University of Winnipeg

Displaying 1-15 of 15 results

  • White Papers // Sep 2013

    Protocol Misidentification Made Easy with Format-Transforming Encryption

    Deep Packet Inspection (DPI) technologies provide much needed visibility and control of network traffic using port independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, the authors provide the first comprehensive evaluation of a large set of DPI systems...

    Provided By University of Winnipeg

  • White Papers // Jul 2013

    FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution

    Embedded systems increasingly use software-driven low-power microprocessors for security-critical settings, surfacing a need for tools that can audit the security of the software (often called firmware) running on such devices. Despite the fact that firmware programs are often written in C, existing source-code analysis tools do not work well for...

    Provided By University of Winnipeg

  • White Papers // Jun 2013

    Enabling JSON Document Stores in Relational Systems

    In recent years, \"Document store\" NoSQL systems have exploded in popularity, largely driven by the adoption of the JSON data model in Web and mobile applications. The advantages of these NoSQL document store systems (like MongoDB and CouchDB) are tempered by a lack of traditional RDBMS features, notably a sophisticated...

    Provided By University of Winnipeg

  • White Papers // Feb 2013

    Power Struggles: Revisiting the RISC vs. CISC Debate on Contemporary ARM and X86 Architectures

    RISC vs. CISC wars raged in the 1980s when chip area and processor design complexity were the primary constraints and desktops and servers exclusively dominated the computing landscape. Today, energy and power are the primary design constraints and the computing landscape is significantly different: growth in tablets and Smartphones running...

    Provided By University of Winnipeg

  • White Papers // Nov 2012

    Delay Constrained Multicast Routing: What Can We Learn From an Exact Approach?

    Delay constrained multicast routing is a typical problem in many emerging applications such as voice over IP, video on demand and teleconferencing, etc. Equivalently referred to as the Delay Constrained Minimum Steiner Tree (DCMST), this problem requires to find a tree spanning a source and a set of destination nodes...

    Provided By University of Winnipeg

  • White Papers // Jun 2012

    Automating Threat Modeling Through the Software Development Life-Cycle

    Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important...

    Provided By University of Winnipeg

  • White Papers // May 2012

    GRASP-BSMA: A Fast Algorithm for Delay Constrained Multicast Routing

    Constrained MinimumSteiner Tree (CMST) problem is a key issue in multicast routing with Quality of Service (QoS) support. Many heuristics have been developed to solve this NP-complete problem. In recent years, some interesting work has been done to use the Greedy Randomized Adaptive Search Procedure (GRASP) to solve this problem....

    Provided By University of Winnipeg

  • White Papers // Jan 2012

    Design, Integration and Implementation of the DySER Hardware Accelerator into OpenSPARC

    Accelerators and specialization in various forms are emerging as a way to increase processor performance. Examples include Navigo, Conservation-Cores, BERET, and DySER. While each of these employs different primitives and principles to achieve specialization, they share some common concerns with regards to implementation. Two of these concerns are: how to...

    Provided By University of Winnipeg

  • White Papers // Nov 2011

    Towards Multi-Tenant Performance SLOs

    As traditional and mission-critical relational database workloads migrate to the cloud in the form of Database-as-a-Service (DaaS), there is an increasing motivation to provide performance goals in Service Level Objectives (SLOs). Providing such performance goals is challenging for DaaS providers as they must balance the performance that they can deliver...

    Provided By University of Winnipeg

  • White Papers // Dec 2010

    Dynamically Specialized Datapaths for Energy Efficient Computing

    Due to limits in technology scaling, energy efficiency of logic devices is decreasing in successive generations. To provide continued performance improvements without increasing power, regardless of the sequential or parallel nature of the application, micro-architectural energy efficiency must improve. The authors propose Dynamically Specialized Datapaths to improve the energy efficiency...

