University of Texas at Dallas

Displaying 1-16 of 16 results

  • White Papers // Feb 2012

    An Efficient Homomorphic Encryption Protocol for Multi-User Systems

    The authors have presented a novel non-circuit based homomorphic encryption algorithm. Their scheme is fully homomorphic, but it is not semantic secure. The security of their homomorphic encryption scheme is equivalent to the well known large integer factorization problem (which is also the security basis for RSA), but it requires...

    Provided By University of Texas at Dallas

  • White Papers // Aug 2011

    Incentive Compatible Privacy-Preserving Distributed Classification

    In this paper, the authors propose game-theoretic mechanisms to encourage truthful data sharing for distributed data mining. One proposed mechanism uses the classic Vickrey-Clarke-Groves (VCG) mechanism, and the other relies on the Shapley value. Neither relies on the ability to verify the data of the parties participating in the distributed...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    A Mispricing Model Of Stocks Under Asymmetric Information

    The authors extend the theory of asymmetric information in mispricing models for stocks following geometric Brownian motion to constant relative risk averse investors. Mispricing follows a continuous mean - reverting Ornstein - Uhlenbeck process. Optimal portfolios and maximum expected log - linear utilities from terminal wealth for informed and uninformed...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    Dynamic Dual-Homing Protection in WDM Mesh Networks

    A fault-tolerant scheme, called dual homing, is generally used in IP-based access networks to increase the survivability of the network. However, dual homing itself cannot provide survivability with respect to possible failures in the Wavelength Division Multiplexed (WDM) core network. To provide survivability in the core network, protection and restoration...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    Incentive and Trust Issues in Assured Information Sharing

    Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each organization participating in the assured information sharing process may have different...

    Provided By University of Texas at Dallas

  • White Papers // Oct 2010

    An Exact Algorithm for Minimum CDS With Shortest Path Constraint in Wireless Networks

    In wireless networks, it is very difficult to realize routing on-demand or table-driven routing, since the topology is changing from time to time and the energy of each node is very limited. Motivated by the physical backbone in wired networks, a Connected Dominating Set (CDS) is imposed as a virtual...

    Provided By University of Texas at Dallas

  • White Papers // Sep 2010

    Android Application for Visual Communication Software Project Management Plan

    This Software Project Management Plan (SPMP) describes the layout and planning of the Android Application for Visual Communication (VCA); the deliverables, schedules, dependencies, constraints, and assumptions involved will be defined, and the management of each will be addressed. This paper will also address the organization, roles and responsibilities of all...

    Provided By University of Texas at Dallas

  • White Papers // Aug 2010

    Secure Data Storage and Retrieval in the Cloud

    With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this...

    Provided By University of Texas at Dallas

  • White Papers // Apr 2010

    A SOA Model of Cyber Physical Systems

    Cyber-Physical Systems (CPSs) are combinations of physical entities controlled by software systems to accomplish specified tasks under stringent real-time and physical entity constraints. As more and more physical entities are equipped with embedded computers, they are becoming more and more intelligent. However, the problem of effectively composing the services provided...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Application-Specific Interconnection Network Design in Clustered DSP Processors

    To meet increasing performance requirements of DSP applications, application specific processor designs, e.g. Function Unit (FU) duplication and Register File (RF) distribution, are widely used in the design of DSP processors. In this paper, an application specific approach is proposed for the design of interconnection network in such DSP processors....

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Providing Quality of Service Guarantees Without Per-Flow State

    Two approaches have been proposed to improve the quality of service provided by the Internet: integrated services and differentiated services. Integrated services requires perflow state at each router. On the other hand, differentiated services does not require per-flow state, but provides a lower level of quality of service. Authors present...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Visual XML Schemas Based on Reserved Graph Grammars

    XML (Extensible Markup Language) is becoming more and more influential in data description and information interchange. More people including none computer specialists are involved in the process of defining and using XML. As a result, it is becoming urgent to develop a user-friendly tool for describing the XML structure, which...

    Provided By University of Texas at Dallas

  • White Papers // Dec 2009

    On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas

    Using directional antennas to conserve bandwidth and energy consumption in ad hoc wireless networks has attracted much attention of the research community in recent years. However, very few researches have focused on applying directional antennas to broadcasting. In this paper, the authors propose a Virtual Link Reduction (VLR) based broadcasting...

    Provided By University of Texas at Dallas

  • White Papers // Jul 2009

    Secure Semantic Service Oriented Information Grid for Cyber Physical System and Applications

    Assured information sharing applications are critical for the Department of Homeland Security (DHS). DHS applications such as border security, emergency preparedness, and immigration and naturalization have to share information between the different organizations. This paper describes the approach to designing a secure information grid for cyber physical systems and applications....

    Provided By University of Texas at Dallas

  • White Papers // Apr 2009

    Exploiting an Antivirus Interface

    The author proposes a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interface...

    Provided By University of Texas at Dallas

  • White Papers // Nov 2008

    R&D, Information Technology, And Firm Performance: A Complementarity Model

    Technological change is an important determinant of productivity growth and increases in the economic standards of living over time. Technological change occurs as a result of innovation which is defined as "Activities involved in inventing new products and processes, improving existing products, processes or services, and reducing the cost of...

    Provided By University of Texas at Dallas

  • White Papers // Aug 2010

    Secure Data Storage and Retrieval in the Cloud

    With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this...

