Arizona State University

Displaying 1-40 of 114 results

  • White Papers // Feb 2014

    A Dimension-Oriented Theory of Requirements Space in Business Information Systems

    Low process predictability and, consequently, excessive rework are salient characteristics in many of today's commonly-used software development life cycle processes, making it exceedingly difficult for development organizations to deliver quality software systems within economically and technically reasonable frames. This paper advances the argument that, as a solution to this problem,...

    Provided By Arizona State University

  • White Papers // Aug 2013

    On the Security of Picture Gesture Authentication

    Computing devices with touch-screens have experienced unprecedented growth in recent years. Such an evolutionary advance has been facilitated by various applications that are heavily relying on multi-touch gestures. In addition, picture gesture authentication has been recently introduced as an alternative login experience to text-based password on such devices. In particular,...

    Provided By Arizona State University

  • White Papers // May 2013

    Atlas: Adaptive Topology- and Load-Aware Scheduling

    The largest strength of contention-based MAC protocols is simultaneously the largest weakness of their scheduled counterparts: the ability to adapt to changes in network conditions. For scheduling to be competitive in mobile wireless networks, continuous adaptation must be addressed. The authors propose ATLAS, an Adaptive Topology- and Load-Aware Scheduling protocol...

    Provided By Arizona State University

  • White Papers // May 2013

    Unobservable Re-Authentication for Smartphones

    The widespread usage of Smartphone's gives rise to new security and privacy concerns. Smartphone's are becoming a personal entrance to networks, and may store private information. Due to its small size, a Smartphone could be easily taken away and used by an attacker. Using a victim's Smartphone, the attacker can...

    Provided By Arizona State University

  • White Papers // Apr 2013

    Social Spammer Detection in Microblogging

    The availability of microblogging, like Twitter and Sina Weibo, makes it a popular platform for spammers to unfairly overpower normal users with unwanted content via social networks, known as social spamming. The rise of social spamming can significantly hinder the use of microblogging systems for effective information dissemination and sharing....

    Provided By Arizona State University

  • White Papers // Feb 2013

    Proactive Call Drop Avoidance in UMTS Networks

    The rapid advancement of smartphones has instigated tremendous data applications for cell phones. Supporting simultaneous voice and data services in a cellular network is not only desirable but also becoming indispensable. However, if the voice and data are serviced through the same antenna (like the 3G UMTS network), a voice...

    Provided By Arizona State University

  • White Papers // Feb 2013

    Map Task Scheduling in MapReduce with Data Locality: Throughput and Heavy-Traffic Optimality

    Scheduling map tasks to improve data locality is crucial to the performance of MapReduce. Many works have been devoted to increasing data locality for better efficiency. However, to the best of the authors' knowledge, fundamental limits of MapReduce computing clusters with data locality, including the capacity region and theoretical bounds...

    Provided By Arizona State University

  • White Papers // Jan 2013

    On the Performance of Low Density Parity Check Codes for Gaussian Interference Channels

    In this paper, two-user Gaussian Interference Channel (GIC) is revisited with the objective of developing implementable (explicit) channel codes. Specifically, Low Density Parity Check (LDPC) codes are adopted for use over these channels, and their benefits are studied. Different scenarios on the level of interference are considered. In particular, for...

    Provided By Arizona State University

  • White Papers // Jan 2013

    Unsupervised Feature Selection for Multi-View Data in Social Media

    The explosive popularity of social media produces mountains of high-dimensional data and the nature of social media also determines that its data is often unlabelled, noisy and partial, presenting new challenges to feature selection. Social media data can be represented by heterogeneous feature spaces in the form of multiple views....

    Provided By Arizona State University

  • White Papers // Nov 2012

    Optimal Transmission Power Control in the Presence of a Smart Jammer

    Jamming defense is an important yet challenging problem. In this paper, the authors study the jamming defense problem in the presence of a smart jammer, who can quickly learn the transmission power of the user and adaptively adjust its transmission power to maximize the damaging effect. By modeling the problem...

