Auburn University

Displaying 1-40 of 43 results

  • White Papers // Jan 2014

    An Initial Study on Density-Aware Cache Management for GPU

    Due to the long latency of off-chip global memory, memory access coalescing in GPUs plays a critical role in retaining the high computation power by merging per-thread memory requests from the same warp into a minimum number of cacheline-sized memory transactions. However, the effectiveness of memory coalescing is greatly affected...

    Provided By Auburn University

  • White Papers // Oct 2013

    Enabling Actionable Analytics for Mobile Devices: Performance Issues of Distributed Analytics on Hadoop Mobile Clusters

    Significant innovations in mobile technologies are enabling mobile users to make real-time actionable decisions based on balancing opportunities and risks to take coordinated actions with other users in their workplace. This requires a new distributed analytic framework that collects relevant information from internal and external sources, performs real-time distributed analytics,...

    Provided By Auburn University

  • White Papers // May 2013

    Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application

    Exascale computing systems are soon to emerge, which will pose great challenges on the huge gap between computing and I/O performance. Many large-scale scientific applications play an important role in the user's daily life. The huge amounts of data generated by such applications require highly parallel and efficient I/O management...

    Provided By Auburn University

  • White Papers // Nov 2012

    On Interference Alignment in Multi-User OFDM Systems

    Multi-user Orthogonal Frequency Division Multiplexing (OFDM) have been widely adopted to combat the detrimental effects of wireless channels and enhance system throughput. Recently, interference alignment is proposed to exploit interference to enable concurrent transmissions of multiple signals. In this paper, the authors investigate how to incorporate interference alignment in multi-user...

    Provided By Auburn University

  • White Papers // Nov 2012

    Adaptive Electricity Scheduling With Quality of Usage Guarantees in Microgrids

    MicroGrid (MG) is a key component for future Smart Grid (SG) deployment with high potentials. Balancing the supply and demand of energy is one of the most important goals of MG management. In this paper, the authors explore effective schemes for Quality-of-Usage (QoU) guarantees for local residents in an MG,...

    Provided By Auburn University

  • White Papers // Nov 2012

    On Balancing Energy Efficiency and Estimation Error in Compressed Sensing

    Compressed Sensing (CS) refers to the process of reconstructing a signal that is supposed to be sparse or compressible. CS has wide applications, such as in cognitive radio networks. In this paper, the authors investigate effective CS schemes for balancing energy efficiency and estimation error. They propose an enhancement to...

    Provided By Auburn University

  • White Papers // May 2012

    On Adopting Interleave Division Multiple Access in Two-Tier Femtocell Networks: The Uplink Case

    A Femtocell Base Station (FBS) is designed to cater for the demand of ever-increasing wireless data traffic, typically in the indoor environment. Among the many technical problems, interference management is particularly a challenging one for fully harvesting the high potential of femtocell networks. In this paper, the authors address the...

    Provided By Auburn University

  • White Papers // May 2012

    Joint Soft-Decision Cooperative Spectrum Sensing and Power Control in Multiband Cognitive Radios

    The authors consider joint optimization of cooperative spectrum sensing, channel access and power allocation in an overlay multi-band cognitive radio network to maximize the secondary users' sum instantaneous throughput while keeping the interference to primary users under a specified threshold. A soft-decision cooperative spectrum sensing concept using the continuous-valued sensing...

    Provided By Auburn University

  • White Papers // May 2012

    Survey of Wireless Network-on-Chip Systems

    Now-a-days, Network-on-Chip (NoC) systems are becoming more popular due to their big advantages when compare with System-on-Chip (SoC). Therefore, an increasing number of researchers and organizations now focus on the study and development of NoC techniques. As a result, so far many achievements have been gained. Furthermore, considering the dominant...

    Provided By Auburn University

  • White Papers // Mar 2012

    MSE-Based Source and Relay Precoder Design for Cognitive Radio Multiuser Two-Way Relay System

    The authors consider joint design of source and relay pre-coders in a cognitive multiuser two-way relay system, which supports simultaneous transmission of multiple secondary users concurrently with primary network with the help of a relay node. The design criterion is to minimize the sum Mean Square Error (MSE) of all...

