University of Hohenheim

Displaying 1-40 of 40 results

  • White Papers // Jan 2014

    Path ORAM: An Extremely Simple Oblivious RAM Protocol

    It is well-known that data encryption alone is often not enough to protect users' privacy in outsourced storage applications. The sequence of storage locations accessed by the client (i.e., access pattern) can leak a significant amount of sensitive information about the unencrypted data through statistical inference. For example, Islam et....

    Provided By University of Hohenheim

  • White Papers // Nov 2013

    Ambiguous One-Move Nominative Signature without Random Oracles

    Nominative signature is a useful tool in situations where a signature has to be created jointly by two parties, a nominator (signer) and a nominee (user), while only the user can verify and prove to a third party about the validity of the signature. In this paper, the authors study...

    Provided By University of Hohenheim

  • White Papers // Aug 2013

    Protection of Web Application Against SQL Injection Attack

    8To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, the authors need to repair the lost data with the help of the other surviving clouds to preserve data...

    Provided By University of Hohenheim

  • White Papers // Apr 2013

    Virtual Machine Trading in a Federation of Clouds: Individual Profit and Social Welfare Maximization

    By sharing resources among different cloud providers, the paradigm of federated clouds exploits temporal availability of resources and geographical diversity of operational costs for efficient job service. While interoperability issues across different cloud platforms in a cloud federation have been extensively studied, fundamental questions on cloud economics remain: When and...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    VSkyConf: Cloud-Assisted Multi-Party Mobile Video Conferencing

    As an important application in today's busy world, mobile video conferencing facilitates people's virtual face-to-face communication with friends, families and colleagues, via their mobile devices on the move. However, how to provision high-quality, multi-party video conferencing experiences over mobile devices is still an open challenge. The authors' survey on 7...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    Evaluation of Next Generation Sequencing Software in Mapping and Assembly

    Next-generation high-throughput DNA sequencing technologies have advanced progressively in sequence-based genomic research and novel biological applications with the promise of sequencing DNA at unprecedented speed. These new non-sanger-based technologies feature several advantages when compared with traditional sequencing methods in terms of higher sequencing speed, lower per run cost and higher...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    Routing for Security in Networks with Adversarial Nodes

    The authors consider the problem of secure unicast transmission between two nodes in a directed graph, where an adversary eavesdrops/jams a subset of nodes. This adversarial setting is in contrast to traditional ones where the adversary controls a subset of links. In particular, they study, in the main, the class...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice

    Cloud computing is a new computing paradigm that allows users with different computing demands to access a shared pool of configurable computing resources (e.g., servers, network, storage, database, applications and services). Many commercial cloud providers have emerged in the past 6-7 years, and each typically provides its own cloud infrastructure,...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    Efficient Processing of Requests with Network Coding in On-Demand Data Broadcast Environments

    On-demand broadcast is an effective wireless data dissemination technique to enhance system scalability and the ability to handle dynamic user access patterns. In traditional on-demand broadcast, only one data item can be retrieved by mobile clients during the course of each broadcast, which limits bandwidth utilization and throughput. In this...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    Socially-Optimal Multi-Hop Secondary Communication Under Arbitrary Primary User Mechanisms

    In a cognitive radio system, licensed primary users can lease idle spectrum to secondary users for monetary remuneration. Secondary users acquire available spectrum for their data delivery needs, with the goal of achieving high throughput and low spectrum charges. Maximizing such a net utility (throughput utility minus spectrum cost) is...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    JESSICA2: A Distributed Java Virtual Machine With Transparent Thread Migration Support

    A distributed Java Virtual Machine (DJVM) spanning multiple cluster nodes can provide a true parallel execution environment for multi-threaded Java applications. Most existing DJVMs suffer from the slow Java execution in interpretive mode and thus may not be efficient enough for solving computation-intensive problems. The authors present JESSICA2, a new...

