Tsihai

Displaying 1-40 of 119 results

  • White Papers // Apr 2014

    Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation

    Recently, recommender systems have attracted increased attention because of their ability to suggest appropriate choices to users based on intelligent prediction. As one of the most popular recommender system techniques, Collaborative Filtering (CF) achieves efficiency from the similarity measurement of users and items. However, existing similarity measurement methods have reduced...

    Provided By Tsihai

  • White Papers // Mar 2014

    Online Mechanism Design for Cloud Computing

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to...

    Provided By Tsihai

  • White Papers // Mar 2014

    State-of-the-Art in String Similarity Search and Join

    String similarity search and its variants are fundamental problems with many applications in areas such as data integration, data quality, computational linguistics, or bioinformatics. A plethora of methods have been developed over the last decades. Obtaining an overview of the state-of-the-art in this field is difficult, as results are published...

    Provided By Tsihai

  • White Papers // Feb 2014

    Floorplanning and Topology Generation for Application-Specific Network-on-Chip

    Network-on-Chip (NoC) architectures have been proposed as a promising alternative to classical bus-based communication architectures. In this paper, the authors propose a two phase's framework to solve application-specific NoCs topology generation problem. At floor-planning phase, they carry out partition driven floor-planning. At post-floor-planning phase, a heuristic method and a min-cost...

    Provided By Tsihai

  • White Papers // Dec 2013

    Data Profiling Revisited

    Data profiling comprises a broad range of methods to efficiently analyze a given data set. In a typical scenario, which mirrors the capabilities of commercial data profiling tools, tables of a relational database are scanned to derive metadata, such as data types and value patterns, completeness and uniqueness of columns,...

    Provided By Tsihai

  • White Papers // Nov 2013

    A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution,...

    Provided By Tsihai

  • White Papers // Sep 2013

    Cryptanalysis of GOST R Hash Function

    Hash functions are taking important roles in cryptography and have been used in many applications, e.g., digital signatures, authentications and message integrity. Since the break of MD5 and SHA-1, cryptographers have been searching for secure and efficient hash functions. Developed from GOST, GOST R is the hash function standard of...

    Provided By Tsihai

  • White Papers // Aug 2013

    SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features,...

    Provided By Tsihai

  • White Papers // Aug 2013

    Efficient Recovery of Missing Events

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change...

    Provided By Tsihai

  • White Papers // Aug 2013

    3D-STAF: Scalable Temperature and Leakage Aware Floorplanning for Three-Dimensional Integrated Circuits

    Thermal issues are a primary concern in the Three-Dimensional (3D) Integrated Circuit (IC) design. Temperature, area, and wire length must be simultaneously optimized during 3D floorplanning, significantly increasing optimization complexity. Most existing floorplanners use combinatorial stochastic optimization techniques, hampering performance and scalability when used for 3D floorplanning. In this paper,...

    Provided By Tsihai

  • White Papers // Jun 2013

    Nearly Optimal Asynchronous Blind Rendezvous Algorithm for Cognitive Radio Networks

    Rendezvous is a fundamental process in Cognitive Radio Networks, through which a user establishes a link to communicate with a neighbor on a common channel. Most previous solutions use either a central controller or a Common Control Channel (CCC) to simplify the problem, which are inflexible and vulnerable to faults...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Mar 2013

    A Characteristic Study on Failures of Production Distributed Data-Parallel Programs

    SCOPE is adopted by thousands of developers from tens of different product teams in Microsoft Bing for daily web-scale data processing, including index building, search ranking, and advertisement display. A SCOPE job is composed of declarative SQL-like queries and imperative C# User-Defined Functions (UDFs), which are executed in pipeline by...

    Provided By Tsihai

  • White Papers // Mar 2013

    Design and Implementation of Secure Subnet Inside of Data Sensitive Network

    Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional Mandatory Access Control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Feb 2013

    Theoretical Analysis on Scale-Down Aware Service Allocation in Cloud Storage Systems

    Service allocation algorithms have been drawing popularity in cloud computing research community. There has been lots of research on improving service allocation schemes for high utilization, latency reduction and VM migration efficient, but few work focus on energy consumption affected by instance placement in data centers. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    Visual Exploration for Time Series Data Using Multivariate Analysis Method

    In the online teaching activities, there are various teaching data accumulated as time series and many methods to analyze the quality of teaching. But there are no such methods which can emphasize the status perception of the teaching-learning and the interaction between the teachers and students. In this paper, the...

