University of Teramo

Displaying 1-40 of 109 results

  • White Papers // Apr 2014

    A Constrained Matrix-Variate Gaussian Process for Transposable Data

    Transposable data represents interactions among two sets of entities, and are typically represented as a matrix containing the known interaction values. Additional side information may consist of feature vectors specific to entities corresponding to the rows and/or columns of such a matrix. Further information may also be available in the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Performance Analysis of Spin Transfer Torque Random Access Memory With Cross Shaped Free Layer Using Heusler Alloys by Using Micromagnetic Studies

    The authors investigated the performance of Spin Transfer Torque Random Access Memory (STT-RAM) cell with cross shaped Heusler compound based free layer using micro-magnetic simulations. They designed the free layer using Cobalt based Heusler compounds. Here in this paper, simulation results predict that switching time from one state to other...

    Provided By University of Teramo

  • White Papers // Jan 2014

    2D-Proling: Detecting Input-Dependent Branches with a Single Input Data Set

    Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensive in terms of resources and compilation time. The authors introduce a new mechanism, 2D-proling, which proles with only one input set and predict whether the...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Wrong Path Events: Exploiting Unusual and Illegal Program Behavior for Early Misprediction Detection and Recovery

    Control and data speculation are widely used to improve processor performance. Correct speculation can reduce execution time, but incorrect speculation can lead to increased execution time and greater energy consumption. This paper proposes a mechanism to leverage unexpected program behavior, called wrong-path events that occur during periods of incorrect speculation....

    Provided By University of Teramo

  • White Papers // Jan 2014

    Profile-Assisted Compiler Support for Dynamic Predication in Diverge-Merge Processors

    Dynamic predication has been proposed to reduce the branch mis-prediction penalty due to hard-to-predict branch instructions. Recently proposed dynamic predication architecture, the Diverge-Merge Processor (DMP), provides large performance improvements by dynamically predicating a large set of complex control-flow graphs that result in branch mis-predictions. DMP requires significant support from a...

    Provided By University of Teramo

  • White Papers // Jan 2014

    Enhanced Hierarchical Instruction Scheduling For Tiled Data Flow Architectures

    Increasing on-chip wire delay along with the distributed nature of processing elements makes instruction scheduling for tiled data flow architectures very crucial. The authors' analysis reveals that careful placement of most frequently executed sections of applications, and directly addressing resource contention can significantly improve the performance of the application. The...

    Provided By University of Teramo

  • White Papers // Nov 2013

    Verifying Computations with State

    When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent paper in proof-based verifiable computation has made significant progress on this problem by incorporating deep results from complexity theory and cryptography into built systems. However,...

    Provided By University of Teramo

  • White Papers // Oct 2013

    How to Use Indistinguishability Obfuscation: Deniable Encryption, and More

    The authors introduce a new technique, that they call punctured programs, to apply in-distinguishability obfuscation towards cryptographic problems. They use this technique to carry out a systematic study of the applicability of in-distinguishability obfuscation to a variety of cryptographic goals. Along the way, they resolve the 16-year-old open question of...

    Provided By University of Teramo

  • White Papers // Jul 2013

    VABKS: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

    It is quite common now-a-days for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: how can the authorized data users search over a data owner's outsourced encrypted...

    Provided By University of Teramo

  • White Papers // Jul 2013

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    Data protection in public cloud remains a challenging problem. Outsourced data processing on vulnerable cloud platforms may suffer from cross-VM attacks, e.g. side-channel attacks that leak secrecy keys. The authors design and develop CloudSafe, a general and practical data-protection solution by integrating cryptographic techniques and systematic mechanisms seamlessly to address...

    Provided By University of Teramo

  • White Papers // Jun 2013

    Scalable and Memory-Efficient Clustering of Large-Scale Social Networks

    Clustering of social networks is an important task for their analysis; however, most existing algorithms do not scale to the massive size of today's social networks. A popular class of graph clustering algorithms for large-scale networks, such as PMetis, KMetis and Graclus, is based on a multilevel framework. Generally, these...

    Provided By University of Teramo

  • White Papers // May 2013

    Anon-Pass: Practical Anonymous Subscriptions

    The authors present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user...

    Provided By University of Teramo

  • White Papers // May 2013

    A Comprehensive Framework for Device-to-Device Communications in Cellular Networks

    Device-To-Device (D2D) in cellular networks is a promising concept which opens up new opportunities for commercial applications but also brings new challenges for network management. In this paper, the authors propose a tractable hybrid network model where the positions of transceivers are modeled by random spatial Poisson Point Processes (PPP)....

