University of Applied Sciences Rapperswil

Displaying 1-35 of 35 results

  • White Papers // Jan 2014

    QORE: A Fault Tolerant Network-on-Chip Architecture with Power-Efficient Quad-Function Channel (QFC) Buffers

    Network-on-Chips (NoCs) are quickly becoming the standard communication paradigm for the growing number of cores on the chip. While NoCs can deliver sufficient bandwidth and enhance scalability, NoCs suffer from high power consumption due to the router micro-architecture and communication channels that facilitate inter-core communication. As technology keeps scaling down...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2013

    An Improved Router Design for Reliable On-Chip Networks

    Aggressive technology scaling into the deep nanometer regime has made the Network-on-Chip (NoC) in multicore architectures increasingly vulnerable to faults. This has accelerated the need for designing reliable NoCs. To this end, the authors propose a reliable NoC router architecture capable of tolerating multiple permanent faults. The proposed router achieves...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Sep 2013

    Tackling Permanent Faults in the Network-on-Chip Router Pipeline

    The proliferation of multi-core and many-core chips for performance scaling is making the Network-on-Chip (NoC) occupy a growing amount of silicon area spanning several metal layers. The NoC is neither immune to hard faults and transient faults nor unaffected by the adverse increase in hard faults caused by technology scaling....

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2013

    Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems

    Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2013

    Fast Recovery From Link Failures in Ethernet Networks

    Fast-recovery from link failures is a well-studied topic in IP networks. Employing fast-recovery in Ethernet networks is complicated as the forwarding is based on destination MAC addresses, which do not have the hierarchical nature similar to those exhibited in Layer 3 in the form of IP-prefixes. Moreover, switches employ backward...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2013

    Weaknesses in Defenses Against Web-Borne Malware

    Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery today, making defenses against web-borne malware crucial for system security. This paper explores weaknesses in existing approaches to the detection of malicious JavaScript code. These approaches generally fall into two categories: lightweight techniques focusing on...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2013

    Countering Selfish Misbehavior in Multi-Channel MAC Protocols

    The authors address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols. They show that selfish users can manipulate the protocol parameters to gain an unfair share of the available bandwidth, while remaining undetected. They identify optimal misbehavior strategies that can lead to the isolation of a subset of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2012

    A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation

    Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for the authors' Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Concurrent Prefix Hijacks: Occurrence and Impacts

    A concurrent pre x hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme case is leaking the entire routing table, i.e., hi-jacking all the prefixes in the table. This is a well-known problem and there exists a preventive measure in practice to safeguard against...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Your Data, Your Way: The IPlant Foundation API Data Services

    This paper introduces the iPlant Foundation API Data Services, a cloud-based, hosted solution for distributed data and metadata management in the iPlant Data Store. The iPlant Data Store is a virtual storage solution for over 7000 users providing seamless access to over 6PB of distributed storage within the iPlant cyber-infrastructure...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    3D-NoC: Reconfigurable 3D Photonic On-Chip Interconnect for Multicores

    The power dissipation of metallic interconnects in future multicore architectures are projected to be a major bottleneck as the authors scale to sub-nanometer regime. This has motivated researchers to develop alternate power-efficient technology solutions to the performance limitations of future multicores. Nanophotonic Interconnects (NIs) is a disruptive technology solution that...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    On the Maximum Number of Linearly Independent Cycles and Paths in a Network

    The term network tomography, coined by Vardi, refers to the inference of certain internal characteristics of networks based on end-to-end measurements. The authors consider the problem of identifying additive link metrics in an arbitrary undirected network using measurement nodes and establishing paths/cycles between them. For a given placement of measurement...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2012

    A Case for Stateful Forwarding Plane

    In Named Data Networking (NDN), packets carry data names instead of source or destination addresses. This change of paradigm leads to a new network forwarding plane: data consumers send Interest packets, routers forward them and maintain the state of all pending Interests, which is then used to guide Data packets...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Temporal Implications of Database Information Accountability

    Information restriction controls access and renders records immutable; information accountability requires data transparency to easily and efficiently determine when a particular use is appropriate. Information accountability in the paper of relational databases is associated with time in a surprising number of ways, as is summarized in this paper. Notarization and...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Evaluation of Fault Tolerant Channel Buffers for Improving Reliability in NoCs

