes

    The authors propose a density evolution based dirty-paper code design framework that combines trellis coded quantization with multi-level Low-Density Parity-Check (LDPC) codes. Unlike existing design techniques based on Gaussian approximation and EXIT charts, the proposed framework tracks the empirically collected Log-Likelihood Ratio (LLR) distributions at each iteration, and employs density...

    Provided By Texas A&M International University

  • White Papers // May 2012

    QoS Driven Power Allocation Over Full-Duplex Wireless Links

    The authors propose the Quality-of-Service (QoS) driven power allocation scheme for full-duplex wireless links. By integrating information theory with the principle of effective capacity, they build two models - Local Transmit Power Related Self-interference (LTPRS) model and Local Transmit Power Unrelated Self-interference (LTPUS) model to analyze the fullduplex transmission, respectively....

    Provided By Texas A&M International University

  • White Papers // May 2012

    Self-Organized Resource Allocation in LTE Systems With Weighted Proportional Fairness

    The authors consider the problem of LTE network self organization and optimization of resource allocation. One particular challenge for LTE systems is that, by applying OFDMA, a transmission may use multiple resource blocks scheduled over the frequency and time. There are three key components involved in the resource allocation and...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Maximizing Effective Capacity Over Wireless Links Under Average and Peak Power Constraints

    The authors propose the Quality-of-Service (QoS) driven power allocation scheme for wireless links under average and peak power constraints. By integrating information theory with the principle of effective capacity, their proposed scheme aims at maximizing the system throughput subject to a given delay-QoS constraint. Over the block fading channel, they...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Robust Beamforming With Channel Uncertainty for Two-Way Relay Networks

    This paper presents the design of a robust beamforming scheme for a two-way relay network, composed of one multi-antenna relay and two single-antenna terminals, with the consideration of channel estimation errors. Given the assumption that the channel estimation error is within a certain range, the authors aim to minimize the...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Threshold Saturation of Spatially-Coupled Codes on Intersymbol-Interference Channels

    Recently, it has been observed that terminated LowDensity-Parity-Check (LDPC) convolutional codes (or spatially-coupled codes) appear to approach the capacity universally across the class of binary memory-less channels. This is facilitated by the "Threshold saturation" effect whereby the Belief-Propagation (BP) threshold of the spatially-coupled ensemble is boosted to the Maximum A-Posteriori...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Harnessing Multiple Wireless Interfaces for Guaranteed QoS in Proximate P2P Networks

    The authors consider the problem of content distribution to a group of cooperative wireless peer devices that desire the same block of information. The QoS metric is that peers are all required to receive the block by a fixed deadline, with a certain target probability. The block is divided into...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Performance Modeling of Hybrid MPI/OpenMP Scientific Applications on Large-Scale Multicore Supercomputers

    In this paper, the authors present a performance modeling framework based on memory bandwidth contention time and a parameterized communication model to predict the performance of OpenMP, MPI and hybrid applications with weak scaling on three large-scale multicore supercomputers: IBM POWER4, POWER5+ and BlueGene/P, and analyze the performance of these...

    Provided By Texas A&M International University

  • White Papers // Apr 2012

    Analyzing Spammer's Social Networks for Fun and Profit

    In this paper, the authors perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community, they find that criminal accounts tend to be socially connected, forming a small-world network. They also find that criminal hubs, sitting in the...

    Provided By Texas A&M International University

  • White Papers // Mar 2012

    Exploiting Superpages in a Nonvolatile Memory File System

    Emerging nonvolatile memory technologies (sometimes referred as Storage Class Memory (SCM)), are poised to close the enormous performance gap between persistent storage and main memory. The SCM devices can be attached directly to memory bus and accessed like normal DRAM. It becomes then possible to exploit memory management hardware resources...

    Provided By Texas A&M International University

  • White Papers // Feb 2012

    SWAPP: A Framework for Performance Projections of HPC Applications Using Benchmarks

    Surrogate-based Workload Application Performance Projection (SWAPP) is a framework for performance projections of High Performance Computing (HPC) applications using benchmark data. Performance projections of HPC applications onto various hardware platforms are important for hardware vendors and HPC users. The projections aid hardware vendors in the design of future systems and...