    Provided By Auburn University

  • White Papers // Aug 2011

    Interference Statistics of a Poisson Field of Interferers With Random Puncturing

    Assume that the nodes in a wireless network are distributed according to a Poisson Point Process (PPP). This is a reasonable assumption when the movements of nodes in a mobile network are uncorrelated or when the nodes are deployed randomly (for example, in a wireless sensor network). The field of...

    Provided By Auburn University

  • White Papers // Aug 2011

    EDO: Improving Read Performance for Scientific Applications Through Elastic Data Organization

    Large scale scientific applications are often bottlenecked due to the writing of checkpoint-restart data. Much work has been focused on improving their write performance. With the mounting needs of scientific discovery from these datasets, it is also important to provide good read performance for many common access patterns, which requires...

    Provided By Auburn University

  • White Papers // Jun 2011

    Virtual Topologies for Scalable Resource Management and Contention Attenuation in a Global Address Space Model on the Cray XT5

    Global Address Space (GAS) programming models enable a convenient, shared-memory style addressing model, and support completely asynchronous data movement. Their underlying runtime systems face critical challenges in scalably managing resources (such as memory for communication buffers) and gracefully handling unpredictable communication patterns and any associated contention. In this paper, the...

    Provided By Auburn University

  • White Papers // May 2011

    A Sensing Error Aware MAC Protocol for Cognitive Radio Networks

    Cognitive Radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, the authors present a spectrum sensing error aware MAC protocol for a CR network collocated...

    Provided By Auburn University

  • White Papers // Apr 2011

    Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication

    The availability of a new carry-less multiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for reevaluating algorithms for binary field arithmetic and scalar multiplication over elliptic curves. The authors describe how to best employ this instruction in field multiplication...

    Provided By Auburn University

  • White Papers // Apr 2011

    Spillover Effects Of The US Financial Crisis On Financial Markets In Emerging Asian Countries

    The authors estimate dynamic conditional correlations of financial asset returns across countries by an array of multivariate GARCH models and analyze spillover effects of the recent US financial crisis on 5 emerging Asian countries. They find a symptom of financial contagion around the collapse of Lehman Brothers in September 2008....

    Provided By Auburn University

  • White Papers // Mar 2011

    Harnessing Web 2.0 and Cloud Computing in the Service of Disaster Response and Recovery

    The underlying theme of many disaster response case studies is effective human resource management under challenging conditions. Disaster response in libraries often centers on the reaction to events, bringing to mind images of triage and salvage. However, an important component of preservation involves laying the groundwork for the human response...

    Provided By Auburn University

  • White Papers // Feb 2011

    Cooperative Spectrum Sharing for a Primary Network With Capacity Constraint

    In this paper, the authors propose a cooperative framework for spectrum sharing between a secondary random ad hoc network and a primary network with capacity constraint. While the interference from secondary network must satisfy a power constraint, there is no stipulation on its higher order statistics. Considering a generalized Gaussian...

    Provided By Auburn University

  • White Papers // Nov 2010

    A High TCP Performance Rate Adaptation Algorithm for IEEE 802.11 Networks

    Rate adaptation is a link layer mechanism critical to the system performance by exploiting the multiple transmission rates provided by current IEEE 802.11 WLANs. The key challenge for designing such an algorithm is how to select the most appropriate transmission rate under different environments. The first generation rate adaptation schemes...

    Provided By Auburn University

  • White Papers // Sep 2010

    Enhancing Cloud Storage Security Against Roll-Back Attacks With a New Fair Multi-Party Non-Repudiation Protocol

    Along with variant advantages, cloud storage also poses new security challenges. Potential users are reluctant to move important and sensitive data to cloud unless security challenges have been well addressed. This paper reports, the authors' on-going efforts to address three data security issues in cloud storage: repudiation, fairness, and roll-back...

    Provided By Auburn University

  • White Papers // Sep 2010

    A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks

    Solid-State Disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one...

    Provided By Auburn University

  • White Papers // Aug 2010

    G-STAR: Geometric STAteless Routing for 3-D Wireless Sensor Networks

    3-D aerial and underwater sensor networks have found various applications in natural habitat monitoring, weather/earthquake forecast, terrorist intrusion detection, and homeland security. The resource-constrained and dynamic nature of such networks has made the stateless routing protocol with only local information a preferable choice. However, most of the existing routing protocols...

