University of Calgary

Displaying 1-40 of 532 results

  • White Papers // Jan 2015

    Analyzing Tabular Requirements Specifications Using Infinite State Model Checking

    In this paper, the authors investigate the application of infinite state model checking to the formal analysis of requirements specifications in the SCR (Software Cost Reduction) tabular notation using Action Language Verifier (ALV). After reviewing the SCR method and tools and the Action Language, experimental results are presented of formally...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Conversations: Realizability, Synchronizability, and Verification

    Conversations provide an intuitive and simple model for analyzing interactions among composite web services. A conversation is the global sequence of messages exchanged among the peers participating to a composite web service. Interactions in a composite web service can be analyzed by investigating the temporal properties of its conversations. Conversations...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Modular Verification of Synchronization with Reentrant Locks

    The authors present a modular approach for verification of synchronization behavior in concurrent programs that use reentrant locks. Their approach decouples the verification of the lock implementation from the verification of the threads that use the lock. This decoupling is achieved using lock interfaces that characterize the allowable execution order...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems

    Although it is most often applied to finite state models, in recent years, symbolic model checking has been extended to infinite state models using symbolic representations that encode infinite sets. This paper investigates the application of an infinite state symbolic model checker called Action Language Verifier (ALV) to formal requirements...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Extended Interface Grammars for Automated Stub Generation

    An important challenge in software verification is the ability to verify different software components in isolation. Achieving modularity in software verification requires development of innovative interface specification languages. In this paper the authors focus on the idea of using grammars for specification of component interfaces. In earlier work, they investigated...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Computing Real Time Jobs in P2P Networks

    In this paper, the authors present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P environment. Their proposed strategy strives to build an open infrastructure that is accessible by ordinary users for both cycle donation and consumption. For...

    Provided By University of Calgary

  • White Papers // Nov 2014

    To Go or Not to Go: On Energy-aware and Communication-aware Robotic Operation

    The authors consider the scenario where a mobile robot needs to visit a number of Points Of Interest (POIs) in a workspace, gather their generated bits of information, and successfully transmit them to a remote station, while operating in a realistic communication environment, minimizing its total energy consumption (including both...

    Provided By University of Calgary

  • White Papers // Sep 2014

    CloudTracker: Using Execution Provenance to Optimize the Cost of Cloud Use

    In this paper, the authors investigate tools that enable dollar cost optimization of scientific simulations using commercial clouds. They present a framework, called CloudTracker that transparently records information from a simulation that is executed in a commercial cloud so that it may be \"Replayed\" exactly to reproduce its results. Using...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Automata-Based Symbolic String Analysis for Vulnerability Detection

    Verifying string manipulating programs is a crucial problem in computer security. String operations are used extensively within web applications to manipulate user input, and their erroneous use is the most common cause of security vulnerabilities in web applications. The authors present an automata-based approach for symbolic analysis of string manipulating...

    Provided By University of Calgary

  • White Papers // Jul 2014

    BareCloud: Bare-metal Analysis-based Evasive Malware Detection

    The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Hulk: Eliciting Malicious Behavior in Browser Extensions

    The authors present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension's expectations in web page structure...

    Provided By University of Calgary

  • White Papers // Jul 2014

    EmergeNet: Robust, Rapidly Deployable Cellular Networks

    Cellular phone networks are often paralyzed after a disaster, as damage to fixed infrastructure, loss of power, and increased demand degrade coverage and quality of service. To ensure disaster victims and first responders have access to reliable local and global communication, the authors propose EmergeNet, a portable, rapidly deployable, small...

    Provided By University of Calgary

  • White Papers // Jun 2014

    DRoP:DNS-based Router Positioning

    In this paper, the authors focus on geolocating Internet routers, using a methodology for extracting and decoding geography-related strings from fully qualified domain names (hostnames). They first compiled an extensive dictionary associating geographic strings (e.g., airport codes) with geophysical locations. They then searched a large set of router hostnames for...

