Worcester Group

Displaying 1-14 of 14 results

  • White Papers // Apr 2014

    Fine Grain Cross-VM Attacks on Xen and VMware Are Possible!

    In as little as a decade cloud computing and cloud enabled applications have become mainstream running IT services of many businesses and have even personal computing through popular applications such as cloud based storage, e.g. Dropbox, and media sharing and delivery systems, e.g. Netflix. The biggest concern preventing companies and...

    Provided By Worcester Group

  • White Papers // Jan 2014

    Homomorphic AES Evaluation Using NTRU

    Since its introduction more than a decade ago the homomorphic properties of the NTRU encryption scheme have gone largely ignored. A variant of NTRU proposed by the researchers was recently extended into a full edged multi-key fully homomorphic encryption scheme by Alt-Lopez, Tromer and Vaikuntanathan (ATV). This NTRU based FHE...

    Provided By Worcester Group

  • White Papers // Feb 2013

    Key Generation in Two-Way Relay Wireless Channels

    Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. This paper studies the key generation problem in the two-way relay channel, in which there is no direct...

    Provided By Worcester Group

  • White Papers // Jan 2013

    Quickest Search Over Multiple Sequences With Mixed Observations

    The quickest search over multiple sequences problem, a generalization of the classical sequential hypothesis testing problem, was originally proposed in a recent paper. In particular, the author considered a case that multiple sequences are available. For each individual sequence, it may either be generated by distribution F0 or F1, and...

    Provided By Worcester Group

  • White Papers // Nov 2012

    Non-Bayesian Quickest Detection With Stochastic Sample Right Constraints

    In this paper, the authors study the design and analysis of optimal detection scheme for sensors that are deployed to monitor the change in the environment and are powered by the energy harvested from the environment. In this type of applications, detection delay is of paramount importance. They model this...

    Provided By Worcester Group

  • White Papers // Oct 2012

    A Low-Complexity Sequential Spectrum Sensing Scheme for Cognitive Radio

    Cognitive Radio (CR) that supports a secondary and opportunistic access to licensed spectrum shows great potential to dramatically improve spectrum utilization. Spectrum sensing performed by secondary users to detect unoccupied spectrum bands, is a key enabling technique for CR. To address issues that are important for practical implementations (such as...

    Provided By Worcester Group

  • White Papers // Oct 2012

    Simultaneously Generating Multiple Keys in Many to One Networks

    The problem of simultaneously establishing multiple keys, one for each user in a set of users, is considered with possible assist from a group of dedicated helpers. This scenario arises when multiple users want to communicate securely with a base-station. For the case in which all users are required to...

    Provided By Worcester Group

  • White Papers // Jul 2012

    Quickest Change Point Identification Across a Sensor Array

    The problem of quickly detecting a statistical change and identifying the change source is considered. In the problem studied, there are multiple sensors. A change can first occur at any one of these sensors and propagate to other sensors. One is required to detect the presence of such change with...

    Provided By Worcester Group

  • White Papers // May 2012

    Reporting Insider Threats via Covert Channels

    Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious...

    Provided By Worcester Group

  • White Papers // May 2012

    Modular FPGA-Based Software Defined Radio for CubeSats

    In this paper, the authors present an adaptive digital communication system using field programmable gate array (FPGA) technology. This system adapts the Universal Software Radio Peripheral (USRP) to better suit the space and power limitations of the CubeSat satellite form factor and the Space Plug-and-Play Avionics (SPA) protocol. The result...

    Provided By Worcester Group

  • White Papers // May 2012

    A Realtime Testbed for Performance Evaluation of Indoor TOA Location System

    Performance evaluation is an essential step in the development and deployment of an indoor TOA location system, in order to see the influence of multipath condition on ranging and localization accuracy. For field testing approach, multipath condition is invisible, uncontrollable and unrepeatable. Also it is usually not convenient due to...

    Provided By Worcester Group

  • White Papers // Mar 2012

    On Effect of Transmit Power Variance on Localization Accuracy in Wireless Capsule Endoscopy

    This paper presents an analysis on localization accuracy of a capsule used for wireless endoscopy application when there are random variations in transmit power of sensor nodes. The authors use a three-dimensional human body model and the log normal model for Received Signal Strength (RSS) radio propagation from the implant...

    Provided By Worcester Group

  • White Papers // Apr 2011

    Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design

    Multi-hop wireless networks have been widely considered as promising approaches to provide more convenient Internet access for their easy deployment, extended coverage, and low deployment cost. However, providing high-speed and reliable services in these networks is challenging due to the unreliable wireless links, broadcast nature of wireless transmissions, and frequent...

    Provided By Worcester Group

  • White Papers // Mar 2010

    An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications

    Alloy is a lightweight modeling formalism based on relational algebra. In prior work with Fisler, Giannakopoulos, Krishnamurthi, and Yoo, the authors have presented a tool, Alchemy that compiles Alloy specifications into implementations that execute against persistent databases. The foundation of Alchemy is an algorithm for rewriting relational algebra formulas into...

