University of Teramo

Displaying 81-108 of 108 results

  • White Papers // May 2011

    Spatial Reuse and Fairness of Mobile Ad-Hoc Networks With Channel-Aware CSMA Protocols

    The authors investigate the benefits of channel-aware (opportunistic) scheduling of transmissions in ad-hoc networks. The key challenge in optimizing the performance of such systems is finding a good compromise among three interdependent quantities: the density and channel quality of scheduled transmitters, and the resulting interference at receivers. They propose two...

    Provided By University of Teramo

  • White Papers // May 2011

    Distributed SemanticWeb Data Management in HBase and MySQL Cluster

    Various computing and data resources on the web are being enhanced with machine-interpretable semantic descriptions to facilitate better search, discovery and integration. This interconnected metadata constitutes the semantic web, whose volume can potentially grow the scale of the web. Efficient management of semantic web data, expressed using the w3c's Resource...

    Provided By University of Teramo

  • White Papers // Mar 2011

    The Optimal Inflation Rate Revisited

    The authors challenge the widely held belief that New Keynesian models cannot predict an optimal positive inflation rate. In fact they find that even for the US economy, characterized by relatively small government size, optimal trend inflation is justified by the Phelps argument that the inflation tax should be part...

    Provided By University of Teramo

  • White Papers // Feb 2011

    Static Timing Analysis for Modeling QoS in Networks on Chip

    Networks-on-Chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC's shared resources, Quality of Service and resource allocation are major concerns for system designers. In particular, a model for the properties of packet delivery through the network is desirable. The authors...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Achieving Leakage Resilience Through Dual System Encryption

    In this paper, the authors show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduced by waters. They demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks

    Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. The authors identify the challenges...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Performance Analysis of 3-D Monolithic Integrated Circuits

    3-D integration provides an effective platform for realizing future gigascale circuits by integrating multiple layers of active devices on a single 3D chip. 3-D Monolithic Integration (3DMI), also termed as sequential integration, is a potential technology for future gigascale circuits. Since the device layers are processed in sequential order, the...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Elastic Refresh: Techniques to Mitigate Refresh Penalties in High Density Memory

    High density memory is becoming more important as many execution streams are consolidated onto single chip many-core processors. DRAM is ubiquitous as a main memory technology, but while DRAM's per-chip density and frequency continue to scale, the time required to refresh its dynamic cells has grown at an alarming rate....

    Provided By University of Teramo

  • White Papers // Sep 2010

    Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness

    In this paper, the authors characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, including indoor and outdoor transmissions, under various spectrum (white space) detection techniques. Each technique delivers a different degree of RF-environment awareness - the more...

    Provided By University of Teramo

  • White Papers // Jun 2010

    PrEsto: An FPGA-Accelerated Power Estimation Methodology for Complex Systems

    Reduced or bounded power consumption has become a first-order requirement for modern hardware design. As a design progresses and more detailed information becomes available, more accurate power estimations become possible but at the cost of significantly slower simulation speeds. Power simulation that is both sufficiently-accurate and fast would have a...

    Provided By University of Teramo

  • White Papers // Jun 2010

    The Two Way Wiretap Channel: Theory and Practice

    In this paper, the authors considers the two way wiretap channel in which two legitimate users, Alice and Bob, wish to exchange messages securely in the presence of a passive eavesdropper Eve. In the full duplex scenario, where each node can transmit and receive simultaneously, they obtain new achievable secrecy...

    Provided By University of Teramo

  • White Papers // May 2010

    Trend Inflation, Endogenous Mark-ups And The Non-vertical Phillips Curve

    Recent developments in macroeconomics resurrect the view that welfare costs of inflation arise because the latter acts as a tax on money balances. Empirical contributions show that wage re-negotiations take place while expiring contracts are still in place. Bringing these seemingly unrelated aspects together in a stylized general equilibrium model,...

    Provided By University of Teramo

  • White Papers // Apr 2010

    DataGuard: Dynamic Data Attestation in Wireless Sensor Networks

    Attestation has become a promising approach for ensuring software integrity in wireless sensor networks. However, current attestation either focuses on static system properties, e.g., code integrity, or requires hardware support such as Trusted Platform Module (TPM). However, there are attacks exploiting vulnerabilities that do not violate static system properties, and...

    Provided By University of Teramo

  • White Papers // Apr 2010

    Detecting Vulnerabilities in C Programs Using Trace-Based Testing

    Security testing has gained significant attention recently due to frequent attacks against software systems. This paper presents a trace-based security testing approach. It reuses test cases generated from previous testing methods to produce execution traces. An execution trace is a sequence of program statements exercised by a test case. Each...

