Managing Handover Authentication in Big-domain Wireless Environment
|
|
- Randall Kennedy
- 5 years ago
- Views:
Transcription
1 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan *1, Aiqun Hu *1, Juan Zhang *2 *1 Radio Department, Southeast University, Naning, Jiangsu, Chin *2 Aounting Department, Naning University, Naning, Jiangsu, China doi: /itvol4issue313 Abstrat Mobility management is the ey feature of wireless networ When the mobile node roams from the home networ to the foreign networ, the foreign networ aess server usually does not have the seurity material of the mobile node, and an not authentiate the mobile node by itself Thus the three-party authentiation is used, and the foreign networ aess server onsults the home authentiation server of the mobile node for authentiation (usually through the foreign authentiation server) However, this sort of authentiation will lead to a long lateny With the wide deployment of lateny sensitive servies in wireless networ, the handover authentiation lateny beomes more and more flagrant Currently, many standards organizations are woring on this issue, and they defined a lot of protools for optimizing the handover authentiation proedure These protools mainly inlude the fast re-authentiation protool, the pre-authentiation protool and the ontext transfer based authentiation protool However, urrent protools will put a heavy burden on the authentiation server in big domain, and thus add a long lateny to the handover authentiation proedure This paper presents an ellipti urve based authentiated ey agreement protool with mutual authentiation property to address this problem Keywords Handoff algorithm, authentiation, mobility management 1 Introdution The problem of wireless handover authentiation is usually onerned with mobility management When the mobile node (MN) roams into a foreign domain, the foreign networ aess server (NAS) will at as a pass through authentiator (AU), and onsults the authentiation server in the MN s home domain (AAAH) for authentiation through the foreign domain authentiation server (AAAF) Currently the extensible authentiation protool (EAP) [1] [14] is used for this sort of three-party authentiation EAP [1] defined an authentiation framewor whih supports multiple EAP methods suh as EAP-MD5 [1] and EAP-TLS [19] In the ase of three-party authentiation, the AAAH verifies the ertifiate or identity of the MN, and generates a shared master session ey (MSK) for the AU and the MN However, aording to [2], the time for simplest EAP method EAP-MD5 is more than 70ms whih does not support mutual authentiation and MSK generating For those EAP methods supporting both mutual authentiation and MSK generating, the authentiation lateny an easily be several hundred milliseonds This is too long for lateny sensitive servies suh as VOIP whih requires the overall handover lateny of under 50ms [20] To optimize the EAP protool, researhers divide the handover authentiation proedure into two senarios alled inter-domain handover authentiation and intra-domain handover authentiation Here interdomain handover refers to the senario that the mobile node roams from one AU to another that belongs to different AAAF, while the intra-domain handover refers to the senario that the mobile node roams from one AU to another within the same AAAF Usually when inter-domain handover ours, the full EAP proedure must be established, sine the new domain needs to onsult the AAAH for authentiating the mobile node This may add additional lateny to the handover proedure and put a heavy burden on the networ So, the bigger the domain is, the better effiieny the handover authentiation is In the ase of intra-domain handover, several mehanisms are designed for reduing the handover authentiation lateny They are alled fast re-authentiation protool [4], pre-authentiation protool [5], ontext transfer based authentiation protool [7] The fast re-authentiation protool defined an intradomain authentiation mehanism When the mobile node roams into the AAAF domain, the AAAH distributes the domain speifi root ey to the AAAF 86
