University of Freiburg

Displaying 1-15 of 15 results

  • White Papers // Jul 2013

    Dynamic Query Prioritization for In-Memory Databases

    In-memory database management systems have the potential to reduce the execution time of complex operational analytical queries to the order of seconds while executing business transactions in parallel. The main reasons for this increase of performance are massive intra-query parallelism on many-core CPUs and primary data storage in main memory...

    Provided By University of Freiburg

  • White Papers // Jul 2012

    How to Store some Secrets

    This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the...

    Provided By University of Freiburg

  • White Papers // Jul 2011

    Access Permission Contracts for Scripting Languages

    The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to state and may not even be desired. In such cases, a partial specification, which describes selected aspects of the behavior, may be used...

    Provided By University of Freiburg

  • White Papers // Jun 2011

    Towards Modeling Real-World Aware Business Processes

    In this paper, the authors aim at bringing together the Web of Things (WoT) domain with the domain of enterprise business process modeling in order to work towards a Future Internet that includes all layers of networked technology stacks. They suggest introducing new notation concepts to the current business process...

    Provided By University of Freiburg

  • White Papers // Apr 2011

    Automated Certification for Compliant Cloud-Based Business Processes

    Cloud Computing workflows need to adhere to a variety of rules and offer high flexibility. This is at odds with the compliance certification currently being carried out in a manual fashion. The paper presents Concert, an approach for the automated analysis of workflows. If a workflow does not adhere to...

    Provided By University of Freiburg

  • White Papers // Jan 2011

    Liquidity Provision, Ambiguous Asset Returns And The Financial Crisis

    For an economy with dysfunctional intertemporal financial markets the financial sector is modelled as a competitve banking sector offering deposit contracts. In a setting similar to Allen and Gale (1998,) properties of the optimal liquidity provision are analyzed for illiquid assets with ambiguous returns. In the context of the model,...

    Provided By University of Freiburg

  • White Papers // Dec 2010

    Access Permission Contracts

    The ideal software contract is a full specification of the behavior of an operation. Often, in particular in the context of scripting languages, a full specification can be cumbersome to state and may not even be desired. In such cases, a partial specification, which describes select aspects of the behavior,...

    Provided By University of Freiburg

  • White Papers // Jun 2010

    YACZK: Yet Another Compiler for Zero-Knowledge

    Automatic generation of cryptographic protocols is an emerging field of research which aims to bring complex protocols into practice. In this paper the authors discuss the desired properties of a compiler for automatic generation of Zero-Knowledge Proof of Knowledge (ZKPoK) protocols. They evaluate and compare existing approaches with respect to...

    Provided By University of Freiburg

  • White Papers // Feb 2010

    Hierarchical Optimization on Manifolds for Online 2D and 3D Mapping

    In this paper, the authors present a new hierarchical optimization solution to the graph-based Simultaneous Localization And Mapping (SLAM) problem. During online mapping, the approach corrects only the coarse structure of the scene and not the overall map. In this way, only updates for the parts of the map that...

    Provided By University of Freiburg

  • White Papers // Dec 2009

    Recency Types for Analyzing Scripting Languages

    With the current surge of scripting technologies, large programs are being built with dynamically typed languages. As these programs grow in size, semantics-based tools gain importance for detecting programming errors as well as for program understanding. As a basis for such tools, the authors propose a descriptive type system for...

    Provided By University of Freiburg

  • White Papers // Dec 2009

    Wired Equivalent Privacy (WEP) Functionality, Weak Points, Attacks

    Wired Equivalent Privacy (WEP) is part of the IEEE 802.11 standard. It was introduced in the first revision of the document in 1999. WEP was supposed to provide confidentiality for messages passed between authorized users in IEEE 802.11 compatible networks. Today WEP is not state of the art anymore. There...

    Provided By University of Freiburg

  • White Papers // Sep 2009

    On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge

    Zero-Knowledge Proofs of Knowledge (ZK-PoK) play an important role in many cryptographic applications. Direct Anonymous Attestation (DAA) and the identity mixer anonymous authentication system are first real world applications using ZKPoK as building blocks. But although being used for many years now, design and implementation of sound ZK-PoK remains challenging....

    Provided By University of Freiburg

  • White Papers // Aug 2009

    Robust On-Line Model-Based Object Detection From Range Images

    A mobile robot that accomplishes high level tasks needs to be able to classify the objects in the environment and to determine their location. In this paper, the authors address the problem of online object detection in 3D laser range data. The object classes are represented by 3D point-clouds that...

    Provided By University of Freiburg

  • White Papers // Jun 2009

    Non-Linear Constraint Network Optimization for Efficient Map Learning

    Learning models of the environment is one of the fundamental tasks of mobile robots since maps are needed for a wide range of robotic applications, such as navigation and transportation tasks, service robotic applications, and several others. In the past, numerous efficient approaches to map learning have been proposed. Most...

    Provided By University of Freiburg

  • White Papers // Dec 2008

    A Comparative Evaluation of Interest Point Detectors and Local Descriptors for Visual SLAM

    In this paper the authors compare the behavior of different interest points detectors and descriptors under the conditions needed to be used as landmarks in vision-based Simultaneous Localization And Mapping (SLAM). The authors evaluate the repeatability of the detectors, as well as the invariance and distinctiveness of the descriptors, under...