    Provided By Auburn University

  • White Papers // Jun 2010

    Information Assurance in Video Streaming: A Case Study

    Universities consider lectures and classes to be intellectual property which must be protected. In this case study the authors discuss the processes by which outreach courses delivered via the Internet are protected. Specifically, this paper describes two procedures used to protect outreach courses at the University. In this setting, the...

    Provided By Auburn University

  • White Papers // Jun 2010

    Analysis of Integrity Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage Platforms

    Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a...

    Provided By Auburn University

  • White Papers // Mar 2010

    Improving MapReduce Performance Through Data Placement in Heterogeneous Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. The current Hadoop implementation assumes that computing nodes in a cluster are homogeneous in nature....

    Provided By Auburn University

  • White Papers // Mar 2010

    Message-Efficient CDS Construction in MANETs

    The Connected Dominating Set (CDS) has been extensively used for routing and broadcast in Mobile Ad hoc NETworks (MANETs). Due to the nature of MANETs, it is preferred that the CDS protocol not only creates a CDS with small size, but also incurs less communication and computational overhead, adapts to...

    Provided By Auburn University

  • White Papers // Feb 2010

    IEEE 802.11s Wireless Mesh Networks for Last-Mile Internet Access: An Open-Source Real-World Indoor Testbed Implementation

    Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the standardization of this new technology is still in progress, its main traits are already set in the IEEE 802.11s standard: WMN architecture and MAC...

    Provided By Auburn University

  • White Papers // Jan 2010

    ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks

    Developing routing protocol for Vehicular Ad hoc Networks (VANET) is a challenging task due to potentially large network sizes, rapidly changing topology and frequent network disconnections, which can cause failure or inefficiency in traditional ad hoc routing protocols. Authors propose an Adaptive Connectivity Aware Routing (ACAR) protocol that addresses these...

    Provided By Auburn University

  • White Papers // Jan 2010

    Enhancing Congestion Control for Wireless Links

    Bandwidth on wireless links keeps increasing, so does the bandwidth on wired links. Therefore, the discrepancy in bandwidth between wireless and wired links still persists. Such discrepancy causes the wireless link to likely remain the bottleneck for data transfers from wired networks to a wireless destination, as a bottleneck, the...

    Provided By Auburn University

  • White Papers // Dec 2009

    Channel Management in Collocated WiFi-WiMAX Networks

    In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper, the authors briefly discuss the complete sharing, complete partitioning and Hybrid resource sharing approaches and their shortcomings in WiMax-WiFi integrated networks. To overcome these shortcomings...

    Provided By Auburn University

  • White Papers // Nov 2009

    GPSFR: GPS-Free Routing Protocol for Vehicular Networks With Directional Antennas

    Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as "Urban canyons" and tunnels. The authors...

    Provided By Auburn University

  • White Papers // Oct 2009

    Analysis and Design of a Proportional-Integral Rate Controller for Streaming Videos

    In this paper, the authors study the problem of rate control for streaming videos by jointly considering encoder rate control and network congestion control. They adopt a control-theoretic approach that models video streaming as a feedback control system. Based on a properly chosen operating point, the model is linearized and...

    Provided By Auburn University

  • White Papers // Oct 2009

    A Novel DDoS Attack Defending Framework With Minimized Bilateral Damages

    Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as attackers or may simply not block enough traffic to adequately protect the victim....

    Provided By Auburn University

  • White Papers // Sep 2009

    Prioritized Resource Sharing in WiMax and WiFi Integrated Networks

    In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper, the authors briefly discuss the complete sharing, complete partitioning and Hybrid resource sharing approaches and their shortcomings in WiMax-WiFi integrated networks. To overcome these shortcomings...

    Provided By Auburn University

  • White Papers // Sep 2009

    Group-Server Scheduling for Continuous Multimedia Streaming in MANETs

    At present mobile devices are prevalent with end users and continuous media streaming services in Mobile Adhoc NETworks (MANETs) support popular applications. One of the requirements for applications that stream isochronous media is that the network link has to be continuously available. In this paper, the authors introduce two group-server...

