University of Calgary

Displaying 1-40 of 545 results

  • White Papers // Jan 2015

    Computing Real Time Jobs in P2P Networks

    In this paper, the authors present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P environment. Their proposed strategy strives to build an open infrastructure that is accessible by ordinary users for both cycle donation and consumption. For...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems

    Although it is most often applied to finite state models, in recent years, symbolic model checking has been extended to infinite state models using symbolic representations that encode infinite sets. This paper investigates the application of an infinite state symbolic model checker called Action Language Verifier (ALV) to formal requirements...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Extended Interface Grammars for Automated Stub Generation

    An important challenge in software verification is the ability to verify different software components in isolation. Achieving modularity in software verification requires development of innovative interface specification languages. In this paper the authors focus on the idea of using grammars for specification of component interfaces. In earlier work, they investigated...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Modular Verification of Synchronization with Reentrant Locks

    The authors present a modular approach for verification of synchronization behavior in concurrent programs that use reentrant locks. Their approach decouples the verification of the lock implementation from the verification of the threads that use the lock. This decoupling is achieved using lock interfaces that characterize the allowable execution order...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Tabular Requirements Specifications Using Infinite State Model Checking

    In this paper, the authors investigate the application of infinite state model checking to the formal analysis of requirements specifications in the SCR (Software Cost Reduction) tabular notation using Action Language Verifier (ALV). After reviewing the SCR method and tools and the Action Language, experimental results are presented of formally...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Conversations: Realizability, Synchronizability, and Verification

    Conversations provide an intuitive and simple model for analyzing interactions among composite web services. A conversation is the global sequence of messages exchanged among the peers participating to a composite web service. Interactions in a composite web service can be analyzed by investigating the temporal properties of its conversations. Conversations...

    Provided By University of Calgary

  • White Papers // Nov 2014

    To Go or Not to Go: On Energy-aware and Communication-aware Robotic Operation

    The authors consider the scenario where a mobile robot needs to visit a number of Points Of Interest (POIs) in a workspace, gather their generated bits of information, and successfully transmit them to a remote station, while operating in a realistic communication environment, minimizing its total energy consumption (including both...

    Provided By University of Calgary

  • White Papers // Sep 2014

    CloudTracker: Using Execution Provenance to Optimize the Cost of Cloud Use

    In this paper, the authors investigate tools that enable dollar cost optimization of scientific simulations using commercial clouds. They present a framework, called CloudTracker that transparently records information from a simulation that is executed in a commercial cloud so that it may be \"Replayed\" exactly to reproduce its results. Using...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Automata-Based Symbolic String Analysis for Vulnerability Detection

    Verifying string manipulating programs is a crucial problem in computer security. String operations are used extensively within web applications to manipulate user input, and their erroneous use is the most common cause of security vulnerabilities in web applications. The authors present an automata-based approach for symbolic analysis of string manipulating...

    Provided By University of Calgary

  • White Papers // Jul 2014

    BareCloud: Bare-metal Analysis-based Evasive Malware Detection

    The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Hulk: Eliciting Malicious Behavior in Browser Extensions

    The authors present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension's expectations in web page structure...

    Provided By University of Calgary

  • White Papers // Jul 2014

    EmergeNet: Robust, Rapidly Deployable Cellular Networks

    Cellular phone networks are often paralyzed after a disaster, as damage to fixed infrastructure, loss of power, and increased demand degrade coverage and quality of service. To ensure disaster victims and first responders have access to reliable local and global communication, the authors propose EmergeNet, a portable, rapidly deployable, small...

    Provided By University of Calgary

  • White Papers // Jun 2014

    DRoP:DNS-based Router Positioning

    In this paper, the authors focus on geolocating Internet routers, using a methodology for extracting and decoding geography-related strings from fully qualified domain names (hostnames). They first compiled an extensive dictionary associating geographic strings (e.g., airport codes) with geophysical locations. They then searched a large set of router hostnames for...

