-
Optimal Offline and Competitive Online Strategies for Transmitter-Receiver Energy Harvesting
Authors:
Siddhartha Satpathi,
Rushil Nagda,
Rahul Vaze
Abstract:
A joint transmitter-receiver energy harvesting model is considered, where both the transmitter and receiver are powered by (renewable) energy harvesting source. Given a fixed number of bits, the problem is to find the optimal transmission power profile at the transmitter and ON-OFF profile at the receiver to minimize the transmission time. With infinite capacity at both the transmitter and receive…
▽ More
A joint transmitter-receiver energy harvesting model is considered, where both the transmitter and receiver are powered by (renewable) energy harvesting source. Given a fixed number of bits, the problem is to find the optimal transmission power profile at the transmitter and ON-OFF profile at the receiver to minimize the transmission time. With infinite capacity at both the transmitter and receiver, optimal offline and optimal online policies are derived. The optimal online policy is shown to be two-competitive in the arbitrary input case. With finite battery capacities at both ends, only random energy arrival sequence with given distribution are considered, for which an online policy with bounded expected competitive ratio is proposed.
△ Less
Submitted 4 March, 2015; v1 submitted 8 December, 2014;
originally announced December 2014.
-
Optimal Offline and Competitive Online Strategies for Transmitter-Receiver Energy Harvesting
Authors:
Rushil Nagda,
Siddharth Satpathi,
Rahul Vaze
Abstract:
Transmitter-receiver energy harvesting model is assumed, where both the transmitter and receiver are powered by random energy source. Given a fixed number of bits, the problem is to find the optimal transmission power profile at the transmitter and ON-OFF profile at the receiver to minimize the transmission time. Structure of the optimal offline strategy is derived together with an optimal offline…
▽ More
Transmitter-receiver energy harvesting model is assumed, where both the transmitter and receiver are powered by random energy source. Given a fixed number of bits, the problem is to find the optimal transmission power profile at the transmitter and ON-OFF profile at the receiver to minimize the transmission time. Structure of the optimal offline strategy is derived together with an optimal offline policy. An online policy with competitive ratio of strictly less than two is also derived.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
A Security Analysis of Browser Extensions
Authors:
Abhay Rana,
Rushil Nagda
Abstract:
Browser Extensions (often called plugins or addons) are small pieces of code that let developers add additional functionality to the browser. However, with extensions comes a security price: the user must trust the developer. We look at ways in which this trust can be broken and malicious extensions installed. We also look at silent installations of plugins in various browsers and work on ways to…
▽ More
Browser Extensions (often called plugins or addons) are small pieces of code that let developers add additional functionality to the browser. However, with extensions comes a security price: the user must trust the developer. We look at ways in which this trust can be broken and malicious extensions installed. We also look at silent installations of plugins in various browsers and work on ways to make silent installations possible in browsers that work against it. We compare the browser extension mechanism among various browsers, and try to create a set of rules to maintain the principle of least privileges in the browser. We track various plugins and determine whether the least privileges required match with the privileges asked for. We also work on a survey of extensions (for various browsers) and determine the nature of attacks possible. For eg, if a developer account gets hacked, updating of a normal extension with a malicious one is possible. We look at privilege abuse and survey extensions that ask for more privileges than they use. We finally provide a solution and allow a person to check the authenticity of the extension even before they download it.
△ Less
Submitted 13 March, 2014;
originally announced March 2014.