Tsihai

Displaying 1-40 of 103 results

  • White Papers // Mar 2014

    Online Mechanism Design for Cloud Computing

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to...

    Provided By Tsihai

  • White Papers // Nov 2013

    A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution,...

    Provided By Tsihai

  • White Papers // Sep 2013

    Cryptanalysis of GOST R Hash Function

    Hash functions are taking important roles in cryptography and have been used in many applications, e.g., digital signatures, authentications and message integrity. Since the break of MD5 and SHA-1, cryptographers have been searching for secure and efficient hash functions. Developed from GOST, GOST R is the hash function standard of...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Jun 2013

    Nearly Optimal Asynchronous Blind Rendezvous Algorithm for Cognitive Radio Networks

    Rendezvous is a fundamental process in Cognitive Radio Networks, through which a user establishes a link to communicate with a neighbor on a common channel. Most previous solutions use either a central controller or a Common Control Channel (CCC) to simplify the problem, which are inflexible and vulnerable to faults...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Mar 2013

    Design and Implementation of Secure Subnet Inside of Data Sensitive Network

    Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional Mandatory Access Control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Feb 2013

    Theoretical Analysis on Scale-Down Aware Service Allocation in Cloud Storage Systems

    Service allocation algorithms have been drawing popularity in cloud computing research community. There has been lots of research on improving service allocation schemes for high utilization, latency reduction and VM migration efficient, but few work focus on energy consumption affected by instance placement in data centers. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Jan 2013

    Greening Data Center Networks with Throughput-guaranteed Power-aware Routing

    Cloud based applications and services require high performance and strong reliability provided by data center networks. To overcome the problem of traditional tree based data center network, recently many new network architectures are proposed, such as Fat-Tree and BCube. They use aggressively over-provisioned network devices and links to achieve 1:1...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Dec 2012

    Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach

    Latency is a key service factor for user satisfaction. Consistency is in a trade-off relation with operation latency in the distributed and replicated scenario. Existing NoSQL stores guarantee either strong or weak consistencies but none provides the best consistency based on the response latency. In this paper, the authors introduce...

    Provided By Tsihai

  • White Papers // Nov 2012

    A Two-Layer Intra-Domain Routing Scheme for Named Data Networking

    Routing is undoubtedly the foundation of NDN's data transmission service. The authors propose a two-layer routing protocol for NDN,, which is composed of a Topology Maintaining (TM) layer and a Prefix Announcing (PA) layer. The underlying layer (TM) maintains the full topology of an NDN network domain and calculates the...

    Provided By Tsihai

  • White Papers // Nov 2012

    Spectrum-Efficient Coherent Optical Zero Padding OFDM for Future High-Speed Transport Networks

    By fully exploiting the optical channel properties, the authors propose in this paper the Coherent Optical Zero Padding Orthogonal Frequency Division Multiplexing (CO-ZP-OFDM) for future high-speed optical transport networks to increase the spectral efficiency and improve the system reliability. Unlike the periodically inserted training symbols in conventional optical OFDM systems,...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Nov 2012

    Detecting Prefix Hijackings in the Internet with Argus

    Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may hijack the traffic and devastate the Internet routing sys-tem, but it is unlikely that a secure BGP can be deployed in the near future to...

    Provided By Tsihai

  • White Papers // Nov 2012

    Meta-Service Design and Implementation for Content Delivery Network Cloud Environments

    Storage has emerged as a typical kind of service in the cloud environment as the Content Delivery Network (CDN) emerges and becomes widely-used. In this paper, the authors conducted a research on the management issues for such applications, and implemented some meta-services upon the underlying cloud services. The architecture of...

    Provided By Tsihai

  • White Papers // Sep 2012

    Open Wireless System Cloud: An Architecture for Future Wireless Communications System

    Open Wireless System Cloud (OWSC) is a radio access network architecture for future wireless communication systems with remote radio heads, centralized wireless computation on open platforms, and cooperative wireless signal processing and management. With centralized wireless signal processing, system capacity can be increased using emerging wireless techniques, such as cognitive...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jul 2012

    TCP with Hop-Oriented Network Coding in Multi-Radio Multi-Channel Wireless Mesh Networks

    In Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC WMNs), the performance of TCP significantly deteriorates when non-congestion packet losses occur. TCP-HONC is proposed in this paper to improve the performance of TCP with hop-oriented network coding in MRMC WMNs. It combines a block of inter- and intra-flow packets that share a...

