University of Paderborn

Displaying 1-40 of 44 results

  • White Papers // Jan 2014

    Using Mobile Agents for Secure Biometric Authentication

    In this paper, the authors deal with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a multi agent distributed infrastructure. When the user authentication procedure involves personal devices, the multi agent system model helps in the distribution of data and algorithms...

    Provided By University of Paderborn

  • White Papers // Sep 2013

    Preserving Smartphone Users' Anonymity in Cloudy Days

    The mobile cloud computing paradigm involves communications between Smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of Smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy...

    Provided By University of Paderborn

  • White Papers // May 2013

    Towards Energy-Aware Intrusion Detection Systems on Mobile Devices

    In this paper, the authors investigate the correlations between the energy consumption of Android devices and the presence of threats (e.g. battery-drain attacks). In particular, this paper proposes a model for the energy consumption of single hardware components of a mobile device during normal usage and under attack. The model...

    Provided By University of Paderborn

  • White Papers // Jun 2012

    Processor Allocation for Optimistic Parallelization of Irregular Programs

    Optimistic parallelization is a promising approach for the parallelization of irregular algorithms: potentially interfering tasks are launched dynamically, and the runtime system detects conflicts between concurrent activities, aborting and rolling back conflicting tasks. However, parallelism in irregular algorithms is very complex. In a regular algorithm like dense matrix multiplication, the...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Interference Alignment for Heterogeneous Two-Tiered Self-Organizing Networks

    In this paper, the authors consider a heterogeneous two-tiered network where a tier of cognitive self-organizing small cells is deployed over the coverage area of a preexisting Orthogonal Frequency Division Multiple Access (OFDMA) macro cell. Neither cross-nor co-tier cooperation or communication is established, thus no joint signal processing techniques can...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Interference Alignment for OFDM Two-Tiered Networks

    In this paper, the authors introduce an interference alignment scheme that allows the coexistence of an Orthogonal Frequency Division Multiplexing (OFDM) macro-cell and a cognitive small-cell, deployed in a two-tiered structure and transmitting over the same bandwidth. They derive the optimal linear strategy for the single antenna secondary base station,...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Orthogonal Precoder for Two-Tiered Networks Deployment

    In this paper, the authors consider a two-tiered network, where a tier of cognitive small base stations is deployed inside the coverage area of a preexisting macro-cell. The cross-tier interference caused by a complete bandwidth sharing is managed by introducing a new orthogonal pre-coder based mechanism, implemented by the small...

    Provided By University of Paderborn

  • White Papers // Apr 2012

    Secure Communication for Smart IoT Objects: Protocol Stacks, Use Cases and Practical Examples

    In this paper, the authors discuss security procedures for constrained IoT devices. They start with the description of a general security architecture along with its basic procedures, then discuss how its elements interact with the constrained communication stack and explore pros and cons of popular security approaches at various layers...

    Provided By University of Paderborn

  • White Papers // Mar 2012

    Dynamic Compression-Transmission for Energy-Harvesting Multihop Networks With Correlated Sources

    Energy-harvesting wireless sensor networking is an emerging technology with applications to various fields such as environmental and structural health monitoring. A distinguishing feature of wireless sensors is the need to perform both source coding tasks, such as measurement and compression, and transmission tasks. It is known that the overall energy...

    Provided By University of Paderborn

  • White Papers // Mar 2012

    Robust Opportunistic Broadcast Scheduling for Scalable Video Streaming

    In this paper, the authors design a robust opportunistic scheduler to be implemented at the base station in a cellular net-work for broadcast media streaming applications. The scheduling mechanism operates based on information on both the average and the instantaneous user distributions, and on radio link channel quality, obtained through...

    Provided By University of Paderborn

  • White Papers // Feb 2012

    Towards System Viewpoints to Specify Adaptation Models at Runtime

    Current research focuses on the specification, analysis, and realisation of systems with self-properties. Such systems are characterised by the fact that they react on changes in their environment by altering their own structure in order to maintain their non-functional properties. However, there is no standard engineering method to model such...

    Provided By University of Paderborn

  • White Papers // Jan 2012

    Improved Side Channel Attacks on Pairing Based Cryptography

    Techniques from Pairing Based Cryptography (PBC) are used in an increasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for applications on smart cards. With these applications the question of the vulnerability to Side Channel Attacks (SCAs) arises. Several known invasive and noninvasive attacks against...

