Arizona State University

Displaying 1-40 of 137 results

  • White Papers // Feb 2014

    A Dimension-Oriented Theory of Requirements Space in Business Information Systems

    Low process predictability and, consequently, excessive rework are salient characteristics in many of today's commonly-used software development life cycle processes, making it exceedingly difficult for development organizations to deliver quality software systems within economically and technically reasonable frames. This paper advances the argument that, as a solution to this problem,...

    Provided By Arizona State University

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // Feb 2013

    Map Task Scheduling in MapReduce with Data Locality: Throughput and Heavy-Traffic Optimality

    Scheduling map tasks to improve data locality is crucial to the performance of MapReduce. Many works have been devoted to increasing data locality for better efficiency. However, to the best of the authors' knowledge, fundamental limits of MapReduce computing clusters with data locality, including the capacity region and theoretical bounds...

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Nov 2012

    Optimal Transmission Power Control in the Presence of a Smart Jammer

    Jamming defense is an important yet challenging problem. In this paper, the authors study the jamming defense problem in the presence of a smart jammer, who can quickly learn the transmission power of the user and adaptively adjust its transmission power to maximize the damaging effect. By modeling the problem...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Risk-Aware Day-Ahead Scheduling and Real-Time Dispatch for Plug-In Electric Vehicles

    This paper studies risk-aware day-ahead scheduling and real-time dispatch for plug-in Electric Vehicles (EVs), aiming to jointly optimize the EV charging cost and the risk of the load mismatch between the forecasted and the actual EV loads, due to the random driving activities of EVs. It turns out that the...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Aug 2012

    Bayes Networks for Supporting Query Processing Over Incomplete Autonomous Databases

    As the information available to lay users through autonomous data sources continues to increase, mediators become important to ensure that the wealth of information available is tapped effectively. A key challenge that these information mediators need to handle is the varying levels of incompleteness in the underlying databases in terms...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing

    Mobile phone sensing is a new paradigm which takes advantage of the pervasive Smartphones to collect and analyze data beyond the scale of what was previously possible. In a mobile phone sensing system, the platform recruits Smartphone users to provide sensing service. Existing mobile phone sensing applications and systems lack...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Sensing as a Service: A Cloud Computing System for Mobile Phone Sensing

    Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains such as environmental monitoring, social networking, healthcare, etc. The authors introduce a new concept, Sensing-as-a-Service (S2aaS), i.e., providing sensing services using mobile phones via a cloud computing system. An S2aaS cloud should meet the following...

    Provided By Arizona State University

  • White Papers // Jul 2012

    Distributed CSMA Algorithms for Link Scheduling in Multi-Hop MIMO Networks Under SINR Model

    In this paper, the authors study distributed scheduling in multi-hop MIMO networks. They first develop a "MIMO-pipe" model that provides the upper layers a set of rates and SINR requirements that capture the rate-reliability tradeoff in MIMO communications. The main thrust of this study is then dedicated to developing distributed...

    Provided By Arizona State University

  • White Papers // May 2012

    Detection/Decoding Over Channels With Synchronization Errors and Inter-Symbol Interference

    The authors consider coding schemes over an independent and identically distributed (i.i.d.) insertion/deletion channel with Inter-Symbol Interference (ISI). The idea is based on a serial concatenation of a Low-Density Parity Check (LDPC) code with a marker code. First, they design a Maximum-A-Posteriori (MAP) detector operating at the bit level which...

    Provided By Arizona State University

  • White Papers // Mar 2012

    Decoding Strategies for Physical-Layer Network Coding Over Frequency Selective Channels

    The authors investigate different decoding strategies at the relay over a frequency selective two-way relay channel with Physical-layer Network Coding (PNC). The incorporation of the PNC scheme enables two users exchange information via a relay in two transmission phases. They study two approaches at the relay to decode the XOR...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Game Theory in Cooperative Communications

    Cooperative communication has great potential to improve the wireless channel capacity by exploiting the antennas on wireless devices for spatial diversity. However, applications of cooperative communication are barely seen in reality. A main obstacle blocking its wide applications is the lack of incentives for wireless nodes to participate in cooperative...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Secure Top-K Query Processing Via Untrusted Location-Based Service Providers

    This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, Location-Based Service Providers (LBSPs), and system users. The data collector gathers reviews...

