University of Teramo

Displaying 1-40 of 106 results

  • White Papers // Apr 2014

    A Constrained Matrix-Variate Gaussian Process for Transposable Data

    Transposable data represents interactions among two sets of entities, and are typically represented as a matrix containing the known interaction values. Additional side information may consist of feature vectors specific to entities corresponding to the rows and/or columns of such a matrix. Further information may also be available in the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Performance Analysis of Spin Transfer Torque Random Access Memory With Cross Shaped Free Layer Using Heusler Alloys by Using Micromagnetic Studies

    The authors investigated the performance of Spin Transfer Torque Random Access Memory (STT-RAM) cell with cross shaped Heusler compound based free layer using micro-magnetic simulations. They designed the free layer using Cobalt based Heusler compounds. Here in this paper, simulation results predict that switching time from one state to other...

    Provided By University of Teramo

  • White Papers // Jan 2014

    2D-Proling: Detecting Input-Dependent Branches with a Single Input Data Set

    Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensive in terms of resources and compilation time. The authors introduce a new mechanism, 2D-proling, which proles with only one input set and predict whether the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Profile-Assisted Compiler Support for Dynamic Predication in Diverge-Merge Processors

    Dynamic predication has been proposed to reduce the branch mis-prediction penalty due to hard-to-predict branch instructions. Recently proposed dynamic predication architecture, the Diverge-Merge Processor (DMP), provides large performance improvements by dynamically predicating a large set of complex control-flow graphs that result in branch mis-predictions. DMP requires significant support from a...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and Recovery

    Control and data speculation are widely used to improve processor performance. Correct speculation can reduce execution time, but incorrect speculation can lead to increased execution time and greater energy consumption. This paper proposes a mechanism to leverage unexpected program behavior, called wrong-path events that occur during periods of incorrect speculation....

    Provided By University of Teramo

  • White Papers // Jan 2014

    Enhanced Hierarchical Instruction Scheduling For Tiled Data Flow Architectures

    Increasing on-chip wire delay along with the distributed nature of processing elements makes instruction scheduling for tiled data flow architectures very crucial. The authors' analysis reveals that careful placement of most frequently executed sections of applications, and directly addressing resource contention can significantly improve the performance of the application. The...

    Provided By University of Teramo

  • White Papers // Nov 2013

    Verifying Computations with State

    When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent paper in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems. However,...

    Provided By University of Teramo

  • White Papers // Oct 2013

    How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

    The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of...

    Provided By University of Teramo

  • White Papers // Jul 2013

    VABKS: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

    It is quite common now-a-days for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: how can the authorized data users search over a data owner's outsourced encrypted...

    Provided By University of Teramo

  • White Papers // Jul 2013

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    Data protection in public cloud remains a challenging problem. Outsourced data processing on vulnerable cloud platforms may suffer from cross-VM attacks, e.g. side-channel attacks that leak secrecy keys. The authors design and develop CloudSafe, a general and practical data-protection solution by integrating cryptographic techniques and systematic mechanisms seamlessly to address...

    Provided By University of Teramo

  • White Papers // Jun 2013

    Scalable and Memory-Efficient Clustering of Large-Scale Social Networks

    Clustering of social networks is an important task for their analysis; however, most existing algorithms do not scale to the massive size of today's social networks. A popular class of graph clustering algorithms for large-scale networks, such as PMetis, KMetis and Graclus, is based on a multilevel framework. Generally, these...

    Provided By University of Teramo

  • White Papers // May 2013

    Anon-Pass: Practical Anonymous Subscriptions

    The authors present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user...

    Provided By University of Teramo

  • White Papers // May 2013

    A Comprehensive Framework for Device-to-Device Communications in Cellular Networks

    Device-To-Device (D2D) in cellular networks is a promising concept which opens up new opportunities for commercial applications but also brings new challenges for network management. In this paper, the authors propose a tractable hybrid network model where the positions of transceivers are modeled by random spatial Poisson Point Processes (PPP)....

