University of Toledo

Displaying 1-40 of 75 results

  • White Papers // Jan 2014

    Designing an FPGA SoC Using a Standardized IP Block Interface

    Designing System-on-Chips (SoCs) is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Elements (PEs) that use different communication protocols and interfaces complicates the system-level design methodology. Recent paper provided a proof of concept demonstrating how a controller could be...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Standardizing the Performance Assessment of Reconfigurable Processor Architectures

    Comparing and evaluating the performance of reconfigurable processors is a difficult task. For this research field to progress in a more meaningful and scientific fashion, there needs to be a method of measuring progress between different reconfigurable architectures as well as with respect to traditional computing technologies. This paper presents...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller

    As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse of previously designed Intellectual Property (IP) cores is essential. However, since no universally accepted inter-face standards exist for IP cores, there is often a...

    Provided By University of Toledo

  • White Papers // Nov 2013

    MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom

    The authors study a multi-antenna broadcast channel with two legitimate receivers and an external eavesdropper. They assume that the channel matrix of the eavesdropper is unknown to the legitimate terminals but satisfies a maximum rank constraint. As their main result they characterize the associated secrecy degrees of freedom for the...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo

  • White Papers // Sep 2013

    Enabling SDN Applications on Software-Defined Infrastructure

    In this paper the authors discuss how to enable Software-Defined Networking (SDN) applications on Software-Defined Infrastructure (SDI) which is an approach for integrated control and management of converged computing and networking resources. Current separated resource management for computing or networking resources is not sufficient for addressing applications and multimedia services...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Identity Access Management for Multi-tier Cloud Infrastructures

    In this paper the authors present a novel architecture to manage Identity Access Management (IAM) in a multi-tier cloud infrastructure, in which most services are supported by massive-scale data centers over the Internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tires. In this...

    Provided By University of Toledo

  • White Papers // Aug 2013

    Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

    The authors study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. They design a multi-resource allocation mechanism, called DRFH that generalizes the...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Revenue Maximization With Dynamic Auctions in IaaS Cloud Markets

    Cloud service pricing plays a pivotal role towards the success of cloud computing. Existing pricing schemes, however, either provide no service guarantees (e.g., Spot Instances in Amazon EC2), or use static on-demand pricing in which the price cannot respond quickly to market dynamics (e.g., On-demand Instances in Amazon EC2). To...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Efficient Implementation of Security Applications in OpenFlow Controller with FleXam

    Current OpenFlow specifications provide limited access to packet-level information such as packet content, making it very inefficient, if not impossible, to deploy security and monitoring applications as controller applications. In this paper, the authors propose FleXam, a flexible sampling extension for OpenFlow designed to provide access to packet level information...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Toward Scalable Transaction Processing

    Designing scalable transaction processing systems on modern multicore hardware has been a challenge for almost a decade. The typical characteristics of transaction processing workloads lead to a high degree of unbounded communication on multicores for conventional system designs. In this paper, the authors initially present a systematic way of eliminating...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Large-Scale Malware Classification Using Random Projections and Neural Networks

    Automatically generated malware is a significant problem for computer users. Analysts are able to manually investigate a small number of unknown files, but the best large-scale defense for detecting malware is automated malware classification. Malware classifiers often use sparse binary features, and the number of potential features can be on...

    Provided By University of Toledo

  • White Papers // May 2013

    Designing Secure Socio-Technical Systems with STS-ml

    A Socio-Technical System (STS) is interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous paper, they have proposed STS-ml, a security requirements modelling language for the design of secure STSs. STS-ml represents security requirements as constraints...

    Provided By University of Toledo

  • White Papers // May 2013

    To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds

    Infrastructure-as-a-Service (IaaS) clouds offer diverse instance purchasing options. A user can either run instances on demand or pay only for what it uses, or it can prepay to reserve instances for a long period, during which a usage discount is entitled. An important problem facing a user is how these...

    Provided By University of Toledo

  • White Papers // May 2013

    Artificial-Noise Alignment for Secure Multicast using Multiple Antennas

    The authors propose an artificial-noise alignment scheme for multicasting a common-confidential message to a group of legitimate receivers. Their scheme transmits a superposition of information and noise symbols. At each legitimate receiver, the noise symbols are aligned in such a way that the information symbols can be decoded with high...

    Provided By University of Toledo

  • White Papers // May 2013

    BIM-Tool: Modeling and Reasoning Support for Strategic Business Models

    The BIM-Tool provides graphical modeling and analysis support for the Business Intelligence Model (BIM). BIM-Tool is a standalone application built on top of Eclipse. The tool supports two kinds of automated reasoning: bottom-up \"What-if\" analysis: given input labels about some elements of a BIM model (for example, success/failure for leaf...

