University of Colombo School of Computing

Displaying 1-21 of 21 results

  • White Papers // May 2013

    Toward Secure and Convenient Browsing Data Management in the Cloud

    Cloud and web-centric computing is a significant trend in computing. However, the design and development of modern web browsers failed to catch up this significant trend to address many challenging Browsing Data Insecurity and Inconvenience (referred to as BDII) problems that bother millions of web users. In this paper, the...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2013

    Signal Design for Bandwidth Efficient Multiple Access with Guaranteed Bit Error Rate

    The problem of signal design for bandwidth efficient multiple access is addressed under Quality of Service (QoS) constraints specified by (possibly different) BER. Indeed, BER more accurately measures the performance than the Signal-to-Interference Ratio (SIR) for uncoded communication. Furthermore, the authors argue that the Asymptotic Effective Energy (AEE) faithfully characterizes...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2013

    Performance Analysis of Structured LDPC Over the Polya-Urn Channel with Finite Memory

    In this paper, the authors investigate the performance of structured LDPC codes over a simple channel with memory. The channel under consideration is based on Polka's urn model and can be used as a representative of several classes of practical channels with burst errors. Random codes have large storage requirements,...

    Provided By University of Colombo School of Computing

  • White Papers // Dec 2012

    Downlink Performance Analysis for a Generalized Shotgun Cellular System

    In this paper, the authors analyze the Signal-to-Interference-plus-Noise Ratio (SINR) performance at a Mobile Station (MS) in a random cellular network. The cellular network is formed by Base-Stations (BSs) placed in a one, two or three dimensional space according to a possibly non-homogeneous Poisson point process, which is a generalization...

    Provided By University of Colombo School of Computing

  • White Papers // Dec 2012

    Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions

    Distributed denial of service attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources. Due to the continuous evolution of new attacks and ever-increasing number of vulnerable hosts on the Internet, many DDoS attack detection or prevention...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    Downlink Coverage Analysis in a Heterogeneous Cellular Network

    In this paper, the authors consider the downlink Signal-to-Interference-plus-Noise Ratio (SINR) analysis in a heterogeneous cellular network with K tiers. Each tier is characterized by a Base-Station (BS) arrangement according to a homogeneous Poisson point process with certain BS density, transmission power, random shadow fading factors with arbitrary distribution, arbitrary...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    On Gaussian Multiple Access Channel With Signal Dependent Noise

    The motivation of this work is to examine how well methods, such as successive interference cancellation and interference alignment from information theoretic solution, work in real-world where the received signal is quantized for digital processing. As a first step, the authors consider Gaussian Multiple Access Channels with the quantization noise...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector

    Modern Web browsers do not provide sufficient protection to prevent users from submitting their online passwords to inappropriate websites. As a result, users may accidentally reveal their passwords for high-security websites to inappropriate low-security websites or even phishing websites. In this paper, the authors address this limitation of modern browsers...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2011

    Redesigned Framework and Approach for IT Project Management

    In this paper, the authors consider software development type Information Technology (IT) projects in presenting the redesigned framework and approach for their management. Software development produces intangible products and requirements for software products are difficult to capture as well as they are changing faster than expected. This has made software...

    Provided By University of Colombo School of Computing

  • White Papers // May 2011

    A Validation Method for Fuzzy Clustering of Gene Expression Data

    Clustering is a key process in data mining for revealing structure and patterns in data. Fuzzy C-Means (FCM) is a popular algorithm using a partitioning approach for clustering. One advantage of FCM is that it converges rapidly. In addition, using fuzzy sets to represent the degrees of cluster membership of...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2011

    A Survey of Outlier Detection Methods in Network Anomaly Identification

    The detection of outliers has gained considerable interest in data mining with the realization that outliers can be the key discovery to be made from very large databases. Outliers arise due to various reasons such as mechanical faults, changes in system behavior, fraudulent behavior, human error and instrument error. Indeed,...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2010

    q-Anon: Rethinking Anonymity for Social Networks

    This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, q-Anon, is...

    Provided By University of Colombo School of Computing

  • White Papers // May 2010

    On the Optimal Path Length for Tor

    Choosing a path length for low latency anonymous networks that optimally balances security and performance is an open problem. Tor's design decision to build paths with precisely three routers is thought to strike the correct balance. In this paper, the authors investigate this design decision by experimentally evaluating several of...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2010

    Social-K: Real-Time K-Anonymity Guarantees for Social Network Applications

    Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of personal data are now done through social networks and their APIs, which do not fit the previous research-centric data set release model, nor do they allow for clear...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2009

    Reproducing Cloud Microphysical and Irradiance Measurements Using Three 3D Cloud Generators

    Using three cloud generators, Three-Dimensional (3D) cloud fields are reproduced from microphysical cloud data measured in situ by aircraft. The generated cloud fields are used as input to a 3D radiative transfer model to calculate the corresponding fields of downward and upward irradiance, which are then compared with airborne and...

