Binghamton University

Displaying 1-31 of 31 results

  • White Papers // Jul 2013

    LEMO-MR: Low overhead and Elastic MapReduce Implementation Optimized for Memory and CPU-Intensive Applications

    Since its inception, MapReduce has frequently been associated with Hadoop and large-scale datasets. Its deployment at Amazon in the cloud, and its applications at Yahoo! and Facebook for large-scale distributed document indexing and database building, among other tasks, have thrust MapReduce to the forefront of the data processing application domain....

    Provided By Binghamton University

  • White Papers // Jul 2013

    Configuring a MapReduce Framework for Dynamic and Efficient Energy Adaptation

    MapReduce has become a popular framework for big data applications. While MapReduce has received much praise for its scalability and efficiency, it has not been thoroughly evaluated for power consumption. In this paper, the authors explore the possibility of scheduling in a power-efficient manner without the need for expensive power...

    Provided By Binghamton University

  • White Papers // Jul 2013

    MARLA: MapReduce for Heterogeneous Clusters

    MapReduce has gradually become the framework of choice for \"Big data\". The MapReduce model allows for efficient and swift processing of large scale data with a cluster of compute nodes. However, the efficiency here comes at a price. The performance of widely used MapReduce implementations such as Hadoop suffers in...

    Provided By Binghamton University

  • White Papers // May 2013

    Cloud Security Auditing based on Behavioral Modeling

    Multi-tenancy is one of the most attractive features of cloud computing, which provides significant benefits to both clients and service providers by supporting elastic, efficient, and on-demand resource provisioning and allocation. However, this architecture also introduces additional security implications. Client Virtual Machine (VM) instances running on the same physical machine...

    Provided By Binghamton University

  • White Papers // Feb 2013

    An Evaluation of Cassandra for Hadoop

    In the last decade, the increased use and growth of social media, unconventional web technologies, and mobile applications, have all encouraged development of a new breed of database models. NoSQL data stores target the unstructured data, which by nature is dynamic and a main focus area for \"Big data\" research....

    Provided By Binghamton University

  • White Papers // Jan 2013

    An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection

    Shrew Distributed Denial-of-Service (DDoS) attacks are stealthy, concealing their malicious activities in normal traffic. Although it is difficult to detect shrew DDoS attacks in the time domain, the existent energy exposes them in frequency domain. For this purpose, online Power Spectral Density (PSD) analysis necessitates real-time PSD data conversion. In...

    Provided By Binghamton University

  • White Papers // Nov 2012

    Green Firewall: An Energy-Efficient Intrusion Prevention Mechanism in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited computation capability. After Intrusion Detection Systems (IDSs) identifies an mobile intruder, IDS may broadcast the blacklist to all nodes in network. This method is energy inefficient because all nodes have to receive...

    Provided By Binghamton University

  • White Papers // Oct 2012

    Adaptive Load Shedding Via Fuzzy Control in Data Stream Management Systems

    Data Stream Management Systems (DSMS) aim to process massive data streams in a timely fashion to support important applications, e.g., financial market analysis. However, DSMS can be overloaded due to large bursts in data stream arrivals and data-dependent query executions. To avoid overloads, the authors design a new load shedding...

    Provided By Binghamton University

  • White Papers // Jul 2012

    A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts

    Cloud computing hosts require a good source of cryptographically strong random numbers. Most of the standard security practices are based on assumptions that hold true for physical machines, but don't translate immediately into the domain of virtualized machines. It is imperative to reconsider the well accepted security practices that were...

    Provided By Binghamton University

  • White Papers // Oct 2011

    Benchmarking MapReduce Implementations for Application Usage Scenarios

    The MapReduce paradigm provides a scalable model for large scale data-intensive computing and associated fault-tolerance. With data production increasing daily due to ever growing application needs, scientific endeavors, and consumption, the MapReduce model and its implementations need to be further evaluated, improved, and strengthened. Several MapReduce frameworks with various degrees...

    Provided By Binghamton University

  • White Papers // Oct 2011

    Scalable and Distributed Processing of Scientific XML Data

    A seamless and intuitive search capability for the vast amount of datasets generated by scientific experiments is critical to ensure effective use of such data by domain specific scientists. Currently, searches on enormous XML datasets is done manually via custom scripts or by using hard-to-customize queries developed by experts in...

