Managing Handover Authentication in Big-domain Wireless Environment

Size: px
Start display at page:

Download "Managing Handover Authentication in Big-domain Wireless Environment"

Transcription

1 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan *1, Aiqun Hu *1, Juan Zhang *2 *1 Radio Department, Southeast University, Naning, Jiangsu, Chin *2 Aounting Department, Naning University, Naning, Jiangsu, China doi: /itvol4issue313 Abstrat Mobility management is the ey feature of wireless networ When the mobile node roams from the home networ to the foreign networ, the foreign networ aess server usually does not have the seurity material of the mobile node, and an not authentiate the mobile node by itself Thus the three-party authentiation is used, and the foreign networ aess server onsults the home authentiation server of the mobile node for authentiation (usually through the foreign authentiation server) However, this sort of authentiation will lead to a long lateny With the wide deployment of lateny sensitive servies in wireless networ, the handover authentiation lateny beomes more and more flagrant Currently, many standards organizations are woring on this issue, and they defined a lot of protools for optimizing the handover authentiation proedure These protools mainly inlude the fast re-authentiation protool, the pre-authentiation protool and the ontext transfer based authentiation protool However, urrent protools will put a heavy burden on the authentiation server in big domain, and thus add a long lateny to the handover authentiation proedure This paper presents an ellipti urve based authentiated ey agreement protool with mutual authentiation property to address this problem Keywords Handoff algorithm, authentiation, mobility management 1 Introdution The problem of wireless handover authentiation is usually onerned with mobility management When the mobile node (MN) roams into a foreign domain, the foreign networ aess server (NAS) will at as a pass through authentiator (AU), and onsults the authentiation server in the MN s home domain (AAAH) for authentiation through the foreign domain authentiation server (AAAF) Currently the extensible authentiation protool (EAP) [1] [14] is used for this sort of three-party authentiation EAP [1] defined an authentiation framewor whih supports multiple EAP methods suh as EAP-MD5 [1] and EAP-TLS [19] In the ase of three-party authentiation, the AAAH verifies the ertifiate or identity of the MN, and generates a shared master session ey (MSK) for the AU and the MN However, aording to [2], the time for simplest EAP method EAP-MD5 is more than 70ms whih does not support mutual authentiation and MSK generating For those EAP methods supporting both mutual authentiation and MSK generating, the authentiation lateny an easily be several hundred milliseonds This is too long for lateny sensitive servies suh as VOIP whih requires the overall handover lateny of under 50ms [20] To optimize the EAP protool, researhers divide the handover authentiation proedure into two senarios alled inter-domain handover authentiation and intra-domain handover authentiation Here interdomain handover refers to the senario that the mobile node roams from one AU to another that belongs to different AAAF, while the intra-domain handover refers to the senario that the mobile node roams from one AU to another within the same AAAF Usually when inter-domain handover ours, the full EAP proedure must be established, sine the new domain needs to onsult the AAAH for authentiating the mobile node This may add additional lateny to the handover proedure and put a heavy burden on the networ So, the bigger the domain is, the better effiieny the handover authentiation is In the ase of intra-domain handover, several mehanisms are designed for reduing the handover authentiation lateny They are alled fast re-authentiation protool [4], pre-authentiation protool [5], ontext transfer based authentiation protool [7] The fast re-authentiation protool defined an intradomain authentiation mehanism When the mobile node roams into the AAAF domain, the AAAH distributes the domain speifi root ey to the AAAF 86

