Universidade Federal de Lavras

Displaying 1-25 of 25 results

  • White Papers // Dec 2013

    Quantum Nonlocality as the Route for Ever-Lasting Unconditionally Secure Bit Commitment

    The authors present a bit commitment protocol based on quantum nonlocality that seems to bring everlasting unconditional security. Although security is not rigorously proved, physical arguments and numerical simulations support this conclusion. The key point is that the proof of the commitment is forced to become classical data uncorrelated with...

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2013

    A Parallel Hybrid Genetic Algorithm on Cloud Computing for the Vehicle Routing Problem with Time Windows

    In this paper, the authors propose a new Parallel Hybrid Genetic Algorithm approach for Vehicle Routing Problem with Time Windows. The algorithm was developed to be executed on cloud computing web services and serves as an online application for real world problems. A new parallel scheme was proposed with shared...

    Provided By Universidade Federal de Lavras

  • White Papers // Nov 2012

    Data and Instruction Uniformity in Minimal Multi-Threading

    Simultaneous Multi-Threading (SMT) is a hardware model in which different threads share the same instruction fetching unit. This model is a compromise between high parallelism and low hardware cost. Minimal Multi-Threading (MMT) is a technique recently proposed to share instructions and execution between threads in a SMT machine. In this...

    Provided By Universidade Federal de Lavras

  • White Papers // Nov 2012

    Divergence Analysis with Affine Constraints

    The rising popularity of graphics processing units is bringing renewed interest in code optimization techniques for SIMD processors. Many of these optimizations rely on divergence analyses, which classify variables as uniform, if they have the same value on every thread, or divergent, if they might not. This paper introduces a...

    Provided By Universidade Federal de Lavras

  • White Papers // May 2012

    MAC Protocols for Wireless Sensor Networks Over Radio-Over-Fiber Links

    In this paper, two Medium Access Control (MAC) protocols exclusively tailored to WSNs over RoF (RWSNs) namely SPP-MAC (Scheduled Priority Polling Medium Access Control) (polling-based) and HMARS (Hybrid Medium Access Control for Hybrid Radio-over-Fiber Wireless Sensor Network Architecture) (hybrid-based) are proposed. They deal with the main problems in RWSNs i.e....

    Provided By Universidade Federal de Lavras

  • White Papers // May 2012

    Simultaneous Branch and Warp Interweaving for Sustained GPU Performance

    Single-Instruction Multiple-Thread (SIMT) micro-architectures implemented in Graphics Processing Units (GPUs) run fine-grained threads in lockstep by grouping them into units, referred to as warps, to amortize the cost of instruction fetch, decode and control logic over multiple execution units. As individual threads take divergent execution paths, their processing takes place...

    Provided By Universidade Federal de Lavras

  • White Papers // Sep 2009

    Stochastic and Balanced Distributed Energy-Efficient Clustering (SBDEEC) for Heterogeneous Wireless Sensor Networks

    Typically, a wireless sensor network contains an important number of inexpensive power constrained sensors which collect data from the environment and transmit them towards the base station in a cooperative way. Saving energy and therefore, extending the wireless sensor networks lifetime, imposes a great challenge. Many new protocols are specifically...

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2009

    Verifiable Signature Sharing Scheme Based on Strong RSA Assumption

    A signature scheme provides a way for each user to sign messages so that the signatures can later be verified by anyone else. More specifically, each user can create a matched pair of private and public keys so that only he can create a signature for a message using his...

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2009

    Hierarchical Clustering for Identifying Crosscutting Concerns in Object Oriented Software Systems

    Crosscutting concerns are parts of a program that affect or crosscut other concerns. Usually these concerns cannot be cleanly decomposed from the rest of the system, and they are mixed with many core concerns from the system leading to code scattering and code tangling, and, also, to systems that are...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    A Representation Model of Design Rationale for the Design of ERP Systems

    Special attention has been given to documentation and support activities in Software Engineering design, mainly when they are related to complex systems and distributed teams. Usually, information related to the final decisions of each phase is registered. However, the reasons of each decision and the alternatives that were considered and...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    Steerable Pyramids Feature Based Classification Using Fisher Linear Discriminant for Face Recognition

    In this paper, an efficient local appearance feature extraction method based the multiresolution Steerable Pyramids (SP) transform is proposed in order to further enhance the performance of the well known Fisher Linear Discriminant (FLD) method when applied to face recognition. Each face is described by a subset of band filtered...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    A Communication Architecture Based on SCTP and SIP to Support Mobile Real-Time Multimedia Applications

