University of Calgary

Displaying 1-40 of 544 results

  • White Papers // Jan 2015

    Analyzing Tabular Requirements Specifications Using Infinite State Model Checking

    In this paper, the authors investigate the application of infinite state model checking to the formal analysis of requirements specifications in the SCR (Software Cost Reduction) tabular notation using Action Language Verifier (ALV). After reviewing the SCR method and tools and the Action Language, experimental results are presented of formally...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Conversations: Realizability, Synchronizability, and Verification

    Conversations provide an intuitive and simple model for analyzing interactions among composite web services. A conversation is the global sequence of messages exchanged among the peers participating to a composite web service. Interactions in a composite web service can be analyzed by investigating the temporal properties of its conversations. Conversations...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Modular Verification of Synchronization with Reentrant Locks

    The authors present a modular approach for verification of synchronization behavior in concurrent programs that use reentrant locks. Their approach decouples the verification of the lock implementation from the verification of the threads that use the lock. This decoupling is achieved using lock interfaces that characterize the allowable execution order...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems

    Although it is most often applied to finite state models, in recent years, symbolic model checking has been extended to infinite state models using symbolic representations that encode infinite sets. This paper investigates the application of an infinite state symbolic model checker called Action Language Verifier (ALV) to formal requirements...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Extended Interface Grammars for Automated Stub Generation

    An important challenge in software verification is the ability to verify different software components in isolation. Achieving modularity in software verification requires development of innovative interface specification languages. In this paper the authors focus on the idea of using grammars for specification of component interfaces. In earlier work, they investigated...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Computing Real Time Jobs in P2P Networks

    In this paper, the authors present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P environment. Their proposed strategy strives to build an open infrastructure that is accessible by ordinary users for both cycle donation and consumption. For...

    Provided By University of Calgary

  • White Papers // Nov 2014

    To Go or Not to Go: On Energy-aware and Communication-aware Robotic Operation

    The authors consider the scenario where a mobile robot needs to visit a number of Points Of Interest (POIs) in a workspace, gather their generated bits of information, and successfully transmit them to a remote station, while operating in a realistic communication environment, minimizing its total energy consumption (including both...

    Provided By University of Calgary

  • White Papers // Sep 2014

    CloudTracker: Using Execution Provenance to Optimize the Cost of Cloud Use

    In this paper, the authors investigate tools that enable dollar cost optimization of scientific simulations using commercial clouds. They present a framework, called CloudTracker that transparently records information from a simulation that is executed in a commercial cloud so that it may be \"Replayed\" exactly to reproduce its results. Using...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Automata-Based Symbolic String Analysis for Vulnerability Detection

    Verifying string manipulating programs is a crucial problem in computer security. String operations are used extensively within web applications to manipulate user input, and their erroneous use is the most common cause of security vulnerabilities in web applications. The authors present an automata-based approach for symbolic analysis of string manipulating...

    Provided By University of Calgary

  • White Papers // Jul 2014

    BareCloud: Bare-metal Analysis-based Evasive Malware Detection

    The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Hulk: Eliciting Malicious Behavior in Browser Extensions

    The authors present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension's expectations in web page structure...

    Provided By University of Calgary

  • White Papers // Jul 2014

    EmergeNet: Robust, Rapidly Deployable Cellular Networks

    Cellular phone networks are often paralyzed after a disaster, as damage to fixed infrastructure, loss of power, and increased demand degrade coverage and quality of service. To ensure disaster victims and first responders have access to reliable local and global communication, the authors propose EmergeNet, a portable, rapidly deployable, small...

    Provided By University of Calgary

  • White Papers // Jun 2014

    DRoP:DNS-based Router Positioning

    In this paper, the authors focus on geolocating Internet routers, using a methodology for extracting and decoding geography-related strings from fully qualified domain names (hostnames). They first compiled an extensive dictionary associating geographic strings (e.g., airport codes) with geophysical locations. They then searched a large set of router hostnames for...

