Universitas Tarumanagara

Displaying 1-7 of 7 results

  • White Papers // May 2013

    Quasi-Cyclic Flexible Regenerating Codes

    In a distributed storage environment, where the data is placed in nodes connected through a network, it is likely that one of these nodes fails. It is known that the use of erasure coding improves the fault tolerance and minimizes the redundancy added in distributed storage environments. The use of...

    Provided By Universitas Tarumanagara

  • White Papers // Mar 2013

    J3Gen: A PRNG for Low-Cost Passive RFID

    Pseudo-Random Number Generation (PRNG) is the main security tool in low-cost passive Radio-Frequency IDentification (RFID) technologies, such as EPC Gen2. The authors present a lightweight PRNG design for low-cost passive RFID tags, named J3Gen. J3Gen is based on a Linear Feedback Shift Register (LFSR) configured with multiple feedback polynomials. The...

    Provided By Universitas Tarumanagara

  • White Papers // Jun 2012

    Security and Privacy Challenges in Smart Sensor Networks

    Smart sensor networks fall into a new sensor network paradigm that involves individuals in the sensing data collection process. While prior sensor network paradigms focused on collecting ephemeral data about the surrounding environment by means of a static sensor node topology, smart sensor networks collect and process large amounts of...

    Provided By Universitas Tarumanagara

  • White Papers // May 2012

    Offered Capacity Optimization Mechanisms for Multi-Beam Satellite Systems

    In this paper, the authors investigate capacity optimization mechanisms for multi-beam satellite systems built on a realistic payload model. The first proposed mechanism deals with long term traffic variations, for which capacity optimization algorithms are proposed based on per-beam traffic requests. Due to the high asymmetry of the traffic, their...

    Provided By Universitas Tarumanagara

  • White Papers // Mar 2012

    Data-Driven Based IMC Control

    New control methodologies based only on experimental data have recently appeared in literature. These methodologies skip the modeling step and find the controller directly from one or more experiments on the plant. In this paper, a new data-driven methodology for the Internal Model Control controller tuning based on the Virtual...

    Provided By Universitas Tarumanagara

  • White Papers // Jul 2009

    Evaluation of Two Privacy-Preserving Protocols for the DNS

    The rise of new Internet services, especially those related to the integration of people and physical objects to the net, makes visible the limitations of the DNS protocol. The exchange of data through DNS procedures flows today into hostile networks as clear text. Packets within this exchange can easily be...

    Provided By Universitas Tarumanagara

  • White Papers // Nov 2008

    A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications

    Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models, organizations, and so on. Moreover, critical systems such as those related to health care, banking, or even emergency response, are relying on such applications...

    Provided By Universitas Tarumanagara

  • White Papers // May 2012

    Offered Capacity Optimization Mechanisms for Multi-Beam Satellite Systems

    In this paper, the authors investigate capacity optimization mechanisms for multi-beam satellite systems built on a realistic payload model. The first proposed mechanism deals with long term traffic variations, for which capacity optimization algorithms are proposed based on per-beam traffic requests. Due to the high asymmetry of the traffic, their...

    Provided By Universitas Tarumanagara

  • White Papers // Mar 2012

    Data-Driven Based IMC Control

    New control methodologies based only on experimental data have recently appeared in literature. These methodologies skip the modeling step and find the controller directly from one or more experiments on the plant. In this paper, a new data-driven methodology for the Internal Model Control controller tuning based on the Virtual...

    Provided By Universitas Tarumanagara

  • White Papers // Jun 2012

    Security and Privacy Challenges in Smart Sensor Networks

    Smart sensor networks fall into a new sensor network paradigm that involves individuals in the sensing data collection process. While prior sensor network paradigms focused on collecting ephemeral data about the surrounding environment by means of a static sensor node topology, smart sensor networks collect and process large amounts of...

    Provided By Universitas Tarumanagara

  • White Papers // Mar 2013

    J3Gen: A PRNG for Low-Cost Passive RFID

    Pseudo-Random Number Generation (PRNG) is the main security tool in low-cost passive Radio-Frequency IDentification (RFID) technologies, such as EPC Gen2. The authors present a lightweight PRNG design for low-cost passive RFID tags, named J3Gen. J3Gen is based on a Linear Feedback Shift Register (LFSR) configured with multiple feedback polynomials. The...

    Provided By Universitas Tarumanagara

  • White Papers // Jul 2009

    Evaluation of Two Privacy-Preserving Protocols for the DNS

    The rise of new Internet services, especially those related to the integration of people and physical objects to the net, makes visible the limitations of the DNS protocol. The exchange of data through DNS procedures flows today into hostile networks as clear text. Packets within this exchange can easily be...

    Provided By Universitas Tarumanagara

  • White Papers // Nov 2008

    A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications

    Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models, organizations, and so on. Moreover, critical systems such as those related to health care, banking, or even emergency response, are relying on such applications...

    Provided By Universitas Tarumanagara

  • White Papers // May 2013

    Quasi-Cyclic Flexible Regenerating Codes

    In a distributed storage environment, where the data is placed in nodes connected through a network, it is likely that one of these nodes fails. It is known that the use of erasure coding improves the fault tolerance and minimizes the redundancy added in distributed storage environments. The use of...

    Provided By Universitas Tarumanagara