Zhejiang University

Displaying 1-31 of 31 results

  • White Papers // Apr 2012

    Optimal Power Control Between Two Opportunistic Cooperative Base Stations

    In this paper, the authors consider sum rate maximization problem between two opportunistic cooperative Base Stations (BS). They propose a simple criterion to decide if the cooperation is binary or sharing power controls. When sharing power cooperation is identified, the resulting problem is a sum rate maximization problem for interfering...

    Provided By Zhejiang University

  • White Papers // Sep 2011

    Outage Probability Analysis of Dual-Hop Multiple Antenna Fixed-Gain AF Relay Systems With Interference

    This paper presents an analytical investigation on the outage performance of dual-hop multiple antenna fixed-gain amplify-and-forward relay systems in the presence of co-channel interference. Exact closed-form analytical expressions for the outage probability of the systems are derived. Moreover, simple outage probability approximations at the high signal to noise ratio regime...

    Provided By Zhejiang University

  • White Papers // Aug 2011

    Adaptive Error Control Mechanism Based on GM(1,1) Model and Crosslayer Design for Video Streaming Over Wireless

    This paper proposes an adaptive error control mechanism for wireless video streaming, in order that the video data over wireless could be played on receiving sides with high quality. This model, based on GM (1, 1) model and cross-layer design, which adaptively select different error control techniques for every packet...

    Provided By Zhejiang University

  • White Papers // Jul 2011

    Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks

    In this paper, the authors propose a Coordinate-free Distributed Boundary Detection algorithm (CDBD). It adopts general sensing and communication models and exploits two centrality measures, i.e., betweenness and closeness. For CDBD, each node only needs to communicate with its k-hop neighbors twice and makes decision whether it itself is a...

    Provided By Zhejiang University

  • White Papers // May 2011

    A Dynamic Fault Localization Technique With Noise Reduction for Java Programs

    Existing fault localization techniques combine various program features and similarity coefficients with the aim of precisely assessing the similarities among the dynamic spectra of these program features to predict the locations of faults. Many such techniques estimate the probability of a particular program feature causing the observed failures. They ignore...

    Provided By Zhejiang University

  • White Papers // May 2011

    Crypt Analyses of a Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is applied broadly to a range of significantly different networking environments. The open environment of WSN requires mechanisms which prevent unauthorized users from accessing resources. User authentication in WSN is a critical security issue. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs. However,...

    Provided By Zhejiang University

  • White Papers // Mar 2011

    Large-Volatility Dynamics In Financial Markets

    The authors investigate the large-volatility dynamics in financial markets, based on the minute-to-minute and daily data of the Chinese Indices and German DAX. The dynamic relaxation both before and after large volatilities is characterized by a power law, and the exponents p? usually vary with the strength of the large...

    Provided By Zhejiang University

  • White Papers // Oct 2010

    Financial Crisis, Control Rights And Cash Flow Of Investment Sensitivity: The Chinese Perspective

    The investment cash flow sensitivity is considered with firm's control right and the impact of financial crisis at the end of 2008. Compared with the classic model by ownership, the model with control rights is more efficient and stable. The empirical study also shows the change in model structure before...

    Provided By Zhejiang University

  • White Papers // Oct 2010

    SLAW: Secure Localization Against Wormhole Attacks Using Conflicting Sets

    The wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    Providing Scalable Database Services on the Cloud

    The Cloud is fast gaining popularity as a platform for deploying Software as a Service (SaaS) applications. In principle, the Cloud provides unlimited compute resources, enabling deployed services to scale seamlessly. Moreover, the pay-as-you-go model in the Cloud reduces the maintenance overhead of the applications. Given the advantages of the...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    Strong Designated Verifier Signature Scheme: New Definition and Construction

    Recently, several strong designated verifier signature schemes have been proposed in the literature. In this paper, the authors first point out that such so-called strong designated verifier signature scheme is just message authentication code HMAC. Without the key property, unforgeability, for signatures, these schemes cannot enable signers to have complete...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    LT Coding Over the Network

    LT codes promise reliable transmissions of data between peers and have been proven as a method especially suitable for multimedia multicast and broadcast applications. In this paper, the authors study a model in which broadcast is carried out over a wireless multi-hop network by taking advantage of the reliability of...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Reliable Data Transmission Using IBRC and LT Codes Over AWGN Channels

