University of Applied Sciences Rapperswil

Displaying 1-23 of 23 results

  • White Papers // May 2013

    Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems

    Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2013

    Fast Recovery From Link Failures in Ethernet Networks

    Fast-recovery from link failures is a well-studied topic in IP networks. Employing fast-recovery in Ethernet networks is complicated as the forwarding is based on destination MAC addresses, which do not have the hierarchical nature similar to those exhibited in Layer 3 in the form of IP-prefixes. Moreover, switches employ backward...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2013

    Weaknesses in Defenses Against Web-Borne Malware

    Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery today, making defenses against web-borne malware crucial for system security. This paper explores weaknesses in existing approaches to the detection of malicious JavaScript code. These approaches generally fall into two categories: lightweight techniques focusing on...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2013

    Countering Selfish Misbehavior in Multi-Channel MAC Protocols

    The authors address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols. They show that selfish users can manipulate the protocol parameters to gain an unfair share of the available bandwidth, while remaining undetected. They identify optimal misbehavior strategies that can lead to the isolation of a subset of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2012

    A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation

    Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for the authors' Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Concurrent Prefix Hijacks: Occurrence and Impacts

    A concurrent pre x hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme case is leaking the entire routing table, i.e., hi-jacking all the prefixes in the table. This is a well-known problem and there exists a preventive measure in practice to safeguard against...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Your Data, Your Way: The IPlant Foundation API Data Services

    This paper introduces the iPlant Foundation API Data Services, a cloud-based, hosted solution for distributed data and metadata management in the iPlant Data Store. The iPlant Data Store is a virtual storage solution for over 7000 users providing seamless access to over 6PB of distributed storage within the iPlant cyber-infrastructure...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    On the Maximum Number of Linearly Independent Cycles and Paths in a Network

    The term network tomography, coined by Vardi, refers to the inference of certain internal characteristics of networks based on end-to-end measurements. The authors consider the problem of identifying additive link metrics in an arbitrary undirected network using measurement nodes and establishing paths/cycles between them. For a given placement of measurement...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2012

    A Case for Stateful Forwarding Plane

    In Named Data Networking (NDN), packets carry data names instead of source or destination addresses. This change of paradigm leads to a new network forwarding plane: data consumers send Interest packets, routers forward them and maintain the state of all pending Interests, which is then used to guide Data packets...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Temporal Implications of Database Information Accountability

    Information restriction controls access and renders records immutable; information accountability requires data transparency to easily and efficiently determine when a particular use is appropriate. Information accountability in the paper of relational databases is associated with time in a surprising number of ways, as is summarized in this paper. Notarization and...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Power-Efficient Spatial Multiplexing for Multiantenna MANETs

    The authors consider the problem of minimizing network's transmit power for given transmission rate demands of all links in a Multi-Input Multi-Output (MIMO) ad hoc network. The problem is non-convex, hence, challenging to be solved, even in a centralized manner. To derive a distributed solution, they reformulate the problem as...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Interference Mitigation Using Spectrum Sensing and Dynamic Frequency Hopping

    Wireless communications are prone to both unintentional and intentional RF interference. Such interference has significant impact on the reliability of packet transmissions. In this paper, the authors consider interference mitigation in Frequency Hopping (FH) systems. They employ Cognitive Radios (CRs) for proactive interference sensing in such systems. Through this proactive...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Out-of-Band Sensing Scheme for Dynamic Frequency Hopping in Satellite Communications

    This paper makes preliminary steps at exploring a novel application of Cognitive Radios (CRs) for reliable satellite communications. The authors propose the use of dynamically adjusted Frequency Hopping (FH) sequences for satellite transmissions. Such sequences are more robust against smart eavesdropping and targeted interference than fixed FH sequences. In their...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications

    Very important data is transferred every second along wide distances. This data might be military information, financial records, and other vital information that is transmitted over public non-secure channels like the internet for example. The need to secure data transmission over channels became a priority. Cryptography is widely used technique...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    DataBase Management Systems (DBMSes) form a cornerstone of modern IT infrastructure, and it is essential that they have excellent performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data access from secondary storage. This paper shows that DBMSes can also benefit significantly from dynamic...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Application of Micro-Specialization to Query Evaluation Operators

    Relational DataBase Management Systems (RDBMS) support a wide variety of data types and operations. Such generality involves much branch condition checking, which introduces inefficiency within the query evaluation loop. The authors previously introduced micro-specialization, which improves performance by eliminating unnecessary branching statements and the actual code branches by exploiting invariants...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2011

