University of Teramo

Displaying 1-40 of 108 results

  • White Papers // Apr 2014

    A Constrained Matrix-Variate Gaussian Process for Transposable Data

    Transposable data represents interactions among two sets of entities, and are typically represented as a matrix containing the known interaction values. Additional side information may consist of feature vectors specific to entities corresponding to the rows and/or columns of such a matrix. Further information may also be available in the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Performance Analysis of Spin Transfer Torque Random Access Memory With Cross Shaped Free Layer Using Heusler Alloys by Using Micromagnetic Studies

    The authors investigated the performance of Spin Transfer Torque Random Access Memory (STT-RAM) cell with cross shaped Heusler compound based free layer using micro-magnetic simulations. They designed the free layer using Cobalt based Heusler compounds. Here in this paper, simulation results predict that switching time from one state to other...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Enhanced Hierarchical Instruction Scheduling For Tiled Data Flow Architectures

    Increasing on-chip wire delay along with the distributed nature of processing elements makes instruction scheduling for tiled data flow architectures very crucial. The authors' analysis reveals that careful placement of most frequently executed sections of applications, and directly addressing resource contention can significantly improve the performance of the application. The...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Profile-Assisted Compiler Support for Dynamic Predication in Diverge-Merge Processors

    Dynamic predication has been proposed to reduce the branch mis-prediction penalty due to hard-to-predict branch instructions. Recently proposed dynamic predication architecture, the Diverge-Merge Processor (DMP), provides large performance improvements by dynamically predicating a large set of complex control-flow graphs that result in branch mis-predictions. DMP requires significant support from a...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and Recovery

    Control and data speculation are widely used to improve processor performance. Correct speculation can reduce execution time, but incorrect speculation can lead to increased execution time and greater energy consumption. This paper proposes a mechanism to leverage unexpected program behavior, called wrong-path events that occur during periods of incorrect speculation....

    Provided By University of Teramo

  • White Papers // Jan 2014

    2D-Proling: Detecting Input-Dependent Branches with a Single Input Data Set

    Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensive in terms of resources and compilation time. The authors introduce a new mechanism, 2D-proling, which proles with only one input set and predict whether the...

    Provided By University of Teramo

  • White Papers // Nov 2013

    Verifying Computations with State

    When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent paper in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems. However,...

    Provided By University of Teramo

  • White Papers // Oct 2013

    How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

    The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of...

    Provided By University of Teramo

  • White Papers // Jul 2013

    VABKS: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

    It is quite common now-a-days for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: how can the authorized data users search over a data owner's outsourced encrypted...

    Provided By University of Teramo

  • White Papers // Jul 2013

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    Data protection in public cloud remains a challenging problem. Outsourced data processing on vulnerable cloud platforms may suffer from cross-VM attacks, e.g. side-channel attacks that leak secrecy keys. The authors design and develop CloudSafe, a general and practical data-protection solution by integrating cryptographic techniques and systematic mechanisms seamlessly to address...

    Provided By University of Teramo

  • White Papers // Jun 2013

    Scalable and Memory-Efficient Clustering of Large-Scale Social Networks

    Clustering of social networks is an important task for their analysis; however, most existing algorithms do not scale to the massive size of today's social networks. A popular class of graph clustering algorithms for large-scale networks, such as PMetis, KMetis and Graclus, is based on a multilevel framework. Generally, these...

    Provided By University of Teramo

  • White Papers // May 2013

    Anon-Pass: Practical Anonymous Subscriptions

    The authors present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user...

    Provided By University of Teramo

  • White Papers // May 2013

    A Comprehensive Framework for Device-to-Device Communications in Cellular Networks

    Device-To-Device (D2D) in cellular networks is a promising concept which opens up new opportunities for commercial applications but also brings new challenges for network management. In this paper, the authors propose a tractable hybrid network model where the positions of transceivers are modeled by random spatial Poisson Point Processes (PPP)....

