id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1003.3564
|
Secretary Aircc Journal
|
S. Sumathy (1) and B.Upendra Kumar (1) ((1) VIT University, India)
|
Secure Key Exchange and Encryption Mechanism for Group Communication in
Wireless Ad Hoc Networks
|
8 Pages, JGraph-Hoc Journal
|
International journal on applications of graph theory in wireless
ad hoc networks and sensor networks 2.1 (2010) 9-16
|
10.5121/jgraphhoc.2010.2102
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Secured communication in ad hoc wireless networks is primarily important,
because the communication signals are openly available as they propagate
through air and are more susceptible to attacks ranging from passive
eavesdropping to active interfering. The lack of any central coordination and
shared wireless medium makes them more vulnerable to attacks than wired
networks. Nodes act both as hosts and routers and are interconnected by Multi-
hop communication path for forwarding and receiving packets to/from other
nodes. The objective of this paper is to propose a key exchange and encryption
mechanism that aims to use the MAC address as an additional parameter as the
message specific key[to encrypt]and forward data among the nodes. The nodes are
organized in spanning tree fashion, as they avoid forming cycles and exchange
of key occurs only with authenticated neighbors in ad hoc networks, where nodes
join or leave the network dynamically.
|
[
{
"version": "v1",
"created": "Thu, 18 Mar 2010 11:55:01 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Sumathy",
"S.",
"",
"VIT University, India"
],
[
"Kumar",
"B. Upendra",
"",
"VIT University, India"
]
] |
new_dataset
| 0.965441 |
1003.3568
|
Secretary Aircc Journal
|
Aditya Goel (The Technological Institute of Textile & Sciences,
Haryana, India)
|
Key distribution in PKC through Quantas
|
11 Pages, JGraph-Hoc Journal 2010
|
International journal on applications of graph theory in wireless
ad hoc networks and sensor networks 2.1 (2010) 121-131
|
10.5121/jgraphhoc.2010.2109
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Cryptography literally means "The art & science of secret writing & sending a
message between two parties in such a way that its contents cannot be
understood by someone other than the intended recipient". and Quantum word is
related with "Light". Thus, Quantum Cryptography is a way of descripting any
information in the form of quantum particles. There are no classical
cryptographic systems which are perfectly secure. In contrast to Classical
cryptography which depends upon Mathematics, Quantum Cryptography utilizes the
concepts of Quantum Physics which provides us the security against the
cleverest marauders of the present age. In the view of increasing need of
Network and Information Security, we do require methods to overcome the
Molecular Computing technologies (A future technology) and other techniques of
the various codebrakers. Both the parts i.e. Quantum Key distribution and
Information transference from Sender to Receiver are much efficient and secure.
It is based upon BB84 protocol. It can be of great use for Govt. agencies such
as Banks, Insurance, Brokerages firms, financial institutions, e-commerce and
most important is the Defense & security of any country. It is a Cryptographic
communication system in which the original users can detect unauthorized
eavesdropper and in addition it gives a guarantee of no eavesdropping. It
proves to be the ultra secure mode of communication b/w two intended parties.
|
[
{
"version": "v1",
"created": "Thu, 18 Mar 2010 12:07:52 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Goel",
"Aditya",
"",
"The Technological Institute of Textile & Sciences,\n Haryana, India"
]
] |
new_dataset
| 0.99956 |
1003.5439
|
Secretary Aircc Journal
|
Ratul Kr. Baruah (Tezpur University, India)
|
Design of A Low Power Low Voltage CMOS Opamp
|
8 Pages, VLSICS Journal
|
International Journal Of VLSI Design & Communication Systems 1.1
(2010) 1-8
|
10.5121/vlsic.2010.1101
| null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In this paper a CMOS operational amplifier is presented which operates at 2V
power supply and 1microA input bias current at 0.8 micron technology using non
conventional mode of operation of MOS transistors and whose input is depended
on bias current. The unique behaviour of the MOS transistors in subthreshold
region not only allows a designer to work at low input bias current but also at
low voltage. While operating the device at weak inversion results low power
dissipation but dynamic range is degraded. Optimum balance between power
dissipation and dynamic range results when the MOS transistors are operated at
moderate inversion. Power is again minimised by the application of input
dependant bias current using feedback loops in the input transistors of the
differential pair with two current substractors. In comparison with the
reported low power low voltage opamps at 0.8 micron technology, this opamp has
very low standby power consumption with a high driving capability and operates
at low voltage. The opamp is fairly small (0.0084 mm 2) and slew rate is more
than other low power low voltage opamps reported at 0.8 um technology [1,2].
Vittoz at al [3] reported that slew rate can be improved by adaptive biasing
technique and power dissipation can be reduced by operating the device in weak
inversion. Though lower power dissipation is achieved the area required by the
circuit is very large and speed is too small. So, operating the device in
moderate inversion is a good solution. Also operating the device in
subthreshold region not only allows lower power dissipation but also a lower
voltage operation is achieved.
|
[
{
"version": "v1",
"created": "Mon, 29 Mar 2010 07:03:46 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Baruah",
"Ratul Kr.",
"",
"Tezpur University, India"
]
] |
new_dataset
| 0.972501 |
1003.6030
|
Secretary Aircc Journal
|
K. Ragini (1), M. Satyam (2) and B.C. Jinaga (3) ((1) G.Narayanamma
Institute of Technology & Science India, (2) International Institute of
Information Technology, India, (3) Jawaharlal Nehru Technology University,
India)
|
Variable Threshold MOSFET Approach (Through Dynamic Threshold MOSFET)
For Universal Logic Gates
|
11 Pages, VLSICS Journal
|
International Journal Of VLSI Design & Communication Systems 1.1
(2010) 33-43
|
10.5121/vlsic.2010.1104
| null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In this article, we proposed a Variable threshold MOSFET(VTMOS)approach which
is realized from Dynamic Threshold MOSFET(DTMOS), suitable for sub-threshold
digital circuit operation. Basically the principle of sub- threshold logics is
operating MOSFET in sub-threshold region and using the leakage current in that
region for switching action, there by drastically decreasing power. To reduce
the power consumption of sub-threshold circuits further, a novel body biasing
technique termed VTMOS is introduced .VTMOS approach is realized from DTMOS
approach. Dynamic threshold MOS (DTMOS) circuits provide low leakage and high
current drive, compared to CMOS circuits, operated at lower voltages. The VTMOS
is based on operating the MOS devices with an appropriate substrate bias which
varies with gate voltage, by connecting a positive bias voltage between gate
and substrate for NMOS and negative bias voltage between gate and substrate for
PMOS. With VTMOS, there is a considerable reduction in operating current and
power dissipation, while the remaining characteristics are almost the same as
those of DTMOS. Results of our investigations show that VTMOS circuits improves
the power up to 50% when compared to CMOS and DTMOS circuits, in sub- threshold
region.. The performance analysis and comparison of VTMOS, DTMOS and CMOS is
made and test results of Power dissipation, Propagation delay and Power delay
product are presented to justify the superiority of VTMOS logic over
conventional sub-threshold logics using Hspice Tool. The dependency of these
parameters on frequency of operation has also been investigated.
|
[
{
"version": "v1",
"created": "Wed, 31 Mar 2010 12:12:45 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Ragini",
"K.",
""
],
[
"Satyam",
"M.",
""
],
[
"Jinaga",
"B. C.",
""
]
] |
new_dataset
| 0.996073 |
1004.0421
|
Secretary Aircc Journal
|
Jasmine Norman (1), J.Paulraj Joseph (2) and P.Prapoorna Roja
(3)((1)Measi Institute of Information Technology, India, (2)Manonmaniam
Sundaranar University, India and (3)Jerusalem College of Engineering, India)
|
A Faster Routing Scheme for Stationary Wireless Sensor Networks - A
Hybrid Approach
|
10 pages
|
International Journal of Ad hoc, Sensor & Ubiquitous Computing 1.1
(2010) 1-10
|
10.5121/ijasuc.2010.1101
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
A wireless sensor network consists of light-weight, low power, small size
sensor nodes. Routing in wireless sensor networks is a demanding task. This
demand has led to a number of routing protocols which efficiently utilize the
limited resources available at the sensor nodes. Most of these protocols are
either based on single hop routing or multi hop routing and typically find the
minimum energy path without addressing other issues such as time delay in
delivering a packet, load balancing, and redundancy of data. Response time is
very critical in environment monitoring sensor networks where typically the
sensors are stationary and transmit data to a base station or a sink node. In
this paper a faster load balancing routing protocol based on location with a
hybrid approach is proposed.
|
[
{
"version": "v1",
"created": "Sat, 3 Apr 2010 06:09:29 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Norman",
"Jasmine",
""
],
[
"Joseph",
"J. Paulraj",
""
],
[
"Roja",
"P. Prapoorna",
""
]
] |
new_dataset
| 0.998849 |
1004.0587
|
Secretary Aircc Journal
|
Debdutta Barman Roy(1), Rituparna Chaki(2), Nabendu Chaki(3),
((1)Calcutta Institute of Engineering and Management, India, (2) West Bengal
University of Technology, India, (3)University of Calcutta, A.P.C. Road,
India)
|
A New Cluster-based Wormhole Intrusion detection algorithm for Mobile
Ad-Hoc Networks
|
9Pages
|
International Journal of Network Security & Its Applications 1.1
(2009) 44-52
| null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In multi-hop wireless systems, the need for cooperation among nodes to relay
each other's packets exposes them to a wide range of security attacks. A
particularly devastating attack is the wormhole attack, where a malicious node
records control traffic at one location and tunnels it to another compromised
node, possibly far away, which replays it locally. Routing security in ad hoc
networks is often equated with strong and feasible node authentication and
lightweight cryptography. Unfortunately, the wormhole attack can hardly be
defeated by crypto graphical measures, as wormhole attackers do not create
separate packets. They simply replay packets already existing on the network,
which pass the cryptographic checks. Existing works on wormhole detection have
often focused on detection using specialized hardware, such as directional
antennas, etc. In this paper, we present a cluster based counter-measure for
the wormhole attack, that alleviates these drawbacks and efficiently mitigates
the wormhole attack in MANET. Simulation results on MATLab exhibit the
effectiveness of the proposed algorithm in detecting wormhole attacks.
|
[
{
"version": "v1",
"created": "Mon, 5 Apr 2010 08:18:31 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Roy",
"Debdutta Barman",
""
],
[
"Chaki",
"Rituparna",
""
],
[
"Chaki",
"Nabendu",
""
]
] |
new_dataset
| 0.99248 |
1004.0591
|
Secretary Aircc Journal
|
Eric Ke Wang, Lucas C.K.Hui and S.M.Yiu, (The University of Hong Kong,
Hong Kong)
|
A new key establishment scheme for wireless sensor networks
|
11Pages
|
International Journal of Network Security & Its Applications 1.2
(2009) 17-27
| null | null |
cs.CR cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Traditional key management techniques, such as public key cryptography or key
distribution center (e.g., Kerberos), are often not effective for wireless
sensor networks for the serious limitations in terms of computational power,
energy supply, network bandwidth. In order to balance the security and
efficiency, we propose a new scheme by employing LU Composition techniques for
mutual authenticated pairwise key establishment and integrating LU Matrix with
Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the
meantime, it is able to achieve efficient group key agreement and management.
Analysis shows that the new scheme has better performance and provides
authenticity and anonymity for sensor to establish multiple kinds of keys,
compared with previous related works.
|
[
{
"version": "v1",
"created": "Mon, 5 Apr 2010 08:38:27 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Wang",
"Eric Ke",
""
],
[
"Hui",
"Lucas C. K.",
""
],
[
"Yiu",
"S. M.",
""
]
] |
new_dataset
| 0.973487 |
1004.0604
|
Secretary Aircc Journal
|
Sugam Sharma(1), Hari Cohly(2), Tzusheng Pei(2),((1)Iowa State
University, USA, (2) Jackson State University, USA)
|
On Generation of Firewall Log Status Reporter (SRr) Using Perl
|
10Pages
|
International Journal of Network Security & Its Applications 1.2
(2009) 90-99
| null | null |
cs.SE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Computer System Administration and Network Administration are few such areas
where Practical Extraction Reporting Language (Perl) has robust utilization
these days apart from Bioinformatics. The key role of a System/Network
Administrator is to monitor log files. Log file are updated every day. To scan
the summary of large log files and to quickly determine if there is anything
wrong with the server or network we develop a Firewall Log Status Reporter
(SRr). SRr helps to generate the reports based on the parameters of interest.
SRr provides the facility to admin to generate the individual firewall report
or all reports in one go. By scrutinizing the results of the reports admin can
trace how many times a particular request has been made from which source to
which destination and can track the errors easily. Perl scripts can be seen as
the UNIX script replacement in future arena and SRr is one development with the
same hope that we can believe in. SRr is a generalized and customizable utility
completely written in Perl and may be used for text mining and data mining
application in Bioinformatics research and development too.
|
[
{
"version": "v1",
"created": "Mon, 5 Apr 2010 09:52:05 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Sharma",
"Sugam",
""
],
[
"Cohly",
"Hari",
""
],
[
"Pei",
"Tzusheng",
""
]
] |
new_dataset
| 0.968987 |
1004.0605
|
Secretary Aircc Journal
|
Alan Mink, Sheila Frankel and Ray Perlner,((NIST), USA)
|
Quantum Key Distribution (QKD) and Commodity Security Protocols:
Introduction and Integration
|
12Pages
|
International Journal of Network Security & Its Applications 1.2
(2009) 101-112
| null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We present an overview of quantum key distribution (QKD), a secure key
exchange method based on the quantum laws of physics rather than computational
complexity. We also provide an overview of the two most widely used commodity
security protocols, IPsec and TLS. Pursuing a key exchange model, we propose
how QKD could be integrated into these security applications. For such a QKD
integration we propose a support layer that provides a set of common QKD
services between the QKD protocol and the security applications
|
[
{
"version": "v1",
"created": "Mon, 5 Apr 2010 09:57:55 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Mink",
"Alan",
""
],
[
"Frankel",
"Sheila",
""
],
[
"Perlner",
"Ray",
""
]
] |
new_dataset
| 0.999139 |
1004.0774
|
Secretary Aircc Journal
|
Johnneth Fonseca, Zair Abdelouahab, Denivaldo Lopes and Sofiane Labidi
|
A security framework for SOA applications in mobile environment
|
18Pages
|
International Journal of Network Security & Its Applications 1.3
(2009) 90-107
| null | null |
cs.SE cs.CR cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
A Rapid evolution of mobile technologies has led to the development of more
sophisticated mobile devices with better storage, processing and transmission
power. These factors enable support to many types of application but also give
rise to a necessity to find a model of service development. Actually, SOA
(Service Oriented Architecture) is a good option to support application
development. This paper presents a framework that allows the development of SOA
based application in mobile environment. The objective of the framework is to
give developers with tools for provision of services in this environment with
the necessary security characteristics.
|
[
{
"version": "v1",
"created": "Tue, 6 Apr 2010 05:32:22 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Fonseca",
"Johnneth",
""
],
[
"Abdelouahab",
"Zair",
""
],
[
"Lopes",
"Denivaldo",
""
],
[
"Labidi",
"Sofiane",
""
]
] |
new_dataset
| 0.972694 |
1005.1736
|
Secretary Aircc Journal
|
M.Rajesh Babu (1) and S.Selvan (2), ((1) PSG College of Technology,
India, (2)Francis Xavier Engineering College, India)
|
A Lightweight and Attack Resistant Authenticated Routing Protocol for
Mobile Adhoc Networks
|
14 Pages, IJWMN
|
International Journal of Wireless & Mobile Networks 2.2 (2010)
16-29
|
10.5121/ijwmn.2010.2202
| null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In mobile ad hoc networks, by attacking the corresponding routing protocol,
an attacker can easily disturb the operations of the network. For ad hoc
networks, till now many secured routing protocols have been proposed which
contains some disadvantages. Therefore security in ad hoc networks is a
controversial area till now. In this paper, we proposed a Lightweight and
Attack Resistant Authenticated Routing Protocol (LARARP) for mobile ad hoc
networks. For the route discovery attacks in MANET routing protocols, our
protocol gives an effective security. It supports the node to drop the invalid
packets earlier by detecting the malicious nodes quickly by verifying the
digital signatures of all the intermediate nodes. It punishes the misbehaving
nodes by decrementing a credit counter and rewards the well behaving nodes by
incrementing the credit counter. Thus it prevents uncompromised nodes from
attacking the routes with malicious or compromised nodes. It is also used to
prevent the denial-of-service (DoS) attacks. The efficiency and effectiveness
of LARARP are verified through the detailed simulation studies.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 07:43:13 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Babu",
"M. Rajesh",
""
],
[
"Selvan",
"S.",
""
]
] |
new_dataset
| 0.999004 |
1005.1737
|
Secretary Aircc Journal
|
Kavi K. Khedo, Rajiv Perseedoss and Avinash Mungur, University of
Mauritius, Mauritius
|
A Wireless Sensor Network Air Pollution Monitoring System
|
15 Pages, IJWMN
|
International Journal of Wireless & Mobile Networks 2.2 (2010)
31-45
|
10.5121/ijwmn.2010.2203
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Sensor networks are currently an active research area mainly due to the
potential of their applications. In this paper we investigate the use of
Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With
the fast growing industrial activities on the island, the problem of air
pollution is becoming a major concern for the health of the population. We
proposed an innovative system named Wireless Sensor Network Air Pollution
Monitoring System (WAPMS) to monitor air pollution in Mauritius through the use
of wireless sensors deployed in huge numbers around the island. The proposed
system makes use of an Air Quality Index (AQI) which is presently not available
in Mauritius. In order to improve the efficiency of WAPMS, we have designed and
implemented a new data aggregation algorithm named Recursive Converging
Quartiles (RCQ). The algorithm is used to merge data to eliminate duplicates,
filter out invalid readings and summarise them into a simpler form which
significantly reduce the amount of data to be transmitted to the sink and thus
saving energy. For better power management we used a hierarchical routing
protocol in WAPMS and caused the motes to sleep during idle time.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 07:44:21 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Khedo",
"Kavi K.",
""
],
[
"Perseedoss",
"Rajiv",
""
],
[
"Mungur",
"Avinash",
""
],
[
"Mauritius",
"University of",
""
],
[
"Mauritius",
"",
""
]
] |
new_dataset
| 0.999086 |
1005.1740
|
Secretary Aircc Journal
|
Emmanouil A. Panaousis, Tipu A. Ramrekha, Grant P. Millar and Christos
Politis, (Kingston University London, United Kingdom)
|
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc
Networks
|
17 Pages, IJWMN
|
International Journal of Wireless & Mobile Networks 2.2 (2010)
62-78
|
10.5121/ijwmn.2010.2205
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be
utilized in the context of an extreme emergency for all involved rescue teams.
