- Peer-to-Peer Network Technologies
- Access Control and Trust
- Network Security and Intrusion Detection
- Cryptography and Data Security
- Advanced Wireless Communication Techniques
- Distributed systems and fault tolerance
- Advanced Database Systems and Queries
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Physical Unclonable Functions (PUFs) and Hardware Security
- Security and Verification in Computing
- Caching and Content Delivery
- Wireless Communication Networks Research
- Internet Traffic Analysis and Secure E-voting
- Data Management and Algorithms
- Network Traffic and Congestion Control
- Advanced Queuing Theory Analysis
- Cryptographic Implementations and Security
- Cloud Computing and Resource Management
- Chaos-based Image/Signal Encryption
- Complex Network Analysis Techniques
- Human Mobility and Location-Based Analysis
- Mobile Agent-Based Network Management
- Advanced Data Storage Technologies
- Coding theory and cryptography
IBM (United States)
2006-2016
IBM Research - Thomas J. Watson Research Center
2001-2016
Massachusetts Institute of Technology
2010
Pohang University of Science and Technology
2006
University of Illinois Urbana-Champaign
2000-2002
The increasing ability to track and collect large amounts of data with the use current hardware technology has lead an interest in development mining algorithms which preserve user privacy. A recently proposed technique addresses issue privacy preservation by perturbing reconstructing distributions at aggregate level order perform mining. This method is able retain while accessing information implicit original attributes. distribution reconstruction process naturally leads some loss...
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower cost structure. This poses a significant security risk for ICs used critical military and business applications. Attackers can exploit this loss of control substitute Trojan genuine ones or insert circuit into the design mask fabrication. We show that technique borrowed from side-channel cryptanalysis be mitigate problem. Our approach uses noise modeling construct set fingerprints/or an...
There has been an increasing interest in providing high data-rate services such as video-conferencing, multimedia Internet access and wide area network over wideband wireless channels. Wideband channels available the PCS band (2 GHz) have envisioned to be used by mobile (high Doppler) stationary (low units a variety of delay spread profiles. This is challenging task, given limited link budget severity environment, calls for development novel robust bandwidth efficient techniques which work...
With the increasing disintegration of design and manufacturing chain our microelectronic products, we should not only worry about including unintentional, unwanted hardware features (“bugs”), but also intentional malicious features: “Trojan Horses,”which act as spies or terrorists. This article provides an overview Trojans countermeasures.
In this correspondence, we show that the problem of designing efficient multiple-antenna signal constellations for fading channels can be related to finding packings with large minimum distance in complex Grassmannian space. We describe a numerical optimization procedure good space and report best found by procedure. These improve significantly upon previously known results.
This article provides an overview of the Policy Management for Autonomic Computing (PMAC) platform, and shows how it can be used management networked systems. We present policy information model adopted by PMAC system interaction between manager managed resource. also main components creation, storage, evaluation, enforcement, practical applications in networks management.
The paper contains a systematic investigation of practical coding strategies for noncoherent communication over fading channels, guided by explicit comparisons with information-theoretic benchmarks. Noncoherent reception is interpreted as joint data and channel estimation, assuming that the time varying priori unknown. We consider iterative decoding serial concatenation standard binary outer code an inner modulation amenable to detection. For information rate about 1/2 bit per use, proposed...
It is not sufficient to merely check the syntax of new policies before they are deployed in a system; need be analyzed for their interactions with each other and local environment. That is, go through ratification process. We believe policy becomes an essential part system management as number increases administration more decentralized. In this paper, we focus on basic tasks involved ratification. To large degree, these can performed independent model language require little domain-specific...
Recently, many research studies have explored the use of wireless fading to generate an information-theoretic shared secret key over open channel. While this line is now mature enough be built into demonstrative working systems for scenarios involving a (limited) passive/eavesdropping adversary model, case active (jamming) has not been sufficiently studied. Under adversary, information-bits that need exchanged during process setup will only subject eavesdropping, but also message disruptions...
Anonymity services hide user identity at the network or address level but are vulnerable to attacks involving repeated observations of user. Quantifying number required for an attack is a useful measure anonymity.
This research systematically investigates the complicated social dynamics inside Indian culture, with a particular emphasis on intersections of identity, marriage, and caste, using an internet survey as its major instrument. Drawing Peter Berger Thomas Luckmann’s theoretical framework production reality, seeks to explain growing shifts in urban society. The merging caste is still deeply embedded feature culture today. Traditional markers such religion frequently impact position demarcation,...
This paper analyzes phase trajectories and fixed points of the turbo decoding algorithm as a function signal-to-noise ratio (SNR). By exploiting large length codes, is treated single-parameter dynamical system, parameterized (approximately) by SNR. parameterization, along "with" extensive simulations at practical SNRs asymptotic analysis SNR goes to zero infinity, used subdivide entire range into three regions with "waterfall region" in middle. The has distinctive convergence properties...
We present a detailed analysis of generalized minimum distance (GMD) decoding algorithms for Euclidean space codes. In particular, we completely characterize GMD regions in terms receiver front-end properties. This characterization is used to show that have intricate geometry. prove although these are polyhedral, they essentially always nonconvex. furthermore conventional performance parameters, such as error-correction radius and effective error coefficient, do not capture the essential...
In recent years, the problem of indexing mobile objects has assumed great importance because its relevance to a wide variety applications. Most previous results in this area have proposed schemes for with linear trajectories one or two dimensions. paper, we present methods nonlinear trajectories. Specifically, identify useful condition called convex hull property and show that any trajectory satisfying can be indexed by storing careful representation these traditional index structure. Since...
The MIX technique forms the basis of many popular services that offer anonymity communication in open and shared networks such as Internet. In this paper, fundamental limits on provided by are found considering two different settings. First, we consider an information theoretic setting to determine extent inherent observations traffic passing through MIX. We show if size sender sets is less than total user population, contained sufficient deduce all relationships between senders receivers...
As businesses continue to grow their World Wide Web presence, it is becoming increasingly vital for them have quantitative measures of the client perceived response times web services. We present Certes (CliEnt Response Time Estimated by Server), an online server-based mechanism servers measure time, as if measured at client. based on a model TCP that quantifies effect connection drops using three simple server-side measurements: drop rate, accept rate and completion rate. The does not...
The deployment of converged services TV, telephony, and Internet access over IP entails a significant initial investment for service providers. This is not only the underlying network infrastructure but also provisioning managing vast data centers needed to provide sophisticated IP-based TV (IPTV) experience, including multiple camera views, live (broadcast) on demand programming, etc., large number viewers. Thus providers need carefully plan manage IPTV maximize return-on-investment while...
The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (simple language for CIM) that complies with the CIM (common information model) Policy Model and fully incorporates constructs. Currently, standards from distributed management task force (DMTF) include model, but there is no satisfactory way to render model. has been defined purpose. Second, address design implementation issues languages in general, particular. was inspired by our previous...
The problem of tracking end-to-end service-level transactions in the absence instrumentation support is considered. transaction instances progress through a state-transition model and generate time-stamped footprints on entering each state model. goal to track individual using these even when may not contain any tokens uniquely identifying that generated them. Assuming semi-Markov process for transitions, are tracked probabilistically by matching them available according maximum likelihood...
Historically, storage has been directly connected to servers for fast local access and easy configuration. In recent years, area networks (SANs) have defined an alternative paradigm that allows be shared among using interconnects. One of the key challenges SAN management is large number configuration problems are encountered in a typical deployment. These can addressed by software. However, hard-coding rules into software not viable option since it possible easily modify or replace old...