University of Waterloo

Displaying 81-120 of 181 results

  • White Papers // Sep 2010

    Effective Acquaintance Management for Collaborative Intrusion Detection Networks

    An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions about intrusions, to enhance the overall accuracy of intrusion assessment as well as the ability of detecting new classes of intrusions. Towards this goal, the authors propose a distributed...

    Provided By University of Waterloo

  • White Papers // Aug 2010

    A Framework Toward a Self-Organizing and Self-Healing Certificate Authority Group in a Content Addressable Network

    Public-key provision in on Internet scale is crucial for securing Peer-To-Peer (P2P) applications. This paper proposes a framework for a self-organizing and self-healing Certificate Authority (CA) in a Content Addressable Network (CAN) that can provide certificates without a centralized Trusted Third Party (TTP). In the authors' framework, a CA group...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Short One-Time Signatures

    The authors present a new one-time signature scheme having short signatures. The new scheme is also the first one-time signature scheme that supports aggregation, batch verification, and which admits efficient proofs of knowledge. It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Dealer-Free Dynamic Secret Sharing Schemes With Unconditional Security

    This paper proposes dealer-free dynamic secret sharing constructions where different parameters of the scheme can be changed after the initialization. In practice, the ability of the adversary might be enhanced over time, for instance, by compromising more players. A possible solution to this problem is to increase the threshold and/or...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    ARBR: Adaptive Reinforcement-Based Routing for DTN

    This paper introduces a novel routing protocol in Delay Tolerant Networks (DTNs), aiming to solve the online distributed routing problem. By manipulating a collaborative reinforcement learning technique, a group of nodes can cooperate with each other and make a forwarding decision for the stored messages based on a cost function...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    BitTorrent Under a Microscope: Towards Static QoS Provision in Dynamic Peer-to-Peer Networks

    For Peer-To-Peer (P2P) networks continually to flourish, QoS provision is critical. However, the P2P networks are notoriously dynamic and heterogeneous. As a result, QoS provision in P2P networks is a challenging task with nodes of the varying and intermittent throughput. This raises a fundamental problem: is stable and delicate QoS...

    Provided By University of Waterloo

  • White Papers // Jul 2010

    Inferring Meta-Models for Runtime System Data From the Clients of Management APIs

    A new trend in run-time system monitoring is to utilize MOF- based techniques in analyzing the run-time system data. Approaches and tools have been proposed to automatically reflect the system data as MOF compliant models, but they all require users to manually build the meta-models that define the types and...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography

    An Identity-Based Encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages over the Internet. However, an IBE scheme necessarily requires a Private-Key Generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications. Although a distributed PKG has been suggested...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Feature and Class Models in Clafer: Mixed, Specialized, and Coupled

    The authors present Clafer, a class modeling language with first-class support for feature modeling. They designed Clafer as a concise notation for class models, feature models, mixtures of class and feature models (such as components with options), and models that couple feature models and class models via constraints (such as...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Resource and Service Discovery in Large-Scale Multi-Domain Networks

    With the increasing need for networked applications and distributed resource sharing, there is a strong incentive for an open large-scale service infrastructure operating over multi-domain and multi-technology networks. Service discovery, as an essential support function of such an infrastructure, is a crucial current research challenge. Although a few survey papers...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 Based Processors

    Elliptic Curve Cryptography (ECC), discovered independently by Miller and Koblitz in mid 80's, has gained widespread acceptance in recent years, taking over a central role in public-key cryptography that was previously exclusive to the classic RSA. This technological shift is partially explained by ECC's reduced key length requirement to achieve...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Generalizations of Network Design Problems With Degree Bounds

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. This paper extends the scope of the iterative relaxation method in two directions: by handling more complex degree constraints in the minimum spanning tree problem namely laminar crossing spanning tree,...

    Provided By University of Waterloo

  • White Papers // May 2010

    Efficient Techniques for High-Speed Elliptic Curve Cryptography

    In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report new speed records on modern x86-64 based processors. The different implementations include elliptic curves using Jacobian coordinates, extended Twisted Ed-wards coordinates and the...