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Optimal Spectrum Partition and Mode Selection in Device-to-Device Overlaid Cellular Networks

    In this paper, the authors jointly address two fundamental issues in Device-To-Device (D2D) overlaid cellular networks: how to partition the spectrum assuming orthogonal cellular and D2D transmissions, and what is the optimal threshold for distance-based D2D mode selection? To this end, they first derive rate expressions for both cellular and...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering

    With ever increasing network traffic rates, multicore architectures for network processors have successfully provided performance improvements through high parallelism. However, naively allocating the network traffic to multiple cores without considering diversified application nature and flow locality results in issues such as packet reordering, load imbalance and inefficient cache usage. Consequently,...

    Provided By University of Teramo

  • White Papers // Mar 2013

    A Novel Approach to Supporting Legacy Devices in LTE Networks

    The explosive growth in data traffic is resulting in a spectrum crunch forcing many wireless network operators to look towards refarming their 2G spectrum and deploy more spectrally efficient Long Term Evolution (LTE) technology. However, mobile network operators face a challenge when it comes to spectrum refarming because 2G technologies...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation

    Minimum Spanning Tree (MST) problems play an important role in many networking applications, such as routing and network planning. In many cases, such as wireless ad-hoc networks, this requires efficient high-performance and low-power implementations that can run at regular intervals in real time on embedded platforms. In this paper, the...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Model Checking Invariant Security Properties in OpenFlow

    The OpenFlow (OF) switching specification represents an innovative and open standard for enabling the dynamic programming of flow control policies in production networks. Unfortunately, thus far researchers have paid little attention to the development of methods for verifying that dynamic flow policies inserted within an OpenFlow network do not violate...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Optimal Locally Repairable Codes With Local Minimum Storage Regeneration Via Rank-Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems. The codes possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Explicit MBR All-Symbol Locality Codes

    Node failures are inevitable in Distributed Storage Systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: regenerating codes, i.e., codes that minimize the total repair bandwidth; and local codes, which minimize the number of nodes participating in the repair process. This paper focuses...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Dynamic Spectrum Refarming With Overlay for Legacy Devices

    The exponentially growing demand for wireless traffic is straining cellular networks. According to Cisco's report, in 2011 global mobile data traffic doubled for the fourth year in a row and was eight times the traffic of the entire global Internet in 2000. Cisco further expects that global mobile data traffic...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Secure Locally Repairable Codes for Distributed Storage Systems

    Data intensive and data generative applications are increasingly pervasive, ranging from social networking to multimedia uploads. Thus, storage in the "Cloud" is gaining prominence, where individuals and institutions use distributed storage services whose physical structure and location is mostly unknown to the user. This paper designs coding schemes for Distributed...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Optimal Locally Repairable Codes Via Rank Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides new...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Secrecy Capacity of Minimum Bandwidth Cooperative Regenerating Codes

    Regenerating codes enable trading off repair bandwidth for storage in Distributed Storage Systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may be susceptible to multiple node failures. This paper analyzes storage systems that employ cooperative regenerating codes that are robust to passive...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis

    The authors develop a general downlink model for multi-antenna Heterogeneous cellular Networks (HetNets), where Base Stations (BSs) across tiers may differ in terms of transmit power, target Signal-to-Interference-Ratio (SIR), deployment density, number of transmit antennas and the type of multi-antenna transmission. In particular, they consider and compare Space Division Multiple...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Automated di/dt Stressmark Generation for Microprocessor Power Delivery Networks

    In this paper, the authors propose a method for automated di/dt stressmark generation to test maximum voltage droop in a microprocessor power delivery network. The di/dt stressmark is an instruction sequence which draws periodic high and low current pulses that maximize voltage fluctuations including voltage droops. In order to automate...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications

    The growing popularity of Machine-To-Machine (M2M) communications in cellular networks is driving the need to optimize networks based on the characteristics of M2M, which are significantly different from the requirements that current networks are designed to meet. First, M2M requires large number of short sessions as opposed to small number...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Enterprise Integration Issues Encountered with Agile Process Introduction

    This paper describes research that explored the issues likely to be encountered when an agile process is introduced into a traditional environment. The methodology used considers strategic, cultural, and process integration issues in the implementation of advanced technologies. The methodology is used to define upstream/downstream process integration issues and impact...

