Tsihai

Displaying 1-40 of 120 results

  • White Papers // Jan 2015

    Graph-Based Framework for Flexible Baseband Function Splitting and Placement in C-RAN

    The baseband-up Centralization architecture of Radio Access Networks (C-RANs) has recently been proposed to support efficient cooperative communications and reduce deployment and operational costs. However, the massive front haul bandwidth required to aggregate baseband samples from Remote Radio Heads (RRHs) to the central office incurs huge front hauling cost, and...

    Provided By Tsihai

  • White Papers // Apr 2014

    Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation

    Recently, recommender systems have attracted increased attention because of their ability to suggest appropriate choices to users based on intelligent prediction. As one of the most popular recommender system techniques, Collaborative Filtering (CF) achieves efficiency from the similarity measurement of users and items. However, existing similarity measurement methods have reduced...

    Provided By Tsihai

  • White Papers // Mar 2014

    Online Mechanism Design for Cloud Computing

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to...

    Provided By Tsihai

  • White Papers // Mar 2014

    State-of-the-Art in String Similarity Search and Join

    String similarity search and its variants are fundamental problems with many applications in areas such as data integration, data quality, computational linguistics, or bioinformatics. A plethora of methods have been developed over the last decades. Obtaining an overview of the state-of-the-art in this field is difficult, as results are published...

    Provided By Tsihai

  • White Papers // Feb 2014

    Floorplanning and Topology Generation for Application-Specific Network-on-Chip

    Network-on-Chip (NoC) architectures have been proposed as a promising alternative to classical bus-based communication architectures. In this paper, the authors propose a two phase's framework to solve application-specific NoCs topology generation problem. At floor-planning phase, they carry out partition driven floor-planning. At post-floor-planning phase, a heuristic method and a min-cost...

    Provided By Tsihai

  • White Papers // Dec 2013

    Data Profiling Revisited

    Data profiling comprises a broad range of methods to efficiently analyze a given data set. In a typical scenario, which mirrors the capabilities of commercial data profiling tools, tables of a relational database are scanned to derive metadata, such as data types and value patterns, completeness and uniqueness of columns,...

    Provided By Tsihai

  • White Papers // Nov 2013

    A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution,...

    Provided By Tsihai

  • White Papers // Sep 2013

    Cryptanalysis of GOST R Hash Function

    Hash functions are taking important roles in cryptography and have been used in many applications, e.g., digital signatures, authentications and message integrity. Since the break of MD5 and SHA-1, cryptographers have been searching for secure and efficient hash functions. Developed from GOST, GOST R is the hash function standard of...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Aug 2013

    3D-STAF: Scalable Temperature and Leakage Aware Floorplanning for Three-Dimensional Integrated Circuits

    Thermal issues are a primary concern in the Three-Dimensional (3D) Integrated Circuit (IC) design. Temperature, area, and wire length must be simultaneously optimized during 3D floorplanning, significantly increasing optimization complexity. Most existing floorplanners use combinatorial stochastic optimization techniques, hampering performance and scalability when used for 3D floorplanning. In this paper,...

    Provided By Tsihai

  • White Papers // Jun 2013

    Nearly Optimal Asynchronous Blind Rendezvous Algorithm for Cognitive Radio Networks

    Rendezvous is a fundamental process in Cognitive Radio Networks, through which a user establishes a link to communicate with a neighbor on a common channel. Most previous solutions use either a central controller or a Common Control Channel (CCC) to simplify the problem, which are inflexible and vulnerable to faults...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Mar 2013

    Design and Implementation of Secure Subnet Inside of Data Sensitive Network

    Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional Mandatory Access Control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Feb 2013

    Theoretical Analysis on Scale-Down Aware Service Allocation in Cloud Storage Systems

    Service allocation algorithms have been drawing popularity in cloud computing research community. There has been lots of research on improving service allocation schemes for high utilization, latency reduction and VM migration efficient, but few work focus on energy consumption affected by instance placement in data centers. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    Visual Exploration for Time Series Data Using Multivariate Analysis Method

    In the online teaching activities, there are various teaching data accumulated as time series and many methods to analyze the quality of teaching. But there are no such methods which can emphasize the status perception of the teaching-learning and the interaction between the teachers and students. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Jan 2013

    Greening Data Center Networks with Throughput-guaranteed Power-aware Routing

    Cloud based applications and services require high performance and strong reliability provided by data center networks. To overcome the problem of traditional tree based data center network, recently many new network architectures are proposed, such as Fat-Tree and BCube. They use aggressively over-provisioned network devices and links to achieve 1:1...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Dec 2012

    Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach

    Latency is a key service factor for user satisfaction. Consistency is in a trade-off relation with operation latency in the distributed and replicated scenario. Existing NoSQL stores guarantee either strong or weak consistencies but none provides the best consistency based on the response latency. In this paper, the authors introduce...