    Provided By University of Colombo School of Computing

  • White Papers // Jun 2009

    CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet Applications

    Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. The Session-Based Admission Control approach (SBAC) designed for a single Web server is not effective for a multi-tier architecture. This is due to the fact that the bottleneck in a multi-tier website...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2009

    The Challenges of Stopping Illegal Peer-to-Peer File Sharing

    Illegal file sharing within peer-to-peer networks has become a significant threat to the film and recording industries. Furthermore, such peer-to-peer protocols often use a significantly large amount of bandwidth relative to other protocols, complicating network management. In the past, copyright enforcement agencies have been hired to investigate users who appear...

    Provided By University of Colombo School of Computing

  • White Papers // Jun 2007

    Using Context in Security Design of a Search and Rescue System

    With the emergence of small devices equipped with wireless communication, several sophisticated systems for search and rescue have been proposed and developed. However, a key obstacle in a wide deployment of these systems has been users' security and privacy. On one hand, such systems need to collect as much information...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2007

    Finding Parallelism for Future EPIC Machines

    Parallelism has been the primary architectural mechanism to increase computer system performance. To continue pushing the performance envelope, identifying new sources of parallelism for future architectures is critical. Current hardware exploits local Instruction Level Parallelism (ILP) as hardware resources and information communicated by the Instruction-Set Architecture (ISA) permit. From this...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2007

    Deconstructing Hardware Usage for General Purpose Computation on GPUs

    The high-programmability and numerous compute resources on Graphics Processing Units (GPUs) have allowed researchers to dramatically accelerate many non-graphics applications. This initial success has generated great interest in mapping applications to GPUs. Accordingly, several works have focused on helping application developers rewrite their application kernels for the explicitly parallel but...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2006

    Improved Stride Prefetching using Extrinsic Stream Characteristics

    Stride-based prefetching mechanisms exploit regular streams of memory accesses to hide memory latency. While these mechanisms are effective, they can be improved by studying the properties of regular streams. As evidence of this, the establishment of metrics to quantify intrinsic characteristics of regular streams has been shown to enable software-based...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2011

    Redesigned Framework and Approach for IT Project Management

    In this paper, the authors consider software development type Information Technology (IT) projects in presenting the redesigned framework and approach for their management. Software development produces intangible products and requirements for software products are difficult to capture as well as they are changing faster than expected. This has made software...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector

    Modern Web browsers do not provide sufficient protection to prevent users from submitting their online passwords to inappropriate websites. As a result, users may accidentally reveal their passwords for high-security websites to inappropriate low-security websites or even phishing websites. In this paper, the authors address this limitation of modern browsers...

    Provided By University of Colombo School of Computing

  • White Papers // May 2010

    On the Optimal Path Length for Tor

    Choosing a path length for low latency anonymous networks that optimally balances security and performance is an open problem. Tor's design decision to build paths with precisely three routers is thought to strike the correct balance. In this paper, the authors investigate this design decision by experimentally evaluating several of...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2009

    The Challenges of Stopping Illegal Peer-to-Peer File Sharing

    Illegal file sharing within peer-to-peer networks has become a significant threat to the film and recording industries. Furthermore, such peer-to-peer protocols often use a significantly large amount of bandwidth relative to other protocols, complicating network management. In the past, copyright enforcement agencies have been hired to investigate users who appear...

    Provided By University of Colombo School of Computing

  • White Papers // Dec 2012

    Downlink Performance Analysis for a Generalized Shotgun Cellular System

    In this paper, the authors analyze the Signal-to-Interference-plus-Noise Ratio (SINR) performance at a Mobile Station (MS) in a random cellular network. The cellular network is formed by Base-Stations (BSs) placed in a one, two or three dimensional space according to a possibly non-homogeneous Poisson point process, which is a generalization...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    Downlink Coverage Analysis in a Heterogeneous Cellular Network

    In this paper, the authors consider the downlink Signal-to-Interference-plus-Noise Ratio (SINR) analysis in a heterogeneous cellular network with K tiers. Each tier is characterized by a Base-Station (BS) arrangement according to a homogeneous Poisson point process with certain BS density, transmission power, random shadow fading factors with arbitrary distribution, arbitrary...