We use the term emergency MANETs (eMANETs) in order to describe next generation
IP-based networks, which are deployed in emergency cases such as forest fires
and terrorist attacks. The main goal within the realm of eMANETs is to provide
emergency workers with intelligent devices such as smart phones and PDAs. This
technology allows communication "islets" to be established between the members
of the same or different emergency teams (policemen, firemen, paramedics). In
this article, we discuss an adaptive and secure routing protocol developed for
the purposes of eMANETs. We evaluate the performance of the protocol by
comparing it with other widely used routing protocols for MANETs. We finally
show that the overhead introduced due to security considerations is affordable
to support secure ad-hoc communications among lightweight devices.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 07:59:01 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Panaousis",
"Emmanouil A.",
""
],
[
"Ramrekha",
"Tipu A.",
""
],
[
"Millar",
"Grant P.",
""
],
[
"Politis",
"Christos",
""
]
] |
new_dataset
| 0.997818 |
1005.1787
|
Secretary Aircc Journal
|
Nitiket N. Mhala(1) and N. K. Choudhari(2), ((1) BDCOE, India, (2)
Bhagwati Chadurvedi COE, India)
|
An Envision of Low Cost Mobile Adhoc Network Test Bed in a Laboratory
Environment Emulating an Actual MANET
|
12 Pages, IJCNC
|
International Journal of Computer Networks & Communications 2.3
(2010) 52-63
|
10.5121/ijcnc.2010.2305
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Orchestrating a live field trial of wireless mobile networking involves
significant cost and logistical issues relating to mobile platforms, support
personnel, network and experiment automation and support equipment. The
significant cost and logistics required to execute such a field trial can also
be limiting in terms of achieving meaningful test results that exercise a
practical number of mobile nodes over a significant set of test conditions
within a given time. There is no argument that field trials are an important
component of dynamic network testing. A field test of prototype will show
whether simulations were on right track or not, but that's a big leap to take;
going from the simulator directly to the real thing. In conceiving our work, we
envisioned a mobile network emulation system that is low cost, flexible and
controllable. This paper describes our wireless MANET test bed under
development which emulates an actual MANET. Here, we focuses that, this test
bed allows the users to automatically generate arbitrary logically network
topologies in order to perform real time operations on adhoc network at a
relatively low cost in a laboratory environment without having to physically
move the nodes in the adhoc network. Thus, we try to "compress" wireless
network so that it fits on a single table.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 10:10:54 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Mhala",
"Nitiket N.",
""
],
[
"Choudhari",
"N. K.",
""
]
] |
new_dataset
| 0.998846 |
1005.5028
|
Secretary Aircc Journal
|
Rajesh P Singh, Anupam Saikia, B. K. Sarma (Indian Institute of
Technology, Guwahati, India)
|
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
|
10 Pages, IJNSA
|
International Journal of Network Security & Its Applications 2.2
(2010) 1-10
|
10.5121/ijnsa.2010.2201
| null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon
which was a variant a variant of Matsumoto Imai cryptosystem C*. However
Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In
this paper we propose a cryptosystem Little Dragon Two which is as efficient as
Little Dragon cryptosystem but secure against all the known attacks. Like
Little Dragon cryptosystem the public key of Little Dragon Two is mixed type
that is quadratic in plaintext and cipher text variables. So the public key
size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public
key algorithm is bijective and can be used for both encryption and signatures.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2010 10:58:49 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Singh",
"Rajesh P",
"",
"Indian Institute of\n Technology, Guwahati, India"
],
[
"Saikia",
"Anupam",
"",
"Indian Institute of\n Technology, Guwahati, India"
],
[
"Sarma",
"B. K.",
"",
"Indian Institute of\n Technology, Guwahati, India"
]
] |
new_dataset
| 0.998415 |
1005.5433
|
Secretary Aircc Journal
|
Nouha Arfaoui and Jalel Akaichi
|
A Data Warehouse Assistant Design System Based on Clover Model
|
15 Pages, IJDMS
|
International Journal of Database Management Systems 2.2 (2010)
57-71
|
10.5121/ijdms.2010.2204
| null |
cs.DB
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Nowadays, Data Warehouse (DW) plays a crucial role in the process of decision
making. However, their design remains a very delicate and difficult task either
for expert or users. The goal of this paper is to propose a new approach based
on the clover model, destined to assist users to design a DW. The proposed
approach is based on two main steps. The first one aims to guide users in their
choice of DW schema model. The second one aims to finalize the chosen model by
offering to the designer views related to former successful DW design
experiences.
|
[
{
"version": "v1",
"created": "Sat, 29 May 2010 07:35:23 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Arfaoui",
"Nouha",
""
],
[
"Akaichi",
"Jalel",
""
]
] |
new_dataset
| 0.959023 |
1005.5439
|
Secretary Aircc Journal
|
Amer A. Al-Rahayfeh, Abdelshakour A. Abuzneid
|
Detection of Bleeding in Wireless Capsule Endoscopy Images Using Range
Ratio Color
|
10 Pages, IJMA
|
International journal of Multimedia & Its Applications 2.2 (2010)
1-10
|
10.5121/ijma.2010.2201
| null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Wireless Capsule Endoscopy (WCE) is device to detect abnormalities in
colon,esophagus,small intestinal and stomach, to distinguish bleeding in WCE
images from non bleeding is a hard job by human reviewing and very time
consuming. Consequently, automation for classifying bleeding frames not only
will expedite the process but will reduce the burden on the doctors. Using the
purity of the red color we can detect the Bleeding areas in WCE images. But, we
could find various intensity of red color values in different parts of the
small intestinal,so it is not enough to depend on the red color feature alone.
We select RGB(Red,Green,Blue) because it takes raw level values and it is easy
to use. In this paper we will put range ratio color for each of R,G,and B.
Therefore, we divide each image into multiple pixels and apply the range ratio
color condition for each pixel. Then we count the number of the pixels that
achieved our condition. If the number of pixels grater than zero, then the
frame is classified as a bleeding type. Otherwise, it is a non-bleeding. Our
experimental results show that this method could achieve a very high accuracy
in detecting bleeding images for the different parts of the small intestinal
|
[
{
"version": "v1",
"created": "Sat, 29 May 2010 08:25:50 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Al-Rahayfeh",
"Amer A.",
""
],
[
"Abuzneid",
"Abdelshakour A.",
""
]
] |
new_dataset
| 0.998187 |
1005.5440
|
Secretary Aircc Journal
|
Surender Kumar(1), R.K.Chauhan(2), Parveen Kumar(3), ((1)Haryana
College of Tech. & Mgmt. India, (2)Kurukshetra University, India, (3)MIET -
Meerut, India)
|
A Low Overhead Minimum Process Global Snapshop Collection Algorithm for
Mobile Distributed System
|
19 Pages, IJMA
|
International journal of Multimedia & Its Applications 2.2 (2010)
12-30
|
10.5121/ijma.2010.2202
| null |
cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Coordinated checkpointing is an effective fault tolerant technique in
distributed system as it avoids the domino effect and require minimum storage
requirement. Most of the earlier coordinated checkpoint algorithms block their
computation during checkpointing and forces minimum-process or non-blocking but
forces all nodes to takes checkpoint even though many of them may not be
necessary or non-blocking minimum-process but takes useless checkpoints or
reduced useless checkpoint but has higher synchronization message overhead or
has high checkpoint request propagation time. Hence in mobile distributed
systems there is a great need of minimizing the number of communication message
and checkpointing overhead as it raise new issues such as mobility, low
bandwidth of wireless channels, frequently disconnections, limited battery
power and lack of reliable stable storage on mobile nodes. In this paper, we
propose a minimum-process coordinated checkpointing algorithm for mobile
distributed system where no useless checkpoints are taken, no blocking of
processes takes place and enforces a minimum-number of processes to take
checkpoints. Our algorithm imposes low memory and computation overheads on MH's
and low communication overheads on wireless channels. It avoids awakening of an
MH if it is not required to take its checkpoint and has reduced latency time as
each process involved in a global checkpoint can forward its own decision
directly to the checkpoint initiator.
|
[
{
"version": "v1",
"created": "Sat, 29 May 2010 08:29:45 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Kumar",
"Surender",
""
],
[
"Chauhan",
"R. K.",
""
],
[
"Kumar",
"Parveen",
""
]
] |
new_dataset
| 0.995667 |
1006.0878
|
Secretary Aircc Journal
|
Hao Shi
|
Developing E-Learning Materials for Software Development Course
|
7 pages
|
International Journal of Managing Information Technology 2.2
(2010) 15-21
|
10.5121/ijmit.2010.2202
| null |
cs.CY
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Software Development is a core second-year course currently offered to
undergraduate students at Victoria University at its five local and
international campuses. The project aims to redesign the existing course
curriculum to support student-centred teaching and learning. It is intended to
provide a learning context in which learners can reflect on new material,
discuss their tentative understandings with others, actively search for new
information, develop skills in communication and collaboration, and build
conceptual connections to their existing knowledge base. The key feature of the
cross-campus curriculum innovation is the use of Blackboard, short for
Blackboard Learning System, to assist in course content organization and online
delivery. A well-defined and integrated case study is used throughout the
course to provide realistic practical experience of software development. It
allows students to take control of their own learning while at the same time
providing support to those students who have particular learning difficulties.
In this paper, the developed curriculum and the learning outcome are described.
The e-Learning material and various Blackboard tools used for teaching and
learning activities are presented. Finally, conclusion is drawn from classroom
experience.
|
[
{
"version": "v1",
"created": "Fri, 4 Jun 2010 12:32:57 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Shi",
"Hao",
""
]
] |
new_dataset
| 0.993692 |
1006.1179
|
Secretary Aircc Journal
|
C. N.Marimuthu (1), P. Thangaraj (2), Aswathy Ramesan (1) ((1)
Maharaja Engineering College, India, (2) Kongu Engineering College, India)
|
Low Power Shift and Add Multiplier Design
|
11 pages
|
International Journal of Computer Science and Information
Technology 2.3 (2010) 12-22
|
10.5121/ijcsit.2010.2302
| null |
cs.AR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Today every circuit has to face the power consumption issue for both portable
device aiming at large battery life and high end circuits avoiding cooling
packages and reliability issues that are too complex. It is generally accepted
that during logic synthesis power tracks well with area. This means that a
larger design will generally consume more power. The multiplier is an important
kernel of digital signal processors. Because of the circuit complexity, the
power consumption and area are the two important design considerations of the
multiplier. In this paper a low power low area architecture for the shift and
add multiplier is proposed. For getting the low power low area architecture,
the modifications made to the conventional architecture consist of the
reduction in switching activities of the major blocks of the multiplier, which
includes the reduction in switching activity of the adder and counter. This
architecture avoids the shifting of the multiplier register. The simulation
result for 8 bit multipliers shows that the proposed low power architecture
lowers the total power consumption by 35.25% and area by 52.72 % when compared
to the conventional architecture. Also the reduction in power consumption
increases with the increase in bit width.
|
[
{
"version": "v1",
"created": "Mon, 7 Jun 2010 06:32:39 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Marimuthu",
"C. N.",
""
],
[
"Thangaraj",
"P.",
""
],
[
"Ramesan",
"Aswathy",
""
]
] |
new_dataset
| 0.996524 |
1006.1193
|
Secretary Aircc Journal
|
P.Raja Rajeswari (1) Allam Apparo (2) and V.K. Kumar (3) ((1) Acharya
Nagarjuna University, India, (2) Jawaharlal Nehru Technological University,
India and (3) S.V.H. College Of Engineering, India)
|
Genbit Compress Tool(GBC): A Java-Based Tool to Compress DNA Sequences
and Compute Compression Ratio(bits/base) of Genomes
|
11 pages
|
International Journal of Computer Science and Information
Technology 2.3 (2010) 181-191
|
10.5121/ijcsit.2010.2313
| null |
cs.MS
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We present a Compression Tool, "GenBit Compress", for genetic sequences based
on our new proposed "GenBit Compress Algorithm". Our Tool achieves the best
compression ratios for Entire Genome (DNA sequences) . Significantly better
compression results show that GenBit compress algorithm is the best among the
remaining Genome compression algorithms for non-repetitive DNA sequences in
Genomes. The standard Compression algorithms such as gzip or compress cannot
compress DNA sequences but only expand them in size. In this paper we consider
the problem of DNA compression. It is well known that one of the main features
of DNA Sequences is that they contain substrings which are duplicated except
for a few random Mutations. For this reason most DNA compressors work by
searching and encoding approximate repeats. We depart from this strategy by
searching and encoding only exact repeats. our proposed algorithm achieves the
best compression ratio for DNA sequences for larger genome. As long as 8 lakh
characters can be given as input While achieving the best compression ratios
for DNA sequences, our new GenBit Compress program significantly improves the
running time of all previous DNA compressors. Assigning binary bits for
fragments of DNA sequence is also a unique concept introduced in this program
for the first time in DNA compression.
|
[
{
"version": "v1",
"created": "Mon, 7 Jun 2010 07:37:49 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Rajeswari",
"P. Raja",
""
],
[
"Apparo",
"Allam",
""
],
[
"Kumar",
"V. K.",
""
]
] |
new_dataset
| 0.955023 |
1006.3369
|
Secretary Aircc Journal
|
Abhishek Samanta and Dripto Bakshi (Jadavpur University, India)
|
Fault Tolerant Wireless Sensor MAC Protocol for Efficient Collision
Avoidance
|
14 pages
|
International journal on applications of graph theory in wireless
ad hoc networks and sensor networks 2.2 (2010) 46-59
|
10.5121/jgraphoc.2010.2205
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In sensor networks communication by broadcast methods involves many hazards,
especially collision. Several MAC layer protocols have been proposed to resolve
the problem of collision namely ARBP, where the best achieved success rate is
90%. We hereby propose a MAC protocol which achieves a greater success rate
(Success rate is defined as the percentage of delivered packets at the source
reaching the destination successfully) by reducing the number of collisions,
but by trading off the average propagation delay of transmission. Our proposed
protocols are also shown to be more energy efficient in terms of energy
dissipation per message delivery, compared to the currently existing protocol.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 04:55:55 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Samanta",
"Abhishek",
"",
"Jadavpur University, India"
],
[
"Bakshi",
"Dripto",
"",
"Jadavpur University, India"
]
] |
new_dataset
| 0.99385 |
1006.3375
|
Secretary Aircc Journal
|
Santosh Kumar Singh(1), Krishna Chandra Roy(2) and Vibhakar
Pathak(1),((1)Suresh Gyan Vihar University, India and (2)SBCET, India)
|
Channels Reallocation In Cognitive Radio Networks Based On DNA Sequence
Alignment
|
12 pages
|
International Journal of Next-Generation Networks 2.2 (2010) 23-34
|
10.5121/ijngn.2010.2203
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Nowadays, It has been shown that spectrum scarcity increased due to
tremendous growth of new players in wireless base system by the evolution of
the radio communication. Resent survey found that there are many areas of the
radio spectrum that are occupied by authorized user/primary user (PU), which
are not fully utilized. Cognitive radios (CR) prove to next generation wireless
communication system that proposed as a way to reuse this under-utilised
spectrum in an opportunistic and non-interfering basis. A CR is a self-directed
entity in a wireless communications environment that senses its environment,
tracks changes, and reacts upon its findings and frequently exchanges
information with the networks for secondary user (SU). However, CR facing
collision problem with tracks changes i.e. reallocating of other empty channels
for SU while PU arrives. In this paper, channels reallocation technique based
on DNA sequence alignment algorithm for CR networks has been proposed.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 05:39:17 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Singh",
"Santosh Kumar",
"",
"Suresh Gyan Vihar University, India and"
],
[
"Roy",
"Krishna Chandra",
"",
"SBCET, India"
],
[
"Pathak",
"Vibhakar",
"",
"Suresh Gyan Vihar University, India and"
]
] |
new_dataset
| 0.99166 |
1007.2282
|
Manu Basavaraju
|
Manu Basavaraju and L. Sunil Chandran
|
Acyclic Edge Coloring of Triangle Free Planar Graphs
|
16 pages, 0 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An $acyclic$ edge coloring of a graph is a proper edge coloring such that
there are no bichromatic cycles. The \emph{acyclic chromatic index} of a graph
is the minimum number k such that there is an acyclic edge coloring using k
colors and is denoted by $a'(G)$. It was conjectured by Alon, Sudakov and Zaks
(and much earlier by Fiamcik) that $a'(G)\le \Delta+2$, where $\Delta
=\Delta(G)$ denotes the maximum degree of the graph.