    LT codes promise reliable transmissions of data over erasure channels. They also work satisfactorily over interference channels after Cyclic Redundancy Check (CRC) is introduced into the transmission system. In this paper, the authors will propose a set of codes named Improved Binary Repetition Codes (IBRCs) derived from block repetition codes...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Compressed Sensing for Efficient Random Routing in Multi-Hop Wireless Sensor Networks

    Compressed Sensing (CS) is a novel theory based on the fact that certain signals can be recovered from a relatively small number of non-adaptive linear projections, when the original signals and the compression matrix own certain properties. In virtue of these advantages, compressed sensing, as a promising technique to deal...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Power Entangling and Matching in Cognitive Wireless Mesh Networks by Applying Conjecture Based Multi-Agent QQ-Learning Approach

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks express great flexibility to improve the spectrum utilization by opportunistically accessing the authorized frequency bands. One of the critical challenges for realizing such networks is how to adaptively match transmit powers and allocate frequency resources among Secondary Users...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    MAP-JOIN-REDUCE: Towards Scalable and Efficient Data Analysis on Large Clusters

    Data analysis is an important functionality in cloud computing which allows a huge amount of data to be processed over very large clusters. MapReduce is recognized as a popular way to handle data in the cloud environment due to its excellent scalability and good fault tolerance. However, compared to parallel...

    Provided By Zhejiang University

  • White Papers // Jun 2010

    Green Transmit Power Assignment for Cognitive Radio Networks by Applying Multi-Agent Q-Learning Approach

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks (CogMesh) indicate great flexibility to improve the spectrum utilization by opportunistically accessing the authorized frequency bands. In this paper, the authors consider non-cooperative green power assignment in CogMesh with the consideration of energy efficiency. The problem is modeled...

    Provided By Zhejiang University

  • White Papers // Jun 2010

    Towards Green Wireless Access Networks

    As wireless communications experience exponential growth, energy consumption has became a crucial problem in the wireless industry. Energy efficiency of wireless systems has to be significantly improved in order to guarantee the sustainable growth of the wireless industry. Plenty of efforts have been carried on to achieve so called green...

    Provided By Zhejiang University

  • White Papers // Mar 2010

    Reinforcement Learning Enhanced Iterative Power Allocation in Stochastic Cognitive Wireless Mesh Networks

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks have great flexibility to improve the spectrum utilization by opportunistically accessing the licensed frequency bands. One of the critical challenges for realizing such network is how to adaptively allocate transmit powers and frequency resources among Secondary Users (SUs)...

    Provided By Zhejiang University

  • White Papers // Feb 2010

    A Stochastic Multiobjective Optimization Framework for Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), there generally exist many different objective functions to be optimized. In this paper, the authors propose a stochastic multi-objective optimization approach to solve such kind of problem. They first formulate a general multi-objective optimization problem. They then decompose the optimization formulation through Lagrange dual decomposition...

    Provided By Zhejiang University

  • White Papers // Dec 2009

    DPLC: Dynamic Packet Length Control in Wireless Sensor Networks

    Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this paper, the authors present DPLC, a Dynamic Packet Length Control scheme. To make DPLC more efficient in terms of channel utilization, they incorporate a lightweight and accurate link estimation method that captures both...

    Provided By Zhejiang University

  • White Papers // Sep 2009

    A Secure Localization Approach Against Wormhole Attacks Using Distance Consistency

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniff packets at one point in the network and tunnel them through a wired or wireless link to another point, and the other relays them...

    Provided By Zhejiang University

  • White Papers // Aug 2009

    Intercluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding

    Cognitive wireless mesh networks have great flexibility to improve spectrum resource utilization, within which Secondary Users (SUs) can opportunistically access the authorized frequency bands while being complying with the interference constraint as well as the QoS (Quality-of-Service) requirement of Primary Users (PUs). In this paper, the authors consider inter-cluster connection...

    Provided By Zhejiang University

  • White Papers // Jul 2009

    SenSpire OS: A Predictable, Flexible, and Efficient Operating System for Wireless Sensor Networks

    The development of a modern sensor network is very difficult because of the long-term unattended operating mode, diverse application requirements, and stringent resource constraints. To address these issues respectively, the authors present SenSpire OS, a predictable, flexible, and efficient operating system for Wireless Sensor Networks (WSNs). They improve system predictability...