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Optimal Spectrum Partition and Mode Selection in Device-to-Device Overlaid Cellular Networks

    In this paper, the authors jointly address two fundamental issues in Device-To-Device (D2D) overlaid cellular networks: how to partition the spectrum assuming orthogonal cellular and D2D transmissions, and what is the optimal threshold for distance-based D2D mode selection? To this end, they first derive rate expressions for both cellular and...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering

    With ever increasing network traffic rates, multicore architectures for network processors have successfully provided performance improvements through high parallelism. However, naively allocating the network traffic to multiple cores without considering diversified application nature and flow locality results in issues such as packet reordering, load imbalance and inefficient cache usage. Consequently,...

    Provided By University of Teramo

  • White Papers // Mar 2013

    A Novel Approach to Supporting Legacy Devices in LTE Networks

    The explosive growth in data traffic is resulting in a spectrum crunch forcing many wireless network operators to look towards refarming their 2G spectrum and deploy more spectrally efficient Long Term Evolution (LTE) technology. However, mobile network operators face a challenge when it comes to spectrum refarming because 2G technologies...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation

    Minimum Spanning Tree (MST) problems play an important role in many networking applications, such as routing and network planning. In many cases, such as wireless ad-hoc networks, this requires efficient high-performance and low-power implementations that can run at regular intervals in real time on embedded platforms. In this paper, the...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Model Checking Invariant Security Properties in OpenFlow

    The OpenFlow (OF) switching specification represents an innovative and open standard for enabling the dynamic programming of flow control policies in production networks. Unfortunately, thus far researchers have paid little attention to the development of methods for verifying that dynamic flow policies inserted within an OpenFlow network do not violate...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Optimal Locally Repairable Codes With Local Minimum Storage Regeneration Via Rank-Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems. The codes possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Explicit MBR All-Symbol Locality Codes

    Node failures are inevitable in Distributed Storage Systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: regenerating codes, i.e., codes that minimize the total repair bandwidth; and local codes, which minimize the number of nodes participating in the repair process. This paper focuses...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Dynamic Spectrum Refarming With Overlay for Legacy Devices

    The exponentially growing demand for wireless traffic is straining cellular networks. According to Cisco's report, in 2011 global mobile data traffic doubled for the fourth year in a row and was eight times the traffic of the entire global Internet in 2000. Cisco further expects that global mobile data traffic...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Optimal Locally Repairable Codes Via Rank Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides new...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Secure Locally Repairable Codes for Distributed Storage Systems

    Data intensive and data generative applications are increasingly pervasive, ranging from social networking to multimedia uploads. Thus, storage in the "Cloud" is gaining prominence, where individuals and institutions use distributed storage services whose physical structure and location is mostly unknown to the user. This paper designs coding schemes for Distributed...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Secrecy Capacity of Minimum Bandwidth Cooperative Regenerating Codes

    Regenerating codes enable trading off repair bandwidth for storage in Distributed Storage Systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may be susceptible to multiple node failures. This paper analyzes storage systems that employ cooperative regenerating codes that are robust to passive...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis

    The authors develop a general downlink model for multi-antenna Heterogeneous cellular Networks (HetNets), where Base Stations (BSs) across tiers may differ in terms of transmit power, target Signal-to-Interference-Ratio (SIR), deployment density, number of transmit antennas and the type of multi-antenna transmission. In particular, they consider and compare Space Division Multiple...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Automated di/dt Stressmark Generation for Microprocessor Power Delivery Networks

    In this paper, the authors propose a method for automated di/dt stressmark generation to test maximum voltage droop in a microprocessor power delivery network. The di/dt stressmark is an instruction sequence which draws periodic high and low current pulses that maximize voltage fluctuations including voltage droops. In order to automate...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications

    The growing popularity of Machine-To-Machine (M2M) communications in cellular networks is driving the need to optimize networks based on the characteristics of M2M, which are significantly different from the requirements that current networks are designed to meet. First, M2M requires large number of short sessions as opposed to small number...