    Provided By University of Calgary

  • White Papers // May 2014

    Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting

    Using ground truth sales data for over 40K unlicensed prescription pharmaceuticals sites, the authors present an economic analysis of two aspects of domain abuse in the online counterfeit drug market. First, they characterize the nature of domains abused by affiliate spammers to monetize what is evidently an overwhelming demand for...

    Provided By University of Calgary

  • White Papers // May 2014

    Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory

    Each anomalous process incurs a cost per unit time until its anomaly is identified and fixed. Different anomalous processes may incur different costs depending on their criticality to the system. Switching between processes and state declarations are allowed at all times, while decisions are based on all past observations and...

    Provided By University of Calgary

  • White Papers // May 2014

    Automatic and Portable Cloud Deployment for Scientific Simulations

    In this paper, the authors present CloudRunner, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CloudRunner automatically creates and configures virtual...

    Provided By University of Calgary

  • White Papers // May 2014

    Enhanced Lattice-Based Signatures on Reconfigurable Hardware

    The recent Bimodal LattIce Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. Besides reasonably small signatures with 5600 bits for a 128-bit level of security, BLISS enables extremely fast signing and signature verification in software. However, due to the complex sampling of...

    Provided By University of Calgary

  • White Papers // May 2014

    A Sampling-Based Approach to Scalable Constraint Satisfaction in Linear Sampled-Data Systems - Part I: Computation

    Sampled-Data (SD) systems, which are composed of both discrete- and continuous-time components, are arguably one of the most common classes of cyber-physical systems in practice; most modern controllers are implemented on digital platforms while the plant dynamics that are being controlled evolve continuously in time. As with all cyber-physical systems,...

    Provided By University of Calgary

  • White Papers // May 2014

    Scalable Fault-Tolerant Data Feeds in AsterixDB

    In this paper, the authors describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external...

    Provided By University of Calgary

  • White Papers // May 2014

    ReDHiP: Recalibrating Deep Hierarchy Prediction for Energy Efficiency

    Recent hardware trends point to increasingly deeper cache hierarchies. In such hierarchies, accesses that lookup and miss in every cache involve significant energy consumption and degraded performance. To mitigate these problems, in this paper the authors propose Recalibrating Deep Hierarchy Prediction (ReDHiP), an architectural mechanism that predicts Last-Level Cache (LLC)...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Multi-Level Coded Caching

    Recent work has demonstrated that for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches, so as to create coded-multicast opportunities even amongst users with different demands. Such a coded-caching scheme has been shown...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Towards Automatically Estimating Porting Effort Between Web Service APIs

    In this paper, the authors describe a new methodology for automatically quantifying the relative work required for a programmer to port an application from one web API to another, i.e. \"Porting effort\". Their approach defines a simple language (based on Python) with which API developers specify the semantics of API...

    Provided By University of Calgary

  • White Papers // Apr 2014

    SELFISHMIGRATE: A Scalable Algorithm for Non-Clairvoyantly Scheduling Heterogeneous Processors

    Many computer architects believe that architectures consisting of heterogeneous processors will be the dominant architectural design in the future: simulation studies indicate that, for a given area and power budget, heterogeneous multiprocessors can offer an order of magnitude better performance for typical workloads. Looking at the consequences of Moore's Law...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Lithography-Induced Limits to Scaling of Design Quality

    Quality and value of an IC product are functions of power, performance, area, cost and reliability. The forthcoming 2013 ITRS roadmap observes that while manufacturers continue to enable potential Moore's Law scaling of layout densities, the \"Realizable\" scaling in competitive products has for some years been significantly less. In this...