    Provided By University of Teramo

  • White Papers // Mar 2010

    Adaptive Jamming-Resistant Broadcast Systems With Partial Channel Sharing

    Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know such spread pattern to invest much more effort to launch attacks. However, in broadcast systems, jammers can...

    Provided By University of Teramo

  • White Papers // Jan 2010

    Fiscal And Monetary Interaction Under Monetary Policy Uncertainty

    Despite the increasing number of studies on monetary policy uncertainty, its role on the strategic interaction between fiscal and monetary policies has not been fully explored. The authors' paper aims to fill this gap by evaluating the consequences produced by multiplicative uncertainty in such a context. Nowadays one of the...

    Provided By University of Teramo

  • White Papers // Dec 2009

    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

    The authors construct a fully secure HIBE scheme with short cipher-texts. The previous construction of the researchers was only proven to be secure in the selective model, under a non-static assumption which depended on the depth of the hierarchy. To obtain full security, they apply the dual system encryption concept...

    Provided By University of Teramo

  • White Papers // Nov 2009

    A Bandwidth-aware Memory-subsystem Resource Management using Non-invasive Resource Profilers for Large CMP Systems

    By integrating multiple cores in a single chip, Chip Multi-Processors (CMP) provides an attractive approach to improve both system throughput and efficiency. This integration allows the sharing of on-chip resources which may lead to destructive interference between the executing workloads. Memory-subsystem is an important shared resource that contributes significantly to...

    Provided By University of Teramo

  • White Papers // Jul 2009

    Design Methodology for Clocked Storage Elements Robust to Process Variations

    As semiconductor technology scales down, process variations start to cause increasingly detrimental impact on the performance of integrated circuit. Starting with 65- nm CMOS technology, the sensitivity to process variation became significantly large. In this paper, the authors address the effects of process variations on the performance of clocked storage...

    Provided By University of Teramo

  • White Papers // May 2009

    Cooperative Binning and Channel Prefixing for Secrecy in Interference Channels

    In this paper, the authors investigate the fundamental performance limits of the two-user interference channel in the presence of an external eavesdropper. In this setting, they construct an inner bound, to the secrecy capacity region, based on the idea of cooperative binning and channel prefixing in which the two users...

    Provided By University of Teramo

  • White Papers // May 2009

    Resilient Cluster Leader Election for Wireless Sensor Networks

    Sensor nodes are often organized into clusters for efficiency and scalability purposes. Every sensor cluster is managed by a cluster leader during the network operation such as routing and data aggregation. Since managing a cluster consumes substantial energy, the cluster leader needs to be re-elected from time to time for...

    Provided By University of Teramo

  • White Papers // Mar 2009

    Protecting Neighbor Discovery Against Node Compromises in Sensor Networks

    The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile environments. However, these methods can only protect neighbor relations between benign nodes. A compromised node can easily circumvent them and setup false neighbor relations...

    Provided By University of Teramo

  • White Papers // Aug 2008

    Energy-Aware Application Scheduling on a Heterogeneous Multi-core System

    Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workload. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to matching cores that can deliver the...

    Provided By University of Teramo

  • White Papers // Jul 2008

    Formal Specification and Verification of a Secure Micropayment Protocol

    As online businesses keep growing and web services become pervasive, there is an increasing demand for micro-payment protocols that facilitate micro-commerce, namely selling content and services for small amounts of money (possibly less than one cent per transaction), which cannot be handled efficiently by credit cards due to substantial per...

    Provided By University of Teramo

  • White Papers // Jun 2007

    Dynamic Predication of Indirect Jumps

    Indirect jumps are used to implement increasingly common programming language constructs such as virtual function calls, switch-case statements, jump tables, and interface calls. Unfortunately, the prediction accuracy of indirect jumps has remained low because many indirect jumps have multiple targets that are difficult to predict even with specialized hardware. This...