    Provided By Auburn University

  • White Papers // Aug 2009

    Effect of Dynamic Spectrum Access on Transport Control Protocol Performance

    Transmission Control Protocol (TCP) is the most commonly used transport protocol on the Internet. All indications assure that it will be an integral part of the future inter-networks. In this paper, the authors present how regular TCP which was designed for wired networks is not suitable for dynamic spectrum access...

    Provided By Auburn University

  • White Papers // Aug 2009

    Built-In Self-Test of Embedded SEU Detection Cores in Virtex-4 and Virtex-5 FPGAs

    A Built-In Self-Test (BIST) approach is presented for the Internal Configuration Access Port (ICAP) and Frame Error Correcting Code (ECC) logic cores embedded in Xilinx Virtex-4 and Virtex-5 Field Programmable Gate Arrays (FPGAs). The Frame ECC logic facilitates the detection of Single Event Upsets (SEUs) in the FPGA configuration memory....

    Provided By Auburn University

  • White Papers // Aug 2009

    Can We Improve Energy Efficiency of Secure Disk Systems Without Modifying Security Mechanisms?

    Improving energy efficiency of security-aware storage systems is challenging, because security and energy efficiency are often two conflicting goals. The first step toward making the best tradeoffs between high security and energy efficiency is to profile encryption algorithms to decide if storage systems would be able to produce energy savings...

    Provided By Auburn University

  • White Papers // Jun 2009

    Understanding, Modeling And Improving The Development Of Complex Products: Method And Study

    Development of new aerostructure designs frequently occurs through a complex process that is difficult to understand and control. Tight requirements for weight, cost, strength, and aerodynamic behavior create many interdependencies in the product design, which translate through to the design process. An increasing fragmentation of the commercial aerospace industry has...

    Provided By Auburn University

  • White Papers // Mar 2009

    Built-In Self-Test of Digital Signal Processors in Virtex-4 FPGAs

    This paper present a Built-In Self-Test (BIST) approach for testing and diagnosing the embedded Digital Signal Processors (DSPs) in Xilinx Virtex-4 series Field Programmable Gate Arrays (FPGAs). The BIST architecture and configurations needed to test these programmable DSPs in all of their modes of operation are presented along with fault...

    Provided By Auburn University

  • White Papers // Nov 2012

    On Interference Alignment in Multi-User OFDM Systems

    Multi-user Orthogonal Frequency Division Multiplexing (OFDM) have been widely adopted to combat the detrimental effects of wireless channels and enhance system throughput. Recently, interference alignment is proposed to exploit interference to enable concurrent transmissions of multiple signals. In this paper, the authors investigate how to incorporate interference alignment in multi-user...

    Provided By Auburn University

  • White Papers // Aug 2009

    Effect of Dynamic Spectrum Access on Transport Control Protocol Performance

    Transmission Control Protocol (TCP) is the most commonly used transport protocol on the Internet. All indications assure that it will be an integral part of the future inter-networks. In this paper, the authors present how regular TCP which was designed for wired networks is not suitable for dynamic spectrum access...

    Provided By Auburn University

  • White Papers // Jun 2010

    Information Assurance in Video Streaming: A Case Study

    Universities consider lectures and classes to be intellectual property which must be protected. In this case study the authors discuss the processes by which outreach courses delivered via the Internet are protected. Specifically, this paper describes two procedures used to protect outreach courses at the University. In this setting, the...

    Provided By Auburn University

  • White Papers // Apr 2011

    Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication

    The availability of a new carry-less multiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for reevaluating algorithms for binary field arithmetic and scalar multiplication over elliptic curves. The authors describe how to best employ this instruction in field multiplication...

    Provided By Auburn University

  • White Papers // Dec 2008

    On the Capacity of Secondary Users in a Cognitive Radio Network

    Cognitive radio networks deal with opportunistic spectrum access leading to greater utilization of the spectrum. The extent of utilization depends on the primary user's traffic and also on the way the spectrum is accessed by the primary and secondary users. In this paper Continuous-time Markov chains are used to model...

    Provided By Auburn University

  • White Papers // Nov 2010

    A High TCP Performance Rate Adaptation Algorithm for IEEE 802.11 Networks

    Rate adaptation is a link layer mechanism critical to the system performance by exploiting the multiple transmission rates provided by current IEEE 802.11 WLANs. The key challenge for designing such an algorithm is how to select the most appropriate transmission rate under different environments. The first generation rate adaptation schemes...