    Provided By University of Calgary

  • White Papers // Mar 2014

    VANET via Named Data Networking

    Recently manufactured vehicles are equipped with not only computation powers but also a variety of wireless communication interfaces such as 3G/LTE, WiMAX, Wi-Fi, IEEE 1901 (power line communication), and 802.11p (DSRC/WAVE). In this paper, the authors apply the named data networking, a newly proposed Internet architecture, to networking vehicles on...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Circuit Switching Under the Radar with REACToR

    The potential advantages of optics at high link speeds have led to significant interest in deploying optical switching technology in data-center networks. Initial efforts have focused on hybrid approaches that rely on millisecond-scale circuit switching in the core of the network, while maintaining the flexibility of electrical packet switching at...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SENIC: Scalable NIC for End-Host Rate Limiting

    Rate limiting is an important primitive for managing server network resources. Unfortunately, software-based rate limiting suffers from limited accuracy and high CPU overhead, and modern NICs only support a handful of rate limiters. The authors present SENIC, a NIC design that can natively support 10s of thousands of rate limiters...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

    Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These...

    Provided By University of Calgary

  • White Papers // Feb 2014

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    The authors present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Their method can be used to improve previous oblivious storage solutions for network-based outsourcing of data. One of the unmistakable recent trends in networked computation...

    Provided By University of Calgary

  • White Papers // Feb 2014

    Optimal Reliability-Constrained Overdrive Frequency Selection In Multicore Systems

    In leading-edge process technologies, reliability is a first-class constraint for both IC design and system operation. For multicore systems, reliability affects task scheduling decisions since it constrains both performance and throughput. Previous works on reliability-constrained task scheduling have two basic limitations: either they cannot guarantee lifetime (e.g., that the chip...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Automated Test Generation from Vulnerability Signatures

    Web applications need to validate and sanitize user inputs in order to avoid attacks such as Cross Site Scripting (XSS) and SQL injection. Writing string manipulation code for input validation and sanitization is an error-prone process leading to many vulnerabilities in real-world web applications. Automata-based static string analysis techniques can...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Cloud Platform Support for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require duration as web-accessible services. \"Service-izing\" digital assets consist of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, Application Programming Interfaces (APIs)....

    Provided By University of Calgary

  • White Papers // Jan 2014

    Timing Margin Recovery with Flexible Flip-Flop Timing Model

    In timing signoff for leading-edge SOCs, even few-picosecond timing violations will not only increase design turnaround time, but also degrade design quality (e.g., through power increase from insertion of extra buffers). Conventional flip-flop timing models have fixed values of setup/hold times and clock-to-q (c2q) delay, with some advanced \"Setup-Hold Pessimism...

    Provided By University of Calgary

  • White Papers // Jan 2014

    NOLO : A No-Loop, Predictive Useful Skew Methodology for Improved Timing in IC Implementation

    Useful skew is a well-known design technique that adjusts clock sink latencies to improve performance and/or robustness of high-performance IC designs. Current design methodologies apply useful skew after the netlist has been synthesized (e.g., with a uniform skew or clock uncertainty assumption on all flops), and after placement has been...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Design Considerations for Solar Energy Harvesting Wireless Embedded Systems

    Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energy optimization of such systems. Environmental energy harvesting, in particular solar based, has emerged as a viable technique to supplement battery supplies. However, designing an efficient...

    Provided By University of Calgary

  • White Papers // Jan 2014

    On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control

    Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority, prompts many security-related challenges. Providing efficient security services in these systems is an active research topic which is receiving much attention in the security research...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Group Key Agreement Efficient in Communication

    In recent years, group-oriented applications and protocols have been gaining popularity. Such applications typically involve communication over open networks where security is an important concern. Group key management is one of the basic building blocks in securing group communication. Most prior research in group key management focused on minimizing computation...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Impact of Attacks on a Secure Ad Hoc Routing Protocol: Performance Analysis and Countermeasures

    Mobile ad hoc networks have been an area of increasing research activity. Recently, a number of proto-cols have been proposed which secure ad hoc net-work routing; however, the evaluation of such protocols has been lacking. In particular, performance evaluations of such protocols have either been with-out an attacker, or under...