    Provided By University of Winnipeg

  • White Papers // Jan 2010

    Automating Security Mediation Placement

    The authors present a framework that automatically produces resolution placement suggestions for type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive security policy mediation. Resolving such type errors requires selecting a placement of mediation statements that implement runtime security decisions, such as de-classifiers and authorization checks....

    Provided By University of Winnipeg

  • White Papers // Jul 2009

    A Survey on BGP Issues and Solutions

    BGP is the de facto protocol used for inter-autonomous system routing in the Internet. Generally speaking, BGP has been proven to be secure, efficient, scalable, and robust. However, with the rapid evolving of the Internet in the past few decades, there are increasing concerns about BGS's ability to meet the...

    Provided By University of Winnipeg

  • White Papers // Jan 2009

    Sparse Multipath Channels: Modeling and Estimation

    Multipath signal propagation is the defining characteristic of terrestrial wireless channels. Virtually all existing statistical models for wireless channels are implicitly based on the assumption of rich multipath, which can be traced back to the seminal works of Bello and Kennedy on the wide-sense stationary uncorrelated scattering model, and more...

    Provided By University of Winnipeg

  • White Papers // Oct 2008

    Compressed Sensing of Wireless Channels in Time, Frequency, and Space

    Training-based channel estimation involves probing of the channel in time, frequency, and space by the transmitter with known signals, and estimation of channel parameters from the output signals at the receiver. Numerous measurement campaigns have shown, however, that physical multipath channels exhibit a sparse structure in angle-delay-Doppler, especially at large...

    Provided By University of Winnipeg

  • White Papers // Sep 2008

    Learning Sparse Doubly-Selective Channels

    Coherent data communication over doubly-selective channels requires that the channel response be known at the receiver. Training-based schemes, which involve probing of the channel with known signaling waveforms and processing of the corresponding channel output to estimate the channel parameters, are commonly employed to learn the channel response in practice....

    Provided By University of Winnipeg

  • White Papers // Nov 2011

    Towards Multi-Tenant Performance SLOs

    As traditional and mission-critical relational database workloads migrate to the cloud in the form of Database-as-a-Service (DaaS), there is an increasing motivation to provide performance goals in Service Level Objectives (SLOs). Providing such performance goals is challenging for DaaS providers as they must balance the performance that they can deliver...

    Provided By University of Winnipeg

  • White Papers // Jun 2013

    Enabling JSON Document Stores in Relational Systems

    In recent years, \"Document store\" NoSQL systems have exploded in popularity, largely driven by the adoption of the JSON data model in Web and mobile applications. The advantages of these NoSQL document store systems (like MongoDB and CouchDB) are tempered by a lack of traditional RDBMS features, notably a sophisticated...

    Provided By University of Winnipeg

  • White Papers // Nov 2012

    Delay Constrained Multicast Routing: What Can We Learn From an Exact Approach?

    Delay constrained multicast routing is a typical problem in many emerging applications such as voice over IP, video on demand and teleconferencing, etc. Equivalently referred to as the Delay Constrained Minimum Steiner Tree (DCMST), this problem requires to find a tree spanning a source and a set of destination nodes...

    Provided By University of Winnipeg

  • White Papers // Jan 2010

    Automating Security Mediation Placement

    The authors present a framework that automatically produces resolution placement suggestions for type errors in security-typed programs, enabling legacy code to be retrofit with comprehensive security policy mediation. Resolving such type errors requires selecting a placement of mediation statements that implement runtime security decisions, such as de-classifiers and authorization checks....

    Provided By University of Winnipeg

  • White Papers // Feb 2013

    Power Struggles: Revisiting the RISC vs. CISC Debate on Contemporary ARM and X86 Architectures

    RISC vs. CISC wars raged in the 1980s when chip area and processor design complexity were the primary constraints and desktops and servers exclusively dominated the computing landscape. Today, energy and power are the primary design constraints and the computing landscape is significantly different: growth in tablets and Smartphones running...