    Provided By University of Calgary

  • White Papers // May 2014

    Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory

    Each anomalous process incurs a cost per unit time until its anomaly is identified and fixed. Different anomalous processes may incur different costs depending on their criticality to the system. Switching between processes and state declarations are allowed at all times, while decisions are based on all past observations and...

    Provided By University of Calgary

  • White Papers // May 2014

    Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting

    Using ground truth sales data for over 40K unlicensed prescription pharmaceuticals sites, the authors present an economic analysis of two aspects of domain abuse in the online counterfeit drug market. First, they characterize the nature of domains abused by affiliate spammers to monetize what is evidently an overwhelming demand for...

    Provided By University of Calgary

  • White Papers // May 2014

    Automatic and Portable Cloud Deployment for Scientific Simulations

    In this paper, the authors present CloudRunner, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CloudRunner automatically creates and configures virtual...

    Provided By University of Calgary

  • White Papers // May 2014

    Enhanced Lattice-Based Signatures on Reconfigurable Hardware

    The recent Bimodal LattIce Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. Besides reasonably small signatures with 5600 bits for a 128-bit level of security, BLISS enables extremely fast signing and signature verification in software. However, due to the complex sampling of...

    Provided By University of Calgary

  • White Papers // May 2014

    A Sampling-Based Approach to Scalable Constraint Satisfaction in Linear Sampled-Data Systems - Part I: Computation

    Sampled-Data (SD) systems, which are composed of both discrete- and continuous-time components, are arguably one of the most common classes of cyber-physical systems in practice; most modern controllers are implemented on digital platforms while the plant dynamics that are being controlled evolve continuously in time. As with all cyber-physical systems,...

    Provided By University of Calgary

  • White Papers // May 2014

    Scalable Fault-Tolerant Data Feeds in AsterixDB

    In this paper, the authors describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external...

    Provided By University of Calgary

  • White Papers // May 2014

    ReDHiP: Recalibrating Deep Hierarchy Prediction for Energy Efficiency

    Recent hardware trends point to increasingly deeper cache hierarchies. In such hierarchies, accesses that lookup and miss in every cache involve significant energy consumption and degraded performance. To mitigate these problems, in this paper the authors propose Recalibrating Deep Hierarchy Prediction (ReDHiP), an architectural mechanism that predicts Last-Level Cache (LLC)...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Multi-Level Coded Caching

    Recent work has demonstrated that for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches, so as to create coded-multicast opportunities even amongst users with different demands. Such a coded-caching scheme has been shown...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Towards Automatically Estimating Porting Effort Between Web Service APIs

    In this paper, the authors describe a new methodology for automatically quantifying the relative work required for a programmer to port an application from one web API to another, i.e. \"Porting effort\". Their approach defines a simple language (based on Python) with which API developers specify the semantics of API...

    Provided By University of Calgary

  • White Papers // Apr 2014

    SELFISHMIGRATE: A Scalable Algorithm for Non-Clairvoyantly Scheduling Heterogeneous Processors

    Many computer architects believe that architectures consisting of heterogeneous processors will be the dominant architectural design in the future: simulation studies indicate that, for a given area and power budget, heterogeneous multiprocessors can offer an order of magnitude better performance for typical workloads. Looking at the consequences of Moore's Law...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Lithography-Induced Limits to Scaling of Design Quality

    Quality and value of an IC product are functions of power, performance, area, cost and reliability. The forthcoming 2013 ITRS roadmap observes that while manufacturers continue to enable potential Moore's Law scaling of layout densities, the \"Realizable\" scaling in competitive products has for some years been significantly less. In this...