    Provided By Texas A&M International University

  • White Papers // Jan 2012

    EFFORT: Efficient and Effective Bot Malware Detection

    To detect bots, a lot of detection approaches have been proposed at host or network level so far and both approaches have clear advantages and disadvantages. In this paper, the authors propose effort, a new host-network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both...

    Provided By Texas A&M International University

  • White Papers // Dec 2011

    Shadow Attacks: Automatically Evading System-Call-Behavior Based Malware Detection

    Contemporary malware makes extensive use of different techniques such as packing, code obfuscation, polymorphism, and metamorphism, to evade signature-based detection. Traditional signature-based detection technique is hard to catch up with latest malware or unknown malware. Behavior-based detection models are being investigated as a new methodology to defeat malware. This kind...

    Provided By Texas A&M International University

  • White Papers // Nov 2011

    Statistical Quality Control Approaches to Network Intrusion Detection

    In the study of network intrusion, much attention has been drawn to on-time detection of intrusion to safeguard public and private interest and to capture the law-breakers. Even though various methods have been found in literature, some situations warrant one to determine intrusions of network in real-time to prevent further...

    Provided By Texas A&M International University

  • White Papers // Feb 2012

    SWAPP: A Framework for Performance Projections of HPC Applications Using Benchmarks

    Surrogate-based Workload Application Performance Projection (SWAPP) is a framework for performance projections of High Performance Computing (HPC) applications using benchmark data. Performance projections of HPC applications onto various hardware platforms are important for hardware vendors and HPC users. The projections aid hardware vendors in the design of future systems and...

    Provided By Texas A&M International University

  • White Papers // May 2011

    Dynamically Reconfigurable Architecture for a Driver Assistant System

    Application-specific programmable processors are increasingly being replaced by FPGAs, which offer high levels of logic density, rich sets of embedded hardware blocks, and a high degree of customizability and reconfigurability. New FPGA features such as Dynamic Partial Reconfiguration (DPR) can be leveraged to reduce resource utilization and power consumption while...

    Provided By Texas A&M International University

  • White Papers // Sep 2010

    Multithreaded Asynchronous Graph Traversal for In-Memory and Semi-External Memory

    Processing large graphs is becoming increasingly important for many domains such as social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do not scale with increasing graph sizes. As a result, researchers have attempted to meet the growing data demands using parallel and external memory techniques. The authors present a...

    Provided By Texas A&M International University

  • White Papers // Sep 2013

    LumiNOC: A Power-Efficient, High-Performance, Photonic Network-on-Chip for Future Parallel Architectures

    To meet energy-efficient performance demands, the computing industry has moved to parallel computer architectures, such as Chip Multi-Processors (CMPs), internally interconnected via Networks-on-Chip (NoC) to meet growing communication needs. Achieving scaling performance as core counts increase to the hundreds in future CMPs, however, will require high performance, yet energy-efficient interconnects....

    Provided By Texas A&M International University

  • White Papers // Dec 2009

    Realistic Workload Characterization and Analysis for Networks-on-Chip Design

    As silicon device scaling trends have simultaneously increased transistor density while reducing component costs, architectures incorporating multiple communicating components are becoming more common. In these systems, Networks-on-Chip (NOCs) connect the components for communication and NOC design is critical to the performance and efficiency of the system. Typically, in NOC design...

    Provided By Texas A&M International University

  • White Papers // Jul 2009

    A Secure Dynamic Cryptographic and Encryption Protocol for Wireless Networks

    With the fast growth of wireless networking in population, security became an essential issue for data privacy. Encryption mechanisms relying on static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking by capturing wireless packets. Although new standards have been developed to fulfill this gap,...

    Provided By Texas A&M International University

  • White Papers // Jun 2012

    Tightening the Net: Examining and Demonstrating Commonly Available Network Security Tools

    Network security tools must be developed and improved rapidly to defend against increasingly sophisticated and determined attackers. This paper examines the rationale and methodology behind \"Defense in depth\" network security systems, the design and functioning of these systems, and provides examples of network security tools that can be configured and...

    Provided By Texas A&M International University

  • White Papers // Aug 2013

    AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks

    Among the leading reference implementations of the Software Defined Networking (SDN) paradigm is the OpenFlow framework, which decouples the control plane into a centralized application. In this paper, the authors consider two aspects of OpenFlow that pose security challenges, and they propose two solutions that could address these concerns. The...