    Provided By University of Winnipeg

  • White Papers // Jan 2012

    Design, Integration and Implementation of the DySER Hardware Accelerator into OpenSPARC

    Accelerators and specialization in various forms are emerging as a way to increase processor performance. Examples include Navigo, Conservation-Cores, BERET, and DySER. While each of these employs different primitives and principles to achieve specialization, they share some common concerns with regards to implementation. Two of these concerns are: how to...

    Provided By University of Winnipeg

  • White Papers // Dec 2010

    Dynamically Specialized Datapaths for Energy Efficient Computing

    Due to limits in technology scaling, energy efficiency of logic devices is decreasing in successive generations. To provide continued performance improvements without increasing power, regardless of the sequential or parallel nature of the application, micro-architectural energy efficiency must improve. The authors propose Dynamically Specialized Datapaths to improve the energy efficiency...

    Provided By University of Winnipeg

  • White Papers // Jan 2009

    Sparse Multipath Channels: Modeling and Estimation

    Multipath signal propagation is the defining characteristic of terrestrial wireless channels. Virtually all existing statistical models for wireless channels are implicitly based on the assumption of rich multipath, which can be traced back to the seminal works of Bello and Kennedy on the wide-sense stationary uncorrelated scattering model, and more...

    Provided By University of Winnipeg

  • White Papers // Oct 2008

    Compressed Sensing of Wireless Channels in Time, Frequency, and Space

    Training-based channel estimation involves probing of the channel in time, frequency, and space by the transmitter with known signals, and estimation of channel parameters from the output signals at the receiver. Numerous measurement campaigns have shown, however, that physical multipath channels exhibit a sparse structure in angle-delay-Doppler, especially at large...

    Provided By University of Winnipeg

  • White Papers // Sep 2008

    Learning Sparse Doubly-Selective Channels

    Coherent data communication over doubly-selective channels requires that the channel response be known at the receiver. Training-based schemes, which involve probing of the channel with known signaling waveforms and processing of the corresponding channel output to estimate the channel parameters, are commonly employed to learn the channel response in practice....

    Provided By University of Winnipeg

  • White Papers // Jun 2012

    Automating Threat Modeling Through the Software Development Life-Cycle

    Fixing software security issues early in the development life-cycle reduces its cost dramatically. Companies doing software development know this reality, and they have introduced risk assessment methodologies in their development processes. Unfortunately, these methodologies require engineers to have deep software security skills to carry out some of the most important...

    Provided By University of Winnipeg

  • White Papers // Sep 2013

    Protocol Misidentification Made Easy with Format-Transforming Encryption

    Deep Packet Inspection (DPI) technologies provide much needed visibility and control of network traffic using port independent protocol identification, where a network flow is labeled with its application-layer protocol based on packet contents. In this paper, the authors provide the first comprehensive evaluation of a large set of DPI systems...

    Provided By University of Winnipeg

  • White Papers // Jul 2013

    FIE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution

    Embedded systems increasingly use software-driven low-power microprocessors for security-critical settings, surfacing a need for tools that can audit the security of the software (often called firmware) running on such devices. Despite the fact that firmware programs are often written in C, existing source-code analysis tools do not work well for...

    Provided By University of Winnipeg

  • White Papers // Jul 2009

    A Survey on BGP Issues and Solutions

    BGP is the de facto protocol used for inter-autonomous system routing in the Internet. Generally speaking, BGP has been proven to be secure, efficient, scalable, and robust. However, with the rapid evolving of the Internet in the past few decades, there are increasing concerns about BGS's ability to meet the...

    Provided By University of Winnipeg

  • White Papers // May 2012

    GRASP-BSMA: A Fast Algorithm for Delay Constrained Multicast Routing

    Constrained MinimumSteiner Tree (CMST) problem is a key issue in multicast routing with Quality of Service (QoS) support. Many heuristics have been developed to solve this NP-complete problem. In recent years, some interesting work has been done to use the Greedy Randomized Adaptive Search Procedure (GRASP) to solve this problem....

    Provided By University of Winnipeg