    Provided By University of Waterloo

  • White Papers // May 2010

    FPGA Implementations of the Hummingbird Cryptographic Algorithm

    Hummingbird is a new ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, the authors describe efficient hardware implementations of a stand-alone Hummingbird component in Field-Programmable Gate Array (FPGA) devices. They implement an encryption only core and an encryption/decryption core...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    On the Capacity and Scheduling of a Multi-Sector Cell With Co-Channel Interference Knowledge

    The authors study the capacity of a single-hop wireless cell comprised of M fixed directional antennas concentrically arranged around a common axis and each reusing the same channel. The premise for this architecture is that co-channel interference between the fixed directional beams can be identified and reported, allowing joint conflict-free...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    DFMAC: DTN-Friendly Medium Access Control for Wireless Local Area Networks Supporting Voice/Data Services

    In this paper, the authors consider a wireless communication network for both local nodes residing in densely populated hotspots and nomadic nodes roaming in a large area. Wireless Local Area Networks (WLANs) are deployed in the hotspots, while a Delay/disruption Tolerant Network (DTN) provides services to nomadic nodes in the...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Design Principles for Robust Opportunistic Communication

    Several researchers have proposed the use of transient communication opportunities, that is, opportunistic communication, to reduce the cost of rural communication. The authors propose some design principles for robust opportunistic communication drawing from the experiences in developing and deploying several practical systems. They conclude with a sketch of some areas...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Throughput-Lifetime Tradeoffs in Multihop Wireless Networks Under an SINR-Based Interference Model

    High throughput and lifetime are both crucial design objectives for a number of multi-hop wireless network applications. As these two objectives are often in conflict with each other, it naturally becomes important to identify the tradeoffs between them. Several works in the literature have focused on improving one or the...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    Spectrum Allocation for Smooth Video Delivery Over Cognitive Radio Networks

    In Cognitive Radio (CR) networks, users are allowed to dynamically access the temporally unused channels to recycle the spectrum for better throughput. However, the dynamic channel availability also results in the highly variable and intermittent download to the users, which directly threats the on-top applications, especially for real-time service such...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    Cross-Layer Resource Allocation for Efficient Message Dissemination in Rural Infostation Systems

    In this paper, the authors consider a rural infostation system where power and bandwidth limited infostations is deployed in a large network area with sparsely populated mobile nodes. Direct transmission services are provided to each mobile node, whereas message dissemination services facilitated by relaying are provided to a subgroup of...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    iMark: An Identity Management Framework for Network Virtualization Environment

    Network virtualization has gained a lot of popularity in the recent years. It has been heralded as a flexible and open ended network for the future. Network Virtualizations allow the existence of multiple Virtual Networks (VNs). These VNs in turn can assume their own individual routing, addressing, naming and transport...

    Provided By University of Waterloo

  • White Papers // Mar 2010

    MAC-Layer Active Dropping for Real-Time Video Streaming in IEEE 802.16 Networks

    This paper introduces a MAC-layer Active Dropping (AD) scheme for achieving effective resource utilization and maintaining application-level quality of services in real-time video streaming over the emerging wireless broadband access networks based on Time-Division Multiple Access (TDMA). By proactively dropping the MAC-layer Protocol Data Units (MPDUs) of a video frames...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

    Embedding of Virtual Network (VN) requests on top of a shared physical network poses an intriguing combination of theoretical and practical challenges. Two major problems with the state-of-the-art VN embedding algorithms are their indifference to the underlying substrate topology and their lack of re-optimization mechanisms for already embedded VN requests....

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices

    Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryptographic primitives for many security applications. Motivated by the design of the well-known Enigma machine, the authors present a novel...

    Provided By University of Waterloo

  • White Papers // Feb 2010

    Recommendations for Optical Disc Archival Storage

    For a multitude of reasons, printing to paper is still the best option for long term preservation of archival records. However, this is not possible for all records. Audiovisual recordings obviously need to remain in a machine-readable format that can be played using current technology. Many users of digital cameras...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Does Compressed Sensing Improve the Throughput of Wireless Sensor Networks?