    Provided By University of Hohenheim

  • White Papers // Dec 2012

    Dynamic Profit Maximization of Cognitive Mobile Virtual Network Operator

    The authors study the profit maximization problem of a cognitive virtual network operator in a dynamic network environment. They consider a downlink OFDM communication system with various network dynamics, including dynamic user demands, uncertain sensing spectrum resources, dynamic spectrum prices, and time-varying channel conditions. In addition, heterogeneous users and imperfect...

    Provided By University of Hohenheim

  • White Papers // Dec 2012

    Optimal PMU Placement for Wide-Area Monitoring Using Chemical Reaction Optimization

    The problem of optimal placement of Phasor Measurement Units (PMUs) was first studied using graph theoretic and mathematical programming methods. However, due to the increase of renewable generations, PMUs may be required not only in transmission networks, but also in sub-transmission, or even distribution networks. Hence, the size of this...

    Provided By University of Hohenheim

  • White Papers // Nov 2012

    FTMS: An Efficient Multicast Scheduling Algorithm for Feedback-Based Two-Stage Switch

    Two major challenges in designing high-speed multicast switches are the expensive multicast switch fabric and the highly complicated central scheduler. While the recent load-balanced switch architecture uses simple unicast switch fabric and does not require a central scheduler, it is only good at handling unicast traffic. In this paper, the...

    Provided By University of Hohenheim

  • White Papers // Sep 2012

    Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation

    Minimizing latency and energy consumption is the prime objective of the design of data aggregation in battery-powered wireless networks. A tradeoff exists between the aggregation latency and the energy consumption, which has been widely studied under the protocol interference model. There has been however no investigation of the tradeoff under...

    Provided By University of Hohenheim

  • White Papers // Jul 2012

    Optimal Lower Bound for Differentially Private Multi-Party Aggregation

    Dwork et al. [DMNS06] proposed (information theoretical) differential privacy, which has become a de-facto standard privacy notion in private data analysis. In this paper, the authors investigate the setting of distributed private data analysis [BNO08], in which n parties each holds some private input, and they wish to jointly compute...

    Provided By University of Hohenheim

  • White Papers // Jun 2012

    Privacy Preservation by Disassociation

    In this paper, the authors focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multi-dimensional anonymization techniques; protect the privacy of users either by altering the set of quasi-identifiers of the original data (e.g., by generalization or suppression) or by adding noise (e.g., using differential...

    Provided By University of Hohenheim

  • White Papers // May 2012

    Enhancing TCP Performance in IP Fast Reroute

    IP Fast ReRoute (IPFRR) mechanisms are efficient in providing protection against link or router failure by invoking locally determined backup paths. But in the presence of a transient network failure, the path oscillates between backup and original paths, causing frequent packet out-of-order arrivals at a TCP receiver. DUPlicate ACKnowledgments (DUP-ACKs)...

    Provided By University of Hohenheim

  • White Papers // May 2012

    Epidemic Forwarding in Mobile Social Networks

    Recent years have witnessed the prosperity of mobile social networks, where various information is shared among mobile users through their opportunistic contacts. To investigate efficiency of information dissemination in wireless networks, epidemic models have been employed to study message forwarding delays, presuming message delivery whenever an opportunistic contact occurs. A...

    Provided By University of Hohenheim

  • White Papers // May 2012

    Energy Efficiency Optimization in Uplink Virtual MIMO Systems

    Energy-efficient transmission is increasing in importance for wireless system design because of limited battery power in mobile devices. In this paper, the authors consider energy efficiency optimization in uplink virtual MIMO systems. First, accurate closed-form expressions are derived for the achievable energy efficiency for both Multi-User (MU) transmission mode and...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Dynamic Scaling of VoD Services into Hybrid Clouds with Cost Minimization and QoS Guarantee

    A large-scale Video-on-Demand (VoD) service demands huge server costs, to provision thousands of videos to millions of users with high streaming quality. As compared to the traditional practice of relying on large on-premise server clusters, the emerging platforms of geo-distributed public clouds promise a more economic solution: their on-demand resource...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Request-Peer Selection for Load-Balancing in P2P Live Streaming Systems