    Provided By Arizona State University

  • White Papers // Nov 2012

    Risk-Aware Day-Ahead Scheduling and Real-Time Dispatch for Plug-In Electric Vehicles

    This paper studies risk-aware day-ahead scheduling and real-time dispatch for plug-in Electric Vehicles (EVs), aiming to jointly optimize the EV charging cost and the risk of the load mismatch between the forecasted and the actual EV loads, due to the random driving activities of EVs. It turns out that the...

    Provided By Arizona State University

  • White Papers // Oct 2012

    Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

    Smart Grid (SG) is an intelligent power system that uses two-way communication and information technologies, and computational intelligence to revolutionize power generation, delivery, and consumption. Its evolution relies on the utilization and integration of advanced information technologies, which transform the energy system from an analog one to a digital one....

    Provided By Arizona State University

  • White Papers // Aug 2012

    Bayes Networks for Supporting Query Processing Over Incomplete Autonomous Databases

    As the information available to lay users through autonomous data sources continues to increase, mediators become important to ensure that the wealth of information available is tapped effectively. A key challenge that these information mediators need to handle is the varying levels of incompleteness in the underlying databases in terms...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Crowdsourcing to Smartphones: Incentive Mechanism Design for Mobile Phone Sensing

    Mobile phone sensing is a new paradigm which takes advantage of the pervasive Smartphones to collect and analyze data beyond the scale of what was previously possible. In a mobile phone sensing system, the platform recruits Smartphone users to provide sensing service. Existing mobile phone sensing applications and systems lack...

    Provided By Arizona State University

  • White Papers // Aug 2012

    Sensing as a Service: A Cloud Computing System for Mobile Phone Sensing

    Sensors on (or attached to) mobile phones can enable attractive sensing applications in different domains such as environmental monitoring, social networking, healthcare, etc. The authors introduce a new concept, Sensing-as-a-Service (S2aaS), i.e., providing sensing services using mobile phones via a cloud computing system. An S2aaS cloud should meet the following...

    Provided By Arizona State University

  • White Papers // Jul 2012

    Distributed CSMA Algorithms for Link Scheduling in Multi-Hop MIMO Networks Under SINR Model

    In this paper, the authors study distributed scheduling in multi-hop MIMO networks. They first develop a "MIMO-pipe" model that provides the upper layers a set of rates and SINR requirements that capture the rate-reliability tradeoff in MIMO communications. The main thrust of this study is then dedicated to developing distributed...

    Provided By Arizona State University

  • White Papers // May 2012

    Detection/Decoding Over Channels With Synchronization Errors and Inter-Symbol Interference

    The authors consider coding schemes over an independent and identically distributed (i.i.d.) insertion/deletion channel with Inter-Symbol Interference (ISI). The idea is based on a serial concatenation of a Low-Density Parity Check (LDPC) code with a marker code. First, they design a Maximum-A-Posteriori (MAP) detector operating at the bit level which...

    Provided By Arizona State University

  • White Papers // Mar 2012

    Decoding Strategies for Physical-Layer Network Coding Over Frequency Selective Channels

    The authors investigate different decoding strategies at the relay over a frequency selective two-way relay channel with Physical-layer Network Coding (PNC). The incorporation of the PNC scheme enables two users exchange information via a relay in two transmission phases. They study two approaches at the relay to decode the XOR...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Game Theory in Cooperative Communications

    Cooperative communication has great potential to improve the wireless channel capacity by exploiting the antennas on wireless devices for spatial diversity. However, applications of cooperative communication are barely seen in reality. A main obstacle blocking its wide applications is the lack of incentives for wireless nodes to participate in cooperative...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks

    While tremendous efforts have been made on channel allocation problems in wireless networks, most of them are on cooperative networks with few exceptions. Among those works on non-cooperative networks, none of them considers the network with multiple collision domains. Instead, they all assume the single collision domain, where all transmissions...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Resource Allocation in Load-Constrained MultihopWireless Networks

    The fact that the wireless spectrum is a scarce resource motivates one to investigate how to use wireless resources effectively. A wireless network has two kinds of network entities - users and nodes, where a user maintains a session (multipath flow) from a source node to a destination node, and...