If every induced subgraph $H$ of $G$ satisfies the condition $\vert E(H)
\vert \le 2\vert V(H) \vert -1$, we say that the graph $G$ satisfies $Property\
A$. In this paper, we prove that if $G$ satisfies $Property\ A$, then $a'(G)\le
\Delta + 3$. Triangle free planar graphs satisfy $Property\ A$. We infer that
$a'(G)\le \Delta + 3$, if $G$ is a triangle free planar graph. Another class of
graph which satisfies $Property\ A$ is 2-fold graphs (union of two forests).
|
[
{
"version": "v1",
"created": "Wed, 14 Jul 2010 09:24:13 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Basavaraju",
"Manu",
""
],
[
"Chandran",
"L. Sunil",
""
]
] |
new_dataset
| 0.99852 |
1007.1756
|
Randall Berry
|
Randall A. Berry and David N. C. Tse
|
Shannon Meets Nash on the Interference Channel
|
41 pages, 10 figures, submitted to IEEE Transactions on Information
Theory, May 2010. Added Figure 6
| null | null | null |
cs.IT cs.GT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The interference channel is the simplest communication scenario where
multiple autonomous users compete for shared resources. We combine game theory
and information theory to define a notion of a Nash equilibrium region of the
interference channel. The notion is game theoretic: it captures the selfish
behavior of each user as they compete. The notion is also information
theoretic: it allows each user to use arbitrary communication strategies as it
optimizes its own performance. We give an exact characterization of the Nash
equilibrium region of the two-user linear deterministic interference channel
and an approximate characterization of the Nash equilibrium region of the
two-user Gaussian interference channel to within 1 bit/s/Hz..
|
[
{
"version": "v1",
"created": "Sun, 11 Jul 2010 03:48:29 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jul 2010 14:38:56 GMT"
}
] | 2010-07-14T00:00:00 |
[
[
"Berry",
"Randall A.",
""
],
[
"Tse",
"David N. C.",
""
]
] |
new_dataset
| 0.998568 |
0911.5067
|
Ralf Mueller
|
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
|
Asynchronous CDMA Systems with Random Spreading-Part II: Design Criteria
| null |
IEEE Transactions on Information Theory, vol. 56, no. 4, pp.
1498-1520, Apr. 2010
|
10.1109/TIT.2010.2040898
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Totally asynchronous code-division multiple-access (CDMA) systems are
addressed. In Part I, the fundamental limits of asynchronous CDMA systems are
analyzed in terms of spectral efficiency and SINR at the output of the optimum
linear detector. The focus of Part II is the design of low-complexity
implementations of linear multiuser detectors in systems with many users that
admit a multistage representation, e.g. reduced rank multistage Wiener filters,
polynomial expansion detectors, weighted linear parallel interference
cancellers. The effects of excess bandwidth, chip-pulse shaping, and time delay
distribution on CDMA with suboptimum linear receiver structures are
investigated. Recursive expressions for universal weight design are given. The
performance in terms of SINR is derived in the large-system limit and the
performance improvement over synchronous systems is quantified. The
considerations distinguish between two ways of forming discrete-time
statistics: chip-matched filtering and oversampling.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2009 12:01:57 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Cottatellucci",
"Laura",
""
],
[
"Mueller",
"Ralf R.",
""
],
[
"Debbah",
"Merouane",
""
]
] |
new_dataset
| 0.978417 |
0911.5385
|
Ralf Mueller
|
Laura Cottatellucci, Ralf R. Mueller, and Merouane Debbah
|
Asynchronous CDMA Systems with Random Spreading-Part I: Fundamental
Limits
| null |
IEEE Transactions on Information Theory, vol. 56, no. 4, pp.
1477-1497, Apr. 2010
|
10.1109/TIT.2010.2040890
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spectral efficiency for asynchronous code division multiple access (CDMA)
with random spreading is calculated in the large system limit allowing for
arbitrary chip waveforms and frequency-flat fading. Signal to interference and
noise ratios (SINRs) for suboptimal receivers, such as the linear minimum mean
square error (MMSE) detectors, are derived. The approach is general and
optionally allows even for statistics obtained by under-sampling the received
signal.
All performance measures are given as a function of the chip waveform and the
delay distribution of the users in the large system limit. It turns out that
synchronizing users on a chip level impairs performance for all chip waveforms
with bandwidth greater than the Nyquist bandwidth, e.g., positive roll-off
factors. For example, with the pulse shaping demanded in the UMTS standard,
user synchronization reduces spectral efficiency up to 12% at 10 dB normalized
signal-to-noise ratio. The benefits of asynchronism stem from the finding that
the excess bandwidth of chip waveforms actually spans additional dimensions in
signal space, if the users are de-synchronized on the chip-level. The analysis
of linear MMSE detectors shows that the limiting interference effects can be
decoupled both in the user domain and in the frequency domain such that the
concept of the effective interference spectral density arises. This generalizes
and refines Tse and Hanly's concept of effective interference.
In Part II, the analysis is extended to any linear detector that admits a
representation as multistage detector and guidelines for the design of low
complexity multistage detectors with universal weights are provided.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2009 09:11:25 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Cottatellucci",
"Laura",
""
],
[
"Mueller",
"Ralf R.",
""
],
[
"Debbah",
"Merouane",
""
]
] |
new_dataset
| 0.989446 |
1007.0507
|
Sundeep Rangan
|
Sundeep Rangan
|
Femto-Macro Cellular Interference Control with Subband Scheduling and
Interference Cancelation
|
8 pages, 3 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A significant technical challenge in deploying femtocells is controlling the
interference from the underlay of femtos onto the overlay of macros. This paper
presents a novel interference control method where the macrocell bandwidth is
partitioned into subbands, and the short-range femtocell links adaptively
allocate their power across the subbands based on a load-spillage power control
method. The scheme can improve rate distribution in the macro network while
also providing opportunities for short-range communication as well. Moreover,
the proposed scheme requires minimal interference coordination communication
between the femtos and macros, which is one of the main challenges in femtocell
systems. Also, simulations show certain advantages over simpler
orthogonalization schemes or power control schemes without subband
partitioning. Further modest gains may also be possible with interference
cancelation.
|
[
{
"version": "v1",
"created": "Sat, 3 Jul 2010 18:27:51 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jul 2010 23:31:37 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Rangan",
"Sundeep",
""
]
] |
new_dataset
| 0.997648 |
1007.0799
|
Kenta Kasai
|
Kenta Kasai and Kohichi Sakaniwa
|
Fountain Codes with Multiplicatively Repeated Non-Binary LDPC Codes
|
To appear in Proc. 6th International Symposium on Turbo Codes and
Iterative Information Processing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study fountain codes transmitted over the binary-input symmetric-output
channel. For channels with small capacity, receivers needs to collects many
channel outputs to recover information bits. Since a collected channel output
yields a check node in the decoding Tanner graph, the channel with small
capacity leads to large decoding complexity. In this paper, we introduce a
novel fountain coding scheme with non-binary LDPC codes. The decoding
complexity of the proposed fountain code does not depend on the channel.
Numerical experiments show that the proposed codes exhibit better performance
than conventional fountain codes, especially for small number of information
bits.
|
[
{
"version": "v1",
"created": "Tue, 6 Jul 2010 02:50:05 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jul 2010 15:56:46 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Kasai",
"Kenta",
""
],
[
"Sakaniwa",
"Kohichi",
""
]
] |
new_dataset
| 0.999409 |
1007.1697
|
Sagarmoy Dutta
|
Sagarmoy Dutta and Piyush P Kurur
|
Quantum Cyclic Code
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we define and study \emph{quantum cyclic codes}, a
generalisation of cyclic codes to the quantum setting. Previously studied
examples of quantum cyclic codes were all quantum codes obtained from classical
cyclic codes via the CSS construction. However, the codes that we study are
much more general. In particular, we construct cyclic stabiliser codes with
parameters $[[5,1,3]]$, $[[17,1,7]]$ and $[[17,9,3]]$, all of which are
\emph{not} CSS. The $[[5,1,3]]$ code is the well known Laflamme code and to the
best of our knowledge the other two are new examples. Our definition of
cyclicity applies to non-stabiliser codes as well; in fact we show that the
$((5,6,2))$ nonstabiliser first constructed by Rains\etal~
cite{rains97nonadditive} and latter by Arvind
\etal~\cite{arvind:2004:nonstabilizer} is cyclic. We also study stabiliser
codes of length $4^m +1$ over $\mathbb{F}_2$ for which we define a notation of
BCH distance. Much like the Berlekamp decoding algorithm for classical BCH
codes, we give efficient quantum algorithms to correct up to
$\floor{\frac{d-1}{2}}$ errors when the BCH distance is $d$.
|
[
{
"version": "v1",
"created": "Sat, 10 Jul 2010 05:01:41 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Dutta",
"Sagarmoy",
""
],
[
"Kurur",
"Piyush P",
""
]
] |
new_dataset
| 0.999413 |
1007.1735
|
Ahmed Badr
|
Ahmed Badr, Ashish Khisti and Emin Martinian
|
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and
Optimality
|
Globecom 2010
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Streaming erasure codes encode a source stream to guarantee that each source
packet is recovered within a fixed delay at the receiver over a burst-erasure
channel. This paper introduces diversity embedded streaming erasure codes
(DE-SCo), that provide a flexible tradeoff between the channel quality and
receiver delay. When the channel conditions are good, the source stream is
recovered with a low delay, whereas when the channel conditions are poor the
source stream is still recovered, albeit with a larger delay. Information
theoretic analysis of the underlying burst-erasure broadcast channel reveals
that DE-SCo achieve the minimum possible delay for the weaker user, without
sacrificing the performance of the stronger user. A larger class of multicast
streaming erasure codes (MU-SCo) that achieve optimal tradeoff between rate,
delay and erasure-burst length is also constructed.
|
[
{
"version": "v1",
"created": "Sat, 10 Jul 2010 18:02:49 GMT"
}
] | 2010-07-13T00:00:00 |
[
[
"Badr",
"Ahmed",
""
],
[
"Khisti",
"Ashish",
""
],
[
"Martinian",
"Emin",
""
]
] |
new_dataset
| 0.998397 |
0901.1655
|
Roberto N\'obrega
|
Roberto W. Nobrega and Bartolomeu F. Uchoa-Filho
|
Multishot Codes for Network Coding: Bounds and a Multilevel Construction
|
5 pages, 2 figures, submitted to ISIT 2009
| null |
10.1109/ISIT.2009.5205750
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The subspace channel was introduced by Koetter and Kschischang as an adequate
model for the communication channel from the source node to a sink node of a
multicast network that performs random linear network coding. So far, attention
has been given to one-shot subspace codes, that is, codes that use the subspace
channel only once. In contrast, this paper explores the idea of using the
subspace channel more than once and investigates the so called multishot
subspace codes. We present definitions for the problem, a motivating example,
lower and upper bounds for the size of codes, and a multilevel construction of
codes based on block-coded modulation.
|
[
{
"version": "v1",
"created": "Mon, 12 Jan 2009 20:23:55 GMT"
}
] | 2010-07-12T00:00:00 |
[
[
"Nobrega",
"Roberto W.",
""
],
[
"Uchoa-Filho",
"Bartolomeu F.",
""
]
] |
new_dataset
| 0.997052 |
1006.3426
|
John Whitbeck
|
John Whitbeck, Vania Conan
|
HYMAD: Hybrid DTN-MANET Routing for Dense and Highly Dynamic Wireless
Networks
|
Accepted for publication in the Computer Communications Journal
|
Computer Communications Vol. 33 Issue 13 (2010) pages 1483-1492
|
10.1016/j.comcom.2010.03.005
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delay/Disruption-Tolerant Network (DTN) protocols typically address sparse
intermittently connected networks whereas Mobile Ad-hoc Network (MANET)
protocols address the fairly stable and fully connected ones. But many
intermediate situations may occur on mobility dynamics or radio link
instability. In such cases, where the network frequently splits into evolving
connected groups, none of the conventional routing paradigms (DTN or MANET) are
fully satisfactory. In this paper we propose HYMAD, a Hybrid DTN-MANET routing
protocol which uses DTN between disjoint groups of nodes while using MANET
routing within these groups. HYMAD is fully decentralized and only makes use of
topological information exchanges between the nodes. The strength of HYMAD lies
in its ability to adapt to the changing connectivity patterns of the network.
We evaluate the scheme in simulation by replaying synthetic and real life
mobility traces which exhibit a broad range of connectivity dynamics. The
results show that HYMAD introduces limited overhead and outperforms the
multi-copy Spray-and-Wait DTN routing protocol it extends, both in terms of
delivery ratio and delay. This hybrid DTN-MANET approach offers a promising
venue for the delivery of elastic data in mobile ad-hoc networks as it retains
the resilience of a \textit{pure} DTN protocol while significantly improving
performance.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 10:52:51 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jun 2010 16:28:26 GMT"
}
] | 2010-07-12T00:00:00 |
[
[
"Whitbeck",
"John",
""
],
[
"Conan",
"Vania",
""
]
] |
new_dataset
| 0.991658 |
1007.1189
|
Stefan Schmid
|
Andrea Richa and Christian Scheideler and Stefan Schmid and Jin Zhang
|
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a simple local medium access control protocol, called
\textsc{Jade}, for multi-hop wireless networks with a single channel that is
provably robust against adaptive adversarial jamming. The wireless network is
modeled as a unit disk graph on a set of nodes distributed arbitrarily in the
plane. In addition to these nodes, there are adversarial jammers that know the
protocol and its entire history and that are allowed to jam the wireless
channel at any node for an arbitrary $(1-\epsilon)$-fraction of the time steps,
where $0<\epsilon<1$ is an arbitrary constant. We assume that the nodes cannot
distinguish between jammed transmissions and collisions of regular messages.