    Temporal Support for Persistent Stored Modules

    The authors show how to extend temporal support of SQL to the turing-complete portion of SQL that of Persistent Stored Modules (PSM). Their approach requires minor new syntax beyond that already in SQL/temporal to define and to invoke PSM procedures and functions, thereby extending the current, sequenced, and non-sequenced semantics...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2011

    Micro-Specialization in DBMSes

    Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using runtime metadata lookups and tests that ensure that control is channeled to the appropriate code in all cases. Unfortunately, these lookups and tests are carried out even...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2011

    Deep-Space and Near-Earth Optical Communications by Coded Orbital Angular Momentum (OAM) Modulation

    In order to achieve multi-gigabit transmission (projected for 2020) for the use in interplanetary communications, the usage of large number of time slots in Pulse-Position Modulation (PPM), typically used in deep-space applications, is needed, which imposes stringent requirements on system design and implementation. As an alternative satisfying high-bandwidth demands of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2010

    Game Theory Based Network Security

    The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2010

    On the Existence of Typical Minimum Distance for Protograph-Based LDPC Codes

    Low-Density Parity-Check (LDPC) codes were proposed by Gallager in 1963. Ensemble weight enumerators for unstructured irregular LDPC codes and turbo-like codes have been reported. Recently, researchers became interested in the design of LDPC codes with imposed sub-structures, starting with the introduction of multi-edge type codes. Protograph-based LDPC codes are a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2009

    Safeguarding Data Delivery by Decoupling Path Propagation and Adoption

    False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed and implemented recently, however, it takes time to detect attacks, notify operators, and stop false announcements. Thus detection systems should be complemented by a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2007

    Net-X : Unified Data-Centric Internet Services

    Databases and networks currently have different service models. Database services are data-centric in that users typically describe the content of data and the system finds and returns matching data. However, traditional Internet services are server-centric in that users have to know the location of data (e.g., a URL) in order...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Aug 2012

    On the Maximum Number of Linearly Independent Cycles and Paths in a Network

    The term network tomography, coined by Vardi, refers to the inference of certain internal characteristics of networks based on end-to-end measurements. The authors consider the problem of identifying additive link metrics in an arbitrary undirected network using measurement nodes and establishing paths/cycles between them. For a given placement of measurement...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2013

    Fast Recovery From Link Failures in Ethernet Networks

    Fast-recovery from link failures is a well-studied topic in IP networks. Employing fast-recovery in Ethernet networks is complicated as the forwarding is based on destination MAC addresses, which do not have the hierarchical nature similar to those exhibited in Layer 3 in the form of IP-prefixes. Moreover, switches employ backward...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Your Data, Your Way: The IPlant Foundation API Data Services

    This paper introduces the iPlant Foundation API Data Services, a cloud-based, hosted solution for distributed data and metadata management in the iPlant Data Store. The iPlant Data Store is a virtual storage solution for over 7000 users providing seamless access to over 6PB of distributed storage within the iPlant cyber-infrastructure...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2013

    Countering Selfish Misbehavior in Multi-Channel MAC Protocols

    The authors address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols. They show that selfish users can manipulate the protocol parameters to gain an unfair share of the available bandwidth, while remaining undetected. They identify optimal misbehavior strategies that can lead to the isolation of a subset of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2012

    A Hierarchical Intrusion Detection System for Clouds: Design and Evaluation

    Security and availability are critical for cloud environments because their massive amount of resources simplifies several attacks to cloud services. This paper introduces a distributed deployment and a centralized one for the authors' Cloud intrusion detection framework, CIDS-VERT. After describing the architectures and the components of the two deployments it...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2013

    Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems

    Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2012

    A Case for Stateful Forwarding Plane

    In Named Data Networking (NDN), packets carry data names instead of source or destination addresses. This change of paradigm leads to a new network forwarding plane: data consumers send Interest packets, routers forward them and maintain the state of all pending Interests, which is then used to guide Data packets...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2010

    On the Existence of Typical Minimum Distance for Protograph-Based LDPC Codes

    Low-Density Parity-Check (LDPC) codes were proposed by Gallager in 1963. Ensemble weight enumerators for unstructured irregular LDPC codes and turbo-like codes have been reported. Recently, researchers became interested in the design of LDPC codes with imposed sub-structures, starting with the introduction of multi-edge type codes. Protograph-based LDPC codes are a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2011