2 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 after EAP proedure [4] Thus, in the subsequent authentiation proedure, the MN, the AAAF and the AU do the re-authentiation proedure based on DSRK without the partiipation of the AAAH The fast reauthentiation protool redued the signaling ost and seurity ost between AAAF and AAAH, but it an only meet the requirement of small domains In bigdomain environment, there may be a lot of MNs roaming from one AU to another Sine AUs still needs to onsult the AAAF during handover authentiation, the fast re-authentiation protool will still put a heavy burden on the AAAF For example, assuming an AAAF manages 100 AUs, and every AU needs to authentiate 100 MNs at the same time, then the AAAF needs to generate 100*100=10,000 MSKs in a short period of time If the ey generation hash funtion is SHA-1, then aording to [3], the total ey generating lateny is 973ms*10,000=973s If we tae message enryption/deryption ost and routing ost into aount, the lateny on the AAAF may be several minutes Also the fast re-authentiation protool requires a ompliated ey hierarhy [11][15], whih may be too ostly to the arrier too The pre-authentiation protool is initially defined by the IEEE wor group to tae the authentiation servie overhead out of the time-ritial re-assoiation proess [5] Sine the MN an be authentiated with multiple APs, the pre-authentiation proedure may put a muh heavier burden on the AAAF and AAAH In [21], Mishra et al report that the pre-authentiation message violates the IEEE state mahine as speified in [5] Due to those issues, the IETF uses pre-authentiation only for inter-domain handover authentiation [6] The ontext transfer based authentiation protool is an intra-domain handover authentiation protool When the MN roams from the old AU to the new AU, the old AU transfers the eying material of the MN to the new AU Thus, the authentiation proedure an be initiated between the new AU and the MN without the partiipation of AAAF, and the burden of the AAAF is redued However, aording to [8], the ontext transfer based authentiation protool will lead to the domino effet issue, in whih a ompromise of one AU will lead to a ompromise of another AU There is another ategory of publi ey based authentiation solutions suh as [10] However, the mobile node and the authentiator still need to onsult the AAAF for getting the publi ey of the other side The handover authentiation proedure will still put a heavy burden on the AAAF In one word, the two ey issues for urrent solutions are the heavy burden of AAAF and the domino effet This paper fouses on the intra-domain handover authentiation in the big-domain wireless environment and presents an new ellipti urve [9][12] based ey agreement protool with mutual authentiation property (ECCHO) for solving these two issues 2 ECCHO Arhiteture Our sheme aims to redue the burden of the AAAF when there are a lot of MNs roaming from one AU to another within the same AAAF domain The AAAF domain is defined as follow Definition 1: We assume that the AAAF manages mau AUs, and it has the apaity of managing mmn mau AUs and the mmn MNs Thus, the AAAF, the MNs form the AAAF domain Figure 1 shows the trust model for wireless environment, where PSA refers to pre-established seurity assoiation We extrat this trust model from [17] AAAF AU PSA PSA Seurity assoiation to be established AAAH PSA MN Figure 1 Trust Model for Wireless Aess Seurity The arhiteture of our sheme is summarized as follows: The AAAF initially generates and distributes some eying materials to the AU and MN During subsequent handover authentiation proedure, the AU and MN an authentiate eah other using those eying materials without the partiipation of the AAAF Sine the AAAF is not involved in the handover proess, its burden is redued Our sheme inludes the following five parts: the eying materials generating, ey distribution to AUs, ey distribution to MNs, handover proess and big numbers transporting 21 Keying Materials enerating The AAAF is the authentiation enter of the AAAF domain Only it an generate eying materials for the mobile nodes and authentiators The ey generating proess is based on the ellipti urve theory desribed in [9] Setion 31 of [9] defined the ellipti urve domain parameters over T= ( pab,,,, nh, ) 0 F p as follows: 87