    Provided By University of Teramo

  • White Papers // Jan 2013

    1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels

    Recently, a new WDM optical network infrastructure named SMART, which is capable of dynamically setting up, modifying, and tearing down optical connections, was proposed. The performance of SMART is determined by the performance of its hyper-channels, which are essentially optical buses or light-trails. Previously proposed MAC protocols for unidirectional optical...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resource Allocation: Realizing Mean-Variability-Fairness Tradeoffs

    Network Utility Maximization (NUM) provides a key conceptual framework to study reward allocation amongst a collection of users/entities in disciplines as diverse as economics, law and engineering. In network engineering, this framework has been particularly insightful towards understanding how Internet protocols allocate bandwidth, and motivated diverse research efforts on distributed...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Fundamentals of Mobility in Cellular Networks: Modeling and Analysis

    Mobility modeling and analysis is a key issue in wireless networks. In this paper, the authors propose a new and quite general Random WayPoint (RWP) mobility model which is valid over the entire plane. They derive key properties of the proposed mobility model including transition length, transition time and spatial...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Towards an Optimal User Association in Heterogeneous Cellular Networks

    The authors investigate how a heterogeneous cellular network should self-organize by proposing a load-aware user association scheme. This is an important consideration, in order to move traffic off congested cells and onto more lightly loaded cells. Although the network-wide optimal association problem is NP hard, a closely related utility maximization...

    Provided By University of Teramo

  • White Papers // Nov 2012

    A Non-asymptotic Throughput for Massive MIMO Cellular Uplink with Pilot Reuse

    This paper considers an uplink massive MIMO scheme that employs a pilot reuse scheme. For the massive MIMO scheme, a non-asymptotic cell throughput lower bound that is valid for any M is derived and the bound is shown to be tight by simulations. The lower bound is dependent upon three...

    Provided By University of Teramo

  • White Papers // Sep 2012

    All about Eve: Execute-Verify Replication for Multi-Core Servers

    This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced...

    Provided By University of Teramo

  • White Papers // Jul 2012

    Modeling Heterogeneous Network Interference With Using Poisson Point Processes

    Cellular systems are becoming more heterogeneous with the introduction of low power nodes including femtocells, relays, and distributed antennas. Unfortunately, the resulting interference environment is also becoming more complicated, making evaluation of different communication strategies challenging in both analysis and simulation. This paper suggests a simplified interference model for heterogeneous...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resolving the Conflict Between Generality and Plausibility in Verified Computation

    The area of proof-based verified computation (outsourced computation built atop probabilistically checkable proofs and cryptographic machinery) has lately seen renewed interest. Although recent work has made great strides in reducing the overhead of naive applications of the theory, these schemes still cannot be considered practical. The core issue is that...

    Provided By University of Teramo

  • White Papers // Oct 2012

    Taking Proof-Based Verified Computation a Few Steps Closer to Practicality (Extended Version)

    The authors are motivated by outsourced computing: cloud computing (in which clients outsource computations to remote computers), peer-to-peer computing (in which peers outsource storage and computation to each other), volunteer computing (in which projects outsource computations to volunteers' desktops), etc. They describe GINGER, a built system for unconditional, general-purpose, and...

    Provided By University of Teramo

  • White Papers // Aug 2012

    New Constructions and Proof Methods for Large Universe Attribute-Based Encryption

    The authors propose two large universe Attribute-Based Encryption constructions. In a large universe ABE construction any string can be used as an attribute and attributes need not be enumerated at system setup. Their construction establishes a novel large universe Ciphertext-Policy ABE scheme on prime order bilinear groups and the other...

    Provided By University of Teramo

  • White Papers // Mar 2012

    Secret Key Extraction From Wireless Signal Strength in Real Environments

    The authors evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the Received Signal Strength (RSS) variations on the wireless channel between the two devices. They use real world measurements of RSS in a variety of environments and settings. The results from their experiments...