2 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 after EAP proedure [4] Thus, in the subsequent authentiation proedure, the MN, the AAAF and the AU do the re-authentiation proedure based on DSRK without the partiipation of the AAAH The fast reauthentiation protool redued the signaling ost and seurity ost between AAAF and AAAH, but it an only meet the requirement of small domains In bigdomain environment, there may be a lot of MNs roaming from one AU to another Sine AUs still needs to onsult the AAAF during handover authentiation, the fast re-authentiation protool will still put a heavy burden on the AAAF For example, assuming an AAAF manages 100 AUs, and every AU needs to authentiate 100 MNs at the same time, then the AAAF needs to generate 100*100=10,000 MSKs in a short period of time If the ey generation hash funtion is SHA-1, then aording to [3], the total ey generating lateny is 973ms*10,000=973s If we tae message enryption/deryption ost and routing ost into aount, the lateny on the AAAF may be several minutes Also the fast re-authentiation protool requires a ompliated ey hierarhy [11][15], whih may be too ostly to the arrier too The pre-authentiation protool is initially defined by the IEEE wor group to tae the authentiation servie overhead out of the time-ritial re-assoiation proess [5] Sine the MN an be authentiated with multiple APs, the pre-authentiation proedure may put a muh heavier burden on the AAAF and AAAH In [21], Mishra et al report that the pre-authentiation message violates the IEEE state mahine as speified in [5] Due to those issues, the IETF uses pre-authentiation only for inter-domain handover authentiation [6] The ontext transfer based authentiation protool is an intra-domain handover authentiation protool When the MN roams from the old AU to the new AU, the old AU transfers the eying material of the MN to the new AU Thus, the authentiation proedure an be initiated between the new AU and the MN without the partiipation of AAAF, and the burden of the AAAF is redued However, aording to [8], the ontext transfer based authentiation protool will lead to the domino effet issue, in whih a ompromise of one AU will lead to a ompromise of another AU There is another ategory of publi ey based authentiation solutions suh as [10] However, the mobile node and the authentiator still need to onsult the AAAF for getting the publi ey of the other side The handover authentiation proedure will still put a heavy burden on the AAAF In one word, the two ey issues for urrent solutions are the heavy burden of AAAF and the domino effet This paper fouses on the intra-domain handover authentiation in the big-domain wireless environment and presents an new ellipti urve [9][12] based ey agreement protool with mutual authentiation property (ECCHO) for solving these two issues 2 ECCHO Arhiteture Our sheme aims to redue the burden of the AAAF when there are a lot of MNs roaming from one AU to another within the same AAAF domain The AAAF domain is defined as follow Definition 1: We assume that the AAAF manages mau AUs, and it has the apaity of managing mmn mau AUs and the mmn MNs Thus, the AAAF, the MNs form the AAAF domain Figure 1 shows the trust model for wireless environment, where PSA refers to pre-established seurity assoiation We extrat this trust model from [17] AAAF AU PSA PSA Seurity assoiation to be established AAAH PSA MN Figure 1 Trust Model for Wireless Aess Seurity The arhiteture of our sheme is summarized as follows: The AAAF initially generates and distributes some eying materials to the AU and MN During subsequent handover authentiation proedure, the AU and MN an authentiate eah other using those eying materials without the partiipation of the AAAF Sine the AAAF is not involved in the handover proess, its burden is redued Our sheme inludes the following five parts: the eying materials generating, ey distribution to AUs, ey distribution to MNs, handover proess and big numbers transporting 21 Keying Materials enerating The AAAF is the authentiation enter of the AAAF domain Only it an generate eying materials for the mobile nodes and authentiators The ey generating proess is based on the ellipti urve theory desribed in [9] Setion 31 of [9] defined the ellipti urve domain parameters over T= ( pab,,,, nh, ) 0 F p as follows: 87