    New versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. An end-to-end communication architecture is proposed herein, using SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Quantum Cryptographic Protocols for Secure Communication

    Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, the authors survey some results in quantum cryptography. After a brief introduction to classical cryptography, some fundamental...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Reconfigurable Path Restoration Schemes for MPLS Networks

    Multi-Protocol Label Switching (MPLS) is an alternative to integrate the traditional Internet Protocol (IP) routing and switching technologies because it provides end-to-end Quality of Service (QoS), guarantees Traffic Engineering, and support Virtual Private Networks (VPNs). However, MPLS must use path restoration schemes to guarantee the delivery of packets through a...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    An Extended Approach for Recovering BPMN and WebML Models From Legacy Web Applications

    A Web application is a software system which provides its functionalities through the Web. Understanding, maintaining and re-engineering legacy Web applications requires a reverse-engineering process. In a previous work, an ontology based Web application reverse-engineering approach has been proposed for recovering data models presenting static aspect of the Web application....

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Identifying Coverage Perimeter of Heterogeneous Wireless Sensor Networks

    Perimeter surveillance is one of the major applications of sensor networks. The perimeter represents the physical extent of the region to be monitored and depending on the application, it is required to sense the intrusion enter the monitored region or leave from the monitored region of the object being monitored....

    Provided By Universidade Federal de Lavras

  • White Papers // Mar 2009

    Energy-Efficient Scheduling in WMSNs

    Recent technological breakthroughs in ultra-high integration and low-power electronics have enabled the development of tiny battery-operated sensors. The signal processing and communication activities are the main consumers of sensor's energy. Since sensors are battery-operated, keeping the sensor active all the time will limit the battery's lifetime. Therefore, optimal organization and...

    Provided By Universidade Federal de Lavras

  • White Papers // Mar 2009

    Investigating and Analyzing the Light-Weight Ciphers for Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) are characterized by the severe constraints in the computational, storage and energy resources. Though there has been significant improvement in the available computational resources due to the proliferation of the next-generation sensor nodes, the energy and storage resources of sensor nodes are still limited. As...

    Provided By Universidade Federal de Lavras

  • White Papers // Feb 2009

    Cluster Based Routing Protocol for Mobile Ad Hoc Networks

    In this paper, the authors proposed a cluster based routing protocol for mobile ad hoc network. It uses clustering's structure to decrease average end-to-end delay and improve the average packet delivery ratio. They simulate their routing protocol for nodes running the IEEE802.11 MAC. Results of their experiments show that the...

    Provided By Universidade Federal de Lavras

  • White Papers // Feb 2009

    Software Metrics Evaluation Based on Entropy

    Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The complexity of modern software, the commercial constraints and the expectation for high quality products demand the accurate fault prediction based on OO design metrics in...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    GA-SVM and Mutual Information Based Frequency Feature Selection for Face Recognition

    The dimensionality of existing data makes it difficult to deploy any information to identify features that discriminate between the classes of interest. Feature selection involves reducing the number of features, removes irrelevant, noisy and redundant data without significantly decreasing the prediction accuracy of the classifier. An efficient feature selection and...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    An Energy Aware Sensor Network Query Processing System

    Recent developments in hardware have enabled the widespread deployment of sensor networks consisting of small sensor nodes with sensing, computation, and communication capabilities. Sensor data are subject to several sources of errors resulting from power limitations, wireless communication, latency, throughput, and various environmental effects. Such errors may seriously impact the...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    Connector Based Metamodel for Architecture Description Language

    To provide hierarchical description from different software architectural viewpoints the authors need more than one abstraction hierarchy and connection mechanisms to support the interactions among components. Also, these mechanisms will support the refinement and traceability of architectural elements through the different levels of each hierarchy. Current methods and tools provide...

    Provided By Universidade Federal de Lavras

  • White Papers // May 2008

    A Comparison of BPMN and UML 2.0 Activity Diagrams

    Interest in evaluating Business Process Modeling Languages has widespread, in part due to the increase of the number of languages available for this purpose. Several works on the evaluation of BPMLs are available. Their evaluation is mainly based on perspectives centered in modeling experts. In this paper, the authors address...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2007

    Identity-Based Encryption for Sensor Networks

    In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this paper, the authors...

