Purdue Federal Credit Union
Displaying 1-40 of 77 results
-
Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing
The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towar...
Provided By Purdue Federal Credit Union
-
Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids
A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in...
Provided By Purdue Federal Credit Union
-
Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring
As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power ...
Provided By Purdue Federal Credit Union
-
Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance
Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust...
Provided By Purdue Federal Credit Union
-
Secure Information Sharing in Digital Supply Chains
Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be...
Provided By Purdue Federal Credit Union
-
On the Impact of Packet Spraying in Data Center Networks
Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load...
Provided By Purdue Federal Credit Union
-
A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs
Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communicat...
Provided By Purdue Federal Credit Union
-
Outsourcing Privacy-Preserving Social Networks to a Cloud
In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an im...
Provided By Purdue Federal Credit Union
-
Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control
The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small numbe...
Provided By Purdue Federal Credit Union
-
Scalable Multimedia Disk Scheduling
A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with diffe...
Provided By Purdue Federal Credit Union
-
Continuous Query Processing in Spatio-Temporal Databases
In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing...
Provided By Purdue Federal Credit Union
-
An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints
A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS param...
Provided By Purdue Federal Credit Union
-
Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services
Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mec...
Provided By Purdue Federal Credit Union
-
Spatio-Temporal Access Methods
The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location...
Provided By Purdue Federal Credit Union
-
SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases
Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In th...
Provided By Purdue Federal Credit Union
-
Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties
The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exis...
Provided By Purdue Federal Credit Union
-
A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking
Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solve...
Provided By Purdue Federal Credit Union
-
High Accuracy Attack Provenance Via Binary-Based Execution Partition
An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by an...
Provided By Purdue Federal Credit Union
-
Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation
In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the pl...
Provided By Purdue Federal Credit Union
-
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks
Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly d...
Provided By Purdue Federal Credit Union
-
Is an MRM Tool Right for Your Marketing Department?
Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, ...
Provided By Purdue Federal Credit Union
-
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states ...
Provided By Purdue Federal Credit Union
-
Detecting the Unintended in BGP Policies
Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These r...
Provided By Purdue Federal Credit Union
-
Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models
Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most...
Provided By Purdue Federal Credit Union
-
Optimal Node Placement in Underwater Wireless Sensor Networks
Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via ac...
Provided By Purdue Federal Credit Union
-
Programming Model Support for Dependable, Elastic Cloud Applications
An attractive approach to leveraging the ability of cloud-computing platforms to provide resources on demand is to build elastic applications, which can scale up or down based on resource requirements...
Provided By Purdue Federal Credit Union
-
ABHRANTA: Locating Bugs that Manifest at Large System Scales
A key challenge in developing large scale applications (both in system size and in input size) is finding bugs that are latent at the small scales of testing, only manifesting when a program is deploy...
Provided By Purdue Federal Credit Union
-
Inter-Session Network Coding Schemes for Two Unicast Sessions With Sequential Hard Deadline Constraints
The emerging wireless media delivery services have placed greater demands for wireless networks to support high-throughput applications while minimizing the delay of individual packets. In this paper,...
Provided By Purdue Federal Credit Union
-
Privacy Vulnerability of Published Anonymous Mobility Traces
In this paper, the authors investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a vi...
Provided By Purdue Federal Credit Union
-
An End-to-End Security Auditing Approach for Service Oriented Architectures
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new s...
Provided By Purdue Federal Credit Union
-
On Hashing Graphs
Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-systems. Use of graph-structured data models are on the rise - in graph databases, representation of biol...
Provided By Purdue Federal Credit Union
-
On the Error-Prone Substructures for the Binary-Input Ternary-Output Channel and Its Corresponding Exhaustive Search Algorithm
The error floor performance of a Low-Density ParityCheck (LDPC) code is highly related to the presence of ErrorProne Substructures (EPSs). In general, existing characterizations of the EPSs are inspir...
Provided By Purdue Federal Credit Union
-
Extended Abstract: Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks
The authors study the problem of privacy protection of openly published mobility traces of people and other real-world entities, beyond standard protection techniques of anonymization and spatial/temp...
Provided By Purdue Federal Credit Union
-
Split Null Keys: A Null Space Based Defense for Pollution Attacks in Wireless Network Coding
Recent work in defending against pollution attacks for intra-flow network coding systems proposed a null spaces based algebraic approach which has a smaller computation cost than previous pollution de...
Provided By Purdue Federal Credit Union
-
Dynamic Activation Policies for Event Capture with Rechargeable Sensors
In this paper, the authors first consider the single-sensor problem. Using dynamic control theory, they consider a full-information model in which, independent of its activation schedule, the sensor w...
