Carleton University

Displaying 1-40 of 123 results

  • White Papers // Jun 2014

    Unifying Causality, Diagnosis, Repairs and View-Updates in Databases

    In this paper, the authors establish and point out connections between the notion of query-answer causality in databases and database repairs, model-based diagnosis in its consistency-based and abductive versions, and database updates through views. The mutual relationships among these areas of data management and knowledge representation shed light on each...

    Provided By Carleton University

  • White Papers // Jan 2014

    Consistent Query Answering in Data Warehouses

    A Data Warehouse (DW) is a data repository that organizes and physically integrates data from multiple sources under special kinds of schemas. A DW is composed by a set of dimensions that reflect the way the data is structured, and the facts that correspond to quantitative data related with the...

    Provided By Carleton University

  • White Papers // Sep 2013

    Writing Down Your Password: Does It Help?

    Users are able to remember their phone numbers and postal codes, their student numbers, PIN numbers, and social insurance numbers. Why, then, do users have trouble remembering their passwords? This paper considers the hypothesis that being able to access written notes when needed would eventually help users to memorize the...

    Provided By Carleton University

  • White Papers // Sep 2013

    Network Latency Impact on Performance of Software Deployed Across Multiple Clouds

    In cloud computing, an \"Edge cloud\" may be introduced close to some of the end users, to give faster service for very demanding applications. The transactions that require heavy processing capacity and longer processing times are seen as more suitable to be carried out at the \"Core\" cloud. Parts in...

    Provided By Carleton University

  • White Papers // Aug 2013

    CloudOpt: Incremental Optimal Deployment for Dynamic Management of Clouds

    Management of large service centers and clouds requires adaptation to changing conditions and workload, which is usually based on ad hoc strategies. To obtain deployments that are close to the best possible, this paper applies large-scale optimization techniques to minimize energy use or other costs. Constraints force the satisfaction of...

    Provided By Carleton University

  • White Papers // Jul 2013

    Password Advice Shouldn't Be Boring: Visualizing Password Guessing Attacks

    Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. The authors propose that users would be empowered to make better password choices if they understood how password guessing attacks...

    Provided By Carleton University

  • White Papers // Jun 2013

    Cloud Security: Attacks and Current Defenses

    This paper presents a high-level classification of current research in cloud computing security. Unlike past work, this classification is organized around attack strategies and corresponding defenses. Specifically, the authors outline several threat models for cloud computing systems, discuss specific attack mechanisms, and classify proposed defenses by how they address these...

    Provided By Carleton University

  • White Papers // May 2013

    The Usability of Captchas on Smartphones

    Completely Automated Public Turing tests to tell Computers and Humans Apart (CAPTCHA) are challenge response tests used on the web to distinguish human users from automated bots. In this paper, the authors present an exploratory analysis of the results obtained from a user study and a heuristic evaluation of Captchas...

    Provided By Carleton University

  • White Papers // May 2013

    Optimum Transmission Through the Gaussian Multiple Access Channel

    In this paper, the authors study the optimality of particular points in the capacity region of Gaussian Multiple Access Channels (GMACs) with various power constraints. The points of interest maximize general rate objectives that arise in practical communication scenarios. Achieving these points constitutes the task of jointly optimizing time-sharing parameters,...

    Provided By Carleton University

  • White Papers // May 2013

    Information Technology and Supply Chain Governance: A Conceptual Model

    In this paper, the authors apply three theories of governance in proposing a conceptual model of the relationship between Information Technology (IT) and Supply Chain Governance (SCG) and its conceptions (contractual, transactional and relational). They argue, theoretically, that with contractual governance, IT is used to control activities and processes across...

    Provided By Carleton University

  • White Papers // Apr 2013

    Improving User Authentication on Mobile Devices: A Touchscreen Graphical Password

    Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. The authors designed a new graphical password scheme called Touchscreen Multi-layered Drawing (TMD) specifically for use with touchscreens. They conducted an exploratory user study of three existing graphical passwords...

    Provided By Carleton University

  • White Papers // Mar 2013

    Radio Resource Management in a Coordinated Cellular Distributed Antenna System by Using Particle Swarm Optimization

    In this paper, the authors consider a Coordinated Multi-Point transmission (CoMP) scheme used in a cellular system where antenna ports are distributed throughout the cell, instead of using a single base station. Two schemes are considered; either ports can be switched on and off (Binary Power Management, BPM) or their...