    Unlike Peer-To-Peer (P2P) file sharing, P2P live streaming systems have to meet real-time playback constraints, which makes it very challenging yet crucial to maximize the peer uplink bandwidth utilization so as to deliver content pieces in time. In general, this is achieved by adopting tailor-made piece selection and request-peer selection...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    LAACAD: Load BAlancing K-Area Coverage Through Autonomous Deployment in Wireless Sensor Networks

    Although the problem of k-area coverage has been intensively investigated for dense Wireless Sensor Networks (WSNs), how to arrive at a k-coverage sensor deployment that optimizes certain objectives in relatively sparse WSNs still faces both theoretical and practical difficulties. In this paper, the authors present a practical algorithm LAACAD (Load...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Space Information Flow: Multiple Unicast

    The multiple unicast network coding conjecture states that for multiple unicast in an undirected network, network coding is equivalent to routing. Simple and intuitive as it is, the conjecture has remained open since its proposal in 2004,, and is now a well-known unsolved problem in the field of network coding....

    Provided By University of Hohenheim

  • White Papers // Feb 2012

    A Precise Execution Semantics for BPMN

    Bringing a high confidence to the validity of business processes is one of the prevailing themes in business process management. Regardless of the introduction of BPMN 1.2, there is no discernible improvement in the preciseness of the BPMN semantics. Motivated by the need to ensure the trustworthiness of BPMN models...

    Provided By University of Hohenheim

  • White Papers // Nov 2011

    Latency-Minimizing Data Aggregation in Wireless Sensor Networks under Physical Interference Model

    Minimizing latency is of primary importance for data aggregation which is an essential application in wireless sensor networks. Many fast data aggregation algorithms under the protocol interference model have been proposed, but the model falls short of being an accurate abstraction of wireless interferences in reality. In contrast, the physical...

    Provided By University of Hohenheim

  • White Papers // Nov 2011

    Utility-Maximizing Data Dissemination in Socially Selfish Cognitive Radio Networks

    In cognitive radio networks, the occupation patterns of the primary users can be very dynamic, which makes optimization (e.g., utility maximization) of data dissemination among secondary users difficult. Even under the assumption that all secondary users are fully collaborative, the optimization requires cross-layer decision making which is challenging. The challenge...

    Provided By University of Hohenheim

  • White Papers // Oct 2011

    Characterizing Locality-Aware P2P Streaming

    Peer-To-Peer (P2P) live streaming systems have been increasingly popular and successful in today's Internet, which provide large collections of video channels to millions of users at low server costs. The large volumes of P2P streaming traffic are exceeding those incurred by BitTorrent-like file sharing applications, threatening huge traffic relay cost...

    Provided By University of Hohenheim

  • White Papers // Feb 2011

    SMS: Collaborative Streaming in Mobile Social Networks

    Mobile social applications have emerged in recent years. They explore social connections among mobile users in a variety of novel scenarios, including friend finding, message routing and content sharing. However, efficiently supporting resource-demanding delay-sensitive streaming applications on the mobile platform remains a significant challenge. In this paper, the authors study...

    Provided By University of Hohenheim

  • White Papers // Jul 2010

    A Spatial Publish Subscribe Overlay for Massively Multiuser Virtual Environments

    Peer-To-Peer (P2P) architectures have become popular for designing scalable Virtual Environments (VEs) in recent years. However, one question that remains is whether a single overlay can be flexible enough to support different types of VEs. The authors present S-VON, a P2P overlay that attempts this goal by providing Spatial Publish/Subscribe...

    Provided By University of Hohenheim

  • White Papers // Jun 2010

    Information Asymmetry In Buyer-Seller Negotiations And Its Impact On Effectiveness, Efficiency And Satisfaction

    Owing to the increasing need to maximize scarce resources, it is crucial for organizations to perform their negotiations effectively and efficiently. Despite the importance of effectiveness and efficiency of negotiations, it is surprising that negotiation performance has to date been analyzed - both in the literature and in practice -...