    Provided By Arizona State University

  • White Papers // Dec 2011

    Fault-Tolerant Design of Wireless Sensor Networks With Directional Antennas

    A tree structure is often used in wireless sensor networks to deliver collected sensor data to a sink node. Such a tree can be built using directional antennas as they offer considerable advantage over the omni-directional ones. A tree is adequate for data gathering from all sensor nodes as long...

    Provided By Arizona State University

  • White Papers // Oct 2011

    Ontology-Based Policy Anomaly Management for Autonomic Computing

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Scheduling of Stream Programs onto SPM Enhanced Processors with Code Overlay

    Scratch Pad Memories (SPM) have emerged as an alternative to caches in embedded processor architectures due to their lower power consumption, smaller chip area and superior performance. However, the advantages of SPM come at the expense of increased load on the programmer as the user is responsible for memory management....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Examining Social Dynamics for Countering Botnet Attacks

    Even though promising results have been obtained from existing research on bots and associated command and control channels, there is little research in exploring the ways on how bots are created and distributed by adversaries. Consequently, innovative methods that help determine the linkage between the rogue programs and adversaries are...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Automatic Extraction of Secrets From Malware

    As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal ciphertext data in malware is now critical for malware forensics and cyber-crime analysis. In this paper, the authors present a novel approach...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Online Strategizing Distributed Renewable Energy Resource Access in Islanded Microgrids

    The smart grid, perceived as the next generation power grid, uses two-way flow of electricity and information to create a widely distributed automated energy delivery network. By grouping distributed renewable energy generations and loads, a microgrid, which is seen as one of the cornerstones of the future smart grids, can...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Truthful Auction for Cooperative Communications

    On one hand, cooperative communication has been gaining more and more popularity since it has great potential to increase the capacity of wireless networks. On the other hand, the applications of cooperative communication technology are rarely seen in reality, even in some scenarios where the demands for bandwidth-hungry applications have...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Jun 2011

    OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks

    As promising as it is, cooperative communication has been proposed to increase the capacity of wireless networks through spatial diversity. Without requiring multiple antennas on the same device, spatial diversity is achieved by exploiting the antennas on other nodes, i.e., relay nodes, in the network. Therefore, the selection of relay...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Distributed Stochastic Power Control in Ad-Hoc Networks: A Nonconvex Case

    Utility-based power allocation in wireless ad-hoc networks is inherently non-convex because of the global coupling induced by the co-channel interference. To tackle this challenge, the authors first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the...

    Provided By Arizona State University

  • White Papers // Apr 2011

    Secure Data Processing Framework for Mobile Cloud Computing

    In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices...

    Provided By Arizona State University

  • White Papers // Mar 2011

    LR-Seluge: Loss-Resilient and Secure Code Dissemination In Wireless Sensor Networks

    Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and adding new functionalities in a multi-task sensor...

    Provided By Arizona State University

  • White Papers // Mar 2011

    JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

    Secure neighbor discovery is fundamental to Mobile Ad hoc NETworks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming attack in which the adversary intentionally sends radio signals to prevent...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Lightweight and Informative Traffic Metrics for Data Center Monitoring

    In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. Given the sheer volume of data communications between servers and millions of end users, it becomes a daunting task to continuously monitor the availability, performance and...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Toward Autonomous Vehicle Safety Verification From Mobile Cyber-Physical Systems Perspective

    Safety certification of Autonomous Vehicles (AVs) requires guarantees on AVs' safety at design time. To this effect, this paper proposes modeling abstractions that allow architectural representation of AVs and their surroundings, i.e. representation of different components, and enable safety analysis from such representation without requiring any expertise on formal methods....

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2010

    Trends and Effects of Energy Proportionality on Server Provisioning in Data Centers

    Cloud is the state-of-the-art back-end infrastructure for most large-scale web services. This paper studies what effect energy proportionality has on the energy savings of cloud data center management, under various equipment compositions and power densities. The authors' findings show that although it is a common expectation that improved energy proportionality...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Oct 2006

    Services and Business Processes

    Despite the efforts of businesses worldwide, legacy enterprise system haves failed to streamline business processes. As a result, companies are implementing their processes with a Service-Oriented Architecture (SOA), which has to potential to resolve many of the issues brought up by inflexible applications. SOA provides a number of advantages to...

    Provided By Arizona State University

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Jul 2008

    Bandwidth-Conserving Multicast VoIP Teleconference System

    Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while remaining at geographically dispersed locations. Teleconferencing increases productivity while reducing travel costs and saving travel time. In a VoIP telephone system, the authors face...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Feb 2014

    A Dimension-Oriented Theory of Requirements Space in Business Information Systems

    Low process predictability and, consequently, excessive rework are salient characteristics in many of today's commonly-used software development life cycle processes, making it exceedingly difficult for development organizations to deliver quality software systems within economically and technically reasonable frames. This paper advances the argument that, as a solution to this problem,...