    Provided By Carleton University

  • White Papers // Mar 2013

    Coordinated Multi-Point (CoMP) Adaptive Estimation and Prediction Schemes Using Superimposed and Decomposed Channel Tracking

    Performance of future wireless technologies will depend heavily on cooperation between different transmission/reception nodes in the access network. CoMP (Coordinated Multi-Point) transmission increases the cell edge user performance by reducing the inter-cell interference. UEs (User Equipments) simultaneously receive data from multiple base stations (eNBs) grouped into a joint transmission cluster....

    Provided By Carleton University

  • White Papers // Mar 2013

    SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements

    Internet users today depend daily on HTTPS for secure communication with sites they intend to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have been hypothesized, executed, and/or evolved. Meanwhile the number of browser-trusted (and thus, de facto, user-trusted) certificate authorities has proliferated,...

    Provided By Carleton University

  • White Papers // Feb 2013

    A Pricing Based Algorithm for Cell Switching Off in Green Cellular Networks

    In this paper, the authors propose a pricing based algorithm that assigns User Terminals (UTs) to Base Stations (BSs) and optimizes the transmission powers in a way that minimizes the energy expenditure. The algorithm takes into account the fixed energy expenditure that occurs even if a BS does not transmit...

    Provided By Carleton University

  • White Papers // Dec 2012

    Similarity of Polygonal Curves in the Presence of Outliers

    The Frechet distance is a well studied and commonly used measure to capture the similarity of polygonal curves. Unfortunately, it exhibits a high sensitivity to the presence of outliers. Since the presence of outliers is a frequently occurring phenomenon in practice, a robust variant of Frechet distance is required which...

    Provided By Carleton University

  • White Papers // Nov 2012

    Dynamic Operation of BSs in Green Wireless Cellular Networks Powered by the Smart Grid

    There is great interest in considering the energy efficiency aspect of wireless cellular networks. When a wireless cellular network is powered by the smart grid, only considering energy efficiency in the cellular network is not enough. In this paper, the authors consider not only energy-efficient communications but also the dynamics...

    Provided By Carleton University

  • White Papers // Nov 2012

    Dynamic Energy-Efficient Resource Allocation in Cognitive Heterogeneous Wireless Networks With the Smart Grid

    Rapidly rising energy costs and increasingly rigid environmental standards have led to an emerging trend of addressing the "Energy efficiency" aspect of wireless cellular networks. In cellular networks, Base Stations (BSs) are Power-hungry elements and absorbing them in the smart grid can significantly increase power efficiency. However, this important perspective...

    Provided By Carleton University

  • White Papers // Nov 2012

    Grassmannian Signalling Achieves the Ergodic High SNR Capacity of the Non-Coherent MIMO Relay Channel Within an SNR-Independent Gap

    This paper considers the ergodic non-coherent capacity of a multiple-input multiple-output frequency-flat block Rayleigh fading relay channel. It is shown that for this channel restricting the input distribution to be isotropic on a compact Grassmann manifold maximizes an upper bound on the cutset bound at high Signal-to-Noise Ratios (SNRs). Furthermore,...

    Provided By Carleton University

  • White Papers // Oct 2012

    A Decoding Procedure for Compress-and-Forward and Quantize-and-Forward Relaying

    In this paper, a decoding procedure is developed for both the Compress-and-Forward (CF) and the Short Message Quantize-and-Forward (QF-SM) relaying schemes. This procedure is based on exploiting a common feature of the mapping used by both schemes to determine the relay output from the estimate of its input. Using this...

    Provided By Carleton University

  • White Papers // Sep 2012

    Optimal Tradeoff Between Efficiency and Jain's Fairness Index in Resource Allocation

    In several systems, including wireless communication ones, certain services, which are referred to as benefits, are provided to multiple users based on the allocation of shared resources that are typically scarce. The allocation of these resources typically encounters conflicting goals. For instance, favoring a certain class of users may increase...