    Provided By Universidade Federal de Lavras

  • White Papers // Feb 2009

    Cluster Based Routing Protocol for Mobile Ad Hoc Networks

    In this paper, the authors proposed a cluster based routing protocol for mobile ad hoc network. It uses clustering's structure to decrease average end-to-end delay and improve the average packet delivery ratio. They simulate their routing protocol for nodes running the IEEE802.11 MAC. Results of their experiments show that the...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    GA-SVM and Mutual Information Based Frequency Feature Selection for Face Recognition

    The dimensionality of existing data makes it difficult to deploy any information to identify features that discriminate between the classes of interest. Feature selection involves reducing the number of features, removes irrelevant, noisy and redundant data without significantly decreasing the prediction accuracy of the classifier. An efficient feature selection and...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    An Energy Aware Sensor Network Query Processing System

    Recent developments in hardware have enabled the widespread deployment of sensor networks consisting of small sensor nodes with sensing, computation, and communication capabilities. Sensor data are subject to several sources of errors resulting from power limitations, wireless communication, latency, throughput, and various environmental effects. Such errors may seriously impact the...

    Provided By Universidade Federal de Lavras

  • White Papers // Mar 2009

    Energy-Efficient Scheduling in WMSNs

    Recent technological breakthroughs in ultra-high integration and low-power electronics have enabled the development of tiny battery-operated sensors. The signal processing and communication activities are the main consumers of sensor's energy. Since sensors are battery-operated, keeping the sensor active all the time will limit the battery's lifetime. Therefore, optimal organization and...

    Provided By Universidade Federal de Lavras

  • White Papers // Jan 2009

    Connector Based Metamodel for Architecture Description Language

    To provide hierarchical description from different software architectural viewpoints the authors need more than one abstraction hierarchy and connection mechanisms to support the interactions among components. Also, these mechanisms will support the refinement and traceability of architectural elements through the different levels of each hierarchy. Current methods and tools provide...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Quantum Cryptographic Protocols for Secure Communication

    Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, the authors survey some results in quantum cryptography. After a brief introduction to classical cryptography, some fundamental...

    Provided By Universidade Federal de Lavras

  • White Papers // Feb 2009

    Software Metrics Evaluation Based on Entropy

    Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The complexity of modern software, the commercial constraints and the expectation for high quality products demand the accurate fault prediction based on OO design metrics in...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Reconfigurable Path Restoration Schemes for MPLS Networks

    Multi-Protocol Label Switching (MPLS) is an alternative to integrate the traditional Internet Protocol (IP) routing and switching technologies because it provides end-to-end Quality of Service (QoS), guarantees Traffic Engineering, and support Virtual Private Networks (VPNs). However, MPLS must use path restoration schemes to guarantee the delivery of packets through a...

    Provided By Universidade Federal de Lavras

  • White Papers // Mar 2009

    Investigating and Analyzing the Light-Weight Ciphers for Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) are characterized by the severe constraints in the computational, storage and energy resources. Though there has been significant improvement in the available computational resources due to the proliferation of the next-generation sensor nodes, the energy and storage resources of sensor nodes are still limited. As...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    Identifying Coverage Perimeter of Heterogeneous Wireless Sensor Networks

    Perimeter surveillance is one of the major applications of sensor networks. The perimeter represents the physical extent of the region to be monitored and depending on the application, it is required to sense the intrusion enter the monitored region or leave from the monitored region of the object being monitored....

    Provided By Universidade Federal de Lavras

  • White Papers // Sep 2009

    Stochastic and Balanced Distributed Energy-Efficient Clustering (SBDEEC) for Heterogeneous Wireless Sensor Networks

    Typically, a wireless sensor network contains an important number of inexpensive power constrained sensors which collect data from the environment and transmit them towards the base station in a cooperative way. Saving energy and therefore, extending the wireless sensor networks lifetime, imposes a great challenge. Many new protocols are specifically...

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2009

    Hierarchical Clustering for Identifying Crosscutting Concerns in Object Oriented Software Systems

    Crosscutting concerns are parts of a program that affect or crosscut other concerns. Usually these concerns cannot be cleanly decomposed from the rest of the system, and they are mixed with many core concerns from the system leading to code scattering and code tangling, and, also, to systems that are...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2009

    An Extended Approach for Recovering BPMN and WebML Models From Legacy Web Applications

    A Web application is a software system which provides its functionalities through the Web. Understanding, maintaining and re-engineering legacy Web applications requires a reverse-engineering process. In a previous work, an ontology based Web application reverse-engineering approach has been proposed for recovering data models presenting static aspect of the Web application....