    Provided By University of Calgary

  • White Papers // May 2014

    Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory

    Each anomalous process incurs a cost per unit time until its anomaly is identified and fixed. Different anomalous processes may incur different costs depending on their criticality to the system. Switching between processes and state declarations are allowed at all times, while decisions are based on all past observations and...

    Provided By University of Calgary

  • White Papers // May 2014

    Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting

    Using ground truth sales data for over 40K unlicensed prescription pharmaceuticals sites, the authors present an economic analysis of two aspects of domain abuse in the online counterfeit drug market. First, they characterize the nature of domains abused by affiliate spammers to monetize what is evidently an overwhelming demand for...

    Provided By University of Calgary

  • White Papers // May 2014

    Automatic and Portable Cloud Deployment for Scientific Simulations

    In this paper, the authors present CloudRunner, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CloudRunner automatically creates and configures virtual...

    Provided By University of Calgary

  • White Papers // May 2014

    Enhanced Lattice-Based Signatures on Reconfigurable Hardware

    The recent Bimodal LattIce Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. Besides reasonably small signatures with 5600 bits for a 128-bit level of security, BLISS enables extremely fast signing and signature verification in software. However, due to the complex sampling of...

    Provided By University of Calgary

  • White Papers // May 2014

    A Sampling-Based Approach to Scalable Constraint Satisfaction in Linear Sampled-Data Systems - Part I: Computation

    Sampled-Data (SD) systems, which are composed of both discrete- and continuous-time components, are arguably one of the most common classes of cyber-physical systems in practice; most modern controllers are implemented on digital platforms while the plant dynamics that are being controlled evolve continuously in time. As with all cyber-physical systems,...

    Provided By University of Calgary

  • White Papers // May 2014

    Scalable Fault-Tolerant Data Feeds in AsterixDB

    In this paper, the authors describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external...

    Provided By University of Calgary

  • White Papers // May 2014

    ReDHiP: Recalibrating Deep Hierarchy Prediction for Energy Efficiency

    Recent hardware trends point to increasingly deeper cache hierarchies. In such hierarchies, accesses that lookup and miss in every cache involve significant energy consumption and degraded performance. To mitigate these problems, in this paper the authors propose Recalibrating Deep Hierarchy Prediction (ReDHiP), an architectural mechanism that predicts Last-Level Cache (LLC)...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Multi-Level Coded Caching

    Recent work has demonstrated that for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches, so as to create coded-multicast opportunities even amongst users with different demands. Such a coded-caching scheme has been shown...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Towards Automatically Estimating Porting Effort Between Web Service APIs

    In this paper, the authors describe a new methodology for automatically quantifying the relative work required for a programmer to port an application from one web API to another, i.e. \"Porting effort\". Their approach defines a simple language (based on Python) with which API developers specify the semantics of API...

    Provided By University of Calgary

  • White Papers // Apr 2014

    SELFISHMIGRATE: A Scalable Algorithm for Non-Clairvoyantly Scheduling Heterogeneous Processors

    Many computer architects believe that architectures consisting of heterogeneous processors will be the dominant architectural design in the future: simulation studies indicate that, for a given area and power budget, heterogeneous multiprocessors can offer an order of magnitude better performance for typical workloads. Looking at the consequences of Moore's Law...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Lithography-Induced Limits to Scaling of Design Quality

    Quality and value of an IC product are functions of power, performance, area, cost and reliability. The forthcoming 2013 ITRS roadmap observes that while manufacturers continue to enable potential Moore's Law scaling of layout densities, the \"Realizable\" scaling in competitive products has for some years been significantly less. In this...