3 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang The AAAF reates four sets with different prime numbers alled MNPRIVATE, AUPRIVATE, MNPUBLIC and AUPUBLIC MNPRIVATE and MNPUBLIC eah has m mn elements AUPRIVATE and AUPUBLIC m eah has au elements The seurity strength of these prime numbers will be analyzed later on Then the AAAF alulates the produt M of MNPRIVATE, and the produt N of AUPRIVATE 22 Key Distribution to Authentiators After ey generating, the AAAF distributes eying materials to the authentiators within the AAAF domain This proess is independent of other proess, and is initiated by the AAAF and is proteted by the PSA between the AAAF and the AUs (Figure 2) Computes and AAAF AU {,,,, pabnh,,,, } Figure 2 Key Distribution to the Authentiators The ey distribution to AUs inludes three steps: Step 1) The AAAF omputes = 0 = ( mod p) 0, where i is an element of MNPUBLIC Step 2) The AAAF omputes = 0 = ( mod p) 0, where is an element of AUPRIVATE Step 3) The AAAF sends AUTHl = {,,,, pabnh,,,, } to the AU l Every AU should get a different i and Different from [9], the domain base point 0 is not distributed to AUs Instead, the AAAF eeps it seretly 23 Key Distribution to Mobile Nodes When the mobile node enters the AAAF domain for the first time, the full EAP proess is established as defined in [1] Sine only the AAAH an verify the mobile node, the pass through authentiator transports the authentiation messages to the AAAF, and the latter relays it to the AAAH for authentiation If the full EAP proedure is suess, the AAAH sends a message to the AAAF for requesting the eying materials for the MN Upon reeiving the request from AAAH, the AAAF generates eying materials for the mobile node as follows: Step 1) The AAAF omputes = r = ( r mod p) r 0 0 where r is an element of MNPRIVATE Step 2) The AAAF omputes sn = sn0 = ( sn mod p) 0 where s is an element of AUPUBILC Then the AAAF sends the eying materials MN = {, r, sn,, pabnh,,,, } t r sn to the AAAH under the protetion of their PSA as shown in figure 1, and the latter distributes MN t to the MN under the protetion of their PSA as shown in figure 1 Every mobile node should get a different r and s Different from [9], the domain base point 0 is not distributed to the mobile node Instead the AAAF eeps it seretly (Figure 3) MN AU AAAF AAAH EAP message exhanges Computes and r sn Sends MN to MN t along with MSK Request MN t Verifies the mobile node Figure 3 ey distribution to the mobile node 24 Handover Proess This subsetion disusses the handover authentiation proess We will present an authentiated ey agreement mehanism without the partiipation of the AAAF and the AAAH Our sheme is based on the following ellipti urve assumption [9]: Ellipti urve seurity Assumption: iving a base point on the ellipti urve, we an easily ompute K = ; on the other hand, giving K and, one an hardly ompute Thus an be used as private ey, and K an be used as publi ey Our sheme uses the following lemma: 88

4 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 <, K > Lemma 1: if publi-private ey pairs 1 1 <, K > are on the same ellipti urve, they and 2 2 have the same base point, and 1 2, then 2 / 1, K2 is a divisor of < > forms a new publi-private K ey pair with the base point 1 Proof of Lemsma 1: K = = / *( ) = / K When t hands over to l, l AUTH holds l and t MN holds t l and t establish the authentiated ey agreement proedure using the following three messages: t Message 1) l Q1 = {, } sends message Q Message 2) After reeiving 1, t omputes its = ( / r) mod p private ey mnr with the base Q point r, and then sends 2 = { sn, r, y1} mnr to y the AU, in whih 1 is the publi ey of the mobile node s ellipti urve Diffie-Hellman publi-private ey < x, y >, and Q2 pair 1 1 is integrity proteted by an ellipti urve signature mehanism suh as setion 4 in [9] Message 3) After getting the 2 message, the authentiator verifies the integrity of the message using the mobile node s publi ey point r au = ( sn / ) mod p Q3 = { y2} au sends Q to with the base Then it omputes its private ey with a base point, and to the mobile node to negotiate y < x, y >, and Q3 a shared ey, in whih 2 is the publi ey of the authentiator s ellipti urve Diffie-Hellman publiprivate ey pair 2 2 is integrity proteted by an ellipti urve signature mehanism suh as setion 4 in [9] After the 3-pass message exhanges, the AU and the MN an generate the shared ey respetively The shared ey generating proess is defined in [9], and this ey an be used as MSK for further ey generating(figure 4) Mobile node Computing MN s Q = {, } 1 Q = sn y mnr 2 r 1 Verifying message, enerating MSK {,, } mnr Q = { y } 3 2 au authentiator Verifying message and Computes enerating Figure 4 The Handover Proess 25 Big-Number Transporting There are two big numbers to be stored and transported in our sheme, ei and sn If the element of MNPRIVATE b is mn bits, then m mn + 1 b mn may be bits long For some senarios, the transport of long bits over wireless interfae may not be aeptable To solve this issue, an be expressed as follows: au (2 b mn ) (2 b b mn mn ) bmn = (2 ) + ( (2 ) ) By doing so, an be transported using the two numbers: bmn (2 ) (2 b mn ) (2 b mn ) bmn ( (2 ) ) with 2 bmn m mn bits and with bits However, this may add additional exponential alulation ost during handover 3 Seurity Analysis 31 Corretness Analysis of Our Sheme Our sheme inludes three independent message exhange proesses: the proess of authentiator ey distribution, the proess of mobile node ey distribution and the handover authentiation proess In the wireless environment, the proess of authentiator ey distribution is proteted by the PSA between the AAAF and the authentiator The proess of mobile node ey distribution is proteted by two PSAs: the PSA between AAAF and the AAAH; the PSA between AAAF and the mobile node The orretness of these two proesses is the same as that of [1] and [4] So this paper only proves the orretness of the handover authentiation proess The orretness of the handover authentiation proess is proved by the strand spae theory desribed 89

