Arizona State University

Displaying 1-40 of 138 results

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Nov 2012

    Optimal Transmission Power Control in the Presence of a Smart Jammer

    Jamming defense is an important yet challenging problem. In this paper, the authors study the jamming defense problem in the presence of a smart jammer, who can quickly learn the transmission power of the user and adaptively adjust its transmission power to maximize the damaging effect. By modeling the problem...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Risk-Aware Day-Ahead Scheduling and Real-Time Dispatch for Plug-In Electric Vehicles

    This paper studies risk-aware day-ahead scheduling and real-time dispatch for plug-in Electric Vehicles (EVs), aiming to jointly optimize the EV charging cost and the risk of the load mismatch between the forecasted and the actual EV loads, due to the random driving activities of EVs. It turns out that the...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Aug 2012

    Bayes Networks for Supporting Query Processing Over Incomplete Autonomous Databases

    As the information available to lay users through autonomous data sources continues to increase, mediators become important to ensure that the wealth of information available is tapped effectively. A key challenge that these information mediators need to handle is the varying levels of incompleteness in the underlying databases in terms...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing

    Mobile phone sensing is a new paradigm which takes advantage of the pervasive Smartphones to collect and analyze data beyond the scale of what was previously possible. In a mobile phone sensing system, the platform recruits Smartphone users to provide sensing service. Existing mobile phone sensing applications and systems lack...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Sensing as a Service: A Cloud Computing System for Mobile Phone Sensing

    Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains such as environmental monitoring, social networking, healthcare, etc. The authors introduce a new concept, Sensing-as-a-Service (S2aaS), i.e., providing sensing services using mobile phones via a cloud computing system. An S2aaS cloud should meet the following...

    Provided By Arizona State University

  • White Papers // Jul 2012

    Distributed CSMA Algorithms for Link Scheduling in Multi-Hop MIMO Networks Under SINR Model

    In this paper, the authors study distributed scheduling in multi-hop MIMO networks. They first develop a "MIMO-pipe" model that provides the upper layers a set of rates and SINR requirements that capture the rate-reliability tradeoff in MIMO communications. The main thrust of this study is then dedicated to developing distributed...

    Provided By Arizona State University

  • White Papers // May 2012

    Detection/Decoding Over Channels With Synchronization Errors and Inter-Symbol Interference

    The authors consider coding schemes over an independent and identically distributed (i.i.d.) insertion/deletion channel with Inter-Symbol Interference (ISI). The idea is based on a serial concatenation of a Low-Density Parity Check (LDPC) code with a marker code. First, they design a Maximum-A-Posteriori (MAP) detector operating at the bit level which...

    Provided By Arizona State University

  • White Papers // Mar 2012

    Decoding Strategies for Physical-Layer Network Coding Over Frequency Selective Channels

    The authors investigate different decoding strategies at the relay over a frequency selective two-way relay channel with Physical-layer Network Coding (PNC). The incorporation of the PNC scheme enables two users exchange information via a relay in two transmission phases. They study two approaches at the relay to decode the XOR...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Game Theory in Cooperative Communications

    Cooperative communication has great potential to improve the wireless channel capacity by exploiting the antennas on wireless devices for spatial diversity. However, applications of cooperative communication are barely seen in reality. A main obstacle blocking its wide applications is the lack of incentives for wireless nodes to participate in cooperative...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Secure Top-K Query Processing Via Untrusted Location-Based Service Providers

    This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, Location-Based Service Providers (LBSPs), and system users. The data collector gathers reviews...

    Provided By Arizona State University

  • White Papers // Dec 2011

    Fault-Tolerant Design of Wireless Sensor Networks With Directional Antennas

    A tree structure is often used in wireless sensor networks to deliver collected sensor data to a sink node. Such a tree can be built using directional antennas as they offer considerable advantage over the omni-directional ones. A tree is adequate for data gathering from all sensor nodes as long...