3 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang The AAAF reates four sets with different prime numbers alled MNPRIVATE, AUPRIVATE, MNPUBLIC and AUPUBLIC MNPRIVATE and MNPUBLIC eah has m mn elements AUPRIVATE and AUPUBLIC m eah has au elements The seurity strength of these prime numbers will be analyzed later on Then the AAAF alulates the produt M of MNPRIVATE, and the produt N of AUPRIVATE 22 Key Distribution to Authentiators After ey generating, the AAAF distributes eying materials to the authentiators within the AAAF domain This proess is independent of other proess, and is initiated by the AAAF and is proteted by the PSA between the AAAF and the AUs (Figure 2) Computes and AAAF AU {,,,, pabnh,,,, } Figure 2 Key Distribution to the Authentiators The ey distribution to AUs inludes three steps: Step 1) The AAAF omputes = 0 = ( mod p) 0, where i is an element of MNPUBLIC Step 2) The AAAF omputes = 0 = ( mod p) 0, where is an element of AUPRIVATE Step 3) The AAAF sends AUTHl = {,,,, pabnh,,,, } to the AU l Every AU should get a different i and Different from [9], the domain base point 0 is not distributed to AUs Instead, the AAAF eeps it seretly 23 Key Distribution to Mobile Nodes When the mobile node enters the AAAF domain for the first time, the full EAP proess is established as defined in [1] Sine only the AAAH an verify the mobile node, the pass through authentiator transports the authentiation messages to the AAAF, and the latter relays it to the AAAH for authentiation If the full EAP proedure is suess, the AAAH sends a message to the AAAF for requesting the eying materials for the MN Upon reeiving the request from AAAH, the AAAF generates eying materials for the mobile node as follows: Step 1) The AAAF omputes = r = ( r mod p) r 0 0 where r is an element of MNPRIVATE Step 2) The AAAF omputes sn = sn0 = ( sn mod p) 0 where s is an element of AUPUBILC Then the AAAF sends the eying materials MN = {, r, sn,, pabnh,,,, } t r sn to the AAAH under the protetion of their PSA as shown in figure 1, and the latter distributes MN t to the MN under the protetion of their PSA as shown in figure 1 Every mobile node should get a different r and s Different from [9], the domain base point 0 is not distributed to the mobile node Instead the AAAF eeps it seretly (Figure 3) MN AU AAAF AAAH EAP message exhanges Computes and r sn Sends MN to MN t along with MSK Request MN t Verifies the mobile node Figure 3 ey distribution to the mobile node 24 Handover Proess This subsetion disusses the handover authentiation proess We will present an authentiated ey agreement mehanism without the partiipation of the AAAF and the AAAH Our sheme is based on the following ellipti urve assumption [9]: Ellipti urve seurity Assumption: iving a base point on the ellipti urve, we an easily ompute K = ; on the other hand, giving K and, one an hardly ompute Thus an be used as private ey, and K an be used as publi ey Our sheme uses the following lemma: 88
4 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 <, K > Lemma 1: if publi-private ey pairs 1 1 <, K > are on the same ellipti urve, they and 2 2 have the same base point, and 1 2, then 2 / 1, K2 is a divisor of < > forms a new publi-private K ey pair with the base point 1 Proof of Lemsma 1: K = = / *( ) = / K When t hands over to l, l AUTH holds l and t MN holds t l and t establish the authentiated ey agreement proedure using the following three messages: t Message 1) l Q1 = {, } sends message Q Message 2) After reeiving 1, t omputes its = ( / r) mod p private ey mnr with the base Q point r, and then sends 2 = { sn, r, y1} mnr to y the AU, in whih 1 is the publi ey of the mobile node s ellipti urve Diffie-Hellman publi-private ey < x, y >, and Q2 pair 1 1 is integrity proteted by an ellipti urve signature mehanism suh as setion 4 in [9] Message 3) After getting the 2 message, the authentiator verifies the integrity of the message using the mobile node s publi ey point r au = ( sn / ) mod p Q3 = { y2} au sends Q to with the base Then it omputes its private ey with a base point, and to the mobile node to negotiate y < x, y >, and Q3 a shared ey, in whih 2 is the publi ey of the authentiator s ellipti urve Diffie-Hellman publiprivate ey pair 2 2 is integrity proteted by an ellipti urve signature mehanism suh as setion 4 in [9] After the 3-pass message exhanges, the AU and the MN an generate the shared ey respetively The shared ey generating proess is defined in [9], and this ey an be used as MSK for further ey generating(figure 4) Mobile node Computing MN s Q = {, } 1 Q = sn y mnr 2 r 1 Verifying message, enerating MSK {,, } mnr Q = { y } 3 2 au authentiator Verifying message and Computes enerating Figure 4 The Handover Proess 25 Big-Number Transporting There are two big numbers to be stored and transported