    Provided By University of Freiburg

  • White Papers // Dec 2009

    Wired Equivalent Privacy (WEP) Functionality, Weak Points, Attacks

    Wired Equivalent Privacy (WEP) is part of the IEEE 802.11 standard. It was introduced in the first revision of the document in 1999. WEP was supposed to provide confidentiality for messages passed between authorized users in IEEE 802.11 compatible networks. Today WEP is not state of the art anymore. There...

    Provided By University of Freiburg

  • White Papers // Jan 2011

    Liquidity Provision, Ambiguous Asset Returns And The Financial Crisis

    For an economy with dysfunctional intertemporal financial markets the financial sector is modelled as a competitve banking sector offering deposit contracts. In a setting similar to Allen and Gale (1998,) properties of the optimal liquidity provision are analyzed for illiquid assets with ambiguous returns. In the context of the model,...

    Provided By University of Freiburg

  • White Papers // Dec 2008

    A Comparative Evaluation of Interest Point Detectors and Local Descriptors for Visual SLAM

    In this paper the authors compare the behavior of different interest points detectors and descriptors under the conditions needed to be used as landmarks in vision-based Simultaneous Localization And Mapping (SLAM). The authors evaluate the repeatability of the detectors, as well as the invariance and distinctiveness of the descriptors, under...

    Provided By University of Freiburg

  • White Papers // Apr 2011

    Automated Certification for Compliant Cloud-Based Business Processes

    Cloud Computing workflows need to adhere to a variety of rules and offer high flexibility. This is at odds with the compliance certification currently being carried out in a manual fashion. The paper presents Concert, an approach for the automated analysis of workflows. If a workflow does not adhere to...

    Provided By University of Freiburg

  • White Papers // Dec 2009

    Recency Types for Analyzing Scripting Languages

    With the current surge of scripting technologies, large programs are being built with dynamically typed languages. As these programs grow in size, semantics-based tools gain importance for detecting programming errors as well as for program understanding. As a basis for such tools, the authors propose a descriptive type system for...

    Provided By University of Freiburg

  • White Papers // Dec 2010

    Access Permission Contracts

    The ideal software contract is a full specification of the behavior of an operation. Often, in particular in the context of scripting languages, a full specification can be cumbersome to state and may not even be desired. In such cases, a partial specification, which describes select aspects of the behavior,...

    Provided By University of Freiburg

  • White Papers // Jul 2011

    Access Permission Contracts for Scripting Languages

    The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to state and may not even be desired. In such cases, a partial specification, which describes selected aspects of the behavior, may be used...

    Provided By University of Freiburg

  • White Papers // Feb 2010

    Hierarchical Optimization on Manifolds for Online 2D and 3D Mapping

    In this paper, the authors present a new hierarchical optimization solution to the graph-based Simultaneous Localization And Mapping (SLAM) problem. During online mapping, the approach corrects only the coarse structure of the scene and not the overall map. In this way, only updates for the parts of the map that...

    Provided By University of Freiburg

  • White Papers // Jun 2009

    Non-Linear Constraint Network Optimization for Efficient Map Learning

    Learning models of the environment is one of the fundamental tasks of mobile robots since maps are needed for a wide range of robotic applications, such as navigation and transportation tasks, service robotic applications, and several others. In the past, numerous efficient approaches to map learning have been proposed. Most...

    Provided By University of Freiburg

  • White Papers // Aug 2009

    Robust On-Line Model-Based Object Detection From Range Images

    A mobile robot that accomplishes high level tasks needs to be able to classify the objects in the environment and to determine their location. In this paper, the authors address the problem of online object detection in 3D laser range data. The object classes are represented by 3D point-clouds that...

    Provided By University of Freiburg

  • White Papers // Jul 2012

    How to Store some Secrets

    This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the...

    Provided By University of Freiburg

  • White Papers // Jul 2013

    Dynamic Query Prioritization for In-Memory Databases

    In-memory database management systems have the potential to reduce the execution time of complex operational analytical queries to the order of seconds while executing business transactions in parallel. The main reasons for this increase of performance are massive intra-query parallelism on many-core CPUs and primary data storage in main memory...

    Provided By University of Freiburg

  • White Papers // Sep 2009

    On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge

    Zero-Knowledge Proofs of Knowledge (ZK-PoK) play an important role in many cryptographic applications. Direct Anonymous Attestation (DAA) and the identity mixer anonymous authentication system are first real world applications using ZKPoK as building blocks. But although being used for many years now, design and implementation of sound ZK-PoK remains challenging....

    Provided By University of Freiburg

  • White Papers // Jun 2010

    YACZK: Yet Another Compiler for Zero-Knowledge

    Automatic generation of cryptographic protocols is an emerging field of research which aims to bring complex protocols into practice. In this paper the authors discuss the desired properties of a compiler for automatic generation of Zero-Knowledge Proof of Knowledge (ZKPoK) protocols. They evaluate and compare existing approaches with respect to...

    Provided By University of Freiburg

  • White Papers // Jun 2011

    Towards Modeling Real-World Aware Business Processes

    In this paper, the authors aim at bringing together the Web of Things (WoT) domain with the domain of enterprise business process modeling in order to work towards a Future Internet that includes all layers of networked technology stacks. They suggest introducing new notation concepts to the current business process...

    Provided By University of Freiburg