    Provided By Arizona State University

  • White Papers // Jan 2012

    Secure Top-K Query Processing Via Untrusted Location-Based Service Providers

    This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, Location-Based Service Providers (LBSPs), and system users. The data collector gathers reviews...

    Provided By Arizona State University

  • White Papers // Dec 2011

    Fault-Tolerant Design of Wireless Sensor Networks With Directional Antennas

    A tree structure is often used in wireless sensor networks to deliver collected sensor data to a sink node. Such a tree can be built using directional antennas as they offer considerable advantage over the omni-directional ones. A tree is adequate for data gathering from all sensor nodes as long...

    Provided By Arizona State University

  • White Papers // Oct 2011

    Ontology-Based Policy Anomaly Management for Autonomic Computing

    The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized actions in business services. Moreover, designing and managing different types of policies collaboratively in such...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Dynamic Hosting Management of Web Based Applications Over Clouds

    Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: spatiotemporal variation of energy price, data center computing and cooling energy efficiency, Virtual Machine (VM) migration cost for the applications, and any SLA violations due to migration overhead or network delay....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Scheduling of Stream Programs onto SPM Enhanced Processors with Code Overlay

    Scratch Pad Memories (SPM) have emerged as an alternative to caches in embedded processor architectures due to their lower power consumption, smaller chip area and superior performance. However, the advantages of SPM come at the expense of increased load on the programmer as the user is responsible for memory management....

    Provided By Arizona State University

  • White Papers // Sep 2011

    Examining Social Dynamics for Countering Botnet Attacks

    Even though promising results have been obtained from existing research on bots and associated command and control channels, there is little research in exploring the ways on how bots are created and distributed by adversaries. Consequently, innovative methods that help determine the linkage between the rogue programs and adversaries are...

    Provided By Arizona State University

  • White Papers // Sep 2011

    Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

    Software cryptosystems face the challenge of secure key management. Recent trends in breaking cryptosystems suggest that it is easier to steal the cryptographic keys from unsecure systems than to break the algorithm itself, a prominent example of such an attack is the cracking of the HD-DVD encryption. This paper presents...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Automatic Extraction of Secrets From Malware

    As promising results have been obtained in defeating code obfuscation techniques, malware authors have adopted protection approaches to hide malware-related data from analysis. Consequently, the discovery of internal ciphertext data in malware is now critical for malware forensics and cyber-crime analysis. In this paper, the authors present a novel approach...

    Provided By Arizona State University

  • White Papers // Aug 2011

    DART: Directional Anypath Routing in Wireless Mesh Networks

    Anypath routing is proposed to improve the performance of wireless networks by exploiting the spatial diversity and broadcast nature of the wireless medium. In this paper, the authors study anypath routing in wireless networks with directional antennas, and propose DART (Directional Anypath RouTing), a cross-layer design of MAC and routing...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Online Strategizing Distributed Renewable Energy Resource Access in Islanded Microgrids

    The smart grid, perceived as the next generation power grid, uses two-way flow of electricity and information to create a widely distributed automated energy delivery network. By grouping distributed renewable energy generations and loads, a microgrid, which is seen as one of the cornerstones of the future smart grids, can...

    Provided By Arizona State University

  • White Papers // Aug 2011

    Truthful Auction for Cooperative Communications

    On one hand, cooperative communication has been gaining more and more popularity since it has great potential to increase the capacity of wireless networks. On the other hand, the applications of cooperative communication technology are rarely seen in reality, even in some scenarios where the demands for bandwidth-hungry applications have...