    Provided By University of Hohenheim

  • White Papers // Feb 2010

    Dynamic Programming Based Algorithms for Set Multicover and Multiset Multicover Problems

    Given a universe N containing n elements and a collection of multisets or sets over N, the Multi-Set Multi-Cover (MSMC) problem or the Set Multi-Cover (SMC) problem is to cover all elements at least a number of times as specified in their coverage requirements with the minimum number of Multi-Sets...

    Provided By University of Hohenheim

  • White Papers // Feb 2010

    The Performance and Locality Tradeoff in BitTorrent-Like P2P File-Sharing Systems

    The recent surge of large-scale Peer-To-Peer (P2P) applications has brought huge amounts of P2P traffic, which significantly changes the Internet traffic pattern and increases the traffic-relay cost at the Internet Service Providers (ISPs). To alleviate the stress on networks, localized peer selection has been proposed that advocates neighbor selection within...

    Provided By University of Hohenheim

  • White Papers // Jan 2010

    Joint Link Scheduling and Topology Control for Wireless Sensor Networks with SINR Constraints

    In this paper, the authors studies the joint link scheduling and topology control problems in Wireless Sensor Networks. Given arbitrarily located sensor nodes on a plane, the task is to schedule all the wireless links (each representing a wireless transmission) between adjacent sensors using a minimum number of timeslots. There...

    Provided By University of Hohenheim

  • White Papers // Nov 2009

    Globalization, Offshoring And Economic Insecurity In Industrialized Countries

    This paper shows that a "New wave of globalization," involving extensive off shoring, has raised both actual and perceived labor market insecurity in industrialized countries. The paper analyzes various channels through which this new wave of globalization leads to economic insecurity. It emphasises the key role of overall macroeconomic conditions...

    Provided By University of Hohenheim

  • White Papers // Aug 2009

    Total Quality Management In The Food Industry - Current Situation And Potential In Germany

    The requirements in terms of information availability, risk precaution and control in the food industry continue to increase. In this context the interest of companies in the Total Quality Management (TQM) approach is also increasing. This development attracts notice to Business Excellence and connected systems. Similarly, various quality management tools...

    Provided By University of Hohenheim

  • White Papers // Jun 2009

    Deflationary Vs. Inflationary Expectations - A New-Keynesian Perspective With Heterogeneous Agents And Monetary Believes

    The authors expand a standard New-Keynesian model by allowing for a special role of money in the inflation and expectations building process. Motivated by the two-pillar Phillips curve, they introduce heterogeneous expectations. Thereby a fraction of agents forms inflation expectations by observing trend money growth. They show that in the...

    Provided By University of Hohenheim

  • White Papers // Apr 2009

    Trade Intermediation And The Organization Of Exporters

    The business literature shows that exporting firms typically require the help of foreign trade intermediaries or need to set up own foreign wholesale affiliates. In contrast, conventional trade theory models assume that producers can directly access foreign consumers. This paper models the endogenous emergence of intermediaries in an international trade...

    Provided By University of Hohenheim

  • White Papers // Jan 2009

    WTO Membership And The Extensive Margin Of World Trade: New Evidence

    Recent paper has argued that, contrary to the results of a seminal paper by Rose (2004), WTO membership does promote bilateral trade, at least for developed economies and if membership includes non-formal compliance. The authors review the paper in order to identify open issues. They then develop the simplest possible...

    Provided By University of Hohenheim

  • White Papers // Nov 2008

    Globalization And Technical Progress: Channels Of Reciprocal Interaction A Literature Review

    In the center of this paper there are two questions: 'Is it true that globalization is to a crucial degree dependant on technical innovation?' and 'Can globalization be regarded as a determinant of economic growth and technical progress?' To answer these questions the paper provides a literature review of the...