    Provided By Tsihai

  • White Papers // Jul 2012

    Network Performance-Aware Virtual Machine Migration in Data Centers

    Virtual Machine (VM) consolidation and migration technology in data centers greatly improve the utilization of the server resource. While the previous work focuses on how to use VM migration to balance physical host utilization or optimize energy consumption, little attention has been given to network performance factors, such as link...

    Provided By Tsihai

  • White Papers // Jul 2012

    Peer-Assisted Social Media Streaming with Social Reciprocity

    Online video sharing and social networking are cross-pollinating rapidly in today's Internet. Online social network users are sharing more and more media contents among each other, while online video sharing sites are leveraging social connections among users to promote their videos. An intriguing development as it is, the operational challenge...

    Provided By Tsihai

  • White Papers // Jul 2012

    Traffic-Aware Power Adaptation and Base Station Sleep Control for Energy-Delay Tradeoffs in Green Cellular Networks

    Traffic-aware resource allocation and Base Station (BS) sleep control are key methods for energy saving in cellular networks. In this paper, first, the authors consider the control problem of how to adapt transmit power according to flow-level traffic variations, which leverages the tradeoff between energy consumption and delay performance. Based...

    Provided By Tsihai

  • White Papers // Jul 2012

    Capacity Bounds of Downlink Network MIMO Systems With Inter-Cluster Interference

    To fully understand the capacity of clustered network-MIMO systems and analyze the system performance (throughput, energy-efficiency or quality of service), one must have an analytical expression of the system capacity or capacity bounds. In this paper, the impact of cluster size on the downlink network-MIMO system capacity is analyzed considering...

    Provided By Tsihai

  • White Papers // Jun 2012

    On Energy-Delay Tradeoff in Base Station Sleep Mode Operation

    Base Station (BS) sleeping operation is one of the effective ways to save energy, but it may lead to longer delay to the customers. In order to evaluate the tradeoffs between energy consumption and customer delay, the authors model the BS sleep mode operation as an N-policy M/G/1 queue with...

    Provided By Tsihai

  • White Papers // Jun 2012

    Rateless Codes with Progressive Recovery for Layered Multimedia Delivery

    This paper proposes a novel approach, based on unequal error protection, to enhance rateless codes with progressive recovery for layered multimedia delivery. With a parallel encoding structure, the proposed Progressive Rateless Codes (PRC) assigns unequal redundancy to each layer in accordance with their importance. Each output symbol contains information from...

    Provided By Tsihai

  • White Papers // Jun 2012

    Source Address Filtering for Large Scale Network: A Cooperative Software Mechanism Design

    Source address filtering is used as an important mechanism to prevent malicious traffic. Currently, most networks store filters in hardware such as TCAM, which has limited capacity, high power consumption and high cost. Although software can accommodate large number of filters, it needs multiple accesses to memory on the border...

    Provided By Tsihai

  • White Papers // May 2012

    Separating Identifier From Locator With Extended DNS

    Although most researchers have agreed that the locator/identifier separation is beneficial for the Internet, there is no consensus on how to define the "Identifier". In this paper, the authors propose a scheme in which identifiers are distributed by authorities to endpoints, and the authorities are responsible for maintaining real-time locators...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Feb 2012

    Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks

    Transmission scheduling is a key problem in mobile ad hoc networks. Many transmission scheduling algorithms have been proposed to maximize the spatial reuse and minimize the Time-Division Multiple-Access (TDMA) frame length in mobile ad hoc networks. Most algorithms are dependent on the exact network topology and cannot adapt to the...