    Provided By University of Toledo

  • White Papers // May 2013

    Multi-Resource Generalized Processor Sharing for Packet Processing

    Middleboxes have found widespread adoption in today's networks. They perform a variety of network functions such as WAN optimization, intrusion detection, and network-level firewalls. Processing packets to serve these functions often require multiple middlebox resources, e.g., CPU and link bandwidth. Furthermore, different packet traffic flows may consume significantly different amounts...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Anticipatory Buffer Control and Resource Allocation for Wireless Video Streaming

    In this paper, the authors describe a new approach for allocating resources to video streaming traffic. Assuming that the future channel state can be predicted for a certain time, they minimize the fraction of the bandwidth consumed for smooth streaming by jointly allocating wireless channel resources and play-out buffer size....

    Provided By University of Toledo

  • White Papers // Apr 2013

    On Fairness-Efficiency Tradeoffs for Multi-Resource Packet Processing

    Middleboxes are widely deployed in today's datacenter networks. They perform a variety of network functions, each requiring multiple hardware resources, such as CPU cycles and link bandwidth. Depending on the functions they go through, packet processing of different traffic flows may consume a vastly different amount of hardware resources. An...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Adapting to Uncertain and Evolving Enterprise Requirements

    Information systems today are expected to function in an increasingly dynamic world with many uncertainties. System development is seldom a linear progression from well defined, fully-specified requirements to finished products that fully meet the initial requirements. More likely, there are ongoing cycles of exploration, design and implementation, taking into account...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Secure and Efficient Context Data Collection Using Content-Centric Networking

    Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility,...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Software-Defined Infrastructure and the Future Central Office

    In this paper the authors discuss the role of virtualization and Software-Defined Infrastructure (SDI) in the design of future application platforms, and in particular the future Central Office (CO). A multi-tier computing cloud is presented in which resources in the smart edge of the network play a crucial role in...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Rethinking Definitions of Security for Session Key Agreement

    The authors consider Session Key Agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers that take no session ID as input, and output only a session key. Despite much work on SKA, they argue that there is no good definition of security for this (very natural) protocol...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Implementation Issues for High-Bandwidth Field-Programmable Analog Arrays

    This paper is a tutorial introduction to field-programmable analog arrays, as well as a review of existing field-programmable analog array architectures, of both educational and industrial origin. Circuit issues relevant to the development of high-bandwidth FPAAs are presented. A current conveyor-based architecture, which promises to achieve video bandwidths, is described....

    Provided By University of Toledo

  • White Papers // Nov 2012

    Dynamic Cloud Resource Reservation Via Cloud Brokerage

    Infrastructure-as-a-Service clouds offer diverse pricing options, including on-demand and reserved instances with various discounts to attract different cloud users. A practical problem facing cloud users is how to minimize their costs by choosing among different pricing options based on their own demands. In this paper, the authors propose a new...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Adaptive Partitioned Interference Management in Cellular Networks

    This paper proposes an adaptive and scalable approach to resource allocation in cellular networks. The authors introduce an adaptive strategy to form clusters of coordinating base stations, referred to as Scheduling Cells (SCs), based on the local traffic demand. A system parameter is proposed which adjusts the level of coordination...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Optimization of Wireless Access Point Placement in Realistic Urban Heterogeneous Networks

    The placement of the Access Points (APs) has a significant impact on the wireless system performance, especially for irregular heterogeneous networks with hierarchical APs such as macro/micro base-stations, pico-stations, and femto-stations. Traditional system modeling and optimization are based on the regular 2D hexagonal cellular topology and a set of predefined...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Interference Mitigation Via Power Control Under the One-Power-Zone Constraint

    Complexity and hardware constraints are two essential considerations in applying interference mitigation techniques to practical wireless systems. This paper considers a practical wireless backhaul network composed of several Access Nodes (AN), each serving several Remote Terminals (RT), and where the transmit frame structure at each AN is comprised of multiple...

    Provided By University of Toledo

  • White Papers // Nov 2012

    SLICC: Self-Assembly of Instruction Cache Collectives for OLTP Workloads

    Online Transaction Processing (OLTP) is at the core of many data center applications. OLTP workloads are known to have large instruction footprints that foil existing L1 instruction caches resulting in poor overall performance. Prefetching can reduce the impact of such instruction cache miss stalls; however, state-of-the-art solutions require large dedicated...