    Provided By University of Teramo

  • White Papers // Apr 2013

    BigSecret: A Secure Data Management Framework for Key-Value Stores

    Data storage is one of the most popular cloud services, and is therefore offered by most service providers. Among the various cloud based data storage services, keyvalue stores has emerged as a popular option for storing and retrieving billions of key-value pairs. Although using such cloud based key-value store services...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Optimal Spectrum Partition and Mode Selection in Device-to-Device Overlaid Cellular Networks

    In this paper, the authors jointly address two fundamental issues in Device-To-Device (D2D) overlaid cellular networks: how to partition the spectrum assuming orthogonal cellular and D2D transmissions, and what is the optimal threshold for distance-based D2D mode selection? To this end, they first derive rate expressions for both cellular and...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering

    With ever increasing network traffic rates, multicore architectures for network processors have successfully provided performance improvements through high parallelism. However, naively allocating the network traffic to multiple cores without considering diversified application nature and flow locality results in issues such as packet reordering, load imbalance and inefficient cache usage. Consequently,...

    Provided By University of Teramo

  • White Papers // Mar 2013

    A Novel Approach to Supporting Legacy Devices in LTE Networks

    The explosive growth in data traffic is resulting in a spectrum crunch forcing many wireless network operators to look towards refarming their 2G spectrum and deploy more spectrally efficient Long Term Evolution (LTE) technology. However, mobile network operators face a challenge when it comes to spectrum refarming because 2G technologies...

    Provided By University of Teramo

  • White Papers // Mar 2013

    Hardware and Software Implementations of Prim's Algorithm for Efficient Minimum Spanning Tree Computation

    Minimum Spanning Tree (MST) problems play an important role in many networking applications, such as routing and network planning. In many cases, such as wireless ad-hoc networks, this requires efficient high-performance and low-power implementations that can run at regular intervals in real time on embedded platforms. In this paper, the...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Model Checking Invariant Security Properties in OpenFlow

    The OpenFlow (OF) switching specification represents an innovative and open standard for enabling the dynamic programming of flow control policies in production networks. Unfortunately, thus far researchers have paid little attention to the development of methods for verifying that dynamic flow policies inserted within an OpenFlow network do not violate...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Optimal Locally Repairable Codes With Local Minimum Storage Regeneration Via Rank-Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems. The codes possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Explicit MBR All-Symbol Locality Codes

    Node failures are inevitable in Distributed Storage Systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: regenerating codes, i.e., codes that minimize the total repair bandwidth; and local codes, which minimize the number of nodes participating in the repair process. This paper focuses...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Dynamic Spectrum Refarming With Overlay for Legacy Devices

    The exponentially growing demand for wireless traffic is straining cellular networks. According to Cisco's report, in 2011 global mobile data traffic doubled for the fourth year in a row and was eight times the traffic of the entire global Internet in 2000. Cisco further expects that global mobile data traffic...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Secure Locally Repairable Codes for Distributed Storage Systems

    Data intensive and data generative applications are increasingly pervasive, ranging from social networking to multimedia uploads. Thus, storage in the "Cloud" is gaining prominence, where individuals and institutions use distributed storage services whose physical structure and location is mostly unknown to the user. This paper designs coding schemes for Distributed...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Optimal Locally Repairable Codes Via Rank Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides new...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Secrecy Capacity of Minimum Bandwidth Cooperative Regenerating Codes

    Regenerating codes enable trading off repair bandwidth for storage in Distributed Storage Systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may be susceptible to multiple node failures. This paper analyzes storage systems that employ cooperative regenerating codes that are robust to passive...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis

    The authors develop a general downlink model for multi-antenna Heterogeneous cellular Networks (HetNets), where Base Stations (BSs) across tiers may differ in terms of transmit power, target Signal-to-Interference-Ratio (SIR), deployment density, number of transmit antennas and the type of multi-antenna transmission. In particular, they consider and compare Space Division Multiple...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Automated di/dt Stressmark Generation for Microprocessor Power Delivery Networks

    In this paper, the authors propose a method for automated di/dt stressmark generation to test maximum voltage droop in a microprocessor power delivery network. The di/dt stressmark is an instruction sequence which draws periodic high and low current pulses that maximize voltage fluctuations including voltage droops. In order to automate...