    Although Compressed Sensing (CS) has been envisioned as a useful technique to improve the performance of Wireless Sensor Networks (WSNs), it is still not very clear how exactly it will be applied and how big the improvements will be. In this paper, the authors propose two different ways (plain-CS and...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control and Rate Adaptation

    The authors present a number of significant engineering insights on what makes a good configuration for medium-to large-size WMNs when the objective function is to maximize the minimum throughput among all flows. For this, they first develop efficient and exact computational tools using column generation with greedy pricing that allow...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Fast Discrete Fourier Spectra Attacks on Stream Ciphers

    In this paper, the authors present some new results on the selective discrete Fourier spectra attack, introduced first as the recent Ronjom-Helleseth attack and the modifications due to Gong et al. The focal point of this paper is to fill some gaps in the theory of analysis in terms of...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    MAC Performance Analysis for Vehicle-to-Infrastructure Communication

    The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e.g., WLAN), the performance of DCF in the highly mobile vehicular environment is still unclear. On addressing this issue, the authors propose...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Automatic Tuning of the Multiprogramming Level in Sybase SQL Anywhere

    This paper looks at the problem of automatically tuning the database server multiprogramming level to improve database server performance under varying workloads. The authors describe two tuning algorithms that were considered and how they performed under different workloads. They then present the hybrid approach that they have successfully implemented in...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Notio - A Java API for Developing CG Tools

    Notio is a Java API for constructing conceptual graph tools and systems. Rather than attempting to provide a comprehensive toolset, Notio attempts to address the widely varying needs of the CG community by providing a platform for the development of tools and applications. It is, first and foremost, an API...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    Using Sphinx to Improve Onion Routing Circuit Construction

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. The authors significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing,...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    An Interpreter for Framework-Specific Modeling Languages

    Framework-Specific Modeling Languages (FSMLs) are specifications of framework concepts and their intended usages. Interpreting an FSML over a set of applications enables a user to detect framework concepts in source code through reverse-engineering. The authors describe their FSML interpreter written using Prolog. The interpreter itself consists of two main components:...

    Provided By University of Waterloo

  • White Papers // Nov 2009

    Mechanism Design for Network Virtualization

    Recently network virtualization has been proposed as a promising approach to thwart the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared infrastructure which itself is controlled by self-interested infrastructure providers. A major challenge in this respect is the VN embedding problem...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel

    In this paper, the authors consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. First they assumed that the channels are degraded and the wire-tapper...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Case Study of Scientific Data Processing on a Cloud Using Hadoop

    With the increasing popularity of cloud computing, Hadoop has become a widely used open source cloud computing framework for large scale data processing. However, few efforts have been made to demonstrate the applicability of Hadoop to various real-world application scenarios in fields other than server side computations such as web...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Bluetooth-Enabled In-Home Patient Monitoring System: Early Detection of Alzheimer's Disease

    As the baby boom generation is aging, more and more people are diagnosed with Alzheimer's disease, early detection of which is shown to be vital and necessary for better medical treatments and prolonging life expectancies. This paper proposes a Bluetooth-enabled in-home patient monitoring system, facilitating early detection of Alzheimer's disease....

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures

    An error decodable secret-sharing scheme is a secret-sharing scheme with the additional property that the secret can be recovered from the set of all shares, even after a coalition of participants corrupts the shares they possess. In this paper the authors consider schemes that can tolerate corruption by sets of...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Optimizing Energy and Modulation Selection in Multi-Resolution Modulation for Wireless Video Broadcast/Multicast

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the...

    Provided By University of Waterloo

  • White Papers // Sep 2009

    Bayesian Decision Aggregation in Collaborative Intrusion Detection Networks

    Cooperation between Intrusion Detection Systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A critical component of a collaborative network is the mechanism of feedback aggregation in which each IDS makes an overall security evaluation based on peers...

    Provided By University of Waterloo

  • White Papers // Nov 2008

    Multimedia Messaging Service: System Description and Performance Analysis

    Following the success of Short Messaging Service (SMS), multimedia messaging service (MMS) is emerging as a natural but revolutionary successor to short messaging. MMS allows personalized multimedia messages containing content such as images, audio, text and video to be created and transferred between MMS-capable phones and other devices. By using...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    On Generalizations of Network Design Problems With Degree Bounds

    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. This paper extends the scope of the iterative relaxation method in two directions: by handling more complex degree constraints in the minimum spanning tree problem namely laminar crossing spanning tree,...