    Provided By Arizona State University

  • White Papers // Jul 2011

    Near-Optimal Relay Station Placement for Power Minimization in WiMAX Networks

    In the IEEE 802:16j standard, the relay station has been introduced to increase the coverage and the throughput of WiMAX networks. The placement of the relay station plays a critical role in the system performance and therefore draws tremendous attention from the research community. In this paper, the authors study...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Software Based Remote Attestation for OS Kernel and User Applications

    In this paper, the authors describe a software based remote attestation scheme for providing a root of trust on an untrusted computing platform. To provide a root of trust, this paper focuses on obtaining the integrity of the OS running on the platform, and then leverages the techniques to obtain...

    Provided By Arizona State University

  • White Papers // Jun 2011

    OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks

    As promising as it is, cooperative communication has been proposed to increase the capacity of wireless networks through spatial diversity. Without requiring multiple antennas on the same device, spatial diversity is achieved by exploiting the antennas on other nodes, i.e., relay nodes, in the network. Therefore, the selection of relay...

    Provided By Arizona State University

  • White Papers // Jun 2011

    Distributed Stochastic Power Control in Ad-Hoc Networks: A Nonconvex Case

    Utility-based power allocation in wireless ad-hoc networks is inherently non-convex because of the global coupling induced by the co-channel interference. To tackle this challenge, the authors first show that the globally optimal point lies on the boundary of the feasible region, which is utilized as a basis to transform the...

    Provided By Arizona State University

  • White Papers // Apr 2011

    Secure Data Processing Framework for Mobile Cloud Computing

    In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices...

    Provided By Arizona State University

  • White Papers // Mar 2011

    LR-Seluge: Loss-Resilient and Secure Code Dissemination In Wireless Sensor Networks

    Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and adding new functionalities in a multi-task sensor...

    Provided By Arizona State University

  • White Papers // Mar 2011

    JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks

    Secure neighbor discovery is fundamental to Mobile Ad hoc NETworks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming attack in which the adversary intentionally sends radio signals to prevent...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Lightweight and Informative Traffic Metrics for Data Center Monitoring

    In recent years, thousands of commodity servers have been deployed in Internet data centers to run large scale Internet applications or cloud computing services. Given the sheer volume of data communications between servers and millions of end users, it becomes a daunting task to continuously monitor the availability, performance and...

    Provided By Arizona State University

  • White Papers // Jan 2009

    Viral Attacks on the DoD Common Access Card (CAC)

    This paper shows that using a DoD CAC on a untrusted workstation can allow a variety of attacks to be performed by malicious software. These attacks range from simple PIN phishing, to more serious attacks such as signatures on unauthorized transactions, authentication of users without consent, unauthorized secure access to...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Approximation Algorithm for Avoiding Hotspot Formation of Sensor Networks for Temperature Sensitive Environments

    Sensing and transmission phenomena of an implanted sensor dissipates energy which results in rise in temperature of its surroundings. Simultaneous operation of such multiple active sensors increases the temperature of the surrounding environment causing hotspots. Such hotspots are highly undesirable as they may cause damage to the environment as well...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Real-Time Behavior Profiling for Network Monitoring

    This paper presents the design and implementation of a real-time behavior profiling system for Internet links. The system uses flow-level information, and applies data mining and information-theoretic techniques to automatically discover significant events based on communication patterns. The paper demonstrates the operational feasibility of the system by implementing it and...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Visual Displays of Regression Toward the Mean Using SAS SGplot

    Regression toward the mean is a widespread phenomenon in statistics and may adversely affect researchers' substantive interprettion of findings. Therefore, it is worthwhile to evaluate the extent of regression toward the mean as a part of many applications of regression analysis. One way to assist with such an evaluation is...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Capacity and Delay Analysis of Next-Generation Passive Optical Networks (NG-PONs)

    Building on the Ethernet Passive Optical Network (EPON) and Gigabit PON (GPON) standards, Next-Generation (NG) PONs provide increased data rates, split ratios, wavelengths counts, and fiber lengths, as well as allow for all-optical integration of access and metro networks. This paper provides a comprehensive probabilistic analysis of the capacity (maximum...

    Provided By Arizona State University

  • White Papers // Jan 2010

    Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements

    The relay node placement problem for wireless sensor networks is concerned with placing a minimum number of relay nodes into a wireless sensor network to meet certain connectivity and survivability requirements. In this paper, the authors study constrained versions of the relay node placement problem, where relay nodes can only...