Nevertheless, we show that \textsc{Jade} achieves an asymptotically optimal
throughput if there is a sufficiently dense distribution of nodes.
|
[
{
"version": "v1",
"created": "Wed, 7 Jul 2010 17:25:53 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Jul 2010 12:58:58 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Jul 2010 19:24:08 GMT"
}
] | 2010-07-12T00:00:00 |
[
[
"Richa",
"Andrea",
""
],
[
"Scheideler",
"Christian",
""
],
[
"Schmid",
"Stefan",
""
],
[
"Zhang",
"Jin",
""
]
] |
new_dataset
| 0.996018 |
1007.1069
|
Patrik Wahlberg
|
Patrik Wahlberg and Peter J. Schreier
|
On the instantaneous frequency of Gaussian stochastic processes
|
22 pages
| null | null | null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper concerns the instantaneous frequency (IF) of continuous-time,
zero-mean, complex-valued, proper, mean-square differentiable nonstationary
Gaussian stochastic processes. We compute the probability density function for
the IF for fixed time, which extends a result known for wide-sense stationary
processes to nonstationary processes. For a fixed time the IF has either zero
or infinite variance. For harmonizable processes we obtain as a byproduct that
the mean of the IF, for fixed time, is the normalized first order frequency
moment of the Wigner spectrum.
|
[
{
"version": "v1",
"created": "Wed, 7 Jul 2010 08:16:36 GMT"
}
] | 2010-07-08T00:00:00 |
[
[
"Wahlberg",
"Patrik",
""
],
[
"Schreier",
"Peter J.",
""
]
] |
new_dataset
| 0.986141 |
1007.1100
|
Jalaluddin Qureshi
|
Chuan Heng Foh, Jianfei Cai, and Jalaluddin Qureshi
|
Collision Codes: Decoding Superimposed BPSK Modulated Wireless
Transmissions
| null | null |
10.1109/CCNC.2010.5421745
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The introduction of physical layer network coding gives rise to the concept
of turning a collision of transmissions on a wireless channel useful. In the
idea of physical layer network coding, two synchronized simultaneous packet
transmissions are carefully encoded such that the superimposed transmission can
be decoded to produce a packet which is identical to the bitwise binary sum of
the two transmitted packets. This paper explores the decoding of superimposed
transmission resulted by multiple synchronized simultaneous transmissions. We
devise a coding scheme that achieves the identification of individual
transmission from the synchronized superimposed transmission. A mathematical
proof for the existence of such a coding scheme is given.
|
[
{
"version": "v1",
"created": "Wed, 7 Jul 2010 10:34:34 GMT"
}
] | 2010-07-08T00:00:00 |
[
[
"Foh",
"Chuan Heng",
""
],
[
"Cai",
"Jianfei",
""
],
[
"Qureshi",
"Jalaluddin",
""
]
] |
new_dataset
| 0.995305 |
1007.1209
|
Xuebin Wu
|
Xuebin Wu, Zhiyuan Yan, Ning Chen, and Meghanad Wagh
|
Prime Factor Cyclotomic Fourier Transforms with Reduced Complexity over
Finite Fields
|
submitted to SiPS 2010, accepted
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Discrete Fourier transforms~(DFTs) over finite fields have widespread
applications in error correction coding. Hence, reducing the computational
complexities of DFTs is of great significance, especially for long DFTs as
increasingly longer error control codes are chosen for digital communication
and storage systems. Since DFTs involve both multiplications and additions over
finite fields and multiplications are much more complex than additions,
recently proposed cyclotomic fast Fourier transforms (CFFTs) are promising due
to their low multiplicative complexity. Unfortunately, they have very high
additive complexity. Techniques such as common subexpression elimination (CSE)
can be used to reduce the additive complexity of CFFTs, but their effectiveness
for long DFTs is limited by their complexity. In this paper, we propose prime
factor cyclotomic Fourier transforms (PFCFTs), which use CFFTs as sub-DFTs via
the prime factor algorithm. When the length of DFTs is prime, our PFCFTs reduce
to CFFTs. When the length has co-prime factors, since the sub-DFTs have much
shorter lengths, this allows us to use CSE to significantly reduce their
additive complexity. In comparison to previously proposed fast Fourier
transforms, our PFCFTs achieve reduced overall complexity when the length of
DFTs is at least 255, and the improvement significantly increases as the length
grows. This approach also enables us to propose efficient DFTs with very long
length (e.g., 4095-point), first efficient DFTs of such lengths in the
literature. Finally, our PFCFTs are also advantageous for hardware
implementation due to their regular structure.
|
[
{
"version": "v1",
"created": "Wed, 7 Jul 2010 18:02:55 GMT"
}
] | 2010-07-08T00:00:00 |
[
[
"Wu",
"Xuebin",
""
],
[
"Yan",
"Zhiyuan",
""
],
[
"Chen",
"Ning",
""
],
[
"Wagh",
"Meghanad",
""
]
] |
new_dataset
| 0.996031 |
1007.0936
|
Jaroslaw Kwapien
|
Jaroslaw Kwapien, Stanislaw Drozdz, Adam Orczyk
|
Linguistic complexity: English vs. Polish, text vs. corpus
| null |
Acta Phys. Pol. A 117, 716-720 (2010)
| null | null |
cs.CL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the rank-frequency distributions of words in selected English and
Polish texts. We show that for the lemmatized (basic) word forms the
scale-invariant regime breaks after about two decades, while it might be
consistent for the whole range of ranks for the inflected word forms. We also
find that for a corpus consisting of texts written by different authors the
basic scale-invariant regime is broken more strongly than in the case of
comparable corpus consisting of texts written by the same author. Similarly,
for a corpus consisting of texts translated into Polish from other languages
the scale-invariant regime is broken more strongly than for a comparable corpus
of native Polish texts. Moreover, we find that if the words are tagged with
their proper part of speech, only verbs show rank-frequency distribution that
is almost scale-invariant.
|
[
{
"version": "v1",
"created": "Tue, 6 Jul 2010 16:09:43 GMT"
}
] | 2010-07-07T00:00:00 |
[
[
"Kwapien",
"Jaroslaw",
""
],
[
"Drozdz",
"Stanislaw",
""
],
[
"Orczyk",
"Adam",
""
]
] |
new_dataset
| 0.968884 |
0912.5494
|
Serguei Mokhov
|
Miao Song, Serguei A. Mokhov and Peter Grogono
|
Teaching Physical Based Animation via OpenGL Slides
|
12 pages; 7 figures; the poster is presented at C32SE'09 and the
paper at CISSE'09 at http://conference.cisse2009.org/proceedings.aspx ; there
are an executable demo and its source code
| null |
10.1007/978-90-481-9112-3_82 10.1145/1557626.1557647
| null |
cs.GR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work expands further our earlier poster presentation and integration of
the OpenGL Slides Framework (OGLSF) - to make presentations with real-time
animated graphics where each slide is a scene with tidgets - and physical based
animation of elastic two-, three-layer softbody objects. The whole project is
very interactive, and serves dual purpose - delivering the teaching material in
a classroom setting with real running animated examples as well as releasing
the source code to the students to show how the actual working things are made.
|
[
{
"version": "v1",
"created": "Wed, 30 Dec 2009 17:53:18 GMT"
}
] | 2010-07-06T00:00:00 |
[
[
"Song",
"Miao",
""
],
[
"Mokhov",
"Serguei A.",
""
],
[
"Grogono",
"Peter",
""
]
] |
new_dataset
| 0.999178 |
1002.0026
|
Lorena Ronquillo
|
H. Rif\`a-Pous, J. Rif\`a and L. Ronquillo
|
Perfect Z2Z4-linear codes in Steganography
|
5 pages, revised version
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Steganography is an information hiding application which aims to hide secret
data imperceptibly into a commonly used media. Unfortunately, the theoretical
hiding asymptotical capacity of steganographic systems is not attained by
algorithms developed so far. In this paper, we describe a novel coding method
based on Z2Z4-linear codes that conforms to +/-1-steganography, that is secret
data is embedded into a cover message by distorting each symbol by one unit at
most. This method solves some problems encountered by the most efficient
methods known today, based on ternary Hamming codes. Finally, the performance
of this new technique is compared with that of the mentioned methods and with
the well-known theoretical upper bound.
|
[
{
"version": "v1",
"created": "Mon, 1 Feb 2010 15:40:51 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jul 2010 12:52:54 GMT"
}
] | 2010-07-06T00:00:00 |
[
[
"Rifà-Pous",
"H.",
""
],
[
"Rifà",
"J.",
""
],
[
"Ronquillo",
"L.",
""
]
] |
new_dataset
| 0.993861 |
1007.0496
|
Matthew Mckay Dr.
|
Yang Chen and Matthew R. McKay
|
Perturbed Hankel Determinants: Applications to the Information Theory of
MIMO Wireless Communications
|
77 pages; 6 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we compute two important information-theoretic quantities which
arise in the application of multiple-input multiple-output (MIMO) antenna
wireless communication systems: the distribution of the mutual information of
multi-antenna Gaussian channels, and the Gallager random coding upper bound on
the error probability achievable by finite-length channel codes. It turns out
that the mathematical problem underpinning both quantities is the computation
of certain Hankel determinants generated by deformed versions of classical
weight functions. For single-user MIMO systems, it is a deformed Laguerre
weight, whereas for multi-user MIMO systems it is a deformed Jacobi weight. We
apply two different methods to characterize each of these Hankel determinants.
First, we employ the ladder operators of the corresponding monic orthogonal
polynomials to give an exact characterization of the Hankel determinants in
terms of Painlev\'{e} differential equations. This turns out to be a
Painlev\'{e} V for the single-user MIMO scenario and a Painlev\'{e} VI for the
multi user scenario. We then employ Coulomb fluid methods to derive new
closed-form approximations for the Hankel determinants which, although formally
valid for large matrix dimensions, are shown to give accurate results for both
the MIMO mutual information distribution and the error exponent even when the
matrix dimensions are small. Focusing on the single-user mutual information
distribution, we then employ both the exact Painlev\'{e} representation and the
Coulomb fluid approximation to yield deeper insights into the scaling behavior
in terms of the number of antennas and signal-to-noise ratio. Among other
things, these results allow us to study the asymptotic Gaussianity of the
distribution as the number of antennas increase, and to explicitly compute the
correction terms to the mean, variance, and higher order cumulants.
|
[
{
"version": "v1",
"created": "Sat, 3 Jul 2010 13:52:53 GMT"
}
] | 2010-07-06T00:00:00 |
[
[
"Chen",
"Yang",
""
],
[
"McKay",
"Matthew R.",
""
]
] |
new_dataset
| 0.985273 |
0802.4002
|
Uwe Aickelin
|
Uwe Aickelin and Julie Greensmith
|
Sensing Danger: Innate Immunology for Intrusion Detection
| null |
Information Security Technical Report, 12(4), pp 218-227, 2007
|
10.1016/j.istr.2007.10.003
| null |
cs.NE cs.CR
| null |
The immune system provides an ideal metaphor for anomaly detection in general
and computer security in particular. Based on this idea, artificial immune
systems have been used for a number of years for intrusion detection,
unfortunately so far with little success. However, these previous systems were
largely based on immunological theory from the 1970s and 1980s and over the
last decade our understanding of immunological processes has vastly improved.
In this paper we present two new immune inspired algorithms based on the latest
immunological discoveries, such as the behaviour of Dendritic Cells. The
resultant algorithms are applied to real world intrusion problems and show
encouraging results. Overall, we believe there is a bright future for these
next generation artificial immune algorithms.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2008 12:15:08 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Mar 2008 16:59:24 GMT"
},
{
"version": "v3",
"created": "Fri, 16 May 2008 10:45:07 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Aickelin",
"Uwe",
""
],
[
"Greensmith",
"Julie",
""
]
] |
new_dataset
| 0.957145 |
0907.3867
|
Uwe Aickelin
|
Julie Greensmith and Uwe Aickelin
|
Artificial Dendritic Cells: Multi-faceted Perspectives
|
24 pages, 6 figures,
|
Human-Centric Information Processing Through Granular Modelling,
182, 375-395, 2009
| null | null |
cs.AI cs.CR cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dendritic cells are the crime scene investigators of the human immune system.
Their function is to correlate potentially anomalous invading entities with
observed damage to the body. The detection of such invaders by dendritic cells
results in the activation of the adaptive immune system, eventually leading to
the removal of the invader from the host body. This mechanism has provided
inspiration for the development of a novel bio-inspired algorithm, the
Dendritic Cell Algorithm. This algorithm processes information at multiple
levels of resolution, resulting in the creation of information granules of
variable structure. In this chapter we examine the multi-faceted nature of
immunology and how research in this field has shaped the function of the
resulting Dendritic Cell Algorithm. A brief overview of the algorithm is given
in combination with the details of the processes used for its development. The
chapter is concluded with a discussion of the parallels between our
understanding of the human immune system and how such knowledge influences the
design of artificial immune systems.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 15:46:18 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jul 2009 15:21:39 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.99957 |
0910.3124
|
Uwe Aickelin
|
Gianni Tedesco, Uwe Aickelin
|
An Immune Inspired Network Intrusion Detection System Utilising
Correlation Context
|
2 pages, Workshop on Artificial Immune Systems and Immune System
Modelling
| null | null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network Intrusion Detection Systems (NIDS) are computer systems which monitor
a network with the aim of discerning malicious from benign activity on that
network. While a wide range of approaches have met varying levels of success,
most IDSs rely on having access to a database of known attack signatures which
are written by security experts. Nowadays, in order to solve problems with
false positive alerts, correlation algorithms are used to add additional
structure to sequences of IDS alerts. However, such techniques are of no help
in discovering novel attacks or variations of known attacks, something the
human immune system (HIS) is capable of doing in its own specialised domain.
This paper presents a novel immune algorithm for application to the IDS
problem. The goal is to discover packets containing novel variations of attacks
covered by an existing signature base.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:55:41 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Tedesco",
"Gianni",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.979246 |
1001.2405
|
Uwe Aickelin
|
Julie Greensmith and Uwe Aickelin
|
Dendritic Cells for Real-Time Anomaly Detection
|
2 pages, 1 figure, Workshop on Artificial Immune Systems and Immune
System Modelling (AISB06), Bristol, UK
| null | null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dendritic Cells (DCs) are innate immune system cells which have the power to
activate or suppress the immune system. The behaviour of human of human DCs is
abstracted to form an algorithm suitable for anomaly detection. We test this
algorithm on the real-time problem of port scan detection. Our results show a
significant difference in artificial DC behaviour for an outgoing portscan when
compared to behaviour for normal processes.
|
[
{
"version": "v1",
"created": "Thu, 14 Jan 2010 10:41:00 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.999126 |
1002.0276
|
Uwe Aickelin
|
Julie Greensmith and Uwe Aickelin
|
Dendritic Cells for SYN Scan Detection
|
8 Pages, 9 Figures, Genetic and Evolutionary Computation Conference
(GECCO 2007)
|
Proceedings of the Genetic and Evolutionary Computation Conference
(GECCO 2007)
| null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Artificial immune systems have previously been applied to the problem of
intrusion detection. The aim of this research is to develop an intrusion
detection system based on the function of Dendritic Cells (DCs). DCs are
antigen presenting cells and key to activation of the human immune system,
behaviour which has been abstracted to form the Dendritic Cell Algorithm (DCA).
In algorithmic terms, individual DCs perform multi-sensor data fusion,
asynchronously correlating the the fused data signals with a secondary data
stream. Aggregate output of a population of cells, is analysed and forms the
basis of an anomaly detection system. In this paper the DCA is applied to the
detection of outgoing port scans using TCP SYN packets. Results show that
detection can be achieved with the DCA, yet some false positives can be
encountered when simultaneously scanning and using other network services.
Suggestions are made for using adaptive signals to alleviate this uncovered
problem.
|
[
{
"version": "v1",
"created": "Mon, 1 Feb 2010 15:53:04 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.999351 |
1003.0789
|
Uwe Aickelin
|
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
|
Information Fusion for Anomaly Detection with the Dendritic Cell
Algorithm
|
21 pages, 17 figures, Information Fusion
|
Information Fusion, 11 (1), 21-34, 2010
| null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dendritic cells are antigen presenting cells that provide a vital link
between the innate and adaptive immune system, providing the initial detection
of pathogenic invaders. Research into this family of cells has revealed that
they perform information fusion which directs immune responses. We have derived
a Dendritic Cell Algorithm based on the functionality of these cells, by
modelling the biological signals and differentiation pathways to build a
control mechanism for an artificial immune system. We present algorithmic
details in addition to experimental results, when the algorithm was applied to
anomaly detection for the detection of port scans. The results show the
Dendritic Cell Algorithm is sucessful at detecting port scans.
|
[
{
"version": "v1",
"created": "Wed, 3 Mar 2010 12:04:01 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Tedesco",
"Gianni",
""
]
] |
new_dataset
| 0.992816 |
1003.4142
|
Uwe Aickelin
|
Jungwon Kim, Julie Greensmith, Jamie Twycross, Uwe Aickelin
|
Malicious Code Execution Detection and Response Immune System inspired
by the Danger Theory
|
4 pages, 1 table, Adaptive and Resilient Computing Security Workshop
(ARCS-05), Santa Fe, USA
|
Proceedings of Adaptive and Resilient Computing Security Workshop
(ARCS-05), Santa Fe, USA, 2005,
| null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The analysis of system calls is one method employed by anomaly detection
systems to recognise malicious code execution. Similarities can be drawn
between this process and the behaviour of certain cells belonging to the human
immune system, and can be applied to construct an artificial immune system. A
recently developed hypothesis in immunology, the Danger Theory, states that our
immune system responds to the presence of intruders through sensing molecules
belonging to those invaders, plus signals generated by the host indicating
danger and damage. We propose the incorporation of this concept into a
responsive intrusion detection system, where behavioural information of the
system and running processes is combined with information regarding individual
system calls.