    Provided By University of Calgary

  • White Papers // Mar 2014

    VANET via Named Data Networking

    Recently manufactured vehicles are equipped with not only computation powers but also a variety of wireless communication interfaces such as 3G/LTE, WiMAX, Wi-Fi, IEEE 1901 (power line communication), and 802.11p (DSRC/WAVE). In this paper, the authors apply the named data networking, a newly proposed Internet architecture, to networking vehicles on...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Circuit Switching Under the Radar with REACToR

    The potential advantages of optics at high link speeds have led to significant interest in deploying optical switching technology in data-center networks. Initial efforts have focused on hybrid approaches that rely on millisecond-scale circuit switching in the core of the network, while maintaining the flexibility of electrical packet switching at...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SENIC: Scalable NIC for End-Host Rate Limiting

    Rate limiting is an important primitive for managing server network resources. Unfortunately, software-based rate limiting suffers from limited accuracy and high CPU overhead, and modern NICs only support a handful of rate limiters. The authors present SENIC, a NIC design that can natively support 10s of thousands of rate limiters...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

    Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These...

    Provided By University of Calgary

  • White Papers // Feb 2014

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    The authors present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Their method can be used to improve previous oblivious storage solutions for network-based outsourcing of data. One of the unmistakable recent trends in networked computation...

    Provided By University of Calgary

  • White Papers // Feb 2014

    Optimal Reliability-Constrained Overdrive Frequency Selection In Multicore Systems

    In leading-edge process technologies, reliability is a first-class constraint for both IC design and system operation. For multicore systems, reliability affects task scheduling decisions since it constrains both performance and throughput. Previous works on reliability-constrained task scheduling have two basic limitations: either they cannot guarantee lifetime (e.g., that the chip...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Automated Test Generation from Vulnerability Signatures

    Web applications need to validate and sanitize user inputs in order to avoid attacks such as Cross Site Scripting (XSS) and SQL injection. Writing string manipulation code for input validation and sanitization is an error-prone process leading to many vulnerabilities in real-world web applications. Automata-based static string analysis techniques can...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Cloud Platform Support for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require duration as web-accessible services. \"Service-izing\" digital assets consist of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, Application Programming Interfaces (APIs)....

    Provided By University of Calgary

  • White Papers // Jan 2014

    Timing Margin Recovery with Flexible Flip-Flop Timing Model

    In timing signoff for leading-edge SOCs, even few-picosecond timing violations will not only increase design turnaround time, but also degrade design quality (e.g., through power increase from insertion of extra buffers). Conventional flip-flop timing models have fixed values of setup/hold times and clock-to-q (c2q) delay, with some advanced \"Setup-Hold Pessimism...

    Provided By University of Calgary

  • White Papers // Jan 2014

    NOLO : A No-Loop, Predictive Useful Skew Methodology for Improved Timing in IC Implementation

    Useful skew is a well-known design technique that adjusts clock sink latencies to improve performance and/or robustness of high-performance IC designs. Current design methodologies apply useful skew after the netlist has been synthesized (e.g., with a uniform skew or clock uncertainty assumption on all flops), and after placement has been...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Security Issues in a Future Vehicular Network

    Both modern high-speed motorways and vehicles that drive upon them are becoming increasingly intelligent. In particular, communication devices are being installed in more and more cars and roadside infrastructure components. In this paper, the authors present a novel infrastructure for vehicular communication on highways and propose some potential applications aimed...

    Provided By University of Calgary

  • White Papers // Jan 2014

    An Analysis Framework for Security in Web Applications

    Software systems interact with outside environments (e.g., by taking inputs from a user) and usually have particular assumptions about these environments. Unchecked or improperly checked assumptions can affect security and reliability of the systems. A major class of such problems is the improper validation of user inputs. In this paper,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    RBWA: An Efficient Random-Bit Window-Based Authentication Protocol

    Given the wide and rapid deployment of \"Visitor networks\", how to authenticate the user and account the usage on the per-packet basis securely and yet efficiently is still a challenging problem. In this paper, the authors explore the tradeoff between performance and security, and propose a per-data-packet authentication and access...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Impact of Attacks on a Secure Ad Hoc Routing Protocol: Performance Analysis and Countermeasures

    Mobile ad hoc networks have been an area of increasing research activity. Recently, a number of proto-cols have been proposed which secure ad hoc net-work routing; however, the evaluation of such protocols has been lacking. In particular, performance evaluations of such protocols have either been with-out an attacker, or under...