    Provided By University of Hohenheim

  • White Papers // Aug 2009

    Total Quality Management In The Food Industry - Current Situation And Potential In Germany

    The requirements in terms of information availability, risk precaution and control in the food industry continue to increase. In this context the interest of companies in the Total Quality Management (TQM) approach is also increasing. This development attracts notice to Business Excellence and connected systems. Similarly, various quality management tools...

    Provided By University of Hohenheim

  • White Papers // Jan 2009

    WTO Membership And The Extensive Margin Of World Trade: New Evidence

    Recent paper has argued that, contrary to the results of a seminal paper by Rose (2004), WTO membership does promote bilateral trade, at least for developed economies and if membership includes non-formal compliance. The authors review the paper in order to identify open issues. They then develop the simplest possible...

    Provided By University of Hohenheim

  • White Papers // Apr 2009

    Trade Intermediation And The Organization Of Exporters

    The business literature shows that exporting firms typically require the help of foreign trade intermediaries or need to set up own foreign wholesale affiliates. In contrast, conventional trade theory models assume that producers can directly access foreign consumers. This paper models the endogenous emergence of intermediaries in an international trade...

    Provided By University of Hohenheim

  • White Papers // Jun 2009

    Deflationary Vs. Inflationary Expectations - A New-Keynesian Perspective With Heterogeneous Agents And Monetary Believes

    The authors expand a standard New-Keynesian model by allowing for a special role of money in the inflation and expectations building process. Motivated by the two-pillar Phillips curve, they introduce heterogeneous expectations. Thereby a fraction of agents forms inflation expectations by observing trend money growth. They show that in the...

    Provided By University of Hohenheim

  • White Papers // Jun 2010

    Information Asymmetry In Buyer-Seller Negotiations And Its Impact On Effectiveness, Efficiency And Satisfaction

    Owing to the increasing need to maximize scarce resources, it is crucial for organizations to perform their negotiations effectively and efficiently. Despite the importance of effectiveness and efficiency of negotiations, it is surprising that negotiation performance has to date been analyzed - both in the literature and in practice -...

    Provided By University of Hohenheim

  • White Papers // Nov 2008

    Globalization And Technical Progress: Channels Of Reciprocal Interaction A Literature Review

    In the center of this paper there are two questions: 'Is it true that globalization is to a crucial degree dependant on technical innovation?' and 'Can globalization be regarded as a determinant of economic growth and technical progress?' To answer these questions the paper provides a literature review of the...

    Provided By University of Hohenheim

  • White Papers // Nov 2009

    Globalization, Offshoring And Economic Insecurity In Industrialized Countries

    This paper shows that a "New wave of globalization," involving extensive off shoring, has raised both actual and perceived labor market insecurity in industrialized countries. The paper analyzes various channels through which this new wave of globalization leads to economic insecurity. It emphasises the key role of overall macroeconomic conditions...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Space Information Flow: Multiple Unicast

    The multiple unicast network coding conjecture states that for multiple unicast in an undirected network, network coding is equivalent to routing. Simple and intuitive as it is, the conjecture has remained open since its proposal in 2004,, and is now a well-known unsolved problem in the field of network coding....

    Provided By University of Hohenheim

  • White Papers // May 2012

    Enhancing TCP Performance in IP Fast Reroute

    IP Fast ReRoute (IPFRR) mechanisms are efficient in providing protection against link or router failure by invoking locally determined backup paths. But in the presence of a transient network failure, the path oscillates between backup and original paths, causing frequent packet out-of-order arrivals at a TCP receiver. DUPlicate ACKnowledgments (DUP-ACKs)...

    Provided By University of Hohenheim

  • White Papers // May 2012

    Epidemic Forwarding in Mobile Social Networks

    Recent years have witnessed the prosperity of mobile social networks, where various information is shared among mobile users through their opportunistic contacts. To investigate efficiency of information dissemination in wireless networks, epidemic models have been employed to study message forwarding delays, presuming message delivery whenever an opportunistic contact occurs. A...