    Provided By Binghamton University

  • White Papers // Oct 2011

    MARIANE: MApReduce Implementation Adapted for HPC Environments

    MapReduce is increasingly becoming a popular framework, and a potent programming model. The most popular open source implementation of MapReduce, Hadoop, is based on the Hadoop Distributed File System (HDFS). However, as HDFS is not POSIX compliant, it cannot be fully leveraged by applications running on a majority of existing...

    Provided By Binghamton University

  • White Papers // Sep 2011

    DELMA: Dynamically ELastic MApReduce Framework for CPU-Intensive Applications

    Since its introduction, MapReduce implementations have been primarily focused towards static compute cluster sizes. In this paper, the authors introduce the concept of dynamic elasticity to MapReduce. They present the design decisions and implementation tradeoffs for DELMA, (Dynamically ELastic MApReduce), a framework that follows the MapReduce paradigm, just like Hadoop...

    Provided By Binghamton University

  • White Papers // Jul 2011

    Mitigating Cloud Computing Security Risks Using a Self-Monitoring Defensive Scheme

    Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and data through the network. These services are made discoverable to the user in the form of simple abstractions via virtualized resources. These services offer unprecedented dynamic, primarily hardware dependent, scalability. Although CC promises to make life much easier...

    Provided By Binghamton University

  • White Papers // Mar 2011

    A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds

    Data storage is one of the most profitable applications in Clouds. Although a transparent service model is convenient, it may be subject to the loss of data integrity. The authors' study revealed vulnerabilities in some commercial Cloud storage services. They analyzed the repudiation problem in a Cloud environment. In this...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Scalability Aspects of Instruction Distribution Algorithms for Clustered Processors

    In the evolving sub-micron technology, importance of wire delays is growing, making it particularly attractive to use decentralized designs. A common form of decentralization adopted in processors is to partition the execution core into multiple clusters. Each cluster has a small instruction window, and a set of functional units. A...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Crosstalk Reduction in Area Routing

    Interconnect delay dominates system delay in modern circuits, and with reduced feature sizes, coupling capacitance and signal crosstalk have become significant issues. By spacing interconnect wires effectively, and avoiding long parallel runs, coupling can be reduced; with current routing methods, however, this is difficult to achieve. This paper presents a...

    Provided By Binghamton University

  • White Papers // Mar 2010

    EEO: An Efficient MDS-Like RAID-6 Code for Parallel Implementation

    In recent years, researchers have found that some XOR erasure codes lead to higher performance and better throughput in fault-tolerant distributed data storage applications. However, little consideration has been given to the advantages of parallel processing or hardware implementations taking advantage of the emergence of multi-core processors. This paper presents...

    Provided By Binghamton University

  • White Papers // Feb 2010

    Thermal-Aware Job Allocation and Scheduling for Three Dimensional Chip Multiprocessor

    In this paper, the authors propose a thermal-aware job allocation and scheduling algorithm for Three-Dimensional (3D) Chip Multi-Processor (CMP). The proposed algorithm assigns hot jobs to the cores close to the heat sink and cool jobs to the cores far from the heat sink, subject to thermal constraints. The direct...

    Provided By Binghamton University

  • White Papers // Nov 2009

    Parallel and Distributed Approach for Processing Large-Scale XML Datasets

    An emerging trend is the use of XML as the data format for many distributed scientific applications, with the size of these documents ranging from tens of megabytes to hundreds of megabytes. The earlier benchmarking results revealed that most of the widely available XML processing toolkits do not scale well...

    Provided By Binghamton University

  • White Papers // Aug 2009

    Two-Stage Decomposition of SNORT Rules Towards Efficient Hardware Implementation

    The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware...

    Provided By Binghamton University

  • White Papers // May 2009

    Post-Copy Live Migration of Virtual Machines

    This paper presents the design, implementation, and evaluation of post-copy based live migration for Virtual Machines (VMs) across a Gigabit LAN. Post-copy migration defers the transfer of a VM's memory contents until after its processor state has been sent to the target host. This deferral is in contrast to the...

    Provided By Binghamton University

  • White Papers // May 2009

    BLINK: Pixel-Domain Encryption for Secure Document Management

    BLINK, or brief-lifetime ink, is a technology for secure document delivery and management that employs pixel-domain scrambling of raster images by a hardware device connecting a computer to its display. A BLINK decoder monitors digital video signals, identifies the presence of scrambled images, and selectively decrypts regions of the video...