    Provided By Arizona State University

  • White Papers // Oct 2010

    Workshop - Designing Signals and Systems Laboratories Using Java-DSP

    The participants of this workshop will be exposed to the utility of the Java-DSP education software in multidisciplinary signal and data analysis applications. The session will be interactive and participants will use and assess an exercise that involves step-by-step online simulations using Java-DSP. Examples of prepackaged online laboratory exercises generated...

    Provided By Arizona State University

  • White Papers // Apr 2010

    Reasoning About XACML Policy Descriptions in Answer Set Programming

    The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled one to perform business services more efficiently and effectively. However, the authors still suffer from unintended security leakages by unauthorized services while providing more convenient services to Internet users through such a cutting-edge technological...

    Provided By Arizona State University

  • White Papers // Oct 2009

    Building Dynamic Remote Attestation Framework

    Remote attestation is an important mechanism to provide the trustworthiness proof of a computing system by verifying its integrity. In this poster, the authors propose a dynamic remote attestation framework for efficiently attesting a target system based on an information flow-based integrity model. With this model, the high integrity processes...

    Provided By Arizona State University

  • White Papers // Feb 2011

    Integrating Cooling Awareness With Thermal Aware Workload Placement for HPC Data Centers

    High Performance Computing (HPC) data centers are becoming increasingly dense; the associated power-density and energy consumption of their operation is increasing. Up to half of the total energy is attributed to cooling the data center; greening the data center operations to reduce both computing and cooling energy is imperative. To...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Criticality Aware Access Control Model for Pervasive Applications

    Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view for providing access, based on explicit user request. This methodology may not be sufficient in the case of critical events (emergencies) where automatic and timely access to resources may be required...

    Provided By Arizona State University

  • White Papers // Jul 2009

    Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach

    Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new computing environment. In many pervasive applications, devices collaborate with others within a...

    Provided By Arizona State University

  • White Papers // Mar 2011

    Toward Autonomous Vehicle Safety Verification From Mobile Cyber-Physical Systems Perspective

    Safety certification of Autonomous Vehicles (AVs) requires guarantees on AVs' safety at design time. To this effect, this paper proposes modeling abstractions that allow architectural representation of AVs and their surroundings, i.e. representation of different components, and enable safety analysis from such representation without requiring any expertise on formal methods....

    Provided By Arizona State University

  • White Papers // Jun 2009

    Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks

    Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors in BAN have to be energy-efficient to ensure longevity and safety of the network. Recent years have seen the emergence of a new class of security solutions for BANs,...

    Provided By Arizona State University

  • White Papers // Apr 2011

    Secure Data Processing Framework for Mobile Cloud Computing

    In mobile cloud computing, mobile devices can rely on cloud computing and information storage resource to perform computationally intensive operations such as searching, data mining, and multimedia processing. In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices...

    Provided By Arizona State University

  • White Papers // Dec 2010

    Constructing Min-Cost Single Failure Immune Recovery Trees: Computational Complexity and Approximation Algorithms

    Since optical networks usually carry very high volumes of data, failures in optical networks may have severe consequences. Therefore, network protection and restoration become critical issues in the design of optical networks and have been studied extensively. Network protection and restoration have important applications in both WDM and SONET networks....

    Provided By Arizona State University

  • White Papers // May 2010

    Assessing Expertise Awareness in Resolution Networks

    Problem resolution is a key issue in the IT service industry. A large service provider handles, on daily basis, thousands of tickets that report various types of problems from its customers. The efficiency of this process highly depends on the effective interactions among various expert groups, in search of the...

    Provided By Arizona State University

  • White Papers // Jun 2010

    Content-Aware Resolution Sequence Mining for Ticket Routing

    Ticket routing is key to the efficiency of IT problem management. Due to the complexity of many reported problems, problem tickets typically need to be routed among various expert groups, to search for the right resolver. In this paper, the authors study the problem of using historical ticket data to...