    Elastic or channel buffers can improve the overall power and area overhead of Network-on-Chip (NoC) architectures by reducing or replacing large, power hungry router buffers. In this paper, the authors design three fault tolerant schemes for their channel buffers which are used in a Concentrated Torus (CTorus) topology to reduce...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Power-Efficient Spatial Multiplexing for Multiantenna MANETs

    The authors consider the problem of minimizing network's transmit power for given transmission rate demands of all links in a Multi-Input Multi-Output (MIMO) ad hoc network. The problem is non-convex, hence, challenging to be solved, even in a centralized manner. To derive a distributed solution, they reformulate the problem as...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Interference Mitigation Using Spectrum Sensing and Dynamic Frequency Hopping

    Wireless communications are prone to both unintentional and intentional RF interference. Such interference has significant impact on the reliability of packet transmissions. In this paper, the authors consider interference mitigation in Frequency Hopping (FH) systems. They employ Cognitive Radios (CRs) for proactive interference sensing in such systems. Through this proactive...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Out-of-Band Sensing Scheme for Dynamic Frequency Hopping in Satellite Communications

    This paper makes preliminary steps at exploring a novel application of Cognitive Radios (CRs) for reliable satellite communications. The authors propose the use of dynamically adjusted Frequency Hopping (FH) sequences for satellite transmissions. Such sequences are more robust against smart eavesdropping and targeted interference than fixed FH sequences. In their...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications

    Very important data is transferred every second along wide distances. This data might be military information, financial records, and other vital information that is transmitted over public non-secure channels like the internet for example. The need to secure data transmission over channels became a priority. Cryptography is widely used technique...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Application of Micro-Specialization to Query Evaluation Operators

    Relational DataBase Management Systems (RDBMS) support a wide variety of data types and operations. Such generality involves much branch condition checking, which introduces inefficiency within the query evaluation loop. The authors previously introduced micro-specialization, which improves performance by eliminating unnecessary branching statements and the actual code branches by exploiting invariants...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    DataBase Management Systems (DBMSes) form a cornerstone of modern IT infrastructure, and it is essential that they have excellent performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data access from secondary storage. This paper shows that DBMSes can also benefit significantly from dynamic...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2011

    Temporal Support for Persistent Stored Modules

    The authors show how to extend temporal support of SQL to the turing-complete portion of SQL that of Persistent Stored Modules (PSM). Their approach requires minor new syntax beyond that already in SQL/temporal to define and to invoke PSM procedures and functions, thereby extending the current, sequenced, and non-sequenced semantics...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2011

    Micro-Specialization in DBMSes

    Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using runtime metadata lookups and tests that ensure that control is channeled to the appropriate code in all cases. Unfortunately, these lookups and tests are carried out even...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2011

    Deep-Space and Near-Earth Optical Communications by Coded Orbital Angular Momentum (OAM) Modulation

    In order to achieve multi-gigabit transmission (projected for 2020) for the use in interplanetary communications, the usage of large number of time slots in Pulse-Position Modulation (PPM), typically used in deep-space applications, is needed, which imposes stringent requirements on system design and implementation. As an alternative satisfying high-bandwidth demands of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2011

    Automated Software Generation and Hardware Coprocessor Synthesis for Data- Adaptable Reconfigurable Systems

    The authors present an overview of a data-adaptable reconfigurable embedded systems design methodology. The paper presents a novel paradigm for hardware/software co-design and reconfigurable computing driven by data adaptability. The data-adaptable approach allows designers to directly model the data configurability of the target application, thereby enabling a solution that permits...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2010

    Game Theory Based Network Security

    The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2010

    On the Existence of Typical Minimum Distance for Protograph-Based LDPC Codes

    Low-Density Parity-Check (LDPC) codes were proposed by Gallager in 1963. Ensemble weight enumerators for unstructured irregular LDPC codes and turbo-like codes have been reported. Recently, researchers became interested in the design of LDPC codes with imposed sub-structures, starting with the introduction of multi-edge type codes. Protograph-based LDPC codes are a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2009

    Safeguarding Data Delivery by Decoupling Path Propagation and Adoption

    False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed and implemented recently, however, it takes time to detect attacks, notify operators, and stop false announcements. Thus detection systems should be complemented by a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2009

    A Robust High Speed Link Design for NoC at 65nm Technology Node

    Network-on-Chip (NoC) architectures provide a scalable solution to the wire delay constraints in deep submicron Very Large Scale Integrated circuit (VLSI) designs. To reduce power consumption and improve performance, the authors propose in this paper a technique which provides high speed link design by utilizing a compact model for repeater...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2009