    Provided By University of Teramo

  • White Papers // Jan 2013

    Power-Efficient System Design for Cellular-Based Machine-to-Machine Communications

    The growing popularity of Machine-To-Machine (M2M) communications in cellular networks is driving the need to optimize networks based on the characteristics of M2M, which are significantly different from the requirements that current networks are designed to meet. First, M2M requires large number of short sessions as opposed to small number...

    Provided By University of Teramo

  • White Papers // Jan 2013

    1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels

    Recently, a new WDM optical network infrastructure named SMART, which is capable of dynamically setting up, modifying, and tearing down optical connections, was proposed. The performance of SMART is determined by the performance of its hyper-channels, which are essentially optical buses or light-trails. Previously proposed MAC protocols for unidirectional optical...

    Provided By University of Teramo

  • White Papers // Jan 2013

    The Enterprise Integration Issues Encountered with Agile Process Introduction

    This paper describes research that explored the issues likely to be encountered when an agile process is introduced into a traditional environment. The methodology used considers strategic, cultural, and process integration issues in the implementation of advanced technologies. The methodology is used to define upstream/downstream process integration issues and impact...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resource Allocation: Realizing Mean-Variability-Fairness Tradeoffs

    Network Utility Maximization (NUM) provides a key conceptual framework to study reward allocation amongst a collection of users/entities in disciplines as diverse as economics, law and engineering. In network engineering, this framework has been particularly insightful towards understanding how Internet protocols allocate bandwidth, and motivated diverse research efforts on distributed...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Fundamentals of Mobility in Cellular Networks: Modeling and Analysis

    Mobility modeling and analysis is a key issue in wireless networks. In this paper, the authors propose a new and quite general Random WayPoint (RWP) mobility model which is valid over the entire plane. They derive key properties of the proposed mobility model including transition length, transition time and spatial...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Towards an Optimal User Association in Heterogeneous Cellular Networks

    The authors investigate how a heterogeneous cellular network should self-organize by proposing a load-aware user association scheme. This is an important consideration, in order to move traffic off congested cells and onto more lightly loaded cells. Although the network-wide optimal association problem is NP hard, a closely related utility maximization...

    Provided By University of Teramo

  • White Papers // Nov 2012

    A Non-asymptotic Throughput for Massive MIMO Cellular Uplink with Pilot Reuse

    This paper considers an uplink massive MIMO scheme that employs a pilot reuse scheme. For the massive MIMO scheme, a non-asymptotic cell throughput lower bound that is valid for any M is derived and the bound is shown to be tight by simulations. The lower bound is dependent upon three...

    Provided By University of Teramo

  • White Papers // Mar 2012

    A 38 GHz Cellular Outage Study for an Urban Outdoor Campus Environment

    Wireless systems require increasingly large system bandwidths that are only available at millimeter-wave frequencies. Such spectrum bands offer the potential for multi-gigabit-per-second data rates to low-cost massively broadband devices. To enable mobile outdoor millimeter-wave cellular-type applications, it is necessary to determine the coverage potential of base stations in real-world environments....

    Provided By University of Teramo

  • White Papers // Mar 2011

    The Optimal Inflation Rate Revisited

    The authors challenge the widely held belief that New Keynesian models cannot predict an optimal positive inflation rate. In fact they find that even for the US economy, characterized by relatively small government size, optimal trend inflation is justified by the Phelps argument that the inflation tax should be part...

    Provided By University of Teramo

  • White Papers // May 2010

    Trend Inflation, Endogenous Mark-ups And The Non-vertical Phillips Curve

    Recent developments in macroeconomics resurrect the view that welfare costs of inflation arise because the latter acts as a tax on money balances. Empirical contributions show that wage re-negotiations take place while expiring contracts are still in place. Bringing these seemingly unrelated aspects together in a stylized general equilibrium model,...

    Provided By University of Teramo

  • White Papers // Jan 2010

    Fiscal And Monetary Interaction Under Monetary Policy Uncertainty

    Despite the increasing number of studies on monetary policy uncertainty, its role on the strategic interaction between fiscal and monetary policies has not been fully explored. The authors' paper aims to fill this gap by evaluating the consequences produced by multiplicative uncertainty in such a context. Nowadays one of the...