    Provided By University of Toledo

  • White Papers // Oct 2012

    Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act

    Balance Sheets and Annual Financial Reports play a major role in determining the public worth of any company. In the wake of corporate scandals such as Enron and WorldCom, the US and other countries passed legislation governing reporting processes. The Sarbanes Oxley Act of 2002 (hereafter SOX) requires US national...

    Provided By University of Toledo

  • White Papers // Oct 2012

    Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud

    The authors present Anchor, a general resource management architecture that uses the stable matching framework to decouple policies from mechanisms when mapping virtual machines to physical servers. In Anchor, clients and operators are able to express a variety of distinct resource management policies as they deem fit, and these policies...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Functional Encryption: New Perspectives and Lower Bounds

    Functional encryption is a new paradigm for public-key encryption that enables fine-grained control of access to encrypted data. It extends several previous notions, most notably identity-based encryption and provides, for instance, the ability to generate and release secret keys associated with a keyword that can decrypt only those documents that...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Massive MIMO and Small Cells: How to Densify Heterogeneous Networks

    The authors propose a Time Division Duplex (TDD) based network architecture where a macrocell tier with a "Massive" Multiple-Input Multiple-Output (MIMO) Base Station (BS) is overlaid with a dense tier of Small Cells (SCs). In this context, the TDD protocol and the resulting channel reciprocity have two compelling advantages. First,...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Auditing Cloud Administrators Using Information Flow Tracking

    In the last few years, cloud computing has evolved from being a promising business concept to one of the fastest growing segments of the IT industry. However, one impediment to widespread adoption by enterprise customers is the threat of attack by a malicious cloud administrator. To address this security and...

    Provided By University of Toledo

  • White Papers // Aug 2012

    Strategic Business Modeling: Representation and Reasoning

    Business Intelligence (BI) offers tremendous potential for business organizations to gain insights into their day-to-day operations, as well as longer term opportunities and threats. However, most of today's BI tools are based on models that are too much data-oriented from the point of view of business decision makers. The authors...

    Provided By University of Toledo

  • White Papers // Jul 2012

    Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks

    Groups are becoming one of the most compelling features in both online social networks and Twitter-like micro-blogging services. A stranger outside of an existing group may have the need to find out more information about attributes of current members in the group, in order to make a decision to join....

    Provided By University of Toledo

  • White Papers // Jan 2014

    Designing an FPGA SoC Using a Standardized IP Block Interface

    Designing System-on-Chips (SoCs) is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Elements (PEs) that use different communication protocols and interfaces complicates the system-level design methodology. Recent paper provided a proof of concept demonstrating how a controller could be...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Standardizing the Performance Assessment of Reconfigurable Processor Architectures

    Comparing and evaluating the performance of reconfigurable processors is a difficult task. For this research field to progress in a more meaningful and scientific fashion, there needs to be a method of measuring progress between different reconfigurable architectures as well as with respect to traditional computing technologies. This paper presents...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller

    As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse of previously designed Intellectual Property (IP) cores is essential. However, since no universally accepted inter-face standards exist for IP cores, there is often a...

    Provided By University of Toledo

  • White Papers // Jul 2012

    Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks

    Groups are becoming one of the most compelling features in both online social networks and Twitter-like micro-blogging services. A stranger outside of an existing group may have the need to find out more information about attributes of current members in the group, in order to make a decision to join....

    Provided By University of Toledo

  • White Papers // Oct 2012

    Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud

    The authors present Anchor, a general resource management architecture that uses the stable matching framework to decouple policies from mechanisms when mapping virtual machines to physical servers. In Anchor, clients and operators are able to express a variety of distinct resource management policies as they deem fit, and these policies...

    Provided By University of Toledo

  • White Papers // Apr 2012

    Practical Scrubbing: Getting to the Bad Sector at the Right Time

    Latent Sector Errors (LSEs) are a common hard disk failure mode, where disk sectors become inaccessible while the rest of the disk remains unaffected. To protect against LSEs, commercial storage systems use scrubbers: background processes verifying disk data. The efficiency of different scrubbing algorithms in detecting LSEs has been studied...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Functional Encryption: New Perspectives and Lower Bounds

    Functional encryption is a new paradigm for public-key encryption that enables fine-grained control of access to encrypted data. It extends several previous notions, most notably identity-based encryption and provides, for instance, the ability to generate and release secret keys associated with a keyword that can decrypt only those documents that...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Dec 2008