|
[
{
"version": "v1",
"created": "Mon, 22 Mar 2010 12:24:02 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Kim",
"Jungwon",
""
],
[
"Greensmith",
"Julie",
""
],
[
"Twycross",
"Jamie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.981416 |
1004.3196
|
Uwe Aickelin
|
Julie Greensmith, Uwe Aickelin, Steve Cayzer
|
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for
Anomoly Detection
|
14 pages, 4 figures, 4 tables, 4th International Conference on
Artificial Immune Systems (ICARIS2005)
|
Proceedings of the 4th International Conference on Artificial
Immune Systems (ICARIS2005), Lecture Notes in Computer Science 3627, Banff,
Canada, 2005
| null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dendritic cells are antigen presenting cells that provide a vital link
between the innate and adaptive immune system. Research into this family of
cells has revealed that they perform the role of coordinating T-cell based
immune responses, both reactive and for generating tolerance. We have derived
an algorithm based on the functionality of these cells, and have used the
signals and differentiation pathways to build a control mechanism for an
artificial immune system. We present our algorithmic details in addition to
some preliminary results, where the algorithm was applied for the purpose of
anomaly detection. We hope that this algorithm will eventually become the key
component within a large, distributed immune system, based on sound
immunological concepts.
|
[
{
"version": "v1",
"created": "Mon, 19 Apr 2010 13:52:32 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Cayzer",
"Steve",
""
]
] |
new_dataset
| 0.99963 |
1006.1512
|
Uwe Aickelin
|
Julie Greensmith, Uwe Aickelin
|
The Deterministic Dendritic Cell Algorithm
|
12 pages, 1 algorithm, 1 figure, 2 tables, 7th International
Conference on Artificial Immune Systems (ICARIS 2008)
|
Proceedings of the 7th International Conference on Artificial
Immune Systems (ICARIS 2008), Phuket, Thailand, p 291-303
| null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Dendritic Cell Algorithm is an immune-inspired algorithm orig- inally
based on the function of natural dendritic cells. The original instantiation of
the algorithm is a highly stochastic algorithm. While the performance of the
algorithm is good when applied to large real-time datasets, it is difficult to
anal- yse due to the number of random-based elements. In this paper a
deterministic version of the algorithm is proposed, implemented and tested
using a port scan dataset to provide a controllable system. This version
consists of a controllable amount of parameters, which are experimented with in
this paper. In addition the effects are examined of the use of time windows and
variation on the number of cells, both which are shown to influence the
algorithm. Finally a novel metric for the assessment of the algorithms output
is introduced and proves to be a more sensitive metric than the metric used
with the original Dendritic Cell Algorithm.
|
[
{
"version": "v1",
"created": "Tue, 8 Jun 2010 10:07:34 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.998915 |
1006.5008
|
Uwe Aickelin
|
Julie Greensmith, Uwe Aickelin, Steve Cayzer
|
Detecting Danger: The Dendritic Cell Algorithm
|
27 pages, 8 figures, Robust Intelligent Systems
|
Robust Intelligent Systems, 12, p 89-112, 2008
| null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Dendritic Cell Algorithm (DCA) is inspired by the function of the
dendritic cells of the human immune system. In nature, dendritic cells are the
intrusion detection agents of the human body, policing the tissue and organs
for potential invaders in the form of pathogens. In this research, and abstract
model of DC behaviour is developed and subsequently used to form an algorithm,
the DCA. The abstraction process was facilitated through close collaboration
with laboratory- based immunologists, who performed bespoke experiments, the
results of which are used as an integral part of this algorithm. The DCA is a
population based algorithm, with each agent in the system represented as an
'artificial DC'. Each DC has the ability to combine multiple data streams and
can add context to data suspected as anomalous. In this chapter the abstraction
process and details of the resultant algorithm are given. The algorithm is
applied to numerous intrusion detection problems in computer security including
the detection of port scans and botnets, where it has produced impressive
results with relatively low rates of false positives.
|
[
{
"version": "v1",
"created": "Fri, 25 Jun 2010 15:30:45 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Cayzer",
"Steve",
""
]
] |
new_dataset
| 0.999098 |
1007.0267
|
Onur Sahin
|
Onur Sahin, Osvaldo Simeone, Elza Erkip
|
Interference Channel with an Out-of-Band Relay
|
52 pages, 12 figures, revised version for IT Transactions
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Gaussian interference channel (IC) with a relay is considered. The relay is
assumed to operate over an orthogonal band with respect to the underlying IC,
and the overall system is referred to as IC with an out-of-band relay (IC-OBR).
The system can be seen as operating over two parallel interference-limited
channels: The first is a standard Gaussian IC and the second is a Gaussian
relay channel characterized by two sources and destinations communicating
through the relay without direct links. We refer to the second parallel channel
as OBR Channel (OBRC). The main aim of this work is to identify conditions
under which optimal operation, in terms of the capacity region of the IC-OBR,
entails either signal relaying and/or interference forwarding by the relay,
with either a separable or non-separable use of the two parallel channels, IC
and OBRC. Here "separable" refers to transmission of independent information
over the two constituent channels. For a basic model in which the OBRC consists
of four orthogonal channels from sources to relay and from relay to
destinations (IC-OBR Type-I), a condition is identified under which signal
relaying and separable operation is optimal. When this condition is not
satisfied, various scenarios are identified in which interference forwarding
and non-separable operation are necessary to achieve optimal performance. In
these scenarios, the system exploits the "excess capacity" on the OBRC via
interference forwarding to drive the IC-OBR system in specific interference
regimes (strong or mixed). The analysis is then turned to a more complex
IC-OBR, in which the OBRC consists of only two orthogonal channels, one from
sources to relay and one from relay to destinations (IC-OBR Type-II). For this
channel, some capacity resuls are derived that parallel the conclusions for
IC-OBR Type-I.
|
[
{
"version": "v1",
"created": "Thu, 1 Jul 2010 20:56:46 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Sahin",
"Onur",
""
],
[
"Simeone",
"Osvaldo",
""
],
[
"Erkip",
"Elza",
""
]
] |
new_dataset
| 0.996474 |
1007.0050
|
R. J. Sobie
|
P. Armstrong, A. Agarwal, A. Bishop, A. Charbonneau, R. Desmarais, K.
Fransham, N. Hill, I. Gable, S. Gaudet, S. Goliath, R. Impey, C.
Leavett-Brown, J. Ouellete, M. Paterson, C. Pritchet, D. Penfold-Brown, W.
Podaima, D. Schade, R.J. Sobie
|
Cloud Scheduler: a resource manager for distributed compute clouds
|
10 pages, 1 figure
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives
researchers access to a large set of new resources for running complex
scientific applications. However, exploiting cloud resources for large numbers
of jobs requires significant effort and expertise. In order to make it simple
and transparent for researchers to deploy their applications, we have developed
a virtual machine resource manager (Cloud Scheduler) for distributed compute
clouds. Cloud Scheduler boots and manages the user-customized virtual machines
in response to a user's job submission. We describe the motivation and design
of the Cloud Scheduler and present results on its use on both science and
commercial clouds.
|
[
{
"version": "v1",
"created": "Wed, 30 Jun 2010 23:54:01 GMT"
}
] | 2010-07-02T00:00:00 |
[
[
"Armstrong",
"P.",
""
],
[
"Agarwal",
"A.",
""
],
[
"Bishop",
"A.",
""
],
[
"Charbonneau",
"A.",
""
],
[
"Desmarais",
"R.",
""
],
[
"Fransham",
"K.",
""
],
[
"Hill",
"N.",
""
],
[
"Gable",
"I.",
""
],
[
"Gaudet",
"S.",
""
],
[
"Goliath",
"S.",
""
],
[
"Impey",
"R.",
""
],
[
"Leavett-Brown",
"C.",
""
],
[
"Ouellete",
"J.",
""
],
[
"Paterson",
"M.",
""
],
[
"Pritchet",
"C.",
""
],
[
"Penfold-Brown",
"D.",
""
],
[
"Podaima",
"W.",
""
],
[
"Schade",
"D.",
""
],
[
"Sobie",
"R. J.",
""
]
] |
new_dataset
| 0.998601 |
1007.0126
|
Mubashir Husain Rehmani
|
Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, and
Serge Fdida
|
A Cognitive Radio Based Internet Access Framework for Disaster Response
Network Deployment
| null | null | null |
INRIA Research Report RR-7285, May 2010
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a cognitive radio based Internet access framework
for disaster response network deployment in challenged environments. The
proposed architectural framework is designed to help the existent but partially
damaged networks to restore their connectivity and to connect them to the
global Internet. This architectural framework provides the basis to develop
algorithms and protocols for the future cognitive radio network deployments in
challenged environments.
|
[
{
"version": "v1",
"created": "Thu, 1 Jul 2010 10:42:11 GMT"
}
] | 2010-07-02T00:00:00 |
[
[
"Rehmani",
"Mubashir Husain",
""
],
[
"Viana",
"Aline Carneiro",
""
],
[
"Khalife",
"Hicham",
""
],
[
"Fdida",
"Serge",
""
]
] |
new_dataset
| 0.988262 |
0707.0556
|
Roberto Amadio
|
Roberto Amadio (PPS), Mehdi Dogguy (PPS)
|
Determinacy in a synchronous pi-calculus
|
To appear in the book `From semantics to computer science: essays in
honor of Gilles Kahn', Cambridge University Press
|
From semantics to computer science: essays in honor of Gilles
Kahn, Y. Bertot et al. (Ed.) (2009) 1-27
| null | null |
cs.LO
| null |
The S-pi-calculus is a synchronous pi-calculus which is based on the SL
model. The latter is a relaxation of the Esterel model where the reaction to
the absence of a signal within an instant can only happen at the next instant.
In the present work, we present and characterise a compositional semantics of
the S-pi-calculus based on suitable notions of labelled transition system and
bisimulation. Based on this semantic framework, we explore the notion of
determinacy and the related one of (local) confluence.
|
[
{
"version": "v1",
"created": "Wed, 4 Jul 2007 08:12:17 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Feb 2008 18:58:19 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Amadio",
"Roberto",
"",
"PPS"
],
[
"Dogguy",
"Mehdi",
"",
"PPS"
]
] |
new_dataset
| 0.991498 |
1004.4431
|
Georg Hager
|
Jan Treibig, Georg Hager, Gerhard Wellein
|
LIKWID: A lightweight performance-oriented tool suite for x86 multicore
environments
|
10 pages, 11 figures. Some clarifications and corrections
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Exploiting the performance of today's processors requires intimate knowledge
of the microarchitecture as well as an awareness of the ever-growing complexity
in thread and cache topology. LIKWID is a set of command-line utilities that
addresses four key problems: Probing the thread and cache topology of a
shared-memory node, enforcing thread-core affinity on a program, measuring
performance counter metrics, and toggling hardware prefetchers. An API for
using the performance counting features from user code is also included. We
clearly state the differences to the widely used PAPI interface. To demonstrate
the capabilities of the tool set we show the influence of thread pinning on
performance using the well-known OpenMP STREAM triad benchmark, and use the
affinity and hardware counter tools to study the performance of a stencil code
specifically optimized to utilize shared caches on multicore chips.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 08:33:25 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Apr 2010 10:39:17 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Jun 2010 13:08:39 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
],
[
"Wellein",
"Gerhard",
""
]
] |
new_dataset
| 0.999291 |
1005.4034
|
Debotosh Bhattacharjee
|
Santanu Halder, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar
Basu and Mahantapas Kundu
|
Face Synthesis (FASY) System for Generation of a Face Image from Human
Description
| null |
ICIIS 2008
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper aims at generating a new face based on the human like description
using a new concept. The FASY (FAce SYnthesis) System is a Face Database
Retrieval and new Face generation System that is under development. One of its
main features is the generation of the requested face when it is not found in
the existing database, which allows a continuous growing of the database also.
|
[
{
"version": "v1",
"created": "Fri, 21 May 2010 18:03:44 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Halder",
"Santanu",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
],
[
"Kundu",
"Mahantapas",
""
]
] |
new_dataset
| 0.96565 |
1006.5901
|
Ashish Khisti
|
Ashish Khisti
|
Secret key agreement on wiretap channels with transmitter side
information
|
Presented at European Wireless 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secret-key agreement protocols over wiretap channels controlled by a state
parameter are studied. The entire state sequence is known (non-causally) to the
sender but not to the receiver and the eavesdropper. Upper and lower bounds on
the secret-key capacity are established both with and without public
discussion. The proposed coding scheme involves constructing a codebook to
create common reconstruction of the state sequence at the sender and the
receiver and another secret-key codebook constructed by random binning. For the
special case of Gaussian channels, with no public discussion, - the secret-key
generation with dirty paper problem, the gap between our bounds is at-most 1/2
bit and the bounds coincide in the high signal-to-noise ratio and high
interference-to-noise ratio regimes. In the presence of public discussion our
bounds coincide, yielding the capacity, when then the channels of the receiver
and the eavesdropper satisfy an in- dependent noise condition.
|
[
{
"version": "v1",
"created": "Wed, 30 Jun 2010 16:07:52 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Khisti",
"Ashish",
""
]
] |
new_dataset
| 0.998887 |
1006.5908
|
Debotosh Bhattacharjee
|
Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, D. K. Basu, and
M. Kundu
|
Recognition of Non-Compound Handwritten Devnagari Characters using a
Combination of MLP and Minimum Edit Distance
| null |
IJCSS 4(1): 107-120 (2010)
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with a new method for recognition of offline Handwritten
non-compound Devnagari Characters in two stages. It uses two well known and
established pattern recognition techniques: one using neural networks and the
other one using minimum edit distance. Each of these techniques is applied on
different sets of characters for recognition. In the first stage, two sets of
features are computed and two classifiers are applied to get higher recognition
accuracy. Two MLP's are used separately to recognize the characters. For one of
the MLP's the characters are represented with their shadow features and for the
other chain code histogram feature is used. The decision of both MLP's is
combined using weighted majority scheme. Top three results produced by combined
MLP's in the first stage are used to calculate the relative difference values.
In the second stage, based on these relative differences character set is
divided into two. First set consists of the characters with distinct shapes and
second set consists of confused characters, which appear very similar in
shapes. Characters of distinct shapes of first set are classified using MLP.
Confused characters in second set are classified using minimum edit distance
method. Method of minimum edit distance makes use of corner detected in a
character image using modified Harris corner detection technique. Experiment on
this method is carried out on a database of 7154 samples. The overall
recognition is found to be 90.74%.
|
[
{
"version": "v1",
"created": "Wed, 30 Jun 2010 16:25:21 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Arora",
"Sandhya",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"D. K.",
""
],
[
"Kundu",
"M.",
""
]
] |
new_dataset
| 0.988998 |
1001.2101
|
Jouni Sir\'en
|
Jouni Sir\'en
|
Sampled Longest Common Prefix Array
|
This is a slightly extended version of the paper that was presented
at CPM 2010. The implementation is available at
http://www.cs.helsinki.fi/group/suds/rlcsa/
| null |
10.1007/978-3-642-13509-5_21
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When augmented with the longest common prefix (LCP) array and some other
structures, the suffix array can solve many string processing problems in
optimal time and space. A compressed representation of the LCP array is also
one of the main building blocks in many compressed suffix tree proposals. In
this paper, we describe a new compressed LCP representation: the sampled LCP
array. We show that when used with a compressed suffix array (CSA), the sampled
LCP array often offers better time/space trade-offs than the existing
alternatives. We also show how to construct the compressed representations of
the LCP array directly from a CSA.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2010 09:18:24 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Mar 2010 16:18:11 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Jun 2010 11:07:23 GMT"
}
] | 2010-06-30T00:00:00 |
[
[
"Sirén",
"Jouni",
""
]
] |
new_dataset
| 0.998711 |
1006.5047
|
Santosh Singh
|
Santosh Kumar Singh
|
Cognitive radio ad hoc networks (CRAHNs): Cognitive radio ad hoc
networks (CRAHNs): Resource allocation techniques based on Bio-inspired
computing
|
This paper has been withdrawn by the author due to a crucial sign
error in equation 1
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spectrum is a scarce commodity, and considering the spectrum scarcity faced
by the wireless-based service providers led to high congestion levels.