    Provided By University of Waterloo

  • White Papers // Aug 2008

    Trace-Based Analysis of Wi-Fi Scanning Strategies

    Constant access to the Internet on smartphones enables a plethora of mobile applications. Wireless networking technologies on today's smartphones include: 802.11, and cellular technologies, such as EDGE or EVDO, and recently 3G technologies. Accessing the Internet using Wi-Fi on smartphones requires careful management of the WLAN interface. The design of...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Notio - A Java API for Developing CG Tools

    Notio is a Java API for constructing conceptual graph tools and systems. Rather than attempting to provide a comprehensive toolset, Notio attempts to address the widely varying needs of the CG community by providing a platform for the development of tools and applications. It is, first and foremost, an API...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    Network Virtualization: State of the Art and Research Challenges

    Recently network virtualization has been pushed forward by its proponents as a long term solution to the gradual ossification problem faced by the existing Internet and proposed to be an integral part of the next-generation networking paradigm. By allowing multiple heterogeneous network architectures to cohabit on a shared physical substrate,...

    Provided By University of Waterloo

  • White Papers // Oct 2008

    A Survey of Network Virtualization

    Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend o this ossification once and for all, network virtualization has been propounded as...

    Provided By University of Waterloo

  • White Papers // May 2008

    NVP2P: Network Virtualization From Peer-to-Peer Perspective

    Separation of policy from mechanism is a well-known principle in computing literature. Network virtualization reincarnates this very concept in the context of networking architecture. But most of the existing works either tangentially touch the issues regarding the implementation of such architecture or just ignore them completely. In this paper the...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    Identity Management and Resource Allocation in the Network Virtualization Environment

    Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet architecture are now limited to simple incremental updates; deployment of any new, radically different technology is next to impossible. To fend off this ossification, network virtualization has been propounded as a diversifying attribute...

    Provided By University of Waterloo

  • White Papers // May 2008

    How to Ensure Forward and Backward Untraceability of RFID Identification Schemes by Using a Robust PRBG

    In this paper, the authors analyze an RFID identification scheme which is designed to provide forward untraceability and backward untraceability. The authors show that if a standard cryptographic PseudoRandom Bit Generator (PRBG) is used in the scheme, then the scheme may fail to provide forward untraceability and backward untraceability. To...

    Provided By University of Waterloo

  • White Papers // Dec 2009

    Using Sphinx to Improve Onion Routing Circuit Construction

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. The authors significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing,...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks

    Wireless networks formed by radio nodes is a subject of much topical interest, and they are found in various applications such as ad hoc networks, mesh networks, sensor networks, etc. For the optimal design and operation of such networks, it is of fundamental importance to determine the information-theoretic capacity of...

    Provided By University of Waterloo

  • White Papers // Dec 2011

    Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

    In this paper, the authors investigate on-demand data services for high-speed trains via a cellular/infostation integrated network. Service requests and acknowledgements are sent through the cellular network to a content server, while data delivery is achieved via trackside infostations. The optimal resource allocation problem is formulated by taking account of...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    This paper introduces a novel multi-copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized...

    Provided By University of Waterloo

  • White Papers // Apr 2009

    Applications and Extensions of PTIME Description Logics With Functional Constraints

    The authors review and extend earlier work on the logic CFD, a description logic that allows terminological cycles with universal restrictions over functional roles. In particular, they consider the problem of reasoning about concept subsumption and the problem of computing certain answers for a family of attribute-connected conjunctive queries, showing...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Network-Wide Local Unambiguous Failure Localization (NWL-UFL) Via Monitoring Trails

    Monitoring trail (m-trail) has been proposed as an effective approach for link failure localization in all-optical WDM (Wavelength Division Multiplexing) mesh networks. Previous studies in failure localization rely on alarm dissemination via control plane signaling such that the network controller can collect the flooded alarms to form an alarm code...

    Provided By University of Waterloo

  • White Papers // Jan 2012

    Intermodeling, Queries, and Kleisli Categories

    Specification and maintenance of relationships between models are vital for MDE. The authors show that a wide class of such relationships can be specified in a compact and precise manner, if inter-model mappings are allowed to link derived model elements computed by corresponding queries. Composition of such mappings is not...

    Provided By University of Waterloo

  • White Papers // Aug 2011

    Specifying Overlaps of Heterogeneous Models for Global Consistency Checking

    Software development often involves a set of models defined in different metamodels, each model capturing a specific view of the system. The authors call this set a multimodel, and its elements partial or local models. Since partial models overlap, they may be consistent or inconsistent wrt. a set of global...