    Provided By University of Teramo

  • White Papers // Dec 2006

    Machine Learning for On-Line Hardware Reconfiguration

    As computer systems continue to increase in complexity, the need for AI-based solutions is becoming more urgent. For example, high-end servers that can be partitioned into logical subsystems and repartitioned on the fly are now becoming available. This development raises the possibility of reconfiguring distributed systems online to optimize for...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation

    The authors propose a set of statistical metrics for making a comprehensive, fair, and insightful evaluation of features, clustering algorithms, and distance measures in representative sampling techniques for microprocessor simulation. Their evaluation of clustering algorithms using these metrics shows that CLARANS clustering algorithm produces better quality clusters in the feature...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Avoiding Store Misses to Fully Modified Cache Blocks

    Memory bandwidth limitation is one of the major impediments to high-performance microprocessors. This paper investigates a class of store misses that can be eliminated to reduce data traffic. Those store misses fetch cache blocks whose original data is never used. If fully overwritten by subsequent stores, those blocks can be...

    Provided By University of Teramo

  • White Papers // Jun 2007

    Dynamic Predication of Indirect Jumps

    Indirect jumps are used to implement increasingly common programming language constructs such as virtual function calls, switch-case statements, jump tables, and interface calls. Unfortunately, the prediction accuracy of indirect jumps has remained low because many indirect jumps have multiple targets that are difficult to predict even with specialized hardware. This...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Automated di/dt Stressmark Generation for Microprocessor Power Delivery Networks

    In this paper, the authors propose a method for automated di/dt stressmark generation to test maximum voltage droop in a microprocessor power delivery network. The di/dt stressmark is an instruction sequence which draws periodic high and low current pulses that maximize voltage fluctuations including voltage droops. In order to automate...

    Provided By University of Teramo

  • White Papers // Nov 2012

    AUDIT: Stress Testing the Automatic Way

    Sudden variations in current (large di/dt) can lead to significant power supply voltage droops and timing errors in modern microprocessors. Several papers discuss the complexity involved with developing test programs, also known as stressmarks, to stress the system. Authors of these papers produced tools and methodologies to generate stressmarks automatically...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Enhanced Hierarchical Instruction Scheduling For Tiled Data Flow Architectures

    Increasing on-chip wire delay along with the distributed nature of processing elements makes instruction scheduling for tiled data flow architectures very crucial. The authors' analysis reveals that careful placement of most frequently executed sections of applications, and directly addressing resource contention can significantly improve the performance of the application. The...

    Provided By University of Teramo

  • White Papers // Nov 2009

    A Bandwidth-aware Memory-subsystem Resource Management using Non-invasive Resource Profilers for Large CMP Systems

    By integrating multiple cores in a single chip, Chip Multi-Processors (CMP) provides an attractive approach to improve both system throughput and efficiency. This integration allows the sharing of on-chip resources which may lead to destructive interference between the executing workloads. Memory-subsystem is an important shared resource that contributes significantly to...

    Provided By University of Teramo

  • White Papers // Aug 2008

    Energy-Aware Application Scheduling on a Heterogeneous Multi-core System

    Heterogeneous multi-core processors are attractive for power efficient computing because of their ability to meet varied resource requirements of diverse applications in a workload. However, one of the challenges of using a heterogeneous multi-core processor is to schedule different programs in a workload to matching cores that can deliver the...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Avoiding Store Misses to Fully Modified Cache Blocks

    Memory bandwidth limitation is one of the major impediments to high-performance microprocessors. This paper investigates a class of store misses that can be eliminated to reduce data traffic. Those store misses fetch cache blocks whose original data is never used. If fully overwritten by subsequent stores, those blocks can be...

    Provided By University of Teramo

  • White Papers // Feb 2006

    Analyzing and Improving Clustering Based Sampling for Microprocessor Simulation

    The authors propose a set of statistical metrics for making a comprehensive, fair, and insightful evaluation of features, clustering algorithms, and distance measures in representative sampling techniques for microprocessor simulation. Their evaluation of clustering algorithms using these metrics shows that CLARANS clustering algorithm produces better quality clusters in the feature...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Elastic Refresh: Techniques to Mitigate Refresh Penalties in High Density Memory

    High density memory is becoming more important as many execution streams are consolidated onto single chip many-core processors. DRAM is ubiquitous as a main memory technology, but while DRAM's per-chip density and frequency continue to scale, the time required to refresh its dynamic cells has grown at an alarming rate....

    Provided By University of Teramo

  • White Papers // Mar 2013

    Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering

    With ever increasing network traffic rates, multicore architectures for network processors have successfully provided performance improvements through high parallelism. However, naively allocating the network traffic to multiple cores without considering diversified application nature and flow locality results in issues such as packet reordering, load imbalance and inefficient cache usage. Consequently,...