    Provided By University of Teramo

  • White Papers // Apr 2010

    DataGuard: Dynamic Data Attestation in Wireless Sensor Networks

    Attestation has become a promising approach for ensuring software integrity in wireless sensor networks. However, current attestation either focuses on static system properties, e.g., code integrity, or requires hardware support such as Trusted Platform Module (TPM). However, there are attacks exploiting vulnerabilities that do not violate static system properties, and...

    Provided By University of Teramo

  • White Papers // Apr 2010

    Detecting Vulnerabilities in C Programs Using Trace-Based Testing

    Security testing has gained significant attention recently due to frequent attacks against software systems. This paper presents a trace-based security testing approach. It reuses test cases generated from previous testing methods to produce execution traces. An execution trace is a sequence of program statements exercised by a test case. Each...

    Provided By University of Teramo

  • White Papers // Mar 2010

    Adaptive Jamming-Resistant Broadcast Systems With Partial Channel Sharing

    Wireless communication is particularly vulnerable to signal jamming attacks. Spread spectrum mitigates such problem by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know such spread pattern to invest much more effort to launch attacks. However, in broadcast systems, jammers can...

    Provided By University of Teramo

  • White Papers // May 2009

    Resilient Cluster Leader Election for Wireless Sensor Networks

    Sensor nodes are often organized into clusters for efficiency and scalability purposes. Every sensor cluster is managed by a cluster leader during the network operation such as routing and data aggregation. Since managing a cluster consumes substantial energy, the cluster leader needs to be re-elected from time to time for...

    Provided By University of Teramo

  • White Papers // Mar 2009

    Protecting Neighbor Discovery Against Node Compromises in Sensor Networks

    The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile environments. However, these methods can only protect neighbor relations between benign nodes. A compromised node can easily circumvent them and setup false neighbor relations...

    Provided By University of Teramo

  • White Papers // Feb 2009

    Combating Side-Channel Attacks Using Key Management

    Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant modules are popular for protecting sensitive data such as cryptographic keys in these devices. However, recent studies have shown that adversaries can effectively extract the sensitive data...

    Provided By University of Teramo

  • White Papers // Dec 2010

    Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks

    Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. The authors identify the challenges...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Data Sharing Coordination and Blind Interference Alignment for Cellular Networks

    The authors consider coordination in a multi-user multiple input single output cellular system. In contrast with existing base station cooperation methods that rely on sharing CSI with or without user data to manage interference, they propose to share user data only. They consider a system where Blind Interference Alignment (BIA)...

    Provided By University of Teramo

  • White Papers // May 2012

    Compressive Sensing in Radar Sensor Networks Using Pulse Compression Waveforms

    Inspired by recent advances in Compressive Sensing (CS), the authors introduce CS to the Radar Sensor Network (RSN) using the pulse compression technique in order to efficiently compress, restore and recover the radar data. For the sake of simplicity but without losing generality, they study an RSN consisting of a...

    Provided By University of Teramo

  • White Papers // May 2012

    Orthogonal Multicarrier Division Duplexing for Point-to-Point Communications

    Traditional communication systems adopt either Time Division Duplexing (TDD) or Frequency Division Duplexing (FDD). TDD requires guard interval and FDD needs guard band. Orthogonal Multicarrier Division Duplexing (MDD) is a new duplexing scheme, which can avoid both guard interval and guard band. In this paper, the authors propose a new...

    Provided By University of Teramo

  • White Papers // May 2012

    Interference Reduction on Cellular Networks With Large Antenna Arrays

    In this paper, the authors analyze the behavior of the downlink of a cellular network as the number of its base station antennas tends to infinity. In this case, additive noise vanishes. Nonetheless, the fact that multiple users in different cells transmit non-orthogonal pilot sequences results in the contamination of...

    Provided By University of Teramo

  • White Papers // May 2012

    Fast Jamming Detection in Sensor Networks

    Wireless Sensor Networks (WSN) are vulnerable to jamming attacks where an adversary injects strong noises to interfere with the normal transmission. It is crucial to detect such jamming attacks as fast as possible. Existing studies have shown that an effective indicator of jamming is the Packet Delivery Ratio (PDR). However,...

    Provided By University of Teramo

  • White Papers // May 2012

    Hyperexponential Approximation of Channel Idle Time Distribution With Implication to Secondary Transmission Strategy

    Channel Idle Time Distribution (CITD) based secondary transmission strategies have been studied intensively in the literature. The performance of secondary devices are limited by the presumed CITD. But none of them provides a reasonable characterization of the CITD in reality. In this paper, the authors carefully examine the feature of...