    Provided By Auburn University

  • White Papers // Sep 2009

    Prioritized Resource Sharing in WiMax and WiFi Integrated Networks

    In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper, the authors briefly discuss the complete sharing, complete partitioning and Hybrid resource sharing approaches and their shortcomings in WiMax-WiFi integrated networks. To overcome these shortcomings...

    Provided By Auburn University

  • White Papers // Nov 2009

    GPSFR: GPS-Free Routing Protocol for Vehicular Networks With Directional Antennas

    Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as "Urban canyons" and tunnels. The authors...

    Provided By Auburn University

  • White Papers // Aug 2011

    Interference Statistics of a Poisson Field of Interferers With Random Puncturing

    Assume that the nodes in a wireless network are distributed according to a Poisson Point Process (PPP). This is a reasonable assumption when the movements of nodes in a mobile network are uncorrelated or when the nodes are deployed randomly (for example, in a wireless sensor network). The field of...

    Provided By Auburn University

  • White Papers // Feb 2011

    Cooperative Spectrum Sharing for a Primary Network With Capacity Constraint

    In this paper, the authors propose a cooperative framework for spectrum sharing between a secondary random ad hoc network and a primary network with capacity constraint. While the interference from secondary network must satisfy a power constraint, there is no stipulation on its higher order statistics. Considering a generalized Gaussian...

    Provided By Auburn University

  • White Papers // Aug 2009

    Built-In Self-Test of Embedded SEU Detection Cores in Virtex-4 and Virtex-5 FPGAs

    A Built-In Self-Test (BIST) approach is presented for the Internal Configuration Access Port (ICAP) and Frame Error Correcting Code (ECC) logic cores embedded in Xilinx Virtex-4 and Virtex-5 Field Programmable Gate Arrays (FPGAs). The Frame ECC logic facilitates the detection of Single Event Upsets (SEUs) in the FPGA configuration memory....

    Provided By Auburn University

  • White Papers // Sep 2010

    A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks

    Solid-State Disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one...

    Provided By Auburn University

  • White Papers // Apr 2011

    Spillover Effects Of The US Financial Crisis On Financial Markets In Emerging Asian Countries

    The authors estimate dynamic conditional correlations of financial asset returns across countries by an array of multivariate GARCH models and analyze spillover effects of the recent US financial crisis on 5 emerging Asian countries. They find a symptom of financial contagion around the collapse of Lehman Brothers in September 2008....

    Provided By Auburn University

  • White Papers // Mar 2010

    Improving MapReduce Performance Through Data Placement in Heterogeneous Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. The current Hadoop implementation assumes that computing nodes in a cluster are homogeneous in nature....

    Provided By Auburn University

  • White Papers // Mar 2011

    Harnessing Web 2.0 and Cloud Computing in the Service of Disaster Response and Recovery

    The underlying theme of many disaster response case studies is effective human resource management under challenging conditions. Disaster response in libraries often centers on the reaction to events, bringing to mind images of triage and salvage. However, an important component of preservation involves laying the groundwork for the human response...

    Provided By Auburn University

  • White Papers // Aug 2009

    Can We Improve Energy Efficiency of Secure Disk Systems Without Modifying Security Mechanisms?

    Improving energy efficiency of security-aware storage systems is challenging, because security and energy efficiency are often two conflicting goals. The first step toward making the best tradeoffs between high security and energy efficiency is to profile encryption algorithms to decide if storage systems would be able to produce energy savings...

    Provided By Auburn University

  • White Papers // Sep 2010

    Enhancing Cloud Storage Security Against Roll-Back Attacks With a New Fair Multi-Party Non-Repudiation Protocol

    Along with variant advantages, cloud storage also poses new security challenges. Potential users are reluctant to move important and sensitive data to cloud unless security challenges have been well addressed. This paper reports, the authors' on-going efforts to address three data security issues in cloud storage: repudiation, fairness, and roll-back...

    Provided By Auburn University

  • White Papers // Mar 2009

    DARAW: A New Write Buffer to Improve Parallel I/O Energy-Efficiency

    In the past decades, parallel I/O systems have been used widely to support scientific and commercial applications. New data centers today employ huge quantities of I/O systems, which consume a large amount of energy. Most large-scale I/O systems have an array of hard disks working in parallel to meet performance...