    NBTI Aware Workload Balancing in Multi-core Systems

    As device feature size continues to shrink, reliability becomes a severe issue due to process variation, particle-induced transient errors, and transistor wear-out/stress such as Negative Bias Temperature Instability (NBTI). Unless this problem is addressed, Chip Multi-Processor (CMP) systems face low yields and short Mean-Time-To-Failure (MTTF). This paper proposes a new...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2008

    Design Space Exploration for Application Specific FPGAs in System-on-a-Chip Designs

    The inclusion of Field Programmable Gate Arrays (FPGAs) within a System-on-Chip (SoC) design offers programmability, flexibility, and reconfigurability not possible with Application Specific Integrated Circuits (ASIC) or full custom implementations. However, these benefits come at the expense of significant area, performance, and power consumption overheads compared to ASIC or full-custom...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2008

    Adaptive Inter-router Links for Low-Power, Area-Efficient and Reliable Network-on-Chip (NoC) Architectures

    Technology scaling into the deep sub-micron regime has led to the development of multi-core architectures with increased transistor density on a single chip. The increasing wire delay constraints in deep submicron VLSI designs have led to the emergence of scalable and modular Network-on-Chip (NoC) architectures. As the power consumption, area...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2007

    Scalability and Parallel Execution of Warp Processing - Dynamic Hardware/Software Partitioning

    Warp processors are a novel architecture capable of autonomously optimizing an executing application by dynamically re-implementing critical kernels within the software as custom hardware circuits in an on-chip FPGA. Previous research on warp processing focused on low-power embedded systems, incorporating a low-end ARM processor as the main software execution resource....

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2007

    Net-X : Unified Data-Centric Internet Services

    Databases and networks currently have different service models. Database services are data-centric in that users typically describe the content of data and the system finds and returns matching data. However, traditional Internet services are server-centric in that users have to know the location of data (e.g., a URL) in order...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2006

    Low-Power Warp Processor for Power Efficient High- Performance Embedded Systems

    Researchers previously proposed warp processors, a novel architecture capable of transparently optimizing an executing application by dynamically re-implementing critical kernels within the software as custom hardware circuits in an on-chip FPGA. However, the original warp processor design was primarily performance-driven and did not focus on power consumption, which is becoming...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Temporal Implications of Database Information Accountability

    Information restriction controls access and renders records immutable; information accountability requires data transparency to easily and efficiently determine when a particular use is appropriate. Information accountability in the paper of relational databases is associated with time in a surprising number of ways, as is summarized in this paper. Notarization and...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Application of Micro-Specialization to Query Evaluation Operators

    Relational DataBase Management Systems (RDBMS) support a wide variety of data types and operations. Such generality involves much branch condition checking, which introduces inefficiency within the query evaluation loop. The authors previously introduced micro-specialization, which improves performance by eliminating unnecessary branching statements and the actual code branches by exploiting invariants...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2011

    Micro-Specialization in DBMSes

    Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using runtime metadata lookups and tests that ensure that control is channeled to the appropriate code in all cases. Unfortunately, these lookups and tests are carried out even...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    DataBase Management Systems (DBMSes) form a cornerstone of modern IT infrastructure, and it is essential that they have excellent performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data access from secondary storage. This paper shows that DBMSes can also benefit significantly from dynamic...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2007

    Net-X : Unified Data-Centric Internet Services

    Databases and networks currently have different service models. Database services are data-centric in that users typically describe the content of data and the system finds and returns matching data. However, traditional Internet services are server-centric in that users have to know the location of data (e.g., a URL) in order...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2014

    QORE: A Fault Tolerant Network-on-Chip Architecture with Power-Efficient Quad-Function Channel (QFC) Buffers

    Network-on-Chips (NoCs) are quickly becoming the standard communication paradigm for the growing number of cores on the chip. While NoCs can deliver sufficient bandwidth and enhance scalability, NoCs suffer from high power consumption due to the router micro-architecture and communication channels that facilitate inter-core communication. As technology keeps scaling down...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2013

    An Improved Router Design for Reliable On-Chip Networks

    Aggressive technology scaling into the deep nanometer regime has made the Network-on-Chip (NoC) in multicore architectures increasingly vulnerable to faults. This has accelerated the need for designing reliable NoCs. To this end, the authors propose a reliable NoC router architecture capable of tolerating multiple permanent faults. The proposed router achieves...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Sep 2013

    Tackling Permanent Faults in the Network-on-Chip Router Pipeline

    The proliferation of multi-core and many-core chips for performance scaling is making the Network-on-Chip (NoC) occupy a growing amount of silicon area spanning several metal layers. The NoC is neither immune to hard faults and transient faults nor unaffected by the adverse increase in hard faults caused by technology scaling....

