University of Teramo

Displaying 81-106 of 106 results

  • White Papers // May 2011

    Spatial Reuse and Fairness of Mobile Ad-Hoc Networks With Channel-Aware CSMA Protocols

    The authors investigate the benefits of channel-aware (opportunistic) scheduling of transmissions in ad-hoc networks. The key challenge in optimizing the performance of such systems is finding a good compromise among three interdependent quantities: the density and channel quality of scheduled transmitters, and the resulting interference at receivers. They propose two...

    Provided By University of Teramo

  • White Papers // May 2011

    Distributed SemanticWeb Data Management in HBase and MySQL Cluster

    Various computing and data resources on the web are being enhanced with machine-interpretable semantic descriptions to facilitate better search, discovery and integration. This interconnected metadata constitutes the semantic web, whose volume can potentially grow the scale of the web. Efficient management of semantic web data, expressed using the w3c's Resource...

    Provided By University of Teramo

  • White Papers // Mar 2011

    The Optimal Inflation Rate Revisited

    The authors challenge the widely held belief that New Keynesian models cannot predict an optimal positive inflation rate. In fact they find that even for the US economy, characterized by relatively small government size, optimal trend inflation is justified by the Phelps argument that the inflation tax should be part...

    Provided By University of Teramo

  • White Papers // Feb 2011

    Static Timing Analysis for Modeling QoS in Networks on Chip

    Networks-on-Chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC's shared resources, Quality of Service and resource allocation are major concerns for system designers. In particular, a model for the properties of packet delivery through the network is desirable. The authors...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Achieving Leakage Resilience Through Dual System Encryption

    In this paper, the authors show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduced by waters. They demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks

    Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. The authors identify the challenges...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Performance Analysis of 3-D Monolithic Integrated Circuits

    3-D integration provides an effective platform for realizing future gigascale circuits by integrating multiple layers of active devices on a single 3D chip. 3-D Monolithic Integration (3DMI), also termed as sequential integration, is a potential technology for future gigascale circuits. Since the device layers are processed in sequential order, the...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Elastic Refresh: Techniques to Mitigate Refresh Penalties in High Density Memory

    High density memory is becoming more important as many execution streams are consolidated onto single chip many-core processors. DRAM is ubiquitous as a main memory technology, but while DRAM's per-chip density and frequency continue to scale, the time required to refresh its dynamic cells has grown at an alarming rate....

    Provided By University of Teramo

  • White Papers // Sep 2010

    Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness

    In this paper, the authors characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, including indoor and outdoor transmissions, under various spectrum (white space) detection techniques. Each technique delivers a different degree of RF-environment awareness - the more...

    Provided By University of Teramo

  • White Papers // Jun 2010

    PrEsto: An FPGA-Accelerated Power Estimation Methodology for Complex Systems

    Reduced or bounded power consumption has become a first-order requirement for modern hardware design. As a design progresses and more detailed information becomes available, more accurate power estimations become possible but at the cost of significantly slower simulation speeds. Power simulation that is both sufficiently-accurate and fast would have a...

    Provided By University of Teramo

  • White Papers // Jun 2010

    The Two Way Wiretap Channel: Theory and Practice

    In this paper, the authors considers the two way wiretap channel in which two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full duplex scenario, where each node can transmit and receive simultaneously, they obtain new achievable secrecy...

    Provided By University of Teramo

  • White Papers // May 2010

    Trend Inflation, Endogenous Mark-ups And The Non-vertical Phillips Curve

    Recent developments in macroeconomics resurrect the view that welfare costs of inflation arise because the latter acts as a tax on money balances. Empirical contributions show that wage re-negotiations take place while expiring contracts are still in place. Bringing these seemingly unrelated aspects together in a stylized general equilibrium model,...

    Provided By University of Teramo

  • White Papers // Apr 2010

    DataGuard: Dynamic Data Attestation in Wireless Sensor Networks

    Attestation has become a promising approach for ensuring software integrity in wireless sensor networks. However, current attestation either focuses on static system properties, e.g., code integrity, or requires hardware support such as Trusted Platform Module (TPM). However, there are attacks exploiting vulnerabilities that do not violate static system properties, and...