    Provided By Arizona State University

  • White Papers // Feb 2013

    Map Task Scheduling in MapReduce with Data Locality: Throughput and Heavy-Traffic Optimality

    Scheduling map tasks to improve data locality is crucial to the performance of MapReduce. Many works have been devoted to increasing data locality for better efficiency. However, to the best of the authors' knowledge, fundamental limits of MapReduce computing clusters with data locality, including the capacity region and theoretical bounds...

    Provided By Arizona State University

  • White Papers // May 2010

    Feature Selection: An Ever Evolving Frontier in Data Mining

    The rapid advance of computer technologies in data processing, collection, and storage has provided unparalleled opportunities to expand capabilities in production, services, communications, and research. However, immense quantities of high-dimensional data renew the challenges to the state-of-the-art data mining techniques. Feature selection is an effective technique for dimension reduction and...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Scheduling of Stream Programs onto SPM Enhanced Processors with Code Overlay

    Scratch Pad Memories (SPM) have emerged as an alternative to caches in embedded processor architectures due to their lower power consumption, smaller chip area and superior performance. However, the advantages of SPM come at the expense of increased load on the programmer as the user is responsible for memory management....

    Provided By Arizona State University

  • White Papers // Aug 2010

    A Lightweight Run-time Scheduler for Multitasking Multicore Stream Applications

    Stream programming models promise dramatic improvements in developers' ability to express parallelism in their applications while enabling extremely efficient implementations on modern many-core processors. Unfortunately, the wide variation in the architectural features of available multi-core processors implies that a single compiler may be incapable of generating general solutions which can...

    Provided By Arizona State University

  • White Papers // Aug 2010

    Scheduling of Synchronous Data Flow Models on Scratchpad Memory Based Embedded Processors

    Many embedded processors incorporate Scratch-Pad Memories (SPM) due to their lower power consumption characteristics. SPMs are utilized to host both code and data, often on the same physical unit. Synchronous Data-Flow (SDF) is a popular format for specifying many embedded system applications particularly in multimedia and network processing domains. Execution...

    Provided By Arizona State University

  • White Papers // Nov 2007

    A Compiler-in-the-Loop Framework to Explore Horizontally Partitioned Cache Architectures

    Horizontally Partitioned Caches (HPCs) are a promising architectural feature to reduce the energy consumption of the memory subsystem. However, the energy reduction obtained using HPC architectures is very sensitive to the HPC parameters. Therefore it is very important to explore the HPC design space and carefully choose the HPC parameters...

    Provided By Arizona State University

  • White Papers // Jan 2009

    Viral Attacks on the DoD Common Access Card (CAC)

    This paper shows that using a DoD CAC on a untrusted workstation can allow a variety of attacks to be performed by malicious software. These attacks range from simple PIN phishing, to more serious attacks such as signatures on unauthorized transactions, authentication of users without consent, unauthorized secure access to...

    Provided By Arizona State University

  • White Papers // Mar 2009

    U.S. Energy Infrastructure Investment: Long-Term Strategic Planning to Inform Policy Development

    With passage of the American Recovery and Reinvestment Act of 2009 signed by President Obama, the U.S. Department of Energy has been given additional resources to advance the development of technologies that will provide a low-carbon supply of energy and will transfer much of the nation's transportation energy supply to...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Visual Displays of Regression Toward the Mean Using SAS SGplot

    Regression toward the mean is a widespread phenomenon in statistics and may adversely affect researchers' substantive interprettion of findings. Therefore, it is worthwhile to evaluate the extent of regression toward the mean as a part of many applications of regression analysis. One way to assist with such an evaluation is...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Real-Time Behavior Profiling for Network Monitoring

    This paper presents the design and implementation of a real-time behavior profiling system for Internet links. The system uses flow-level information, and applies data mining and information-theoretic techniques to automatically discover significant events based on communication patterns. The paper demonstrates the operational feasibility of the system by implementing it and...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Capacity and Delay Analysis of Next-Generation Passive Optical Networks (NG-PONs)

    Building on the Ethernet Passive Optical Network (EPON) and Gigabit PON (GPON) standards, Next-Generation (NG) PONs provide increased data rates, split ratios, wavelengths counts, and fiber lengths, as well as allow for all-optical integration of access and metro networks. This paper provides a comprehensive probabilistic analysis of the capacity (maximum...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Approximation Algorithm for Avoiding Hotspot Formation of Sensor Networks for Temperature Sensitive Environments