    Provided By Tsihai

  • White Papers // Jan 2013

    On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

    Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost constraints, and generally operate with limited power and energy budget. However, they may also be deployed in applications where physical access is indeed possible for adversaries. In this paper, the authors...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Jan 2013

    Greening Data Center Networks with Throughput-guaranteed Power-aware Routing

    Cloud based applications and services require high performance and strong reliability provided by data center networks. To overcome the problem of traditional tree based data center network, recently many new network architectures are proposed, such as Fat-Tree and BCube. They use aggressively over-provisioned network devices and links to achieve 1:1...

    Provided By Tsihai

  • White Papers // Jan 2013

    OTrack: Order Tracking for Luggage in Mobile RFID Systems

    In many logistics applications of RFID technology, goods attached with tags are placed on moving conveyor belts for processing. It is important to figure out the order of goods on the belts so that further actions like sorting can be accurately taken on proper goods. Due to arbitrary goods placement...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Dec 2012

    Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach

    Latency is a key service factor for user satisfaction. Consistency is in a trade-off relation with operation latency in the distributed and replicated scenario. Existing NoSQL stores guarantee either strong or weak consistencies but none provides the best consistency based on the response latency. In this paper, the authors introduce...

    Provided By Tsihai

  • White Papers // Nov 2012

    A Two-Layer Intra-Domain Routing Scheme for Named Data Networking

    Routing is undoubtedly the foundation of NDN's data transmission service. The authors propose a two-layer routing protocol for NDN,, which is composed of a Topology Maintaining (TM) layer and a Prefix Announcing (PA) layer. The underlying layer (TM) maintains the full topology of an NDN network domain and calculates the...

    Provided By Tsihai

  • White Papers // Nov 2012

    Spectrum-Efficient Coherent Optical Zero Padding OFDM for Future High-Speed Transport Networks

    By fully exploiting the optical channel properties, the authors propose in this paper the Coherent Optical Zero Padding Orthogonal Frequency Division Multiplexing (CO-ZP-OFDM) for future high-speed optical transport networks to increase the spectral efficiency and improve the system reliability. Unlike the periodically inserted training symbols in conventional optical OFDM systems,...

    Provided By Tsihai

  • White Papers // Nov 2012

    How Powerful are the DDH Hard Groups?

    The question whether Identity-Based Encryption (IBE) can be based on the Decisional Diffie-Hellman (DDH) assumption is one of the most prominent questions in Cryptography related to DDH. The authors study limitations on the use of the DDH assumption in cryptographic constructions, and show that it is impossible to construct a...

    Provided By Tsihai

  • White Papers // Nov 2012

    Detecting Prefix Hijackings in the Internet with Argus

    Border Gateway Protocol (BGP) plays a critical role in the Internet inter-domain routing reliability. Invalid routes generated by mis-configurations or forged by malicious attacks may hijack the traffic and devastate the Internet routing sys-tem, but it is unlikely that a secure BGP can be deployed in the near future to...

    Provided By Tsihai

  • White Papers // Nov 2012

    Meta-Service Design and Implementation for Content Delivery Network Cloud Environments

    Storage has emerged as a typical kind of service in the cloud environment as the Content Delivery Network (CDN) emerges and becomes widely-used. In this paper, the authors conducted a research on the management issues for such applications, and implemented some meta-services upon the underlying cloud services. The architecture of...

    Provided By Tsihai

  • White Papers // Sep 2012

    Open Wireless System Cloud: An Architecture for Future Wireless Communications System

    Open Wireless System Cloud (OWSC) is a radio access network architecture for future wireless communication systems with remote radio heads, centralized wireless computation on open platforms, and cooperative wireless signal processing and management. With centralized wireless signal processing, system capacity can be increased using emerging wireless techniques, such as cognitive...

    Provided By Tsihai

  • White Papers // Sep 2012

    Efficient Dynamic Task Scheduling in Virtualized Data Centers with Fuzzy Prediction

    System virtualization provides low-cost, flexible and powerful executing environment for virtualized data centers, which plays an important role in the infrastructure of cloud computing. However, the virtualization also brings some challenges, particularly to the resource management and task scheduling. This paper proposes an efficient dynamic task scheduling scheme for virtualized...

    Provided By Tsihai

  • White Papers // Sep 2012

    On the Delay Performance Analysis in a Large-Scale Wireless Sensor Network

    The authors present a comprehensive delay performance measurement and analysis in an operational large-scale urban wireless sensor network. They build a light-weight delay measurement system in such a network and present a robust method to calculate per-packet delay. Through analysis of delay and system metrics, they seek to answer the...

