Arizona State University

Displaying 1-40 of 134 results

  • White Papers // Feb 2014

    A Dimension-Oriented Theory of Requirements Space in Business Information Systems

    Low process predictability and, consequently, excessive rework are salient characteristics in many of today's commonly-used software development life cycle processes, making it exceedingly difficult for development organizations to deliver quality software systems within economically and technically reasonable frames. This paper advances the argument that, as a solution to this problem,...

    Provided By Arizona State University

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // Feb 2013

    Map Task Scheduling in MapReduce with Data Locality: Throughput and Heavy-Traffic Optimality

    Scheduling map tasks to improve data locality is crucial to the performance of MapReduce. Many works have been devoted to increasing data locality for better efficiency. However, to the best of the authors' knowledge, fundamental limits of MapReduce computing clusters with data locality, including the capacity region and theoretical bounds...

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Nov 2012

    Optimal Transmission Power Control in the Presence of a Smart Jammer

    Jamming defense is an important yet challenging problem. In this paper, the authors study the jamming defense problem in the presence of a smart jammer, who can quickly learn the transmission power of the user and adaptively adjust its transmission power to maximize the damaging effect. By modeling the problem...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Risk-Aware Day-Ahead Scheduling and Real-Time Dispatch for Plug-In Electric Vehicles

    This paper studies risk-aware day-ahead scheduling and real-time dispatch for plug-in Electric Vehicles (EVs), aiming to jointly optimize the EV charging cost and the risk of the load mismatch between the forecasted and the actual EV loads, due to the random driving activities of EVs. It turns out that the...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Aug 2012

    Bayes Networks for Supporting Query Processing Over Incomplete Autonomous Databases

    As the information available to lay users through autonomous data sources continues to increase, mediators become important to ensure that the wealth of information available is tapped effectively. A key challenge that these information mediators need to handle is the varying levels of incompleteness in the underlying databases in terms...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing

    Mobile phone sensing is a new paradigm which takes advantage of the pervasive Smartphones to collect and analyze data beyond the scale of what was previously possible. In a mobile phone sensing system, the platform recruits Smartphone users to provide sensing service. Existing mobile phone sensing applications and systems lack...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Sensing as a Service: A Cloud Computing System for Mobile Phone Sensing

    Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains such as environmental monitoring, social networking, healthcare, etc. The authors introduce a new concept, Sensing-as-a-Service (S2aaS), i.e., providing sensing services using mobile phones via a cloud computing system. An S2aaS cloud should meet the following...

    Provided By Arizona State University

  • White Papers // Jul 2012

    Distributed CSMA Algorithms for Link Scheduling in Multi-Hop MIMO Networks Under SINR Model

    In this paper, the authors study distributed scheduling in multi-hop MIMO networks. They first develop a "MIMO-pipe" model that provides the upper layers a set of rates and SINR requirements that capture the rate-reliability tradeoff in MIMO communications. The main thrust of this study is then dedicated to developing distributed...

    Provided By Arizona State University

  • White Papers // May 2012

    Detection/Decoding Over Channels With Synchronization Errors and Inter-Symbol Interference

    The authors consider coding schemes over an independent and identically distributed (i.i.d.) insertion/deletion channel with Inter-Symbol Interference (ISI). The idea is based on a serial concatenation of a Low-Density Parity Check (LDPC) code with a marker code. First, they design a Maximum-A-Posteriori (MAP) detector operating at the bit level which...

    Provided By Arizona State University

  • White Papers // Mar 2012

    Decoding Strategies for Physical-Layer Network Coding Over Frequency Selective Channels

    The authors investigate different decoding strategies at the relay over a frequency selective two-way relay channel with Physical-layer Network Coding (PNC). The incorporation of the PNC scheme enables two users exchange information via a relay in two transmission phases. They study two approaches at the relay to decode the XOR...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Game Theory in Cooperative Communications

    Cooperative communication has great potential to improve the wireless channel capacity by exploiting the antennas on wireless devices for spatial diversity. However, applications of cooperative communication are barely seen in reality. A main obstacle blocking its wide applications is the lack of incentives for wireless nodes to participate in cooperative...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Secure Top-K Query Processing Via Untrusted Location-Based Service Providers

    This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, Location-Based Service Providers (LBSPs), and system users. The data collector gathers reviews...