    Provided By Texas A&M International University

  • White Papers // Jan 2012

    EFFORT: Efficient and Effective Bot Malware Detection

    To detect bots, a lot of detection approaches have been proposed at host or network level so far and both approaches have clear advantages and disadvantages. In this paper, the authors propose effort, a new host-network cooperated detection framework attempting to overcome shortcomings of both approaches while still keeping both...

    Provided By Texas A&M International University

  • White Papers // Apr 2010

    Who is Peeping at Your Passwords at Starbucks? - To Catch an Evil Twin Access Point

    In this paper, the authors consider the problem of \"Evil twin\" attacks in Wireless Local Area Networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi Access Point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can...

    Provided By Texas A&M International University

  • White Papers // Nov 2013

    Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis

    Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android apps. An important part in the...

    Provided By Texas A&M International University

  • White Papers // Apr 2012

    Analyzing Spammer's Social Networks for Fun and Profit

    In this paper, the authors perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community, they find that criminal accounts tend to be socially connected, forming a small-world network. They also find that criminal hubs, sitting in the...

    Provided By Texas A&M International University

  • White Papers // Jun 2012

    PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks

    Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. While most current related paper focuses on measuring or detecting specific search poisoning attacks in the crawled...

    Provided By Texas A&M International University

  • White Papers // Mar 2014

    QuickRelease: A Throughput-oriented Approach to Release Consistency on GPUs

    Graphics Processing Units (GPUs) have specialized throughput-oriented memory systems optimized for streaming writes with scratchpad memories to capture locality explicitly. Expanding the utility of GPUs beyond graphics encourages designs that simplify programming (e.g., using caches instead of scratchpads) and better support irregular applications with finer-grain synchronization. The authors' hypothesis is...

    Provided By Texas A&M International University

  • White Papers // Mar 2012

    Exploiting Superpages in a Nonvolatile Memory File System

    Emerging nonvolatile memory technologies (sometimes referred as Storage Class Memory (SCM)), are poised to close the enormous performance gap between persistent storage and main memory. The SCM devices can be attached directly to memory bus and accessed like normal DRAM. It becomes then possible to exploit memory management hardware resources...

    Provided By Texas A&M International University

  • White Papers // Jul 2012

    Bit-Fixing Codes for Multi-Level Cells

    Multi-Level Cell (MLC) nonvolatile memories have become increasing important for storage in recent years. A well-known example is flash memory, where cells with q = 4 and 8 levels are already widely used. Emerging nonvolatile memories, such as phase-change memory, are also embracing the MLC technology. Generally speaking, every cell...

    Provided By Texas A&M International University

  • White Papers // May 2013

    Don't Let RAID Raid the Lifetime of Your SSD Array

    Parity protection at system level is typically employed to compose reliable storage systems. However, careful consideration is required when SSD based systems employ parity protection. First, additional writes are required for parity updates. Second, parity consumes space on the device, which results in write amplification from less efficient garbage collection...

    Provided By Texas A&M International University

  • White Papers // Mar 2011

    The Architecture of the Nehalem Processor and Nehalem-EP SMP Platforms

    Nehalem is an implementation of the CISC Intel64 instruction specification based on 45nm and high-k + metal gate transistor technology. Nehalem micro-architectures and system platforms employ a number of state-of-the-art technologies which enable high computation rates for scientific and other demanding workloads. Nehalem based processors incorporate multiple cores, on-chip DDR3...

    Provided By Texas A&M International University

  • White Papers // Feb 2014

    Weakly Secure Regenerating Codes for Distributed Storage

    The authors consider the problem of secure distributed data storage under the paradigm of weak security, in which no meaningful information is leaked to the eavesdropper. More specifically, the eavesdropper cannot get any information about any individual data packet or a small group of packets. The key benefit of the...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Reactive Relay Selection in Underlay Cognitive Networks With Fixed Gain Relays

    Best relay selection is a bandwidth efficient technique for multiple relay environments without compromising the system performance. The problem of relay selection is more challenging in underlay cognitive networks due to strict interference constraints to the primary users. Generally, relay selection is done on the basis of maximum end-to-end Signal...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Delay-Constrained Gaussian Relay Channel With Energy Harvesting Nodes

    This paper considers the use of energy harvesters, instead of conventional time-invariant energy sources, in wireless cooperative communication. For the purpose of exposition, the authors study the classic three-node Gaussian relay channel with Decode-and-Forward (DF) relaying, in which the source and relay nodes transmit with power drawn from energy-harvesting sources....