    Provided By Arizona State University

  • White Papers // Oct 2011

    Ontology-Based Policy Anomaly Management for Autonomic Computing

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Examining Social Dynamics for Countering Botnet Attacks

    Even though promising results have been obtained from existing research on bots and associated command and control channels, there is little research in exploring the ways on how bots are created and distributed by adversaries. Consequently, innovative methods that help determine the linkage between the rogue programs and adversaries are...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Automatic Extraction of Secrets From Malware

    As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal ciphertext data in malware is now critical for malware forensics and cyber-crime analysis. In this paper, the authors present a novel approach...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Online Strategizing Distributed Renewable Energy Resource Access in Islanded Microgrids

    The smart grid, perceived as the next generation power grid, uses two-way flow of electricity and information to create a widely distributed automated energy delivery network. By grouping distributed renewable energy generations and loads, a microgrid, which is seen as one of the cornerstones of the future smart grids, can...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Truthful Auction for Cooperative Communications

    On one hand, cooperative communication has been gaining more and more popularity since it has great potential to increase the capacity of wireless networks. On the other hand, the applications of cooperative communication technology are rarely seen in reality, even in some scenarios where the demands for bandwidth-hungry applications have...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Jun 2011

    OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks

    As promising as it is, cooperative communication has been proposed to increase the capacity of wireless networks through spatial diversity. Without requiring multiple antennas on the same device, spatial diversity is achieved by exploiting the antennas on other nodes, i.e., relay nodes, in the network. Therefore, the selection of relay...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Distributed Stochastic Power Control in Ad-Hoc Networks: A Nonconvex Case

    Utility-based power allocation in wireless ad-hoc networks is inherently non-convex because of the global coupling induced by the co-channel interference. To tackle this challenge, the authors first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the...

    Provided By Arizona State University

  • White Papers // Apr 2011

    Secure Data Processing Framework for Mobile Cloud Computing

    In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices...

    Provided By Arizona State University

  • White Papers // Mar 2011

    LR-Seluge: Loss-Resilient and Secure Code Dissemination In Wireless Sensor Networks

    Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and adding new functionalities in a multi-task sensor...

    Provided By Arizona State University

  • White Papers // Mar 2011

    JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

    Secure neighbor discovery is fundamental to Mobile Ad hoc NETworks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming attack in which the adversary intentionally sends radio signals to prevent...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Lightweight and Informative Traffic Metrics for Data Center Monitoring

    In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. Given the sheer volume of data communications between servers and millions of end users, it becomes a daunting task to continuously monitor the availability, performance and...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Toward Autonomous Vehicle Safety Verification From Mobile Cyber-Physical Systems Perspective

    Safety certification of Autonomous Vehicles (AVs) requires guarantees on AVs' safety at design time. To this effect, this paper proposes modeling abstractions that allow architectural representation of AVs and their surroundings, i.e. representation of different components, and enable safety analysis from such representation without requiring any expertise on formal methods....

    Provided By Arizona State University

  • White Papers // Feb 2011

    Integrating Cooling Awareness With Thermal Aware Workload Placement for HPC Data Centers

    High Performance Computing (HPC) data centers are becoming increasingly dense; the associated power-density and energy consumption of their operation is increasing. Up to half of the total energy is attributed to cooling the data center; greening the data center operations to reduce both computing and cooling energy is imperative. To...

    Provided By Arizona State University

  • White Papers // Feb 2011

    H.264 Coarse Grain Scalable (CGS) and Medium Grain Scalable (MGS) Encoded Video: A Trace Based Traffic and Quality Evaluation

    The Scalable Video Coding (SVC) extension of the H.264/AVC video coding standard provides two mechanisms, namely Coarse Grain Scalability (CGS) and Medium Grain Scalability (MGS), for quality scalable video encoding, which varies the fidelity (signal-to-noise ratio) of the encoded video stream. As H.264/AVC and its SVC extension are expected to...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Enabling Privacy in Provenance Aware Workflow Systems

    A new paradigm for creating and correcting scientific analyzes is emerging, that of provenance-aware workflow systems. In such systems, repositories of workflow specifications and of provenance graphs that represent their executions will be made available as part of scientific information sharing. This will allow users to search and query both...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Performance Bounds for Linear Codes in Multi-Rate Superposition Schemes

    The authors consider unequal error-protection schemes obtained by means of two-level superposition coding. The performance over additive white Gaussian noise channels is investigated for optimal maximum-likelihood decoding as well as for a suboptimal decoding strategy based on interference cancellation. Assuming that linear codes are used, the authors evaluate, for both...