    Provided By University of Waterloo

  • White Papers // Mar 2011

    Combining Multiple Dimensions of Knowledge in API Migration

    The authors combine multiple dimensions of knowledge about APIs so that they can support API migration by wrapping or transformation in new ways. That is, they assess wrapper-based API re-implementations and provide guidance for migrating API methods. They demonstrate their approach with two major GUI APIs for the Java platform...

    Provided By University of Waterloo

  • White Papers // Oct 2011

    Generating Range Fixes for Software Configuration

    To prevent configuration errors, highly configurable software often allows defining constraints over the available options. As these constraints can be complex, fixing a configuration that violates one or more constraints can be challenging. Although several fix-generation approaches exist, their applicability is limited because they typically generate only one fix, failing...

    Provided By University of Waterloo

  • White Papers // Sep 2011

    Model Synchronization, Mappings, Tile Algebra, and Categories

    The paper presents a novel algebraic framework for specification and design of model synchronization tools. The basic premise is that synchronization procedures, and hence algebraic operations modeling them, are diagrammatic: they take a configuration (diagram) of models and mappings as their input and produce a diagram as the output. Many...

    Provided By University of Waterloo

  • White Papers // Jun 2010

    Feature and Class Models in Clafer: Mixed, Specialized, and Coupled

    The authors present Clafer, a class modeling language with first-class support for feature modeling. They designed Clafer as a concise notation for class models, feature models, mixtures of class and feature models (such as components with options), and models that couple feature models and class models via constraints (such as...

    Provided By University of Waterloo

  • White Papers // Jan 2011

    Optimal Speedup on a Low-Degree Multi-Core Parallel Architecture (LoPRAM)

    Modern microprocessor architectures have gradually incorporated support for parallelism. In the past the degree of parallelism was rather small and as such it could be best modeled as a constant speedup over the traditional RAM model, however, as a consequence of continued growth this assumption might no longer hold. For...

    Provided By University of Waterloo

  • White Papers // Sep 2008

    Robust and Scalable Trust Management for Collaborative Intrusion Detection

    The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, the authors study host-based IDNs and introduce a Dirichlet-based model to...

    Provided By University of Waterloo

  • White Papers // Sep 2008

    Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks

    Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly process for energy and capacity constrained sensor nodes and this urges the vitality of the control over the network lifetime. In this paper...

    Provided By University of Waterloo

  • White Papers // Sep 2008

    Evasive Attack on Stateful Signature-Based Network Intrusion Detection Systems

    Network Intrusion Detection Systems (NIDS) have a very important role in network security. Many NIDS evasion techniques as well as solutions were proposed in the literature. Supporting stateful signatures is a very critical function in a signature-based NIDS because many multi-stage attacks can only be detected by tracking multiple rules...

    Provided By University of Waterloo

  • White Papers // Jul 2008

    Mitigating GPS Error in Mobile Environments

    The authors study the problem of accurately determining the position of a mobile device using imprecise off-the-shelf GPS devices. Existing work has not yet explored the impact of mobility on GPS error for off-the-shelf devices. They demonstrate that a naive use of GPS in mobile situations can lead to significant...

    Provided By University of Waterloo

  • White Papers // Nov 2009

    Mechanism Design for Network Virtualization

    Recently network virtualization has been proposed as a promising approach to thwart the current ossification of the Internet by allowing multiple heterogeneous Virtual Networks (VN) to coexist on a shared infrastructure which itself is controlled by self-interested infrastructure providers. A major challenge in this respect is the VN embedding problem...

    Provided By University of Waterloo

  • White Papers // Jun 2009

    A Survey of Incentive Mechanisms in Peer-to-Peer Systems

    The fundamental assumption that Peer-To-Peer (P2P) networks can thrive on voluntary contribution of altruistic peers can no longer be supported without considering the impact of rational behavior on such decentralized systems. This paper attempts to shed light on the impact of rational free-riding behavior of participating peers on the stability...

    Provided By University of Waterloo

  • White Papers // May 2009

    Taking Advantage of the Interplay Among Software Product Lines, Service-Oriented Architectures and Multi-Agent Systems

    Multi-Agent Systems (MASs) are often being applied in a wide range of industrial applications, showing the effectiveness of the agent abstraction to develop open, highly interactive, autonomous and context-aware systems. MASs have been combined with Service-Oriented Architectures (SOAs) in order to provide customization and flexibility in these systems. This combination...