    Provided By Binghamton University

  • White Papers // Apr 2009

    Parallel Processing of Large-Scale XML-Based Application Documents on Multi-Core Architectures With PiXiMaL

    Very large scientific datasets are becoming increasingly available in XML formats. The earlier benchmarking results show that parsing XML is a time consuming process when compared with binary formats optimized for large scale documents. This performance bottleneck will get exacerbated as size of XML data increases in e-science applications. The...

    Provided By Binghamton University

  • White Papers // Mar 2009

    RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation

    The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world...

    Provided By Binghamton University

  • White Papers // Mar 2009

    On the Accuracy of RFID-Based Localization in a Mobile Wireless Network Testbed

    The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network...

    Provided By Binghamton University

  • White Papers // Dec 2008

    Testbed Design and Localization in MiNT-2: A Miniaturized Robotic Platform for Wireless Protocol Development and Emulation

    A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves...

    Provided By Binghamton University

  • White Papers // Oct 2008

    BLINK: Securing Information to the Last Connection

    Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable - both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, the authors proposed a novel scheme called BLINK,...

    Provided By Binghamton University

  • White Papers // Sep 2008

    Power Optimization for Conditional Task Graphs in DVS Enabled Multiprocessor Systems

    Multiprocessor System-on-Chip (MPSoC) is becoming a major system design platform for general purpose and real-time applications, due to its advantages in low design cost and high performance. Minimizing the power consumption is one of the major issues in designing battery operated MPSoC. One of the widely used power reduction technique...

    Provided By Binghamton University

  • White Papers // May 2008

    Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

    Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. This paper proposes a set of techniques that can be applied in a backward learning routing algorithm in order to minimize or even eliminate explicit control messages for...

    Provided By Binghamton University

  • White Papers // Feb 2007

    Profile-Based Low Power Scheduling for Conditional Task Graph: A Communication Aware Approach

    In this paper, the authors focus on power optimization of real-time applications with conditional execution running on a Dynamic Voltage Scaling (DVS) enabled multiprocessor system. A novel algorithm is proposed that performs simultaneous task mapping and ordering followed by task stretching of a Conditional Task Graph (CTG). The algorithm minimizes...

    Provided By Binghamton University

  • White Papers // Mar 2010

    EEO: An Efficient MDS-Like RAID-6 Code for Parallel Implementation

    In recent years, researchers have found that some XOR erasure codes lead to higher performance and better throughput in fault-tolerant distributed data storage applications. However, little consideration has been given to the advantages of parallel processing or hardware implementations taking advantage of the emergence of multi-core processors. This paper presents...

    Provided By Binghamton University

  • White Papers // Apr 2009

    Parallel Processing of Large-Scale XML-Based Application Documents on Multi-Core Architectures With PiXiMaL

    Very large scientific datasets are becoming increasingly available in XML formats. The earlier benchmarking results show that parsing XML is a time consuming process when compared with binary formats optimized for large scale documents. This performance bottleneck will get exacerbated as size of XML data increases in e-science applications. The...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Scalability Aspects of Instruction Distribution Algorithms for Clustered Processors

    In the evolving sub-micron technology, importance of wire delays is growing, making it particularly attractive to use decentralized designs. A common form of decentralization adopted in processors is to partition the execution core into multiple clusters. Each cluster has a small instruction window, and a set of functional units. A...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Crosstalk Reduction in Area Routing

    Interconnect delay dominates system delay in modern circuits, and with reduced feature sizes, coupling capacitance and signal crosstalk have become significant issues. By spacing interconnect wires effectively, and avoiding long parallel runs, coupling can be reduced; with current routing methods, however, this is difficult to achieve. This paper presents a...

    Provided By Binghamton University

  • White Papers // Nov 2009

    Parallel and Distributed Approach for Processing Large-Scale XML Datasets

    An emerging trend is the use of XML as the data format for many distributed scientific applications, with the size of these documents ranging from tens of megabytes to hundreds of megabytes. The earlier benchmarking results revealed that most of the widely available XML processing toolkits do not scale well...

    Provided By Binghamton University

  • White Papers // May 2009

    Post-Copy Live Migration of Virtual Machines

    This paper presents the design, implementation, and evaluation of post-copy based live migration for Virtual Machines (VMs) across a Gigabit LAN. Post-copy migration defers the transfer of a VM's memory contents until after its processor state has been sent to the target host. This deferral is in contrast to the...

