WasatchWare

Displaying 1-12 of 12 results

  • White Papers // May 2013

    Centrality-Based Network Coder Placement for Peer-to-Peer Content Distribution

    Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, the authors propose a practical network coder placement algorithm which achieves...

    Provided By WasatchWare

  • White Papers // Apr 2013

    Detection of Influenza Viruses Attached to an Optical Disk

    The authors have examined the detection of 100 nm polystyrene beads and influenza viruses using an optical disk drive tester. They have successfully detected these particles using this method. The results agreed well with images taken by a SEM. This paper indicates that the optical disk technology can be used...

    Provided By WasatchWare

  • White Papers // Nov 2012

    Rarest-First and Coding Are Not Enough

    Network coding has been applied successfully in Peer-To-Peer (P2P) systems to shorten the distribution time. Pieces of data, i.e. blocks, are combined, i.e. encoded, by the sending peers before forwarding to other peers. Even though requiring all peers to encode might achieve shortest distribution time, it is not necessarily optimal...

    Provided By WasatchWare

  • White Papers // Aug 2012

    Fuzzy Clustering Analysis of Data Mining: Application to an Accident Mining System

    In this paper, the authors deal with the application of data transforms and fuzzy clustering to extract useful data. It is possible to distinguish similar information which includes selector and removes clusters of less importance with respect to describing the data. Clustering takes place in the product space of systems...

    Provided By WasatchWare

  • White Papers // May 2012

    Resource Allocation and Access Strategy Selection for QoS Provisioning in Cognitive Networks

    Dynamic Spectrum Access (DSA) strategy selection and the associated resource allocation are critically important issues for cognitive networks, because they need to not only satisfy the interference constraint caused to the Primary Users (PU), but also meet the delay Quality-of-Service (QoS) requirements for the Secondary Users (SU). In this paper,...

    Provided By WasatchWare

  • White Papers // Mar 2012

    A Novel Clipping and Filtering Method Employing Transmit Power Control for OFDM Systems

    This paper proposes a novel clipping and filtering method employing transmit power control to improve the Bit Error Rate (BER) performance in MIMO-OFDM transmission. The feature of the proposed approach is to perform the transmit power control before clipping and filtering to alleviate the BER degradation caused by clipping and...

    Provided By WasatchWare

  • White Papers // Mar 2012

    Cyclic Activated Power-Efficient Scheme Based Upon Dynamic Cell Configuration

    In this paper, the authors propose an energy saving solution for mobile systems based upon dynamic cell configuration for different scenarios. To characterize the optimal energy savings of base stations, they propose an active cell rotating scheme to control the number of active cells with regard to different work patterns...

    Provided By WasatchWare

  • White Papers // Aug 2011

    Analysis of Redirection Caused by Web-Based Malware

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through Web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By WasatchWare

  • White Papers // Jun 2011

    An Energy Efficient Data Secrecy Scheme for Wireless Body Sensor Networks

    Data secrecy is one of the key concerns for Wireless Body Sensor Networks (WBSNs). Usually, a data secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face more serious limitations than general wireless networks in terms of energy supply. To address this, in this paper, the authors...

    Provided By WasatchWare

  • White Papers // May 2010

    D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-Order Keystream Generation

    Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable storage service providers. For example, in applications such as cloud computing where data storage is transparent to the owner....

    Provided By WasatchWare

  • White Papers // Oct 2009

    Continuous Contention-Assisted Transmission MAC Protocol for Wireless Ad-Hoc Network

    In this paper, the authors introduce a new MAC protocol called Continuous contention-Assisted Transmission (CAT) for wireless ad-hoc network. This proposed protocol is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) but they have modified the ACK packet and re-designed mobile stations behavior so that they could continuously...

    Provided By WasatchWare

  • White Papers // Jul 2008

    Prottoy Middleware Platform for Smart Object Systems

    In this paper, the authors present a middleware platform, Prottoy for the development of smart object systems. A smart object has some specific characteristics e.g., augmentation variation, perceptual feedback provision, push-pull model, etc. In addition a smart object could be stand-alone, co-operative or associated with an external application. Generic pervasive...