Provided By Purdue Federal Credit Union
-
The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability
The authors conduct a detailed simulation study to examine how localizing P2P traffic within network boundaries impacts the profitability of an ISP. A distinguishing aspect of their work is the focus ...
Provided By Purdue Federal Credit Union
-
Securing Virtual Coordinates by Enforcing Physical Laws
Virtual Coordinate Systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying on node cooperation. W...
Provided By Purdue Federal Credit Union
-
Joint Optimization of Relay Selection and Power Allocation in Cooperative OFDM Networks With Imperfect Channel Estimation
The authors consider the wireless relay network in which a base station communicates with multiple subscribers, each of which has the ability to act as a relay to forward information to a base station...
Provided By Purdue Federal Credit Union
-
The TCP Outcast Problem: Exposing Unfairness in Data Center Networks
In this paper, the authors observe that bandwidth sharing via TCP in commodity data center networks organized in multi-rooted tree topologies can lead to severe unfairness, which they term as the TCP ...
Provided By Purdue Federal Credit Union
-
Exercises for Graduate Students Using GENI
GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. The authors propose programming exercises for graduate students to introduce GE...
Provided By Purdue Federal Credit Union
-
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
The proliferation of peer-to-peer systems has led to the increasing deployment of dynamic, adaptive overlay networks that are designed to preserve application performance goals. While such networks pr...
Provided By Purdue Federal Credit Union
-
Securing Virtual Coordinates by Enforcing Physical Laws
Virtual Coordinate Systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying on node cooperation. W...
Provided By Purdue Federal Credit Union
-
Key Agreement for Wireless Networks in the Presence of Active Adversaries
In this paper, the authors consider key agreement in a distributed wireless network in which adversarial nodes may exist in the network. Two practical scenarios are studied, i.e., path-key establishme...
Provided By Purdue Federal Credit Union
-
On the Error-Prone Substructures for the Binary-Input Ternary-Output Channel and Its Corresponding Exhaustive Search Algorithm
The error floor performance of a Low-Density ParityCheck (LDPC) code is highly related to the presence of ErrorProne Substructures (EPSs). In general, existing characterizations of the EPSs are inspir...
Provided By Purdue Federal Credit Union
-
Joint Optimization of Relay Selection and Power Allocation in Cooperative OFDM Networks With Imperfect Channel Estimation
The authors consider the wireless relay network in which a base station communicates with multiple subscribers, each of which has the ability to act as a relay to forward information to a base station...
Provided By Purdue Federal Credit Union
-
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coo...
Provided By Purdue Federal Credit Union
-
Infection Quarantining for Wireless Networks Using Power Control
In recent years, malware has proliferated into wireless LANs as these networks have grown in popularity and prevalence. While the actual effects of malware-related network traffic has been studied ext...
Provided By Purdue Federal Credit Union
-
Exploiting Overlays for Practical and Profitable Traffic Attraction
The Internet is heading towards efficiency with the continued deployment of technologies such as Content Distribution Networks (CDN) and with the introduction of Peer-To-Peer (P2P) localization. These...
Provided By Purdue Federal Credit Union
-
A Secure Group Key Management Scheme for Wireless Cellular Systems
The multicast protocol used in wired networks does not perform well in wireless networks because multicast structures are fragile as the mobile node moves and connectivity changes. When the authors ch...
Provided By Purdue Federal Credit Union
-
A Dynamic Data Middleware Cache for Rapidly-Growing Scientific Repositories
Modern scientific repositories are growing rapidly in size. Scientists are increasingly interested in viewing the latest data as part of query results. Current scientific middleware cache systems, how...
Provided By Purdue Federal Credit Union
-
Developing Attack Defense Ideas for Ad Hoc Wireless Networks
Ad hoc networks are natively cooperative systems in the sense that their nodes have to relay data to one another. The inherent drawback of this scheme is that it renders these networks susceptible to ...
Provided By Purdue Federal Credit Union
-
Precise, Scalable, and Online Request Tracing for Multi-Tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administrators need a request...
Provided By Purdue Federal Credit Union
-
Secure Information Sharing in Digital Supply Chains
Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be...
Provided By Purdue Federal Credit Union
-
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks
Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly d...
Provided By Purdue Federal Credit Union
-
An End-to-End Security Auditing Approach for Service Oriented Architectures
Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new s...
Provided By Purdue Federal Credit Union
-
A Mobile-Cloud Pedestrian Crossing Guide for the Blind
The ability to detect the status of pedestrian signals at street intersections is a critical aspect of safe outdoor navigation for the blind and visually-impaired, especially in unfamiliar environment...
