Parallel and Distributed Computing Systems (ISCA), 2007
A method of therapeutically administering benzodiazepines by the intraoral, i.e. sublingual or bu... more A method of therapeutically administering benzodiazepines by the intraoral, i.e. sublingual or buccal route is disclosed.
Ensuring a decent Quality of Experience (QoE) is fundamental for service providers, in particular... more Ensuring a decent Quality of Experience (QoE) is fundamental for service providers, in particular mobile networks operators, when designing their current and future connectivity solutions. With this aim in view, they are compelled to cope with potential QoE detractors such as Inter-Cell Interference (ICI) which is expected to be a liability with a foreseen network densification. This issue was anticipated in Long Term Evolution (LTE) networks and many solutions leveraging cooperation schemes between the access nodes to alleviate the ICI’s effects can be found in the literature, notably for uplink (UL) transmissions which pose a greater challenge. Among the cooperative models dealing with UL ICI, Joint Detection (JD) is particularly interesting since it promises substantial throughput gains while maintaining a high spectral efficiency. However, its practical feasibility is still unclear. In the following work, we propose a platform gathering a set of architectural, functional and technical requirements to endow realistic LTE networks with JD capabilities.
Checkpointing-Aided Parallel Execution (CAPE) is a framework that is based on checkpointing techn... more Checkpointing-Aided Parallel Execution (CAPE) is a framework that is based on checkpointing technique and serves to automatically translates and execute OpenMP programs on distributed-memory architectures. In some comparisons with MPI, CAPE have demonstrated high-performance and the potential for fully compatibility with OpenMP on distributed-memory systems. However, it should be continued to improve the performance, flexibility, portability and capability. This paper presents the new execution model for CAPE that improves its performance and makes CAPE even more flexible.
In order to secure RFID systems as much as possible, most solutions do not only require tags to a... more In order to secure RFID systems as much as possible, most solutions do not only require tags to authenticate themselves to readers, but they also require readers to authenticate themselves to tags to avoid identity theft. Many solutions have tried to cope with this mutual authentication problem. In this article, we present an original lightweight mutual authentication protocol which requires only two messages and does not use complex cryptographic functions.
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Dec 1, 2019
Checkpointing is the technique that saves the images of a process at a point during its lifetime,... more Checkpointing is the technique that saves the images of a process at a point during its lifetime, and allows it to be resumed at the saving’s time if necessary. It can be classified into two types: full checkpointing and incremental checkpointing, in which the second type is based on the memory lock mechanism. This paper aims to present two main memory lock techniques working in both kernel and user space and a performance comparison when applying them in checkpointing for the Checkpointing Aided Parallel Execution (CAPE).
ABSTRACT Wireless body area network (WBAN) is an emerging research field particularly in the area... more ABSTRACT Wireless body area network (WBAN) is an emerging research field particularly in the area of remote health monitoring. For the simple reason that health data are private and sensitive information, securing access and data transmission within a WBAN becomes a critical need. Using certificates requires deploying Public Key Infrastructure (PKI) and Certification Authorities (CA) and their management (control the generation, transmission and revocation) is a cumbersome task unlike identity-based cryptography concept. Considering the heterogeneity between participating tiers in the network, we propose in this paper a hybrid authentication and key agreement scheme where symmetric cryptography is used in sensor/actuator nodes while identity-based cryptography concept is used between smartphone (MN) and the storage site (SS). We present two protocols to authenticate and establish pairwise and group keys between all tiers and to provide a public and private keys for MNs.
Parallel and Distributed Computing Systems (ISCA), 2007
A method of therapeutically administering benzodiazepines by the intraoral, i.e. sublingual or bu... more A method of therapeutically administering benzodiazepines by the intraoral, i.e. sublingual or buccal route is disclosed.
Ensuring a decent Quality of Experience (QoE) is fundamental for service providers, in particular... more Ensuring a decent Quality of Experience (QoE) is fundamental for service providers, in particular mobile networks operators, when designing their current and future connectivity solutions. With this aim in view, they are compelled to cope with potential QoE detractors such as Inter-Cell Interference (ICI) which is expected to be a liability with a foreseen network densification. This issue was anticipated in Long Term Evolution (LTE) networks and many solutions leveraging cooperation schemes between the access nodes to alleviate the ICI’s effects can be found in the literature, notably for uplink (UL) transmissions which pose a greater challenge. Among the cooperative models dealing with UL ICI, Joint Detection (JD) is particularly interesting since it promises substantial throughput gains while maintaining a high spectral efficiency. However, its practical feasibility is still unclear. In the following work, we propose a platform gathering a set of architectural, functional and technical requirements to endow realistic LTE networks with JD capabilities.
Checkpointing-Aided Parallel Execution (CAPE) is a framework that is based on checkpointing techn... more Checkpointing-Aided Parallel Execution (CAPE) is a framework that is based on checkpointing technique and serves to automatically translates and execute OpenMP programs on distributed-memory architectures. In some comparisons with MPI, CAPE have demonstrated high-performance and the potential for fully compatibility with OpenMP on distributed-memory systems. However, it should be continued to improve the performance, flexibility, portability and capability. This paper presents the new execution model for CAPE that improves its performance and makes CAPE even more flexible.
In order to secure RFID systems as much as possible, most solutions do not only require tags to a... more In order to secure RFID systems as much as possible, most solutions do not only require tags to authenticate themselves to readers, but they also require readers to authenticate themselves to tags to avoid identity theft. Many solutions have tried to cope with this mutual authentication problem. In this article, we present an original lightweight mutual authentication protocol which requires only two messages and does not use complex cryptographic functions.
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), Dec 1, 2019
Checkpointing is the technique that saves the images of a process at a point during its lifetime,... more Checkpointing is the technique that saves the images of a process at a point during its lifetime, and allows it to be resumed at the saving’s time if necessary. It can be classified into two types: full checkpointing and incremental checkpointing, in which the second type is based on the memory lock mechanism. This paper aims to present two main memory lock techniques working in both kernel and user space and a performance comparison when applying them in checkpointing for the Checkpointing Aided Parallel Execution (CAPE).
ABSTRACT Wireless body area network (WBAN) is an emerging research field particularly in the area... more ABSTRACT Wireless body area network (WBAN) is an emerging research field particularly in the area of remote health monitoring. For the simple reason that health data are private and sensitive information, securing access and data transmission within a WBAN becomes a critical need. Using certificates requires deploying Public Key Infrastructure (PKI) and Certification Authorities (CA) and their management (control the generation, transmission and revocation) is a cumbersome task unlike identity-based cryptography concept. Considering the heterogeneity between participating tiers in the network, we propose in this paper a hybrid authentication and key agreement scheme where symmetric cryptography is used in sensor/actuator nodes while identity-based cryptography concept is used between smartphone (MN) and the storage site (SS). We present two protocols to authenticate and establish pairwise and group keys between all tiers and to provide a public and private keys for MNs.
Uploads
Papers