    Provided By University of Hohenheim

  • White Papers // May 2012

    Energy Efficiency Optimization in Uplink Virtual MIMO Systems

    Energy-efficient transmission is increasing in importance for wireless system design because of limited battery power in mobile devices. In this paper, the authors consider energy efficiency optimization in uplink virtual MIMO systems. First, accurate closed-form expressions are derived for the achievable energy efficiency for both Multi-User (MU) transmission mode and...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Request-Peer Selection for Load-Balancing in P2P Live Streaming Systems

    Unlike Peer-To-Peer (P2P) file sharing, P2P live streaming systems have to meet real-time playback constraints, which makes it very challenging yet crucial to maximize the peer uplink bandwidth utilization so as to deliver content pieces in time. In general, this is achieved by adopting tailor-made piece selection and request-peer selection...

    Provided By University of Hohenheim

  • White Papers // Dec 2012

    Dynamic Profit Maximization of Cognitive Mobile Virtual Network Operator

    The authors study the profit maximization problem of a cognitive virtual network operator in a dynamic network environment. They consider a downlink OFDM communication system with various network dynamics, including dynamic user demands, uncertain sensing spectrum resources, dynamic spectrum prices, and time-varying channel conditions. In addition, heterogeneous users and imperfect...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    Routing for Security in Networks with Adversarial Nodes

    The authors consider the problem of secure unicast transmission between two nodes in a directed graph, where an adversary eavesdrops/jams a subset of nodes. This adversarial setting is in contrast to traditional ones where the adversary controls a subset of links. In particular, they study, in the main, the class...

    Provided By University of Hohenheim

  • White Papers // Jun 2012

    Privacy Preservation by Disassociation

    In this paper, the authors focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multi-dimensional anonymization techniques; protect the privacy of users either by altering the set of quasi-identifiers of the original data (e.g., by generalization or suppression) or by adding noise (e.g., using differential...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    Efficient Processing of Requests with Network Coding in On-Demand Data Broadcast Environments

    On-demand broadcast is an effective wireless data dissemination technique to enhance system scalability and the ability to handle dynamic user access patterns. In traditional on-demand broadcast, only one data item can be retrieved by mobile clients during the course of each broadcast, which limits bandwidth utilization and throughput. In this...

    Provided By University of Hohenheim

  • White Papers // Apr 2013

    Virtual Machine Trading in a Federation of Clouds: Individual Profit and Social Welfare Maximization

    By sharing resources among different cloud providers, the paradigm of federated clouds exploits temporal availability of resources and geographical diversity of operational costs for efficient job service. While interoperability issues across different cloud platforms in a cloud federation have been extensively studied, fundamental questions on cloud economics remain: When and...

    Provided By University of Hohenheim

  • White Papers // Jan 2010

    Joint Link Scheduling and Topology Control for Wireless Sensor Networks with SINR Constraints

    In this paper, the authors studies the joint link scheduling and topology control problems in Wireless Sensor Networks. Given arbitrarily located sensor nodes on a plane, the task is to schedule all the wireless links (each representing a wireless transmission) between adjacent sensors using a minimum number of timeslots. There...

    Provided By University of Hohenheim

  • White Papers // Feb 2012

    A Precise Execution Semantics for BPMN

    Bringing a high confidence to the validity of business processes is one of the prevailing themes in business process management. Regardless of the introduction of BPMN 1.2, there is no discernible improvement in the preciseness of the BPMN semantics. Motivated by the need to ensure the trustworthiness of BPMN models...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    A Survey on Cloud Interoperability: Taxonomies, Standards, and Practice

    Cloud computing is a new computing paradigm that allows users with different computing demands to access a shared pool of configurable computing resources (e.g., servers, network, storage, database, applications and services). Many commercial cloud providers have emerged in the past 6-7 years, and each typically provides its own cloud infrastructure,...

    Provided By University of Hohenheim

  • White Papers // Aug 2013

    Protection of Web Application Against SQL Injection Attack

    8To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, the authors need to repair the lost data with the help of the other surviving clouds to preserve data...

