Tsihai

Displaying 1-40 of 120 results

  • White Papers // Jan 2015

    Graph-Based Framework for Flexible Baseband Function Splitting and Placement in C-RAN

    The baseband-up Centralization architecture of Radio Access Networks (C-RANs) has recently been proposed to support efficient cooperative communications and reduce deployment and operational costs. However, the massive front haul bandwidth required to aggregate baseband samples from Remote Radio Heads (RRHs) to the central office incurs huge front hauling cost, and...

    Provided By Tsihai

  • White Papers // Apr 2014

    Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation

    Recently, recommender systems have attracted increased attention because of their ability to suggest appropriate choices to users based on intelligent prediction. As one of the most popular recommender system techniques, Collaborative Filtering (CF) achieves efficiency from the similarity measurement of users and items. However, existing similarity measurement methods have reduced...

    Provided By Tsihai

  • White Papers // Mar 2014

    Online Mechanism Design for Cloud Computing

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to...

    Provided By Tsihai

  • White Papers // Mar 2014

    State-of-the-Art in String Similarity Search and Join

    String similarity search and its variants are fundamental problems with many applications in areas such as data integration, data quality, computational linguistics, or bioinformatics. A plethora of methods have been developed over the last decades. Obtaining an overview of the state-of-the-art in this field is difficult, as results are published...

    Provided By Tsihai

  • White Papers // Feb 2014

    Floorplanning and Topology Generation for Application-Specific Network-on-Chip

    Network-on-Chip (NoC) architectures have been proposed as a promising alternative to classical bus-based communication architectures. In this paper, the authors propose a two phase's framework to solve application-specific NoCs topology generation problem. At floor-planning phase, they carry out partition driven floor-planning. At post-floor-planning phase, a heuristic method and a min-cost...

    Provided By Tsihai

  • White Papers // Dec 2013

    Data Profiling Revisited

    Data profiling comprises a broad range of methods to efficiently analyze a given data set. In a typical scenario, which mirrors the capabilities of commercial data profiling tools, tables of a relational database are scanned to derive metadata, such as data types and value patterns, completeness and uniqueness of columns,...

    Provided By Tsihai

  • White Papers // Nov 2013

    A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution,...

    Provided By Tsihai

  • White Papers // Sep 2013

    Cryptanalysis of GOST R Hash Function

    Hash functions are taking important roles in cryptography and have been used in many applications, e.g., digital signatures, authentications and message integrity. Since the break of MD5 and SHA-1, cryptographers have been searching for secure and efficient hash functions. Developed from GOST, GOST R is the hash function standard of...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Aug 2013

    3D-STAF: Scalable Temperature and Leakage Aware Floorplanning for Three-Dimensional Integrated Circuits

    Thermal issues are a primary concern in the Three-Dimensional (3D) Integrated Circuit (IC) design. Temperature, area, and wire length must be simultaneously optimized during 3D floorplanning, significantly increasing optimization complexity. Most existing floorplanners use combinatorial stochastic optimization techniques, hampering performance and scalability when used for 3D floorplanning. In this paper,...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Jun 2013

    Nearly Optimal Asynchronous Blind Rendezvous Algorithm for Cognitive Radio Networks

    Rendezvous is a fundamental process in Cognitive Radio Networks, through which a user establishes a link to communicate with a neighbor on a common channel. Most previous solutions use either a central controller or a Common Control Channel (CCC) to simplify the problem, which are inflexible and vulnerable to faults...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Mar 2013

    Design and Implementation of Secure Subnet Inside of Data Sensitive Network

    Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional Mandatory Access Control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Feb 2013

    Theoretical Analysis on Scale-Down Aware Service Allocation in Cloud Storage Systems

    Service allocation algorithms have been drawing popularity in cloud computing research community. There has been lots of research on improving service allocation schemes for high utilization, latency reduction and VM migration efficient, but few work focus on energy consumption affected by instance placement in data centers. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    Visual Exploration for Time Series Data Using Multivariate Analysis Method

    In the online teaching activities, there are various teaching data accumulated as time series and many methods to analyze the quality of teaching. But there are no such methods which can emphasize the status perception of the teaching-learning and the interaction between the teachers and students. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Jan 2013

    Greening Data Center Networks with Throughput-guaranteed Power-aware Routing

    Cloud based applications and services require high performance and strong reliability provided by data center networks. To overcome the problem of traditional tree based data center network, recently many new network architectures are proposed, such as Fat-Tree and BCube. They use aggressively over-provisioned network devices and links to achieve 1:1...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Dec 2012

    Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach

    Latency is a key service factor for user satisfaction. Consistency is in a trade-off relation with operation latency in the distributed and replicated scenario. Existing NoSQL stores guarantee either strong or weak consistencies but none provides the best consistency based on the response latency. In this paper, the authors introduce...