in our sheme, ei and sn If the element of MNPRIVATE b is mn bits, then m mn + 1 b mn may be bits long For some senarios, the transport of long bits over wireless interfae may not be aeptable To solve this issue, an be expressed as follows: au (2 b mn ) (2 b b mn mn ) bmn = (2 ) + ( (2 ) ) By doing so, an be transported using the two numbers: bmn (2 ) (2 b mn ) (2 b mn ) bmn ( (2 ) ) with 2 bmn m mn bits and with bits However, this may add additional exponential alulation ost during handover 3 Seurity Analysis 31 Corretness Analysis of Our Sheme Our sheme inludes three independent message exhange proesses: the proess of authentiator ey distribution, the proess of mobile node ey distribution and the handover authentiation proess In the wireless environment, the proess of authentiator ey distribution is proteted by the PSA between the AAAF and the authentiator The proess of mobile node ey distribution is proteted by two PSAs: the PSA between AAAF and the AAAH; the PSA between AAAF and the mobile node The orretness of these two proesses is the same as that of [1] and [4] So this paper only proves the orretness of the handover authentiation proess The orretness of the handover authentiation proess is proved by the strand spae theory desribed 89
5 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang in [22]The symbols used here are the same as that of [22] Different from the NSL strand spae defined in [22], the handover authentiation proess has the following initial eying materials: The mobile node holds: MN = {, r, sn,, pabnh,,,, } t r sn The authentiator holds: AUTH = {,,,, pabnh,,,, } l Our strand spae Σ is defined as follows: Penetrator strands s P s Init[,, y, y ] r 1 2 The "initiator strands" {{ +, y }, { y } } r 1 2 with trae mnr aur, where, r Tname y, 1, y2 T but y1 Tname The "responder strands" s Re sp[,, y, y ] r 1 2 {{, y}, + { y } } r 1 mnr 2 aur y1, y2 T r, where but y2 Tname The mapping in our strand spae: r with, T trae r name, and Similar to [22], the authentiation results and serey results an be proved using the following four propositions: Proposition 52, 58, 510 and 513 defined in [22] The proving of our sheme is similar to the NSL protool, so this paper will not rewrite it There are two differenes between our sheme and the Q NSL protool: (1) The 2 and Q3 messages are proteted by the private ey of the mobile node and the authentiator using the signature mehanism defined in [9]; (2) Sine only the one who holds the private ey an sign the message, the mobile node and the authentiator need not send the nones ba for authentiation Thus in our sheme, 32 Seurity Strength Analysis C height = 2 Our sheme generates the rmsk using the ellipti urve tehnique, so we refer to [18] for analyzing the seurity strength of our sheme The rmsk length is not defined by [4] or any other doument So, as an example, this paper assumes the ey length of rmsk is 112bits To negotiate a 112-bit rmsk, our sheme needs to deide the following three ategories of data that will affet the seurity strength: the finite field size p for the ellipti urve T, the length of the four sets of prime numbers defined in setion IIA, and the DH ey material length Aording to [18], modular exponentiation related algorithm with a 2100-bit module size will have about the same resistane against atta as a 112-bit 3DES ey Thus, fatoring a 2100-bit integer (whih is the produt of two big prime numbers) will need the same time as attaing a 112-bit symmetri ey So, the length of 2100 / bits will be enough for the four sets of prime numbers Aording to [18], an ellipti urve group with equivalent seurity as 2048-bit modular exponentiation has about 200 bits This paper uses the 193-bit ellipti urve group defined in [9] for p The DH algorithm is used for generating the rmsk Aording to [18], the exponents will have at least twie as many bits as the symmetri eys that will be x derived from them So, the length of 1 and x2 should be at least 112 bits* 2 = 224bits Similar to the prime number restrition, to get equal seurity strength to the rmsk, the module used in the Diffie- Hellman exhange should be at least 2048bits too 33 Domino Effet Analysis The domino effet desribed in [8] refers to the fat that ompromise of one authentiator will lead to ompromise of another This setion proves our sheme is immune to the domino effet issue Assuming there are two authentiators: AUTH = { 1,, 1,, pabnh,,,, } AUTH = { 2,, 2,, pabnh,,,, } AUTH & If is ompromised, the attaer will get the first authentiator s eying material { 1,, 1,,,,,, } 1 1 pabnh However it an not get 2 from the first authentiator s eying material, thus it an not derypts the message 2 defined in setion IID Similarly, ompromise of one mobile node will not lead to ompromise of another in our sheme 4 Effiieny Analysis 41 Effiieny Comparison 90