    Provided By University of Calgary

  • White Papers // Jan 2014

    SRDP: Securing Route Discovery in DSR

    Routing is a critical function in multi-hop Mobile Ad-hoc NETworks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs - especially, routing security - presents a number of new...

    Provided By University of Calgary

  • White Papers // Jan 2014

    On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control

    Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority, prompts many security-related challenges. Providing efficient security services in these systems is an active research topic which is receiving much attention in the security research...

    Provided By University of Calgary

  • White Papers // Jan 2005

    Revenues, Profitability, and Returns: Clinical Analysis of the Market for Mobster Films

    This paper analyzes empirically the revenues, profitability, and financial returns of mobster-related movies using data from worldwide theatrical exhibition, television syndication, and video rentals and sales. It quantifies the revenues across each window of exhibition in relation to subsequent windows and to the production budget. A regression model is used...

    Provided By University of Calgary

  • White Papers // Jan 2010

    A Case for Context-Aware TCP/IP

    This paper discusses the design and evaluation of CATNIP, a Context-Aware Transport/Network Internet Protocol for the Web. This integrated protocol uses application-layer knowledge (i.e.,Web document size) to provide explicit context information to the TCP and IP protocols. While this approach violates the traditional layered Internet protocol architecture, it enables informed...

    Provided By University of Calgary

  • White Papers // Jan 2010

    Downlink Performance for Mixed Web/VoIP Traffic in 1xEVDO Rev a Networks

    Current 3G cellular networks, such as those based on 1xEVDO Rev A, have several mechanisms to provide Quality of Service (QoS) to network applications. This paper investigates the performance for mixed Web/VoIP traffic on the downlink in 1xEVDO Rev A networks. The impacts from the mixed traffic are studied by...

    Provided By University of Calgary

  • White Papers // Jan 2010

    Improved Port Knocking With Strong Authentication

    Sometimes, it becomes necessary to let only the authorized external users access the open ports whereas closed ports may be accessible to all. The paper seeks to investigate various methods of authentication so as to keep data secure. It specifically focuses on 'Port Knocking' method and the procedure to implement...

    Provided By University of Calgary

  • White Papers // May 2009

    Exploring the Characteristics, Attributes, and Perceptions of Online Graduate Students in Canadian Higher Education, and the Leadership Implications

    Higher education in North America is experiencing change impacted by globalization, evolving economies, emerging technologies, growing populations, and shifting student demographics. This is calling for education that not only addresses market demands, but also is accessible and incorporates technology. To address these changes, mainstream higher education institutions and their leaders...

    Provided By University of Calgary

  • White Papers // Jun 2009

    Key Exchange Protocol Over Insecure Channel

    Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Clustering Posts in Online Discussion Forum Threads

    Online discussion forums are considered a challenging repository for data mining tasks. Forums usually contain hundreds of threads which in turn consist of hundreds, or even thousands, of posts. Clustering posts can be used to discover outlier and off-topic posts and would provide better visualization and exploration of online threads....

    Provided By University of Calgary

  • White Papers // Nov 2009

    On Optimal Secure Message Transmission by Public Discussion

    In a Secure Message Transmission (SMT) scenario a sender wants to send a message in a private and reliable way to a receiver. Sender and receiver are connected by n vertex disjoint paths, referred to as wires, t of which can be controlled by an adaptive adversary with unlimited computational...

    Provided By University of Calgary

  • White Papers // Jul 2009

    Tool Support for Software Development Based on Formal Specifications in RTPA

    The benefits of formal specification methodologies in software development have been identified and well researched. Their use in mainstream software development, however, continues to face a stiff resistance. A prominent reason for this resistance is the fact that there are generally not enough supporting tools to facilitate the development of...

    Provided By University of Calgary

  • White Papers // Mar 2011

    A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management

    In recent years cloud computing has become a growing interest for organizations looking to reduce their IT costs by offloading infrastructure and software costs onto 3rd party organizations who offer Software-as-a-Service (SaaS) (e.g. Google Apps), Platform-as-a-Service (PaaS) (e.g. Google App Engine), and Infrastructure-as-a-Service (IaaS) (e.g. Amazon EC2). However, due to...