    Provided By Tsihai

  • White Papers // Nov 2012

    A Two-Layer Intra-Domain Routing Scheme for Named Data Networking

    Routing is undoubtedly the foundation of NDN's data transmission service. The authors propose a two-layer routing protocol for NDN,, which is composed of a Topology Maintaining (TM) layer and a Prefix Announcing (PA) layer. The underlying layer (TM) maintains the full topology of an NDN network domain and calculates the...

    Provided By Tsihai

  • White Papers // Nov 2012

    Spectrum-Efficient Coherent Optical Zero Padding OFDM for Future High-Speed Transport Networks

    By fully exploiting the optical channel properties, the authors propose in this paper the Coherent Optical Zero Padding Orthogonal Frequency Division Multiplexing (CO-ZP-OFDM) for future high-speed optical transport networks to increase the spectral efficiency and improve the system reliability. Unlike the periodically inserted training symbols in conventional optical OFDM systems,...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Nov 2012

    Detecting Prefix Hijackings in the Internet with Argus

    Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may hijack the traffic and devastate the Internet routing sys-tem, but it is unlikely that a secure BGP can be deployed in the near future to...

    Provided By Tsihai

  • White Papers // Nov 2012

    Meta-Service Design and Implementation for Content Delivery Network Cloud Environments

    Storage has emerged as a typical kind of service in the cloud environment as the Content Delivery Network (CDN) emerges and becomes widely-used. In this paper, the authors conducted a research on the management issues for such applications, and implemented some meta-services upon the underlying cloud services. The architecture of...

    Provided By Tsihai

  • White Papers // Sep 2012

    Open Wireless System Cloud: An Architecture for Future Wireless Communications System

    Open Wireless System Cloud (OWSC) is a radio access network architecture for future wireless communication systems with remote radio heads, centralized wireless computation on open platforms, and cooperative wireless signal processing and management. With centralized wireless signal processing, system capacity can be increased using emerging wireless techniques, such as cognitive...

    Provided By Tsihai

  • White Papers // Sep 2012

    Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction

    System virtualization provides low-cost, flexible and powerful executing environment for virtualized data centers, which plays an important role in the infrastructure of cloud computing. However, the virtualization also brings some challenges, particularly to the resource management and task scheduling. This paper proposes an efficient dynamic task scheduling scheme for virtualized...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jul 2012

    TCP with Hop-Oriented Network Coding in Multi-Radio Multi-Channel Wireless Mesh Networks

    In Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC WMNs), the performance of TCP significantly deteriorates when non-congestion packet losses occur. TCP-HONC is proposed in this paper to improve the performance of TCP with hop-oriented network coding in MRMC WMNs. It combines a block of inter- and intra-flow packets that share a...

    Provided By Tsihai

  • White Papers // Mar 2014

    State-of-the-Art in String Similarity Search and Join

    String similarity search and its variants are fundamental problems with many applications in areas such as data integration, data quality, computational linguistics, or bioinformatics. A plethora of methods have been developed over the last decades. Obtaining an overview of the state-of-the-art in this field is difficult, as results are published...

    Provided By Tsihai

  • White Papers // Dec 2013

    Data Profiling Revisited

    Data profiling comprises a broad range of methods to efficiently analyze a given data set. In a typical scenario, which mirrors the capabilities of commercial data profiling tools, tables of a relational database are scanned to derive metadata, such as data types and value patterns, completeness and uniqueness of columns,...

    Provided By Tsihai

  • White Papers // Mar 2009

    Adaptive Query Processing in Data Grids

    The data grid integrates wide-area autonomous data sources and provides users with a unified data query and processing infrastructure. Adapt data query and processing is required by data grids to provide better Quality of Services (QoS) to users and applications in spite of dynamically changing resources and environments. Existing AQP...

    Provided By Tsihai

  • White Papers // Feb 2009

    Block-Based Concurrent and Storage-Aware Data Streaming for Grid Applications With Lots of Small Files

    Data streaming management and scheduling is required by many grid computing applications, especially when the volume of data to be processed is extremely high while available storage is relatively limited. Big bulk of data from scientific experiments is usually partitioned into Lots Of Small Files (LOSF), bringing challenges to data...