    Provided By University of Teramo

  • White Papers // Jan 2013

    1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels

    Recently, a new WDM optical network infrastructure named SMART, which is capable of dynamically setting up, modifying, and tearing down optical connections, was proposed. The performance of SMART is determined by the performance of its hyper-channels, which are essentially optical buses or light-trails. Previously proposed MAC protocols for unidirectional optical...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Enterprise Integration Issues Encountered with Agile Process Introduction

    This paper describes research that explored the issues likely to be encountered when an agile process is introduced into a traditional environment. The methodology used considers strategic, cultural, and process integration issues in the implementation of advanced technologies. The methodology is used to define upstream/downstream process integration issues and impact...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resource Allocation: Realizing Mean-Variability-Fairness Tradeoffs

    Network Utility Maximization (NUM) provides a key conceptual framework to study reward allocation amongst a collection of users/entities in disciplines as diverse as economics, law and engineering. In network engineering, this framework has been particularly insightful towards understanding how Internet protocols allocate bandwidth, and motivated diverse research efforts on distributed...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Fundamentals of Mobility in Cellular Networks: Modeling and Analysis

    Mobility modeling and analysis is a key issue in wireless networks. In this paper, the authors propose a new and quite general Random WayPoint (RWP) mobility model which is valid over the entire plane. They derive key properties of the proposed mobility model including transition length, transition time and spatial...

    Provided By University of Teramo

  • White Papers // Nov 2012

    A Non-asymptotic Throughput for Massive MIMO Cellular Uplink with Pilot Reuse

    This paper considers an uplink massive MIMO scheme that employs a pilot reuse scheme. For the massive MIMO scheme, a non-asymptotic cell throughput lower bound that is valid for any M is derived and the bound is shown to be tight by simulations. The lower bound is dependent upon three...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Towards an Optimal User Association in Heterogeneous Cellular Networks

    The authors investigate how a heterogeneous cellular network should self-organize by proposing a load-aware user association scheme. This is an important consideration, in order to move traffic off congested cells and onto more lightly loaded cells. Although the network-wide optimal association problem is NP hard, a closely related utility maximization...

    Provided By University of Teramo

  • White Papers // Mar 2011

    The Optimal Inflation Rate Revisited

    The authors challenge the widely held belief that New Keynesian models cannot predict an optimal positive inflation rate. In fact they find that even for the US economy, characterized by relatively small government size, optimal trend inflation is justified by the Phelps argument that the inflation tax should be part...

    Provided By University of Teramo

  • White Papers // May 2010

    Trend Inflation, Endogenous Mark-ups And The Non-vertical Phillips Curve

    Recent developments in macroeconomics resurrect the view that welfare costs of inflation arise because the latter acts as a tax on money balances. Empirical contributions show that wage re-negotiations take place while expiring contracts are still in place. Bringing these seemingly unrelated aspects together in a stylized general equilibrium model,...

    Provided By University of Teramo

  • White Papers // Jan 2010

    Fiscal And Monetary Interaction Under Monetary Policy Uncertainty

    Despite the increasing number of studies on monetary policy uncertainty, its role on the strategic interaction between fiscal and monetary policies has not been fully explored. The authors' paper aims to fill this gap by evaluating the consequences produced by multiplicative uncertainty in such a context. Nowadays one of the...

    Provided By University of Teramo

  • White Papers // May 2012

    Fast Jamming Detection in Sensor Networks

    Wireless Sensor Networks (WSN) are vulnerable to jamming attacks where an adversary injects strong noises to interfere with the normal transmission. It is crucial to detect such jamming attacks as fast as possible. Existing studies have shown that an effective indicator of jamming is the Packet Delivery Ratio (PDR). However,...

    Provided By University of Teramo

  • White Papers // May 2012

    Interference Reduction on Cellular Networks With Large Antenna Arrays

    In this paper, the authors analyze the behavior of the downlink of a cellular network as the number of its base station antennas tends to infinity. In this case, additive noise vanishes. Nonetheless, the fact that multiple users in different cells transmit non-orthogonal pilot sequences results in the contamination of...

    Provided By University of Teramo

  • White Papers // May 2012

    Regenerator Pool Site Selection for Mixed Line Rate Optical Networks

    In this paper, the authors study the problem of Regenerator Pool Site Selection for Mixed Line Rate optical networks (MLRRPSS), with the objective of minimizing the number of regenerator pool sites for a given set of requests. They first provide the problem definition of MLR-RPSS and show that the MLR-RPSS...