    Provided By University of Calgary

  • White Papers // Jan 2014

    SRDP: Securing Route Discovery in DSR

    Routing is a critical function in multi-hop Mobile Ad-hoc NETworks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs - especially, routing security - presents a number of new...

    Provided By University of Calgary

  • White Papers // Jan 2014

    An Analysis Framework for Security in Web Applications

    Software systems interact with outside environments (e.g., by taking inputs from a user) and usually have particular assumptions about these environments. Unchecked or improperly checked assumptions can affect security and reliability of the systems. A major class of such problems is the improper validation of user inputs. In this paper,...

    Provided By University of Calgary

  • White Papers // May 2011

    The Case for Evaluating MapReduce Performance Using Workload Suites

    MapReduce systems face enormous challenges due to increasing growth, diversity, and consolidation of the data and computation involved. Provisioning, configuring, and managing large-scale MapReduce clusters require realistic, work-load specific performance insights that existing MapReduce benchmarks are ill-equipped to supply. In this paper, the authors build the case for going beyond...

    Provided By University of Calgary

  • White Papers // Mar 2011

    Multilevel Granularity Parallelism Synthesis on FPGAs

    Recent progress in High-Level Synthesis (HLS) techniques has helped raise the abstraction level of FPGA programming. However implementation and performance evaluation of the HLS-generated RTL, involves lengthy logic synthesis and physical design flows. Moreover, mapping of different levels of coarse grained parallelism onto hardware spatial parallelism affects the final FPGA-based...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Ubiquitous Access to Distributed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes

    Consider a large-scale wireless sensor network of n nodes, where a fraction k out of n generates data packets of global interest. Assuming that the individual nodes have limited storage and computational capabilities, the authors address the problem of how to enable ubiquitous access to the distributed data packets. Specially,...

    Provided By University of Calgary

  • White Papers // Sep 2010

    Hardware Trust Implications of 3-D Integration

    3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electro-conductive posts. Since the dies may be manufactured separately, 3-D circuit integration offers the option of enhancing a commodity processor with a variety...

    Provided By University of Calgary

  • White Papers // May 2008

    Code Generation for Process Network Models onto Parallel Architectures

    With multi-core and many-core architectures becoming the current focus of research and development, and as vast varieties of architectures and programming models emerging in research, the design space for applications is becoming enormous. From the number of cores, the memory hierarchy, the interconnect to even the programming model and language...

    Provided By University of Calgary

  • White Papers // May 2008

    Lighthouse: Hardware Support for Enforcing Information Flow Control on ManyCore Systems

    The authors present lighthouse, a novel multiprocessor architecture based on restricting the flow of information in a shared memory environment. Lighthouse assigns labels corresponding to sets of taint levels to all threads, data, and other system objects, pairs of which are compared to determine the ways in which information may...

    Provided By University of Calgary

  • White Papers // Jul 2011

    On the Complexity of Wireless Uplink Scheduling With Successive Interference Cancellation

    In this paper, the authors study the problem of uplink scheduling in wireless networks with Successive Interference Cancellation (SIC). With SIC, concurrent transmissions, if properly scheduled, can be successfully decoded at a receiver. The scheduler decides: in which time-slot, and in what order in a time-slot to decode each transmission...

    Provided By University of Calgary

  • White Papers // Jun 2009

    Key Exchange Protocol Over Insecure Channel

    Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack...

    Provided By University of Calgary

  • White Papers // May 2009

    Exploring the Characteristics, Attributes, and Perceptions of Online Graduate Students in Canadian Higher Education, and the Leadership Implications

    Higher education in North America is experiencing change impacted by globalization, evolving economies, emerging technologies, growing populations, and shifting student demographics. This is calling for education that not only addresses market demands, but also is accessible and incorporates technology. To address these changes, mainstream higher education institutions and their leaders...