    Provided By University of Calgary

  • White Papers // Mar 2014

    VANET via Named Data Networking

    Recently manufactured vehicles are equipped with not only computation powers but also a variety of wireless communication interfaces such as 3G/LTE, WiMAX, Wi-Fi, IEEE 1901 (power line communication), and 802.11p (DSRC/WAVE). In this paper, the authors apply the named data networking, a newly proposed Internet architecture, to networking vehicles on...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Circuit Switching Under the Radar with REACToR

    The potential advantages of optics at high link speeds have led to significant interest in deploying optical switching technology in data-center networks. Initial efforts have focused on hybrid approaches that rely on millisecond-scale circuit switching in the core of the network, while maintaining the flexibility of electrical packet switching at...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SENIC: Scalable NIC for End-Host Rate Limiting

    Rate limiting is an important primitive for managing server network resources. Unfortunately, software-based rate limiting suffers from limited accuracy and high CPU overhead, and modern NICs only support a handful of rate limiters. The authors present SENIC, a NIC design that can natively support 10s of thousands of rate limiters...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

    Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These...

    Provided By University of Calgary

  • White Papers // Feb 2014

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    The authors present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Their method can be used to improve previous oblivious storage solutions for network-based outsourcing of data. One of the unmistakable recent trends in networked computation...

    Provided By University of Calgary

  • White Papers // Feb 2014

    Optimal Reliability-Constrained Overdrive Frequency Selection In Multicore Systems

    In leading-edge process technologies, reliability is a first-class constraint for both IC design and system operation. For multicore systems, reliability affects task scheduling decisions since it constrains both performance and throughput. Previous works on reliability-constrained task scheduling have two basic limitations: either they cannot guarantee lifetime (e.g., that the chip...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Automated Test Generation from Vulnerability Signatures

    Web applications need to validate and sanitize user inputs in order to avoid attacks such as Cross Site Scripting (XSS) and SQL injection. Writing string manipulation code for input validation and sanitization is an error-prone process leading to many vulnerabilities in real-world web applications. Automata-based static string analysis techniques can...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Cloud Platform Support for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require duration as web-accessible services. \"Service-izing\" digital assets consist of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, Application Programming Interfaces (APIs)....

    Provided By University of Calgary

  • White Papers // Jan 2014

    NOLO : A No-Loop, Predictive Useful Skew Methodology for Improved Timing in IC Implementation

    Useful skew is a well-known design technique that adjusts clock sink latencies to improve performance and/or robustness of high-performance IC designs. Current design methodologies apply useful skew after the netlist has been synthesized (e.g., with a uniform skew or clock uncertainty assumption on all flops), and after placement has been...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Timing Margin Recovery with Flexible Flip-Flop Timing Model

    In timing signoff for leading-edge SOCs, even few-picosecond timing violations will not only increase design turnaround time, but also degrade design quality (e.g., through power increase from insertion of extra buffers). Conventional flip-flop timing models have fixed values of setup/hold times and clock-to-q (c2q) delay, with some advanced \"Setup-Hold Pessimism...

    Provided By University of Calgary

  • White Papers // Jan 2014

    A Flexible, Syntax Independent Representation (SIR) for System Level Design Models

    System Level Design (SLD) is widely seen as a solution for bridging the gap between chip complexity and design productivity of Systems on Chip (SoC). SLD relieves the designer from detailed manual implementation by raising the level of abstraction in design models. There are many different modeling approaches to SLD....

    Provided By University of Calgary

  • White Papers // Jan 2014

    Introduction to Hardware-Dependent Software Design

    Microelectronics is ubiquitous and took over large parts of the people daily life. Together with an increasing profileration of such embedded systems, their complexities are growing exponentially. Due to the rapidly increasing software content in embedded systems, Hardware-dependent Software (HdS) has become a critical topic in system design. In this...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Creating Explicit Communication in SoC Models Using Interactive Re-Coding

    Communication exploration has become a critical step during SoC design. Researchers in the CAD community have proposed fast and efficient techniques for comprehensive design space exploration to expedite this critical design step. Although these advances have been helpful in reducing the design time significantly, the overall design time of the...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Power-Aware Register Renaming in High-Performance Processors Using Compiler Support

    Recently, energy consumption in embedded systems has become more and more important, mainly due to the fact that many systems are now being designed as mobile devices, i.e., they have to operate on battery power instead of using abundant power from wall sockets. One important aspect of such devices is...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Ubiquitous Access to Distributed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes

    Consider a large-scale wireless sensor network of n nodes, where a fraction k out of n generates data packets of global interest. Assuming that the individual nodes have limited storage and computational capabilities, the authors address the problem of how to enable ubiquitous access to the distributed data packets. Specially,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Data Placement Based on the Seek Time Analysis of a MEMS-based Storage Device

    Reducing access times to secondary I/O devices has long been the focus of many systems researchers. With traditional disk drives, access time is the composition of transfer time, seek time and rotational latency, so many techniques as to minimize these factors, such as ordering I/O requests or intelligently placing data,...