    Provided By University of Teramo

  • White Papers // May 2012

    Sliding Window Technique for Dynamic Spectrum Sensing of an Asynchronous Primary User

    Dynamic spectrum allocation is the most efficient way of allocating spectrum and reliable spectrum sensing is the core functionality of that idea. While most of the energy detection techniques deal with the Additive White Gaussian Noise (AWGN) channel, few algorithms have been implemented to recognize vacant spectrum over frequency selective...

    Provided By University of Teramo

  • White Papers // May 2012

    Spectrum-Sharing Capacity Enhancement With Distributed Relaying

    Spectrum-sharing, aims to improve spectrum efficiency by allowing unlicensed (secondary) users to access the spectrum of licensed (primary) users, if the interference caused on the primary is tolerable. Thus, in order for the secondary to share the spectrum, it must effectively manage (reduce) interference on the primary. Multi-hop relaying and...

    Provided By University of Teramo

  • White Papers // May 2012

    DMT of MMSE Receiver in the Frequency Selective MIMO Channel

    The authors characterize the DMT of finite-length linear equalizers in the MIMO frequency-selective channel. They obtain the DMT in the case of cyclic-prefix transmission and provide an upper bound for the DMT in the case of zero-padding transmission. They also provide in-depth analysis for the diversity of the MMSE receiver...

    Provided By University of Teramo

  • White Papers // Oct 2012

    Dynamic Shift-Map Coding With Side Information at the Decoder

    Shift-map codes have been studied as joint source-channel codes for continuous sources. These codes are useful in delay-limited scenarios and also provide better tolerance to deviations of the Signal-to-Noise Ratio (SNR) from a target SNR, compared to separate source and channel coding. This paper defines a generalized family of shift-map...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Optimal Locally Repairable Codes With Local Minimum Storage Regeneration Via Rank-Metric Codes

    In this paper, the authors present a new explicit construction for Locally Repairable Codes (LRCs) for distributed storage systems. The codes possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on Maximum Rank Distance (MRD) Gabidulin codes, provides...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Model Checking Invariant Security Properties in OpenFlow

    The OpenFlow (OF) switching specification represents an innovative and open standard for enabling the dynamic programming of flow control policies in production networks. Unfortunately, thus far researchers have paid little attention to the development of methods for verifying that dynamic flow policies inserted within an OpenFlow network do not violate...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Resource Allocation: Realizing Mean-Variability-Fairness Tradeoffs

    Network Utility Maximization (NUM) provides a key conceptual framework to study reward allocation amongst a collection of users/entities in disciplines as diverse as economics, law and engineering. In network engineering, this framework has been particularly insightful towards understanding how Internet protocols allocate bandwidth, and motivated diverse research efforts on distributed...

    Provided By University of Teramo

  • White Papers // May 2011

    Spatial Reuse and Fairness of Mobile Ad-Hoc Networks With Channel-Aware CSMA Protocols

    The authors investigate the benefits of channel-aware (opportunistic) scheduling of transmissions in ad-hoc networks. The key challenge in optimizing the performance of such systems is finding a good compromise among three interdependent quantities: the density and channel quality of scheduled transmitters, and the resulting interference at receivers. They propose two...

    Provided By University of Teramo

  • White Papers // Sep 2010

    Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness

    In this paper, the authors characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, including indoor and outdoor transmissions, under various spectrum (white space) detection techniques. Each technique delivers a different degree of RF-environment awareness - the more...

    Provided By University of Teramo

  • White Papers // Jan 2013

    1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels

    Recently, a new WDM optical network infrastructure named SMART, which is capable of dynamically setting up, modifying, and tearing down optical connections, was proposed. The performance of SMART is determined by the performance of its hyper-channels, which are essentially optical buses or light-trails. Previously proposed MAC protocols for unidirectional optical...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Modeling Non-Uniform UE Distributions in Downlink Cellular Networks

    A recent way to model and analyze downlink cellular networks is by using random spatial models. Assuming User Equipment (UE) distribution to be uniform, the analysis is performed at a typical UE located at the origin. While this method of sampling UEs provides statistics averaged over the UE locations, it...

    Provided By University of Teramo

  • White Papers // Dec 2012

    Analytical Modeling of Uplink Cellular Networks

    Cellular uplink analysis has typically been undertaken by either a simple approach that lumps all interference into a single deterministic or random parameter in a Wyner-type model, or via complex system level simulations that often do not provide insight into why various trends are observed. This paper proposes a novel...