    Provided By Auburn University

  • White Papers // May 2011

    A Sensing Error Aware MAC Protocol for Cognitive Radio Networks

    Cognitive Radios (CR) are intelligent radio devices that can sense the radio environment and adapt to changes in the radio environment. Spectrum sensing and spectrum access are the two key CR functions. In this paper, the authors present a spectrum sensing error aware MAC protocol for a CR network collocated...

    Provided By Auburn University

  • White Papers // Mar 2010

    Message-Efficient CDS Construction in MANETs

    The Connected Dominating Set (CDS) has been extensively used for routing and broadcast in Mobile Ad hoc NETworks (MANETs). Due to the nature of MANETs, it is preferred that the CDS protocol not only creates a CDS with small size, but also incurs less communication and computational overhead, adapts to...

    Provided By Auburn University

  • White Papers // Oct 2009

    A Novel DDoS Attack Defending Framework With Minimized Bilateral Damages

    Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as attackers or may simply not block enough traffic to adequately protect the victim....

    Provided By Auburn University

  • White Papers // Sep 2009

    Group-Server Scheduling for Continuous Multimedia Streaming in MANETs

    At present mobile devices are prevalent with end users and continuous media streaming services in Mobile Adhoc NETworks (MANETs) support popular applications. One of the requirements for applications that stream isochronous media is that the network link has to be continuously available. In this paper, the authors introduce two group-server...

    Provided By Auburn University

  • White Papers // Feb 2009

    Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

    It is preferred that CDS protocols result in small size of CDS, incur less communication overhead, complete quickly, and adapt to the changes of network topology. The previous works significantly improved the performance of the CDS protocol except for the convergence time. In this paper, the authors proposed the Fast...

    Provided By Auburn University

  • White Papers // Aug 2010

    G-STAR: Geometric STAteless Routing for 3-D Wireless Sensor Networks

    3-D aerial and underwater sensor networks have found various applications in natural habitat monitoring, weather/earthquake forecast, terrorist intrusion detection, and homeland security. The resource-constrained and dynamic nature of such networks has made the stateless routing protocol with only local information a preferable choice. However, most of the existing routing protocols...

    Provided By Auburn University

  • White Papers // May 2012

    On Adopting Interleave Division Multiple Access in Two-Tier Femtocell Networks: The Uplink Case

    A Femtocell Base Station (FBS) is designed to cater for the demand of ever-increasing wireless data traffic, typically in the indoor environment. Among the many technical problems, interference management is particularly a challenging one for fully harvesting the high potential of femtocell networks. In this paper, the authors address the...

    Provided By Auburn University

  • White Papers // May 2012

    Joint Soft-Decision Cooperative Spectrum Sensing and Power Control in Multiband Cognitive Radios

    The authors consider joint optimization of cooperative spectrum sensing, channel access and power allocation in an overlay multi-band cognitive radio network to maximize the secondary users' sum instantaneous throughput while keeping the interference to primary users under a specified threshold. A soft-decision cooperative spectrum sensing concept using the continuous-valued sensing...

    Provided By Auburn University

  • White Papers // Mar 2012

    MSE-Based Source and Relay Precoder Design for Cognitive Radio Multiuser Two-Way Relay System

    The authors consider joint design of source and relay pre-coders in a cognitive multiuser two-way relay system, which supports simultaneous transmission of multiple secondary users concurrently with primary network with the help of a relay node. The design criterion is to minimize the sum Mean Square Error (MSE) of all...

    Provided By Auburn University

  • White Papers // Nov 2012

    Adaptive Electricity Scheduling With Quality of Usage Guarantees in Microgrids

    MicroGrid (MG) is a key component for future Smart Grid (SG) deployment with high potentials. Balancing the supply and demand of energy is one of the most important goals of MG management. In this paper, the authors explore effective schemes for Quality-of-Usage (QoU) guarantees for local residents in an MG,...