    Provided By Zhejiang University

  • White Papers // Mar 2009

    Collaborative Web-Based E-learning Environment for Information Security Curriculum

    In recent years, the development of e-learning is very rapid. E-learning is an attractive and efficient way for computer education. Student interaction and collaboration also plays an important role in e-learning. In this paper, a collaborative web-based e-learning environment is presented. A wide range of interactive and collaborative methods are...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    E-Exhibition Towards International Trade Base on Knowledge Management

    In recent years, the total number of traditional exhibition in developed countries show a decline, exhibitors are dropped because more of them use network technology to carry out on-line international trade, display products and the exchange of information. E-exhibition is to flourish which provide low cost and all-day exhibition to...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Knowledge Extracting Platform Based on Web Service

    An Application Service Provider (ASP) is a business that provides computer-based services to customers over a network. Software offered using an ASP model is also sometimes called On-demand software or Software as a Service (SaaS). The most limited sense of this business is that of providing access to a particular...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Research of Utility Prepayment System Based on Wireless Communication

    In this paper, the authors seeks to clarify differences and similarities among impressive array of radio access technologies which can be used in utility prepayment, analyzes the requirements of wireless prepayment utility meter system. It present a set of mobile prepayment solution in which the Prepayment Meter (PM) system is...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    High Efficient Knowledge Extracting Platform Based on e-Delivery Pattern

    Generally, the existing Data Mining delivery mechanisms are based on moving data to a mining server node or moving data mining code to data resource node. This pattern is not suit for the new requirement for some situations. In this paper, the authors proposed a novel knowledge extraction mechanism which...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Research and Application of SQLite Embedded Database Technology

    The embedded database SQLite is widely applied in the data management of embedded environment such as mobile devices, industrial control, information appliance etc., it has become the focus of the development of related areas. For its advantages of stability and reliability, fast and high efficiency, portability and so on, which...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    A Sampling-Based Method for Dynamic Scheduling in Distributed Data Mining Environment

    In this paper, the authors propose a new solution for dynamic task scheduling in distributed environment. The key issue for scheduling tasks is that they cannot obtain the execution time of irregular computations in advance. For this reason, they propose a method which is based on sampling to some typical...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Research of Utility Prepayment System Based on Wireless Communication

    In this paper, the authors seeks to clarify differences and similarities among impressive array of radio access technologies which can be used in utility prepayment, analyzes the requirements of wireless prepayment utility meter system. It present a set of mobile prepayment solution in which the Prepayment Meter (PM) system is...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    High Efficient Knowledge Extracting Platform Based on e-Delivery Pattern

    Generally, the existing Data Mining delivery mechanisms are based on moving data to a mining server node or moving data mining code to data resource node. This pattern is not suit for the new requirement for some situations. In this paper, the authors proposed a novel knowledge extraction mechanism which...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    E-Exhibition Towards International Trade Base on Knowledge Management

    In recent years, the total number of traditional exhibition in developed countries show a decline, exhibitors are dropped because more of them use network technology to carry out on-line international trade, display products and the exchange of information. E-exhibition is to flourish which provide low cost and all-day exhibition to...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Knowledge Extracting Platform Based on Web Service

    An Application Service Provider (ASP) is a business that provides computer-based services to customers over a network. Software offered using an ASP model is also sometimes called On-demand software or Software as a Service (SaaS). The most limited sense of this business is that of providing access to a particular...

    Provided By Zhejiang University

  • White Papers // Mar 2009

    Collaborative Web-Based E-learning Environment for Information Security Curriculum

    In recent years, the development of e-learning is very rapid. E-learning is an attractive and efficient way for computer education. Student interaction and collaboration also plays an important role in e-learning. In this paper, a collaborative web-based e-learning environment is presented. A wide range of interactive and collaborative methods are...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    Strong Designated Verifier Signature Scheme: New Definition and Construction

    Recently, several strong designated verifier signature schemes have been proposed in the literature. In this paper, the authors first point out that such so-called strong designated verifier signature scheme is just message authentication code HMAC. Without the key property, unforgeability, for signatures, these schemes cannot enable signers to have complete...

    Provided By Zhejiang University

  • White Papers // Mar 2011

    Large-Volatility Dynamics In Financial Markets

    The authors investigate the large-volatility dynamics in financial markets, based on the minute-to-minute and daily data of the Chinese Indices and German DAX. The dynamic relaxation both before and after large volatilities is characterized by a power law, and the exponents p? usually vary with the strength of the large...

    Provided By Zhejiang University

  • White Papers // Oct 2010

    Financial Crisis, Control Rights And Cash Flow Of Investment Sensitivity: The Chinese Perspective

    The investment cash flow sensitivity is considered with firm's control right and the impact of financial crisis at the end of 2008. Compared with the classic model by ownership, the model with control rights is more efficient and stable. The empirical study also shows the change in model structure before...