    Provided By Tsihai

  • White Papers // Aug 2008

    Qualification Evaluation in Virtual Organizations Based on Fuzzy Analytic Hierarchy Process

    Conventional grid infrastructure implements CA to ensure security and authentication access control which is not flexible, while peer-to-peer applications are flexible enough but no evaluation system to ensure members in a virtual organization are proper and safe enough to corporate with each other. In this paper, the authors propose an...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Jan 2013

    Visual Exploration for Time Series Data Using Multivariate Analysis Method

    In the online teaching activities, there are various teaching data accumulated as time series and many methods to analyze the quality of teaching. But there are no such methods which can emphasize the status perception of the teaching-learning and the interaction between the teachers and students. In this paper, the...

    Provided By Tsihai

  • White Papers // Aug 2013

    3D-STAF: Scalable Temperature and Leakage Aware Floorplanning for Three-Dimensional Integrated Circuits

    Thermal issues are a primary concern in the Three-Dimensional (3D) Integrated Circuit (IC) design. Temperature, area, and wire length must be simultaneously optimized during 3D floorplanning, significantly increasing optimization complexity. Most existing floorplanners use combinatorial stochastic optimization techniques, hampering performance and scalability when used for 3D floorplanning. In this paper,...

    Provided By Tsihai

  • White Papers // Apr 2012

    Employing Checkpoint to Improve Job Scheduling in Large-Scale Systems

    The FCFS-based backfill algorithm is widely used in scheduling high-performance computer systems. The algorithm relies on runtime estimate of jobs which is provided by users. However, statistics show the accuracy of user-provided estimate is poor. Users are very likely to pro-vide a much longer runtime estimate than its real execution...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Sep 2012

    Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction

    System virtualization provides low-cost, flexible and powerful executing environment for virtualized data centers, which plays an important role in the infrastructure of cloud computing. However, the virtualization also brings some challenges, particularly to the resource management and task scheduling. This paper proposes an efficient dynamic task scheduling scheme for virtualized...

    Provided By Tsihai

  • White Papers // Sep 2009

    Reputation-Based QoS Provisioning in Cloud Computing Via Dirichlet Multinomial Model

    In cloud computing, users with different service requirement often need to negotiate with service providers subject to Service Level Agreement (SLA). The unique pay-as-you-go billing manner and different virtualization levels of cloud computing present challenges to resource provisioning for service providers. In this paper, based on the Dirichlet multinomial model,...

    Provided By Tsihai

  • White Papers // Jun 2009

    Cache Sharing Management for Performance Fairness in Chip Multiprocessors

    Resource sharing can cause unfair and unpredictable performance of concurrently executing applications in Chip Multi-Processors (CMP). The shared last-level cache is one of the most important shared resources because off-chip request latency may take a significant part of total execution cycles for data intensive applications. Instead of enforcing ideal performance...

    Provided By Tsihai

  • White Papers // Feb 2014

    Floorplanning and Topology Generation for Application-Specific Network-on-Chip

    Network-on-Chip (NoC) architectures have been proposed as a promising alternative to classical bus-based communication architectures. In this paper, the authors propose a two phase's framework to solve application-specific NoCs topology generation problem. At floor-planning phase, they carry out partition driven floor-planning. At post-floor-planning phase, a heuristic method and a min-cost...

    Provided By Tsihai

  • White Papers // Jul 2012

    ParaSplit: A Scalable Architecture on FPGA for Terabit Packet Classification

    Packet classification is a fundamental enabling function for various applications in switches, routers and firewalls. Due to their performance and scalability limitations, current packet classification solutions are insufficient in ad-dressing the challenges from the growing network bandwidth and the increasing number of new applications. This paper presents a scalable parallel...

    Provided By Tsihai

  • White Papers // Sep 2010

    Multi-Dimensional Packet Classification on FPGA: 100 Gbps and Beyond

    Multi-dimensional packet classification is a key task in network applications, such as firewalls, intrusion prevention and traffic management systems. With the rapid growth of network bandwidth, wire speed multi-dimensional packet classification has become a major challenge for next-generation network processing devices. In this paper, the authors present an FPGA-based architecture...

    Provided By Tsihai

  • White Papers // Aug 2011

    High-Performance Packet Classification on Multi-Core Network Processing Platforms

    Packet classification is crucial to the implementation of advanced network services that require the capability to distinguish traffic in different flows, such as access control in firewalls and protocol analysis in intrusion detection systems. This paper proposes a novel packet classification algorithm optimized for multi-core network processors. The proposed algorithm,...

    Provided By Tsihai

  • White Papers // Oct 2009

    Efficiency of Cache Mechanism for Network Processors

    With the explosion of network bandwidth and the ever-changing requirements for diverse network-based applications, the traditional processing architectures, i.e., General Purpose Processor (GPP) and Application Specific Integrated Circuits (ASIC) cannot provide sufficient flexibility and high performance at the same time. Thus, the Network Processor (NP) has emerged as an alternative...