    Provided By Tsihai

  • White Papers // Feb 2012

    Topology-Transparent Scheduling in Mobile Ad Hoc Networks Supporting Heterogeneous Quality of Service Guarantees

    Transmission scheduling plays a critical role in mobile ad hoc networks. Many transmission scheduling algorithms have been proposed to maximize the spatial reuse and minimize the Time-Division Multiple-Access (TDMA) frame length. Most algorithms require information on the network topology and cannot adapt to the dynamic topology in mobile scenarios. To...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // May 2012

    Computationally-Fair Group and Identity-Based Key-Exchange

    In this paper, the authors re-examine some fundamental group key-exchange and identity-based key-exchange protocols, specifically the Burmester-Desmedet group key-exchange protocol (referred to as the BD-protocol) and the Chen-Kudla identity-based key-exchange protocol (referred to as the CK-protocol). They identify some new attacks on these protocols, showing in particular that these protocols...

    Provided By Tsihai

  • White Papers // Apr 2012

    The Boomerang Attacks on the Round-Reduced Skein-512

    Cryptographic hash functions, which provide integrity, authentication and etc., are very important in modern cryptology. In 2005, as the most widely used hash functions MD5 and SHA-1 were broken by Wang et al., NIST started a hash competition for a new hash standard (SHA-3) in 2007. Skein, which is one...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Jul 2012

    Traffic-Aware Power Adaptation and Base Station Sleep Control for Energy-Delay Tradeoffs in Green Cellular Networks

    Traffic-aware resource allocation and Base Station (BS) sleep control are key methods for energy saving in cellular networks. In this paper, first, the authors consider the control problem of how to adapt transmit power according to flow-level traffic variations, which leverages the tradeoff between energy consumption and delay performance. Based...

    Provided By Tsihai

  • White Papers // Jul 2012

    Capacity Bounds of Downlink Network MIMO Systems With Inter-Cluster Interference

    To fully understand the capacity of clustered network-MIMO systems and analyze the system performance (throughput, energy-efficiency or quality of service), one must have an analytical expression of the system capacity or capacity bounds. In this paper, the impact of cluster size on the downlink network-MIMO system capacity is analyzed considering...

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jun 2012

    On Energy-Delay Tradeoff in Base Station Sleep Mode Operation

    Base Station (BS) sleeping operation is one of the effective ways to save energy, but it may lead to longer delay to the customers. In order to evaluate the tradeoffs between energy consumption and customer delay, the authors model the BS sleep mode operation as an N-policy M/G/1 queue with...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Jan 2012

    WILL: Wireless Indoor Localization Without Site Survey

    Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio signatures are collected and stored for further comparison and matching. Site survey involves intensive costs on manpower...

    Provided By Tsihai

  • White Papers // Jan 2012

    Sherlock Is Around: Detecting Network Failures With Local Evidence Fusion

    Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. On the one hand, long distance proactive information retrieval incurs huge transmission overhead; On the other hand, due to...

    Provided By Tsihai

  • White Papers // Jan 2012

    L2 : Lazy Forwarding in Low Duty Cycle Wireless Sensor Networks

    Energy-constrained wireless sensor networks are duty-cycled, relaying on multi-hop forwarding to collect data packets. A forwarding scheme generally involves three design elements: media access, link estimation, and routing strategy. Most existing studies, however, focus only on a subset of those three. Disregarding the low duty cycle nature of media access...

    Provided By Tsihai

  • White Papers // Jan 2012

    Priv-Code: Preserving Privacy Against Traffic Analysis Through Network Coding for Multihop Wireless Networks

    Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. Traditional solutions are mainly based on the mix mechanism proposed by David Chaum, but the main drawback is its low network performance due to mixing and cryptographic operations. The authors propose a...

    Provided By Tsihai

  • White Papers // Dec 2011

    CHORUS: Collaborative and Harmonized Open Radio Ubiquitous Systems

    In this paper, the authors first briefly review the collaborative communication technology, and indicate that current intra-system collaboration mainly focuses on collaboration of limited fields and cognition of some specific aspects, while inter-system collaboration has been simply used to provide access flexibility. This motivates the design of a more generalized...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Feb 2013

    Theoretical Analysis on Scale-Down Aware Service Allocation in Cloud Storage Systems

    Service allocation algorithms have been drawing popularity in cloud computing research community. There has been lots of research on improving service allocation schemes for high utilization, latency reduction and VM migration efficient, but few work focus on energy consumption affected by instance placement in data centers. In this paper, the...