    Provided By University of Teramo

  • White Papers // Feb 2013

    Ordering of Transmission Techniques in Terms of Coverage and Rate in MIMO HetNets

    The authors consider a K-tier downlink multi-antenna Heterogeneous cellular Network (HetNet), where Base Stations (BSs) across tiers differ in terms of transmit power, deployment density, target Signal-to-Interference Ratio (SIR), number of transmit antennas, number of users served in each resource block and hence the transmission technique. The main contribution of...

    Provided By University of Teramo

  • White Papers // Sep 2012

    On Resource Allocation for Machine-to-Machine (M2M) Communications in Cellular Networks

    Cellular networks are an attractive option for handling the growing number of sensing and monitoring devices due to their ubiquitous presence. While this growing popularity of cellular network based Machine-To-Machine (M2M) communications is opening new avenues for the mobile network operators, it is also bringing forth new system design challenges...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Load-Aware Heterogeneous Cellular Networks: Modeling and SIR Distribution

    Heterogeneous Cellular Networks (HCNs) are characterized by cells whose coverage areas may vary by orders of magnitude. It is natural therefore that their user populations (and hence traffic loads) will vary similarly. Yet, to date, random spatial models developed for HCNs generally assume that all Base Stations (BSs) are always...

    Provided By University of Teramo

  • White Papers // Aug 2012

    Pairwise Interaction Processes for Modeling Cellular Network Topology

    In industry, cellular tower locations have primarily been modeled by a deterministic hexagonal grid. Since real deployments are rarely regular, the even spacing between nodes in the grid and constant Voronoi cell areas make the hexagonal grid unrealistic. In this paper, the authors use tools from spatial statistics to show...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Downlink Coverage Probability in MIMO HetNets

    The growing popularity of small cells is driving cellular networks of yesterday towards heterogeneity and randomness. Soon, hundreds of unplanned user deployed femtocells and tens of operator managed picocells will coexist in a typical macrocell. One of the natural ways to model Base Station (BS) locations in such heterogeneous cellular...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Fundamentals of Mobility in Cellular Networks: Modeling and Analysis

    Mobility modeling and analysis is a key issue in wireless networks. In this paper, the authors propose a new and quite general Random WayPoint (RWP) mobility model which is valid over the entire plane. They derive key properties of the proposed mobility model including transition length, transition time and spatial...

    Provided By University of Teramo

  • White Papers // Jan 2012

    Constant-Approximation for Target Coverage Problem in Wireless Sensor Networks

    Coverage, in general, answers the questions about quality of service (surveillance) that can be provided by a particular sensor network. In this paper, the authors will study target coverage. In target coverage, there are several points of interest in a given region and sensors need to cover all the points....

    Provided By University of Teramo

  • White Papers // Nov 2012

    Spectrum and Waveband Assignment in Elastic Optical Waveband Networks

    Elastic optical networks can increase spectral efficiency by assigning a variable amount of spectral resources to satisfy a traffic request, instead of the fixed amount of spectrum as allocated by current fixed grid optical networks. Waveband networks reduce the number of optical switch ports by aggregating lightpaths into a waveband,...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Towards an Optimal User Association in Heterogeneous Cellular Networks

    The authors investigate how a heterogeneous cellular network should self-organize by proposing a load-aware user association scheme. This is an important consideration, in order to move traffic off congested cells and onto more lightly loaded cells. Although the network-wide optimal association problem is NP hard, a closely related utility maximization...

    Provided By University of Teramo

  • White Papers // Nov 2012

    A Non-asymptotic Throughput for Massive MIMO Cellular Uplink with Pilot Reuse

    This paper considers an uplink massive MIMO scheme that employs a pilot reuse scheme. For the massive MIMO scheme, a non-asymptotic cell throughput lower bound that is valid for any M is derived and the bound is shown to be tight by simulations. The lower bound is dependent upon three...

    Provided By University of Teramo

  • White Papers // Nov 2012

    Supporting Bulk Synchronous Parallelism in Map-Reduce Queries

    One of the major drawbacks of the Map-Reduce (MR) model is that, to simplify reliability and fault tolerance, it does not preserve data in memory across consecutive MR jobs: a MR job must dump its data to the distributed file system before they can be read by the next MR...

    Provided By University of Teramo