    Provided By University of Paderborn

  • White Papers // Jan 2012

    Channel Estimation Impact for LTE Small Cells Based on MU-VFDM

    In a previous work, the authors introduced a spectrum sharing technique called Multi-User Vandermonde-subspace Frequency Division Multiplexing (MU-VFDM). This overlay technique allows the coexistence of a downlink Orthogonal Frequency Division Multiple Access (OFDMA) macro-cell and a cognitive multi-user small-cell system in time division duplex mode. In that work, MU-VFDM was...

    Provided By University of Paderborn

  • White Papers // Nov 2011

    A Game-Theoretical Approach to the Benefits of Cloud Computing

    In order to answer the question whether or not to utilize the cloud for processing, this paper aims at identifying characteristics of potential cloud beneficiaries and advisable actions to actually gain financial benefits. A game-theoretic model of an Infrastructure-as-a-Service (IaaS) cloud market, covering dynamics of pricing and usage, is suggested....

    Provided By University of Paderborn

  • White Papers // Aug 2011

    Cbhrp: A Cluster Based Routing Protocol for Wireless Sensor Network

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. The authors introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target...

    Provided By University of Paderborn

  • White Papers // Jul 2011

    Inter-Relay Traffic Through Network Coding in Cooperative Wireless Ad Hoc Networks

    Cooperative Network-Coded Hybrid ARQ (Coop-NC HARQ) has recently been proposed as a smart way to improve Decode & Forward (D&F) relaying. According to this idea, cooperators send HARQ redundancy on behalf of a source coded together with a data packet intended for the destination they are helping and taken from...

    Provided By University of Paderborn

  • White Papers // Mar 2011

    Competitive and Fair Medium Access Despite Reactive Jamming

    Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often simple and cheap to implement. Today's jammers can perform physical carrier sensing in order to disrupt communication more efficiently, especially in a network of simple wireless devices such...

    Provided By University of Paderborn

  • White Papers // Sep 2010

    Short-Run And Long-Run Dynamics Of Growth, Inequality And Poverty In The Developing World

    Growth, inequality, and poverty are central elements of the development process. However the mutual effects and directions of causality have been, and remain, one of the most controversial issues. After introducing a simple theoretical framework the authors derive some fundamental relations between growth, inequality and poverty. In the empirical part...

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Towards Adaptive Networking for Embedded Devices Based on Reconfigurable Hardware

    Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing centers or sensor and mobile networks. Stringent requirements with respect to performance, cost, and power consumption paired with an increasing demand for flexibility ask for...

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Using Shared Library Interposing for Transparent Application Acceleration in Systems With Heterogeneous Hardware Accelerators

    Today's computer systems increasingly comprise heterogeneous computing elements like multi-core processors, graphics processing units, and specialized co-processors, which allow parallel processing. Programming applications to utilize such systems is a complex process and needs good knowledge about the hardware architecture. Automatic and transparent use of these resources is a major concern...

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Communication Performance Characterization for Reconfigurable Accelerator Design on the XD1000

    Providing customized memory architectures is key for achieving high-performance with reconfigurable accelerators. Since reconfigurable computers provide limited possibilities for customizing the organization of external memory, a specific challenge is to make use of the existing memory layout in a flexible, yet efficient way. In this paper, the authors build on...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Performance Estimation for the Exploration of CPU-Accelerator Architectures

    In this paper, the authors present an approach for studying the design space when interfacing reconfigurable accelerators with a CPU. For this purpose they introduce a framework based on the LLVM infrastructure that performs hardware/software partitioning with runtime estimation utilizing profiling information and code analysis. They apply it to reconfigurable...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Fluctuating EMG Signals: Investigating Long-Term Effects of Pattern Matching Algorithms

    In this paper, the authors investigate the behavior of state-of-the-art pattern matching algorithms when applied to electromyographic data recorded during 21 days. To this end, they compare the five classification techniques k-nearest-neighbor, linear discriminant analysis, decision trees, artificial neural networks and support vector machines. They provide all classifiers with features...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Network Coding in Passive Optical Networks

    One of the most promising technologies for high-speed access to the Internet are Passive Optical Networks as they provide high data rates at low cost. The paper integrates network coding into the Ethernet Passive Optical Network architecture to increase downlink throughput by up to 50% without changing the hardware. In...