    Provided By University of Teramo

  • White Papers // May 2013

    Anon-Pass: Practical Anonymous Subscriptions

    The authors present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Enterprise Integration Issues Encountered with Agile Process Introduction

    This paper describes research that explored the issues likely to be encountered when an agile process is introduced into a traditional environment. The methodology used considers strategic, cultural, and process integration issues in the implementation of advanced technologies. The methodology is used to define upstream/downstream process integration issues and impact...

    Provided By University of Teramo

  • White Papers // Dec 2006

    Machine Learning for On-Line Hardware Reconfiguration

    As computer systems continue to increase in complexity, the need for AI-based solutions is becoming more urgent. For example, high-end servers that can be partitioned into logical subsystems and repartitioned on the fly are now becoming available. This development raises the possibility of reconfiguring distributed systems online to optimize for...

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // May 2011

    Distributed SemanticWeb Data Management in HBase and MySQL Cluster

    Various computing and data resources on the web are being enhanced with machine-interpretable semantic descriptions to facilitate better search, discovery and integration. This interconnected metadata constitutes the semantic web, whose volume can potentially grow the scale of the web. Efficient management of semantic web data, expressed using the w3c's Resource...

    Provided By University of Teramo

  • White Papers // Jul 2012

    An Exploratory Study of the Security Management Practices of Hispanic Students

    The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users' understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management...

    Provided By University of Teramo

  • White Papers // Jul 2013

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    Data protection in public cloud remains a challenging problem. Outsourced data processing on vulnerable cloud platforms may suffer from cross-VM attacks, e.g. side-channel attacks that leak secrecy keys. The authors design and develop CloudSafe, a general and practical data-protection solution by integrating cryptographic techniques and systematic mechanisms seamlessly to address...

    Provided By University of Teramo

  • White Papers // Jul 2008

    Formal Specification and Verification of a Secure Micropayment Protocol

    As online businesses keep growing and web services become pervasive, there is an increasing demand for micro-payment protocols that facilitate micro-commerce, namely selling content and services for small amounts of money (possibly less than one cent per transaction), which cannot be handled efficiently by credit cards due to substantial per...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect...

    Provided By University of Teramo

  • White Papers // Dec 2009

    New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

    The authors construct a fully secure HIBE scheme with short cipher-texts. The previous construction of the researchers was only proven to be secure in the selective model, under a non-static assumption which depended on the depth of the hierarchy. To obtain full security, they apply the dual system encryption concept...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Achieving Leakage Resilience Through Dual System Encryption

    In this paper, the authors show that strong leakage resilience for cryptosystems with advanced functionalities can be obtained quite naturally within the methodology of dual system encryption, recently introduced by waters. They demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Performance Analysis of Spin Transfer Torque Random Access Memory With Cross Shaped Free Layer Using Heusler Alloys by Using Micromagnetic Studies

    The authors investigated the performance of Spin Transfer Torque Random Access Memory (STT-RAM) cell with cross shaped Heusler compound based free layer using micro-magnetic simulations. They designed the free layer using Cobalt based Heusler compounds. Here in this paper, simulation results predict that switching time from one state to other...

    Provided By University of Teramo

  • White Papers // Jun 2010

    PrEsto: An FPGA-Accelerated Power Estimation Methodology for Complex Systems

    Reduced or bounded power consumption has become a first-order requirement for modern hardware design. As a design progresses and more detailed information becomes available, more accurate power estimations become possible but at the cost of significantly slower simulation speeds. Power simulation that is both sufficiently-accurate and fast would have a...

    Provided By University of Teramo

  • White Papers // Apr 2014

    A Constrained Matrix-Variate Gaussian Process for Transposable Data

    Transposable data represents interactions among two sets of entities, and are typically represented as a matrix containing the known interaction values. Additional side information may consist of feature vectors specific to entities corresponding to the rows and/or columns of such a matrix. Further information may also be available in the...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Performance Analysis of 3-D Monolithic Integrated Circuits

    3-D integration provides an effective platform for realizing future gigascale circuits by integrating multiple layers of active devices on a single 3D chip. 3-D Monolithic Integration (3DMI), also termed as sequential integration, is a potential technology for future gigascale circuits. Since the device layers are processed in sequential order, the...

    Provided By University of Teramo

  • White Papers // Jul 2013

    VABKS: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

    It is quite common now-a-days for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: how can the authorized data users search over a data owner's outsourced encrypted...

    Provided By University of Teramo

  • White Papers // Oct 2013

    How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

    The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of...

    Provided By University of Teramo

  • White Papers // Nov 2013

    Verifying Computations with State

    When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent paper in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems. However,...

    Provided By University of Teramo