    Provided By Arizona State University

  • White Papers // Jun 2010

    Advancing Feature Selection Research

    The rapid advance of computer based high-throughput technique has provided unparalleled opportunities for humans to expand capabilities in production, services, communications, and research. Meanwhile, immense quantities of high-dimensional data are accumulated challenging state-of-the-art data mining techniques. Feature selection is an essential step in successful data mining applications, which can effectively...

    Provided By Arizona State University

  • White Papers // Jun 2010

    Community Detection in Multi-Dimensional Networks

    The pervasiveness of Web 2.0 and social networking sites has enabled people to interact with each other easily through various social media. For instance, popular sites like Del.icio.us, Flickr, and YouTube allow users to comment on shared content (bookmarks, photos, videos), and users can tag their favorite content. Users can...

    Provided By Arizona State University

  • White Papers // Feb 2010

    XML Data Integration: Schema Extraction and Mapping

    Many applications require exchange and integration of data from multiple, heterogeneous sources. eXtensible Markup Language (XML) is a standard developed to satisfy the convenient data exchange needs of these applications. However, XML by itself does not address the data integration requirements. This paper discusses the challenges and techniques in XML...

    Provided By Arizona State University

  • White Papers // Feb 2010

    XML Data Integration: Merging, Query Processing and Conflict Resolution

    In XML Data Integration, data/metadata merging and query processing are indispensable. Specifically, merging integrates multiple disparate (heterogeneous and autonomous) input data sources together for further usage, while query processing is one main reason why the data need to be integrated in the first place. Besides, when supported with appropriate user...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Security for Pervasive Health Monitoring Sensor Applications

    Maintaining security of wearable networked health monitoring sensors (Body Sensor Networks (BSN)) is very important for the acceptance and long term viability of the technology. Sensors in BSNs organize themselves into different topologies for efficiency purpose. Securing this topology formation process is of prime importance. In this paper the authors...

    Provided By Arizona State University

  • White Papers // May 2009

    Solving The Feldstein-Horioka Puzzle With Financial Frictions

    Unlike the prediction of a frictionless open economy model, long-term average savings and investment rates are highly correlated across countries-a puzzle first identified by Feldstein and Horioka (1980). This paper quantitatively investigates the impact of financial frictions on this correlation. The authors consider two financial frictions. One is limited enforcement,...

    Provided By Arizona State University

  • White Papers // Feb 2010

    MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication

    Cloud services broaden the computing capability of mobile devices to a great extend in that many computational intensive operations can be processed in the cloud. Mobile users can rely on cloud services to process complex operations such as searching, data mining, and multimedia processing. In this paper, the authors propose...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Robust Localization in Wireless Sensor Networks Through the Revocation of Malicious Anchors

    In a Wireless Sensor Network (WSN), the Sensor Nodes (SNs) generally localize themselves with the help of anchors that are pre-deployed in the network. Time of Arrival (ToA) is a commonly used mechanism for SNs localization in WSNs. In ToA, the SNs localize themselves using the positions of the anchors...

    Provided By Arizona State University

  • White Papers // May 2010

    Dynamic Code Mapping for Limited Local Memory Systems

    This paper presents heuristics for dynamic management of application code on limited local memories present in high-performance multi-core processors. Previous techniques formulate the problem using call graphs, which do not capture the temporal ordering of functions. In addition, they only use a conservative estimate of the interference cost between functions...

    Provided By Arizona State University

  • White Papers // Apr 2010

    Tradeoffs of Service, Security and Attack for Cyber System Survivability

    Trade-offs within the limitation of given system resources often have to be made for a cyber system to sustain its more critical services under the damage of cyber attacks. Understanding and modeling cause-effect dynamics of activities (Service, security and attack), system state and Quality of Service (QoS) are essential to...