    Provided By University of Calgary

  • White Papers // Nov 2009

    On Optimal Secure Message Transmission by Public Discussion

    In a Secure Message Transmission (SMT) scenario a sender wants to send a message in a private and reliable way to a receiver. Sender and receiver are connected by n vertex disjoint paths, referred to as wires, t of which can be controlled by an adaptive adversary with unlimited computational...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Clustering Posts in Online Discussion Forum Threads

    Online discussion forums are considered a challenging repository for data mining tasks. Forums usually contain hundreds of threads which in turn consist of hundreds, or even thousands, of posts. Clustering posts can be used to discover outlier and off-topic posts and would provide better visualization and exploration of online threads....

    Provided By University of Calgary

  • White Papers // Jan 2005

    Revenues, Profitability, and Returns: Clinical Analysis of the Market for Mobster Films

    This paper analyzes empirically the revenues, profitability, and financial returns of mobster-related movies using data from worldwide theatrical exhibition, television syndication, and video rentals and sales. It quantifies the revenues across each window of exhibition in relation to subsequent windows and to the production budget. A regression model is used...

    Provided By University of Calgary

  • White Papers // Jul 2010

    Cooperative Diversity Routing in Wireless Networks

    In this paper, the authors explore physical layer cooperative communication in order to design network layer routing algorithms that are energy efficient. They assume each node in the network is equipped with a single omnidirectional antenna and that multiple nodes are able to coordinate their transmissions in order to take...

    Provided By University of Calgary

  • White Papers // Mar 2011

    A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management

    In recent years cloud computing has become a growing interest for organizations looking to reduce their IT costs by offloading infrastructure and software costs onto 3rd party organizations who offer Software-as-a-Service (SaaS) (e.g. Google Apps), Platform-as-a-Service (PaaS) (e.g. Google App Engine), and Infrastructure-as-a-Service (IaaS) (e.g. Amazon EC2). However, due to...

    Provided By University of Calgary

  • White Papers // May 2011

    Outsourcing Multi-Party Computation

    The authors initiate the study of secure Multi-Party Computation (MPC) in a server-aided setting, where the parties have access to a single server that does not have any input to the computation; does not receive any output from the computation; but has a vast (but bounded) amount of computational resources....

    Provided By University of Calgary

  • White Papers // Jun 2009

    A Privacy Preservation Model for Facebook-Style Social Network Systems

    Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind the privacy preservation mechanism of Facebook is distinctly different from such existing access control paradigms as Discretionary Access Control, Role-Based Access Control, Capability Systems, and TrustManagement...

    Provided By University of Calgary

  • White Papers // Jan 2011

    Offline/Realtime Traffic Classification Using Semi-Supervised Learning

    Identifying and categorizing network traffic by application type is challenging because of the continued evolution of applications, especially of those with a desire to be undetectable. The diminished effectiveness of port-based identification and the overheads of deep packet inspection approaches motivate them to classify traffic by exploiting distinctive flow characteristics...

    Provided By University of Calgary

  • White Papers // Jul 2009

    Tool Support for Software Development Based on Formal Specifications in RTPA

    The benefits of formal specification methodologies in software development have been identified and well researched. Their use in mainstream software development, however, continues to face a stiff resistance. A prominent reason for this resistance is the fact that there are generally not enough supporting tools to facilitate the development of...

    Provided By University of Calgary

  • White Papers // Jan 2013

    Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange

    The authors consider a very strong notion of Secret Handshakes, namely Affiliation-Hiding Authenticated Key Exchange protocols (AH-AKE), which guarantee security under arbitrary composition of protocol sessions, including man-in-the-middle attacks. The contribution of their paper is three-fold: first, they extend existing notions of AH-AKE security to Perfect Forward Secrecy (PFS), which...

    Provided By University of Calgary

  • White Papers // Jan 2013

    Aggregation Queries in the Database-As-a-Service Model

    In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent...