6 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 Our effiieny goals inlude reduing the burden of the AAAF and the total seurity ost Sine the AAAF is not involved in the handover authentiation proess, its burden is redued This setion analyzes the seurity ost of our sheme and [4] Then ompares them The seurity ost of [4] an be analyzed from the following three fators: time of ey generating using C sg HMAC-SHA256 algorithm ( ), time of enryption C using a symmetri ey ( se ), time of deryption using C a symmetri ey ( sd ) Aording to setion 713 in [1], the onversation between AAAF and AAAH are proteted by their pre-established seurity assoiations The seurity ost desribed at setion 52 in [4] is listed in table 1 Table 1 seurity ost of fast re-authentiation protool + + MN sg se sd AU se + sd AAAF sg se sd Here we still tae 112-bit 3DES as the enryption and deryption algorithm Aording to [16], the enryption for one ash line input (64bits) will need about 7364 pu yles The messages to be enrypted in the fast re-authentiation protool are usually several hundred bits So this paper taes 512-bit messages as an example Thus the enryption time using 3DES algorithm will be se = 7364 puyles *(512 / 64) 59, 000puyles The 3DES deryption algorithm is similar to = 59, 000puyles enryption, so sd The fast re-authentiation protool [4] uses the HMAC- SHA256 algorithm for ey generating Aording to Figure III12 in [13], the energy onsumption for HMAC-SHA256 is about 07uJ Then we an ompute the per-byte pu yles for HMAC-SHA256 as follows (using the energy onsumption equation defined in [13]): 6 (07 uj )*(800*10 ) /(16 V *02 A) = 1750 puyles / byte Aording to [4], the input of rmsk ey generating equation inludes 40bytes Thus, we an ompute the ey generating time as follows: = 1750 puyles / byte*40bytes = 70,000puyles sg So the pu yles of fast re-authentiation protool is alulated in table 2 Table 2 pu yles of fast re-authentiation protool MN AU AAAF total 188, , , ,000 The seurity ost of our sheme an be analyzed using the following fators: time of signing using the ps private ey ( ), time of verifiation using the publi pv ey ( ), time of ey generating using DH algorithm pg ( ) and time of big-number omputing( pt ) Aording to setion II in this paper, the seurity ost of our sheme is listed in table 3 Table 3 seurity ost of our sheme MN pg + ps + pv + pt AU pg + ps + pv + pt AAAF 0 This paper taes the pu yles for 2048-bit modular exponentiation alulated in [18] as the referene for our sheme That is referene = 450, 000puyles Aording to [18], the relative time between the 2048-bit modular exponentiation and around 200-bit ellipti urve is 5 So we assume = 450,000 puyles / 5 = 90,000puyles, ps = 450,000 puyles / 5 = 90,000puyles pv, and = 450,000 puyles / 5 = 90,000puyles pg m = 10 9 m mn < 30 If we assume mn,then 2 Aording to [18], if you double the size of the Diffie- Hellman modular exponentiation group, you quadruple the number of operations needed for the omputation Sine pt = 0, we assume So the pu yles of our sheme is alulated in table 4 Table 4 pu yles of our sheme MN AU AAAF total 270, , ,000 Comparing table 4 with table 2, we an see that our sheme doubles seurity osts on the mobile node and the authentiator But the total seurity ost is redued by around 10% Also our sheme redued the seurity ost of AAAF by around 306,000 pu yles Note that this result is based on the 64-bit pu environment On 91