    Provided By University of Colombo School of Computing

  • White Papers // Nov 2012

    On Gaussian Multiple Access Channel With Signal Dependent Noise

    The motivation of this work is to examine how well methods, such as successive interference cancellation and interference alignment from information theoretic solution, work in real-world where the received signal is quantized for digital processing. As a first step, the authors consider Gaussian Multiple Access Channels with the quantization noise...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2013

    Signal Design for Bandwidth Efficient Multiple Access with Guaranteed Bit Error Rate

    The problem of signal design for bandwidth efficient multiple access is addressed under Quality of Service (QoS) constraints specified by (possibly different) BER. Indeed, BER more accurately measures the performance than the Signal-to-Interference Ratio (SIR) for uncoded communication. Furthermore, the authors argue that the Asymptotic Effective Energy (AEE) faithfully characterizes...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2009

    Reproducing Cloud Microphysical and Irradiance Measurements Using Three 3D Cloud Generators

    Using three cloud generators, Three-Dimensional (3D) cloud fields are reproduced from microphysical cloud data measured in situ by aircraft. The generated cloud fields are used as input to a 3D radiative transfer model to calculate the corresponding fields of downward and upward irradiance, which are then compared with airborne and...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2013

    Performance Analysis of Structured LDPC Over the Polya-Urn Channel with Finite Memory

    In this paper, the authors investigate the performance of structured LDPC codes over a simple channel with memory. The channel under consideration is based on Polka's urn model and can be used as a representative of several classes of practical channels with burst errors. Random codes have large storage requirements,...

    Provided By University of Colombo School of Computing

  • White Papers // May 2013

    Toward Secure and Convenient Browsing Data Management in the Cloud

    Cloud and web-centric computing is a significant trend in computing. However, the design and development of modern web browsers failed to catch up this significant trend to address many challenging Browsing Data Insecurity and Inconvenience (referred to as BDII) problems that bother millions of web users. In this paper, the...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2006

    Improved Stride Prefetching using Extrinsic Stream Characteristics

    Stride-based prefetching mechanisms exploit regular streams of memory accesses to hide memory latency. While these mechanisms are effective, they can be improved by studying the properties of regular streams. As evidence of this, the establishment of metrics to quantify intrinsic characteristics of regular streams has been shown to enable software-based...

    Provided By University of Colombo School of Computing

  • White Papers // Jun 2009

    CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet Applications

    Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. The Session-Based Admission Control approach (SBAC) designed for a single Web server is not effective for a multi-tier architecture. This is due to the fact that the bottleneck in a multi-tier website...

    Provided By University of Colombo School of Computing

  • White Papers // May 2011

    A Validation Method for Fuzzy Clustering of Gene Expression Data

    Clustering is a key process in data mining for revealing structure and patterns in data. Fuzzy C-Means (FCM) is a popular algorithm using a partitioning approach for clustering. One advantage of FCM is that it converges rapidly. In addition, using fuzzy sets to represent the degrees of cluster membership of...

    Provided By University of Colombo School of Computing

  • White Papers // Jun 2007

    Using Context in Security Design of a Search and Rescue System

    With the emergence of small devices equipped with wireless communication, several sophisticated systems for search and rescue have been proposed and developed. However, a key obstacle in a wide deployment of these systems has been users' security and privacy. On one hand, such systems need to collect as much information...

    Provided By University of Colombo School of Computing

  • White Papers // Dec 2012

    Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions

    Distributed denial of service attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources. Due to the continuous evolution of new attacks and ever-increasing number of vulnerable hosts on the Internet, many DDoS attack detection or prevention...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2011

    A Survey of Outlier Detection Methods in Network Anomaly Identification

    The detection of outliers has gained considerable interest in data mining with the realization that outliers can be the key discovery to be made from very large databases. Outliers arise due to various reasons such as mechanical faults, changes in system behavior, fraudulent behavior, human error and instrument error. Indeed,...

    Provided By University of Colombo School of Computing

  • White Papers // Jul 2010

    q-Anon: Rethinking Anonymity for Social Networks

    This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, q-Anon, is...

    Provided By University of Colombo School of Computing

  • White Papers // Feb 2010

    Social-K: Real-Time K-Anonymity Guarantees for Social Network Applications

    Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of personal data are now done through social networks and their APIs, which do not fit the previous research-centric data set release model, nor do they allow for clear...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2007

    Deconstructing Hardware Usage for General Purpose Computation on GPUs

    The high-programmability and numerous compute resources on Graphics Processing Units (GPUs) have allowed researchers to dramatically accelerate many non-graphics applications. This initial success has generated great interest in mapping applications to GPUs. Accordingly, several works have focused on helping application developers rewrite their application kernels for the explicitly parallel but...

    Provided By University of Colombo School of Computing

  • White Papers // Jan 2007

    Finding Parallelism for Future EPIC Machines

    Parallelism has been the primary architectural mechanism to increase computer system performance. To continue pushing the performance envelope, identifying new sources of parallelism for future architectures is critical. Current hardware exploits local Instruction Level Parallelism (ILP) as hardware resources and information communicated by the Instruction-Set Architecture (ISA) permit. From this...

    Provided By University of Colombo School of Computing