    Provided By Tsihai

  • White Papers // Aug 2012

    On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown

    In CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) introduced a fault attack on RSA signatures with partially unknown messages. They factored RSA modulus N using a single faulty signature and increased the bound of unknown messages by multiple fault attack, however, the complexity multiple fault attack is exponential...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Aug 2012

    An Energy-Efficient Client Pre-Caching Scheme With Wireless Multicast for Video-on-Demand Services

    In this paper, the authors address the problem of providing Video-on-Demand (VoD) services to numerous clients energy-efficiently. To reduce energy consumption, multiple requests for the same video are batched and served by one single multicast stream. However, this brings additional delay to most clients. Utilizing client pre-caching is an efficient...

    Provided By Tsihai

  • White Papers // Jul 2012

    TCP with Hop-Oriented Network Coding in Multi-Radio Multi-Channel Wireless Mesh Networks

    In Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC WMNs), the performance of TCP significantly deteriorates when non-congestion packet losses occur. TCP-HONC is proposed in this paper to improve the performance of TCP with hop-oriented network coding in MRMC WMNs. It combines a block of inter- and intra-flow packets that share a...

    Provided By Tsihai

  • White Papers // Jul 2012

    Network Performance-Aware Virtual Machine Migration in Data Centers

    Virtual Machine (VM) consolidation and migration technology in data centers greatly improve the utilization of the server resource. While the previous work focuses on how to use VM migration to balance physical host utilization or optimize energy consumption, little attention has been given to network performance factors, such as link...

    Provided By Tsihai

  • White Papers // May 2012

    Coordinated Linear Precoding in Downlink Multicell MIMO-OFDMA Networks

    This paper considers coordinated linear precoding in downlink multicell Multiple-Input Multiple-Output Orthogonal Frequency-Division Multiple Access (MIMO-OFDMA) systems, where multiple Base Stations (BSs) coordinate to mitigate the co-channel interference. The authors focus on the non-convex problem of Maximizing the Weighted Sum Rate (MWSR) with Per-Cell Power Constraints (PCPC). Two iterative algorithms...

    Provided By Tsihai

  • White Papers // May 2012

    SIONA: A Service and Information Oriented Network Architecture

    The Internet is a great hit in human history. However, it has evolved greatly from its original incarnation. Content distribution is playing a central role in today's Internet, which makes it difficult for the conventional host-to-host communication to meet the ever-increasing demands. In this paper, the authors present a novel...

    Provided By Tsihai

  • White Papers // May 2012

    Constructing Optimal Non-Overlap Routing Tables

    The size of routing tables has been growing rapidly, while the link transmission speed of Internet backbone has increased up to 100Gbps commercially and towards 400Gbps Ethernet for laboratory experiments. In order to alleviate the pressure from both the huge large routing table and very high interface speed, ISPs are...

    Provided By Tsihai

  • White Papers // May 2012

    ALFE: A Replacement Policy to Cache Elephant Flows in the Presence of Mice Flooding

    Flow-based packet processing exists widely in a variety of network applications, where a large sized flow table is built to keep the alive flow records. To accelerate the search speed of the flow table, numerous systems employ cache mechanism to track the most recently referenced flows. However, network traffic exhibits...

    Provided By Tsihai

  • White Papers // May 2012

    Separating Identifier From Locator With Extended DNS

    Although most researchers have agreed that the locator/identifier separation is beneficial for the Internet, there is no consensus on how to define the "Identifier". In this paper, the authors propose a scheme in which identifiers are distributed by authorities to endpoints, and the authorities are responsible for maintaining real-time locators...

    Provided By Tsihai

  • White Papers // May 2012

    Non-Data-Aided Distorted Constellation Estimation and Demodulation for mmWave Communications

    The signal constellation of 60 GHz millimeter wave (mmWave) communications is distorted by Power Amplifier (PA) nonlinearity seriously and the Bit Error Rate (BER) performance declines, due to the huge bandwidth and high Equivalent Isotropic Radiated Power (EIRP), especially for quadrature amplitude modulation (QAM) signals. This paper aims at Non-Data-Aided...