    Provided By Tsihai

  • White Papers // Nov 2012

    A Two-Layer Intra-Domain Routing Scheme for Named Data Networking

    Routing is undoubtedly the foundation of NDN's data transmission service. The authors propose a two-layer routing protocol for NDN,, which is composed of a Topology Maintaining (TM) layer and a Prefix Announcing (PA) layer. The underlying layer (TM) maintains the full topology of an NDN network domain and calculates the...

    Provided By Tsihai

  • White Papers // Nov 2012

    Spectrum-Efficient Coherent Optical Zero Padding OFDM for Future High-Speed Transport Networks

    By fully exploiting the optical channel properties, the authors propose in this paper the Coherent Optical Zero Padding Orthogonal Frequency Division Multiplexing (CO-ZP-OFDM) for future high-speed optical transport networks to increase the spectral efficiency and improve the system reliability. Unlike the periodically inserted training symbols in conventional optical OFDM systems,...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Nov 2012

    Detecting Prefix Hijackings in the Internet with Argus

    Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may hijack the traffic and devastate the Internet routing sys-tem, but it is unlikely that a secure BGP can be deployed in the near future to...

    Provided By Tsihai

  • White Papers // Nov 2012

    Meta-Service Design and Implementation for Content Delivery Network Cloud Environments

    Storage has emerged as a typical kind of service in the cloud environment as the Content Delivery Network (CDN) emerges and becomes widely-used. In this paper, the authors conducted a research on the management issues for such applications, and implemented some meta-services upon the underlying cloud services. The architecture of...

    Provided By Tsihai

  • White Papers // Sep 2012

    Open Wireless System Cloud: An Architecture for Future Wireless Communications System

    Open Wireless System Cloud (OWSC) is a radio access network architecture for future wireless communication systems with remote radio heads, centralized wireless computation on open platforms, and cooperative wireless signal processing and management. With centralized wireless signal processing, system capacity can be increased using emerging wireless techniques, such as cognitive...

    Provided By Tsihai

  • White Papers // Sep 2012

    Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction

    System virtualization provides low-cost, flexible and powerful executing environment for virtualized data centers, which plays an important role in the infrastructure of cloud computing. However, the virtualization also brings some challenges, particularly to the resource management and task scheduling. This paper proposes an efficient dynamic task scheduling scheme for virtualized...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jul 2012

    TCP with Hop-Oriented Network Coding in Multi-Radio Multi-Channel Wireless Mesh Networks

    In Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC WMNs), the performance of TCP significantly deteriorates when non-congestion packet losses occur. TCP-HONC is proposed in this paper to improve the performance of TCP with hop-oriented network coding in MRMC WMNs. It combines a block of inter- and intra-flow packets that share a...

    Provided By Tsihai

  • White Papers // Feb 2012

    Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks

    Transmission scheduling is a key problem in mobile ad hoc networks. Many transmission scheduling algorithms have been proposed to maximize the spatial reuse and minimize the Time-Division Multiple-Access (TDMA) frame length in mobile ad hoc networks. Most algorithms are dependent on the exact network topology and cannot adapt to the...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Dec 2011

    CHORUS: Collaborative and Harmonized Open Radio Ubiquitous Systems

    In this paper, the authors first briefly review the collaborative communication technology, and indicate that current intra-system collaboration mainly focuses on collaboration of limited fields and cognition of some specific aspects, while inter-system collaboration has been simply used to provide access flexibility. This motivates the design of a more generalized...

    Provided By Tsihai

  • White Papers // Apr 2012

    The Boomerang Attacks on the Round-Reduced Skein-512

    Cryptographic hash functions, which provide integrity, authentication and etc., are very important in modern cryptology. In 2005, as the most widely used hash functions MD5 and SHA-1 were broken by Wang et al., NIST started a hash competition for a new hash standard (SHA-3) in 2007. Skein, which is one...