    Provided By University of Calgary

  • White Papers // May 2011

    Outsourcing Multi-Party Computation

    The authors initiate the study of secure Multi-Party Computation (MPC) in a server-aided setting, where the parties have access to a single server that does not have any input to the computation; does not receive any output from the computation; but has a vast (but bounded) amount of computational resources....

    Provided By University of Calgary

  • White Papers // Jun 2009

    A Privacy Preservation Model for Facebook-Style Social Network Systems

    Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and TrustManagement...

    Provided By University of Calgary

  • White Papers // Jan 2011

    Offline/Realtime Traffic Classification Using Semi-Supervised Learning

    Identifying and categorizing network traffic by application type is challenging because of the continued evolution of applications, especially of those with a desire to be undetectable. The diminished effectiveness of port-based identification and the overheads of deep packet inspection approaches motivate them to classify traffic by exploiting distinctive flow characteristics...

    Provided By University of Calgary

  • White Papers // Jul 2010

    A Prior-Free Revenue Maximizing Auction for Secondary Spectrum Access

    Dynamic spectrum allocation has proven promising for mitigating the spectrum scarcity problem. In this model, primary users lease chunks of under-utilized spectrum to secondary users, on a short-term basis. Primary users may need financial motivations to share spectrum, since they assume costs in obtaining spectrum licenses. Auctions are a natural...

    Provided By University of Calgary

  • White Papers // Jun 2009

    Optimal Multicast in Multi-Channel Multi-Radio Wireless Networks

    Recent advances in wireless technology have made it increasingly feasible to equip wireless nodes with multiple radios, thereby allowing each radio to exploit channel diversity in the form of orthogonal, non-overlapping transmission spectrums. Multi-channel operation mitigates interference, but at the same time raises new challenges for network optimization, in terms...

    Provided By University of Calgary

  • White Papers // Jan 2011

    Optimal Layered Multicast With Network Coding: Mathematical Model and Empirical Studies

    Multicast is an efficient mechanism in communication networks for data delivery from a source to multiple receivers. As a canonical example, media streaming applications that recently proliferated over the Internet transmit live or on-demand media flows to large groups of users across the world. As opposed to separate one-to-one (unicast)...

    Provided By University of Calgary

  • White Papers // Jun 2009

    Scheduling Issues in Multi-Channel Wireless Networks

    Scheduling decisions can have a pronounced impact on the performance of multi-radio wireless systems. In this paper, the authors study the effects of dispatch policies and queue scheduling strategies on the user-perceived performance for Internet traffic flows in a multi-channel WLAN. Their work is carried out using simulation and an...

    Provided By University of Calgary

  • White Papers // Jun 2009

    Service Differentiation in Multi-Rate HSDPA Systems

    In multi-rate cellular transmission systems, users with different Quality of Service (QoS) requirements share the same wireless channel. In this paper, the authors investigate the problem of efficient resource allocation for scheduling with differentiated QoS support in a multi-rate system. They propose Dynamic Global Proportional Fairness (DGPF) scheduling on the...

    Provided By University of Calgary

  • White Papers // Jul 2010

    An Ontology Based Context Modelling Approach for Mobile Touring and Navigation System

    With the emergence of wireless communication, computer networks, and on-board positioning sensors, mobile computing has received vast attention lately. In this paper, a mobile tourism guiding system has been applied for a variety of tourism applications such as navigation and tour planning services. To provide intelligent personalized tourist assistant and...

    Provided By University of Calgary

  • White Papers // May 2010

    Leveraging Organizational Etiquette to Improve Internet Security

    As more and more organizations rely on the Internet for their daily operation, Internet security becomes increasingly critical. Unfortunately, the vast resources available on the Internet are attracting many malicious users and organizations, including organized crime syndicates. With such organizations disguising their activity by operating from the machines owned and...