    Provided By Texas A&M International University

  • White Papers // May 2012

    A Density Evolution Based Framework for Dirty Paper Code Design Using TCQ and Multilevel LDPC Codes

    The authors propose a density evolution based dirty-paper code design framework that combines trellis coded quantization with multi-level Low-Density Parity-Check (LDPC) codes. Unlike existing design techniques based on Gaussian approximation and EXIT charts, the proposed framework tracks the empirically collected Log-Likelihood Ratio (LLR) distributions at each iteration, and employs density...

    Provided By Texas A&M International University

  • White Papers // May 2012

    QoS Driven Power Allocation Over Full-Duplex Wireless Links

    The authors propose the Quality-of-Service (QoS) driven power allocation scheme for full-duplex wireless links. By integrating information theory with the principle of effective capacity, they build two models - Local Transmit Power Related Self-interference (LTPRS) model and Local Transmit Power Unrelated Self-interference (LTPUS) model to analyze the fullduplex transmission, respectively....

    Provided By Texas A&M International University

  • White Papers // May 2012

    Self-Organized Resource Allocation in LTE Systems With Weighted Proportional Fairness

    The authors consider the problem of LTE network self organization and optimization of resource allocation. One particular challenge for LTE systems is that, by applying OFDMA, a transmission may use multiple resource blocks scheduled over the frequency and time. There are three key components involved in the resource allocation and...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Maximizing Effective Capacity Over Wireless Links Under Average and Peak Power Constraints

    The authors propose the Quality-of-Service (QoS) driven power allocation scheme for wireless links under average and peak power constraints. By integrating information theory with the principle of effective capacity, their proposed scheme aims at maximizing the system throughput subject to a given delay-QoS constraint. Over the block fading channel, they...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Robust Beamforming With Channel Uncertainty for Two-Way Relay Networks

    This paper presents the design of a robust beamforming scheme for a two-way relay network, composed of one multi-antenna relay and two single-antenna terminals, with the consideration of channel estimation errors. Given the assumption that the channel estimation error is within a certain range, the authors aim to minimize the...

    Provided By Texas A&M International University

  • White Papers // Nov 2011

    Statistical Quality Control Approaches to Network Intrusion Detection

    In the study of network intrusion, much attention has been drawn to on-time detection of intrusion to safeguard public and private interest and to capture the law-breakers. Even though various methods have been found in literature, some situations warrant one to determine intrusions of network in real-time to prevent further...

    Provided By Texas A&M International University

  • White Papers // May 2012

    Threshold Saturation of Spatially-Coupled Codes on Intersymbol-Interference Channels

    Recently, it has been observed that terminated LowDensity-Parity-Check (LDPC) convolutional codes (or spatially-coupled codes) appear to approach the capacity universally across the class of binary memory-less channels. This is facilitated by the "Threshold saturation" effect whereby the Belief-Propagation (BP) threshold of the spatially-coupled ensemble is boosted to the Maximum A-Posteriori...

    Provided By Texas A&M International University

  • White Papers // Dec 2012

    A Non-Monetary Protocol for Peer-to-Peer Content Distribution in Wireless Broadcast Networks with Network Coding

    This paper studies the problem of content distribution in wireless peer-to-peer networks where all nodes are selfish and non-cooperative. The authors propose a model that considers both the broadcast nature of wireless channels and the incentives of nodes, where each node aims to increase its own download rate and reduce...

    Provided By Texas A&M International University

  • White Papers // Feb 2011

    Maximizing the Storage Capacity of Nonvolatile Memories

    The authors propose variable-level cell, a new data representation scheme, for nonvolatile memories (including flash memories, phase-change memories, etc.). They derive its storage capacity, and analyze its performance on rewriting data. For Non-Volatile Memories (NVMs) - including flash memories, Phase-Change Memories (PCMs), memristors, etc., - maximizing the storage capacity is...