    Provided By University of Teramo

  • White Papers // Jun 2012

    Delivering QOS in XML Data Stream Processing Using Load Shedding

    In recent years, the authors have witnessed the emergence of new types of systems that deal with large volumes of streaming data. Examples include financial data analysis on feeds of stock tickers, sensor-based environmental monitoring, network track monitoring and click stream analysis to push customized advertisements or intrusion detection. Traditional...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis

    The authors develop a general downlink model for multi-antenna Heterogeneous cellular Networks (HetNets), where Base Stations (BSs) across tiers may differ in terms of transmit power, target Signal-to-Interference-Ratio (SIR), deployment density, number of transmit antennas and the type of multi-antenna transmission. In particular, they consider and compare Space Division Multiple...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications

    The growing popularity of Machine-To-Machine (M2M) communications in cellular networks is driving the need to optimize networks based on the characteristics of M2M, which are significantly different from the requirements that current networks are designed to meet. First, M2M requires large number of short sessions as opposed to small number...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Sep 2012

    On Resource Allocation for Machine-to-Machine (M2M) Communications in Cellular Networks

    Cellular networks are an attractive option for handling the growing number of sensing and monitoring devices due to their ubiquitous presence. While this growing popularity of cellular network based Machine-To-Machine (M2M) communications is opening new avenues for the mobile network operators, it is also bringing forth new system design challenges...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Load-Aware Heterogeneous Cellular Networks: Modeling and SIR Distribution

    Heterogeneous Cellular Networks (HCNs) are characterized by cells whose coverage areas may vary by orders of magnitude. It is natural therefore that their user populations (and hence traffic loads) will vary similarly. Yet, to date, random spatial models developed for HCNs generally assume that all Base Stations (BSs) are always...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Pairwise Interaction Processes for Modeling Cellular Network Topology

    In industry, cellular tower locations have primarily been modeled by a deterministic hexagonal grid. Since real deployments are rarely regular, the even spacing between nodes in the grid and constant Voronoi cell areas make the hexagonal grid unrealistic. In this paper, the authors use tools from spatial statistics to show...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Fundamentals of Mobility in Cellular Networks: Modeling and Analysis

    Mobility modeling and analysis is a key issue in wireless networks. In this paper, the authors propose a new and quite general Random WayPoint (RWP) mobility model which is valid over the entire plane. They derive key properties of the proposed mobility model including transition length, transition time and spatial...

    Provided By University of Teramo

  • White Papers // Jan 2012

    Constant-Approximation for Target Coverage Problem in Wireless Sensor Networks

    Coverage, in general, answers the questions about quality of service (surveillance) that can be provided by a particular sensor network. In this paper, the authors will study target coverage. In target coverage, there are several points of interest in a given region and sensors need to cover all the points....

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Apr 2014

    A Constrained Matrix-Variate Gaussian Process for Transposable Data

    Transposable data represents interactions among two sets of entities, and are typically represented as a matrix containing the known interaction values. Additional side information may consist of feature vectors specific to entities corresponding to the rows and/or columns of such a matrix. Further information may also be available in the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Performance Analysis of Spin Transfer Torque Random Access Memory With Cross Shaped Free Layer Using Heusler Alloys by Using Micromagnetic Studies

    The authors investigated the performance of Spin Transfer Torque Random Access Memory (STT-RAM) cell with cross shaped Heusler compound based free layer using micro-magnetic simulations. They designed the free layer using Cobalt based Heusler compounds. Here in this paper, simulation results predict that switching time from one state to other...

    Provided By University of Teramo

  • White Papers // Jun 2013

    Scalable and Memory-Efficient Clustering of Large-Scale Social Networks

    Clustering of social networks is an important task for their analysis; however, most existing algorithms do not scale to the massive size of today's social networks. A popular class of graph clustering algorithms for large-scale networks, such as PMetis, KMetis and Graclus, is based on a multilevel framework. Generally, these...

    Provided By University of Teramo

  • White Papers // Jul 2009

    Design Methodology for Clocked Storage Elements Robust to Process Variations

    As semiconductor technology scales down, process variations start to cause increasingly detrimental impact on the performance of integrated circuit. Starting with 65- nm CMOS technology, the sensitivity to process variation became significantly large. In this paper, the authors address the effects of process variations on the performance of clocked storage...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation

    Minimum Spanning Tree (MST) problems play an important role in many networking applications, such as routing and network planning. In many cases, such as wireless ad-hoc networks, this requires efficient high-performance and low-power implementations that can run at regular intervals in real time on embedded platforms. In this paper, the...