    Provided By University of Calgary

  • White Papers // Aug 2010

    On the Optimality of Non-Uniform Clustering in Wireless Sensor Networks

    In wireless sensor networks, cluster-based data gathering has been pursued as a means to achieve network scalability as well as energy efficiency. By dividing a network into clusters, data aggregation and compression can be conveniently implemented in each cluster resulting in significant reduction in overall network energy consumption. Although many...

    Provided By University of Calgary

  • White Papers // Dec 2009

    Improved Multi-Criteria Spanners for Ad-Hoc Networks Under Energy and Distance Metrics

    This paper studies the problem of topology control in random wireless ad-hoc networks through power assignment for n nodes uniformly distributed in a unit square. In particular, the authors are interested in asymmetric power assignments so that the induced communication graph has a good distance and energy stretch simultaneously, with...

    Provided By University of Calgary

  • White Papers // Aug 2010

    Novel Algorithms for the Network Lifetime Problem in Wireless Settings

    One of the major concerns in wireless ad-hoc networks design is energy efficiency. Wireless devices are typically equipped with a limited energy supply sufficient only for a limited amount of time which is reversely proportional to the transmission power of the device. The network lifetime is defined as the time...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Energy Efficient Online Routing in Wireless Ad Hoc Networks

    In this paper, the authors study the minimum total energy and maximum network lifetime routing problem in wireless ad hoc networks. They develop competitive online schemes for an infinite sequence of random routing requests with provable approximation factors in both measures. In addition, they produce fundamental bounds on the expected...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Capacity Bounds for Energy Efficient Data Streaming in Homogeneous Wireless Ad Hoc Networks

    According to the Gaussian channel model, the throughput of a wireless link (u, v) is B log (1+S/N) bps, where B is the channel bandwidth and S/N is the signal to noise ratio. Wireless links which are scheduled simultaneously add to the noise levels of each other and cause the...

    Provided By University of Calgary

  • White Papers // Jul 2008

    Information Technology and Process Performance: An Empirical Investigation of the Interaction Between IT and Non-IT Resources

    Drawing on the resource-based view, the authors propose a configurational perspective of how IT assets and capabilities affect firm performance. Their premise is that IT assets and IT managerial capabilities are components in organizational design, and as such, their impact can only be understood by taking into consideration the interactions...

    Provided By University of Calgary

  • White Papers // Aug 2011

    Physical Layer Network Coding With Signal Alignment for MIMO Wireless Networks

    The authors propose Signal Alignment (SA), a new wireless communication technique that enables Physical layer Network Coding (PNC) in Multi-Input Multi-Output (MIMO) wireless networks. Through calculated pre-coding, SA contracts the perceived signal space at a node to match it's receive diversity, and hence facilitates the demodulation of linearly combined data...

    Provided By University of Calgary

  • White Papers // Jul 2010

    Physics-Based Modeling of Skier Mobility and Avalanche Rescue in Mountainous Terrain

    Mobility models play an important role in the evaluation of wireless ad hoc networks. However, most existing mobility models are limited to 1D or 2D user movement. In this paper, the authors propose a novel 2.5D mobility model suitable for modeling the movement of backcountry skiers in mountainous terrains. These...

    Provided By University of Calgary

  • White Papers // Jul 2010

    On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks

    The authors study the applicability of random graph theory in modeling secure connectivity of wireless sensor networks. Specifically, their work focuses on the highly influential random key pre-distribution scheme by Eschenauer and Gligor to examine the appropriateness of the modeling in finding system parameters for desired connectivity. They use extensive...

    Provided By University of Calgary

  • White Papers // Jun 2010

    Cluster-Based Correlated Data Gathering in Wireless Sensor Networks

    The authors consider the problem of optimal cluster-based data gathering in Wireless Sensor Networks (WSNs) when nearby readings is spatially correlated. Due to the dense nature of WSNs, data samples taken from nearby locations are statistically similar. They show how this data correlation can be exploited to reduce the amount...