    Provided By University of Calgary

  • White Papers // Oct 2009

    Nonuniform Array Design for Robust Millimeter-Wave MIMO Links

    Spatial multiplexing for millimeter (mm) wave Line Of Sight (LOS) links potentially enables data rates of the order of 10-100 Gbps. Most prior work in this area has focused on uniform transmit and receive arrays, for which it is known that the spatial responses seen by different transmitters can be...

    Provided By University of Calgary

  • White Papers // Aug 2011

    Neighbor Discovery for Ultraviolet Ad Hoc Networks

    The solar blind UltraViolet (UV) scattering channel makes non-line-of-sight UV communications very attractive for military applications, particularly for communication on-the-move with low probability of detection and low probability of interception. Despite significant research effort on the UV physical layer, work on protocol design at the upper layers is quite limited....

    Provided By University of Calgary

  • White Papers // Oct 2009

    Beamforming in Wireless Relay-Interference Networks with Quantized Feedback

    In this paper, the authors are on quantized beamforming in wireless amplify-and-forward relay interference networks with multiple transmitter-receiver pairs. They design the quantizer of the feedback information specifically to optimize the union bound on the bit error rate performance. Two different quantization schemes are considered. First, using a global quantizer...

    Provided By University of Calgary

  • White Papers // Nov 2011

    A Distributed Algorithm for Random Convex Programming

    The authors study a distributed approach for solving Random Convex Programs (RCP) for the case in which problem constraints are distributed among nodes in a processor network. They devise a distributed algorithm that allows network nodes to reach consensus on problem solution by exchanging a local set of constraints at...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Experimental Characterization of Interference in OFDMA Femtocell Networks

    The increase in mobile data usage is pushing broadband operators towards deploying smaller cells (femtocells) and sophisticated access technologies such as OFDMA. The expected high density of deployment and uncoordinated operations of femtocells however, make interference management both critical and extremely challenging. Femtocells have to use the same access technology...

    Provided By University of Calgary

  • White Papers // Sep 2012

    A Distributed Protocol for Wireless Sensor Networks Based on Multiple-Leader Stackelberg Network Games

    While the past literature on game theory rarely addresses the implementation of protocols that converge to Nash equilibria, practical networks must be designed with protocols that correctly address issues of information asymmetries, hysteresis effects due to these asymmetries, and the fact that information can propagate only locally on networks. To...

    Provided By University of Calgary

  • White Papers // Dec 2009

    User Selection in Multiuser MIMO Systems With Secrecy Considerations

    This paper investigates simple user selection strategies in a multiuser downlink system with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and the authors examine the MIMO downlink channel with...

    Provided By University of Calgary

  • White Papers // Aug 2010

    Wireless Relay Communications With Unmanned Aerial Vehicles: Performance and Optimization

    In this paper, the authors investigate a communication system in which Unmanned Aerial Vehicles (UAVs) are used as relays between ground-based terminals and a network base-station. They develop an algorithm for optimizing the performance of the ground-to-relay links through control of the UAV heading angle. To quantify link performance, they...

    Provided By University of Calgary

  • White Papers // Aug 2010

    Dynamic UAV Relay Positioning for the Ground-to-Air Uplink

    In this paper, the authors consider a collection of mobile single-antenna ground nodes communicating with a multi-antenna Unmanned Aerial Vehicle (UAV) on a multiple-access ground-to-air wireless communications link. The UAV uses beamforming to mitigate the inter-user interference and achieve Spatial Division Multiple Access (SDMA). In addition, the UAV dynamically adjusts...

    Provided By University of Calgary

  • White Papers // Nov 2010

    Closed-Loop Tracking Using Multimodal RF/EO Sensors

    This paper addresses the problem of using multiple, spatially distributed RF/EO sensors for target tracking. Data from the multi-modal sensors is collected at a fusion center, and used to track multiple objects in the sensors' field of view. Continuous approximations are made of the sensors' resolution in range, range rate...