    Provided By Tsihai

  • White Papers // Feb 2012

    Topology-Transparent Scheduling in Mobile Ad Hoc Networks Supporting Heterogeneous Quality of Service Guarantees

    Transmission scheduling plays a critical role in mobile ad hoc networks. Many transmission scheduling algorithms have been proposed to maximize the spatial reuse and minimize the Time-Division Multiple-Access (TDMA) frame length. Most algorithms require information on the network topology and cannot adapt to the dynamic topology in mobile scenarios. To...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // May 2012

    Computationally-Fair Group and Identity-Based Key-Exchange

    In this paper, the authors re-examine some fundamental group key-exchange and identity-based key-exchange protocols, specifically the Burmester-Desmedet group key-exchange protocol (referred to as the BD-protocol) and the Chen-Kudla identity-based key-exchange protocol (referred to as the CK-protocol). They identify some new attacks on these protocols, showing in particular that these protocols...

    Provided By Tsihai

  • White Papers // Jan 2012

    WILL: Wireless Indoor Localization Without Site Survey

    Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a process of site survey, in which radio signatures are collected and stored for further comparison and matching. Site survey involves intensive costs on manpower...

    Provided By Tsihai

  • White Papers // Jan 2012

    Sherlock Is Around: Detecting Network Failures With Local Evidence Fusion

    Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. On the one hand, long distance proactive information retrieval incurs huge transmission overhead; On the other hand, due to...

    Provided By Tsihai

  • White Papers // Jan 2012

    L2 : Lazy Forwarding in Low Duty Cycle Wireless Sensor Networks

    Energy-constrained wireless sensor networks are duty-cycled, relaying on multi-hop forwarding to collect data packets. A forwarding scheme generally involves three design elements: media access, link estimation, and routing strategy. Most existing studies, however, focus only on a subset of those three. Disregarding the low duty cycle nature of media access...

    Provided By Tsihai

  • White Papers // Jan 2012

    Priv-Code: Preserving Privacy Against Traffic Analysis Through Network Coding for Multihop Wireless Networks

    Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. Traditional solutions are mainly based on the mix mechanism proposed by David Chaum, but the main drawback is its low network performance due to mixing and cryptographic operations. The authors propose a...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Jul 2012

    Traffic-Aware Power Adaptation and Base Station Sleep Control for Energy-Delay Tradeoffs in Green Cellular Networks

    Traffic-aware resource allocation and Base Station (BS) sleep control are key methods for energy saving in cellular networks. In this paper, first, the authors consider the control problem of how to adapt transmit power according to flow-level traffic variations, which leverages the tradeoff between energy consumption and delay performance. Based...

    Provided By Tsihai

  • White Papers // Jul 2012

    Capacity Bounds of Downlink Network MIMO Systems With Inter-Cluster Interference

    To fully understand the capacity of clustered network-MIMO systems and analyze the system performance (throughput, energy-efficiency or quality of service), one must have an analytical expression of the system capacity or capacity bounds. In this paper, the impact of cluster size on the downlink network-MIMO system capacity is analyzed considering...

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jun 2012

    On Energy-Delay Tradeoff in Base Station Sleep Mode Operation

    Base Station (BS) sleeping operation is one of the effective ways to save energy, but it may lead to longer delay to the customers. In order to evaluate the tradeoffs between energy consumption and customer delay, the authors model the BS sleep mode operation as an N-policy M/G/1 queue with...

    Provided By Tsihai

  • White Papers // Jan 2012

    Receiving Buffer Adaptation for High-speed Data Transfer

    New applications based on cloud computing, such as data synchronization for large chain departmental stores and bank transaction records, require very high-speed data transport. Although a number of high-bandwidth networks have been built, existing transport protocols or their variants over such networks cannot fully exploit the network bandwidth. The authors'...

    Provided By Tsihai

  • White Papers // Oct 2009

    An Effective Early Warning Scheme Against Pollution Dissemination for BitTorrent

    BitTorrent is one of the most popular P2P file sharing systems. However, chunk-based file sharing mode makes it difficult to detect content pollution and prevent pollution dissemination during downloading process. In this paper, the authors propose an early warning scheme against pollution dissemination for BitTorrent. Their idea is to build...

    Provided By Tsihai

  • White Papers // Mar 2012

    Scalable Name Lookup in NDN Using Effective Name Component Encoding

    Name-based route lookup is a key function for Named Data Networking (NDN). The NDN names are hierarchical and have variable and unbounded lengths, which are much longer than IPv4/6 address, making fast name lookup a challenging issue. In this paper, the authors propose an effective Name Component Encoding (NCE) solution...