5 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang in [22]The symbols used here are the same as that of [22] Different from the NSL strand spae defined in [22], the handover authentiation proess has the following initial eying materials: The mobile node holds: MN = {, r, sn,, pabnh,,,, } t r sn The authentiator holds: AUTH = {,,,, pabnh,,,, } l Our strand spae Σ is defined as follows: Penetrator strands s P s Init[,, y, y ] r 1 2 The "initiator strands" {{ +, y }, { y } } r 1 2 with trae mnr aur, where, r Tname y, 1, y2 T but y1 Tname The "responder strands" s Re sp[,, y, y ] r 1 2 {{, y}, + { y } } r 1 mnr 2 aur y1, y2 T r, where but y2 Tname The mapping in our strand spae: r with, T trae r name, and Similar to [22], the authentiation results and serey results an be proved using the following four propositions: Proposition 52, 58, 510 and 513 defined in [22] The proving of our sheme is similar to the NSL protool, so this paper will not rewrite it There are two differenes between our sheme and the Q NSL protool: (1) The 2 and Q3 messages are proteted by the private ey of the mobile node and the authentiator using the signature mehanism defined in [9]; (2) Sine only the one who holds the private ey an sign the message, the mobile node and the authentiator need not send the nones ba for authentiation Thus in our sheme, 32 Seurity Strength Analysis C height = 2 Our sheme generates the rmsk using the ellipti urve tehnique, so we refer to [18] for analyzing the seurity strength of our sheme The rmsk length is not defined by [4] or any other doument So, as an example, this paper assumes the ey length of rmsk is 112bits To negotiate a 112-bit rmsk, our sheme needs to deide the following three ategories of data that will affet the seurity strength: the finite field size p for the ellipti urve T, the length of the four sets of prime numbers defined in setion IIA, and the DH ey material length Aording to [18], modular exponentiation related algorithm with a 2100-bit module size will have about the same resistane against atta as a 112-bit 3DES ey Thus, fatoring a 2100-bit integer (whih is the produt of two big prime numbers) will need the same time as attaing a 112-bit symmetri ey So, the length of 2100 / bits will be enough for the four sets of prime numbers Aording to [18], an ellipti urve group with equivalent seurity as 2048-bit modular exponentiation has about 200 bits This paper uses the 193-bit ellipti urve group defined in [9] for p The DH algorithm is used for generating the rmsk Aording to [18], the exponents will have at least twie as many bits as the symmetri eys that will be x derived from them So, the length of 1 and x2 should be at least 112 bits* 2 = 224bits Similar to the prime number restrition, to get equal seurity strength to the rmsk, the module used in the Diffie- Hellman exhange should be at least 2048bits too 33 Domino Effet Analysis The domino effet desribed in [8] refers to the fat that ompromise of one authentiator will lead to ompromise of another This setion proves our sheme is immune to the domino effet issue Assuming there are two authentiators: AUTH = { 1,, 1,, pabnh,,,, } AUTH = { 2,, 2,, pabnh,,,, } AUTH & If is ompromised, the attaer will get the first authentiator s eying material { 1,, 1,,,,,, } 1 1 pabnh However it an not get 2 from the first authentiator s eying material, thus it an not derypts the message 2 defined in setion IID Similarly, ompromise of one mobile node will not lead to ompromise of another in our sheme 4 Effiieny Analysis 41 Effiieny Comparison 90