    Provided By Carleton University

  • White Papers // Sep 2012

    Turbo Receiver Design for MIMO Relay ARQ Transmissions

    In this paper, the authors investigate practical turbo receiver design for throughput-efficient relay ARQ transmissions over broadband cooperative MIMO channels. Their setup is comprised of three multi-antenna nodes: a source, a destination, and a relay node operating under the amplify-and-forward half-duplex relaying mode. To attain higher system average throughput, they...

    Provided By Carleton University

  • White Papers // Sep 2012

    A Genetic Algorithm Based Cell Switch-Off Scheme for Energy Saving in Dense Cell Deployments

    The energy consumption of mobile networks is rapidly growing; operators have both economic and environmental incentives to increase the energy efficiency of their networks. One way of saving energy is to switch off cells during periods of light traffic. However, cell switch-off is a difficult problem to solve through conventional...

    Provided By Carleton University

  • White Papers // Sep 2012

    Efficiently Computable Bounds on the Rates Achieved by a Cross Layer Design With Binary Scheduling in Generic OFDMA Wireless Networks

    Future broadband communication networks are expected to be OFDMA-based with generic ad hoc topologies, wherein the wireless nodes play multiple roles, including transmission, reception and relaying. When the schedules by which the OFDMA sub-channels are assigned to wireless links are binary, obtaining a characterization of the maximum rates that can...

    Provided By Carleton University

  • White Papers // Aug 2012

    Preventing the Cluster Formation Attack Against the Hierarchical OLSR Protocol

    The Hierarchical Optimized Link State Routing (HOLSR) protocol enhances the scalability and heterogeneity of traditional OLSR-based Mobile Ad-Hoc NETworks (MANETs). It organizes the network in logical levels and nodes in clusters. In every cluster, it implements the mechanisms and algorithms of the original OLSR to generate and to distribute control...

    Provided By Carleton University

  • White Papers // Aug 2012

    Supporting Learning of an Unfamiliar Authentication Scheme

    Plaintext password systems have been the ubiquitous method of authentication for computer applications and online Internet services for many years. All the while, users have been coping with difficulties with plaintext passwords, such as a lack of user understanding and ability to create and remember secure passwords. In response, a...

    Provided By Carleton University

  • White Papers // Jul 2012

    Software diversity: Security, Entropy and Game Theory

    Although many have recognized the risks of software monocultures, it is not currently clear how much and what kind of diversity would be needed to address these risks. Here, the authors attempt to provide insight into this issue using a simple model of hosts and vulnerabilities connected in a bipartite...

    Provided By Carleton University

  • White Papers // Jun 2012

    Not Sealed But Delivered: The (Un)Usability of S/MIME Today

    Despite widespread concerns about email privacy and security, today virtually all email is sent without encryption or authentication. Past work has identified usability issues with encrypted and digitally signed email. The most recent work in this area, however, with the more significant work having been done over a decade ago....

    Provided By Carleton University

  • White Papers // May 2012

    A Literature Review of Code Clone Analysis to Improve Software Maintenance Process

    Software systems are getting more complex as the system grows where maintaining such system is a primary concern for the industry. Code clone is one of the factors making software maintenance more difficult. It is a process of replicating code blocks by copy-and-paste that is common in software development. In...

    Provided By Carleton University

  • White Papers // May 2012

    Service Availability Analysis in Communication-Based Train Control (CBTC) Systems Using WLANs

    Data communication technology is one of the key subsystem in Communication-Based Train Control (CBTC), which is an automated train control system for railways that ensures safe operation of rail vehicles using data communications. In CBTC systems, less service availability could cause train derailment, collision or even catastrophic loss of lives...

    Provided By Carleton University

  • White Papers // May 2012

    Network Coding Based Wideband Compressed Spectrum Sensing

    One of the fundamental components in Cognitive Radios (CRs) is spectrum sensing. For sensing the wide range of frequency bands, CRs need high sampling rate Analog to Digital Converters (ADCs) which have to operate at or above the Nyquist rate. The high operating rate constitutes a major implementation challenge. Compressive...

    Provided By Carleton University

  • White Papers // May 2012

    MAC Performance Improvement in UAV Ad-Hoc Networks With Full-Duplex Radios and Multi-Packet Reception Capability

    Recent advances in interference cancellation and signal processing techniques can enable full-duplex radios and multi-packet reception (MPR) capability, which will have significant impacts on the medium access control (MAC) design. In this paper, the authors study the MAC design in UAV ad-hoc networks with full-duplex radios and MPR. To efficiently...