    Provided By Arizona State University

  • White Papers // Dec 2011

    Fault-Tolerant Design of Wireless Sensor Networks With Directional Antennas

    A tree structure is often used in wireless sensor networks to deliver collected sensor data to a sink node. Such a tree can be built using directional antennas as they offer considerable advantage over the omni-directional ones. A tree is adequate for data gathering from all sensor nodes as long...

    Provided By Arizona State University

  • White Papers // Oct 2011

    Ontology-Based Policy Anomaly Management for Autonomic Computing

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Scheduling of Stream Programs onto SPM Enhanced Processors with Code Overlay

    Scratch Pad Memories (SPM) have emerged as an alternative to caches in embedded processor architectures due to their lower power consumption, smaller chip area and superior performance. However, the advantages of SPM come at the expense of increased load on the programmer as the user is responsible for memory management....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Examining Social Dynamics for Countering Botnet Attacks

    Even though promising results have been obtained from existing research on bots and associated command and control channels, there is little research in exploring the ways on how bots are created and distributed by adversaries. Consequently, innovative methods that help determine the linkage between the rogue programs and adversaries are...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Automatic Extraction of Secrets From Malware

    As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal ciphertext data in malware is now critical for malware forensics and cyber-crime analysis. In this paper, the authors present a novel approach...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Online Strategizing Distributed Renewable Energy Resource Access in Islanded Microgrids

    The smart grid, perceived as the next generation power grid, uses two-way flow of electricity and information to create a widely distributed automated energy delivery network. By grouping distributed renewable energy generations and loads, a microgrid, which is seen as one of the cornerstones of the future smart grids, can...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Truthful Auction for Cooperative Communications

    On one hand, cooperative communication has been gaining more and more popularity since it has great potential to increase the capacity of wireless networks. On the other hand, the applications of cooperative communication technology are rarely seen in reality, even in some scenarios where the demands for bandwidth-hungry applications have...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Jun 2011

    OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks

    As promising as it is, cooperative communication has been proposed to increase the capacity of wireless networks through spatial diversity. Without requiring multiple antennas on the same device, spatial diversity is achieved by exploiting the antennas on other nodes, i.e., relay nodes, in the network. Therefore, the selection of relay...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Distributed Stochastic Power Control in Ad-Hoc Networks: A Nonconvex Case

    Utility-based power allocation in wireless ad-hoc networks is inherently non-convex because of the global coupling induced by the co-channel interference. To tackle this challenge, the authors first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the...

    Provided By Arizona State University

  • White Papers // Apr 2011

    Secure Data Processing Framework for Mobile Cloud Computing

    In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices...

    Provided By Arizona State University

  • White Papers // Mar 2011

    LR-Seluge: Loss-Resilient and Secure Code Dissemination In Wireless Sensor Networks

    Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and adding new functionalities in a multi-task sensor...

    Provided By Arizona State University

  • White Papers // Mar 2011

    JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

    Secure neighbor discovery is fundamental to Mobile Ad hoc NETworks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming attack in which the adversary intentionally sends radio signals to prevent...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Lightweight and Informative Traffic Metrics for Data Center Monitoring

    In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. Given the sheer volume of data communications between servers and millions of end users, it becomes a daunting task to continuously monitor the availability, performance and...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Toward Autonomous Vehicle Safety Verification From Mobile Cyber-Physical Systems Perspective

    Safety certification of Autonomous Vehicles (AVs) requires guarantees on AVs' safety at design time. To this effect, this paper proposes modeling abstractions that allow architectural representation of AVs and their surroundings, i.e. representation of different components, and enable safety analysis from such representation without requiring any expertise on formal methods....

    Provided By Arizona State University

  • White Papers // Feb 2009

    A Framework for Executable UML Models

    One approach to support the creation of executable UML models is to utilize an existing DEVS simulation environment. The Discrete EVent System Specification (DEVS) formalism excels at modeling complex discrete event systems. An approach to specifying DEVS-compliant models is presented via Unified Modeling Language (UML) state machines. Resultant UML models...