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2010

    Trends and Effects of Energy Proportionality on Server Provisioning in Data Centers

    Cloud is the state-of-the-art back-end infrastructure for most large-scale web services. This paper studies what effect energy proportionality has on the energy savings of cloud data center management, under various equipment compositions and power densities. The authors' findings show that although it is a common expectation that improved energy proportionality...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Oct 2006

    Services and Business Processes

    Despite the efforts of businesses worldwide, legacy enterprise system haves failed to streamline business processes. As a result, companies are implementing their processes with a Service-Oriented Architecture (SOA), which has to potential to resolve many of the issues brought up by inflexible applications. SOA provides a number of advantages to...

    Provided By Arizona State University

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Jul 2008

    Bandwidth-Conserving Multicast VoIP Teleconference System

    Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while remaining at geographically dispersed locations. Teleconferencing increases productivity while reducing travel costs and saving travel time. In a VoIP telephone system, the authors face...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Jan 2009

    Viral Attacks on the DoD Common Access Card (CAC)

    This paper shows that using a DoD CAC on a untrusted workstation can allow a variety of attacks to be performed by malicious software. These attacks range from simple PIN phishing, to more serious attacks such as signatures on unauthorized transactions, authentication of users without consent, unauthorized secure access to...

    Provided By Arizona State University

  • White Papers // Mar 2009

    U.S. Energy Infrastructure Investment: Long-Term Strategic Planning to Inform Policy Development

    With passage of the American Recovery and Reinvestment Act of 2009 signed by President Obama, the U.S. Department of Energy has been given additional resources to advance the development of technologies that will provide a low-carbon supply of energy and will transfer much of the nation's transportation energy supply to...

    Provided By Arizona State University

  • White Papers // Jul 2012

    Distributed CSMA Algorithms for Link Scheduling in Multi-Hop MIMO Networks Under SINR Model

    In this paper, the authors study distributed scheduling in multi-hop MIMO networks. They first develop a "MIMO-pipe" model that provides the upper layers a set of rates and SINR requirements that capture the rate-reliability tradeoff in MIMO communications. The main thrust of this study is then dedicated to developing distributed...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Optimal Transmission Power Control in the Presence of a Smart Jammer

    Jamming defense is an important yet challenging problem. In this paper, the authors study the jamming defense problem in the presence of a smart jammer, who can quickly learn the transmission power of the user and adaptively adjust its transmission power to maximize the damaging effect. By modeling the problem...

    Provided By Arizona State University

  • White Papers // Dec 2011

    Fault-Tolerant Design of Wireless Sensor Networks With Directional Antennas

    A tree structure is often used in wireless sensor networks to deliver collected sensor data to a sink node. Such a tree can be built using directional antennas as they offer considerable advantage over the omni-directional ones. A tree is adequate for data gathering from all sensor nodes as long...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Risk-Aware Day-Ahead Scheduling and Real-Time Dispatch for Plug-In Electric Vehicles

    This paper studies risk-aware day-ahead scheduling and real-time dispatch for plug-in Electric Vehicles (EVs), aiming to jointly optimize the EV charging cost and the risk of the load mismatch between the forecasted and the actual EV loads, due to the random driving activities of EVs. It turns out that the...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Visual Displays of Regression Toward the Mean Using SAS SGplot

    Regression toward the mean is a widespread phenomenon in statistics and may adversely affect researchers' substantive interprettion of findings. Therefore, it is worthwhile to evaluate the extent of regression toward the mean as a part of many applications of regression analysis. One way to assist with such an evaluation is...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Real-Time Behavior Profiling for Network Monitoring

    This paper presents the design and implementation of a real-time behavior profiling system for Internet links. The system uses flow-level information, and applies data mining and information-theoretic techniques to automatically discover significant events based on communication patterns. The paper demonstrates the operational feasibility of the system by implementing it and...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Capacity and Delay Analysis of Next-Generation Passive Optical Networks (NG-PONs)

    Building on the Ethernet Passive Optical Network (EPON) and Gigabit PON (GPON) standards, Next-Generation (NG) PONs provide increased data rates, split ratios, wavelengths counts, and fiber lengths, as well as allow for all-optical integration of access and metro networks. This paper provides a comprehensive probabilistic analysis of the capacity (maximum...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Approximation Algorithm for Avoiding Hotspot Formation of Sensor Networks for Temperature Sensitive Environments

    Sensing and transmission phenomena of an implanted sensor dissipates energy which results in rise in temperature of its surroundings. Simultaneous operation of such multiple active sensors increases the temperature of the surrounding environment causing hotspots. Such hotspots are highly undesirable as they may cause damage to the environment as well...