    Provided By University of Hohenheim

  • White Papers // Nov 2013

    Ambiguous One-Move Nominative Signature without Random Oracles

    Nominative signature is a useful tool in situations where a signature has to be created jointly by two parties, a nominator (signer) and a nominee (user), while only the user can verify and prove to a third party about the validity of the signature. In this paper, the authors study...

    Provided By University of Hohenheim

  • White Papers // Jan 2014

    Path ORAM: An Extremely Simple Oblivious RAM Protocol

    It is well-known that data encryption alone is often not enough to protect users' privacy in outsourced storage applications. The sequence of storage locations accessed by the client (i.e., access pattern) can leak a significant amount of sensitive information about the unencrypted data through statistical inference. For example, Islam et....

    Provided By University of Hohenheim

  • White Papers // Sep 2012

    Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation

    Minimizing latency and energy consumption is the prime objective of the design of data aggregation in battery-powered wireless networks. A tradeoff exists between the aggregation latency and the energy consumption, which has been widely studied under the protocol interference model. There has been however no investigation of the tradeoff under...

    Provided By University of Hohenheim

  • White Papers // Nov 2011

    Latency-Minimizing Data Aggregation in Wireless Sensor Networks under Physical Interference Model

    Minimizing latency is of primary importance for data aggregation which is an essential application in wireless sensor networks. Many fast data aggregation algorithms under the protocol interference model have been proposed, but the model falls short of being an accurate abstraction of wireless interferences in reality. In contrast, the physical...

    Provided By University of Hohenheim

  • White Papers // Oct 2011

    Characterizing Locality-Aware P2P Streaming

    Peer-To-Peer (P2P) live streaming systems have been increasingly popular and successful in today's Internet, which provide large collections of video channels to millions of users at low server costs. The large volumes of P2P streaming traffic are exceeding those incurred by BitTorrent-like file sharing applications, threatening huge traffic relay cost...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    Dynamic Scaling of VoD Services into Hybrid Clouds with Cost Minimization and QoS Guarantee

    A large-scale Video-on-Demand (VoD) service demands huge server costs, to provision thousands of videos to millions of users with high streaming quality. As compared to the traditional practice of relying on large on-premise server clusters, the emerging platforms of geo-distributed public clouds promise a more economic solution: their on-demand resource...

    Provided By University of Hohenheim

  • White Papers // Nov 2011

    Utility-Maximizing Data Dissemination in Socially Selfish Cognitive Radio Networks

    In cognitive radio networks, the occupation patterns of the primary users can be very dynamic, which makes optimization (e.g., utility maximization) of data dissemination among secondary users difficult. Even under the assumption that all secondary users are fully collaborative, the optimization requires cross-layer decision making which is challenging. The challenge...

    Provided By University of Hohenheim

  • White Papers // Feb 2011

    SMS: Collaborative Streaming in Mobile Social Networks

    Mobile social applications have emerged in recent years. They explore social connections among mobile users in a variety of novel scenarios, including friend finding, message routing and content sharing. However, efficiently supporting resource-demanding delay-sensitive streaming applications on the mobile platform remains a significant challenge. In this paper, the authors study...

    Provided By University of Hohenheim

  • White Papers // Jul 2010

    A Spatial Publish Subscribe Overlay for Massively Multiuser Virtual Environments

    Peer-To-Peer (P2P) architectures have become popular for designing scalable Virtual Environments (VEs) in recent years. However, one question that remains is whether a single overlay can be flexible enough to support different types of VEs. The authors present S-VON, a P2P overlay that attempts this goal by providing Spatial Publish/Subscribe...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    Evaluation of Next Generation Sequencing Software in Mapping and Assembly

    Next-generation high-throughput DNA sequencing technologies have advanced progressively in sequence-based genomic research and novel biological applications with the promise of sequencing DNA at unprecedented speed. These new non-sanger-based technologies feature several advantages when compared with traditional sequencing methods in terms of higher sequencing speed, lower per run cost and higher...

