- Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايينhttps://sites.google.com/
site/netlist2scheme/ - Cool Teen Buddy
https://sites.google.com/site/coolteenbuddy/ - Diman Zad-Tootaghaj 's Academic WebsiteDiman Zad-Tootaghaj 's Academic Website سایت گوگل دیمن زاد توت آغاجhttps://sites.google.com/
site/dimantootaghaj/ - Eigenvalues-based Steganalysis
https://sites.google.com/site/eigenvaluesbasedsteganalysis/ - FARHATفرحتhttps://sites.
google.com/site/farhat83site/ - Farsheed FarhatFarshiid Farsheed Farshead Farshied Farsheid Farshyd فرشید فرشيد فرحت فرهت فرحط فرهطhttps://sites.google.com/
site/farsheed83/ - Farshid Farhat 's Google-Pageصفحه گوگل فرشيد فرحتhttps://sites.google.com/
site/farshidfarhat2/ - Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhathttps://sites.google.
com/site/farshidfarhat/ - frash downloads
https://sites.google.com/site/frashdownloads/ - frashpix
https://sites.google.com/site/frashpix/ - Game Theoretic Network SimulatorGame Theory Network Simulator Game Strategies in Network Security Simulation by Visual C++https://sites.google.com/
site/ gametheoreticnetworksimulator/ - Multi-Dimensional Correlated SteganalysisMulti-Dimensional Correlated Steganalysis (MDCS) Multi-Dimensional Correlation (MDC) Steganalysis by Dimensional Cross Correlationhttps://sites.
google.com/site/ mdimcorrsteganalysis/ - Optical CDMA Network Simulator
https://sites.google.com/site/opticalcdmanetworksimulator/ - Sharif Students 79دانشجویان شریف ورودی سال 1379https://sites.google.com/
site/sharifstudents79/ - Sharif Students Servicesسرویس های فن آوری اطلاعات توسط دانشجویان شریفhttps://sites.google.com/
site/sharifstudentsservices/ - Student Branch of Iranian Society of CryptologyStudent Branch of Iranian Society of Cryptology at Sharif University of Technologyhttps://sites.
google.com/site/sbisc4sharif/ - Wireless Mobile Adhoc Network Simulatorشبیه ساز شبکه ادهاکhttps://sites.google.com/
site/wmanetsecsim/ - آموزشگاه موسیقی نوای سه گاهآدرس: تهران، نارمک، بالاتر از میدان هفت حوض، ضلع شمال شرقی چهارراه سرسبز، جنب موسسه ملی زبان (دختران)، ساختمان عتیق، پلاک 11. تلفن: 77805234-021https://sites.
google.com/site/navayesegah/ - سایت گوگل فرشيد فرحتسایت گوگل فرشيد فرحتhttps://sites.google.com/
site/farshid83site/ - شاخه دانشجویي انجمن رمز ایران در دانشگاه صنعتی شریفشاخه دانشجوئی انجمن رمز ایران در دانشگاه صنعتی شریفhttps://sites.google.com/
site/sbisc4sut/ - فراامنیتمدیریت حل سیستم فراتر از امنیتhttps://sites.google.com/
site/xtra4security/
Wednesday, November 8, 2017
Sites.Google.Com
Friday, October 20, 2017
System and methods for UICC-based secure communication
System and methods for uicc-based secure communication US 20150222631 A1
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.
SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION 20150222631
Monday, October 16, 2017
Automatic Rating for Photo Aesthetics
Aesthetic Rating for Photos
Tuesday, October 10, 2017
Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Saturday, September 30, 2017
Modeling and Optimization of MapReduce
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate scheduling can degrade the overall performance. We analytically capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system, and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property investigated for different types of inter-arrival and service time distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.
[Tech Report] [Master Thesis] [IEEE Trans]
Last version > MapReduce_Performance_Optimization
Friday, September 22, 2017
PIAKAP
Authentication and Key Agreement Protocol in 4G
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses of the previous frameworks suggested for the UMTS AKA protocol. After that we propose a new protocol called private identification, authentication, and key agreement protocol (PIAKAP), for UMTS mobile network. Our suggested protocol combines identification and AKA stages of UMTS AKA protocol while eliminates disadvantages of related works and brings some new features to improve the UMTS AKA mechanism. These features consist of reducing the interactive rounds of the UMTS AKA with security mode setup and user privacy establishment.
ePrint, Research, Security and tagged Ahmad Salahi, Authentication, Identification, Key Agreement, Mobile Network, PIAKAP, Privacy, Security Protocol, Somayeh Salimi, UMTS on .