6 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 Our effiieny goals inlude reduing the burden of the AAAF and the total seurity ost Sine the AAAF is not involved in the handover authentiation proess, its burden is redued This setion analyzes the seurity ost of our sheme and [4] Then ompares them The seurity ost of [4] an be analyzed from the following three fators: time of ey generating using C sg HMAC-SHA256 algorithm ( ), time of enryption C using a symmetri ey ( se ), time of deryption using C a symmetri ey ( sd ) Aording to setion 713 in [1], the onversation between AAAF and AAAH are proteted by their pre-established seurity assoiations The seurity ost desribed at setion 52 in [4] is listed in table 1 Table 1 seurity ost of fast re-authentiation protool + + MN sg se sd AU se + sd AAAF sg se sd Here we still tae 112-bit 3DES as the enryption and deryption algorithm Aording to [16], the enryption for one ash line input (64bits) will need about 7364 pu yles The messages to be enrypted in the fast re-authentiation protool are usually several hundred bits So this paper taes 512-bit messages as an example Thus the enryption time using 3DES algorithm will be se = 7364 puyles *(512 / 64) 59, 000puyles The 3DES deryption algorithm is similar to = 59, 000puyles enryption, so sd The fast re-authentiation protool [4] uses the HMAC- SHA256 algorithm for ey generating Aording to Figure III12 in [13], the energy onsumption for HMAC-SHA256 is about 07uJ Then we an ompute the per-byte pu yles for HMAC-SHA256 as follows (using the energy onsumption equation defined in [13]): 6 (07 uj )*(800*10 ) /(16 V *02 A) = 1750 puyles / byte Aording to [4], the input of rmsk ey generating equation inludes 40bytes Thus, we an ompute the ey generating time as follows: = 1750 puyles / byte*40bytes = 70,000puyles sg So the pu yles of fast re-authentiation protool is alulated in table 2 Table 2 pu yles of fast re-authentiation protool MN AU AAAF total 188, , , ,000 The seurity ost of our sheme an be analyzed using the following fators: time of signing using the ps private ey ( ), time of verifiation using the publi pv ey ( ), time of ey generating using DH algorithm pg ( ) and time of big-number omputing( pt ) Aording to setion II in this paper, the seurity ost of our sheme is listed in table 3 Table 3 seurity ost of our sheme MN pg + ps + pv + pt AU pg + ps + pv + pt AAAF 0 This paper taes the pu yles for 2048-bit modular exponentiation alulated in [18] as the referene for our sheme That is referene = 450, 000puyles Aording to [18], the relative time between the 2048-bit modular exponentiation and around 200-bit ellipti urve is 5 So we assume = 450,000 puyles / 5 = 90,000puyles, ps = 450,000 puyles / 5 = 90,000puyles pv, and = 450,000 puyles / 5 = 90,000puyles pg m = 10 9 m mn < 30 If we assume mn,then 2 Aording to [18], if you double the size of the Diffie- Hellman modular exponentiation group, you quadruple the number of operations needed for the omputation Sine pt = 0, we assume So the pu yles of our sheme is alulated in table 4 Table 4 pu yles of our sheme MN AU AAAF total 270, , ,000 Comparing table 4 with table 2, we an see that our sheme doubles seurity osts on the mobile node and the authentiator But the total seurity ost is redued by around 10% Also our sheme redued the seurity ost of AAAF by around 306,000 pu yles Note that this result is based on the 64-bit pu environment On 91