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    3D-NoC: Reconfigurable 3D Photonic On-Chip Interconnect for Multicores

    The power dissipation of metallic interconnects in future multicore architectures are projected to be a major bottleneck as the authors scale to sub-nanometer regime. This has motivated researchers to develop alternate power-efficient technology solutions to the performance limitations of future multicores. Nanophotonic Interconnects (NIs) is a disruptive technology solution that...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Evaluation of Fault Tolerant Channel Buffers for Improving Reliability in NoCs

    Elastic or channel buffers can improve the overall power and area overhead of Network-on-Chip (NoC) architectures by reducing or replacing large, power hungry router buffers. In this paper, the authors design three fault tolerant schemes for their channel buffers which are used in a Concentrated Torus (CTorus) topology to reduce...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2009

    A Robust High Speed Link Design for NoC at 65nm Technology Node

    Network-on-Chip (NoC) architectures provide a scalable solution to the wire delay constraints in deep submicron Very Large Scale Integrated circuit (VLSI) designs. To reduce power consumption and improve performance, the authors propose in this paper a technique which provides high speed link design by utilizing a compact model for repeater...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2009

    NBTI Aware Workload Balancing in Multi-core Systems

    As device feature size continues to shrink, reliability becomes a severe issue due to process variation, particle-induced transient errors, and transistor wear-out/stress such as Negative Bias Temperature Instability (NBTI). Unless this problem is addressed, Chip Multi-Processor (CMP) systems face low yields and short Mean-Time-To-Failure (MTTF). This paper proposes a new...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2008

    Adaptive Inter-router Links for Low-Power, Area-Efficient and Reliable Network-on-Chip (NoC) Architectures

    Technology scaling into the deep sub-micron regime has led to the development of multi-core architectures with increased transistor density on a single chip. The increasing wire delay constraints in deep submicron VLSI designs have led to the emergence of scalable and modular Network-on-Chip (NoC) architectures. As the power consumption, area...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2006

    Low-Power Warp Processor for Power Efficient High- Performance Embedded Systems

    Researchers previously proposed warp processors, a novel architecture capable of transparently optimizing an executing application by dynamically re-implementing critical kernels within the software as custom hardware circuits in an on-chip FPGA. However, the original warp processor design was primarily performance-driven and did not focus on power consumption, which is becoming...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2007

    Scalability and Parallel Execution of Warp Processing - Dynamic Hardware/Software Partitioning

    Warp processors are a novel architecture capable of autonomously optimizing an executing application by dynamically re-implementing critical kernels within the software as custom hardware circuits in an on-chip FPGA. Previous research on warp processing focused on low-power embedded systems, incorporating a low-end ARM processor as the main software execution resource....

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2011

    Automated Software Generation and Hardware Coprocessor Synthesis for Data- Adaptable Reconfigurable Systems

    The authors present an overview of a data-adaptable reconfigurable embedded systems design methodology. The paper presents a novel paradigm for hardware/software co-design and reconfigurable computing driven by data adaptability. The data-adaptable approach allows designers to directly model the data configurability of the target application, thereby enabling a solution that permits...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2008

    Design Space Exploration for Application Specific FPGAs in System-on-a-Chip Designs

    The inclusion of Field Programmable Gate Arrays (FPGAs) within a System-on-Chip (SoC) design offers programmability, flexibility, and reconfigurability not possible with Application Specific Integrated Circuits (ASIC) or full custom implementations. However, these benefits come at the expense of significant area, performance, and power consumption overheads compared to ASIC or full-custom...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Power-Efficient Spatial Multiplexing for Multiantenna MANETs

    The authors consider the problem of minimizing network's transmit power for given transmission rate demands of all links in a Multi-Input Multi-Output (MIMO) ad hoc network. The problem is non-convex, hence, challenging to be solved, even in a centralized manner. To derive a distributed solution, they reformulate the problem as...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Interference Mitigation Using Spectrum Sensing and Dynamic Frequency Hopping

    Wireless communications are prone to both unintentional and intentional RF interference. Such interference has significant impact on the reliability of packet transmissions. In this paper, the authors consider interference mitigation in Frequency Hopping (FH) systems. They employ Cognitive Radios (CRs) for proactive interference sensing in such systems. Through this proactive...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Out-of-Band Sensing Scheme for Dynamic Frequency Hopping in Satellite Communications