    Provided By University of Teramo

  • White Papers // May 2012

    Laser & Detector Placement in MIMO Multimode Optical Fiber Systems

    Multi-Mode Fibers (MMFs) offer a cost-effective connection solution for small and medium length networks. However, data rates through multimode fibers are traditionally limited by modal dispersion. Signal processing and Multiple-Input Multiple-Output (MIMO) have been shown to be effective at combating these limitations, but device design for the specific purpose of...

    Provided By University of Teramo

  • White Papers // May 2012

    Blind Phase Noise Compensation for SC-FDMA With Application to LTE-Uplink

    The authors propose an iterative joint detection and phase noise compensation scheme for single-carrier frequency-division multiple-access systems. Their proposed scheme does not require any pilots in tracking the phase noise and assumes no knowledge about the phase noise model to avoid model mismatch problems. Simulation results show the effectiveness of...

    Provided By University of Teramo

  • White Papers // May 2012

    Alien Crosstalk Mitigation in Vectored DSL Systems for Backhaul Applications

    The performance of Digital Subscriber Line (DSL) systems, such as ADSL and VDSL is limited by crosstalk. Suppression of in-domain far-end self crosstalk using vectoring technology enables very high bidirectional data rates over twisted-pairs of copper wires. However, the performance of vectored DSL systems is severely degraded in the presence...

    Provided By University of Teramo

  • White Papers // May 2012

    Low Complexity Precoding for Large Millimeter Wave MIMO Systems

    Millimeter Wave (mm-Wave) systems must overcome heavy signal attenuation to support high-throughput wireless communication links. The small wavelength in mm-Wave systems enables beamforming using large antenna arrays to combat path loss with directional transmission. Beamforming with multiple data streams, known as pre-coding, can be used to achieve even higher performance....

    Provided By University of Teramo

  • White Papers // May 2012

    Service Time Estimation in Multiple-Rate IEEE 802.11 WLANs With and Without Opportunistic Cooperative Mechanism Under Unsaturated Load Conditions

    Wireless media servers and real-time applications are becoming increasingly popular in most homes. Wireless network latency is a key factor in many applications. The objective of this paper is to derive an analytical framework to estimate the latency in terms of the average service time of the most used multiple-rate...

    Provided By University of Teramo

  • White Papers // May 2012

    Orthogonal Multicarrier Division Duplexing for Point-to-Point Communications

    Traditional communication systems adopt either Time Division Duplexing (TDD) or Frequency Division Duplexing (FDD). TDD requires guard interval and FDD needs guard band. Orthogonal Multicarrier Division Duplexing (MDD) is a new duplexing scheme, which can avoid both guard interval and guard band. In this paper, the authors propose a new...

    Provided By University of Teramo

  • White Papers // May 2012

    Compressive Sensing in Radar Sensor Networks Using Pulse Compression Waveforms

    Inspired by recent advances in Compressive Sensing (CS), the authors introduce CS to the Radar Sensor Network (RSN) using the pulse compression technique in order to efficiently compress, restore and recover the radar data. For the sake of simplicity but without losing generality, they study an RSN consisting of a...

    Provided By University of Teramo

  • White Papers // May 2012

    WLAN/Cellular Handover Analysis for Different Mobility Models

    With the proliferation of a multitude of diverse yet coexistent array of networks in the recent past, the heterogeneous environment is foreseen to serve Mobile Terminals (MT) in a complementary fashion at large. Multimodal MTs can now switch interfaces between Wireless Local Area Networks (WLAN) and the cellular network. In...

    Provided By University of Teramo

  • White Papers // May 2012

    Energy-Efficient Impairment-Constrained 3R Regenerator Placement in Optical Networks

    In this paper, the authors study the Energy-efficient Impairment-constrained Regenerator Placement (EIRP) problem with the objective of minimizing the total energy consumption in optical networks with mixed line rates. The destination of each path is guaranteed to receive the data correctly from the source based on the regenerator placement. They...

    Provided By University of Teramo

  • White Papers // May 2012

    Decoupling Wavelength Assignments in Dedicated Protection Switching Bidirectional Lightpath

    In a recent study about Wavelength Division Multiplexing (WDM) networks, the authors showed that by decoupling the wavelength assigned to the outward circuit from the wavelength assigned to the inward circuit of the same bidirectional unprotected light-path, it is possible to reduce the total required number of Wavelength Converters (WCs)...