    Provided By University of Calgary

  • White Papers // Nov 2009

    On Optimal Secure Message Transmission by Public Discussion

    In a Secure Message Transmission (SMT) scenario a sender wants to send a message in a private and reliable way to a receiver. Sender and receiver are connected by n vertex disjoint paths, referred to as wires, t of which can be controlled by an adaptive adversary with unlimited computational...

    Provided By University of Calgary

  • White Papers // Apr 2011

    Clustering Posts in Online Discussion Forum Threads

    Online discussion forums are considered a challenging repository for data mining tasks. Forums usually contain hundreds of threads which in turn consist of hundreds, or even thousands, of posts. Clustering posts can be used to discover outlier and off-topic posts and would provide better visualization and exploration of online threads....

    Provided By University of Calgary

  • White Papers // Jan 2011

    Offline/Realtime Traffic Classification Using Semi-Supervised Learning

    Identifying and categorizing network traffic by application type is challenging because of the continued evolution of applications, especially of those with a desire to be undetectable. The diminished effectiveness of port-based identification and the overheads of deep packet inspection approaches motivate them to classify traffic by exploiting distinctive flow characteristics...

    Provided By University of Calgary

  • White Papers // May 2011

    Outsourcing Multi-Party Computation

    The authors initiate the study of secure Multi-Party Computation (MPC) in a server-aided setting, where the parties have access to a single server that does not have any input to the computation; does not receive any output from the computation; but has a vast (but bounded) amount of computational resources....

    Provided By University of Calgary

  • White Papers // Mar 2011

    A Review of Cloud Computing Security: Virtualization, Side-Channel Attacks, and Management

    In recent years cloud computing has become a growing interest for organizations looking to reduce their IT costs by offloading infrastructure and software costs onto 3rd party organizations who offer Software-as-a-Service (SaaS) (e.g. Google Apps), Platform-as-a-Service (PaaS) (e.g. Google App Engine), and Infrastructure-as-a-Service (IaaS) (e.g. Amazon EC2). However, due to...

    Provided By University of Calgary

  • White Papers // Jan 2005

    Revenues, Profitability, and Returns: Clinical Analysis of the Market for Mobster Films

    This paper analyzes empirically the revenues, profitability, and financial returns of mobster-related movies using data from worldwide theatrical exhibition, television syndication, and video rentals and sales. It quantifies the revenues across each window of exhibition in relation to subsequent windows and to the production budget. A regression model is used...

    Provided By University of Calgary

  • White Papers // Jan 2010

    Improved Port Knocking With Strong Authentication

    Sometimes, it becomes necessary to let only the authorized external users access the open ports whereas closed ports may be accessible to all. The paper seeks to investigate various methods of authentication so as to keep data secure. It specifically focuses on 'Port Knocking' method and the procedure to implement...

    Provided By University of Calgary

  • White Papers // Jan 2010

    A Case for Context-Aware TCP/IP

    This paper discusses the design and evaluation of CATNIP, a Context-Aware Transport/Network Internet Protocol for the Web. This integrated protocol uses application-layer knowledge (i.e.,Web document size) to provide explicit context information to the TCP and IP protocols. While this approach violates the traditional layered Internet protocol architecture, it enables informed...

    Provided By University of Calgary

  • White Papers // Jan 2010

    Downlink Performance for Mixed Web/VoIP Traffic in 1xEVDO Rev a Networks

    Current 3G cellular networks, such as those based on 1xEVDO Rev A, have several mechanisms to provide Quality of Service (QoS) to network applications. This paper investigates the performance for mixed Web/VoIP traffic on the downlink in 1xEVDO Rev A networks. The impacts from the mixed traffic are studied by...