    Provided By Arizona State University

  • White Papers // Dec 2010

    Trust-Based Dynamic Web Service Composition Using Social Network Analysis

    With the increasing popularity of Web services and Service-Oriented Architecture, the authors need sophisticated infrastructure to discover and compose Web services. Dynamic Web service Composition will gain wider acceptance only when the users know that the solutions obtained are comprised of trust-worthy services. This paper presents a framework for a...

    Provided By Arizona State University

  • White Papers // Aug 2009

    Who The Heck Cares About Trade?

    Global trade isn't a new phenomenon. It has ebbed and flowed as long as history has been recorded (and earlier, surely). The principle has always been the same: one group of people has something that another group wants, and is willing to give it up in exchange for something that...

    Provided By Arizona State University

  • White Papers // Nov 2009

    Illicit Money Flows As Motives For FDI

    The authors examine the role of FDI in facilitating money laundering and capital flight using transition economies' FDI outflows to show the extent to which FDI is caused by these motives. They estimate a model of FDI location choice and a model of the volume of FDI outflows. Illicit money...

    Provided By Arizona State University

  • White Papers // Oct 2010

    The Effect Of Home Country And Host Country Corruption On Foreign Direct Investment

    In this paper the authors analyze the effect of home and host country corruption on FDI. By using FDI outflows from a sample of East European transition economies that had virtually no outward FDI before 1995, they observe FDI flows based mainly only current investment decisions and less affected by...

    Provided By Arizona State University

  • White Papers // Dec 2009

    High-water Marks And Hedge Fund Compensation

    The authors examine the role of high-water mark provisions in hedge fund compensation contracts. In this model of competitive markets and asymmetric information on manager ability, a fee contract with a high-water mark can improve the quality of the manager pool entering the market. In addition, a high-water mark contract...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters

    Blade severs are being increasingly deployed in modern datacenters due to their high performance/cost ratio and compact size. In this study, the authors paper their work on blade server based datacenter thermal management. The goal is to minimize the total energy costs (usage) of datacenter operation while providing a reasonable...

    Provided By Arizona State University

  • White Papers // Feb 2010

    Multimedia Information Systems

    Multimedia applications require representation and management of non-traditional data, such as text documents, images, audio and video data, possibly together with traditional (e.g. relational or object oriented) data. In particular, in multimedia applications, different data types are often coexisting within the same application domain. Hence data management systems which are...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Finding a Path Subject to Many Additive QoS Constraints

    A fundamental problem of routing in a network that provides Quality-of-Service (QoS) guarantees is to find a path between a specified source-destination node pair that simultaneously satisfies multiple QoS constraints, such as cost, delay, and reliability. Such an environment is commonly modeled by a graph with n vertices and m...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms

    Two fundamental functions of the sensor nodes in a wireless sensor network are to sense its environment and to transmit sensed information to a basestation. One approach to prolong sensor network lifetime is to deploy some relay nodes whose main function is to communicate with the sensor nodes, other relay...

    Provided By Arizona State University

  • White Papers // Jan 2011

    A Stochastic Primal-Dual Algorithm for Joint Flow Control and MAC Design in Multi-Hop Wireless Networks

    In this paper the authors study stochastic rate control for joint flow control and MAC design in multi-hop wireless networks with random access. Most existing studies along this avenue are based on deterministic convex optimization and the corresponding distributed algorithms developed therein involve deterministic feedback control. In a multi-hop wireless...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Toward Collective Behavior Prediction Via Social Dimension Extraction

    Collective behavior refers to how individuals behave when they are exposed in a social network environment. In this paper, the authors examine how they can predict online behaviors of users in a network, given the behavior information of some actors in the network. Many social media tasks can be connected...

    Provided By Arizona State University

  • White Papers // May 2010

    Identifying Evolving Groups in Dynamic Multi-Mode Networks

    A multi-mode network consists of heterogeneous types of actors with various interactions occurring between them. Identifying communities in a multi-mode network can help understand the structural properties of the network, address the data shortage and unbalanced problems, and assist tasks like targeted marketing and finding influential actors within or between...

    Provided By Arizona State University

  • White Papers // Sep 2009

    Uncovering Groups Via Heterogeneous Interaction Analysis

    With the pervasive availability of Web 2.0 and social networking sites, people can interact with each other easily through various social media. For instance, popular sites like Del.icio.us, Flickr, and YouTube allow users to comment shared content (bookmark, photos, videos), and users can tag their own favorite content. Users can...