    Sensing and transmission phenomena of an implanted sensor dissipates energy which results in rise in temperature of its surroundings. Simultaneous operation of such multiple active sensors increases the temperature of the surrounding environment causing hotspots. Such hotspots are highly undesirable as they may cause damage to the environment as well...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Capacity of MIMO Systems in Shallow Water Acoustic Channels

    UnderWater Acoustic (UWA) channels are typically characterized by a multipath structure with large delay spread, where only a few propagation paths carry significant energy. Each path exhibits time variability, which, together with the transmitter and receiver motion, induces Doppler spreading and shifting of the signal. In this paper, the authors...

    Provided By Arizona State University

  • White Papers // May 2010

    Collaborative Event-Driven Coverage and Rate Allocation for Event Miss-Ratio Assurances in Wireless Sensor Networks

    Wireless sensor networks are often required to provide event miss-ratio assurance for a given event type. To meet such assurances along with minimum energy consumption, this paper shows how a node's activation and rate assignment is dependent on its distance to event sources, and proposes a practical COverage and Rate...

    Provided By Arizona State University

  • White Papers // Aug 2008

    Joint Coverage Scheduling and Identity Management for Multiple-Target Tracking in Wireless Sensor Networks

    Wireless surveillance sensor networks are often required to track multiple targets accurately, especially when the targets come close to each other at so-called mixing regions. This paper presents eTrack protocol to address the following two problems for a number of targets and their mixing region: which sensor nodes should be...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Lightweight and Informative Traffic Metrics for Data Center Monitoring

    In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. Given the sheer volume of data communications between servers and millions of end users, it becomes a daunting task to continuously monitor the availability, performance and...

    Provided By Arizona State University

  • White Papers // Dec 2010

    VMP: A MAC Protocol for EPON-Based Video-Dominated FiWi Access Networks

    Optical and wireless network technologies are expected to converge in the near to midterm, giving rise to bimodal FIber-WIreless (FiWi) broadband access networks. In triple-play (voice, video, and data) service scenarios for such FiWi access networks, video traffic will likely dominate due to the widely predicted increase in video network...

    Provided By Arizona State University

  • White Papers // Oct 2008

    Energy Optimization for Proactive Unicast Route Maintenance in MANETs Under End-to-End Reliability Requirements

    Routing is a challenging task in Mobile Ad hoc NETworks (MANETs), mainly because of the dynamic nature of the wireless medium and the mobility of the wireless nodes leading to frequent disconnection of routes. In many time-critical and high reliability demanding applications, such as disaster response, the network has to...

    Provided By Arizona State University

  • White Papers // Jan 2011

    On Maximizing Network Lifetime of Broadcast in WANETs Under an Overhearing Cost Model

    Absence of line power supplies imposes severe constraints on nodes in wireless ad hoc and sensor networks. In this paper, the authors concentrate on finding a broadcast tree that maximizes the network's lifetime. Previous studies showed that this problem is polynomially solvable when assuming the receiver consumes no energy or...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Maximizing Broadcast Tree Lifetime in Wireless Ad Hoc Networks

    In Wireless Ad hoc NETworks (WANETs), e.g. wireless sensor networks, battery-powered devices are constrained by limited amount of energy. Many WANET applications require that the duration (called lifetime) for which the network remains operational - until the first node exhausts its battery energy - is maximized. The authors study the...

    Provided By Arizona State University

  • White Papers // Nov 2008

    Self-Managing Energy-Efficient Multicast Support in MANETs Under End-to-End Reliability Constraints

    Dynamic networks, e.g. Mobile Ad hoc NETworks (MANETs), call for self-healing routing protocols to tolerate topological changes imposed by node mobility. Moreover, emerging time-critical MANET applications such as disaster response and rescue, and battlefield operations, require support for real-time, reliable data streaming, while maintaining energy efficiency. However, most of the...

    Provided By Arizona State University

  • White Papers // Jan 2011

    CluRoL: Clustering Based Robust Localization in Wireless Sensor Networks

    In a Wireless Sensor Network (WSN), the Sensor Nodes (SNs) generally localize themselves with the help of anchors that know their own positions. In this setting, the localization process has a high risk of being subverted by malicious anchors that lie about their own position and/or distance from the SNs....

    Provided By Arizona State University