• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 57
Next 10 →

Approved By:

by Michael S. Taber, Dr. Roy Czernikowski , 2008
"... Distributed pre-computation for a cryptanalytic time-memory trade-off ..."
Abstract - Add to MetaCart
Distributed pre-computation for a cryptanalytic time-memory trade-off

Secure Caching with Non-Uniform Demands

by Avik Sengupta , Ravi Tandon , T Charles Clancy
"... Abstract-Caching helps in reducing network load at times of heavy traffic by utilizing content duplication, local file storage and multicast content delivery. The multicast delivery could be prone to information leakage if a user becomes malicious or if the multicast link is tapped by an external a ..."
Abstract - Add to MetaCart
adversary. In this paper, we introduce the concept of information-theoretically secure file delivery when the files have a non-uniform popularity distribution. For this scenario, the cache memory of each user is split into two parts: one part is used to store data (some function of the files), whereas

INTERLEAVING FOR PACKET CHANNELS

by Pierluigi Salvo Rossi, Gianmarco Romano, Francesco Palmieri, Giulio Iannello
"... The growth in connectivity and types of data links of the global network has made transmission by packets the main communication framework, and it will hold on for coming years. Real packet communication channels are characterized by packet losses and delays (e.g. due to congestion, queuing, etc.) t ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
.) that both affect performance of real-time applications. Distributing information over different packets can increase transmission reliability at the price of further delays. Packet interleaving can improve communication performance when some delay is allowed and re-transmission is not. The trade-off between

WildFire: A Scalable Path for SMPs

by Erik Hagersten, Michael Koster - INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE , 1999
"... Researchers have searched for scalable alternatives to the symmetric multiprocessor (SMP) architecture since it was first introduced in 1982. The paper introduces an alternative view of the relationship between scalable technologies and SMPs. Instead of replacing large SMPs with scalable technology, ..."
Abstract - Cited by 100 (12 self) - Add to MetaCart
, we propose new scalable techniques that allow large SMPs to be tied together efficiently, while maintaining the compatibility with, and performance characteristics of, an SMP. The trade-offs of such an architecture differ from those of traditional, scalable, Non-Uniform Memory Architecture (cc

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
of classical cryptanalytic advances or progress on the development of quantum computers the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of sig-nature schemes based on the hardness of certain lattices problems which are assumed

Databases and Distributed Systems Group, TU Darmstadt, Germany,

by Kai Sachs, Samuel Kounev, Jean Bacon, Ro Buchmann
"... Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some ser ..."
Abstract - Add to MetaCart
Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some serious performance and scalability challenges. In this paper, we present a methodology for performance evaluation of MOM platforms using the SPECjms2007 standard benchmark. SPECjms2007 is based on a novel application in the supply chain management domain designed to stress MOM infrastructures in a manner representative of real-world applications. In addition to providing a standard workload and metrics for MOM performance, the benchmark provides a flexible performance analysis framework that allows users to tailor the workload to their requirements. The contributions of this paper are: i) we present a detailed workload characterization of SPECjms2007 with the goal to help users understand the internal components of the workload and the way they are scaled, ii) we show how the workload can be customized to exercise and evaluate selected aspects of MOM performance, iii) we present a case study of a leading JMS platform, the BEA WebLogic server, conducting an in-depth performance analysis of the platform under a number of different workload and configuration scenarios. The methodology we propose is the first one that uses a standard benchmark providing both a representative workload as Message-oriented middleware (MOM) is increasingly adopted as an enabling technology for modern event-driven applications

1A Sub-Nyquist Radar Prototype: Hardware and Algorithms

by Eliahu Baransky, Gal Itzhak, Idan Shmuel, Noam Wagner, Eli Shoshan, Yonina C. Eldar
"... Abstract—Traditional radar sensing typically employs matched filtering between the received signal and the shape of the transmitted pulse. Matched filtering is conventionally carried out digitally, after sampling the received analog signals. Here, principles from classic sampling theory are generall ..."
Abstract - Add to MetaCart
of the transmitted pulse. The large amounts of sampled data also necessitate vast memory capacity. In addition, real-time processing of the data typically results in high power consumption. Recently, new approaches for radar sensing and estimation were introduced, based on the Finite Rate of Innovation and Xampling

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:

1Compressive Link Acquisition in Multiuser Communications

by Xiao Li, Andrea Rueetschi, Anna Scaglione, Yonina C. Eldar
"... Abstract—An important receiver operation is to detect the presence specific preamble signals with unknown delays in the presence of scattering, Doppler effects and carrier offsets. This task, referred to as “link acquisition”, is typically a sequential search over the transmitted signal space. Recen ..."
Abstract - Add to MetaCart
. Recently, many authors have suggested applying sparse recovery algorithms in the context of similar estimation or detection problems. These works typically focus on the benefits of sparse recovery, but not generally on the cost brought by compressive sensing. Thus, our goal is to examine the trade-off

ISRN SICS-D--56--SE Improving Low-Power Wireless Protocols with Timing-Accurate Simulation

by Fredrik Österlind, Christer Norström, Janusz Launberg, Karin Fohlstedt, Eva Gudmundsson, Lotta Jörsäter, Kersti Hedman, Orc Lönn, Thomas Ringström, Vicki Knopf, Olle Olsson, Lars Rasmusson, Bengt Ahlgren, Björn Grönvall, Martin Nilsson, Lalle Albertsson, Laura Feeney, Ian Marsh, Jarmo Laaksolahti , 2011
"... I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun ..."
Abstract - Add to MetaCart
I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun. My deepest thanks also go to my professor Per Gunningberg, Uppsala University. Per has in a seemingly easy way spotted erroneous assumptions, has valued my research contributions, and has connected my own work with another broader world of research. I want to thank all colleagues in the Networked Embedded Systems group:
Next 10 →
Results 1 - 10 of 57
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University