    Provided By Zhejiang University

  • White Papers // Mar 2010

    Reinforcement Learning Enhanced Iterative Power Allocation in Stochastic Cognitive Wireless Mesh Networks

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks have great flexibility to improve the spectrum utilization by opportunistically accessing the licensed frequency bands. One of the critical challenges for realizing such network is how to adaptively allocate transmit powers and frequency resources among Secondary Users (SUs)...

    Provided By Zhejiang University

  • White Papers // Jul 2011

    Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks

    In this paper, the authors propose a Coordinate-free Distributed Boundary Detection algorithm (CDBD). It adopts general sensing and communication models and exploits two centrality measures, i.e., betweenness and closeness. For CDBD, each node only needs to communicate with its k-hop neighbors twice and makes decision whether it itself is a...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    Providing Scalable Database Services on the Cloud

    The Cloud is fast gaining popularity as a platform for deploying Software as a Service (SaaS) applications. In principle, the Cloud provides unlimited compute resources, enabling deployed services to scale seamlessly. Moreover, the pay-as-you-go model in the Cloud reduces the maintenance overhead of the applications. Given the advantages of the...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    MAP-JOIN-REDUCE: Towards Scalable and Efficient Data Analysis on Large Clusters

    Data analysis is an important functionality in cloud computing which allows a huge amount of data to be processed over very large clusters. MapReduce is recognized as a popular way to handle data in the cloud environment due to its excellent scalability and good fault tolerance. However, compared to parallel...

    Provided By Zhejiang University

  • White Papers // Feb 2010

    A Stochastic Multiobjective Optimization Framework for Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), there generally exist many different objective functions to be optimized. In this paper, the authors propose a stochastic multi-objective optimization approach to solve such kind of problem. They first formulate a general multi-objective optimization problem. They then decompose the optimization formulation through Lagrange dual decomposition...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Reliable Data Transmission Using IBRC and LT Codes Over AWGN Channels

    LT codes promise reliable transmissions of data over erasure channels. They also work satisfactorily over interference channels after Cyclic Redundancy Check (CRC) is introduced into the transmission system. In this paper, the authors will propose a set of codes named Improved Binary Repetition Codes (IBRCs) derived from block repetition codes...

    Provided By Zhejiang University

  • White Papers // Sep 2009

    A Secure Localization Approach Against Wormhole Attacks Using Distance Consistency

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniff packets at one point in the network and tunnel them through a wired or wireless link to another point, and the other relays them...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Power Entangling and Matching in Cognitive Wireless Mesh Networks by Applying Conjecture Based Multi-Agent QQ-Learning Approach

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks express great flexibility to improve the spectrum utilization by opportunistically accessing the authorized frequency bands. One of the critical challenges for realizing such networks is how to adaptively match transmit powers and allocate frequency resources among Secondary Users...

    Provided By Zhejiang University

  • White Papers // Jun 2010

    Towards Green Wireless Access Networks

    As wireless communications experience exponential growth, energy consumption has became a crucial problem in the wireless industry. Energy efficiency of wireless systems has to be significantly improved in order to guarantee the sustainable growth of the wireless industry. Plenty of efforts have been carried on to achieve so called green...

    Provided By Zhejiang University

  • White Papers // Aug 2010

    Compressed Sensing for Efficient Random Routing in Multi-Hop Wireless Sensor Networks

    Compressed Sensing (CS) is a novel theory based on the fact that certain signals can be recovered from a relatively small number of non-adaptive linear projections, when the original signals and the compression matrix own certain properties. In virtue of these advantages, compressed sensing, as a promising technique to deal...

    Provided By Zhejiang University

  • White Papers // Jun 2010

    Green Transmit Power Assignment for Cognitive Radio Networks by Applying Multi-Agent Q-Learning Approach

    As the scarce spectrum resource is becoming overcrowded, cognitive wireless mesh networks (CogMesh) indicate great flexibility to improve the spectrum utilization by opportunistically accessing the authorized frequency bands. In this paper, the authors consider non-cooperative green power assignment in CogMesh with the consideration of energy efficiency. The problem is modeled...

    Provided By Zhejiang University

  • White Papers // Sep 2010

    LT Coding Over the Network

    LT codes promise reliable transmissions of data between peers and have been proven as a method especially suitable for multimedia multicast and broadcast applications. In this paper, the authors study a model in which broadcast is carried out over a wireless multi-hop network by taking advantage of the reliability of...