    Provided By University of Hohenheim

  • White Papers // Feb 2010

    Dynamic Programming Based Algorithms for Set Multicover and Multiset Multicover Problems

    Given a universe N containing n elements and a collection of multisets or sets over N, the Multi-Set Multi-Cover (MSMC) problem or the Set Multi-Cover (SMC) problem is to cover all elements at least a number of times as specified in their coverage requirements with the minimum number of Multi-Sets...

    Provided By University of Hohenheim

  • White Papers // Mar 2013

    VSkyConf: Cloud-Assisted Multi-Party Mobile Video Conferencing

    As an important application in today's busy world, mobile video conferencing facilitates people's virtual face-to-face communication with friends, families and colleagues, via their mobile devices on the move. However, how to provision high-quality, multi-party video conferencing experiences over mobile devices is still an open challenge. The authors' survey on 7...

    Provided By University of Hohenheim

  • White Papers // Dec 2012

    Optimal PMU Placement for Wide-Area Monitoring Using Chemical Reaction Optimization

    The problem of optimal placement of Phasor Measurement Units (PMUs) was first studied using graph theoretic and mathematical programming methods. However, due to the increase of renewable generations, PMUs may be required not only in transmission networks, but also in sub-transmission, or even distribution networks. Hence, the size of this...

    Provided By University of Hohenheim

  • White Papers // Jul 2012

    Optimal Lower Bound for Differentially Private Multi-Party Aggregation

    Dwork et al. [DMNS06] proposed (information theoretical) differential privacy, which has become a de-facto standard privacy notion in private data analysis. In this paper, the authors investigate the setting of distributed private data analysis [BNO08], in which n parties each holds some private input, and they wish to jointly compute...

    Provided By University of Hohenheim

  • White Papers // Mar 2012

    LAACAD: Load BAlancing K-Area Coverage Through Autonomous Deployment in Wireless Sensor Networks

    Although the problem of k-area coverage has been intensively investigated for dense Wireless Sensor Networks (WSNs), how to arrive at a k-coverage sensor deployment that optimizes certain objectives in relatively sparse WSNs still faces both theoretical and practical difficulties. In this paper, the authors present a practical algorithm LAACAD (Load...

    Provided By University of Hohenheim

  • White Papers // Feb 2010

    The Performance and Locality Tradeoff in BitTorrent-Like P2P File-Sharing Systems

    The recent surge of large-scale Peer-To-Peer (P2P) applications has brought huge amounts of P2P traffic, which significantly changes the Internet traffic pattern and increases the traffic-relay cost at the Internet Service Providers (ISPs). To alleviate the stress on networks, localized peer selection has been proposed that advocates neighbor selection within...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    Socially-Optimal Multi-Hop Secondary Communication Under Arbitrary Primary User Mechanisms

    In a cognitive radio system, licensed primary users can lease idle spectrum to secondary users for monetary remuneration. Secondary users acquire available spectrum for their data delivery needs, with the goal of achieving high throughput and low spectrum charges. Maximizing such a net utility (throughput utility minus spectrum cost) is...

    Provided By University of Hohenheim

  • White Papers // Jan 2013

    JESSICA2: A Distributed Java Virtual Machine With Transparent Thread Migration Support

    A distributed Java Virtual Machine (DJVM) spanning multiple cluster nodes can provide a true parallel execution environment for multi-threaded Java applications. Most existing DJVMs suffer from the slow Java execution in interpretive mode and thus may not be efficient enough for solving computation-intensive problems. The authors present JESSICA2, a new...

    Provided By University of Hohenheim

  • White Papers // Nov 2012

    FTMS: An Efficient Multicast Scheduling Algorithm for Feedback-Based Two-Stage Switch

    Two major challenges in designing high-speed multicast switches are the expensive multicast switch fabric and the highly complicated central scheduler. While the recent load-balanced switch architecture uses simple unicast switch fabric and does not require a central scheduler, it is only good at handling unicast traffic. In this paper, the...

    Provided By University of Hohenheim