7 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang the 32-bit pu, our sheme is still more ostly than symmetri ey based shemes 42 Big Domain Analysis Now, let s fous on the domain in definition 1 We assume the average handover rate on every authentiator is m per seond, and the pu yles used for seurity omputing is s per seond Then the seurity ost rate on the AAAF should follow the equation: 306,000 puyles * m * / 1 mau m s < for the fast re-authentiation protool We refer to the 1024-bit RSA signature time [3] as the exeuting time for 450,000 pu yles, thus 8 ms = (450,000 puyles / 475 ms) = 10 puyles / s Then we get the following equation: m * m < 300 au authentiators (ei m = 6 m If the AAAF manages 50 m = 50 au ), then an average of will rash the AAAF So we an see that our sheme will be very helpful to big domains As an example, let s fous on how the handover authentiation lateny influenes the VOIP servie If m we assume there are h handover proedures to be solved by the AAAF at the same time, then the AAAF needs around 8 h*306,000 /(10 / ) = 3 h( ) m puyles puyles s m ms time to solve all the handover authentiation m > 17 proedures So if h, the lateny of the last handover authentiation proedure will be 3 m ( ms) = 3*17ms = 51ms h This means one of these mobile nodes will get a lateny of over 50ms This annot meet the requirement of VOIP 5 Conlusion In this paper, we have presented an ellipti urve based authentiated ey agreement protool for wireless handover authentiation It has a lower seurity ost than urrent solutions and an redue the burden of the authentiation server during handover Also our sheme an avoid the domino effet issue 6 Anowledgement This paper was supported by the China 863 Plan (No2007AA01Z433) 7 Referenes [1] B Aboba Et al, "Extensible Authentiation Protool(EAP) ", RFC3748, IETF, June 2004 [2] KSethom, HAfifi, "Requirements and Adaptation Solutions for Transparent Handover", IEEE ICC 2004 [3] KSethom Et al, "A Distributed and Seured Arhiteture to Enhane Smooth Handoffs in Wide Area Wireless IP Infrastrutures", ACM SIMOBILE Mobile Computing and ommuniations Review, Volume 10, Number 3, July 2006 [4] V Narayanan, L Dondeti, "EAP Extensions for EAP Reauthentiation Protool (ERP) ", IETF, draft-ietfhoey-erx-08, November 2007 [5] Institute of Eletrial and Eletronis Engineers, "Supplement to Standard for Teleommuniations and Information Exhange Between Systems - LAN/MAN Speifi Requirements - Part 11: Wireless LAN Medium Aess Control (MAC) and Physial Layer (PHY) Speifiations: Speifiation for Enhaned Seurity", IEEE 80211i/D1, 2001 [6] Y Ohba, "EAP Pre-authentiation Problem Statement", IETF, draft-ietf-hoey-preauth-ps-00, September 2007 [7] Institute of Eletrial and Eletronis Engineers, "Reommended Pratie for Multi-Vendor Aess Point Interoperability via an Inter-Aess Point Protool Aross Distribution Systems Supporting IEEE Operation", IEEE 80211F, July 2003 (now depreated) [8] R Housley, B Aboba, "uidane for Authentiation, Authorization, and Aounting (AAA) Key Management", IETF, RFC4962, July 2007 [9] SEC, "Ellipti Curve Cryptography", SEC 1, 2000 [10] avin Lowe, Breaing and fixing the Needham- Shroeder publi-ey protool using FDR In Proeeedings of taas, volume 1055 of Leture Notes in Computer Siene, Springer Verlag, 1996 [11] M Nahiri and Y Ohba, "Derivation, delivery and management of EAP based eys for handover and reauthentiation", IETF, draft-ietf-hoey-ey-mgm-01, November 2007 [12] N Koblitz, "Ellipti urve ryptosystems", MathComp, 48, 1987 [13] MDormale, "Low-Cost Ellipti Curve Digital Signature Coproessor for Smart Cards", IEEE ASAP, 2006 [14] P Eronen, Et Al, "Diameter Extensible Authentiation Protool (EAP) Appliation", IETF RFC4072, August 2005 [15] J Salowey, Et Al, "Speifiation for the Derivation of Root Keys from an Extended Master Session Key (EMSK) ", IETF, draft-ietf-hoey-ems-hierarhy-03, January 2008 [16] Praveen Dongara, T N Viayumar, "Aelerating Private-Key Cryptography via Multithreading on Symmetri Multiproessors", IEEE ISPASS, 2003 [17] Madid Nahiri & Mahsa Nahiri, "AAA and networ seurity for mobile aess", WILEY, 2005 [18] H Orman, P Hoffman, "Determining Strengths For Publi Keys Used For Exhanging Symmetri Keys", IETF, RFC3766, April