    Provided By Zhejiang University

  • White Papers // May 2011

    Crypt Analyses of a Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is applied broadly to a range of significantly different networking environments. The open environment of WSN requires mechanisms which prevent unauthorized users from accessing resources. User authentication in WSN is a critical security issue. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs. However,...

    Provided By Zhejiang University

  • White Papers // Dec 2009

    DPLC: Dynamic Packet Length Control in Wireless Sensor Networks

    Previous packet length optimizations for sensor networks often employ a fixed optimal length scheme, while in this paper, the authors present DPLC, a Dynamic Packet Length Control scheme. To make DPLC more efficient in terms of channel utilization, they incorporate a lightweight and accurate link estimation method that captures both...

    Provided By Zhejiang University

  • White Papers // Aug 2009

    Intercluster Connection in Cognitive Wireless Mesh Networks Based on Intelligent Network Coding

    Cognitive wireless mesh networks have great flexibility to improve spectrum resource utilization, within which Secondary Users (SUs) can opportunistically access the authorized frequency bands while being complying with the interference constraint as well as the QoS (Quality-of-Service) requirement of Primary Users (PUs). In this paper, the authors consider inter-cluster connection...

    Provided By Zhejiang University

  • White Papers // Jul 2009

    SenSpire OS: A Predictable, Flexible, and Efficient Operating System for Wireless Sensor Networks

    The development of a modern sensor network is very difficult because of the long-term unattended operating mode, diverse application requirements, and stringent resource constraints. To address these issues respectively, the authors present SenSpire OS, a predictable, flexible, and efficient operating system for Wireless Sensor Networks (WSNs). They improve system predictability...

    Provided By Zhejiang University

  • White Papers // May 2011

    A Dynamic Fault Localization Technique With Noise Reduction for Java Programs

    Existing fault localization techniques combine various program features and similarity coefficients with the aim of precisely assessing the similarities among the dynamic spectra of these program features to predict the locations of faults. Many such techniques estimate the probability of a particular program feature causing the observed failures. They ignore...

    Provided By Zhejiang University

  • White Papers // Aug 2011

    Adaptive Error Control Mechanism Based on GM(1,1) Model and Crosslayer Design for Video Streaming Over Wireless

    This paper proposes an adaptive error control mechanism for wireless video streaming, in order that the video data over wireless could be played on receiving sides with high quality. This model, based on GM (1, 1) model and cross-layer design, which adaptively select different error control techniques for every packet...

    Provided By Zhejiang University

  • White Papers // Sep 2011

    Outage Probability Analysis of Dual-Hop Multiple Antenna Fixed-Gain AF Relay Systems With Interference

    This paper presents an analytical investigation on the outage performance of dual-hop multiple antenna fixed-gain amplify-and-forward relay systems in the presence of co-channel interference. Exact closed-form analytical expressions for the outage probability of the systems are derived. Moreover, simple outage probability approximations at the high signal to noise ratio regime...

    Provided By Zhejiang University

  • White Papers // Oct 2010

    SLAW: Secure Localization Against Wormhole Attacks Using Conflicting Sets

    The wormhole attack is a severe attack that can be easily mounted on a wide range of wireless networks without compromising any cryptographic quantity or network node. In the wormhole attack, an attacker sniffs packets at one point in the network, tunnels the packets through a wired or wireless link...

    Provided By Zhejiang University

  • White Papers // Apr 2012

    Optimal Power Control Between Two Opportunistic Cooperative Base Stations

    In this paper, the authors consider sum rate maximization problem between two opportunistic cooperative Base Stations (BS). They propose a simple criterion to decide if the cooperation is binary or sharing power controls. When sharing power cooperation is identified, the resulting problem is a sum rate maximization problem for interfering...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    Research and Application of SQLite Embedded Database Technology

    The embedded database SQLite is widely applied in the data management of embedded environment such as mobile devices, industrial control, information appliance etc., it has become the focus of the development of related areas. For its advantages of stability and reliability, fast and high efficiency, portability and so on, which...

    Provided By Zhejiang University

  • White Papers // Jan 2009

    A Sampling-Based Method for Dynamic Scheduling in Distributed Data Mining Environment

    In this paper, the authors propose a new solution for dynamic task scheduling in distributed environment. The key issue for scheduling tasks is that they cannot obtain the execution time of irregular computations in advance. For this reason, they propose a method which is based on sampling to some typical...

    Provided By Zhejiang University