    Provided By University of Teramo

  • White Papers // May 2012

    Hyperexponential Approximation of Channel Idle Time Distribution With Implication to Secondary Transmission Strategy

    Channel Idle Time Distribution (CITD) based secondary transmission strategies have been studied intensively in the literature. The performance of secondary devices are limited by the presumed CITD. But none of them provides a reasonable characterization of the CITD in reality. In this paper, the authors carefully examine the feature of...

    Provided By University of Teramo

  • White Papers // May 2012

    Sliding Window Technique for Dynamic Spectrum Sensing of an Asynchronous Primary User

    Dynamic spectrum allocation is the most efficient way of allocating spectrum and reliable spectrum sensing is the core functionality of that idea. While most of the energy detection techniques deal with the Additive White Gaussian Noise (AWGN) channel, few algorithms have been implemented to recognize vacant spectrum over frequency selective...

    Provided By University of Teramo

  • White Papers // Mar 2012

    A 38 GHz Cellular Outage Study for an Urban Outdoor Campus Environment

    Wireless systems require increasingly large system bandwidths that are only available at millimeter-wave frequencies. Such spectrum bands offer the potential for multi-gigabit-per-second data rates to low-cost massively broadband devices. To enable mobile outdoor millimeter-wave cellular-type applications, it is necessary to determine the coverage potential of base stations in real-world environments....

    Provided By University of Teramo

  • White Papers // May 2012

    Spectrum-Sharing Capacity Enhancement With Distributed Relaying

    Spectrum-sharing, aims to improve spectrum efficiency by allowing unlicensed (secondary) users to access the spectrum of licensed (primary) users, if the interference caused on the primary is tolerable. Thus, in order for the secondary to share the spectrum, it must effectively manage (reduce) interference on the primary. Multi-hop relaying and...

    Provided By University of Teramo

  • White Papers // May 2012

    DMT of MMSE Receiver in the Frequency Selective MIMO Channel

    The authors characterize the DMT of finite-length linear equalizers in the MIMO frequency-selective channel. They obtain the DMT in the case of cyclic-prefix transmission and provide an upper bound for the DMT in the case of zero-padding transmission. They also provide in-depth analysis for the diversity of the MMSE receiver...

    Provided By University of Teramo

  • White Papers // May 2012

    Cyclic Delay Transmission Achieves Full Diversity Without (Pre)Coding

    Cyclic Delay Diversity (CDD) is a simple method that converts transmit antenna diversity into frequency selectivity, thus allowing simple operation and use of conventional receivers to capture the diversity. This paper shows that single-carrier CDD methods are capable of producing diversity without channel coding or linear pre-coding, and that this...

    Provided By University of Teramo

  • White Papers // Jul 2012

    Modeling Heterogeneous Network Interference With Using Poisson Point Processes

    Cellular systems are becoming more heterogeneous with the introduction of low power nodes including femtocells, relays, and distributed antennas. Unfortunately, the resulting interference environment is also becoming more complicated, making evaluation of different communication strategies challenging in both analysis and simulation. This paper suggests a simplified interference model for heterogeneous...

    Provided By University of Teramo

  • White Papers // Sep 2012

    All about Eve: Execute-Verify Replication for Multi-Core Servers

    This paper presents Eve, a new Execute-Verify architecture that allows state machine replication to scale to multi-core servers. Eve departs from the traditional agree-execute architecture of state machine replication: replicas first execute groups of requests concurrently and then verify that they can reach agreement on a state and output produced...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resolving the Conflict Between Generality and Plausibility in Verified Computation

    The area of proof-based verified computation (outsourced computation built atop probabilistically checkable proofs and cryptographic machinery) has lately seen renewed interest. Although recent work has made great strides in reducing the overhead of naive applications of the theory, these schemes still cannot be considered practical. The core issue is that...

    Provided By University of Teramo

  • White Papers // Oct 2012

    Taking Proof-Based Verified Computation a Few Steps Closer to Practicality (Extended Version)

    The authors are motivated by outsourced computing: cloud computing (in which clients outsource computations to remote computers), peer-to-peer computing (in which peers outsource storage and computation to each other), volunteer computing (in which projects outsource computations to volunteers' desktops), etc. They describe GINGER, a built system for unconditional, general-purpose, and...