    Provided By Arizona State University

  • White Papers // Nov 2009

    Illicit Money Flows As Motives For FDI

    The authors examine the role of FDI in facilitating money laundering and capital flight using transition economies' FDI outflows to show the extent to which FDI is caused by these motives. They estimate a model of FDI location choice and a model of the volume of FDI outflows. Illicit money...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Finding a Path Subject to Many Additive QoS Constraints

    A fundamental problem of routing in a network that provides Quality-of-Service (QoS) guarantees is to find a path between a specified source-destination node pair that simultaneously satisfies multiple QoS constraints, such as cost, delay, and reliability. Such an environment is commonly modeled by a graph with n vertices and m...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms

    Two fundamental functions of the sensor nodes in a wireless sensor network are to sense its environment and to transmit sensed information to a basestation. One approach to prolong sensor network lifetime is to deploy some relay nodes whose main function is to communicate with the sensor nodes, other relay...

    Provided By Arizona State University

  • White Papers // Apr 2010

    Relevance-Based Retrieval on Hidden-Web Text Databases Without Ranking Support

    Many online or local data sources provide powerful querying mechanisms but limited ranking capabilities. For instance, PubMed allows users to submit highly expressive Boolean keyword queries, but ranks the query results by date only. However, a user would typically prefer a ranking by relevance, measured by an Information Retrieval (IR)...

    Provided By Arizona State University

  • White Papers // Dec 2010

    Defining and Mining Functional Dependencies in Probabilistic Databases

    Functional dependencies - traditional, approximate and conditional are of critical importance in relational databases, as they inform them about the relationships between attributes. They are useful in schema normalization, data rectification and source selection. Most of these were however developed in the context of deterministic data. Although uncertain databases have...

    Provided By Arizona State University

  • White Papers // Oct 2009

    SMARTINT: A System for Answering Queries Over Web Databases Using Attribute Dependencies

    Many web databases can be seen as providing partial and overlapping information about entities in the world. To answer queries effectively, the authors need to integrate the information about the individual entities that are fragmented over multiple sources. At first blush this is just the inverse of traditional database normalization...

    Provided By Arizona State University

  • White Papers // Jan 2011

    A Stochastic Primal-Dual Algorithm for Joint Flow Control and MAC Design in Multi-Hop Wireless Networks

    In this paper the authors study stochastic rate control for joint flow control and MAC design in multi-hop wireless networks with random access. Most existing studies along this avenue are based on deterministic convex optimization and the corresponding distributed algorithms developed therein involve deterministic feedback control. In a multi-hop wireless...

    Provided By Arizona State University

  • White Papers // Jul 2009

    Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media

    The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, there is no easy way to find the most useful content or to detect whether it is trustworthy. A casual observer might not be...

    Provided By Arizona State University

  • White Papers // May 2010

    Identifying Evolving Groups in Dynamic Multi-Mode Networks

    A multi-mode network consists of heterogeneous types of actors with various interactions occurring between them. Identifying communities in a multi-mode network can help understand the structural properties of the network, address the data shortage and unbalanced problems, and assist tasks like targeted marketing and finding influential actors within or between...

    Provided By Arizona State University

  • White Papers // Sep 2009

    Uncovering Groups Via Heterogeneous Interaction Analysis

    With the pervasive availability of Web 2.0 and social networking sites, people can interact with each other easily through various social media. For instance, popular sites like Del.icio.us, Flickr, and YouTube allow users to comment shared content (bookmark, photos, videos), and users can tag their own favorite content. Users can...

    Provided By Arizona State University

  • White Papers // Jan 2011

    Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters

    Blade severs are being increasingly deployed in modern datacenters due to their high performance/cost ratio and compact size. In this study, the authors paper their work on blade server based datacenter thermal management. The goal is to minimize the total energy costs (usage) of datacenter operation while providing a reasonable...

    Provided By Arizona State University

  • White Papers // Mar 2010

    Toward Collective Behavior Prediction Via Social Dimension Extraction

    Collective behavior refers to how individuals behave when they are exposed in a social network environment. In this paper, the authors examine how they can predict online behaviors of users in a network, given the behavior information of some actors in the network. Many social media tasks can be connected...

    Provided By Arizona State University