Technical inefficiencies from pooled spectrum (this is nothing but the "common
carrier principle" adopted in oil/gas/electricity pipelines/networks.), since
all ad hoc networks share a common pool of channels, exhausting the available
channels will force ad hoc networks to block the services. Researchers found
that cognitive radio (CR) technology may resolve the spectrum scarcity. CR
network proved to next generation wireless communication system that proposed
as a way to reuse under-utilised spectrum of licensee user (primary network) in
an opportunistic and non-interfering basis. A CR is a self-configuring entity
in a wireless networking that senses its environment, tracks changes, and
frequently exchanges information with their networks. Adding this layer of such
intelligence to the ad hoc network by looking at the overall geography of the
network known as cognitive radio ad hoc networks (CRAHNs). However, CRAHN
facing challenges and condition become worst while tracks changes i.e.
reallocation of another under-utilised channels while primary network user
arrives. In this paper, channels or resource reallocation technique based on
bio-inspired computing algorithm for CRAHN has been proposed.
|
[
{
"version": "v1",
"created": "Fri, 25 Jun 2010 19:26:02 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Jun 2010 15:24:20 GMT"
}
] | 2010-06-30T00:00:00 |
[
[
"Singh",
"Santosh Kumar",
""
]
] |
new_dataset
| 0.981722 |
1006.5572
|
Hiroaki Inoue
|
Hiroaki Inoue
|
A Multi-Core Processor Platform for Open Embedded Systems
|
A dissertation presented to the graduate school of science and
technology of Keio University in candidacy for the degree of Doctor of
Philosophy in Engineering, September 2009
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent proliferation of embedded systems has generated a bold new paradigm,
known as open embedded systems. While traditional embedded systems provide only
closed base applications (natively-installed software) to users, open embedded
systems allow the users to freely execute open applications
(additionally-installed software) in order to meet various user requirements,
such as user personalization and device coordination. Key to the success of
platforms required for open embedded systems is the achievement of both the
scalable extension of base applications and the secure execution of open
applications. Most existing platforms, however, have focused on either scalable
or secure execution, limiting their applicability. This dissertation presents a
new secure platform using multi-core processors, which achieves both
scalability and security. Four techniques feature the new platform: (1)
seamless communication, by which legacy applications designed for a single
processor make it possible to be executed on multiple processors without any
software modifications; (2) secure processor partitioning with hardware
support, by which Operating Systems (OSs) required for base and open
applications are securely executed on separate processors; (3) asymmetric
virtualization, by which many OSs over the number of processors are securely
executed under secure processor partitioning; and (4) secure dynamic
partitioning, by which the number of processors allocated to individual OSs
makes it possible to be dynamically changed under secure processor
partitioning.
|
[
{
"version": "v1",
"created": "Tue, 29 Jun 2010 11:35:55 GMT"
}
] | 2010-06-30T00:00:00 |
[
[
"Inoue",
"Hiroaki",
""
]
] |
new_dataset
| 0.979169 |
1006.5381
|
Catalin Anghel Mr
|
Catalin Anghel
|
Cresterea securitatii sistemelor informatice si de comunicatii prin
criptografia cuantica
|
24 pag
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Catch 22 of cryptography - "Before two parties can communicate in secret,
they must first communicate in secret". The weakness of classical cryptographic
communication systems is that secret communication can only take place after a
key is communicated in secret over a totally secure communication channel. Here
comes quantum key distribution which takes advantage of certain phenomena that
occur at the subatomic level, so that any attempt by an enemy to obtain the
bits in a key not only fails, but gets detected as well.
|
[
{
"version": "v1",
"created": "Mon, 28 Jun 2010 15:45:25 GMT"
}
] | 2010-06-29T00:00:00 |
[
[
"Anghel",
"Catalin",
""
]
] |
new_dataset
| 0.999178 |
1006.4104
|
Michael Domaratzki
|
Michael Domaratzki, Narad Rampersad
|
Abelian Primitive Words
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate Abelian primitive words, which are words that are not Abelian
powers. We show that unlike classical primitive words, the set of Abelian
primitive words is not context-free. We can determine whether a word is Abelian
primitive in linear time. Also different from classical primitive words, we
find that a word may have more than one Abelian root. We also consider
enumeration problems and the relation to the theory of codes.
|
[
{
"version": "v1",
"created": "Mon, 21 Jun 2010 16:01:24 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jun 2010 16:53:29 GMT"
}
] | 2010-06-25T00:00:00 |
[
[
"Domaratzki",
"Michael",
""
],
[
"Rampersad",
"Narad",
""
]
] |
new_dataset
| 0.994001 |
1006.4832
|
Kristiaan Pelckmans
|
Kristiaan Pelckmans
|
MINLIP for the Identification of Monotone Wiener Systems
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the MINLIP estimator for the identification of Wiener
systems consisting of a sequence of a linear FIR dynamical model, and a
monotonically increasing (or decreasing) static function. Given $T$
observations, this algorithm boils down to solving a convex quadratic program
with $O(T)$ variables and inequality constraints, implementing an inference
technique which is based entirely on model complexity control. The resulting
estimates of the linear submodel are found to be almost consistent when no
noise is present in the data, under a condition of smoothness of the true
nonlinearity and local Persistency of Excitation (local PE) of the data. This
result is novel as it does not rely on classical tools as a 'linearization'
using a Taylor decomposition, nor exploits stochastic properties of the data.
It is indicated how to extend the method to cope with noisy data, and empirical
evidence contrasts performance of the estimator against other recently proposed
techniques.
|
[
{
"version": "v1",
"created": "Thu, 24 Jun 2010 16:42:38 GMT"
}
] | 2010-06-25T00:00:00 |
[
[
"Pelckmans",
"Kristiaan",
""
]
] |
new_dataset
| 0.985482 |
1006.4833
|
Graham Kirby
|
Graham Kirby, Evangelos Zirintsis, Alan Dearle, Ron Morrison
|
A Generic Storage API
|
Submitted to ACSC 2004
| null | null |
University of St Andrews CS/03/2
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a generic API suitable for provision of highly generic storage
facilities that can be tailored to produce various individually customised
storage infrastructures. The paper identifies a candidate set of minimal
storage system building blocks, which are sufficiently simple to avoid
encapsulating policy where it cannot be customised by applications, and
composable to build highly flexible storage architectures. Four main generic
components are defined: the store, the namer, the caster and the interpreter.
It is hypothesised that these are sufficiently general that they could act as
building blocks for any information storage and retrieval system. The essential
characteristics of each are defined by an interface, which may be implemented
by multiple implementing classes.
|
[
{
"version": "v1",
"created": "Thu, 24 Jun 2010 16:47:28 GMT"
}
] | 2010-06-25T00:00:00 |
[
[
"Kirby",
"Graham",
""
],
[
"Zirintsis",
"Evangelos",
""
],
[
"Dearle",
"Alan",
""
],
[
"Morrison",
"Ron",
""
]
] |
new_dataset
| 0.995129 |
1006.4408
|
Ying Jun Zhang Ph.D.
|
Ying Jun (Angela) Zhang, Pengxuan Zheng, Soung Chang Liew
|
How Does Multiple-Packet Reception Capability Scale the Performance of
Wireless Local Area Networks?
| null |
IEEE Transactions on Mobile Computing, July 2009
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Thanks to its simplicity and cost efficiency, wireless local area network
(WLAN) enjoys unique advantages in providing high-speed and low-cost wireless
services in hot spots and indoor environments. Traditional WLAN
medium-access-control (MAC) protocols assume that only one station can transmit
at a time: simultaneous transmissions of more than one station cause the
destruction of all packets involved. By exploiting recent advances in PHY-layer
multiuser detection (MUD) techniques, it is possible for a receiver to receive
multiple packets simultaneously. This paper argues that such multipacket
reception (MPR) capability can greatly enhance the capacity of future WLANs. In
addition, the paper provides the MAC-layer and PHY-layer designs needed to
achieve the improved capacity. First, to demonstrate MPR as a powerful
capacity-enhancement technique, we prove a "super-linearity" result, which
states that the system throughput per unit cost increases as the MPR capability
increases. Second, we show that the commonly deployed binary exponential
backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR
system, and that the optimal backoff factor increases with the MPR capability,
the number of packets that can be received simultaneously. Third, based on the
above insights, we design a joint MAC-PHY layer protocol for an IEEE
802.11-like WLAN that incorporates advanced PHY-layer signal processing
techniques to implement MPR.
|
[
{
"version": "v1",
"created": "Wed, 23 Jun 2010 02:39:44 GMT"
}
] | 2010-06-24T00:00:00 |
[
[
"Jun",
"Ying",
"",
"Angela"
],
[
"Zhang",
"",
""
],
[
"Zheng",
"Pengxuan",
""
],
[
"Liew",
"Soung Chang",
""
]
] |
new_dataset
| 0.99574 |
1006.4545
|
William Jackson
|
Jeherul Islam and P. K. Singh
|
CORMEN: Coding-Aware Opportunistic Routing in Wireless Mess Network
|
IEEE Publication Format,
https://sites.google.com/site/journalofcomputing/
|
Journal of Computing, Vol. 2, No. 6, June 2010, NY, USA, ISSN
2151-9617
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
These Network Coding improves the network operation beyond the traditional
routing or store-and-forward, by mixing of data stream within a network.
Network coding techniques explicitly minimizes the total no of transmission in
wireless network. The Coding-aware routing maximizes the coding opportunity by
finding the coding possible path for every packet in the network. Here we
propose CORMEN: a new coding-aware routing mechanism based on opportunistic
routing. In CORMEN, every node independently can take the decision whether to
code packets or not and forwarding of packets is based on the coding
opportunity available.
|
[
{
"version": "v1",
"created": "Wed, 23 Jun 2010 15:03:44 GMT"
}
] | 2010-06-24T00:00:00 |
[
[
"Islam",
"Jeherul",
""
],
[
"Singh",
"P. K.",
""
]
] |
new_dataset
| 0.998102 |
1006.4326
|
Hasan Guclu
|
Evsen Yanmaz and Hasan Guclu
|
Stationary and Mobile Target Detection using Mobile Wireless Sensor
Networks
|
7 pages, 12 figures, appeared in INFOCOM 2010
|
Proc. INFOCOM IEEE Conference on Computer Communications 2010, p.
1
|
10.1109/INFCOMW.2010.5466620
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we study the target detection and tracking problem in mobile
sensor networks, where the performance metrics of interest are probability of
detection and tracking coverage, when the target can be stationary or mobile
and its duration is finite. We propose a physical coverage-based mobility
model, where the mobile sensor nodes move such that the overlap between the
covered areas by different mobile nodes is small. It is shown that for
stationary target scenario the proposed mobility model can achieve a desired
detection probability with a significantly lower number of mobile nodes
especially when the detection requirements are highly stringent. Similarly,
when the target is mobile the coverage-based mobility model produces a
consistently higher detection probability compared to other models under
investigation.
|
[
{
"version": "v1",
"created": "Tue, 22 Jun 2010 16:37:01 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Yanmaz",
"Evsen",
""
],
[
"Guclu",
"Hasan",
""
]
] |
new_dataset
| 0.953494 |
1006.4357
|
Nitish Korula
|
Chandra Chekuri and Alina Ene and Nitish Korula
|
Prize-Collecting Steiner Tree and Forest in Planar Graphs
|
24 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We obtain polynomial-time approximation-preserving reductions (up to a factor
of 1 + \epsilon) from the prize-collecting Steiner tree and prize-collecting
Steiner forest problems in planar graphs to the corresponding problems in
graphs of bounded treewidth. We also give an exact algorithm for the
prize-collecting Steiner tree problem that runs in polynomial time for graphs
of bounded treewidth. This, combined with our reductions, yields a PTAS for the
prize-collecting Steiner tree problem in planar graphs and generalizes the PTAS
of Borradaile, Klein and Mathieu for the Steiner tree problem in planar graphs.
Our results build upon the ideas of Borradaile, Klein and Mathieu and the work
of Bateni, Hajiaghayi and Marx on a PTAS for the Steiner forest problem in
planar graphs. Our main technical result is on the properties of primal-dual
algorithms for Steiner tree and forest problems in general graphs when they are
run with scaled up penalties.
|
[
{
"version": "v1",
"created": "Tue, 22 Jun 2010 19:53:58 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Chekuri",
"Chandra",
""
],
[
"Ene",
"Alina",
""
],
[
"Korula",
"Nitish",
""
]
] |
new_dataset
| 0.992319 |
cs/0509035
|
Shujun Li Dr.
|
Shujun Li, Guanrong Chen, Albert Cheung and Kwok-Tung Lo
|
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman
Tables
|
8 pages, 4 figures
|
Advances in Image and Video Technology - Third Pacific Rim
Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings,
Lecture Notes in Computer Science, vol. 5414, pp. 898-909, 2009
|
10.1007/978-3-540-92957-4_78
| null |
cs.MM cs.CR
| null |
This paper studies the security of a recently-proposed MPEG-video encryption
scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key
space of the encryption scheme is not sufficiently large against
divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible
to decrypt a cipher-video with a partially-known key, thus dramatically
reducing the complexity of the DAC brute-force attack in some cases; 3) its
security against the chosen-plaintext attack is very weak. Some experimental
results are included to support the cryptanalytic results with a brief discuss
on how to improve this MPEG-video encryption scheme.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2005 10:44:31 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Oct 2007 15:45:10 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Cheung",
"Albert",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
new_dataset
| 0.988255 |
0904.1923
|
Vincent Limouzy
|
Vincent Limouzy
|
Seidel Minor, Permutation Graphs and Combinatorial Properties
|
submitted
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A permutation graph is an intersection graph of segments lying between two
parallel lines. A Seidel complementation of a finite graph at one of it vertex
$v$ consists to complement the edges between the neighborhood and the
non-neighborhood of $v$. Two graphs are Seidel complement equivalent if one can
be obtained from the other by a successive application of Seidel
complementation.
In this paper we introduce the new concept of Seidel complementation and
Seidel minor, we then show that this operation preserves cographs and the
structure of modular decomposition. The main contribution of this paper is to
provide a new and succinct characterization of permutation graphs i.e. A graph
is a permutation graph \Iff it does not contain the following graphs: $C_5$,
$C_7$, $XF_{6}^{2}$, $XF_{5}^{2n+3}$, $C_{2n}, n\geqslant6$ and their
complement as Seidel minor. In addition we provide a $O(n+m)$-time algorithm to
output one of the forbidden Seidel minor if the graph is not a permutation
graph.
|
[
{
"version": "v1",
"created": "Mon, 13 Apr 2009 07:23:18 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 2010 15:18:06 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Limouzy",
"Vincent",
""
]
] |
new_dataset
| 0.999707 |
0906.4618
|
Pedro Peris-Lopez
|
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis,
Aikaterini Mitrokotsa, Juan M. E. Tapiador
|
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud
Attacks
|
31 pages, 10 figures, 1 table
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The vast majority of RFID authentication protocols assume the proximity
between readers and tags due to the limited range of the radio channel.
However, in real scenarios an intruder can be located between the prover (tag)
and the verifier (reader) and trick this last one into thinking that the prover
is in close proximity. This attack is generally known as a relay attack in
which scope distance fraud, mafia fraud and terrorist attacks are included.
Distance bounding protocols represent a promising countermeasure to hinder
relay attacks. Several protocols have been proposed during the last years but
vulnerabilities of major or minor relevance have been identified in most of
them. In 2008, Kim et al. [1] proposed a new distance bounding protocol with
the objective of being the best in terms of security, privacy, tag
computational overhead and fault tolerance. In this paper, we analyze this
protocol and we present a passive full disclosure attack, which allows an
adversary to discover the long-term secret key of the tag. The presented attack
is very relevant, since no security objectives are met in Kim et al.'s
protocol. Then, design guidelines are introduced with the aim of facilitating
protocol designers the stimulating task of designing secure and efficient
schemes against relay attacks. Finally a new protocol, named Hitomi and
inspired by [1], is designed conforming the guidelines proposed previously.
|
[
{
"version": "v1",
"created": "Thu, 25 Jun 2009 07:12:26 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Jun 2010 19:35:19 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Peris-Lopez",
"Pedro",
""
],
[
"Hernandez-Castro",
"Julio C.",
""
],
[
"Dimitrakakis",
"Christos",
""
],
[
"Mitrokotsa",
"Aikaterini",
""
],
[
"Tapiador",
"Juan M. E.",
""
]
] |
new_dataset
| 0.952649 |
1006.3039
|
Martin Sulzmann
|
Edmund S. L. Lam and Martin Sulzmann
|
Concurrent Goal-Based Execution of Constraint Handling Rules
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(To appear in Theory and Practice of Logic Programming (TPLP)) We introduce a
systematic, concurrent execution scheme for Constraint Handling Rules (CHR)
based on a previously proposed sequential goal-based CHR semantics. We
establish strong correspondence results to the abstract CHR semantics, thus
guaranteeing that any answer in the concurrent, goal-based CHR semantics is
reproducible in the abstract CHR semantics. Our work provides the foundation to
obtain efficient, parallel CHR execution schemes.
|
[
{
"version": "v1",
"created": "Tue, 15 Jun 2010 17:44:15 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Jun 2010 19:23:06 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Lam",
"Edmund S. L.",
""
],
[
"Sulzmann",
"Martin",
""
]
] |
new_dataset
| 0.969036 |
1006.4030
|
Bin Wu
|
Bin Wu, Guido Masera
|
A Novel VLSI Architecture of Fixed-complexity Sphere Decoder
|
8 pages, this paper has been accepted by the conference DSD 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fixed-complexity Sphere Decoder (FSD) is a recently proposed technique for
Multiple-Input Multiple-Output (MIMO) detection. It has several outstanding
features such as constant throughput and large potential parallelism, which
makes it suitable for efficient VLSI implementation. However, to our best
knowledge, no VLSI implementation of FSD has been reported in the literature,
although some FPGA prototypes of FSD with pipeline architecture have been
developed. These solutions achieve very high throughput but at very high cost
of hardware resources, making them impractical in real applications. In this
paper, we present a novel four-nodes-per-cycle parallel architecture of FSD,
with a breadth-first processing that allows for short critical path. The
implementation achieves a throughput of 213.3 Mbps at 400 MHz clock frequency,
at a cost of 0.18 mm2 Silicon area on 0.13{\mu}m CMOS technology. The proposed
solution is much more economical compared with the existing FPGA
implementations, and very suitable for practicl applications because of its
balanced performance and hardware-complexity; moreover it has the flexibility
to be expanded into an eight-nodes-per-cycle version in order to double the
throughput.