    Provided By Tsihai

  • White Papers // Aug 2007

    Towards Optimized Packet Classification Algorithms for Multi-Core Network Processors

    In this paper, a novel packet classification scheme optimized for multi-core network processors is proposed. The algorithm, Explicit Cuttings (ExpCuts), adopts a hierarchical space aggregation technique to significantly reduce the memory usage. Consequently, without burst of memory usages, the time-consuming linear search in the conventional decision-tree based packet classification algorithms...

    Provided By Tsihai

  • White Papers // Dec 2010

    MOPED: Orchestrating Interprocess Message Data on CMPs

    Future CMPs will combine many simple cores with deep cache hierarchies. With more cores, cache resources per core are fewer, and must be shared carefully to avoid poor utilization due to conflicts and pollution. Explicit motion of data in these architectures, such as message passing, can provide hints about program...

    Provided By Tsihai

  • White Papers // Apr 2014

    Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation

    Recently, recommender systems have attracted increased attention because of their ability to suggest appropriate choices to users based on intelligent prediction. As one of the most popular recommender system techniques, Collaborative Filtering (CF) achieves efficiency from the similarity measurement of users and items. However, existing similarity measurement methods have reduced...

    Provided By Tsihai

  • White Papers // Jan 2015

    Graph-Based Framework for Flexible Baseband Function Splitting and Placement in C-RAN

    The baseband-up Centralization architecture of Radio Access Networks (C-RANs) has recently been proposed to support efficient cooperative communications and reduce deployment and operational costs. However, the massive front haul bandwidth required to aggregate baseband samples from Remote Radio Heads (RRHs) to the central office incurs huge front hauling cost, and...

    Provided By Tsihai

  • White Papers // Mar 2014

    Online Mechanism Design for Cloud Computing

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to...

    Provided By Tsihai

  • White Papers // May 2012

    For Robustness of Ultrasound TOA-Based Indoor Localization

    TOA-based ultrasound localization is an important technique for fine-grained location-based services. However, its positioning accuracy is sensitive to indoor environments. When radio signal for time synchronization is interfered or ultrasound propagates in Non-Line-Of-Sight (NLOS) path, the positioning accuracy decreases remarkably. System and algorithms for robust ultrasound TOA positioning are proposed....

    Provided By Tsihai

  • White Papers // Mar 2012

    Capacity and Spatial Correlation Measurements for Wideband Distributed MIMO Channel in Aircraft Cabin Environment

    In this paper, the authors present some channel measurement results of Distributed Multiple-Input Multiple-Output (D-MIMO) systems inside a MD-82 aircraft. Channel capacity and spatial correlation are analyzed from the measured channel matrix. Capacity results of 7 different systems (six D-MIMO systems and a SISO system) are discussed. It is found...

    Provided By Tsihai

  • White Papers // Oct 2011

    Authentication of Digital Streams

    The authors study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. Recently, many coding theory based protocols have been developed to treat the stream authentication problem over such a channel. In this paper, their goal...

    Provided By Tsihai

  • White Papers // May 2012

    Joint Power Allocation for Multi-Cell Distributed Antenna Systems With Large-Scale CSIT

    In this paper, the problem of joint Power Allocation (PA) for the downlink of a multi-cell Distributed Antenna System (DAS) is addressed. Motivated by practical applications, the authors focus on a reasonable scenario that only the large-scale Channel State Information at the Transmitter (CSIT) is available. Based on the observation...

    Provided By Tsihai

  • White Papers // May 2012

    Resource Allocation for Minimal Downlink Delay in Two-Way OFDM Relaying With Network Coding

    This paper investigates the resource allocation problem to minimize the downlink transmission delay under power constraints for two-way relay transmission using network coding over OFDM channels, where two sources with unbalanced traffic exchange their information via a relay node with network coding deployed. Since the explicit solution to this optimization...

    Provided By Tsihai

  • White Papers // May 2012

    Non-Data-Aided Distorted Constellation Estimation and Demodulation for mmWave Communications

    The signal constellation of 60 GHz millimeter wave (mmWave) communications is distorted by Power Amplifier (PA) nonlinearity seriously and the Bit Error Rate (BER) performance declines, due to the huge bandwidth and high Equivalent Isotropic Radiated Power (EIRP), especially for quadrature amplitude modulation (QAM) signals. This paper aims at Non-Data-Aided...