8 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 [19] B Aboba and D Simon, "PPP EAP TLS Authentiation Protool", IETF, RFC2716, Otober 1999 [20] International Communiation Union, "eneral Charateristis of International Telephone Connetions and International Telephone Ciruits", ITU-T114, 1988 [21] Arunesh Mishra, Minho Shin, and William Arbaugh, "An Empirial Analysis of the IEEE MAC Layer Handoff Proess", ACM Computer Communiation Review, vol 33, Apr 2003 [22] Fabrega F J T, Herzog J C, uttman J D "St rand spaes : Proving seurity protools orret", Journal of Computer Seurity,

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol Seema Mehla Computer Department N.C.College of Engineering Panipat, India Bhawna Gupta Computer Department N.C.College

More information

Analyzing EAP TLS & ERP Protocol with Varying Processor Speed

Analyzing EAP TLS & ERP Protocol with Varying Processor Speed Analyzing EAP TLS & ERP Protocol with Varying Processor Speed Bhawna Gupta N.C.College of Engineering Israna (Panipat) Seema Mehla N.C.College of Engineering Israna (Panipat) ABSTRACT Extensible Authentication

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Computing Pool: a Simplified and Practical Computational Grid Model

Computing Pool: a Simplified and Practical Computational Grid Model Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems Andreas Brokalakis Synelixis Solutions Ltd, Greee brokalakis@synelixis.om Nikolaos Tampouratzis Teleommuniation

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)

PBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00) PBFT: A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) first to be safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! The Setup Crypto System Model Asynhronous

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1 Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, 3, Number 1, 3, Pages 1-22 365-382 2007 Institute for Sientifi Computing and Information A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

A Lightweight Intrusion-Tolerant Overlay Network

A Lightweight Intrusion-Tolerant Overlay Network A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br

More information

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0 Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013 289 Disovery and Verifiation of Neighbor Positions in Mobile Ad Ho Networks Maro Fiore, Member, IEEE, Claudio Ettore Casetti, Member,

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Tackling IPv6 Address Scalability from the Root

Tackling IPv6 Address Scalability from the Root Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat

More information

Verifying Interaction Protocol Compliance of Service Orchestrations

Verifying Interaction Protocol Compliance of Service Orchestrations Verifying Interation Protool Compliane of Servie Orhestrations Andreas Shroeder and Philip Mayer Ludwig-Maximilians-Universität Münhen, Germany {shroeda, mayer}@pst.ifi.lmu.de Abstrat. An important aspet

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology

Model Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3 Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1 Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Cooperative Coverage Extension for Relay-Union Networks

Cooperative Coverage Extension for Relay-Union Networks 1.119/TPDS.214.23821, IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao

More information

Boundary Correct Real-Time Soft Shadows

Boundary Correct Real-Time Soft Shadows Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk

More information

ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY

ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 00 Proeedings Amerias Conferene on Information Systems (AMCIS) Deember 00 ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY Huseyin

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System Arhiteture and Performane of the Hitahi SR221 Massively Parallel Proessor System Hiroaki Fujii, Yoshiko Yasuda, Hideya Akashi, Yasuhiro Inagami, Makoto Koga*, Osamu Ishihara*, Masamori Kashiyama*, Hideo

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information