    Deep-Space and Near-Earth Optical Communications by Coded Orbital Angular Momentum (OAM) Modulation

    In order to achieve multi-gigabit transmission (projected for 2020) for the use in interplanetary communications, the usage of large number of time slots in Pulse-Position Modulation (PPM), typically used in deep-space applications, is needed, which imposes stringent requirements on system design and implementation. As an alternative satisfying high-bandwidth demands of...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Feb 2013

    Weaknesses in Defenses Against Web-Borne Malware

    Web-based mechanisms, often mediated by malicious JavaScript code, play an important role in malware delivery today, making defenses against web-borne malware crucial for system security. This paper explores weaknesses in existing approaches to the detection of malicious JavaScript code. These approaches generally fall into two categories: lightweight techniques focusing on...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jul 2010

    Game Theory Based Network Security

    The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Dec 2009

    Safeguarding Data Delivery by Decoupling Path Propagation and Adoption

    False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed and implemented recently, however, it takes time to detect attacks, notify operators, and stop false announcements. Thus detection systems should be complemented by a...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2012

    Concurrent Prefix Hijacks: Occurrence and Impacts

    A concurrent pre x hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme case is leaking the entire routing table, i.e., hi-jacking all the prefixes in the table. This is a well-known problem and there exists a preventive measure in practice to safeguard against...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications

    Very important data is transferred every second along wide distances. This data might be military information, financial records, and other vital information that is transmitted over public non-secure channels like the internet for example. The need to secure data transmission over channels became a priority. Cryptography is widely used technique...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Power-Efficient Spatial Multiplexing for Multiantenna MANETs

    The authors consider the problem of minimizing network's transmit power for given transmission rate demands of all links in a Multi-Input Multi-Output (MIMO) ad hoc network. The problem is non-convex, hence, challenging to be solved, even in a centralized manner. To derive a distributed solution, they reformulate the problem as...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Interference Mitigation Using Spectrum Sensing and Dynamic Frequency Hopping

    Wireless communications are prone to both unintentional and intentional RF interference. Such interference has significant impact on the reliability of packet transmissions. In this paper, the authors consider interference mitigation in Frequency Hopping (FH) systems. They employ Cognitive Radios (CRs) for proactive interference sensing in such systems. Through this proactive...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // May 2012

    Out-of-Band Sensing Scheme for Dynamic Frequency Hopping in Satellite Communications

    This paper makes preliminary steps at exploring a novel application of Cognitive Radios (CRs) for reliable satellite communications. The authors propose the use of dynamically adjusted Frequency Hopping (FH) sequences for satellite transmissions. Such sequences are more robust against smart eavesdropping and targeted interference than fixed FH sequences. In their...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Mar 2007

    Net-X : Unified Data-Centric Internet Services

    Databases and networks currently have different service models. Database services are data-centric in that users typically describe the content of data and the system finds and returns matching data. However, traditional Internet services are server-centric in that users have to know the location of data (e.g., a URL) in order...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Nov 2011

    Temporal Support for Persistent Stored Modules

    The authors show how to extend temporal support of SQL to the turing-complete portion of SQL that of Persistent Stored Modules (PSM). Their approach requires minor new syntax beyond that already in SQL/temporal to define and to invoke PSM procedures and functions, thereby extending the current, sequenced, and non-sequenced semantics...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    DataBase Management Systems (DBMSes) form a cornerstone of modern IT infrastructure, and it is essential that they have excellent performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data access from secondary storage. This paper shows that DBMSes can also benefit significantly from dynamic...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jan 2012

    Application of Micro-Specialization to Query Evaluation Operators

    Relational DataBase Management Systems (RDBMS) support a wide variety of data types and operations. Such generality involves much branch condition checking, which introduces inefficiency within the query evaluation loop. The authors previously introduced micro-specialization, which improves performance by eliminating unnecessary branching statements and the actual code branches by exploiting invariants...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Oct 2011

    Micro-Specialization in DBMSes

    Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using runtime metadata lookups and tests that ensure that control is channeled to the appropriate code in all cases. Unfortunately, these lookups and tests are carried out even...

    Provided By University of Applied Sciences Rapperswil

  • White Papers // Jun 2012

    Temporal Implications of Database Information Accountability

    Information restriction controls access and renders records immutable; information accountability requires data transparency to easily and efficiently determine when a particular use is appropriate. Information accountability in the paper of relational databases is associated with time in a surprising number of ways, as is summarized in this paper. Notarization and...

    Provided By University of Applied Sciences Rapperswil