    Provided By University of Teramo

  • White Papers // Aug 2012

    New Constructions and Proof Methods for Large Universe Attribute-Based Encryption

    The authors propose two large universe Attribute-Based Encryption constructions. In a large universe ABE construction any string can be used as an attribute and attributes need not be enumerated at system setup. Their construction establishes a novel large universe Ciphertext-Policy ABE scheme on prime order bilinear groups and the other...

    Provided By University of Teramo

  • White Papers // May 2013

    A Comprehensive Framework for Device-to-Device Communications in Cellular Networks

    Device-To-Device (D2D) in cellular networks is a promising concept which opens up new opportunities for commercial applications but also brings new challenges for network management. In this paper, the authors propose a tractable hybrid network model where the positions of transceivers are modeled by random spatial Poisson Point Processes (PPP)....

    Provided By University of Teramo

  • White Papers // Feb 2013

    Dynamic Spectrum Refarming With Overlay for Legacy Devices

    The exponentially growing demand for wireless traffic is straining cellular networks. According to Cisco's report, in 2011 global mobile data traffic doubled for the fourth year in a row and was eight times the traffic of the entire global Internet in 2000. Cisco further expects that global mobile data traffic...

    Provided By University of Teramo

  • White Papers // Mar 2013

    A Novel Approach to Supporting Legacy Devices in LTE Networks

    The explosive growth in data traffic is resulting in a spectrum crunch forcing many wireless network operators to look towards refarming their 2G spectrum and deploy more spectrally efficient Long Term Evolution (LTE) technology. However, mobile network operators face a challenge when it comes to spectrum refarming because 2G technologies...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Optimal Spectrum Partition and Mode Selection in Device-to-Device Overlaid Cellular Networks

    In this paper, the authors jointly address two fundamental issues in Device-To-Device (D2D) overlaid cellular networks: how to partition the spectrum assuming orthogonal cellular and D2D transmissions, and what is the optimal threshold for distance-based D2D mode selection? To this end, they first derive rate expressions for both cellular and...

    Provided By University of Teramo

  • White Papers // Sep 2012

    Carrier Aggregation in Heterogeneous Cellular Networks

    Heterogeneous base stations (HetNets) and Carrier Aggregation (CA) are two distinct features of next-generation cellular networks. Small cells in HetNets are vital for data off-loading and can significantly improve area and cell edge spectral efficiency compared to using just macrocells. CA further increases the transmission bandwidth and thus network capacity...

    Provided By University of Teramo

  • White Papers // Feb 2011

    Static Timing Analysis for Modeling QoS in Networks on Chip

    Networks-on-Chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC's shared resources, Quality of Service and resource allocation are major concerns for system designers. In particular, a model for the properties of packet delivery through the network is desirable. The authors...

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // Jul 2012

    An Exploratory Study of the Security Management Practices of Hispanic Students

    The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users' understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Supporting Bulk Synchronous Parallelism in Map-Reduce Queries

    One of the major drawbacks of the Map-Reduce (MR) model is that, to simplify reliability and fault tolerance, it does not preserve data in memory across consecutive MR jobs: a MR job must dump its data to the distributed file system before they can be read by the next MR...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Optimal Locally Repairable Codes With Local Minimum Storage Regeneration Via Rank-Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems. The codes possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides...

    Provided By University of Teramo

  • White Papers // Dec 2011

    State Amplification Subject To Masking Constraints

    In this paper, the authors consider a state dependent channel with one transmitter, Alice, and two receivers, Bob and Eve. The problem is to effectively convey ("Amplify") the channel state sequence to Bob while "Masking" it from Eve. The extent to which the state sequence cannot be masked from Eve...

    Provided By University of Teramo

  • White Papers // Feb 2012

    Expansion Coding: Achieving the Capacity of an AEN Channel

    A general method of coding over expansions is proposed, which allows one to reduce the highly non-trivial problem of coding over continuous channels to much simpler discrete ones. More specifically, the focus is on the Additive Exponential Noise (AEN) channel, for which the (binary) expansion of the (exponential) noise random...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Optimal Locally Repairable Codes Via Rank Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides new...

    Provided By University of Teramo