The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tiled architectures are emerging as an architectural platform that allows high levels of instruction level parallelism. Traditional compiler parallelization techniques are usually employed to generate programs for these architectures. However, for specific application domains, the compiler is not able to effectively exploit the domain knowledge. In this paper, we propose a new programming model that,...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built on bilinear pairings. The eta T pairing is one such pairing and is closely related to the Tate pairing. In this paper we consider the efficient hardware implementation of this pairing in characteristic 3. All characteristic 3 operations required to compute the pairing are outlined in detail. An efficient,...
Modular exponentiation is an essential operation for various applications, such as cryptography. The performance of this operation has a tremendous impact on the efficiency of the whole application. Therefore, many researchers devoted special interest to providing smart methods and efficient implementation for modular exponentiation. One this method is the sliding-window method, which pre-processes...
Although a lot of resource management schemes have been proposed to support multiple traffic in wireless networks, they mostly focused on a single wireless network, such as cellular network. In order to provide more comprehensive services, an integrated wireless network is introduced which consists of several different types of wireless networks and provides more connection options for mobile users...
TCP developed for wired networks assumes congestion as the reason of packet loss. This assumption might not be true for infrastructure based wireless networks like CDMA2000 packet data networks due to other reasons of packet loss like higher bit error rate, hard handoffs, limited bandwidth and multi-path fading. Hence knowing the reason of packet loss is important. We propose a TCP congestion window...
In this paper subcarrier and power allocation to each user at base-station maximizes the user data rates, subject to constraints on total power and bit error rate. First, each subchannel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm. The Gao's (2006) subcarrier allocation algorithm was used to calculate the power...
In this paper time-based random waypoint (TBRWP) model is analyzed in detail. Random waypoint model has been studied in mobility literature extensively. Traditional RWP model is based on the independency of the velocity and trajectory; TBR WP, instead, focuses on the independency of motion time and trajectory. Basic model is introduced and general method to evaluate the asymptotical probability density...
For wireless multi-hop message transmission in ad-hoc networks, sensor networks and mesh networks, on-demand route detection is important due to limited battery capacity and mobility. For route detection, it is desirable for mobile computers to transmit less control messages; however, flooding of a route request message in DSR and AODV or repeated location information advertisement in GEDIR, FACE...
As a standardized NGN architecture, the 3rd generation partnership project IP multimedia subsystem (IMS) defines standard service capabilities and interfaces, as well as a common IP-based infrastructure, which enable operators to introduce new services in an efficient and flexible way. In order to exploit the capabilities offered by an IMS operator, multimedia application developers face a business...
In this paper, concepts of worm poisoning and PoisonWorm are presented and the feasibility of worm poisoning is testified. A propagation model named SIRP Model and PoisonWorm's side-effect on network traffic are given and compared with the classical epidemic Kermack-Mckendrick model. The feasibility and necessity of PoisonWorm and its application are highlighted in an active defense system against...
Congestion is one of the main problems in networks such as the Internet that has been studied by many researchers. Since the fast development in computer networks and the increase of demands on network resources such as bandwidth allocation and buffer spaces, congestion control becomes a crucial task. In this paper, we introduce a dynamic random early drop (DRED) discrete-time queue analytical model...
Signature-based detection is the most widely used technique for intrusion detection systems (IDS). One of the major challenges for signature-based IDS is how to keep up with a large volume of incoming traffic when each packet needs to be compared with every signature in the database. When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential...
Fraud prevention is one of the most important security properties of electronic commerce (e-commerce). A strong authentication mechanism is a fundamental requirement in managing fraud on the Internet. Several authentication systems were proposed however; they are not effective enough to prevent attackers from performing illegal transactions over the Internet. In this paper, we propose a new dynamic...
Message aggregation can be used to reduce the communication overhead in a network where many messages have the "same" content. However, it may make the network less secure because, once the aggregator is compromised, the data correctness cannot be ensured. In this paper, we present a new scheme THIS that allows a base station to accept the aggregated data only if a majority of sensor nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.