    Provided By Arizona State University

  • White Papers // Feb 2009

    Uncovering Cross-Dimension Group Structures in Multi-Dimensional Networks

    With the proliferation of Web 2.0 and social networking sites, people can interact with each other easily through various social media. For instance, popular sites like Del.icio.us, Flickr, and YouTube allow users to comment sharing content (bookmark, photos, videos), and users can tag her own favorite content. Users can also...

    Provided By Arizona State University

  • White Papers // Jul 2009

    Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media

    The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, there is no easy way to find the most useful content or to detect whether it is trustworthy. A casual observer might not be...

    Provided By Arizona State University

  • White Papers // Dec 2010

    Defining and Mining Functional Dependencies in Probabilistic Databases

    Functional dependencies - traditional, approximate and conditional are of critical importance in relational databases, as they inform them about the relationships between attributes. They are useful in schema normalization, data rectification and source selection. Most of these were however developed in the context of deterministic data. Although uncertain databases have...

    Provided By Arizona State University

  • White Papers // Oct 2009

    SMARTINT: A System for Answering Queries Over Web Databases Using Attribute Dependencies

    Many web databases can be seen as providing partial and overlapping information about entities in the world. To answer queries effectively, the authors need to integrate the information about the individual entities that are fragmented over multiple sources. At first blush this is just the inverse of traditional database normalization...

    Provided By Arizona State University

  • White Papers // Apr 2010

    Relevance-Based Retrieval on Hidden-Web Text Databases Without Ranking Support

    Many online or local data sources provide powerful querying mechanisms but limited ranking capabilities. For instance, PubMed allows users to submit highly expressive Boolean keyword queries, but ranks the query results by date only. However, a user would typically prefer a ranking by relevance, measured by an Information Retrieval (IR)...

    Provided By Arizona State University

  • White Papers // Dec 2008

    Should Benchmark Indices Have Alpha? Revisiting Performance Evaluation

    Standard Fama-French and Car hart models produce economically and statistically significant nonzero alphas even for passive benchmark indices such as the S&P 500 and Russell 2000. The authors find that these alphas primarily arise from the disproportionate weight the Fama-French factors place on small value stocks which have performed well,...

    Provided By Arizona State University

  • White Papers // Jan 2011

    A Technique to Enhance Localization in the Presence of NLOS Errors

    In a Wireless Network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly used for localization are Time of Arrival (ToA), Time Difference of Arrival (TDoA), Angle of Arrival (AoA), and Time of Flight (ToF). In...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Distributed Stochastic Power Control in Ad-Hoc Networks: A Nonconvex Case

    Utility-based power allocation in wireless ad-hoc networks is inherently non-convex because of the global coupling induced by the co-channel interference. To tackle this challenge, the authors first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the...

    Provided By Arizona State University

  • White Papers // Apr 2009

    Evaluation of Physical Carrier Sense Based Backbone Maintenance in Mobile Ad Hoc Networks

    Physical carrier sensing has to date mainly been exploited for improving medium access control in wireless networks. Recently, a parallel algorithm striving to extensively exploit physical carrier sensing for constructing and maintaining a Connected Dominating Set (CDS), which is also known as spanner, backbone, or overlay network in wireless ad...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Enabling Privacy in Provenance Aware Workflow Systems

    A new paradigm for creating and correcting scientific analyzes is emerging, that of provenance-aware workflow systems. In such systems, repositories of workflow specifications and of provenance graphs that represent their executions will be made available as part of scientific information sharing. This will allow users to search and query both...

    Provided By Arizona State University

  • White Papers // Mar 2011

    LR-Seluge: Loss-Resilient and Secure Code Dissemination In Wireless Sensor Networks

    Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and adding new functionalities in a multi-task sensor...

    Provided By Arizona State University

  • White Papers // Mar 2011

    JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

    Secure neighbor discovery is fundamental to Mobile Ad hoc NETworks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming attack in which the adversary intentionally sends radio signals to prevent...