    Provided By Tsihai

  • White Papers // May 2012

    Joint Power Allocation for Multi-Cell Distributed Antenna Systems With Large-Scale CSIT

    In this paper, the problem of joint Power Allocation (PA) for the downlink of a multi-cell Distributed Antenna System (DAS) is addressed. Motivated by practical applications, the authors focus on a reasonable scenario that only the large-scale Channel State Information at the Transmitter (CSIT) is available. Based on the observation...

    Provided By Tsihai

  • White Papers // May 2012

    Resource Allocation for Minimal Downlink Delay in Two-Way OFDM Relaying With Network Coding

    This paper investigates the resource allocation problem to minimize the downlink transmission delay under power constraints for two-way relay transmission using network coding over OFDM channels, where two sources with unbalanced traffic exchange their information via a relay node with network coding deployed. Since the explicit solution to this optimization...

    Provided By Tsihai

  • White Papers // Mar 2012

    Capacity and Spatial Correlation Measurements for Wideband Distributed MIMO Channel in Aircraft Cabin Environment

    In this paper, the authors present some channel measurement results of Distributed Multiple-Input Multiple-Output (D-MIMO) systems inside a MD-82 aircraft. Channel capacity and spatial correlation are analyzed from the measured channel matrix. Capacity results of 7 different systems (six D-MIMO systems and a SISO system) are discussed. It is found...

    Provided By Tsihai

  • White Papers // Mar 2012

    Efficient Power Control Algorithms for V-BLAST System With Per-Antenna Power Constraints

    In this paper, three novel efficient power control algorithms are proposed for V-BLAST system with both Total Power Constraint (TPC) and Per-Antenna Power Constraints (PAPC). Through analysis of the Karush-Kuhn-Tucker (KKT) conditions of the optimization problem, the authors find out that the antennas with the optimal power control can be...

    Provided By Tsihai

  • White Papers // Mar 2012

    Greedy Distributed Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks

    Data aggregation is a key technique in Wireless Sensor Networks (WSNs). In this paper, the authors studied the Minimum Latency Aggregation Scheduling (MLAS) problem in which collision-free TDMA based scheduling is produced to minimize aggregation latency. They propose a novel distributed algorithm named GDAS to solve the problem approximately. Unlike...

    Provided By Tsihai

  • White Papers // Mar 2012

    Edge-Markovian Dynamic Graph Based Performance Evaluation for Delay Tolerant Networks

    Groups of people with mobile phones using short range connections like WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, Delay Tolerant Networks (DTNs). The study of message transmission speed in such kind of networks has attracted increasing attention in recent...

    Provided By Tsihai

  • White Papers // Dec 2012

    Latency Bounding by Trading off Consistency in NoSQL Store: A Staging and Stepwise Approach

    Latency is a key service factor for user satisfaction. Consistency is in a trade-off relation with operation latency in the distributed and replicated scenario. Existing NoSQL stores guarantee either strong or weak consistencies but none provides the best consistency based on the response latency. In this paper, the authors introduce...

    Provided By Tsihai

  • White Papers // Jun 2012

    Rateless Codes with Progressive Recovery for Layered Multimedia Delivery

    This paper proposes a novel approach, based on unequal error protection, to enhance rateless codes with progressive recovery for layered multimedia delivery. With a parallel encoding structure, the proposed Progressive Rateless Codes (PRC) assigns unequal redundancy to each layer in accordance with their importance. Each output symbol contains information from...

    Provided By Tsihai

  • White Papers // Aug 2012

    C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6

    Array codes are a class of linear codes whose information and parity bits are placed in a two-dimensional (or multidimensional) array rather than a one-dimensional vector. A common property of array codes is that they are implemented based on only simple eXclusive-OR (XOR) operations. This is an attractive advantage in...

    Provided By Tsihai

  • White Papers // Dec 2012

    Can P2P Technology Benefit Eyeball ISPs? a Cooperative Profit Distribution Answer

    Peer-To-Peer (P2P) technology has been regarded as a promising way to help Content Providers (CPs) cost-effectively distributes content. However, under the traditional Internet pricing mechanism, the fact that most P2P traffic flows among peers can dramatically decrease the profit of ISPs, who may take actions against P2P and impede the...

    Provided By Tsihai

  • White Papers // Jan 2012

    Priv-Code: Preserving Privacy Against Traffic Analysis Through Network Coding for Multihop Wireless Networks

    Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. Traditional solutions are mainly based on the mix mechanism proposed by David Chaum, but the main drawback is its low network performance due to mixing and cryptographic operations. The authors propose a...