    Provided By University of Paderborn

  • White Papers // May 2010

    An Open Source Circuit Library With Benchmarking Facilities

    In this paper, the authors introduce the open-source PivPav backend tool for reconfigurable computing. Essentially, PivPav provides an interface to a library of digital circuits that are kept in a database. For each circuit, an extensive set of metadata is made available through an application programming interface. PivPav is agnostic...

    Provided By University of Paderborn

  • White Papers // May 2010

    A DBMS for Mobile Transactions Using Bi-State-Termination

    Whenever distributed transaction processing in MANETs or other unreliable networks has to guarantee atomicity and isolation, a major challenge is how long-term blocking of resources can be avoided in case the mobile device looses connection to other participants of the transaction. The authors present a new technique for treating blocked...

    Provided By University of Paderborn

  • White Papers // Apr 2010

    A Framework for the Design Space Exploration of Software-Defined Radio Applications

    This paper describes a framework for the design space exploration of resource-efficient software-defined radio architectures. This design space exploration is based on a dual design flow, using a central processor specification as reference for the hardware development and the automatic generation of a C-compiler based tool chain. Using the authors'...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    On the Impact of Transmit Waveforms on Channel Estimation Inaccuracies in Distributed MIMO Ad Hoc Networks

    In this paper, the authors present a general analysis to evaluate the performance of correlator-based channel estimation in distributed MIMO ad hoc networks. This analysis is required to characterize the behavior of networks employing advanced PHYsical-level (PHY) techniques, which call for precise assessment of channel effects in order to be...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    An Optimized Data Structure for High Throughput 3D Proteomics Data: MzRTree

    As an emerging field, MS-based proteomics still requires software tools for efficiently storing and accessing experimental data. In this paper, the authors focus on the management of LC-MS data, which are typically made available in standard XML-based portable formats. The structures that are currently employed to manage these data can...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    On The Institutional Design Of Burden Sharing When Financing External Border Enforcement In The EU

    Illegal immigration affects not only EU member states at the Mediterranean Sea but also more Northern states due to open internal borders and onward migration. Northern member states may free-ride on border countries' enforcement efforts, leading to a sub-optimal level of border control. While neither a centralized nor a coordinated...

    Provided By University of Paderborn

  • White Papers // Dec 2009

    Cooperative Feedback to Improve Capacity and Error Rate in Multiuser Diversity Systems - An OFDM Case Study

    To achieve multiuser diversity gains, resource allocation relies on accurate and timely feedback of the users' channel states. Obtaining such reliable feedback under tight overhead and delay constraints is nontrivial in many wireless systems. To this end, the users cooperate when transmitting feedback. Studying the authors cooperative feedback scheme exemplarily...

    Provided By University of Paderborn

  • White Papers // Oct 2009

    Sensing, Compression and Recovery for Wireless Sensor Networks: Sparse Signal Modelling

    In this paper, the authors propose a sparsity model that allows the use of Compressive Sensing (CS) for the online recovery of large data sets in real Wireless Sensor Network (WSN) scenarios. They advocate the joint use of CS for the recovery and of Principal Component Analysis (PCA) to capture...

    Provided By University of Paderborn

  • White Papers // Sep 2009

    An Accelerator for K-th Nearest Neighbor Thinning Based on the IMORC Infrastructure

    The creation and optimization of FPGA accelerators comprising several compute cores and memories are challenging tasks in high performance reconfigurable computing. In this paper, the authors present the design of such an accelerator for the k-th nearest neighbor thinning problem on an XD1000 reconfigurable computing system. The design leverages IMORC,...

    Provided By University of Paderborn

  • White Papers // Aug 2009

    A Spreadsheet-Like User Interface for Combinatorial Multi-Objective Optimization

    The authors present Moolloy, a general purpose, spreadsheet-like user interface for combinatorial multi-objective optimization. Current user interfaces for multi-objective optimization tend to either require some programming experience to use, or are narrowly focused on specific problems. Consequently, multi-objective optimization is usually only used by sophisticated technical workers, such as aerospace...

    Provided By University of Paderborn

  • White Papers // Jul 2009

    EvoCaches: Application-Specific Adaptation of Cache Mappings

    In this work the authors present EvoCache, a novel approach for implementing application-specific caches. The key innovation of EvoCache is to make the function that maps memory addresses from the CPU address space to cache indices programmable. They support arbitrary Boolean mapping functions that are implemented within a small reconfigurable...