    Provided By Worcester Group

  • White Papers // May 2012

    Modular FPGA-Based Software Defined Radio for CubeSats

    In this paper, the authors present an adaptive digital communication system using field programmable gate array (FPGA) technology. This system adapts the Universal Software Radio Peripheral (USRP) to better suit the space and power limitations of the CubeSat satellite form factor and the Space Plug-and-Play Avionics (SPA) protocol. The result...

    Provided By Worcester Group

  • White Papers // Mar 2012

    On Effect of Transmit Power Variance on Localization Accuracy in Wireless Capsule Endoscopy

    This paper presents an analysis on localization accuracy of a capsule used for wireless endoscopy application when there are random variations in transmit power of sensor nodes. The authors use a three-dimensional human body model and the log normal model for Received Signal Strength (RSS) radio propagation from the implant...

    Provided By Worcester Group

  • White Papers // Mar 2010

    An Improved Algorithm for Generating Database Transactions from Relational Algebra Specifications

    Alloy is a lightweight modeling formalism based on relational algebra. In prior work with Fisler, Giannakopoulos, Krishnamurthi, and Yoo, the authors have presented a tool, Alchemy that compiles Alloy specifications into implementations that execute against persistent databases. The foundation of Alchemy is an algorithm for rewriting relational algebra formulas into...

    Provided By Worcester Group

  • White Papers // Feb 2013

    Key Generation in Two-Way Relay Wireless Channels

    Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. This paper studies the key generation problem in the two-way relay channel, in which there is no direct...

    Provided By Worcester Group

  • White Papers // Oct 2012

    Simultaneously Generating Multiple Keys in Many to One Networks

    The problem of simultaneously establishing multiple keys, one for each user in a set of users, is considered with possible assist from a group of dedicated helpers. This scenario arises when multiple users want to communicate securely with a base-station. For the case in which all users are required to...

    Provided By Worcester Group

  • White Papers // Jan 2013

    Quickest Search Over Multiple Sequences With Mixed Observations

    The quickest search over multiple sequences problem, a generalization of the classical sequential hypothesis testing problem, was originally proposed in a recent paper. In particular, the author considered a case that multiple sequences are available. For each individual sequence, it may either be generated by distribution F0 or F1, and...

    Provided By Worcester Group

  • White Papers // Nov 2012

    Non-Bayesian Quickest Detection With Stochastic Sample Right Constraints

    In this paper, the authors study the design and analysis of optimal detection scheme for sensors that are deployed to monitor the change in the environment and are powered by the energy harvested from the environment. In this type of applications, detection delay is of paramount importance. They model this...

    Provided By Worcester Group

  • White Papers // Oct 2012

    A Low-Complexity Sequential Spectrum Sensing Scheme for Cognitive Radio

    Cognitive Radio (CR) that supports a secondary and opportunistic access to licensed spectrum shows great potential to dramatically improve spectrum utilization. Spectrum sensing performed by secondary users to detect unoccupied spectrum bands, is a key enabling technique for CR. To address issues that are important for practical implementations (such as...

    Provided By Worcester Group

  • White Papers // Jul 2012

    Quickest Change Point Identification Across a Sensor Array

    The problem of quickly detecting a statistical change and identifying the change source is considered. In the problem studied, there are multiple sensors. A change can first occur at any one of these sensors and propagate to other sensors. One is required to detect the presence of such change with...

    Provided By Worcester Group

  • White Papers // Apr 2011

    Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design

    Multi-hop wireless networks have been widely considered as promising approaches to provide more convenient Internet access for their easy deployment, extended coverage, and low deployment cost. However, providing high-speed and reliable services in these networks is challenging due to the unreliable wireless links, broadcast nature of wireless transmissions, and frequent...

    Provided By Worcester Group

  • White Papers // May 2012

    A Realtime Testbed for Performance Evaluation of Indoor TOA Location System

    Performance evaluation is an essential step in the development and deployment of an indoor TOA location system, in order to see the influence of multipath condition on ranging and localization accuracy. For field testing approach, multipath condition is invisible, uncontrollable and unrepeatable. Also it is usually not convenient due to...

    Provided By Worcester Group

  • White Papers // Jan 2014

    Homomorphic AES Evaluation Using NTRU

    Since its introduction more than a decade ago the homomorphic properties of the NTRU encryption scheme have gone largely ignored. A variant of NTRU proposed by the researchers was recently extended into a full edged multi-key fully homomorphic encryption scheme by Alt-Lopez, Tromer and Vaikuntanathan (ATV). This NTRU based FHE...

    Provided By Worcester Group

  • White Papers // May 2012

    Reporting Insider Threats via Covert Channels

    Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious...

    Provided By Worcester Group

  • White Papers // Apr 2014

    Fine Grain Cross-VM Attacks on Xen and VMware Are Possible!

    In as little as a decade cloud computing and cloud enabled applications have become mainstream running IT services of many businesses and have even personal computing through popular applications such as cloud based storage, e.g. Dropbox, and media sharing and delivery systems, e.g. Netflix. The biggest concern preventing companies and...

    Provided By Worcester Group