    Provided By University of Texas at Dallas

  • White Papers // Apr 2010

    A SOA Model of Cyber Physical Systems

    Cyber-Physical Systems (CPSs) are combinations of physical entities controlled by software systems to accomplish specified tasks under stringent real-time and physical entity constraints. As more and more physical entities are equipped with embedded computers, they are becoming more and more intelligent. However, the problem of effectively composing the services provided...

    Provided By University of Texas at Dallas

  • White Papers // Apr 2009

    Exploiting an Antivirus Interface

    The author proposes a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interface...

    Provided By University of Texas at Dallas

  • White Papers // Oct 2010

    An Exact Algorithm for Minimum CDS With Shortest Path Constraint in Wireless Networks

    In wireless networks, it is very difficult to realize routing on-demand or table-driven routing, since the topology is changing from time to time and the energy of each node is very limited. Motivated by the physical backbone in wired networks, a Connected Dominating Set (CDS) is imposed as a virtual...

    Provided By University of Texas at Dallas

  • White Papers // Dec 2009

    On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas

    Using directional antennas to conserve bandwidth and energy consumption in ad hoc wireless networks has attracted much attention of the research community in recent years. However, very few researches have focused on applying directional antennas to broadcasting. In this paper, the authors propose a Virtual Link Reduction (VLR) based broadcasting...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    Dynamic Dual-Homing Protection in WDM Mesh Networks

    A fault-tolerant scheme, called dual homing, is generally used in IP-based access networks to increase the survivability of the network. However, dual homing itself cannot provide survivability with respect to possible failures in the Wavelength Division Multiplexed (WDM) core network. To provide survivability in the core network, protection and restoration...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    Incentive and Trust Issues in Assured Information Sharing

    Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different security agencies may need to share intelligence information for detecting terrorist plots. At the same, each organization participating in the assured information sharing process may have different...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2011

    A Mispricing Model Of Stocks Under Asymmetric Information

    The authors extend the theory of asymmetric information in mispricing models for stocks following geometric Brownian motion to constant relative risk averse investors. Mispricing follows a continuous mean - reverting Ornstein - Uhlenbeck process. Optimal portfolios and maximum expected log - linear utilities from terminal wealth for informed and uninformed...

    Provided By University of Texas at Dallas

  • White Papers // Nov 2008

    R&D, Information Technology, And Firm Performance: A Complementarity Model

    Technological change is an important determinant of productivity growth and increases in the economic standards of living over time. Technological change occurs as a result of innovation which is defined as "Activities involved in inventing new products and processes, improving existing products, processes or services, and reducing the cost of...

    Provided By University of Texas at Dallas

  • White Papers // Aug 2011

    Incentive Compatible Privacy-Preserving Distributed Classification

    In this paper, the authors propose game-theoretic mechanisms to encourage truthful data sharing for distributed data mining. One proposed mechanism uses the classic Vickrey-Clarke-Groves (VCG) mechanism, and the other relies on the Shapley value. Neither relies on the ability to verify the data of the parties participating in the distributed...

    Provided By University of Texas at Dallas

  • White Papers // Feb 2012

    An Efficient Homomorphic Encryption Protocol for Multi-User Systems

    The authors have presented a novel non-circuit based homomorphic encryption algorithm. Their scheme is fully homomorphic, but it is not semantic secure. The security of their homomorphic encryption scheme is equivalent to the well known large integer factorization problem (which is also the security basis for RSA), but it requires...

    Provided By University of Texas at Dallas

  • White Papers // Jul 2009

    Secure Semantic Service Oriented Information Grid for Cyber Physical System and Applications

    Assured information sharing applications are critical for the Department of Homeland Security (DHS). DHS applications such as border security, emergency preparedness, and immigration and naturalization have to share information between the different organizations. This paper describes the approach to designing a secure information grid for cyber physical systems and applications....

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Application-Specific Interconnection Network Design in Clustered DSP Processors

    To meet increasing performance requirements of DSP applications, application specific processor designs, e.g. Function Unit (FU) duplication and Register File (RF) distribution, are widely used in the design of DSP processors. In this paper, an application specific approach is proposed for the design of interconnection network in such DSP processors....

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Providing Quality of Service Guarantees Without Per-Flow State

    Two approaches have been proposed to improve the quality of service provided by the Internet: integrated services and differentiated services. Integrated services requires perflow state at each router. On the other hand, differentiated services does not require per-flow state, but provides a lower level of quality of service. Authors present...

    Provided By University of Texas at Dallas

  • White Papers // Sep 2010

    Android Application for Visual Communication Software Project Management Plan

    This Software Project Management Plan (SPMP) describes the layout and planning of the Android Application for Visual Communication (VCA); the deliverables, schedules, dependencies, constraints, and assumptions involved will be defined, and the management of each will be addressed. This paper will also address the organization, roles and responsibilities of all...

    Provided By University of Texas at Dallas

  • White Papers // Jan 2010

    Visual XML Schemas Based on Reserved Graph Grammars

    XML (Extensible Markup Language) is becoming more and more influential in data description and information interchange. More people including none computer specialists are involved in the process of defining and using XML. As a result, it is becoming urgent to develop a user-friendly tool for describing the XML structure, which...

    Provided By University of Texas at Dallas