7 Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang the 32-bit pu, our sheme is still more ostly than symmetri ey based shemes 42 Big Domain Analysis Now, let s fous on the domain in definition 1 We assume the average handover rate on every authentiator is m per seond, and the pu yles used for seurity omputing is s per seond Then the seurity ost rate on the AAAF should follow the equation: 306,000 puyles * m * / 1 mau m s < for the fast re-authentiation protool We refer to the 1024-bit RSA signature time [3] as the exeuting time for 450,000 pu yles, thus 8 ms = (450,000 puyles / 475 ms) = 10 puyles / s Then we get the following equation: m * m < 300 au authentiators (ei m = 6 m If the AAAF manages 50 m = 50 au ), then an average of will rash the AAAF So we an see that our sheme will be very helpful to big domains As an example, let s fous on how the handover authentiation lateny influenes the VOIP servie If m we assume there are h handover proedures to be solved by the AAAF at the same time, then the AAAF needs around 8 h*306,000 /(10 / ) = 3 h( ) m puyles puyles s m ms time to solve all the handover authentiation m > 17 proedures So if h, the lateny of the last handover authentiation proedure will be 3 m ( ms) = 3*17ms = 51ms h This means one of these mobile nodes will get a lateny of over 50ms This annot meet the requirement of VOIP 5 Conlusion In this paper, we have presented an ellipti urve based authentiated ey agreement protool for wireless handover authentiation It has a lower seurity ost than urrent solutions and an redue the burden of the authentiation server during handover Also our sheme an avoid the domino effet issue 6 Anowledgement This paper was supported by the China 863 Plan (No2007AA01Z433) 7 Referenes [1] B Aboba Et al, "Extensible Authentiation Protool(EAP) ", RFC3748, IETF, June 2004 [2] KSethom, HAfifi, "Requirements and Adaptation Solutions for Transparent Handover", IEEE ICC 2004 [3] KSethom Et al, "A Distributed and Seured Arhiteture to Enhane Smooth Handoffs in Wide Area Wireless IP Infrastrutures", ACM SIMOBILE Mobile Computing and ommuniations Review, Volume 10, Number 3, July 2006 [4] V Narayanan, L Dondeti, "EAP Extensions for EAP Reauthentiation Protool (ERP) ", IETF, draft-ietfhoey-erx-08, November 2007 [5] Institute of Eletrial and Eletronis Engineers, "Supplement to Standard for Teleommuniations and Information Exhange Between Systems - LAN/MAN Speifi Requirements - Part 11: Wireless LAN Medium Aess Control (MAC) and Physial Layer (PHY) Speifiations: Speifiation for Enhaned Seurity", IEEE 80211i/D1, 2001 [6] Y Ohba, "EAP Pre-authentiation Problem Statement", IETF, draft-ietf-hoey-preauth-ps-00, September 2007 [7] Institute of Eletrial and Eletronis Engineers, "Reommended Pratie for Multi-Vendor Aess Point Interoperability via an Inter-Aess Point Protool Aross Distribution Systems Supporting IEEE Operation", IEEE 80211F, July 2003 (now depreated) [8] R Housley, B Aboba, "uidane for Authentiation, Authorization, and Aounting (AAA) Key Management", IETF, RFC4962, July 2007 [9] SEC, "Ellipti Curve Cryptography", SEC 1, 2000 [10] avin Lowe, Breaing and fixing the Needham- Shroeder publi-ey protool using FDR In Proeeedings of taas, volume 1055 of Leture Notes in Computer Siene, Springer Verlag, 1996 [11] M Nahiri and Y Ohba, "Derivation, delivery and management of EAP based eys for handover and reauthentiation", IETF, draft-ietf-hoey-ey-mgm-01, November 2007 [12] N Koblitz, "Ellipti urve ryptosystems", MathComp, 48, 1987 [13] MDormale, "Low-Cost Ellipti Curve Digital Signature Coproessor for Smart Cards", IEEE ASAP, 2006 [14] P Eronen, Et Al, "Diameter Extensible Authentiation Protool (EAP) Appliation", IETF RFC4072, August 2005 [15] J Salowey, Et Al, "Speifiation for the Derivation of Root Keys from an Extended Master Session Key (EMSK) ", IETF, draft-ietf-hoey-ems-hierarhy-03, January 2008 [16] Praveen Dongara, T N Viayumar, "Aelerating Private-Key Cryptography via Multithreading on Symmetri Multiproessors", IEEE ISPASS, 2003 [17] Madid Nahiri & Mahsa Nahiri, "AAA and networ seurity for mobile aess", WILEY, 2005 [18] H Orman, P Hoffman, "Determining Strengths For Publi Keys Used For Exhanging Symmetri Keys", IETF, RFC3766, April
8 Journal of Convergene Information Tehnoy Volume 4, Number 3, September 2009 [19] B Aboba and D Simon, "PPP EAP TLS Authentiation Protool", IETF, RFC2716, Otober 1999 [20] International Communiation Union, "eneral Charateristis of International Telephone Connetions and International Telephone Ciruits", ITU-T114, 1988 [21] Arunesh Mishra, Minho Shin, and William Arbaugh, "An Empirial Analysis of the IEEE MAC Layer Handoff Proess", ACM Computer Communiation Review, vol 33, Apr 2003 [22] Fabrega F J T, Herzog J C, uttman J D "St rand spaes : Proving seurity protools orret", Journal of Computer Seurity,
A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More information- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.