    A Matrix-Less Model for Tracing Software Requirements to Source Code

    Requirements traceability, regardless of the process used to produce a software system (e.g., traditional or agile development process), is a highly desirable quality attribute for the resulting software product. Building a Requirements Traceability Matrix (RTM) for a software product, which is the basis for existing approaches to achieving requirements traceability,...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Adaptive Partitioned Interference Management in Cellular Networks

    This paper proposes an adaptive and scalable approach to resource allocation in cellular networks. The authors introduce an adaptive strategy to form clusters of coordinating base stations, referred to as Scheduling Cells (SCs), based on the local traffic demand. A system parameter is proposed which adjusts the level of coordination...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Anticipatory Buffer Control and Resource Allocation for Wireless Video Streaming

    In this paper, the authors describe a new approach for allocating resources to video streaming traffic. Assuming that the future channel state can be predicted for a certain time, they minimize the fraction of the bandwidth consumed for smooth streaming by jointly allocating wireless channel resources and play-out buffer size....

    Provided By University of Toledo

  • White Papers // Oct 2009

    Revenue Management in the Presence of Self- Similar Alpha-Stable Distributions

    The authors consider the problem of maximizing network revenue from the perspective of bandwidth allocation and route selection. The objective is to perform offline maximization of revenue from served demands in the context of self-similar (long range dependent) traffic. They use an alpha-stable distribution for the aggregate demand volume to...

    Provided By University of Toledo

  • White Papers // Apr 2013

    On Fairness-Efficiency Tradeoffs for Multi-Resource Packet Processing

    Middleboxes are widely deployed in today's datacenter networks. They perform a variety of network functions, each requiring multiple hardware resources, such as CPU cycles and link bandwidth. Depending on the functions they go through, packet processing of different traffic flows may consume a vastly different amount of hardware resources. An...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Sep 2009

    A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Enabling SDN Applications on Software-Defined Infrastructure

    In this paper the authors discuss how to enable Software-Defined Networking (SDN) applications on Software-Defined Infrastructure (SDI) which is an approach for integrated control and management of converged computing and networking resources. Current separated resource management for computing or networking resources is not sufficient for addressing applications and multimedia services...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Identity Access Management for Multi-tier Cloud Infrastructures

    In this paper the authors present a novel architecture to manage Identity Access Management (IAM) in a multi-tier cloud infrastructure, in which most services are supported by massive-scale data centers over the Internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tires. In this...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Secure and Efficient Context Data Collection Using Content-Centric Networking

    Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility,...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Software-Defined Infrastructure and the Future Central Office

    In this paper the authors discuss the role of virtualization and Software-Defined Infrastructure (SDI) in the design of future application platforms, and in particular the future Central Office (CO). A multi-tier computing cloud is presented in which resources in the smart edge of the network play a crucial role in...

    Provided By University of Toledo

  • White Papers // Sep 2009

    Development of a Virtualized Application Networking Infrastructure Node

    In this paper the authors describe the design of a Virtualized Application and Networking Infrastructure (VANI) node that can be used to facilitate network architecture experimentation. Currently the VANI nodes provide four classes of physical resources: processing, reconfigurable hardware, storage and interconnection fabric, but the set of sharable resources can...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo

  • White Papers // Mar 2013

    Rethinking Definitions of Security for Session Key Agreement

    The authors consider Session Key Agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers that take no session ID as input, and output only a session key. Despite much work on SKA, they argue that there is no good definition of security for this (very natural) protocol...

    Provided By University of Toledo

  • White Papers // May 2010

    Protecting Cryptographic Keys Against Continual Leakage

    Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, the authors address the problem of storing cryptographic keys and computing on them in a manner that preserves security even when the adversary is able to obtain information leakage during the...

    Provided By University of Toledo

  • White Papers // Dec 2009

    Two Is A Crowd? A Black-Box Separation Of One-Wayness and Security Under Correlated Inputs

    A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. This powerful primitive was introduced at TCC 2009 by the researchers, who use it in an elegant black box construction of...

    Provided By University of Toledo

  • White Papers // May 2013

    Artificial-Noise Alignment for Secure Multicast using Multiple Antennas

    The authors propose an artificial-noise alignment scheme for multicasting a common-confidential message to a group of legitimate receivers. Their scheme transmits a superposition of information and noise symbols. At each legitimate receiver, the noise symbols are aligned in such a way that the information symbols can be decoded with high...