    Provided By University of Paderborn

  • White Papers // Apr 2009

    Variations of the Turing Test in the Age of Internet and Virtual Reality

    Inspired by Hofstadter's Coffee-House Conversation (1982) and by the science fiction short story SAM by Schattschneider (1988), the authors propose and discuss criteria for non-mechanical intelligence. Firstly, they emphasize the practical need for such tests in view of Massively Multiuser Online Role-Playing Games (MMORPGs) and virtual reality systems like Second...

    Provided By University of Paderborn

  • White Papers // Apr 2009

    An Event Analysis Language for Wireless Sensor Network Traces

    Wireless Sensor Networks (WSNs) are distributed systems of embedded sensor nodes loosely coupled by wireless communication. Debugging, profiling and testing of these systems is inherently challenging due to resource constraints of the system components, a vast state space and tight integration with the environment. A prominent validation strategy is to...

    Provided By University of Paderborn

  • White Papers // Feb 2009

    On the Tradeoff Between MAC-Level Performance Metrics in MIMO Ad Hoc Networks with Imperfect Channel Estimation

    In this paper, the authors present some results on the effects of multiuser transmissions on channel state information accuracy in MIMO ad hoc networks, and thoroughly evaluate the impact of imperfect channel estimation on the performance of MAC protocols. In particular, they consider a cross-layer designed MAC which accounts for...

    Provided By University of Paderborn

  • White Papers // Feb 2009

    Causal Linkages Between Domestic Terrorism And Economic Growth

    The authors use the Hsiao-Granger method to test for growth-terrorism causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. Here, they find that economic performance leads terrorist violence in...

    Provided By University of Paderborn

  • White Papers // Jan 2009

    Towards Multi-Movement Hand Prostheses: Combining Adaptive Classification With High Precision Sockets

    The acceptance of hand prostheses strongly depends on their user-friendliness and functionality. Current prostheses are limited to a few movements and their operation is all but intuitive. The development of practically applicable multi-movement prostheses requires the combination of modern classification methods with novel techniques for manufacturing high precision sockets. In...

    Provided By University of Paderborn

  • White Papers // Dec 2009

    Cooperative Feedback to Improve Capacity and Error Rate in Multiuser Diversity Systems - An OFDM Case Study

    To achieve multiuser diversity gains, resource allocation relies on accurate and timely feedback of the users' channel states. Obtaining such reliable feedback under tight overhead and delay constraints is nontrivial in many wireless systems. To this end, the users cooperate when transmitting feedback. Studying the authors cooperative feedback scheme exemplarily...

    Provided By University of Paderborn

  • White Papers // Nov 2011

    A Game-Theoretical Approach to the Benefits of Cloud Computing

    In order to answer the question whether or not to utilize the cloud for processing, this paper aims at identifying characteristics of potential cloud beneficiaries and advisable actions to actually gain financial benefits. A game-theoretic model of an Infrastructure-as-a-Service (IaaS) cloud market, covering dynamics of pricing and usage, is suggested....

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Towards Adaptive Networking for Embedded Devices Based on Reconfigurable Hardware

    Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing centers or sensor and mobile networks. Stringent requirements with respect to performance, cost, and power consumption paired with an increasing demand for flexibility ask for...

    Provided By University of Paderborn

  • White Papers // May 2010

    An Open Source Circuit Library With Benchmarking Facilities

    In this paper, the authors introduce the open-source PivPav backend tool for reconfigurable computing. Essentially, PivPav provides an interface to a library of digital circuits that are kept in a database. For each circuit, an extensive set of metadata is made available through an application programming interface. PivPav is agnostic...

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Using Shared Library Interposing for Transparent Application Acceleration in Systems With Heterogeneous Hardware Accelerators

    Today's computer systems increasingly comprise heterogeneous computing elements like multi-core processors, graphics processing units, and specialized co-processors, which allow parallel processing. Programming applications to utilize such systems is a complex process and needs good knowledge about the hardware architecture. Automatic and transparent use of these resources is a major concern...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Performance Estimation for the Exploration of CPU-Accelerator Architectures

    In this paper, the authors present an approach for studying the design space when interfacing reconfigurable accelerators with a CPU. For this purpose they introduce a framework based on the LLVM infrastructure that performs hardware/software partitioning with runtime estimation utilizing profiling information and code analysis. They apply it to reconfigurable...