    Provided By University of Teramo

  • White Papers // Apr 2010

    Detecting Vulnerabilities in C Programs Using Trace-Based Testing

    Security testing has gained significant attention recently due to frequent attacks against software systems. This paper presents a trace-based security testing approach. It reuses test cases generated from previous testing methods to produce execution traces. An execution trace is a sequence of program statements exercised by a test case. Each...

    Provided By University of Teramo

  • White Papers // Mar 2010

    Adaptive Jamming-Resistant Broadcast Systems With Partial Channel Sharing

    Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know such spread pattern to invest much more effort to launch attacks. However, in broadcast systems, jammers can...

    Provided By University of Teramo

  • White Papers // Jan 2010

    Fiscal And Monetary Interaction Under Monetary Policy Uncertainty

    Despite the increasing number of studies on monetary policy uncertainty, its role on the strategic interaction between fiscal and monetary policies has not been fully explored. The authors' paper aims to fill this gap by evaluating the consequences produced by multiplicative uncertainty in such a context. Nowadays one of the...

    Provided By University of Teramo

  • White Papers // Dec 2009

    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

    The authors construct a fully secure HIBE scheme with short cipher-texts. The previous construction of the researchers was only proven to be secure in the selective model, under a non-static assumption which depended on the depth of the hierarchy. To obtain full security, they apply the dual system encryption concept...

    Provided By University of Teramo

  • White Papers // Nov 2009

    A Bandwidth-aware Memory-subsystem Resource Management using Non-invasive Resource Profilers for Large CMP Systems

    By integrating multiple cores in a single chip, Chip Multi-Processors (CMP) provides an attractive approach to improve both system throughput and efficiency. This integration allows the sharing of on-chip resources which may lead to destructive interference between the executing workloads. Memory-subsystem is an important shared resource that contributes significantly to...

    Provided By University of Teramo

  • White Papers // Jul 2009

    Design Methodology for Clocked Storage Elements Robust to Process Variations

    As semiconductor technology scales down, process variations start to cause increasingly detrimental impact on the performance of integrated circuit. Starting with 65- nm CMOS technology, the sensitivity to process variation became significantly large. In this paper, the authors address the effects of process variations on the performance of clocked storage...

    Provided By University of Teramo

  • White Papers // May 2009

    Cooperative Binning and Channel Prefixing for Secrecy in Interference Channels

    In this paper, the authors investigate the fundamental performance limits of the two-user interference channel in the presence of an external eavesdropper. In this setting, they construct an inner bound, to the secrecy capacity region, based on the idea of cooperative binning and channel prefixing in which the two users...

    Provided By University of Teramo

  • White Papers // Aug 2008

    Energy-Aware Application Scheduling on a Heterogeneous Multi-core System

    Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workload. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to matching cores that can deliver the...

    Provided By University of Teramo

  • White Papers // Jul 2008

    Formal Specification and Verification of a Secure Micropayment Protocol

    As online businesses keep growing and web services become pervasive, there is an increasing demand for micro-payment protocols that facilitate micro-commerce, namely selling content and services for small amounts of money (possibly less than one cent per transaction), which cannot be handled efficiently by credit cards due to substantial per...

    Provided By University of Teramo

  • White Papers // Jun 2007

    Dynamic Predication of Indirect Jumps

    Indirect jumps are used to implement increasingly common programming language constructs such as virtual function calls, switch-case statements, jump tables, and interface calls. Unfortunately, the prediction accuracy of indirect jumps has remained low because many indirect jumps have multiple targets that are difficult to predict even with specialized hardware. This...