    Provided By Tsihai

  • White Papers // May 2009

    Workflow Model Performance Analysis Concerning Instance Dwelling Times Distribution

    Instances Dwelling Times (IDT) which consists of waiting times and handle times in a workflow model is a key performance analysis goal. In a workflow model the instances which act as customers and the resources which act as servers form a queuing network. Multidimensional Work-Flow net (MWF-net) includes multiple Timing...

    Provided By Tsihai

  • White Papers // Jan 2007

    A Static Compliance Checking Framework for Business Process Models

    Regulatory compliance of business operations is a critical problem for enterprises. As enterprises increasingly use business process management systems to automate their business processes, technologies to automatically check compliance of process models against compliance rules are becoming important. In this paper, the authors present a method for improving the reliability...

    Provided By Tsihai

  • White Papers // Jul 2011

    Efficiently Querying Business Process Models with BeehiveZ

    The technology of business process management is being more widely used, and there are more and more business process models. In this paper, the authors show how to query a large number of models efficiently with BeehiveZ. Four types of queries are all supported in BeehiveZ, i.e. exact query based...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Sep 2011

    An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric Bivariate Polynomial

    The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory. In this paper, the authors propose a new m-out-of-n rational secret sharing scheme requiring neither the involvement of the dealer (except during the initial share distribution) nor a trusted mediator....

    Provided By Tsihai

  • White Papers // May 2009

    Proxy-based Security Audit System for Remote Desktop Access

    Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and auditing. In this paper, a novel proxy-based security audit system is designed and implemented in order to ensure security supervising and auditing remote desktop access. The...

    Provided By Tsihai

  • White Papers // Jul 2011

    Computer Aided Threat Identification

    Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it is crucial for organizations to recognize as early as possible the risks deriving by inappropriate access right management and...

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // Nov 2012

    Meta-Service Design and Implementation for Content Delivery Network Cloud Environments

    Storage has emerged as a typical kind of service in the cloud environment as the Content Delivery Network (CDN) emerges and becomes widely-used. In this paper, the authors conducted a research on the management issues for such applications, and implemented some meta-services upon the underlying cloud services. The architecture of...

    Provided By Tsihai

  • White Papers // May 2008

    ZettaDS: A Light-Weight Distributed Storage System for Cluster

    The authors have designed and implemented the Zetta Data Storage system (ZettaDS), a light-weight scalable distributed data storage system for cluster. While sharing many common characters with some of modern distributed data storage systems such as single meta server architecture, running on inexpensive commodity components, their system is a very...

    Provided By Tsihai

  • White Papers // Mar 2013

    Design and Implementation of Secure Subnet Inside of Data Sensitive Network

    Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional Mandatory Access Control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even...

    Provided By Tsihai

  • White Papers // Sep 2011

    Argus: An Accurate and Agile System to Detecting IP Prefix Hijacking

    The de facto inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the Internet routing reliability. Invalid routes generated by misconfigurations or malicious attacks will devastate the Internet routing system. In the near future, deploying a secure BGP in the Internet to completely prevent hijacking is impossible....

    Provided By Tsihai

  • White Papers // Nov 2012

    Detecting Prefix Hijackings in the Internet with Argus

    Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may hijack the traffic and devastate the Internet routing sys-tem, but it is unlikely that a secure BGP can be deployed in the near future to...

    Provided By Tsihai

  • White Papers // Mar 2012

    Sign What You Really Care About - Secure BGP as Paths Efficiently

    The inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the reliability of the Internet routing system, but forged routes generated by malicious attacks or mis-configurations may devastate the system. The security problem of BGP has attracted considerable attention, and although several solutions have been proposed, none...

    Provided By Tsihai

  • White Papers // Sep 2011

    Cloud Testing- Issues, Challenges, Needs and Practice

    Cloud computing not only changes the way of obtaining computing resources (such as computers, infrastructures, data storage, and application services), but also changes the way of managing and delivering computing services, technologies, and solutions. Cloud computing leads an opportunity in offering Testing-as-a-Service (TaaS) for SaaS and clouds. Meanwhile, it causes...

    Provided By Tsihai

  • White Papers // Nov 2013

    A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution,...

    Provided By Tsihai