    Provided By University of Calgary

  • White Papers // Sep 2012

    Increasing Sync Rate of Pulse-Coupled Oscillators Via Phase Response Function Design: Theory and Application to Wireless Networks

    This paper addresses the synchronization rate of weakly connected Pulse-Coupled Oscillators (PCOs). The authors prove that besides coupling strength, the phase response function is also a determinant of synchronization rate. Inspired by the result, they propose to increase the synchronization rate of PCOs by designing the phase response function. This...

    Provided By University of Calgary

  • White Papers // Jul 2010

    Cooperative Diversity Routing in Wireless Networks

    In this paper, the authors explore physical layer cooperative communication in order to design network layer routing algorithms that are energy efficient. They assume each node in the network is equipped with a single omnidirectional antenna and that multiple nodes are able to coordinate their transmissions in order to take...

    Provided By University of Calgary

  • White Papers // Jul 2011

    On the Complexity of Wireless Uplink Scheduling With Successive Interference Cancellation

    In this paper, the authors study the problem of uplink scheduling in wireless networks with Successive Interference Cancellation (SIC). With SIC, concurrent transmissions, if properly scheduled, can be successfully decoded at a receiver. The scheduler decides: in which time-slot, and in what order in a time-slot to decode each transmission...

    Provided By University of Calgary

  • White Papers // May 2012

    Outage Performance for Amplify-and-Forward Channels With an Unauthenticated Relay

    The authors investigate a relay network where the source can potentially utilize an unauthenticated Amplify-and-Forward (AF) relay to augment its direct transmission of a confidential message to the destination. Since the relay is unauthenticated, it is desirable to protect the confidential data from it while simultaneously making use of it...

    Provided By University of Calgary

  • White Papers // May 2012

    Bit-Interleaved Coded Multiple Beamforming With Perfect Coding

    When Channel State Information (CSI) is available at both the transmitter and the receiver, beamforming techniques exploiting Singular Value Decomposition (SVD) are applied in a Multiple-Input Multiple-Output (MIMO) system to achieve spatial multiplexing1 and thereby increase the data rate, or to enhance the performance. However, spatial multiplexing without channel coding...

    Provided By University of Calgary

  • White Papers // May 2012

    Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad-Hoc Wireless Networks

    Infrastructure sharing has been recently investigated as a viable solution to increase the performance of coexisting wireless networks. In this paper, the authors analyze a scenario where two wireless networks are willing to share some of their nodes to gain benefits in terms of lower packet delivery delay and reduced...

    Provided By University of Calgary

  • White Papers // May 2012

    Adaptive Precoding for Femtocell Interference Mitigation

    In this paper, the authors study interference mitigation in cellular networks with femtocells. They propose to use adaptive distributed beamforming to mitigate downlink interference between femtocell users, known as Home User Equipments (HUEs), and macrocell users, known as Macrocell User Equipments (MUEs). They develop three MIMO beamforming schemes for interference...

    Provided By University of Calgary

  • White Papers // Mar 2012

    UAV-Aided Cross-Layer Routing for MANETs

    In this paper, the authors present UAV-aided Cross-Layer Routing Protocol (UCLR) that aims at improving the routing performance of a ground MANET network with aid from an Unmanned Aerial Vehicle (UAV). The UAV is added to a connected backbone formed by a collection of designated nodes in order to combat...

    Provided By University of Calgary

  • White Papers // May 2012

    Protograph-Based Raptor-Like LDPC Codes With Low Thresholds

    This paper presents a new construction of Punctured-Node Protograph-Based Raptor-Like (PN-PBRL) codes that is suitable for long-blocklength applications. As with the Raptor codes, additional parity bits can be easily produced by exclusive-OR operations on the precoded bits, providing extensive rate compatibility. The new construction provides low iterative decoding thresholds that...