    Provided By Tsihai

  • White Papers // May 2012

    Optimizing Push Scheduling Algorithm Based on Network Coding for Mesh Peer-to-Peer Live Streaming

    In most large-scale Peer-To-Peer (P2P) live streaming systems, mesh structures are constructed to provide robustness in dynamic P2P environment. The pull scheduling algorithm is widely used in this mesh structure, but it restricts the performance of entire system. Recently, network coding is introduced in mesh P2P streaming system to improve...

    Provided By Tsihai

  • White Papers // May 2012

    Characterizing User Access Behaviors in Mobile TV System

    Video traffic will soon become the majority of the data traffic in mobile networks. However, little is known about how users watch video on mobile devices. Understanding the characteristics of mobile video access can greatly benefit the design of video distribution systems in mobile networks. In this paper, the authors...

    Provided By Tsihai

  • White Papers // May 2012

    Constructing Optimal Non-Overlap Routing Tables

    The size of routing tables has been growing rapidly, while the link transmission speed of Internet backbone has increased up to 100Gbps commercially and towards 400Gbps Ethernet for laboratory experiments. In order to alleviate the pressure from both the huge large routing table and very high interface speed, ISPs are...

    Provided By Tsihai

  • White Papers // May 2012

    SIONA: A Service and Information Oriented Network Architecture

    The Internet is a great hit in human history. However, it has evolved greatly from its original incarnation. Content distribution is playing a central role in today's Internet, which makes it difficult for the conventional host-to-host communication to meet the ever-increasing demands. In this paper, the authors present a novel...

    Provided By Tsihai

  • White Papers // May 2012

    ALFE: A Replacement Policy to Cache Elephant Flows in the Presence of Mice Flooding

    Flow-based packet processing exists widely in a variety of network applications, where a large sized flow table is built to keep the alive flow records. To accelerate the search speed of the flow table, numerous systems employ cache mechanism to track the most recently referenced flows. However, network traffic exhibits...

    Provided By Tsihai

  • White Papers // May 2012

    Separating Identifier From Locator With Extended DNS

    Although most researchers have agreed that the locator/identifier separation is beneficial for the Internet, there is no consensus on how to define the "Identifier". In this paper, the authors propose a scheme in which identifiers are distributed by authorities to endpoints, and the authorities are responsible for maintaining real-time locators...

    Provided By Tsihai

  • White Papers // Jul 2011

    Tarantula: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs

    Network Coordinate (NC) systems provide an efficient and scalable mechanism to estimate latencies among hosts. However, many popular algorithms like Vivaldi suffer greatly from the existence of Triangle Inequality Violations (TIVs). Two-layer systems like Pharos and hierarchical Vivaldi have been proposed to remedy the impact of TIVs. They divide the...

    Provided By Tsihai

  • White Papers // Aug 2011

    Building Mega Data Center From Heterogeneous Containers

    Data center containers are regarded as the basic units to build mega data centers. In practice, heterogeneity exists among data center containers, because of technical innovation and vendor diversity. In this paper, the authors propose uFix, a scalable, flexible and modularized network architecture to interconnect heterogeneous data center containers. The...

    Provided By Tsihai

  • White Papers // Mar 2010

    Dimension Reduction of Network Bottleneck Bandwidth Data Space

    The network proximity metrics, such as bottleneck bandwidth and round-trip time, are very useful in different network applications. The round-trip-time prediction has been studied extensively. However, the prediction of bottleneck bandwidth has received much less attention. Therefore, the authors attempt to design a new bottleneck bandwidth prediction system by matrix...

    Provided By Tsihai

  • White Papers // Sep 2009

    Neighbor Selection Based on TIV Severity Sort Model in Vivaldi Network Coordinate System

    Network Coordinate (NC) system is an efficient and scalable mechanism to estimate the distance between Internet hosts. However, the existence of Triangle Inequality Violation (TIV) decreases the accuracy of NC system. With focus on most widely used NC system, Vivaldi, the authors propose an effective mechanism of neighbor selection based...

    Provided By Tsihai

  • White Papers // May 2012

    Coordinated Linear Precoding in Downlink Multicell MIMO-OFDMA Networks

    This paper considers coordinated linear precoding in downlink multicell Multiple-Input Multiple-Output Orthogonal Frequency-Division Multiple Access (MIMO-OFDMA) systems, where multiple Base Stations (BSs) coordinate to mitigate the co-channel interference. The authors focus on the non-convex problem of Maximizing the Weighted Sum Rate (MWSR) with Per-Cell Power Constraints (PCPC). Two iterative algorithms...

    Provided By Tsihai