    Provided By University of Teramo

  • White Papers // May 2012

    Laser & Detector Placement in MIMO Multimode Optical Fiber Systems

    Multi-Mode Fibers (MMFs) offer a cost-effective connection solution for small and medium length networks. However, data rates through multimode fibers are traditionally limited by modal dispersion. Signal processing and Multiple-Input Multiple-Output (MIMO) have been shown to be effective at combating these limitations, but device design for the specific purpose of...

    Provided By University of Teramo

  • White Papers // May 2012

    Blind Phase Noise Compensation for SC-FDMA With Application to LTE-Uplink

    The authors propose an iterative joint detection and phase noise compensation scheme for single-carrier frequency-division multiple-access systems. Their proposed scheme does not require any pilots in tracking the phase noise and assumes no knowledge about the phase noise model to avoid model mismatch problems. Simulation results show the effectiveness of...

    Provided By University of Teramo

  • White Papers // May 2012

    Service Time Estimation in Multiple-Rate IEEE 802.11 WLANs With and Without Opportunistic Cooperative Mechanism Under Unsaturated Load Conditions

    Wireless media servers and real-time applications are becoming increasingly popular in most homes. Wireless network latency is a key factor in many applications. The objective of this paper is to derive an analytical framework to estimate the latency in terms of the average service time of the most used multiple-rate...

    Provided By University of Teramo

  • White Papers // May 2012

    Low Complexity Precoding for Large Millimeter Wave MIMO Systems

    Millimeter Wave (mm-Wave) systems must overcome heavy signal attenuation to support high-throughput wireless communication links. The small wavelength in mm-Wave systems enables beamforming using large antenna arrays to combat path loss with directional transmission. Beamforming with multiple data streams, known as pre-coding, can be used to achieve even higher performance....

    Provided By University of Teramo

  • White Papers // May 2012

    Alien Crosstalk Mitigation in Vectored DSL Systems for Backhaul Applications

    The performance of Digital Subscriber Line (DSL) systems, such as ADSL and VDSL is limited by crosstalk. Suppression of in-domain far-end self crosstalk using vectoring technology enables very high bidirectional data rates over twisted-pairs of copper wires. However, the performance of vectored DSL systems is severely degraded in the presence...

    Provided By University of Teramo

  • White Papers // Mar 2012

    A 38 GHz Cellular Outage Study for an Urban Outdoor Campus Environment

    Wireless systems require increasingly large system bandwidths that are only available at millimeter-wave frequencies. Such spectrum bands offer the potential for multi-gigabit-per-second data rates to low-cost massively broadband devices. To enable mobile outdoor millimeter-wave cellular-type applications, it is necessary to determine the coverage potential of base stations in real-world environments....

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Enterprise Integration Issues Encountered with Agile Process Introduction

    This paper describes research that explored the issues likely to be encountered when an agile process is introduced into a traditional environment. The methodology used considers strategic, cultural, and process integration issues in the implementation of advanced technologies. The methodology is used to define upstream/downstream process integration issues and impact...

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // Jul 2012

    An Exploratory Study of the Security Management Practices of Hispanic Students

    The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users' understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management...

    Provided By University of Teramo

  • White Papers // May 2011

    Distributed SemanticWeb Data Management in HBase and MySQL Cluster

    Various computing and data resources on the web are being enhanced with machine-interpretable semantic descriptions to facilitate better search, discovery and integration. This interconnected metadata constitutes the semantic web, whose volume can potentially grow the scale of the web. Efficient management of semantic web data, expressed using the w3c's Resource...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect...

    Provided By University of Teramo

  • White Papers // Jul 2013

    VABKS: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

    It is quite common now-a-days for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: how can the authorized data users search over a data owner's outsourced encrypted...

    Provided By University of Teramo

  • White Papers // Oct 2013

    How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

    The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of...

    Provided By University of Teramo

  • White Papers // Nov 2013

    Verifying Computations with State

    When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent paper in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems. However,...

    Provided By University of Teramo

  • White Papers // May 2013

    Anon-Pass: Practical Anonymous Subscriptions

    The authors present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Achieving Leakage Resilience Through Dual System Encryption

    In this paper, the authors show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduced by waters. They demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage...

    Provided By University of Teramo