    Provided By University of Calgary

  • White Papers // Apr 2010

    Distributed Routing for Vehicular Ad Hoc Networks: Throughput-Delay Tradeoff

    In this paper, the authors address the problem of low-latency routing in a vehicular highway network. To cover long highways while minimizing the number of required roadside access points, they utilize vehicle-to-vehicle communication to propagate data in the network. Vehicular networks are highly dynamic, and hence routing algorithms that require...

    Provided By University of Calgary

  • White Papers // Feb 2010

    Providing Fairness Between TCP NewReno and TCP Vegas With RD Network Services

    While Transmission Control Protocol (TCP) variants with delay-based congestion control (e.g., TCP Vegas) provide low queueing delay and low packet loss, the key problem with their deployment on the Internet is their relative performance when competing with traditional TCP variants with loss-based congestion control (e.g., TCP NewReno). In particular, the...

    Provided By University of Calgary

  • White Papers // Aug 2009

    Media Caching Support for Mobile Transit Clients

    In this paper, the authors consider the design of caching infrastructure to enhance the client-perceived performance of mobile wireless clients retrieving multimedia objects from the Internet. They consider three primary issues: location of the cache, size of the cache, and management policy for the cache. They consider both infrastructure-oriented caching...

    Provided By University of Calgary

  • White Papers // Mar 2010

    Using Torrent Inflation to Efficiently Serve the Long Tail in Peer-Assisted Content Delivery Systems

    A peer-assisted content delivery system uses the upload bandwidth of its clients to assist in delivery of popular content. In peer-assisted systems using a BitTorrent-like protocol, a content delivery server seeds the offered files, and active torrents form when multiple clients make closely-spaced requests for the same content. Scalability is...

    Provided By University of Calgary

  • White Papers // Sep 2007

    Performance-Driven Optical Proximity Correction for Mask Cost Reduction

    With continued aggressive process scaling in the subwavelength lithographic regime, Resolution Enhancement Techniques (RETs) such as Optical Proximity Correction (OPC) are an integral part of the design to mask flow. OPC creates complex features to the layout, resulting in mask data volume explosion and increased mask costs. Traditionally, the mask...

    Provided By University of Calgary

  • White Papers // Feb 2014

    Optimal Reliability-Constrained Overdrive Frequency Selection In Multicore Systems

    In leading-edge process technologies, reliability is a first-class constraint for both IC design and system operation. For multicore systems, reliability affects task scheduling decisions since it constrains both performance and throughput. Previous works on reliability-constrained task scheduling have two basic limitations: either they cannot guarantee lifetime (e.g., that the chip...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Mobile System Considerations for SDRAM Interface Trends

    A variety of interconnect technologies and standards (DIMMs, MCP, POP, stacked-die and 3D-stack) enable a controller IC to communicate with an external SDRAM, or with multiple SDRAMs over a shared interconnect. Low-Power requirements have Driven mobile controllers to mobile-SDRAM (LPDDR) memory solutions. However, LPDDR configurations do not scale to match...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Stability and Scalability in Global Routing

    As the complexity of physical implementation continues to grow with technology scaling, routability has emerged as a major concern and implementation flow bottleneck. Infeasibility of routing forces a loop back to placement, netlist optimization, or even RTL design and floorplanning. Thus, to maintain convergence and a manageable number of iterations...

    Provided By University of Calgary

  • White Papers // May 2013

    High-Dimensional Metamodeling for Prediction of Clock Tree Synthesis Outcomes

    Clock Tree Synthesis (CTS) is a key aspect of on-chip interconnect, and major consumer of IC power and physical design resources. In modern sub-28nm tools and flows, it has become exceptionally difficult to satisfy skew, insertion delay and transition time constraints within power and area budgets, in part because commercial...

    Provided By University of Calgary

  • White Papers // Jan 2014

    NOLO : A No-Loop, Predictive Useful Skew Methodology for Improved Timing in IC Implementation

    Useful skew is a well-known design technique that adjusts clock sink latencies to improve performance and/or robustness of high-performance IC designs. Current design methodologies apply useful skew after the netlist has been synthesized (e.g., with a uniform skew or clock uncertainty assumption on all flops), and after placement has been...

    Provided By University of Calgary