Provided By Purdue Federal Credit Union
-
Privacy in Cloud Computing Through Identity Management
The migration of web applications to cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tok...
Provided By Purdue Federal Credit Union
-
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity
The difficulty associated with breaching an enterprise net-work is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker ...
Provided By Purdue Federal Credit Union
-
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to Service Providers (SPs) in order to use their services. An entity provides Personally Identifiable Information (PII) that uniquely i...
Provided By Purdue Federal Credit Union
-
Cloud Computing Infrastructure Robustness: A Game Theory Approach
A cloud computing infrastructure typically consists of a number of sites that house servers and are connected to the Internet. Its operation critically depends both on cyber components, including serv...
Provided By Purdue Federal Credit Union
-
Network Security for Virtual Machine in Cloud Computing
Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on-demand resources and services over the Internet. Undoubtedly, one of the significa...
Provided By Purdue Federal Credit Union
-
Process Implanting: A New Active Introspection Framework for Virtualization
Previous research on virtual machine introspection proposed "Out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "In-the-box" approa...
Provided By Purdue Federal Credit Union
-
Is an MRM Tool Right for Your Marketing Department?
Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, ...
Provided By Purdue Federal Credit Union
-
Exploring the Synergy Between Link Correlation and Network Coding for Energy-Efficient Flooding in Wsns
Flooding of messages is a fundamental operation in wireless sensor networks which requires special attention to achieve communication efficiency and reliability. The existing works are dominated by AC...
Provided By Purdue Federal Credit Union
-
VSlicer: Latency-Aware Virtual Machine Scheduling Via Differentiated-Frequency CPU Slicing
Recent advances in virtualization technologies have made it feasible to host multiple Virtual Machines (VMs) in the same physical host and even the same CPU core, with fair share of the physical resou...
Provided By Purdue Federal Credit Union
-
High Accuracy Attack Provenance Via Binary-Based Execution Partition
An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by an...
Provided By Purdue Federal Credit Union
-
Outsourcing Privacy-Preserving Social Networks to a Cloud
In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an im...
Provided By Purdue Federal Credit Union
-
VNsnap: Taking Snapshots of Virtual Networked Environments With Minimal Downtime
A Virtual Networked Environment (VNE) consists of Virtual Machines (VMs) connected by a virtual network. It has been adopted to create "Virtual infrastructures" for individual users on a shared cloud ...
Provided By Purdue Federal Credit Union
-
Capacity of 1-to-K Broadcast Packet Erasure Channels With Channel Output Feedback
In the last decade, the new network coding concept has emerged, which focuses on achieving the capacity of a communication network. More explicitly, the network-coding-based approaches generally model...
Provided By Purdue Federal Credit Union
-
A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation
Context-awareness is a critical aspect of safe navigation, especially for the blind and visually-impaired in unfamiliar environments. Existing mobile devices for context-aware navigation fall short in...
Provided By Purdue Federal Credit Union
-
Scalable Multimedia Disk Scheduling
A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with diffe...
Provided By Purdue Federal Credit Union
-
Continuous Query Processing in Spatio-Temporal Databases
In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing...
Provided By Purdue Federal Credit Union
-
The TCP Outcast Problem: Exposing Unfairness in Data Center Networks
In this paper, the authors observe that bandwidth sharing via TCP in commodity data center networks organized in multi-rooted tree topologies can lead to severe unfairness, which they term as the TCP ...
Provided By Purdue Federal Credit Union
-
Context-Based Routing: Techniques, Applications and Experience
Routing protocols in multi-hop networks typically find low cost paths by modeling the cost of a path as the sum of the costs on the constituting links. However, the insufficiency of this approach beco...
Provided By Purdue Federal Credit Union
-
Inter-Session Network Coding Schemes for Two Unicast Sessions With Sequential Hard Deadline Constraints
The emerging wireless media delivery services have placed greater demands for wireless networks to support high-throughput applications while minimizing the delay of individual packets. In this paper,...
Provided By Purdue Federal Credit Union
-
Spatio-Temporal Access Methods: Part 2 (2003 - 2010)
In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving...
Provided By Purdue Federal Credit Union
-
An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints
A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS param...
Provided By Purdue Federal Credit Union
-
Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services
Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mec...
Provided By Purdue Federal Credit Union
-
Spatio-Temporal Access Methods
The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location...
Provided By Purdue Federal Credit Union
-
Network Coding: Theory and Reality
Recent research in the domain of network coding has promised a complete paradigm shift for wired and wireless networks. In case of wired networks, improvements in the network capacity especially magni...
Provided By Purdue Federal Credit Union