    Provided By Arizona State University

  • White Papers // Sep 2008

    From SODA to Scotch: The Evolution of a Wireless Baseband Processor

    With the multitude of existing and upcoming wireless standards, it is becoming increasingly difficult for hardware-only baseband processing solutions to adapt to the rapidly changing wireless communication landscape. Software Defined Radio (SDR) promises to deliver a cost effective and flexible solution by implementing a wide variety of wireless protocols in...

    Provided By Arizona State University

  • White Papers // Apr 2009

    Customizing Wide-SIMD Architectures for H.264

    In recent years, the mobile phone industry has become one of the most dynamic technology sectors. The increasing demands of multimedia services on the cellular networks have accelerated this trend. This paper presents a low power SIMD architecture that has been tailored for efficient implementation of H.264 encoder/decoder kernel algorithms....

    Provided By Arizona State University

  • White Papers // Oct 2010

    Are There Contagion Effects in IT and Business Process Outsourcing?

    The authors model the diffusion of IT outsourcing via announcements about IT outsourcing deals. They estimate a log-normal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits one to study the consequences of outsourcing events, especially mega-deals with...

    Provided By Arizona State University

  • White Papers // Feb 2010

    Using Answer Set Programming to Model Multi-Agent Scenarios Involving Agents' Knowledge About Other's Knowledge

    One of the most challenging aspects of reasoning, planning, and acting in a multi-agent domain is reasoning about what the agents know about the knowledge of their fellows, and to take it into account when planning and acting. In the past this has been done using modal and dynamic epistemic...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Examining Social Dynamics for Countering Botnet Attacks

    Even though promising results have been obtained from existing research on bots and associated command and control channels, there is little research in exploring the ways on how bots are created and distributed by adversaries. Consequently, innovative methods that help determine the linkage between the rogue programs and adversaries are...

    Provided By Arizona State University

  • White Papers // Oct 2011

    Ontology-Based Policy Anomaly Management for Autonomic Computing

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Automatic Extraction of Secrets From Malware

    As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal ciphertext data in malware is now critical for malware forensics and cyber-crime analysis. In this paper, the authors present a novel approach...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Secure Top-K Query Processing Via Untrusted Location-Based Service Providers

    This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, Location-Based Service Providers (LBSPs), and system users. The data collector gathers reviews...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Game Theory in Cooperative Communications

    Cooperative communication has great potential to improve the wireless channel capacity by exploiting the antennas on wireless devices for spatial diversity. However, applications of cooperative communication are barely seen in reality. A main obstacle blocking its wide applications is the lack of incentives for wireless nodes to participate in cooperative...

    Provided By Arizona State University

  • White Papers // Feb 2010

    Constructing Efficient Attribute-Based Broadcast Encryption

    Attribute Based Broadcast Encryption (ABBE) is a novel Broadcast Encryption (BE) approach. Compared to existing BE approaches that requires an explicitly specified decrypters list, ABBE encrypter enforces an expressive access policy composed of one or more attributes. Although ABBE is more flexible and efficient with reduced storage overhead, ciphertext size...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing

    Mobile phone sensing is a new paradigm which takes advantage of the pervasive Smartphones to collect and analyze data beyond the scale of what was previously possible. In a mobile phone sensing system, the platform recruits Smartphone users to provide sensing service. Existing mobile phone sensing applications and systems lack...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Sensing as a Service: A Cloud Computing System for Mobile Phone Sensing

    Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains such as environmental monitoring, social networking, healthcare, etc. The authors introduce a new concept, Sensing-as-a-Service (S2aaS), i.e., providing sensing services using mobile phones via a cloud computing system. An S2aaS cloud should meet the following...

    Provided By Arizona State University

  • White Papers // Oct 2008

    A Comparative Study of Anonymous 802.11 Protocols

    Many anonymous communication solutions have been proposed to provide anonymous Mobile Ad hoc NETwork (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the...

    Provided By Arizona State University

  • White Papers // May 2012

    Detection/Decoding Over Channels With Synchronization Errors and Inter-Symbol Interference

    The authors consider coding schemes over an independent and identically distributed (i.i.d.) insertion/deletion channel with Inter-Symbol Interference (ISI). The idea is based on a serial concatenation of a Low-Density Parity Check (LDPC) code with a marker code. First, they design a Maximum-A-Posteriori (MAP) detector operating at the bit level which...

    Provided By Arizona State University