    Provided By Binghamton University

  • White Papers // Dec 2008

    Testbed Design and Localization in MiNT-2: A Miniaturized Robotic Platform for Wireless Protocol Development and Emulation

    A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves...

    Provided By Binghamton University

  • White Papers // May 2008

    Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

    Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. This paper proposes a set of techniques that can be applied in a backward learning routing algorithm in order to minimize or even eliminate explicit control messages for...

    Provided By Binghamton University

  • White Papers // Mar 2011

    A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds

    Data storage is one of the most profitable applications in Clouds. Although a transparent service model is convenient, it may be subject to the loss of data integrity. The authors' study revealed vulnerabilities in some commercial Cloud storage services. They analyzed the repudiation problem in a Cloud environment. In this...

    Provided By Binghamton University

  • White Papers // Jul 2011

    Mitigating Cloud Computing Security Risks Using a Self-Monitoring Defensive Scheme

    Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and data through the network. These services are made discoverable to the user in the form of simple abstractions via virtualized resources. These services offer unprecedented dynamic, primarily hardware dependent, scalability. Although CC promises to make life much easier...

    Provided By Binghamton University

  • White Papers // Oct 2012

    Adaptive Load Shedding Via Fuzzy Control in Data Stream Management Systems

    Data Stream Management Systems (DSMS) aim to process massive data streams in a timely fashion to support important applications, e.g., financial market analysis. However, DSMS can be overloaded due to large bursts in data stream arrivals and data-dependent query executions. To avoid overloads, the authors design a new load shedding...

    Provided By Binghamton University

  • White Papers // Oct 2008

    BLINK: Securing Information to the Last Connection

    Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable - both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, the authors proposed a novel scheme called BLINK,...

    Provided By Binghamton University

  • White Papers // May 2009

    BLINK: Pixel-Domain Encryption for Secure Document Management

    BLINK, or brief-lifetime ink, is a technology for secure document delivery and management that employs pixel-domain scrambling of raster images by a hardware device connecting a computer to its display. A BLINK decoder monitors digital video signals, identifies the presence of scrambled images, and selectively decrypts regions of the video...

    Provided By Binghamton University

  • White Papers // May 2013

    Cloud Security Auditing based on Behavioral Modeling

    Multi-tenancy is one of the most attractive features of cloud computing, which provides significant benefits to both clients and service providers by supporting elastic, efficient, and on-demand resource provisioning and allocation. However, this architecture also introduces additional security implications. Client Virtual Machine (VM) instances running on the same physical machine...

    Provided By Binghamton University

  • White Papers // Jan 2013

    An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection

    Shrew Distributed Denial-of-Service (DDoS) attacks are stealthy, concealing their malicious activities in normal traffic. Although it is difficult to detect shrew DDoS attacks in the time domain, the existent energy exposes them in frequency domain. For this purpose, online Power Spectral Density (PSD) analysis necessitates real-time PSD data conversion. In...

    Provided By Binghamton University

  • White Papers // Jul 2012

    A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts

    Cloud computing hosts require a good source of cryptographically strong random numbers. Most of the standard security practices are based on assumptions that hold true for physical machines, but don't translate immediately into the domain of virtualized machines. It is imperative to reconsider the well accepted security practices that were...

    Provided By Binghamton University

  • White Papers // Feb 2010

    Thermal-Aware Job Allocation and Scheduling for Three Dimensional Chip Multiprocessor

    In this paper, the authors propose a thermal-aware job allocation and scheduling algorithm for Three-Dimensional (3D) Chip Multi-Processor (CMP). The proposed algorithm assigns hot jobs to the cores close to the heat sink and cool jobs to the cores far from the heat sink, subject to thermal constraints. The direct...

    Provided By Binghamton University

  • White Papers // Mar 2009

    RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation

    The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world...

    Provided By Binghamton University

  • White Papers // Mar 2009

    On the Accuracy of RFID-Based Localization in a Mobile Wireless Network Testbed

    The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network...

    Provided By Binghamton University

  • White Papers // Aug 2009

    Two-Stage Decomposition of SNORT Rules Towards Efficient Hardware Implementation

    The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware...

    Provided By Binghamton University

  • White Papers // Nov 2012

    Green Firewall: An Energy-Efficient Intrusion Prevention Mechanism in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited computation capability. After Intrusion Detection Systems (IDSs) identifies an mobile intruder, IDS may broadcast the blacklist to all nodes in network. This method is energy inefficient because all nodes have to receive...