    Provided By University of Paderborn

  • White Papers // Jul 2010

    Communication Performance Characterization for Reconfigurable Accelerator Design on the XD1000

    Providing customized memory architectures is key for achieving high-performance with reconfigurable accelerators. Since reconfigurable computers provide limited possibilities for customizing the organization of external memory, a specific challenge is to make use of the existing memory layout in a flexible, yet efficient way. In this paper, the authors build on...

    Provided By University of Paderborn

  • White Papers // Sep 2009

    An Accelerator for K-th Nearest Neighbor Thinning Based on the IMORC Infrastructure

    The creation and optimization of FPGA accelerators comprising several compute cores and memories are challenging tasks in high performance reconfigurable computing. In this paper, the authors present the design of such an accelerator for the k-th nearest neighbor thinning problem on an XD1000 reconfigurable computing system. The design leverages IMORC,...

    Provided By University of Paderborn

  • White Papers // Apr 2009

    An Event Analysis Language for Wireless Sensor Network Traces

    Wireless Sensor Networks (WSNs) are distributed systems of embedded sensor nodes loosely coupled by wireless communication. Debugging, profiling and testing of these systems is inherently challenging due to resource constraints of the system components, a vast state space and tight integration with the environment. A prominent validation strategy is to...

    Provided By University of Paderborn

  • White Papers // Sep 2008

    A Hardware Accelerator for K-th Nearest Neighbor Thinning

    This paper presents an accelerator for k-th nearest neighbor thinning, a run time intensive algorithmic kernel used in recent multi-objective optimizers. The authors discuss the thinning algorithm and the accelerator architecture with its modules and operation, and evaluate the accelerator with respect to two different application scenarios. The first is...

    Provided By University of Paderborn

  • White Papers // Jan 2012

    Improved Side Channel Attacks on Pairing Based Cryptography

    Techniques from Pairing Based Cryptography (PBC) are used in an increasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for applications on smart cards. With these applications the question of the vulnerability to Side Channel Attacks (SCAs) arises. Several known invasive and noninvasive attacks against...

    Provided By University of Paderborn

  • White Papers // Feb 2012

    Towards System Viewpoints to Specify Adaptation Models at Runtime

    Current research focuses on the specification, analysis, and realisation of systems with self-properties. Such systems are characterised by the fact that they react on changes in their environment by altering their own structure in order to maintain their non-functional properties. However, there is no standard engineering method to model such...

    Provided By University of Paderborn

  • White Papers // Apr 2010

    A Framework for the Design Space Exploration of Software-Defined Radio Applications

    This paper describes a framework for the design space exploration of resource-efficient software-defined radio architectures. This design space exploration is based on a dual design flow, using a central processor specification as reference for the hardware development and the automatic generation of a C-compiler based tool chain. Using the authors'...

    Provided By University of Paderborn

  • White Papers // Mar 2012

    Dynamic Compression-Transmission for Energy-Harvesting Multihop Networks With Correlated Sources

    Energy-harvesting wireless sensor networking is an emerging technology with applications to various fields such as environmental and structural health monitoring. A distinguishing feature of wireless sensors is the need to perform both source coding tasks, such as measurement and compression, and transmission tasks. It is known that the overall energy...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Interference Alignment for Heterogeneous Two-Tiered Self-Organizing Networks

    In this paper, the authors consider a heterogeneous two-tiered network where a tier of cognitive self-organizing small cells is deployed over the coverage area of a preexisting Orthogonal Frequency Division Multiple Access (OFDMA) macro cell. Neither cross-nor co-tier cooperation or communication is established, thus no joint signal processing techniques can...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Orthogonal Precoder for Two-Tiered Networks Deployment

    In this paper, the authors consider a two-tiered network, where a tier of cognitive small base stations is deployed inside the coverage area of a preexisting macro-cell. The cross-tier interference caused by a complete bandwidth sharing is managed by introducing a new orthogonal pre-coder based mechanism, implemented by the small...

    Provided By University of Paderborn

  • White Papers // May 2012

    Cognitive Interference Alignment for OFDM Two-Tiered Networks

    In this paper, the authors introduce an interference alignment scheme that allows the coexistence of an Orthogonal Frequency Division Multiplexing (OFDM) macro-cell and a cognitive small-cell, deployed in a two-tiered structure and transmitting over the same bandwidth. They derive the optimal linear strategy for the single antenna secondary base station,...