    Provided By Texas A&M International University

  • White Papers // Aug 2009

    Information Representation and Coding for Flash Memories

    In this paper, the authors survey the recent results on information representation and coding for flash memories. Flash memories are a milestone in the development of the data storage technology. The applications of flash memories have expanded widely in recent years, and flash memories have become the dominating member in...

    Provided By Texas A&M International University

  • White Papers // Jan 2013

    FRESCO: Modular Composable Security Services for Software-Defined Networks

    OpenFlow is an open standard that has gained tremendous interest in the last few years within the network community. It is an embodiment of the software-defined networking paradigm, in which higher-level flow routing decisions are derived from a control layer that, unlike classic network switch implementations, is separated from the...

    Provided By Texas A&M International University

  • White Papers // Jan 2013

    NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System

    Comment spam has become a popular means for spammers to attract direct visits to target websites, or to manipulate search ranks of the target websites. Through posting a small number of spam messages on each victim website (e.g., normal websites such as forums, wikis, guest-books, and blogs, which the authors...

    Provided By Texas A&M International University

  • White Papers // Dec 2011

    Shadow Attacks: Automatically Evading System-Call-Behavior Based Malware Detection

    Contemporary malware makes extensive use of different techniques such as packing, code obfuscation, polymorphism, and metamorphism, to evade signature-based detection. Traditional signature-based detection technique is hard to catch up with latest malware or unknown malware. Behavior-based detection models are being investigated as a new methodology to defeat malware. This kind...

    Provided By Texas A&M International University

  • White Papers // Sep 2012

    CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks (or: How to Provide Security Monitoring as a Service in Clouds?)

    Cloud computing is becoming a popular paradigm. Many recent new services are based on cloud environments, and a lot of people are using cloud networks. Since many diverse hosts and network configurations coexist in a cloud network, it is essential to protect each of them in the cloud network from...

    Provided By Texas A&M International University

  • White Papers // Nov 2010

    Distributed Position Localization and Tracking (DPLT) of Malicious Nodes in Cluster Based Mobile Ad Hoc Networks (MANET)

    In this paper, a robust distributed malicious node detection and precise localization and tracking method is proposed for Cluster based Mobile Ad-hoc NETwork (MANET). Certificate Authority (CA) node is selected as the most stable node among trusted nodes, surrounded by Registration Authority nodes (RAs) in each cluster to generate the...

    Provided By Texas A&M International University

  • White Papers // Nov 2012

    Joint Spectrum and Power Efficiencies Optimization for Statistical QoS Provisionings in Wireless Networks

    Spectrum and power efficiencies are both crucial to design efficient wireless networks. In past two decades, spectrum and power efficiencies of wireless networks are optimized separately. However, to increase the spectrum efficiency and reduce the energy consumption, it is necessary to jointly optimize spectrum and power efficiencies of wireless networks....

    Provided By Texas A&M International University

  • White Papers // Nov 2012

    A Novel Security-Oriented Cooperative Scheme for Wireless Relay Networks in Presence of Eavesdroppers

    In order to conserve energy and achieve better Quality of Service (QoS) provisioning, this paper proposes a Novel Security-Oriented Cooperative (NSOC) scheme for distributed wireless relay networks in presence of eavesdroppers. The authors' scheme includes two parts. In part one, they model the wireless relay network and analyze the secure...

    Provided By Texas A&M International University

  • White Papers // Feb 2013

    An Energy-Aware Protocol for Self-Organizing Heterogeneous LTE Systems

    This paper studies the problem of self-organizing heterogeneous LTE systems. The authors propose a model that jointly considers several important characteristics of heterogeneous LTE system, including the usage of Orthogonal Frequency Division Multiple Access (OFDMA), the frequency-selective fading for each link, the interference among different links, and the different transmission...

    Provided By Texas A&M International University

  • White Papers // Feb 2011

    Dual Branch Transmit Switch-and-Stay Diversity for Underlay Cognitive Networks

    In this paper, the authors study applying dual branch transmit Switch-and-Stay Combining (SSC) technique for Underlay Cognitive Radio (UCR) networks. In UCR, the secondary user is allowed to share the spectrum with the primary (licensed) user under the condition that interference at the primary receiver is below a predetermined threshold....

    Provided By Texas A&M International University