- 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationFast Elliptic Curve Algorithm of Embedded Mobile Equipment
Send Orders for Reprints to reprints@benthamsiene.net 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian
More informationUplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks
62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationThe comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol
The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol Seema Mehla Computer Department N.C.College of Engineering Panipat, India Bhawna Gupta Computer Department N.C.College
More informationAnalyzing EAP TLS & ERP Protocol with Varying Processor Speed
Analyzing EAP TLS & ERP Protocol with Varying Processor Speed Bhawna Gupta N.C.College of Engineering Israna (Panipat) Seema Mehla N.C.College of Engineering Israna (Panipat) ABSTRACT Extensible Authentication
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationCOST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY
COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary
More informationMulti-Channel Wireless Networks: Capacity and Protocols
Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:
More informationComputing Pool: a Simplified and Practical Computational Grid Model
Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationCOSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems
COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems Andreas Brokalakis Synelixis Solutions Ltd, Greee brokalakis@synelixis.om Nikolaos Tampouratzis Teleommuniation
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationRAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationCA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5
Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationPBFT: A Byzantine Renaissance. The Setup. What could possibly go wrong? The General Idea. Practical Byzantine Fault-Tolerance (CL99, CL00)
PBFT: A Byzantine Renaissane Pratial Byzantine Fault-Tolerane (CL99, CL00) first to be safe in asynhronous systems live under weak synhrony assumptions -Byzantine Paos! The Setup Crypto System Model Asynhronous
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationCA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1
Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,
More informationCA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1
Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationCA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5
Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationMulti-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks
Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationMethods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems
Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationEpisode 12: TCP/IP & UbiComp
Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,
More informationThe AMDREL Project in Retrospective
The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationImproved flooding of broadcast messages using extended multipoint relaying
Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia
More informationFine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations
Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability
More informationDoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay
DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at
More informationA PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS
INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, 3, Number 1, 3, Pages 1-22 365-382 2007 Institute for Sientifi Computing and Information A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE
More informationDynamic Backlight Adaptation for Low Power Handheld Devices 1
Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &
More informationHigh-level synthesis under I/O Timing and Memory constraints
Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,
More informationAutomated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.
EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationA Lightweight Intrusion-Tolerant Overlay Network
A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br
More informationCA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0
Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationTHROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC
THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University
More informationDiscovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013 289 Disovery and Verifiation of Neighbor Positions in Mobile Ad Ho Networks Maro Fiore, Member, IEEE, Claudio Ettore Casetti, Member,
More informationMake your process world
Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationA Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationThis fact makes it difficult to evaluate the cost function to be minimized
RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationTackling IPv6 Address Scalability from the Root
Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat
More informationVerifying Interaction Protocol Compliance of Service Orchestrations
Verifying Interation Protool Compliane of Servie Orhestrations Andreas Shroeder and Philip Mayer Ludwig-Maximilians-Universität Münhen, Germany {shroeda, mayer}@pst.ifi.lmu.de Abstrat. An important aspet
More informationCA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1
Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.
More informationIntra- and Inter-Stream Synchronisation for Stored Multimedia Streams
IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationModel Based Approach for Content Based Image Retrievals Based on Fusion and Relevancy Methodology
The International Arab Journal of Information Tehnology, Vol. 12, No. 6, November 15 519 Model Based Approah for Content Based Image Retrievals Based on Fusion and Relevany Methodology Telu Venkata Madhusudhanarao
More informationCA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0
Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationNew Channel Allocation Techniques for Power Efficient WiFi Networks
ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationPROJECT PERIODIC REPORT
FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise
More informationCA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3
Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationCA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1
Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationCooperative Coverage Extension for Relay-Union Networks
1.119/TPDS.214.23821, IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao
More informationBoundary Correct Real-Time Soft Shadows
Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk
More informationASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY
Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 00 Proeedings Amerias Conferene on Information Systems (AMCIS) Deember 00 ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY Huseyin
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationArchitecture and Performance of the Hitachi SR2201 Massively Parallel Processor System
Arhiteture and Performane of the Hitahi SR221 Massively Parallel Proessor System Hiroaki Fujii, Yoshiko Yasuda, Hideya Akashi, Yasuhiro Inagami, Makoto Koga*, Osamu Ishihara*, Masamori Kashiyama*, Hideo
More informationTest Case Generation from UML State Machines
Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationSVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections
SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty
More informationCA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2
CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For
More informationDetection of RF interference to GPS using day-to-day C/No differences
1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationDetecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry
Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org
More informationAnnouncements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core
Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,
More informationINTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS
Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal
More information