    Provided By University of Paderborn

  • White Papers // Jan 2012

    Channel Estimation Impact for LTE Small Cells Based on MU-VFDM

    In a previous work, the authors introduced a spectrum sharing technique called Multi-User Vandermonde-subspace Frequency Division Multiplexing (MU-VFDM). This overlay technique allows the coexistence of a downlink Orthogonal Frequency Division Multiple Access (OFDMA) macro-cell and a cognitive multi-user small-cell system in time division duplex mode. In that work, MU-VFDM was...

    Provided By University of Paderborn

  • White Papers // Mar 2012

    Robust Opportunistic Broadcast Scheduling for Scalable Video Streaming

    In this paper, the authors design a robust opportunistic scheduler to be implemented at the base station in a cellular net-work for broadcast media streaming applications. The scheduling mechanism operates based on information on both the average and the instantaneous user distributions, and on radio link channel quality, obtained through...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Fluctuating EMG Signals: Investigating Long-Term Effects of Pattern Matching Algorithms

    In this paper, the authors investigate the behavior of state-of-the-art pattern matching algorithms when applied to electromyographic data recorded during 21 days. To this end, they compare the five classification techniques k-nearest-neighbor, linear discriminant analysis, decision trees, artificial neural networks and support vector machines. They provide all classifiers with features...

    Provided By University of Paderborn

  • White Papers // Jan 2009

    Towards Multi-Movement Hand Prostheses: Combining Adaptive Classification With High Precision Sockets

    The acceptance of hand prostheses strongly depends on their user-friendliness and functionality. Current prostheses are limited to a few movements and their operation is all but intuitive. The development of practically applicable multi-movement prostheses requires the combination of modern classification methods with novel techniques for manufacturing high precision sockets. In...

    Provided By University of Paderborn

  • White Papers // Apr 2009

    Variations of the Turing Test in the Age of Internet and Virtual Reality

    Inspired by Hofstadter's Coffee-House Conversation (1982) and by the science fiction short story SAM by Schattschneider (1988), the authors propose and discuss criteria for non-mechanical intelligence. Firstly, they emphasize the practical need for such tests in view of Massively Multiuser Online Role-Playing Games (MMORPGs) and virtual reality systems like Second...

    Provided By University of Paderborn

  • White Papers // Sep 2010

    Short-Run And Long-Run Dynamics Of Growth, Inequality And Poverty In The Developing World

    Growth, inequality, and poverty are central elements of the development process. However the mutual effects and directions of causality have been, and remain, one of the most controversial issues. After introducing a simple theoretical framework the authors derive some fundamental relations between growth, inequality and poverty. In the empirical part...

    Provided By University of Paderborn

  • White Papers // May 2010

    A DBMS for Mobile Transactions Using Bi-State-Termination

    Whenever distributed transaction processing in MANETs or other unreliable networks has to guarantee atomicity and isolation, a major challenge is how long-term blocking of resources can be avoided in case the mobile device looses connection to other participants of the transaction. The authors present a new technique for treating blocked...

    Provided By University of Paderborn

  • White Papers // Feb 2009

    Causal Linkages Between Domestic Terrorism And Economic Growth

    The authors use the Hsiao-Granger method to test for growth-terrorism causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. Here, they find that economic performance leads terrorist violence in...

    Provided By University of Paderborn

  • White Papers // Jan 2009

    Statutory Retirement Age And Lifelong Learning

    The employability of an aging population in a world of continuous technical change is top of the political agenda. Due to endogenous human capital depreciation, the effective retirement age is often below statutory retirement age resulting in unemployment among older workers. The authors analyze this phenomenon in a putty-putty human...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    On The Institutional Design Of Burden Sharing When Financing External Border Enforcement In The EU

    Illegal immigration affects not only EU member states at the Mediterranean Sea but also more Northern states due to open internal borders and onward migration. Northern member states may free-ride on border countries' enforcement efforts, leading to a sub-optimal level of border control. While neither a centralized nor a coordinated...

    Provided By University of Paderborn

  • White Papers // Mar 2011

    Competitive and Fair Medium Access Despite Reactive Jamming

    Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often simple and cheap to implement. Today's jammers can perform physical carrier sensing in order to disrupt communication more efficiently, especially in a network of simple wireless devices such...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    On the Impact of Transmit Waveforms on Channel Estimation Inaccuracies in Distributed MIMO Ad Hoc Networks

    In this paper, the authors present a general analysis to evaluate the performance of correlator-based channel estimation in distributed MIMO ad hoc networks. This analysis is required to characterize the behavior of networks employing advanced PHYsical-level (PHY) techniques, which call for precise assessment of channel effects in order to be...