    Provided By University of Waterloo

  • White Papers // Mar 2009

    Optimizing Distributed XML Queries Through Localization and Pruning

    Distributing data collections by fragmenting them is an effective way of improving the scalability of relational database systems. The unique characteristics of XML data present challenges that require different distribution techniques to achieve scalability. In this paper, the authors propose solutions to two of the problems encountered in distributed query...

    Provided By University of Waterloo

  • White Papers // Jan 2009

    WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise

    Enterprises are increasingly deploying Wireless LANs to provide mobile access to users in corporate offices. However, existing enterprise WLANs are far from being truly mobile. In particular, they do not adequately support continuous mobility, where users access the network on-the-go. Furthermore, WLANs that do provide continuous mobility support require client...

    Provided By University of Waterloo

  • White Papers // May 2008

    Path Diversity Over Packet Switched Networks: Performance Analysis and Rate Allocation

    Path diversity works by setting up multiple parallel connections between the end points using the topological path redundancy of the network. In this paper, Forward Error Correction (FEC) is applied across multiple independent paths to enhance the end-to-end reliability. Network paths are modeled as erasure Gilbert-Elliot channels. It is known...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    Throughput-Lifetime Tradeoffs in Multihop Wireless Networks Under an SINR-Based Interference Model

    High throughput and lifetime are both crucial design objectives for a number of multi-hop wireless network applications. As these two objectives are often in conflict with each other, it naturally becomes important to identify the tradeoffs between them. Several works in the literature have focused on improving one or the...

    Provided By University of Waterloo

  • White Papers // Jan 2010

    Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control and Rate Adaptation

    The authors present a number of significant engineering insights on what makes a good configuration for medium-to large-size WMNs when the objective function is to maximize the minimum throughput among all flows. For this, they first develop efficient and exact computational tools using column generation with greedy pricing that allow...

    Provided By University of Waterloo

  • White Papers // May 2011

    Throughput Optimization in Multi-Hop Wireless Networks With Random Access

    This paper investigates cross-layer design in multi-hop wireless networks with random access. Due to the complexity of the problem, the authors study cross-layer design with a simple slotted ALOHA Medium Access Control (MAC) protocol without considering any network dynamics. Firstly, they study the optimal joint configuration of routing and MAC...

    Provided By University of Waterloo

  • White Papers // Feb 2011

    Dynamic Resource Allocation for Spot Markets in Clouds

    Cloud computing promises on-demand provisioning of resource to applications and services. To deal with dynamically fluctuating resource demands, market-driven resource allocation has been proposed and recently implemented by commercial cloud providers like Amazon EC2. In this environment, cloud resources are offered in distinct types of Virtual Machines (VMs) and the...

    Provided By University of Waterloo

  • White Papers // Oct 2009

    Case Study of Scientific Data Processing on a Cloud Using Hadoop

    With the increasing popularity of cloud computing, Hadoop has become a widely used open source cloud computing framework for large scale data processing. However, few efforts have been made to demonstrate the applicability of Hadoop to various real-world application scenarios in fields other than server side computations such as web...

    Provided By University of Waterloo

  • White Papers // Oct 2010

    Improving the Dominating-Set Routing Over Delay-Tolerant Mobile Ad-Hoc Networks Via Estimating Node Intermeeting Times

    With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In the authors' previous research, they presented a supernode system architecture that employs the Delay-Tolerant Network (DTN) concept to provide seamless communications for roaming users over interconnected heterogeneous wireless...

    Provided By University of Waterloo

  • White Papers // Apr 2010

    DFMAC: DTN-Friendly Medium Access Control for Wireless Local Area Networks Supporting Voice/Data Services

    In this paper, the authors consider a wireless communication network for both local nodes residing in densely populated hotspots and nomadic nodes roaming in a large area. Wireless Local Area Networks (WLANs) are deployed in the hotspots, while a Delay/disruption Tolerant Network (DTN) provides services to nomadic nodes in the...

    Provided By University of Waterloo

  • White Papers // Jun 2011

    A Light-weight Message Authentication Scheme for Smart Grid Communications

    Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, communication trust and security issues still present practical concerns to the deployment of SG. In this paper, to cope with these challenging concerns, the authors propose light-weight message authentication scheme features...

    Provided By University of Waterloo