    This paper makes preliminary steps at exploring a novel application of Cognitive Radios (CRs) for reliable satellite communications. The authors propose the use of dynamically adjusted Frequency Hopping (FH) sequences for satellite transmissions. Such sequences are more robust against smart eavesdropping and targeted interference than fixed FH sequences. In their...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    On the Maximum Number of Linearly Independent Cycles and Paths in a Network

    The term network tomography, coined by Vardi, refers to the inference of certain internal characteristics of networks based on end-to-end measurements. The authors consider the problem of identifying additive link metrics in an arbitrary undirected network using measurement nodes and establishing paths/cycles between them. For a given placement of measurement...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2013

    Fast Recovery From Link Failures in Ethernet Networks

    Fast-recovery from link failures is a well-studied topic in IP networks. Employing fast-recovery in Ethernet networks is complicated as the forwarding is based on destination MAC addresses, which do not have the hierarchical nature similar to those exhibited in Layer 3 in the form of IP-prefixes. Moreover, switches employ backward...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Your Data, Your Way: The IPlant Foundation API Data Services

    This paper introduces the iPlant Foundation API Data Services, a cloud-based, hosted solution for distributed data and metadata management in the iPlant Data Store. The iPlant Data Store is a virtual storage solution for over 7000 users providing seamless access to over 6PB of distributed storage within the iPlant cyber-infrastructure...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2013

    Countering Selfish Misbehavior in Multi-Channel MAC Protocols

    The authors address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols. They show that selfish users can manipulate the protocol parameters to gain an unfair share of the available bandwidth, while remaining undetected. They identify optimal misbehavior strategies that can lead to the isolation of a subset of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2012

    A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation

    Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for the authors' Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2013

    Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems

    Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2012

    A Case for Stateful Forwarding Plane

    In Named Data Networking (NDN), packets carry data names instead of source or destination addresses. This change of paradigm leads to a new network forwarding plane: data consumers send Interest packets, routers forward them and maintain the state of all pending Interests, which is then used to guide Data packets...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2010

    On the Existence of Typical Minimum Distance for Protograph-Based LDPC Codes

    Low-Density Parity-Check (LDPC) codes were proposed by Gallager in 1963. Ensemble weight enumerators for unstructured irregular LDPC codes and turbo-like codes have been reported. Recently, researchers became interested in the design of LDPC codes with imposed sub-structures, starting with the introduction of multi-edge type codes. Protograph-based LDPC codes are a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2011

    Deep-Space and Near-Earth Optical Communications by Coded Orbital Angular Momentum (OAM) Modulation

    In order to achieve multi-gigabit transmission (projected for 2020) for the use in interplanetary communications, the usage of large number of time slots in Pulse-Position Modulation (PPM), typically used in deep-space applications, is needed, which imposes stringent requirements on system design and implementation. As an alternative satisfying high-bandwidth demands of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2013

    Weaknesses in Defenses Against Web-Borne Malware

    Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery today, making defenses against web-borne malware crucial for system security. This paper explores weaknesses in existing approaches to the detection of malicious JavaScript code. These approaches generally fall into two categories: lightweight techniques focusing on...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2010

    Game Theory Based Network Security

    The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2009

    Safeguarding Data Delivery by Decoupling Path Propagation and Adoption

    False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed and implemented recently, however, it takes time to detect attacks, notify operators, and stop false announcements. Thus detection systems should be complemented by a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Concurrent Prefix Hijacks: Occurrence and Impacts

    A concurrent pre x hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme case is leaking the entire routing table, i.e., hi-jacking all the prefixes in the table. This is a well-known problem and there exists a preventive measure in practice to safeguard against...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications

    Very important data is transferred every second along wide distances. This data might be military information, financial records, and other vital information that is transmitted over public non-secure channels like the internet for example. The need to secure data transmission over channels became a priority. Cryptography is widely used technique...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2011

    Temporal Support for Persistent Stored Modules

    The authors show how to extend temporal support of SQL to the turing-complete portion of SQL that of Persistent Stored Modules (PSM). Their approach requires minor new syntax beyond that already in SQL/temporal to define and to invoke PSM procedures and functions, thereby extending the current, sequenced, and non-sequenced semantics...

    Provided By University of Applied Sciences Rapperswil