    Provided By University of Paderborn

  • White Papers // Feb 2009

    On the Tradeoff Between MAC-Level Performance Metrics in MIMO Ad Hoc Networks with Imperfect Channel Estimation

    In this paper, the authors present some results on the effects of multiuser transmissions on channel state information accuracy in MIMO ad hoc networks, and thoroughly evaluate the impact of imperfect channel estimation on the performance of MAC protocols. In particular, they consider a cross-layer designed MAC which accounts for...

    Provided By University of Paderborn

  • White Papers // Aug 2009

    A Spreadsheet-Like User Interface for Combinatorial Multi-Objective Optimization

    The authors present Moolloy, a general purpose, spreadsheet-like user interface for combinatorial multi-objective optimization. Current user interfaces for multi-objective optimization tend to either require some programming experience to use, or are narrowly focused on specific problems. Consequently, multi-objective optimization is usually only used by sophisticated technical workers, such as aerospace...

    Provided By University of Paderborn

  • White Papers // Jun 2010

    Network Coding in Passive Optical Networks

    One of the most promising technologies for high-speed access to the Internet are Passive Optical Networks as they provide high data rates at low cost. The paper integrates network coding into the Ethernet Passive Optical Network architecture to increase downlink throughput by up to 50% without changing the hardware. In...

    Provided By University of Paderborn

  • White Papers // Jul 2009

    EvoCaches: Application-Specific Adaptation of Cache Mappings

    In this work the authors present EvoCache, a novel approach for implementing application-specific caches. The key innovation of EvoCache is to make the function that maps memory addresses from the CPU address space to cache indices programmable. They support arbitrary Boolean mapping functions that are implemented within a small reconfigurable...

    Provided By University of Paderborn

  • White Papers // Oct 2009

    Sensing, Compression and Recovery for Wireless Sensor Networks: Sparse Signal Modelling

    In this paper, the authors propose a sparsity model that allows the use of Compressive Sensing (CS) for the online recovery of large data sets in real Wireless Sensor Network (WSN) scenarios. They advocate the joint use of CS for the recovery and of Principal Component Analysis (PCA) to capture...

    Provided By University of Paderborn

  • White Papers // Apr 2012

    Secure Communication for Smart IoT Objects: Protocol Stacks, Use Cases and Practical Examples

    In this paper, the authors discuss security procedures for constrained IoT devices. They start with the description of a general security architecture along with its basic procedures, then discuss how its elements interact with the constrained communication stack and explore pros and cons of popular security approaches at various layers...

    Provided By University of Paderborn

  • White Papers // Aug 2011

    Cbhrp: A Cluster Based Routing Protocol for Wireless Sensor Network

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. The authors introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target...

    Provided By University of Paderborn

  • White Papers // Jul 2011

    Inter-Relay Traffic Through Network Coding in Cooperative Wireless Ad Hoc Networks

    Cooperative Network-Coded Hybrid ARQ (Coop-NC HARQ) has recently been proposed as a smart way to improve Decode & Forward (D&F) relaying. According to this idea, cooperators send HARQ redundancy on behalf of a source coded together with a data packet intended for the destination they are helping and taken from...

    Provided By University of Paderborn

  • White Papers // Nov 2008

    Composability for High-Integrity Real-Time Embedded Systems

    The complexity of software systems rises with the quest for better functionality and quality. The development costs that result from it may also increase significantly. Software reuse is one of the directions pursued by the engineering community to abate those costs. One of the lessons learned in the pursuit of...

    Provided By University of Paderborn

  • White Papers // Feb 2010

    An Optimized Data Structure for High Throughput 3D Proteomics Data: MzRTree

    As an emerging field, MS-based proteomics still requires software tools for efficiently storing and accessing experimental data. In this paper, the authors focus on the management of LC-MS data, which are typically made available in standard XML-based portable formats. The structures that are currently employed to manage these data can...

    Provided By University of Paderborn

  • White Papers // Jun 2012

    Processor Allocation for Optimistic Parallelization of Irregular Programs

    Optimistic parallelization is a promising approach for the parallelization of irregular algorithms: potentially interfering tasks are launched dynamically, and the runtime system detects conflicts between concurrent activities, aborting and rolling back conflicting tasks. However, parallelism in irregular algorithms is very complex. In a regular algorithm like dense matrix multiplication, the...

    Provided By University of Paderborn