    Provided By Auburn University

  • White Papers // Nov 2012

    On Balancing Energy Efficiency and Estimation Error in Compressed Sensing

    Compressed Sensing (CS) refers to the process of reconstructing a signal that is supposed to be sparse or compressible. CS has wide applications, such as in cognitive radio networks. In this paper, the authors investigate effective CS schemes for balancing energy efficiency and estimation error. They propose an enhancement to...

    Provided By Auburn University

  • White Papers // Oct 2009

    Analysis and Design of a Proportional-Integral Rate Controller for Streaming Videos

    In this paper, the authors study the problem of rate control for streaming videos by jointly considering encoder rate control and network congestion control. They adopt a control-theoretic approach that models video streaming as a feedback control system. Based on a properly chosen operating point, the model is linearized and...

    Provided By Auburn University

  • White Papers // Jan 2010

    ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks

    Developing routing protocol for Vehicular Ad hoc Networks (VANET) is a challenging task due to potentially large network sizes, rapidly changing topology and frequent network disconnections, which can cause failure or inefficiency in traditional ad hoc routing protocols. Authors propose an Adaptive Connectivity Aware Routing (ACAR) protocol that addresses these...

    Provided By Auburn University

  • White Papers // Mar 2009

    Built-In Self-Test of Digital Signal Processors in Virtex-4 FPGAs

    This paper present a Built-In Self-Test (BIST) approach for testing and diagnosing the embedded Digital Signal Processors (DSPs) in Xilinx Virtex-4 series Field Programmable Gate Arrays (FPGAs). The BIST architecture and configurations needed to test these programmable DSPs in all of their modes of operation are presented along with fault...

    Provided By Auburn University

  • White Papers // Jan 2010

    Enhancing Congestion Control for Wireless Links

    Bandwidth on wireless links keeps increasing, so does the bandwidth on wired links. Therefore, the discrepancy in bandwidth between wireless and wired links still persists. Such discrepancy causes the wireless link to likely remain the bottleneck for data transfers from wired networks to a wireless destination, as a bottleneck, the...

    Provided By Auburn University

  • White Papers // Jun 2009

    Understanding, Modeling And Improving The Development Of Complex Products: Method And Study

    Development of new aerostructure designs frequently occurs through a complex process that is difficult to understand and control. Tight requirements for weight, cost, strength, and aerodynamic behavior create many interdependencies in the product design, which translate through to the design process. An increasing fragmentation of the commercial aerospace industry has...

    Provided By Auburn University

  • White Papers // Jun 2010

    Analysis of Integrity Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage Platforms

    Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a...

    Provided By Auburn University

  • White Papers // Feb 2010

    IEEE 802.11s Wireless Mesh Networks for Last-Mile Internet Access: An Open-Source Real-World Indoor Testbed Implementation

    Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the standardization of this new technology is still in progress, its main traits are already set in the IEEE 802.11s standard: WMN architecture and MAC...

    Provided By Auburn University

  • White Papers // Dec 2009

    Channel Management in Collocated WiFi-WiMAX Networks

    In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper, the authors briefly discuss the complete sharing, complete partitioning and Hybrid resource sharing approaches and their shortcomings in WiMax-WiFi integrated networks. To overcome these shortcomings...

    Provided By Auburn University

  • White Papers // Jan 2014

    An Initial Study on Density-Aware Cache Management for GPU

    Due to the long latency of off-chip global memory, memory access coalescing in GPUs plays a critical role in retaining the high computation power by merging per-thread memory requests from the same warp into a minimum number of cacheline-sized memory transactions. However, the effectiveness of memory coalescing is greatly affected...

    Provided By Auburn University

  • White Papers // May 2013

    Profiling and Improving I/O Performance of a Large-Scale Climate Scientific Application

    Exascale computing systems are soon to emerge, which will pose great challenges on the huge gap between computing and I/O performance. Many large-scale scientific applications play an important role in the user's daily life. The huge amounts of data generated by such applications require highly parallel and efficient I/O management...

    Provided By Auburn University

  • White Papers // Aug 2011

    EDO: Improving Read Performance for Scientific Applications Through Elastic Data Organization

    Large scale scientific applications are often bottlenecked due to the writing of checkpoint-restart data. Much work has been focused on improving their write performance. With the mounting needs of scientific discovery from these datasets, it is also important to provide good read performance for many common access patterns, which requires...

    Provided By Auburn University