|
[
{
"version": "v1",
"created": "Mon, 21 Jun 2010 10:55:56 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Wu",
"Bin",
""
],
[
"Masera",
"Guido",
""
]
] |
new_dataset
| 0.998554 |
1006.3688
|
Stefan Frenzel
|
Stefan Frenzel and Elke Neubert
|
Is the P300 Speller Independent?
|
7 pages, 5 figures
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The P300 speller is being considered as an independent brain-computer
interface. That means it measures the user's intent, and does not require the
user to move any muscles. In particular it should not require eye fixation of
the desired character. However, it has been shown that posterior electrodes
provide significant discriminative information, which is likely related to
visual processing. These findings imply the need for studies controlling the
effect of eye movements. In experiments with a 3x3 character matrix, attention
and eye fixation was directed to different characters. In the event-related
potentials, a P300 occurred for the attended character, and N200 was seen for
the trials showing the focussed character. It occurred at posterior sites,
reaching its peak at 200ms after stimulus onset. The results suggest that gaze
direction plays an important role in P300 speller paradigm. By controlling gaze
direction it is possible to separate voluntary and involuntary EEG responses to
the highlighting of characters.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 18:06:10 GMT"
}
] | 2010-06-21T00:00:00 |
[
[
"Frenzel",
"Stefan",
""
],
[
"Neubert",
"Elke",
""
]
] |
new_dataset
| 0.993854 |
1006.3465
|
Graham Kirby
|
Alan Dearle, Graham Kirby, Stuart Norcross
|
Hosting Byzantine Fault Tolerant Services on a Chord Ring
|
Submitted to DSN 2007 Workshop on Architecting Dependable Systems
| null | null |
University of St Andrews CS/07/1
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we demonstrate how stateful Byzantine Fault Tolerant services
may be hosted on a Chord ring. The strategy presented is fourfold: firstly a
replication scheme that dissociates the maintenance of replicated service state
from ring recovery is developed. Secondly, clients of the ring based services
are made replication aware. Thirdly, a consensus protocol is introduced that
supports the serialization of updates. Finally Byzantine fault tolerant
replication protocols are developed that ensure the integrity of service data
hosted on the ring.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 13:40:59 GMT"
}
] | 2010-06-18T00:00:00 |
[
[
"Dearle",
"Alan",
""
],
[
"Kirby",
"Graham",
""
],
[
"Norcross",
"Stuart",
""
]
] |
new_dataset
| 0.998264 |
1006.3481
|
Graham Kirby
|
Graham Kirby
|
Reflection and Hyper-Programming in Persistent Programming Systems
|
PhD Thesis, University of St Andrews. Supervisor: R. Morrison. (1992)
| null | null | null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The work presented in this thesis seeks to improve programmer productivity in
the following ways:
- by reducing the amount of code that has to be written to construct an
application;
- by increasing the reliability of the code written; and
- by improving the programmer's understanding of the persistent environment
in which applications are constructed. Two programming techniques that may be
used to pursue these goals in a persistent environment are type-safe linguistic
reflection and hyper-programming. The first provides a mechanism by which the
programmer can write generators that, when executed, produce new program
representations. This allows the specification of programs that are highly
generic yet depend in non-trivial ways on the types of the data on which they
operate. Genericity promotes software reuse which in turn reduces the amount of
new code that has to be written. Hyper-programming allows a source program to
contain links to data items in the persistent store. This improves program
reliability by allowing certain program checking to be performed earlier than
is otherwise possible. It also reduces the amount of code written by permitting
direct links to data in the place of textual descriptions. Both techniques
contribute to the understanding of the persistent environment through
supporting the implementation of store browsing tools and allowing source
representations to be associated with all executable programs in the persistent
store. This thesis describes in detail the structure of type-safe linguistic
reflection and hyper-programming, their benefits in the persistent context, and
a suite of programming tools that support reflective programming and
hyper-programming. These tools may be used in conjunction to allow reflection
over hyper-program representations. The implementation of the tools is
described.
|
[
{
"version": "v1",
"created": "Thu, 17 Jun 2010 14:37:51 GMT"
}
] | 2010-06-18T00:00:00 |
[
[
"Kirby",
"Graham",
""
]
] |
new_dataset
| 0.999076 |
1001.0716
|
Kamyar Moshksar
|
Kamyar Moshksar, Amir K. Khandani
|
Totally Asynchronous Interference Channels
|
This paper is withdrawn due to some technicality regarding
ergodicity. The corrected version will be submitted under the title
"Randomized On-Off signaling in Asynchronous Wireless Networks"
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses an interference channel consisting of $\mathbf{n}$
active users sharing $u$ frequency sub-bands. Users are asynchronous meaning
there exists a mutual delay between their transmitted codes. A stationary model
for interference is considered by assuming the starting point of an
interferer's data is uniformly distributed along the codeword of any user. The
spectrum is divided to private and common bands each containing
$v_{\mathrm{p}}$ and $v_{\mathrm{c}}$ frequency sub-bands respectively. We
consider a scenario where all transmitters are unaware of the number of active
users and the channel gains. The optimum $v_{\mathrm{p}}$ and $v_{\mathrm{c}}$
are obtained such that the so-called outage capacity per user is maximized. If
$\Pr\{\mathbf{n}\leq 2\}=1$, upper and lower bounds on the mutual information
between the input and output of the channel for each user are derived using a
genie-aided technique. The proposed bounds meet each other as the code length
grows to infinity yielding a closed expression for the achievable rates. If
$\Pr\{\mathbf{n}>2\}>0$, all users follow a locally Randomized On-Off signaling
scheme on the common band where each transmitter quits transmitting its
Gaussian signals independently from transmission to transmission. Using a
conditional version of Entropy Power Inequality (EPI) and an upper bound on the
differential entropy of a mixed Gaussian random variable, lower bounds on the
achievable rates of users are developed. Thereafter, the activation probability
on each transmission slot is designed resulting in the largest outage capacity.
|
[
{
"version": "v1",
"created": "Tue, 5 Jan 2010 14:56:00 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Jun 2010 02:09:17 GMT"
}
] | 2010-06-17T00:00:00 |
[
[
"Moshksar",
"Kamyar",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
new_dataset
| 0.996002 |
1006.3112
|
Alexander Kholosha
|
Tor Helleseth and Alexander Kholosha
|
Sequences, Bent Functions and Jacobsthal sums
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The $p$-ary function $f(x)$ mapping $\mathrm{GF}(p^{4k})$ to $\mathrm{GF}(p)$
and given by $f(x)={\rm Tr}_{4k}\big(ax^d+bx^2\big)$ with
$a,b\in\mathrm{GF}(p^{4k})$ and $d=p^{3k}+p^{2k}-p^k+1$ is studied with the
respect to its exponential sum. In the case when either $a^{p^k(p^k+1)}\neq
b^{p^k+1}$ or $a^2=b^d$ with $b\neq 0$, this sum is shown to be three-valued
and the values are determined. For the remaining cases, the value of the
exponential sum is expressed using Jacobsthal sums of order $p^k+1$. Finding
the values and the distribution of those sums is a long-lasting open problem.
|
[
{
"version": "v1",
"created": "Wed, 16 Jun 2010 00:14:22 GMT"
}
] | 2010-06-17T00:00:00 |
[
[
"Helleseth",
"Tor",
""
],
[
"Kholosha",
"Alexander",
""
]
] |
new_dataset
| 0.973403 |
1006.3180
|
Graham Kirby
|
Angus Macdonald, Alan Dearle, Graham Kirby
|
H2O: An Autonomic, Resource-Aware Distributed Database System
|
Presented at SICSA PhD Conference 2010 (http://www.sicsaconf.org/)
| null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the design of an autonomic, resource-aware distributed
database which enables data to be backed up and shared without complex manual
administration. The database, H2O, is designed to make use of unused resources
on workstation machines. Creating and maintaining highly-available, replicated
database systems can be difficult for untrained users, and costly for IT
departments. H2O reduces the need for manual administration by autonomically
replicating data and load-balancing across machines in an enterprise.
Provisioning hardware to run a database system can be unnecessarily costly as
most organizations already possess large quantities of idle resources in
workstation machines. H2O is designed to utilize this unused capacity by using
resource availability information to place data and plan queries over
workstation machines that are already being used for other tasks. This paper
discusses the requirements for such a system and presents the design and
implementation of H2O.
|
[
{
"version": "v1",
"created": "Wed, 16 Jun 2010 10:46:04 GMT"
}
] | 2010-06-17T00:00:00 |
[
[
"Macdonald",
"Angus",
""
],
[
"Dearle",
"Alan",
""
],
[
"Kirby",
"Graham",
""
]
] |
new_dataset
| 0.973495 |
1006.3259
|
Serguei Mokhov
|
Serguei A. Mokhov
|
Contents of COMP5541 Winter 2010 Final UUIS SRS and SDD Reports
|
an index
| null | null | null |
cs.SE
|
http://creativecommons.org/licenses/by/3.0/
|
This index covers the final course project reports for COMP5541 Winter 2010
at Concordia University, Montreal, Canada, Tools and Techniques for Software
Engineering by 4 teams trying to capture the requirements, provide the design
specification, configuration management, testing and quality assurance of their
partial implementation of the Unified University Inventory System (UUIS) of an
Imaginary University of Arctica (IUfA). Their results are posted here for
comparative studies and analysis.
|
[
{
"version": "v1",
"created": "Wed, 16 Jun 2010 16:12:30 GMT"
}
] | 2010-06-17T00:00:00 |
[
[
"Mokhov",
"Serguei A.",
""
]
] |
new_dataset
| 0.9814 |
1006.2977
|
Christine Kelley
|
Christine A. Kelley and Joerg Kliewer
|
Algebraic Constructions of Graph-Based Nested Codes from Protographs
|
5 pages, 2 figures, To appear in 2010 IEEE International Symposium on
Information Theory, Austin, TX, USA
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nested codes have been employed in a large number of communication
applications as a specific case of superposition codes, for example to
implement binning schemes in the presence of noise, in joint network-channel
coding, or in physical-layer secrecy. Whereas nested lattice codes have been
proposed recently for continuous-input channels, in this paper we focus on the
construction of nested linear codes for joint channel-network coding problems
based on algebraic protograph LDPC codes. In particular, over the past few
years several constructions of codes have been proposed that are based on
random lifts of suitably chosen base graphs. More recently, an algebraic analog
of this approach was introduced using the theory of voltage graphs. In this
paper we illustrate how these methods can be used in the construction of nested
codes from algebraic lifts of graphs.
|
[
{
"version": "v1",
"created": "Tue, 15 Jun 2010 13:03:31 GMT"
}
] | 2010-06-16T00:00:00 |
[
[
"Kelley",
"Christine A.",
""
],
[
"Kliewer",
"Joerg",
""
]
] |
new_dataset
| 0.994066 |
1006.2691
|
Eswar Karthikeyan
|
S. Ganesh, R. Amutha
|
Real Time and Energy Efficient Transport Protocol for Wireless Sensor
Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reliable transport protocols such as TCP are tuned to perform well in
traditional networks where packet losses occur mostly because of congestion.
Many applications of wireless sensor networks are useful only when connected to
an external network. Previous research on transport layer protocols for sensor
networks has focused on designing protocols specifically targeted for sensor
networks. The deployment of TCP/IP in sensor networks would, however, enable
direct connection between the sensor network and external TCP/IP networks. In
this paper we focus on the performance of TCP in the context of wireless sensor
networks. TCP is known to exhibit poor performance in wireless environments,
both in terms of throughput and energy efficiency. To overcome these problems
we introduce a mechanism called TCP Segment Caching .We show by simulation that
TCP Segment Caching significantly improves TCP Performance so that TCP can be
useful e en in wireless sensor
|
[
{
"version": "v1",
"created": "Mon, 14 Jun 2010 12:26:02 GMT"
}
] | 2010-06-15T00:00:00 |
[
[
"Ganesh",
"S.",
""
],
[
"Amutha",
"R.",
""
]
] |
new_dataset
| 0.998245 |
1006.2702
|
Eswar Karthikeyan
|
R. Sridaran, G. Padmavathi, K. Iyakutti, M.N.S. Mani
|
SPIM Architecture for MVC based Web Applications
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Model / View / Controller design pattern divides an application
environment into three components to handle the user-interactions, computations
and output respectively. This separation greatly favors architectural
reusability. The pattern works well in the case of single-address space and not
proven to be efficient for web applications involving multiple address spaces.
Web applications force the designers to decide which of the components of the
pattern are to be partitioned between the server and client(s) before the
design phase commences. For any rapidly growing web application, it is very
difficult to incorporate future changes in policies related to partitioning.
One solution to this problem is to duplicate the Model and controller
components at both server and client(s). However, this may add further problems
like delayed data fetch, security and scalability issues. In order to overcome
this, a new architecture SPIM has been proposed that deals with the
partitioning problem in an alternative way. SPIM shows tremendous improvements
in performance when compared with a similar architecture.
|
[
{
"version": "v1",
"created": "Mon, 14 Jun 2010 12:53:19 GMT"
}
] | 2010-06-15T00:00:00 |
[
[
"Sridaran",
"R.",
""
],
[
"Padmavathi",
"G.",
""
],
[
"Iyakutti",
"K.",
""
],
[
"Mani",
"M. N. S.",
""
]
] |
new_dataset
| 0.996785 |
1006.2798
|
Jenny Blight
|
Mohd Norzali Haji Mohd, Mohd Helmy Bin Abd Wahab, Siti Khairulnisa
Ariffin
|
Motion Detection Notification System by Short Messaging Service Using
Network Camera and Global System for Mobile Modem
|
Submitted to Journal of Computer Science and Engineering, see
http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010
|
Journal of Computer Science and Engineering, Volume 1, Issue 1,
p18-26, May 2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the technology rapidly grows, the trend is clear that the use of mobile
devices is gain an attention nowadays, thus designing a system by integrating
it with notification feature is becoming an important aspect especially in
tracking and monitoring system. Conventional security surveillance systems
require the constant attention from the user, to monitor the location
concurrently. In order to reduce the cost of computing power and advance
technology of mobile phone in widespread acceptance of the Internet as a viable
communication medium, this paper is aimed to design a low cost web-based system
as a platform to view the image captured. When the network camera detects any
movement from the intruders, it automatically captures the image and sends it
to the database of the web-based directly by the network through File Transfer
Protocol (FTP). The camera is attached through an Ethernet connection and power
source. Therefore, the camera can be viewed from either standard Web browser or
cell phone. Nowadays, when a security camera is installed, user is notified as
long as the camera is switched on since any slight movement requires the
attention of the supervisor. The utility of the system has proven
theoretically. This system will also notify the user by sending a notification
through Short Messages Services (SMS).
|
[
{
"version": "v1",
"created": "Mon, 14 Jun 2010 18:47:45 GMT"
}
] | 2010-06-15T00:00:00 |
[
[
"Mohd",
"Mohd Norzali Haji",
""
],
[
"Wahab",
"Mohd Helmy Bin Abd",
""
],
[
"Ariffin",
"Siti Khairulnisa",
""
]
] |
new_dataset
| 0.997525 |
1006.2809
|
Jenny Blight
|
A.A Zaidan, B.B Zaidan, Hamid.A.Jalab, Hamdan.O.Alanazi and Rami
Alnaqeib
|
Offline Arabic Handwriting Recognition Using Artificial Neural Network
|
Submitted to Journal of Computer Science and Engineering, see
http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010
|
Journal of Computer Science and Engineering, Volume 1, Issue 1,
p55-58, May 2010
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ambition of a character recognition system is to transform a text
document typed on paper into a digital format that can be manipulated by word
processor software Unlike other languages, Arabic has unique features, while
other language doesn't have, from this language these are seven or eight
language such as ordo, jewie and Persian writing, Arabic has twenty eight
letters, each of which can be linked in three different ways or separated
depending on the case. The difficulty of the Arabic handwriting recognition is
that, the accuracy of the character recognition which affects on the accuracy
of the word recognition, in additional there is also two or three from for each
character, the suggested solution by using artificial neural network can solve
the problem and overcome the difficulty of Arabic handwriting recognition.