    Provided By WasatchWare

  • White Papers // Jun 2011

    An Energy Efficient Data Secrecy Scheme for Wireless Body Sensor Networks

    Data secrecy is one of the key concerns for Wireless Body Sensor Networks (WBSNs). Usually, a data secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face more serious limitations than general wireless networks in terms of energy supply. To address this, in this paper, the authors...

    Provided By WasatchWare

  • White Papers // Nov 2012

    Rarest-First and Coding Are Not Enough

    Network coding has been applied successfully in Peer-To-Peer (P2P) systems to shorten the distribution time. Pieces of data, i.e. blocks, are combined, i.e. encoded, by the sending peers before forwarding to other peers. Even though requiring all peers to encode might achieve shortest distribution time, it is not necessarily optimal...

    Provided By WasatchWare

  • White Papers // Aug 2012

    Fuzzy Clustering Analysis of Data Mining: Application to an Accident Mining System

    In this paper, the authors deal with the application of data transforms and fuzzy clustering to extract useful data. It is possible to distinguish similar information which includes selector and removes clusters of less importance with respect to describing the data. Clustering takes place in the product space of systems...

    Provided By WasatchWare

  • White Papers // Oct 2009

    Continuous Contention-Assisted Transmission MAC Protocol for Wireless Ad-Hoc Network

    In this paper, the authors introduce a new MAC protocol called Continuous contention-Assisted Transmission (CAT) for wireless ad-hoc network. This proposed protocol is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) but they have modified the ACK packet and re-designed mobile stations behavior so that they could continuously...

    Provided By WasatchWare

  • White Papers // May 2013

    Centrality-Based Network Coder Placement for Peer-to-Peer Content Distribution

    Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation cost: every node in the network has to code. Interested in minimizing resource consumption of network coding while maintaining its performance, in this paper, the authors propose a practical network coder placement algorithm which achieves...

    Provided By WasatchWare

  • White Papers // Aug 2011

    Analysis of Redirection Caused by Web-Based Malware

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through Web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By WasatchWare

  • White Papers // Apr 2013

    Detection of Influenza Viruses Attached to an Optical Disk

    The authors have examined the detection of 100 nm polystyrene beads and influenza viruses using an optical disk drive tester. They have successfully detected these particles using this method. The results agreed well with images taken by a SEM. This paper indicates that the optical disk technology can be used...

    Provided By WasatchWare

  • White Papers // May 2010

    D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-Order Keystream Generation

    Migrating from server-attached storage to distributed storage brings new vulnerabilities in creating a secure data storage and access facility. Particularly it is a challenge on top of insecure networks or unreliable storage service providers. For example, in applications such as cloud computing where data storage is transparent to the owner....

    Provided By WasatchWare

  • White Papers // Jul 2008

    Prottoy Middleware Platform for Smart Object Systems

    In this paper, the authors present a middleware platform, Prottoy for the development of smart object systems. A smart object has some specific characteristics e.g., augmentation variation, perceptual feedback provision, push-pull model, etc. In addition a smart object could be stand-alone, co-operative or associated with an external application. Generic pervasive...

    Provided By WasatchWare

  • White Papers // May 2012

    Resource Allocation and Access Strategy Selection for QoS Provisioning in Cognitive Networks

    Dynamic Spectrum Access (DSA) strategy selection and the associated resource allocation are critically important issues for cognitive networks, because they need to not only satisfy the interference constraint caused to the Primary Users (PU), but also meet the delay Quality-of-Service (QoS) requirements for the Secondary Users (SU). In this paper,...

    Provided By WasatchWare

  • White Papers // Mar 2012

    A Novel Clipping and Filtering Method Employing Transmit Power Control for OFDM Systems

    This paper proposes a novel clipping and filtering method employing transmit power control to improve the Bit Error Rate (BER) performance in MIMO-OFDM transmission. The feature of the proposed approach is to perform the transmit power control before clipping and filtering to alleviate the BER degradation caused by clipping and...

    Provided By WasatchWare

  • White Papers // Mar 2012

    Cyclic Activated Power-Efficient Scheme Based Upon Dynamic Cell Configuration

    In this paper, the authors propose an energy saving solution for mobile systems based upon dynamic cell configuration for different scenarios. To characterize the optimal energy savings of base stations, they propose an active cell rotating scheme to control the number of active cells with regard to different work patterns...

    Provided By WasatchWare