    Provided By Arizona State University

  • White Papers // Aug 2008

    Developing Service-Based Software Systems With QoS Monitoring and Adaptation

    The rapid adoption of SOA in many large-scale distributed applications requires the development of Adaptive Service-Based Software Systems (ASBS), which have the capability of monitoring the changing system status, analyzing and controlling tradeoffs among multiple QoS features, and adapting its service configuration to satisfy multiple QoS requirements simultaneously. In this...

    Provided By Arizona State University

  • White Papers // Feb 2009

    Work Hard, Live Hard: Six Things Smart Executives Do To Promote Work-Life Harmony & Improve Their Bottom Line

    Smart executives in any industry are concerned with providing an environment for their employees that promotes satisfaction and success. Smart bosses also know that retaining the best employees is key to the stability and profitability of the company. Recent studies show that women and men alike are drawn to and...

    Provided By Arizona State University

  • White Papers // Oct 2010

    Workshop - Designing Signals and Systems Laboratories Using Java-DSP

    The participants of this workshop will be exposed to the utility of the Java-DSP education software in multidisciplinary signal and data analysis applications. The session will be interactive and participants will use and assess an exercise that involves step-by-step online simulations using Java-DSP. Examples of prepackaged online laboratory exercises generated...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements

    The relay node placement problem for wireless sensor networks is concerned with placing a minimum number of relay nodes into a wireless sensor network to meet certain connectivity and survivability requirements. In this paper, the authors study constrained versions of the relay node placement problem, where relay nodes can only...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Constant Density Spanners for Wireless Ad-Hoc Networks

    An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining such overlay networks have already been suggested, but most of them are based on an oversimplified wireless communication model. This paper suggests a model that...

    Provided By Arizona State University

  • White Papers // Feb 2010

    MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication

    Cloud services broaden the computing capability of mobile devices to a great extend in that many computational intensive operations can be processed in the cloud. Mobile users can rely on cloud services to process complex operations such as searching, data mining, and multimedia processing. In this paper, the authors propose...

    Provided By Arizona State University

  • White Papers // Oct 2010

    On Economic Mobile Cloud Computing Model

    Cloud has become a promising service model for mobile devices. Using cloud services, mobile devices can outsource its computationally intensive operations to the cloud, such as searching, data mining, and multimedia processing. In this service computing model, how to build an economic service provisioning scheme is critical for mobile cloud...

    Provided By Arizona State University

  • White Papers // Apr 2010

    Tradeoffs of Service, Security and Attack for Cyber System Survivability

    Trade-offs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (Service, security and attack), system state and Quality of Service (QoS) are essential to...

    Provided By Arizona State University

  • White Papers // Aug 2008

    The Business Value Of Social Network Technologies: A Framework For Identifying Opportunities For Business Value And An Emerging Research Program

    Although social network technologies have been the focus of many papers in the popular and business press, businesses remain unclear about their value. They use theory and data gathered from IT leaders to develop an initial model assessing the value of social network technologies in the business environment. Insights are...

    Provided By Arizona State University

  • White Papers // Jun 2008

    System Theory Based Modeling and Simulation of SOA-Based Software Systems

    Service Oriented Architecture (SOA) has drawn increased attention from both academic and industrial communities, and have put forth several standards and solutions. However, the authors found there is no universally accepted tool or procedure showing the importance of modeling a SOA-based software system based on the important system theory's characteristics...

    Provided By Arizona State University

  • White Papers // May 2010

    AutoDEVS: A Methodology for Automating M&S Software Development and Testing of Interoperable Systems

    Despite the increasing use of software system development methodologies that follow a highly structured and systematic process, there remain critical limitations that need more advanced treatment. One such limitation is the failure to explicitly incorporate Modeling and Simulation (M&S) methodology which becomes essential as the scale of systems under development...

    Provided By Arizona State University

  • White Papers // Feb 2009

    A Framework for Executable UML Models

    One approach to support the creation of executable UML models is to utilize an existing DEVS simulation environment. The Discrete EVent System Specification (DEVS) formalism excels at modeling complex discrete event systems. An approach to specifying DEVS-compliant models is presented via Unified Modeling Language (UML) state machines. Resultant UML models...

    Provided By Arizona State University