    Provided By University of Calgary

  • White Papers // May 2012

    Coded Path Protection: Efficient Conversion of Sharing to Coding

    Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow and require complex signaling. Additionally, real-time reconfiguration of a cross connect threatens their transmission integrity. On the other hand, coding-based protection schemes are proactive. Therefore, they...

    Provided By University of Calgary

  • White Papers // May 2012

    Cyclostationarity-Based Low Complexity Wideband Spectrum Sensing Using Compressive Sampling

    Detecting the presence of licensed users and avoiding interference to them is vital to the proper operation of a Cognitive Radio (CR) network. Operating in a wideband channel requires high Nyquist sampling rates, which is limited by the state-of-the-art A/D converters. Compressive sampling is a promising solution to reduce sampling...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Multiuser Communications Using Beam-Tilting Antennas

    This paper proposes means to exploit the additional degrees of freedom that can be achieved by using beam-tilting antennas for the purposes of multiuser communication without substantially increasing investment in system resources. Specifically, by using such beam-tilting antennas the wireless channel can be used as a means to spread the...

    Provided By University of Calgary

  • White Papers // May 2012

    Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

    The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Limits of Random Oracles in Secure Computation

    The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way functions and public-key encryption: informally, a public-key encryption scheme cannot be constructed using one-way functions as the sole source of computational hardness. In addition, this implied a black-box separation between one-way functions and protocols for...

    Provided By University of Calgary

  • White Papers // Aug 2012

    Resource Centric Security to Protect Customer Energy Information in the Smart Grid

    From the customer domain perspective, interoperation implies that external systems are able to control customer's energy resources as well as to read energy-related information. These two types of accesses to an energy resource affect the operation of the customer domain differently. However, most existing security mechanisms were designed at individual...

    Provided By University of Calgary

  • White Papers // May 2012

    Social Norm Incentives for Secure Network Coding in MANETs

    The throughput of mobile ad hoc networks subject to disruption, loss and interference can be significantly improved with the use of network coding. However, network coding implies extra work for forwarders. Selfish forwarders may prefer to simply forward packets without coding them because of the processing overhead introduced by network...

    Provided By University of Calgary

  • White Papers // May 2012

    Combination Weights for Diffusion Strategies With Imperfect Information Exchange

    Adaptive networks rely on in-network and collaborative processing among distributed agents to deliver enhanced performance in estimation and inference tasks. Information is exchanged among the nodes, usually over noisy links. This paper first investigates the mean-square performance of adaptive diffusion algorithms in the presence of various sources of imperfect information...

    Provided By University of Calgary

  • White Papers // May 2012

    Energy-Efficient Dynamic Provisioning for Spectrum Elastic Optical Networks

    Spectrum elastic optical networks support flexible central frequency and spectrum assignment for lightpaths. In this paper, the authors investigate energy-efficient dynamic provisioning for such networks. When provisioning a connection, the routing problems in both electrical layer (routing over multiple lightpaths) and optical layer (routing over multiple fibers) have to be...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Practical Energy Efficient Link Adaptation for MIMO-OFDM Systems

    The authors present a practical link adaptation algorithm for MIMO-OFDM systems. The proposed solution is based on sounding the channel periodically and choosing the optimal mode that will maximize the throughput or energy efficiency while satisfying the application's Quality of Service (QoS) requirements. In addition, they address practical problems such...

    Provided By University of Calgary

  • White Papers // Dec 2011

    Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes

    Recent advances in DNA sequencing technologies have put ubiquitous availability of fully sequenced human genomes within reach. It is no longer hard to imagine the day when everyone will have the means to obtain and store one's own DNA sequence. Widespread and affordable availability of fully sequenced genomes immediately opens...

    Provided By University of Calgary

  • White Papers // Sep 2012

    ACORN: An Auto-Configuration Framework for 802.11n WLANs

    The wide channels feature combines two adjacent channels to form a new, wider channel to facilitate high data rate transmissions in MIMO-based 802.11n networks. Using a wider channel can exacerbate interference effects. Furthermore, contrary to what has been reported by prior studies, the authors find that wide channels do not...