    Provided By Binghamton University

  • White Papers // Sep 2008

    Power Optimization for Conditional Task Graphs in DVS Enabled Multiprocessor Systems

    Multiprocessor System-on-Chip (MPSoC) is becoming a major system design platform for general purpose and real-time applications, due to its advantages in low design cost and high performance. Minimizing the power consumption is one of the major issues in designing battery operated MPSoC. One of the widely used power reduction technique...

    Provided By Binghamton University

  • White Papers // Feb 2007

    Profile-Based Low Power Scheduling for Conditional Task Graph: A Communication Aware Approach

    In this paper, the authors focus on power optimization of real-time applications with conditional execution running on a Dynamic Voltage Scaling (DVS) enabled multiprocessor system. A novel algorithm is proposed that performs simultaneous task mapping and ordering followed by task stretching of a Conditional Task Graph (CTG). The algorithm minimizes...

    Provided By Binghamton University

  • White Papers // Jul 2013

    LEMO-MR: Low overhead and Elastic MapReduce Implementation Optimized for Memory and CPU-Intensive Applications

    Since its inception, MapReduce has frequently been associated with Hadoop and large-scale datasets. Its deployment at Amazon in the cloud, and its applications at Yahoo! and Facebook for large-scale distributed document indexing and database building, among other tasks, have thrust MapReduce to the forefront of the data processing application domain....

    Provided By Binghamton University

  • White Papers // Sep 2011

    DELMA: Dynamically ELastic MApReduce Framework for CPU-Intensive Applications

    Since its introduction, MapReduce implementations have been primarily focused towards static compute cluster sizes. In this paper, the authors introduce the concept of dynamic elasticity to MapReduce. They present the design decisions and implementation tradeoffs for DELMA, (Dynamically ELastic MApReduce), a framework that follows the MapReduce paradigm, just like Hadoop...

    Provided By Binghamton University

  • White Papers // Oct 2011

    Benchmarking MapReduce Implementations for Application Usage Scenarios

    The MapReduce paradigm provides a scalable model for large scale data-intensive computing and associated fault-tolerance. With data production increasing daily due to ever growing application needs, scientific endeavors, and consumption, the MapReduce model and its implementations need to be further evaluated, improved, and strengthened. Several MapReduce frameworks with various degrees...

    Provided By Binghamton University

  • White Papers // Oct 2011

    Scalable and Distributed Processing of Scientific XML Data

    A seamless and intuitive search capability for the vast amount of datasets generated by scientific experiments is critical to ensure effective use of such data by domain specific scientists. Currently, searches on enormous XML datasets is done manually via custom scripts or by using hard-to-customize queries developed by experts in...

    Provided By Binghamton University

  • White Papers // Oct 2011

    MARIANE: MApReduce Implementation Adapted for HPC Environments

    MapReduce is increasingly becoming a popular framework, and a potent programming model. The most popular open source implementation of MapReduce, Hadoop, is based on the Hadoop Distributed File System (HDFS). However, as HDFS is not POSIX compliant, it cannot be fully leveraged by applications running on a majority of existing...

    Provided By Binghamton University

  • White Papers // Jul 2013

    Configuring a MapReduce Framework for Dynamic and Efficient Energy Adaptation

    MapReduce has become a popular framework for big data applications. While MapReduce has received much praise for its scalability and efficiency, it has not been thoroughly evaluated for power consumption. In this paper, the authors explore the possibility of scheduling in a power-efficient manner without the need for expensive power...

    Provided By Binghamton University

  • White Papers // Jul 2013

    MARLA: MapReduce for Heterogeneous Clusters

    MapReduce has gradually become the framework of choice for \"Big data\". The MapReduce model allows for efficient and swift processing of large scale data with a cluster of compute nodes. However, the efficiency here comes at a price. The performance of widely used MapReduce implementations such as Hadoop suffers in...

    Provided By Binghamton University

  • White Papers // Feb 2013

    An Evaluation of Cassandra for Hadoop

    In the last decade, the increased use and growth of social media, unconventional web technologies, and mobile applications, have all encouraged development of a new breed of database models. NoSQL data stores target the unstructured data, which by nature is dynamic and a main focus area for \"Big data\" research....

    Provided By Binghamton University