    Provided By Carleton University

  • White Papers // May 2012

    A Token-Based Connectivity Update Scheme for Unmanned Aerial Vehicle Ad Hoc Networks

    Code Division Multiple Access Mobile Ad hoc NETworks (CDMA-MANETs) are envisioned to be the next generation networking architecture for networking military platforms in a battlefield. In this paper, the authors consider a CDMA ad hoc network consisting of multiple Unmanned Aerial Vehicles (UAVs). They propose a token-based connectivity update scheme...

    Provided By Carleton University

  • White Papers // May 2012

    System and Application Knowledge Based Scheduling of Multiple Applications in a WSN

    The paper concerns a Wireless Sensor Network (WSN) hosting multiple applications. The applications vary in terms of their resource requirements such as the number of sensors required by the applications and the location of the required sensors relative to a sink node. The requests for the various applications need to...

    Provided By Carleton University

  • White Papers // May 2012

    Flow Availability Analysis in Two-Layer Networks With Dedicated Path Protection at the Upper Layer

    The authors propose an analytical model that computes availability of upper-layer flows in two-layer networks with dedicated path protection deployed at the upper layer. Their proposed model reduces overestimation of the existing model caused by the ignorance of upper-layer failure correlations. They compute the flow availability by properly taking into...

    Provided By Carleton University

  • White Papers // May 2012

    Iterative Recovery Algorithms for Compressed Sensing of Wideband Block Sparse Spectrums

    In a wireless communication environment, many of the Primary Users (PUs) do not use their licensed frequency bands at all times. The surveys show that the maximum frequency utilization of the allocated spectrum is less than 10%. To increase the frequency utilization in such environments, Secondary Users (SUs) equipped with...

    Provided By Carleton University

  • White Papers // May 2012

    Bottom-Up Trie Structure for P2P Live Streaming

    By simultaneously providing live video and audio contents to millions of users around the world, Peer-To-Peer Live Video Streaming (P2P LVS) has become one of the most popular Internet applications in recent years. However, current P2P LVS software has problems such as non-smooth playback and long start-up delay for end...

    Provided By Carleton University

  • White Papers // May 2012

    Optimal Server Assignment in Multi-Server Parallel Queueing Systems With Random Connectivities and Random Service Failures

    The problem of assignment of K identical servers to a set of N symmetric parallel queues is investigated in this paper. The parallel queueing system is considered to be time slotted and the connectivity of each queue to each server is varying randomly over time and following Bernoulli distribution with...

    Provided By Carleton University

  • White Papers // May 2012

    Joint Routing, Scheduling and Power Allocation in OFDMA Wireless Ad Hoc Networks

    In this paper an OFDMA-based wireless ad hoc network is considered. In addition to the potential of being a source and/or a destination, each node is assumed to be capable of decoding and forwarding its received packets to other nodes in the network. The goal is to determine the optimal...

    Provided By Carleton University

  • White Papers // May 2012

    Broadcasting in Multihop Wireless Networks: the Case for Multi-Source Network Coding

    Network Coding, in particular Random Linear Network Coding, has been extensively researched for communication in multihop wireless networks, such as MANETs. A key aspect of random linear network coding is the definition of generations, the set of native data packets that can be coded together. To keep the decoding complexity...

    Provided By Carleton University

  • White Papers // Jan 2010

    Mobile Agents for Network Management

    This paper discusses the potential uses of mobile agents in Network Management. The paper defines software agents and a navigation model, which determines agent mobility. The paper list a number of potential advantages and disadvantages of mobile agents. The paper includes a short commentary on the ongoing standardization activity. The...

    Provided By Carleton University

  • White Papers // Dec 2009

    Born Global, Gradual Global, And Their Determinants Of Exit From Exporting

    Applying the duration analysis on 1,959 newly established small and medium-sized Canadian exporting manufacturers, this study compares the survivability of Born Global and Gradual Global firms in the export market. The unique longitudinal (1997-2005) data set that used in this study is constructed by linking multiple administrative data sources from...

    Provided By Carleton University

  • White Papers // May 2010

    No Web Site Left Behind: Are We Making Web Security Only for the Elite?