    Provided By University of Calgary

  • White Papers // Aug 2012

    Realizing the Benefits of Wireless Network Coding in Multi-Rate Settings

    Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via mixing data packets at intermediate routers. However, most previous studies either assume a fixed transmission rate or do not consider the impact of using diverse rates on the network coding...

    Provided By University of Calgary

  • White Papers // May 2012

    Wireless Network Aware Cloud Scheduler for Scalable Cloud Mobile Gaming

    Cloud Mobile Gaming (CMG) has been proposed as an approach to enable rich Internet games on mobile devices, where the rendering of the games is performed on cloud servers, as opposed to on mobile devices. Though promising, the CMG approach may require significant cloud computing resources for the concurrent gaming...

    Provided By University of Calgary

  • White Papers // May 2012

    Global Motion Compensation and Spectral Entropy Bit Allocation for Low Complexity Video Coding

    Most standard video compression schemes such as H.264/AVC involve a high complexity encoder with block Motion Estimation (ME) engine. However, applications such as video reconnaissance and surveillance using Unmanned Aerial Vehicles (UAVs) require a low complexity video encoder. Additionally, in such applications, the motion in the video is primarily global...

    Provided By University of Calgary

  • White Papers // Aug 2012

    Stochastic Online Learning for Network Optimization Under Random Unknown Weights

    The authors consider network optimization problems under random weights with unknown distributions. They first consider the shortest path problem that aims to optimize the quality of communication between a source and a destination through adaptive path selection. Due to the randomness and uncertainties in the network dynamics, the state of...

    Provided By University of Calgary

  • White Papers // May 2012

    Distributed Throughput Optimization Over P2P Mesh Networks Using Diffusion Adaptation

    This work develops a decentralized adaptive strategy for throughput maximization over Peer-To-Peer (P2P) networks. The adaptive strategy can cope with changing network topologies, is robust to network disruptions, and does not rely on central processors. The algorithm is obtained as a special case of a more general diffusion strategy for...

    Provided By University of Calgary

  • White Papers // May 2012

    Analysis of a MIMO OFDMA Heterogeneous Feedback System Employing Joint Scheduling and Spatial Diversity in Nakagami Fading Channels

    The authors present a unified analytical framework to jointly examine spatial, spectral, and multiuser diversity in a general multiuser MIMO OFDMA system. Spectral diversity originates from frequency domain opportunistic scheduling enabled by the OFDMA technique, and is influenced by partial feedback design. They propose a heterogeneous partial feedback design method...

    Provided By University of Calgary

  • White Papers // May 2012

    Heterogeneous Partial Feedback Design in Heterogeneous OFDMA Cellular Networks

    Modern heterogeneous networks have an inherent heterogeneous structure such as user densities and large scale channel effects that motivates this work on heterogeneous partial feedback design. In this paper, the authors address the partial feedback design issue in an OFDMA-based macro-pico cellular system employing the best-M partial feedback strategy. They...

    Provided By University of Calgary

  • White Papers // May 2010

    On Secure Distributed Data Storage Under Repair Dynamics

    The authors address the problem of securing distributed storage systems against passive eavesdroppers that can observe a limited number of storage nodes. An important aspect of these systems is node failures over time, which demand a repair mechanism aimed at maintaining a targeted high level of system reliability. If an...

    Provided By University of Calgary

  • White Papers // Sep 2012

    Collaborative Energy Debugging for Mobile Devices

    The authors aim to detect and diagnose code misbehavior that wastes energy, which they call energy bugs. This paper describes a method and implementation, called Carat, for performing such diagnosis on mobile devices. Carat takes a collaborative, black-box approach. A non-invasive client app sends intermittent, coarse-grained measurements to a server,...

    Provided By University of Calgary

  • White Papers // Sep 2009

    Versioning of Network Models in a Multiuser Environment

    The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data in a multiuser environment. The preferred method to resolve conflicts in GIS systems is to encapsulate the modifications generated by the end users through the use...

    Provided By University of Calgary