Tsihai

Displaying 1 - 10 of 113 results

  • Graph-Based Framework for Flexible Baseband Function Splitting and Placement in C-RAN

    White Papers // Jan 2015 // provided by Tsihai

    The baseband-up Centralization architecture of Radio Access Networks (C-RANs) has recently been proposed to support efficient cooperative communications and reduce deployment and operational costs. However, the massive front haul bandwidth required to aggregate baseband samples from Remote Radio Heads (RRHs) to the central office incurs huge front hauling cost, and ...

    Download Now
  • Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation

    White Papers // Apr 2014 // provided by Tsihai

    Recently, recommender systems have attracted increased attention because of their ability to suggest appropriate choices to users based on intelligent prediction. As one of the most popular recommender system techniques, Collaborative Filtering (CF) achieves efficiency from the similarity measurement of users and items. However, existing similarity measurement methods have reduced ...

    Download Now
  • Online Mechanism Design for Cloud Computing

    White Papers // Mar 2014 // provided by Tsihai

    In this paper, the authors study the problem of online mechanism design for Resources Allocation and Pricing in Cloud Computing (RAPCC). They show that in general the allocation problems in RAPCC are NP-hard, and therefore they focus on designing Dominant-Strategy Incentive Compatible (DSIC) mechanisms with good competitive ratios compared to ...

    Download Now
  • State-of-the-Art in String Similarity Search and Join

    White Papers // Mar 2014 // provided by Tsihai

    String similarity search and its variants are fundamental problems with many applications in areas such as data integration, data quality, computational linguistics, or bioinformatics. A plethora of methods have been developed over the last decades. Obtaining an overview of the state-of-the-art in this field is difficult, as results are published ...

    Download Now
  • Floorplanning and Topology Generation for Application-Specific Network-on-Chip

    White Papers // Feb 2014 // provided by Tsihai

    Network-on-Chip (NoC) architectures have been proposed as a promising alternative to classical bus-based communication architectures. In this paper, the authors propose a two phase's framework to solve application-specific NoCs topology generation problem. At floor-planning phase, they carry out partition driven floor-planning. At post-floor-planning phase, a heuristic method and a min-cost ...

    Download Now
  • Data Profiling Revisited

    White Papers // Dec 2013 // provided by Tsihai

    Data profiling comprises a broad range of methods to efficiently analyze a given data set. In a typical scenario, which mirrors the capabilities of commercial data profiling tools, tables of a relational database are scanned to derive metadata, such as data types and value patterns, completeness and uniqueness of columns, ...

    Download Now
  • A Meet-in-the-Middle Attack on Round-Reduced mCrypton

    White Papers // Nov 2013 // provided by Tsihai

    The Meet-In-The-Middle (MITM) attack on AES is a great success. In this paper, the authors apply the method to the lightweight SPN block cipher mCrypton. They prove that the multiset technique used to analyze AES cannot be applied directly to mCrypton due to the scarcity of information. As a solution, ...

    Download Now
  • Cryptanalysis of GOST R Hash Function

    White Papers // Sep 2013 // provided by Tsihai

    Hash functions are taking important roles in cryptography and have been used in many applications, e.g., digital signatures, authentications and message integrity. Since the break of MD5 and SHA-1, cryptographers have been searching for secure and efficient hash functions. Developed from GOST, GOST R is the hash function standard of ...

    Download Now
  • SilentSense: Silent User Identification Via Dynamics of Touch and Movement Behavioral Biometrics

    White Papers // Aug 2013 // provided by Tsihai

    In this paper, the authors present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. They build a \"Touch-based biometrics\" model of the owner by extracting some principle features, ...

    Download Now
  • Efficient Recovery of Missing Events

    White Papers // Aug 2013 // provided by Tsihai

    For various entering and transmission issues raised by human or system, missing events often occur in event data, which record execution logs of business processes. Without recovering these missing events, applications such as provenance analysis or complex event processing built upon event data are not reliable. Following the minimum change ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?