    The web is riddled with flaws that make it unsafe. Protection methods exist, but current web security solutions are often designed to be deployed by programmers and security experts. Unfortunately, programmers and web security experts are not always available many sites are created by graphic designers with more artistic backgrounds,...

    Provided By Carleton University

  • White Papers // Feb 2011

    Mandatory Retirement Rules And The Retirement Decisions Of University Professors In Canada

    The authors examine the impact of mandatory retirement on the retirement decisions of professors in Canada using administrative data. Estimation of a discrete time hazard model indicates that faculty members at universities with mandatory retirement at age 65 have exit rates at age 65 that are around 30 to 38...

    Provided By Carleton University

  • White Papers // Aug 2009

    Overlapped Chunked Network Coding

    Network coding is known to improve the throughput and the resilience to losses in most network scenarios. In a practical network scenario, however, the accurate modeling of the traffic is often too complex and/or infeasible. The goal is thus to design codes that perform close to the capacity of any...

    Provided By Carleton University

  • White Papers // May 2011

    Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks With Cognitive Radios

    In Cognitive Radio Mobile Ad hoc NETworks (CR-MANETs), secondary users can cooperatively sense the spectrum to detect the presence of primary users. In this paper, the authors propose a fully distributed and scalable cooperative spectrum sensing scheme based on recent advances in consensus algorithms. In the proposed scheme, the secondary...

    Provided By Carleton University

  • White Papers // Jun 2010

    Threshold-Based Relay Selection for Detect-and-Forward Relaying in Cooperative Wireless Networks

    This paper studies two-hop cooperative demodulate-and-forward relaying using multiple relays in wireless networks. A threshold based relay selection scheme is considered, in which the reliable relays are determined by comparing source-relay SNR to a threshold, and one of the reliable relays is selected by the destination based on relay-destination SNR....

    Provided By Carleton University

  • White Papers // Jun 2011

    A Novel Distributed Inter-Cell Interference Coordination Scheme Based on Projected Subgradient and Network Flow Optimization

    In this paper, the authors propose a novel distributed Inter-Cell Interference Coordination (ICIC) scheme. The proposed scheme, which runs in polynomial time, finds a near-optimum dynamic resource partitioning that maximizes a proportional-fairness criterion in the entire network. The proposed scheme is based on primal-decomposition method, where the problem is divided...

    Provided By Carleton University

  • White Papers // Sep 2010

    A Link Layer Solution to Location Identification of Emergency VoIP Callers

    Identifying the geographical location of a host on the Internet is a very challenging task. Due to a number of reasons, there is no direct mechanism that could enable this identification. Several approaches have been proposed to solve this problem but these have not proved to be suitable for some...

    Provided By Carleton University

  • White Papers // Aug 2010

    Agents Of Globality: The Role Of Cultural Intermediaries In The Wine Markets Of Japan And Singapore

    Wine serves as a significant marker of societal, and market change in societies which are not traditionally wine drinking. Thus, there is an opportunity to look at those individuals who serve to provide a 'Bridge' between different cultures; both in terms of how they act as intermediaries from a traditional...

    Provided By Carleton University

  • White Papers // May 2010

    Exposure To FDI And New Plant Survival: Evidence In Canada

    This paper examines how exposure to FDI affects Canadian indigenous plants' survival, through their economic linkages with FDI affiliates as competitors, input suppliers and customers. One unique feature of the paper is that it studies a country with extensive exposure to FDI, and relies on a dataset including hundreds of...

    Provided By Carleton University

  • White Papers // May 2011

    Topology Control and Routing in Mobile Ad Hoc Networks With Cognitive Radios

    Cognitive Radio (CR) technology will have significant impacts on upper layer performance in Mobile Ad hoc NETworks (MANETs). In this paper, the authors study topology control and routing in CR-MANETs. They propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is...

    Provided By Carleton University

  • White Papers // Sep 2010

    Back to the Future: Revisiting IPv6 Privacy Extensions

    The authors identify issues in current IPv6 privacy extensions and propose improvements that significantly enhance both the flexibility and functionality, to protect a client from being tracked as it moves between different IPv6 networks. This is achieved by generating a new interface identifier for each visited network. They discuss a...