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2009

    Verifiable Signature Sharing Scheme Based on Strong RSA Assumption

    A signature scheme provides a way for each user to sign messages so that the signatures can later be verified by anyone else. More specifically, each user can create a matched pair of private and public keys so that only he can create a signature for a message using his...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    Steerable Pyramids Feature Based Classification Using Fisher Linear Discriminant for Face Recognition

    In this paper, an efficient local appearance feature extraction method based the multiresolution Steerable Pyramids (SP) transform is proposed in order to further enhance the performance of the well known Fisher Linear Discriminant (FLD) method when applied to face recognition. Each face is described by a subset of band filtered...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    A Communication Architecture Based on SCTP and SIP to Support Mobile Real-Time Multimedia Applications

    New versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. An end-to-end communication architecture is proposed herein, using SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle...

    Provided By Universidade Federal de Lavras

  • White Papers // Jul 2009

    A Representation Model of Design Rationale for the Design of ERP Systems

    Special attention has been given to documentation and support activities in Software Engineering design, mainly when they are related to complex systems and distributed teams. Usually, information related to the final decisions of each phase is registered. However, the reasons of each decision and the alternatives that were considered and...

    Provided By Universidade Federal de Lavras

  • White Papers // May 2012

    MAC Protocols for Wireless Sensor Networks Over Radio-Over-Fiber Links

    In this paper, two Medium Access Control (MAC) protocols exclusively tailored to WSNs over RoF (RWSNs) namely SPP-MAC (Scheduled Priority Polling Medium Access Control) (polling-based) and HMARS (Hybrid Medium Access Control for Hybrid Radio-over-Fiber Wireless Sensor Network Architecture) (hybrid-based) are proposed. They deal with the main problems in RWSNs i.e....

    Provided By Universidade Federal de Lavras

  • White Papers // May 2012

    Simultaneous Branch and Warp Interweaving for Sustained GPU Performance

    Single-Instruction Multiple-Thread (SIMT) micro-architectures implemented in Graphics Processing Units (GPUs) run fine-grained threads in lockstep by grouping them into units, referred to as warps, to amortize the cost of instruction fetch, decode and control logic over multiple execution units. As individual threads take divergent execution paths, their processing takes place...

    Provided By Universidade Federal de Lavras

  • White Papers // Nov 2012

    Data and Instruction Uniformity in Minimal Multi-Threading

    Simultaneous Multi-Threading (SMT) is a hardware model in which different threads share the same instruction fetching unit. This model is a compromise between high parallelism and low hardware cost. Minimal Multi-Threading (MMT) is a technique recently proposed to share instructions and execution between threads in a SMT machine. In this...

    Provided By Universidade Federal de Lavras

  • White Papers // Nov 2012

    Divergence Analysis with Affine Constraints

    The rising popularity of graphics processing units is bringing renewed interest in code optimization techniques for SIMD processors. Many of these optimizations rely on divergence analyses, which classify variables as uniform, if they have the same value on every thread, or divergent, if they might not. This paper introduces a...

    Provided By Universidade Federal de Lavras

  • White Papers // Aug 2013

    A Parallel Hybrid Genetic Algorithm on Cloud Computing for the Vehicle Routing Problem with Time Windows

    In this paper, the authors propose a new Parallel Hybrid Genetic Algorithm approach for Vehicle Routing Problem with Time Windows. The algorithm was developed to be executed on cloud computing web services and serves as an online application for real world problems. A new parallel scheme was proposed with shared...

    Provided By Universidade Federal de Lavras

  • White Papers // Dec 2013

    Quantum Nonlocality as the Route for Ever-Lasting Unconditionally Secure Bit Commitment

    The authors present a bit commitment protocol based on quantum nonlocality that seems to bring everlasting unconditional security. Although security is not rigorously proved, physical arguments and numerical simulations support this conclusion. The key point is that the proof of the commitment is forced to become classical data uncorrelated with...

    Provided By Universidade Federal de Lavras

  • White Papers // May 2008

    A Comparison of BPMN and UML 2.0 Activity Diagrams

    Interest in evaluating Business Process Modeling Languages has widespread, in part due to the increase of the number of languages available for this purpose. Several works on the evaluation of BPMLs are available. Their evaluation is mainly based on perspectives centered in modeling experts. In this paper, the authors address...

    Provided By Universidade Federal de Lavras

  • White Papers // Apr 2007

    Identity-Based Encryption for Sensor Networks

    In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the advent of Identity-Based Encryption (IBE) has enabled a wide range of new cryptographic solutions. In this paper, the authors...

    Provided By Universidade Federal de Lavras