|
[
{
"version": "v1",
"created": "Mon, 14 Jun 2010 19:20:31 GMT"
}
] | 2010-06-15T00:00:00 |
[
[
"Zaidan",
"A. A",
""
],
[
"Zaidan",
"B. B",
""
],
[
"Jalab",
"Hamid. A.",
""
],
[
"Alanazi",
"Hamdan. O.",
""
],
[
"Alnaqeib",
"Rami",
""
]
] |
new_dataset
| 0.987956 |
1006.2811
|
Jenny Blight
|
Ashish Raman, Anvesh Kumar and R.K.Sarin
|
High Speed Reconfigurable FFT Design by Vedic Mathematics
|
Submitted to Journal of Computer Science and Engineering, see
http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010
|
Journal of Computer Science and Engineering, Volume 1, Issue 1,
p59-63, May 2010
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Fast Fourier Transform (FFT) is a computationally intensive digital
signal processing (DSP) function widely used in applications such as imaging,
software-defined radio, wireless communication, instrumentation. In this paper,
a reconfigurable FFT design using Vedic multiplier with high speed and small
area is presented. Urdhava Triyakbhyam algorithm of ancient Indian Vedic
Mathematics is utilized to improve its efficiency. In the proposed
architecture, the 4x4 bit multiplication operation is fragmented reconfigurable
FFT modules. The 4x4 multiplication modules are implemented using small 2x2bit
multipliers. Reconfigurability at run time is provided for attaining power
saving. The reconfigurable FFT has been designed, optimized and implemented on
an FPGA based system. This reconfigurable FFT is having the high speed and
small area as compared to the conventional FFT.
|
[
{
"version": "v1",
"created": "Mon, 14 Jun 2010 19:28:47 GMT"
}
] | 2010-06-15T00:00:00 |
[
[
"Raman",
"Ashish",
""
],
[
"Kumar",
"Anvesh",
""
],
[
"Sarin",
"R. K.",
""
]
] |
new_dataset
| 0.999324 |
1006.1956
|
Rajan Arora
|
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal and Sugata
Sanyal
|
A Semi-distributed Reputation Based Intrusion Detection System for
Mobile Adhoc Networks
|
Adhoc Networking, Security, Promiscuous Mode, Reputation Based
Intrusion Detection System
|
Trivedi et al., "A Semi-distributed Reputation Based Intrusion
Detection System for Mobile Adhoc Networks". Journal of Information Assurance
and Security (JIAS), Volume 1, Issue 4, December 2006, pp. 265-274
| null | null |
cs.NI cs.MA
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
A Mobile Adhoc Network (MANET) is a cooperative engagement of a collection of
mobile nodes without any centralized access point or infrastructure to
coordinate among the peers. The underlying concept of coordination among nodes
in a cooperative MANET has induced in them a vulnerability to attacks due to
issues like lack of fixed infrastructure, dynamically changing network
topology, cooperative algorithms, lack of centralized monitoring and management
point, and lack of a clear line of defense. We propose a semi-distributed
approach towards Reputation Based Intrusion Detection System (IDS) that
combines with the DSR routing protocol for strengthening the defense of a
MANET. Our system inherits the features of reputation from human behavior,
hence making the IDS socially inspired. It has a semi-distributed architecture
as the critical observation results of the system are neither spread globally
nor restricted locally. The system assigns maximum weightage to self
observation by nodes for updating any reputation values, thus avoiding the need
of a trust relationship between nodes. Our system is also unique in the sense
that it features the concepts of Redemption and Fading with a robust Path
Manager and Monitor system. Simulation studies show that DSR fortified with our
system outperforms normal DSR in terms of the packet delivery ratio and routing
overhead even when up to half of nodes in the network behave as malicious.
Various parameters introduced such as timing window size, reputation update
values, congestion parameter and other thresholds have been optimized over
several simulation test runs of the system. By combining the semi-distributed
architecture and other design essentials like path manager, monitor module,
redemption and fading concepts; Our system proves to be robust enough to
counter most common attacks in MANETs.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 06:03:44 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jun 2010 08:37:54 GMT"
}
] | 2010-06-14T00:00:00 |
[
[
"Trivedi",
"Animesh Kr",
""
],
[
"Arora",
"Rajan",
""
],
[
"Kapoor",
"Rishi",
""
],
[
"Sanyal",
"Sudip",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.998027 |
1006.2356
|
Carlos Sarraute
|
Diego Bendersky (1 and 2), Ariel Futoransky (1), Luciano
Notarfrancesco (1), Carlos Sarraute (1 and 3), Ariel Waissbein (1 and 3) ((1)
Corelabs, Core Security Technologies, (2) Departamento de Computacion, FCEyN,
Universidad de Buenos Aires, (3) Departamento de Matematica, FCEyN,
Universidad de Buenos Aires)
|
Advanced Software Protection Now
|
20 pages. CoreLabs Technical Report
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Software digital rights management is a pressing need for the software
development industry which remains, as no practical solutions have been
acclamaimed succesful by the industry. We introduce a novel software-protection
method, fully implemented with today's technologies, that provides traitor
tracing and license enforcement and requires no additional hardware nor
inter-connectivity.
Our work benefits from the use of secure triggers, a cryptographic primitive
that is secure assuming the existence of an ind-cpa secure block cipher. Using
our framework, developers may insert license checks and fingerprints, and
obfuscate the code using secure triggers. As a result, this rises the cost that
software analysis tools have detect and modify protection mechanisms. Thus
rising the complexity of cracking this system.
|
[
{
"version": "v1",
"created": "Fri, 11 Jun 2010 17:57:20 GMT"
}
] | 2010-06-14T00:00:00 |
[
[
"Bendersky",
"Diego",
"",
"1 and 2"
],
[
"Futoransky",
"Ariel",
"",
"1 and 3"
],
[
"Notarfrancesco",
"Luciano",
"",
"1 and 3"
],
[
"Sarraute",
"Carlos",
"",
"1 and 3"
],
[
"Waissbein",
"Ariel",
"",
"1 and 3"
]
] |
new_dataset
| 0.954593 |
1006.1704
|
Harco Leslie Hendric Spits Warnars
|
H.L.H Spits Warnars
|
Sistem Pengambilan Keputusan Penanganan Bencana Alam Gempa Bumi Di
Indonesia
|
14 pages
|
Olympic Innovative Paper International Conference (Proceeding
Olimpiade Karya Tulis Inovatif ,OKTI), L'association des Etudiants
Indonesiens en France, Paris, France, 10-11 Oct 2009
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
After Aceh's quake many earthquakes have struck Indonesia alternately and
even other disasters have been a threat for every citizen in this country.
Actually an everyday occurrence on earth and more than 3 million earthquakes
occur every year, about 8,000 a day, or one every 11 seconds in Indonesia there
are 5 to 30 quakes prediction everyday. Government's responsibility to protect
the citizen has been done by making National body of disaster management.
Preparing, saving and distribution logistic become National body of disaster
management's responsibility to build information management. Many law's
products have been produced as a government's responsibility to give secure
life for the citizen. We can not prevent them totally, we have to learn to live
with them and need to be prepared all the time, need to learn how to mitigate
risk of losses in such events by managing crisis and emergencies correctly.
After disaster happens respond must be rapidly and at an optimal level to save
lives and help to victims. DSS is information technology environment which can
be used to help human in order to learn from past earthquake, record it, learn
and plan for future mitigation and hope will reduce the disaster risk in the
future. Using web technology for DSS will give value added where not only make
a strategic decision for the decision maker, but for others who need national
earthquake information like citizen, scholars, researches and people around the
world.
|
[
{
"version": "v1",
"created": "Wed, 9 Jun 2010 04:46:25 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Jun 2010 02:41:05 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"Warnars",
"H. L. H Spits",
""
]
] |
new_dataset
| 0.99962 |
1006.1993
|
Krzysztof Moskwa
|
Krzysztof Moskwa, Piotr Rossa
|
Rozw\'oj bibliotek cyfrowych i repozytori\'ow elektronicznych na Dolnym
Slasku w latach 2004-2008 / Development of Digital Libraries and Electronic
Repositories in Lower Silesia in Years 2004-2008
|
12 pages in Polish, 4 tables; Komputerowe wspomaganie bada\'n
naukowych XVI / The Computer-Aided Scientific Research XVI
|
Komputerowe wspomaganie badan naukowych XVI = The Computer-Aided
Scientific Research XVI / red. Jan Zarzycki. Wroclaw, 2009. pp. 15-26, 4
tab., Summ. (Prace Wroclawskiego Towarzystwa Naukowego., ISSN 0084-3024; nr
215)
| null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In following elaboration were presented digital libraries and electronic
repositories operating in Lower Silesia region (of Poland) in years 2004-2008.
General description of character and size of their collections was presented,
as well as standards and methods of digital collections management and
juridical aspects of this management. Potential of usage of digital collections
in regional scientific researches was described.
-----
W referacie przedstawiono biblioteki cyfrowe i repozytoria elektroniczne
funkcjonujace na Dolnym Slasku w latach 2004-2008. Scharakteryzowano og\'olnie
ich zawarto\'s\'c i wielko\'s\'c, zaprezentowano standardy i systemy
zarzadzania kolekcjami cyfrowymi oraz om\'owiono uwarunkowania prawne
towarzyszace zarzadzaniu zasobami cyfrowymi. Wskazano mo\.zliwo\'sci
wykorzystania kolekcji cyfrowych w badaniach naukowych realizowanych w
regionie.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 10:25:52 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"Moskwa",
"Krzysztof",
""
],
[
"Rossa",
"Piotr",
""
]
] |
new_dataset
| 0.993101 |
1006.2022
|
Haim Permuter Henry
|
Haim Permuter, Shlomo (Shitz) Shamai, and Anelia Somekh-Baruch
|
Message and state cooperation in multiple access channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the capacity of a multiple access channel with cooperating
encoders where partial state information is known to each encoder and full
state information is known to the decoder. The cooperation between the encoders
has a two-fold purpose: to generate empirical state coordination between the
encoders, and to share information about the private messages that each encoder
has. For two-way cooperation, this two-fold purpose is achieved by
double-binning, where the first layer of binning is used to generate the state
coordination similarly to the two-way source coding, and the second layer of
binning is used to transmit information about the private messages. The
complete result provides the framework and perspective for addressing a complex
level of cooperation that mixes states and messages in an optimal way.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 13:15:44 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"Permuter",
"Haim",
"",
"Shitz"
],
[
"Shlomo",
"",
"",
"Shitz"
],
[
"Shamai",
"",
""
],
[
"Somekh-Baruch",
"Anelia",
""
]
] |
new_dataset
| 0.990169 |
1006.2085
|
Harco Leslie Hendric Spits Warnars
|
Fedro Antonius Pardede, H.L.H Spits Warnars
|
Pemanfaatan Teknologi Sistem Informasi Geografis Untuk Menunjang
Pembangunan Daerah
|
6 pages
|
National seminar University of Budi Luhur 2009, University of Budi
Luhur, Jakarta, 14-15 August 2009
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The territory development will depend on that territory itself, where the
word of autonomy for each province or territory will give contribution how
Indonesian will responsible for development their territory. In order to
develop territory, the information technology can be used as a boost or tools
to give and deliver the best information and Geographic Information System is
one of the information technology tools which can be used to push every each
territory to speed the territory development. As a tool Geographic Information
System has an ability to save, process, analysis and deliver information right
in time and help the decision maker to make better decision.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 17:08:36 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"Pardede",
"Fedro Antonius",
""
],
[
"Warnars",
"H. L. H Spits",
""
]
] |
new_dataset
| 0.999252 |
1006.2104
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars H.L.H
|
Perbandingan Shell Unix
|
21 Pages
|
Widya, Vol 21,No. 230, pp. 9-15, November 2004
| null | null |
cs.OS
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Is it possible for an Information Technology [IT] product to be both mature
and state-of-theart at the same time? In the case of the UNIX system, the
answer is an unqualified "Yes." The UNIX system has continued to develop over
the past twenty-five years. In millions of installations running on nearly
every hardware platform made, the UNIX system has earned its reputation for
stability and scalability. Over the years, UNIX system suppliers have steadily
assimilated new technologies so that UNIX systems today provide more
functionality as any other operating system.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 18:13:36 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"H",
"Spits Warnars H. L.",
""
]
] |
new_dataset
| 0.985139 |
1006.2107
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars H.L.H
|
Pembobolan website KPU (Komisi Pemilihan Umum) Apakah melanggar UU RI
no.36 tahun 1999 tentang telekomunikasi ?
|
7 pages
|
Journal Budi Luhur Information Technology (BIT), Vol.2, No.1 April
2005
| null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Information Technology KPU (Indonesia Electoral Commision) is a project in
supporting democratization process in Indonesia. It is a part of General
Election program of KPU-Indonesian Government. The aim of IT KPU is to build
the transparency of the ballot result to the public (citizen and international
world) and as the embrio of e government in Indonesia. It also has the aim for
influence the citizen with Information Technology and the use of computer.
|
[
{
"version": "v1",
"created": "Thu, 10 Jun 2010 18:20:45 GMT"
}
] | 2010-06-11T00:00:00 |
[
[
"H",
"Spits Warnars H. L.",
""
]
] |
new_dataset
| 0.998711 |
1003.2554
|
Maurizio Naldi
|
Loretta Mastroeni and Maurizio Naldi
|
Spectrum Trading: An Abstracted Bibliography
| null | null | null | null |
cs.NI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document contains a bibliographic list of major papers on spectrum
trading and their abstracts. The aim of the list is to offer researchers
entering this field a fast panorama of the current literature. The list is
continually updated on the webpage
\url{http://www.disp.uniroma2.it/users/naldi/Ricspt.html}. Omissions and papers
suggested for inclusion may be pointed out to the authors through e-mail
(\textit{[email protected]}).
|
[
{
"version": "v1",
"created": "Fri, 12 Mar 2010 14:50:25 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jun 2010 14:10:54 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Mastroeni",
"Loretta",
""
],
[
"Naldi",
"Maurizio",
""
]
] |
new_dataset
| 0.992054 |
1006.1663
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars
|
Tata Kelola Database Perguruan Tinggi Yang Optimal Dengan Data Warehouse
|
10 pages, 12 figures and 4 tables
|
TELKOMNIKA Vol. 8, No. 1, April 2010, pp. 25 - 34
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The emergence of new higher education institutions has created the
competition in higher education market, and data warehouse can be used as an
effective technology tools for increasing competitiveness in the higher
education market. Data warehouse produce reliable reports for the institution's
high-level management in short time for faster and better decision making, not
only on increasing the admission number of students, but also on the
possibility to find extraordinary, unconventional funds for the institution.
Efficiency comparison was based on length and amount of processed records,
total processed byte, amount of processed tables, time to run query and
produced record on OLTP database and data warehouse. Efficiency percentages was
measured by the formula for percentage increasing and the average efficiency
percentage of 461.801,04% shows that using data warehouse is more powerful and
efficient rather than using OLTP database. Data warehouse was modeled based on
hypercube which is created by limited high demand reports which usually used by
high level management. In every table of fact and dimension fields will be
inserted which represent the loading constructive merge where the ETL
(Extraction, Transformation and Loading) process is run based on the old and
new files.
|
[
{
"version": "v1",
"created": "Tue, 8 Jun 2010 20:57:02 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Warnars",
"Spits",
""
]
] |
new_dataset
| 0.994469 |
1006.1679
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars
|
Rancangan Infrastruktur E-Bisnis Business Intelligence Pada Perguruan
Tinggi
|
12 pages, 11 figures
|
Telkomnika Vol. 6, No. 2, Agustus 2008 : pp. 115 - 124
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to compete with others, high education need complete their
infrastructure with Information technology support. High level management as a
decision maker need something that can boost the system to compete with other
high education, they need IT knowledge that can support them to view the future
and can help the whole system to improve their services. Business Intelligence
is one of term of Decision Support System which can help the management by
something that they can forecast and decide. High Education need infrastructure
design to make good foundation for business intelligent implementation which
will be implemented on internet or e-business.
|
[
{
"version": "v1",
"created": "Wed, 9 Jun 2010 00:43:41 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Warnars",
"Spits",
""
]
] |
new_dataset
| 0.995639 |
1006.1690
|
Jong-Ho Lee
|
Jong-Ho Lee, Oh-Soon Shin
|
Full-Duplex Relay based on Zero-Forcing Beamforming
|
7 pages, 5 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a full-duplex relay (FDR) based on a zero-forcing
beamforming (ZFBF) for a multiuser MIMO relay system. The ZFBF is employed at
the base station to suppress both the self-interference of the relay and the
multiuser interference at the same time. Numerical results show that the
proposed FDR can enhance the sum rate performance as compared to the
half-duplex relay (HDR), if sufficient isolation between the transmit and
receive antennas is ensured at the relay.
|
[
{
"version": "v1",
"created": "Wed, 9 Jun 2010 02:40:27 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Lee",
"Jong-Ho",
""
],
[
"Shin",
"Oh-Soon",
""
]
] |
new_dataset
| 0.99423 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.