    Provided By University of Teramo

  • White Papers // Dec 2006

    Machine Learning for On-Line Hardware Reconfiguration

    As computer systems continue to increase in complexity, the need for AI-based solutions is becoming more urgent. For example, high-end servers that can be partitioned into logical subsystems and repartitioned on the fly are now becoming available. This development raises the possibility of reconfiguring distributed systems online to optimize for...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation

    The authors propose a set of statistical metrics for making a comprehensive, fair, and insightful evaluation of features, clustering algorithms, and distance measures in representative sampling techniques for microprocessor simulation. Their evaluation of clustering algorithms using these metrics shows that CLARANS clustering algorithm produces better quality clusters in the feature...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Avoiding Store Misses to Fully Modified Cache Blocks

    Memory bandwidth limitation is one of the major impediments to high-performance microprocessors. This paper investigates a class of store misses that can be eliminated to reduce data traffic. Those store misses fetch cache blocks whose original data is never used. If fully overwritten by subsequent stores, those blocks can be...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation

    Minimum Spanning Tree (MST) problems play an important role in many networking applications, such as routing and network planning. In many cases, such as wireless ad-hoc networks, this requires efficient high-performance and low-power implementations that can run at regular intervals in real time on embedded platforms. In this paper, the...

    Provided By University of Teramo

  • White Papers // Jul 2008

    Formal Specification and Verification of a Secure Micropayment Protocol

    As online businesses keep growing and web services become pervasive, there is an increasing demand for micro-payment protocols that facilitate micro-commerce, namely selling content and services for small amounts of money (possibly less than one cent per transaction), which cannot be handled efficiently by credit cards due to substantial per...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Towards an Optimal User Association in Heterogeneous Cellular Networks

    The authors investigate how a heterogeneous cellular network should self-organize by proposing a load-aware user association scheme. This is an important consideration, in order to move traffic off congested cells and onto more lightly loaded cells. Although the network-wide optimal association problem is NP hard, a closely related utility maximization...

    Provided By University of Teramo

  • White Papers // Mar 2012

    Secret Key Extraction From Wireless Signal Strength in Real Environments

    The authors evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the Received Signal Strength (RSS) variations on the wireless channel between the two devices. They use real world measurements of RSS in a variety of environments and settings. The results from their experiments...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis

    The authors develop a general downlink model for multi-antenna Heterogeneous cellular Networks (HetNets), where Base Stations (BSs) across tiers may differ in terms of transmit power, target Signal-to-Interference-Ratio (SIR), deployment density, number of transmit antennas and the type of multi-antenna transmission. In particular, they consider and compare Space Division Multiple...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications

    The growing popularity of Machine-To-Machine (M2M) communications in cellular networks is driving the need to optimize networks based on the characteristics of M2M, which are significantly different from the requirements that current networks are designed to meet. First, M2M requires large number of short sessions as opposed to small number...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Sep 2012

    On Resource Allocation for Machine-to-Machine (M2M) Communications in Cellular Networks

    Cellular networks are an attractive option for handling the growing number of sensing and monitoring devices due to their ubiquitous presence. While this growing popularity of cellular network based Machine-To-Machine (M2M) communications is opening new avenues for the mobile network operators, it is also bringing forth new system design challenges...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Load-Aware Heterogeneous Cellular Networks: Modeling and SIR Distribution

    Heterogeneous Cellular Networks (HCNs) are characterized by cells whose coverage areas may vary by orders of magnitude. It is natural therefore that their user populations (and hence traffic loads) will vary similarly. Yet, to date, random spatial models developed for HCNs generally assume that all Base Stations (BSs) are always...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Pairwise Interaction Processes for Modeling Cellular Network Topology

    In industry, cellular tower locations have primarily been modeled by a deterministic hexagonal grid. Since real deployments are rarely regular, the even spacing between nodes in the grid and constant Voronoi cell areas make the hexagonal grid unrealistic. In this paper, the authors use tools from spatial statistics to show...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Performance Analysis of 3-D Monolithic Integrated Circuits

    3-D integration provides an effective platform for realizing future gigascale circuits by integrating multiple layers of active devices on a single 3D chip. 3-D Monolithic Integration (3DMI), also termed as sequential integration, is a potential technology for future gigascale circuits. Since the device layers are processed in sequential order, the...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Elastic Refresh: Techniques to Mitigate Refresh Penalties in High Density Memory

    High density memory is becoming more important as many execution streams are consolidated onto single chip many-core processors. DRAM is ubiquitous as a main memory technology, but while DRAM's per-chip density and frequency continue to scale, the time required to refresh its dynamic cells has grown at an alarming rate....