    Provided By Tsihai

  • White Papers // Mar 2012

    Error Tolerant Address Configuration for Data Center Networks With Malfunctioning Devices

    Address auto-configuration is a key problem in data center networks, where servers and switches encode topology information into their addresses for routing. A recent work DAC has been introduced to address this problem. Without malfunctions, DAC can auto-configure all the devices quickly. But in case of malfunctions, DAC requires significant...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Apr 2012

    Age-Based Cooperative Caching in Information-Centric Networks

    Information-Centric Networking (ICN) provides substantial flexibility for users to obtain information. One of the most important commonalities of ICN designs is the universal caching. It is widely accepted that the in-network caching would improve performance. However, there has been no consensus on how to design an efficient caching scheme in...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Jul 2011

    Efficiently Querying Business Process Models with BeehiveZ

    The technology of business process management is being more widely used, and there are more and more business process models. In this paper, the authors show how to query a large number of models efficiently with BeehiveZ. Four types of queries are all supported in BeehiveZ, i.e. exact query based...

    Provided By Tsihai

  • White Papers // Sep 2011

    An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric Bivariate Polynomial

    The design of rational cryptographic protocols is a recently created research area at the intersection of cryptography and game theory. In this paper, the authors propose a new m-out-of-n rational secret sharing scheme requiring neither the involvement of the dealer (except during the initial share distribution) nor a trusted mediator....

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // May 2009

    Proxy-based Security Audit System for Remote Desktop Access

    Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and auditing. In this paper, a novel proxy-based security audit system is designed and implemented in order to ensure security supervising and auditing remote desktop access. The...

    Provided By Tsihai

  • White Papers // Jan 2007

    A Static Compliance Checking Framework for Business Process Models

    Regulatory compliance of business operations is a critical problem for enterprises. As enterprises increasingly use business process management systems to automate their business processes, technologies to automatically check compliance of process models against compliance rules are becoming important. In this paper, the authors present a method for improving the reliability...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Jun 2012

    Source Address Filtering for Large Scale Network: A Cooperative Software Mechanism Design

    Source address filtering is used as an important mechanism to prevent malicious traffic. Currently, most networks store filters in hardware such as TCAM, which has limited capacity, high power consumption and high cost. Although software can accommodate large number of filters, it needs multiple accesses to memory on the border...

    Provided By Tsihai

  • White Papers // Sep 2011

    Technological Rules Based Business Models Analysis: A Design Science Approach

    Business Model has become an important core competence of a business unit, a firm or a company. It is progressively becoming the competitive focus in business and has already been the basic consideration when a company making decision, which was dominated by strategy before. But traditional business models are lack...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Jan 2013

    Greening Data Center Networks with Throughput-guaranteed Power-aware Routing

    Cloud based applications and services require high performance and strong reliability provided by data center networks. To overcome the problem of traditional tree based data center network, recently many new network architectures are proposed, such as Fat-Tree and BCube. They use aggressively over-provisioned network devices and links to achieve 1:1...

    Provided By Tsihai

  • White Papers // Jul 2012

    Network Performance-Aware Virtual Machine Migration in Data Centers

    Virtual Machine (VM) consolidation and migration technology in data centers greatly improve the utilization of the server resource. While the previous work focuses on how to use VM migration to balance physical host utilization or optimize energy consumption, little attention has been given to network performance factors, such as link...

    Provided By Tsihai

  • White Papers // May 2012

    Cloud Versus In-house Cluster: Evaluating Amazon Cluster Compute Instances for Running MPI Applications

    Cloud computing platforms have gained significant popularity in the past several years, especially among small businesses who view cloud services a flexible, powerful, convenient, and cost-effective alternative to owning and managing their own computing infrastructure. The emergence of cloud services brings new possibilities for constructing and using HPC platforms. However,...

    Provided By Tsihai

  • White Papers // Sep 2010

    AVMM: Virtualize Client with a Bare-metal and Asymmetric Partitioning Approach

    This paper presents the design, implementation, and evaluation of AVMM, a symmetric partition-based bare-metal client virtualization approach that tries to achieve maximum near-native performance for end-users while supporting new out-of-OS mechanism for value-added services for system administration. To achieve these goals, AVMM divides the underlying platform into two asymmetric partitions:...

    Provided By Tsihai

  • White Papers // Feb 2012

    CompSC: Live Migration with Pass-Through Devices

    Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current network I/O virtualization (e.g. Para-virtualized I/O, VMDq) has a significant performance gap with native network I/O. Pass-through network devices have near native performance, however, they...

    Provided By Tsihai