    Provided By Tsihai

  • White Papers // Dec 2011

    CHORUS: Collaborative and Harmonized Open Radio Ubiquitous Systems

    In this paper, the authors first briefly review the collaborative communication technology, and indicate that current intra-system collaboration mainly focuses on collaboration of limited fields and cognition of some specific aspects, while inter-system collaboration has been simply used to provide access flexibility. This motivates the design of a more generalized...

    Provided By Tsihai

  • White Papers // Jan 2013

    Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

    Multiple-message broadcast is a basic operation in many applications in wireless networks, such as updating of routing tables, topology learning of the underlying network, and many kinds of data aggregation functions in sensor networks. Due to the fundamental importance of this problem, many efficient distributed protocols and algorithms have been...

    Provided By Tsihai

  • White Papers // Jan 2013

    Reducing Information Gathering Latency Through Mobile Aerial Sensor Network

    Gathering information in a sensing field of interest is a fundamental task in wireless sensor networks. Current methods either use multihop forwarding to the sink via stationary nodes or use mobile sinks to traverse the sensing field. The multihop forwarding method intrinsically has the energy hole problem and the mobile...

    Provided By Tsihai

  • White Papers // Jul 2009

    Fast Convergence Algorithm for Decoding of Low Density Parity Check Codes

    In this paper, a fast-convergence algorithm is proposed for the decoding of Low-Density Parity-Check (LDPC) codes. By putting more weight on the message update from check node to variable node in current iteration, the proposed method speeds up the decoding significantly. Simulation results show that compared with the standard layered...

    Provided By Tsihai

  • White Papers // Jul 2009

    New Code Construction Method and High-Speed VLSI Codec Architecture for Repeat-Accumulate Codes

    Repeat-accumulate code has been widely used in various practical communication systems due to its special structure that can be encoded with a low complexity turbo-like encoder and decoded with a high-speed parallel algorithm. However, the construction of RA codes with large girth is still a challenging problem. In this paper,...

    Provided By Tsihai

  • White Papers // Nov 2012

    A Two-Layer Intra-Domain Routing Scheme for Named Data Networking

    Routing is undoubtedly the foundation of NDN's data transmission service. The authors propose a two-layer routing protocol for NDN,, which is composed of a Topology Maintaining (TM) layer and a Prefix Announcing (PA) layer. The underlying layer (TM) maintains the full topology of an NDN network domain and calculates the...

    Provided By Tsihai

  • White Papers // Nov 2012

    Spectrum-Efficient Coherent Optical Zero Padding OFDM for Future High-Speed Transport Networks

    By fully exploiting the optical channel properties, the authors propose in this paper the Coherent Optical Zero Padding Orthogonal Frequency Division Multiplexing (CO-ZP-OFDM) for future high-speed optical transport networks to increase the spectral efficiency and improve the system reliability. Unlike the periodically inserted training symbols in conventional optical OFDM systems,...

    Provided By Tsihai

  • White Papers // Jul 2012

    Peer-Assisted Social Media Streaming with Social Reciprocity

    Online video sharing and social networking are cross-pollinating rapidly in today's Internet. Online social network users are sharing more and more media contents among each other, while online video sharing sites are leveraging social connections among users to promote their videos. An intriguing development as it is, the operational challenge...

    Provided By Tsihai

  • White Papers // Mar 2013

    Optimal Power Allocation for Energy Harvesting and Power Grid Coexisting Wireless Communication Systems

    In this paper, the authors consider the power allocation of a single-link wireless communication with joint energy harvesting and grid power supply. They formulate the problem as minimizing the grid power consumption with random energy and data arrival, and analyze the structure of the optimal power allocation policy in some...

    Provided By Tsihai

  • White Papers // Oct 2009

    An Effective Early Warning Scheme Against Pollution Dissemination for BitTorrent

    BitTorrent is one of the most popular P2P file sharing systems. However, chunk-based file sharing mode makes it difficult to detect content pollution and prevent pollution dissemination during downloading process. In this paper, the authors propose an early warning scheme against pollution dissemination for BitTorrent. Their idea is to build...

    Provided By Tsihai

  • White Papers // Mar 2012

    Scalable Name Lookup in NDN Using Effective Name Component Encoding

    Name-based route lookup is a key function for Named Data Networking (NDN). The NDN names are hierarchical and have variable and unbounded lengths, which are much longer than IPv4/6 address, making fast name lookup a challenging issue. In this paper, the authors propose an effective Name Component Encoding (NCE) solution...