    Provided By University of Teramo

  • White Papers // Aug 2008

    Energy-Aware Application Scheduling on a Heterogeneous Multi-core System

    Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workload. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to matching cores that can deliver the...

    Provided By University of Teramo

  • White Papers // Nov 2009

    A Bandwidth-aware Memory-subsystem Resource Management using Non-invasive Resource Profilers for Large CMP Systems

    By integrating multiple cores in a single chip, Chip Multi-Processors (CMP) provides an attractive approach to improve both system throughput and efficiency. This integration allows the sharing of on-chip resources which may lead to destructive interference between the executing workloads. Memory-subsystem is an important shared resource that contributes significantly to...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation

    The authors propose a set of statistical metrics for making a comprehensive, fair, and insightful evaluation of features, clustering algorithms, and distance measures in representative sampling techniques for microprocessor simulation. Their evaluation of clustering algorithms using these metrics shows that CLARANS clustering algorithm produces better quality clusters in the feature...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Avoiding Store Misses to Fully Modified Cache Blocks

    Memory bandwidth limitation is one of the major impediments to high-performance microprocessors. This paper investigates a class of store misses that can be eliminated to reduce data traffic. Those store misses fetch cache blocks whose original data is never used. If fully overwritten by subsequent stores, those blocks can be...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Enhanced Hierarchical Instruction Scheduling For Tiled Data Flow Architectures

    Increasing on-chip wire delay along with the distributed nature of processing elements makes instruction scheduling for tiled data flow architectures very crucial. The authors' analysis reveals that careful placement of most frequently executed sections of applications, and directly addressing resource contention can significantly improve the performance of the application. The...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Automated di/dt Stressmark Generation for Microprocessor Power Delivery Networks

    In this paper, the authors propose a method for automated di/dt stressmark generation to test maximum voltage droop in a microprocessor power delivery network. The di/dt stressmark is an instruction sequence which draws periodic high and low current pulses that maximize voltage fluctuations including voltage droops. In order to automate...

    Provided By University of Teramo

  • White Papers // Nov 2012

    AUDIT: Stress Testing the Automatic Way

    Sudden variations in current (large di/dt) can lead to significant power supply voltage droops and timing errors in modern microprocessors. Several papers discuss the complexity involved with developing test programs, also known as stressmarks, to stress the system. Authors of these papers produced tools and methodologies to generate stressmarks automatically...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering

    With ever increasing network traffic rates, multicore architectures for network processors have successfully provided performance improvements through high parallelism. However, naively allocating the network traffic to multiple cores without considering diversified application nature and flow locality results in issues such as packet reordering, load imbalance and inefficient cache usage. Consequently,...

    Provided By University of Teramo

  • White Papers // Jun 2007

    Dynamic Predication of Indirect Jumps

    Indirect jumps are used to implement increasingly common programming language constructs such as virtual function calls, switch-case statements, jump tables, and interface calls. Unfortunately, the prediction accuracy of indirect jumps has remained low because many indirect jumps have multiple targets that are difficult to predict even with specialized hardware. This...

    Provided By University of Teramo

  • White Papers // Jun 2010

    PrEsto: An FPGA-Accelerated Power Estimation Methodology for Complex Systems

    Reduced or bounded power consumption has become a first-order requirement for modern hardware design. As a design progresses and more detailed information becomes available, more accurate power estimations become possible but at the cost of significantly slower simulation speeds. Power simulation that is both sufficiently-accurate and fast would have a...

    Provided By University of Teramo