Results 1 - 10
of
57
Secure Caching with Non-Uniform Demands
"... Abstract-Caching helps in reducing network load at times of heavy traffic by utilizing content duplication, local file storage and multicast content delivery. The multicast delivery could be prone to information leakage if a user becomes malicious or if the multicast link is tapped by an external a ..."
Abstract
- Add to MetaCart
adversary. In this paper, we introduce the concept of information-theoretically secure file delivery when the files have a non-uniform popularity distribution. For this scenario, the cache memory of each user is split into two parts: one part is used to store data (some function of the files), whereas
INTERLEAVING FOR PACKET CHANNELS
"... The growth in connectivity and types of data links of the global network has made transmission by packets the main communication framework, and it will hold on for coming years. Real packet communication channels are characterized by packet losses and delays (e.g. due to congestion, queuing, etc.) t ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
.) that both affect performance of real-time applications. Distributing information over different packets can increase transmission reliability at the price of further delays. Packet interleaving can improve communication performance when some delay is allowed and re-transmission is not. The trade-off between
WildFire: A Scalable Path for SMPs
- INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE
, 1999
"... Researchers have searched for scalable alternatives to the symmetric multiprocessor (SMP) architecture since it was first introduced in 1982. The paper introduces an alternative view of the relationship between scalable technologies and SMPs. Instead of replacing large SMPs with scalable technology, ..."
Abstract
-
Cited by 100 (12 self)
- Add to MetaCart
, we propose new scalable techniques that allow large SMPs to be tied together efficiently, while maintaining the compatibility with, and performance characteristics of, an SMP. The trade-offs of such an architecture differ from those of traditional, scalable, Non-Uniform Memory Architecture (cc
APractical Lattice-based Digital Signature Schemes
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract
- Add to MetaCart
of classical cryptanalytic advances or progress on the development of quantum computers the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of sig-nature schemes based on the hardness of certain lattices problems which are assumed
Databases and Distributed Systems Group, TU Darmstadt, Germany,
"... Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some ser ..."
Abstract
- Add to MetaCart
Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some serious performance and scalability challenges. In this paper, we present a methodology for performance evaluation of MOM platforms using the SPECjms2007 standard benchmark. SPECjms2007 is based on a novel application in the supply chain management domain designed to stress MOM infrastructures in a manner representative of real-world applications. In addition to providing a standard workload and metrics for MOM performance, the benchmark provides a flexible performance analysis framework that allows users to tailor the workload to their requirements. The contributions of this paper are: i) we present a detailed workload characterization of SPECjms2007 with the goal to help users understand the internal components of the workload and the way they are scaled, ii) we show how the workload can be customized to exercise and evaluate selected aspects of MOM performance, iii) we present a case study of a leading JMS platform, the BEA WebLogic server, conducting an in-depth performance analysis of the platform under a number of different workload and configuration scenarios. The methodology we propose is the first one that uses a standard benchmark providing both a representative workload as Message-oriented middleware (MOM) is increasingly adopted as an enabling technology for modern event-driven applications
1A Sub-Nyquist Radar Prototype: Hardware and Algorithms
"... Abstract—Traditional radar sensing typically employs matched filtering between the received signal and the shape of the transmitted pulse. Matched filtering is conventionally carried out digitally, after sampling the received analog signals. Here, principles from classic sampling theory are generall ..."
Abstract
- Add to MetaCart
of the transmitted pulse. The large amounts of sampled data also necessitate vast memory capacity. In addition, real-time processing of the data typically results in high power consumption. Recently, new approaches for radar sensing and estimation were introduced, based on the Finite Rate of Innovation and Xampling
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
1Compressive Link Acquisition in Multiuser Communications
"... Abstract—An important receiver operation is to detect the presence specific preamble signals with unknown delays in the presence of scattering, Doppler effects and carrier offsets. This task, referred to as “link acquisition”, is typically a sequential search over the transmitted signal space. Recen ..."
Abstract
- Add to MetaCart
. Recently, many authors have suggested applying sparse recovery algorithms in the context of similar estimation or detection problems. These works typically focus on the benefits of sparse recovery, but not generally on the cost brought by compressive sensing. Thus, our goal is to examine the trade-off
ISRN SICS-D--56--SE Improving Low-Power Wireless Protocols with Timing-Accurate Simulation
, 2011
"... I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun ..."
Abstract
- Add to MetaCart
I first thank my thesis advisors Thiemo Voigt and Adam Dunkels for being my excellent advisors, and also for being the great colleagues you still are. Thiemo and Adam have complemented each other superbly, giving me feedback, perspectives, insights, and having made every single new venture truly fun. My deepest thanks also go to my professor Per Gunningberg, Uppsala University. Per has in a seemingly easy way spotted erroneous assumptions, has valued my research contributions, and has connected my own work with another broader world of research. I want to thank all colleagues in the Networked Embedded Systems group:
Results 1 - 10
of
57