    Provided By Tsihai

  • White Papers // Mar 2012

    Error Tolerant Address Configuration for Data Center Networks With Malfunctioning Devices

    Address auto-configuration is a key problem in data center networks, where servers and switches encode topology information into their addresses for routing. A recent work DAC has been introduced to address this problem. Without malfunctions, DAC can auto-configure all the devices quickly. But in case of malfunctions, DAC requires significant...

    Provided By Tsihai

  • White Papers // Jan 2012

    Receiving Buffer Adaptation for High-speed Data Transfer

    New applications based on cloud computing, such as data synchronization for large chain departmental stores and bank transaction records, require very high-speed data transport. Although a number of high-bandwidth networks have been built, existing transport protocols or their variants over such networks cannot fully exploit the network bandwidth. The authors'...

    Provided By Tsihai

  • White Papers // Feb 2013

    Revealing Patterns of Opportunistic Contact Durations and Intervals for Large Scale Urban Vehicular Mobility

    Opportunistic contact between moving vehicles is one of the key features in Vehicular Delay Tolerant Networks (VDTNs) that critically influences the design of routing schemes and the network throughput. Due to prohibitive costs to collect enough realistic contact recodes, to the best of the authors' knowledge, little experiment work has...

    Provided By Tsihai

  • White Papers // Jan 2013

    PACE: Policy-Aware Application Cloud Embedding

    The emergence of new capabilities such as virtualization and elastic (private or public) cloud computing infrastructures has made it possible to deploy multiple applications, on demand, on the same cloud infrastructure. A major challenge to achieve this possibility, however, is that modern applications are typically distributed, structured systems that include...

    Provided By Tsihai

  • White Papers // Apr 2012

    Age-Based Cooperative Caching in Information-Centric Networks

    Information-Centric Networking (ICN) provides substantial flexibility for users to obtain information. One of the most important commonalities of ICN designs is the universal caching. It is widely accepted that the in-network caching would improve performance. However, there has been no consensus on how to design an efficient caching scheme in...

    Provided By Tsihai

  • White Papers // Nov 2010

    Interactive SQL Query Suggestion: Making Databases User-Friendly

    SQL is a classical and powerful tool for querying relational databases. However, it is rather hard for inexperienced users to pose SQL queries, as they are required to be proficient in SQL syntax and have a thorough understanding of the underlying schema. To give users gratification, the authors propose SQLSUGG,...

    Provided By Tsihai

  • White Papers // Aug 2012

    Two Dimensional-IP Routing

    Traditional IP networks use single-path routing, and make forwarding decisions based on destination address. Source address has always been ignored during routing. Lots of source address makes the traditional routing system inflexible and inefficient. The current network can not satisfy demands of both the network users and the ISP operators....

    Provided By Tsihai

  • White Papers // Jun 2012

    Source Address Filtering for Large Scale Network: A Cooperative Software Mechanism Design

    Source address filtering is used as an important mechanism to prevent malicious traffic. Currently, most networks store filters in hardware such as TCAM, which has limited capacity, high power consumption and high cost. Although software can accommodate large number of filters, it needs multiple accesses to memory on the border...

    Provided By Tsihai

  • White Papers // Apr 2013

    A General Framework for Achieving Energy Efficiency in Data Center Networks

    The popularization of cloud computing has brought a concern over the energy consumption in data centers. In addition to the energy consumed by servers, the energy consumed by the large number of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic...

    Provided By Tsihai

  • White Papers // Dec 2009

    P-Coding: Secure Network Coding Against Eavesdropping Attacks

    Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a limited number of packets. However, real scenarios often consist of more capable adversaries, e.g., global eavesdroppers,...

    Provided By Tsihai

  • White Papers // Jul 2012

    TCP with Hop-Oriented Network Coding in Multi-Radio Multi-Channel Wireless Mesh Networks

    In Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC WMNs), the performance of TCP significantly deteriorates when non-congestion packet losses occur. TCP-HONC is proposed in this paper to improve the performance of TCP with hop-oriented network coding in MRMC WMNs. It combines a block of inter- and intra-flow packets that share a...

    Provided By Tsihai

  • White Papers // May 2010

    Network Coding Based Live Peer-to-Peer Streaming Towards Minimizing Buffering Delay

    In current live Peer-To-Peer (P2P) streaming systems, buffering delay is too large compared with the channel switching delay of traditional TV service provided by cable companies. In this paper, network coding is applied to a live P2P streaming system to minimize the buffering delay that users experience. A new scheduling...

    Provided By Tsihai