    Provided By University of Calgary

  • White Papers // Nov 2010

    MIMO Interference Channel With Confidential Messages: Game Theoretic Beamforming Designs

    The authors study the achievable rate regions of the Multiple-Input Multiple-Output (MIMO) interference channel with confidential messages sent to two receivers. Under this model, each receiver is an eavesdropper for the other link and tries to decode both its own message and the message intended for the other receiver. They...

    Provided By University of Calgary

  • White Papers // Nov 2010

    Securing Multi-Antenna Two-Way Relay Channels With Analog Network Coding Against Eavesdroppers

    This paper investigates the vulnerability of Analog Network Coding (ANC) to physical layer attacks from adversarial users, when all nodes are equipped with multiple antennas. Specifically, the authors examine the MIMO Two Way Relay Channel (TWRC) with two users trying to communicate with each other via a relay node in...

    Provided By University of Calgary

  • White Papers // Oct 2009

    Downlink Resource Allocation for Multi-User MIMO-OFDMA Systems: The Kalai-Smorodinsky Bargaining Approach

    As a promising technology to significantly increase the spectral efficiency of wireless systems, Multiple-Input and Multiple-Output (MIMO) techniques have drawn much attention over the past two decades. The work of, and the references therein have studied the information-theoretic aspects of MIMO systems and showed the capacity region for BroadCast (BC)...

    Provided By University of Calgary

  • White Papers // Sep 2009

    Time-Delay Estimation Applying the Extended Invariance Principle With a Polynomial Rooting Approach

    This paper treats the problem of joint estimation of time-delay and spatial (Direction-Of-Arrival, DOA) parameters of several replicas of a known signal in an unknown spatially correlated field. Unstructured and structured data models have been proposed for Maximum Likelihood (ML) estimators, whereas the former suffers from severe performance degradation in...

    Provided By University of Calgary

  • White Papers // Oct 2012

    Making the Internet More Evolvable

    Why is the Internet so hard to evolve? Some argue that the people require a radically different architecture to enable evolution. To the contrary, they contend that a simple re-engineering of the basic Internet interfaces to make them more modular and extensible - as one would in any software system...

    Provided By University of Calgary

  • White Papers // Sep 2012

    Macroscopically Sustainable Networking: An Internet Quine

    The Internet stands atop an unseen industrial system required for its continued growth, operation, and maintenance. While its scale could not have been achieved without this reliance, its dependencies - ranging from sophisticated manufacturing facilities to limited raw materials - make it vulnerable to disruptions. To achieve independence requires an...

    Provided By University of Calgary

  • White Papers // Nov 2012

    Linear Programming Based Joint Detection of LDPC Coded MIMO Systems

    Multiple-Input Multiple-Output (MIMO) communication systems can achieve higher throughput by exploiting diversity in multi-antenna wireless communications. Spatial multiplexing schemes attempts to take advantage of the increased Shannon capacity that grows linearly with the number of transceiver antennas. One can apply Maximum a Posteriori probability (MAP) detector and Minimum Mean Square...

    Provided By University of Calgary

  • White Papers // Mar 2013

    SoK: Eternal War in Memory

    Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the program's behavior or take full control over it by hijacking its control flow. This problem has...

    Provided By University of Calgary

  • White Papers // Aug 2012

    A Framework to Eliminate Backdoors From Response-Computable Authentication

    Response-Computable Authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have long been threatened by malicious developers who can plant backdoors...

    Provided By University of Calgary

  • White Papers // Oct 2009

    A Convex Optimization Approach to Blind Channel Shortening in Multicarrier Modulations

    The authors study the problem of channel shortening in multicarrier modulation systems without training. They reformulate two existing methods, the sum-squared and the Sum-Absolute Autocorrelation Minimization algorithms (SAM and SAAM), into semidefinite programming to overcome their shortcoming of local convergence. They present the original SAM and SAAM cost functions into...

    Provided By University of Calgary