    Provided By University of Toledo

  • White Papers // Nov 2013

    MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom

    The authors study a multi-antenna broadcast channel with two legitimate receivers and an external eavesdropper. They assume that the channel matrix of the eavesdropper is unknown to the legitimate terminals but satisfies a maximum rank constraint. As their main result they characterize the associated secrecy degrees of freedom for the...

    Provided By University of Toledo

  • White Papers // May 2013

    Designing Secure Socio-Technical Systems with STS-ml

    A Socio-Technical System (STS) is interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous paper, they have proposed STS-ml, a security requirements modelling language for the design of secure STSs. STS-ml represents security requirements as constraints...

    Provided By University of Toledo

  • White Papers // Sep 2008

    Towards an Integrated Framework for Model-Driven Security Engineering

    Security is a major issue in developing software systems. It is widely recognized that security aspects must be considered in all the phases of the development process from the analysis of the organizational context to the final implementation of the software system. However, current approaches for designing secure systems only...

    Provided By University of Toledo

  • White Papers // Jun 2011

    SD Elements: A Tool for Secure Application Development Management

    A major problem in achieving security goals in application development is the overwhelming amount of security-related information, variety of tools, and numerous security risks and vulnerabilities. Software analysts, developers, and testers are not often able to identify relevant security knowledge. Many security tools focus only on detecting vulnerabilities, but the...

    Provided By University of Toledo

  • White Papers // Apr 2011

    Having a ChuQL at XML on the Cloud

    MapReduce/Hadoop has gained acceptance as a framework to process, transform, integrate, and analyze massive amounts of web data on the cloud. The MapReduce model (simple, fault tolerant, data parallelism on elastic clouds of commodity servers) is also attractive for processing enterprise and scientific data. Despite XML ubiquity, there is yet...

    Provided By University of Toledo

  • White Papers // Apr 2010

    Exploring RDF Usage and Interlinking in the Linked Open Data Cloud Using ExpLOD

    Publishing interlinked RDF datasets as links between data items identified using dereference able URIs on the web brings forward a number of issues. A key challenge is to understand the data, the schema, and the interlinks that are actually used both within and across linked datasets. Understanding actual RDF usage...

    Provided By University of Toledo

  • White Papers // Aug 2013

    Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

    The authors study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. They design a multi-resource allocation mechanism, called DRFH that generalizes the...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Massive MIMO and Small Cells: How to Densify Heterogeneous Networks

    The authors propose a Time Division Duplex (TDD) based network architecture where a macrocell tier with a "Massive" Multiple-Input Multiple-Output (MIMO) Base Station (BS) is overlaid with a dense tier of Small Cells (SCs). In this context, the TDD protocol and the resulting channel reciprocity have two compelling advantages. First,...

    Provided By University of Toledo

  • White Papers // Nov 2012

    SLICC: Self-Assembly of Instruction Cache Collectives for OLTP Workloads

    Online Transaction Processing (OLTP) is at the core of many data center applications. OLTP workloads are known to have large instruction footprints that foil existing L1 instruction caches resulting in poor overall performance. Prefetching can reduce the impact of such instruction cache miss stalls; however, state-of-the-art solutions require large dedicated...

    Provided By University of Toledo

  • White Papers // Aug 2009

    On Metrics for Error Correction in Network Coding

    The problem of error correction in both coherent and non-coherent network coding is considered under an adversarial model. For coherent network coding, where knowledge of the network topology and network code is assumed at the source and destination nodes, the error correction capability of an (outer) code is succinctly described...

    Provided By University of Toledo

  • White Papers // Jan 2011

    Network Coding for Content Distribution and Multimedia Streaming in Peer-to-Peer Networks

    Peer-To-Peer (P2P) networks have been one of the most promising platforms to realize the potential of network coding, since end hosts (referred to as peers) at the edge of the Internet have abundant computational resources with modern processors. In this paper, the authors take a journey into the application world...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Implementation Issues for High-Bandwidth Field-Programmable Analog Arrays

    This paper is a tutorial introduction to field-programmable analog arrays, as well as a review of existing field-programmable analog array architectures, of both educational and industrial origin. Circuit issues relevant to the development of high-bandwidth FPAAs are presented. A current conveyor-based architecture, which promises to achieve video bandwidths, is described....

    Provided By University of Toledo

  • White Papers // Aug 2011

    Enhancing Application Robustness in Cloud Data Centers

    The authors propose OX, a runtime system that uses application-level availability constraints and application topologies discovered on the y to enhance resilience to infrastructure anomalies for cloud applications. OX allows application owners to specify groups of highly available virtual machines, following component roles and replication semantics. To discover application topologies,...

    Provided By University of Toledo