    Provided By Carleton University

  • White Papers // Mar 2010

    Wireless Security in the Home and Office Environment

    The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does...

    Provided By Carleton University

  • White Papers // Apr 2010

    Cross Verification-Based Detection of the Evil Ring Attack in Wireless Sensor Networks

    In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn't have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node...

    Provided By Carleton University

  • White Papers // Mar 2010

    Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords

    Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random system-assigned passwords are difficult to remember. The authors explore the usability effects of modifying system parameters to increase the security of a cued-recall, click-based graphical password system....

    Provided By Carleton University

  • White Papers // Mar 2010

    Detecting and Localizing Transmitters in a Wireless Evil-Twin Attack

    In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but...

    Provided By Carleton University

  • White Papers // Mar 2010

    Positioning of Wireless Sensor Nodes in the Presence of Liars

    Positioning of nodes in a Wireless Sensor Network (WSN) is a process that allows location-unaware nodes to discover their spatial coordinates. This process requires the cooperation of all the nodes in the system. Ensuring the correctness of the process, especially in the presence of misbehaving nodes, is crucial for ensuring...

    Provided By Carleton University

  • White Papers // Feb 2010

    The Usable Security of Passwords Based on Digital Objects: From Design and Analysis to User Study

    Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an interesting alternative to enable users to create, maintain and use high quality passwords willingly, the authors propose Object-based Password (ObPwd), leveraging the universe of personal or personally meaningful digital content...

    Provided By Carleton University

  • White Papers // Apr 2011

    Exploration and Field Study of a Browser-Based Password Manager Using Icon-Based Passwords

    They carry out a hybrid lab and field study of a password manager program, and report on usability and security. The paper explores iPMAN, a browser-based password manager that in addition uses a graphical password scheme for the master password. They present the findings as a set of observations and...

    Provided By Carleton University

  • White Papers // Feb 2011

    Enhancing Web Page Security With Security Style Sheets

    Although the web security community now has a variety of techniques that could help web developers to defend against common attacks such as cross-site scripting and cross-site request forgery, this work is not in a form suitable for general use. What is needed is a web standard that unites these...

    Provided By Carleton University

  • White Papers // Feb 2011

    Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism

    This paper introduces and presents the results of a systemic study of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting better passwords, thus increasing security by expanding the effective...

    Provided By Carleton University

  • White Papers // Oct 2009

    Graphical Passwords: Learning From the First Generation

    Numerous graphical password schemes have recently been proposed as alternatives to traditional text password authentication. The authors provide a comprehensive overview of published research in the area, covering both usability and security aspects, as well as system evaluation. The paper first catalogues existing approaches, highlighting novel features of selected schemes...

    Provided By Carleton University

  • White Papers // Jul 2009

    Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study

    There has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the introduction of Extended Validation (EV) SSL certificates. Unfortunately, EV SSL...

    Provided By Carleton University

  • White Papers // Dec 2010

    The MVP Web-Based Authentication Framework

    MVP is a new framework for allowing websites to use diverse knowledge-based authentication schemes. One application is its use in conducting ecologically valid user studies of authentication schemes under the same experimental conditions. The authors introduce MVP and its key characteristics, discuss implementation of several authentication schemes, and report on...

    Provided By Carleton University

  • White Papers // Nov 2009

    Evaluation of Anonymized ONS Queries

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the Radio Frequency IDentification (RFID) technology to tag objects in motion and distributed services providing information about...

    Provided By Carleton University

  • White Papers // Oct 2009

    Cross Layer Scheduling Algorithms for Different Rate Traffic in OFDM Broadband Wireless Systems

    Cross layer optimization plays a key role in radio resource management of Broadband Wireless Systems (BWS). Maximal SNR (MaxSNR) and Round Robin (RR) are two conventional scheduling strategies which emphasize efficiency and fairness respectively. Proportional Fair (PF) provides a tradeoff between efficiency and fairness. Here, the authors tailor PF to...

    Provided By Carleton University

  • White Papers // Dec 2009

    Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks

    The authors focus on the interference between mobile stations as they attempt to gain access to an OFDMA-based WiMAX/IEEE 802.16 network. They propose a set of strategies that enable base stations to reduce or eliminate the interference between emergency and non-emergency mobile stations and provide prioritized access to emergency mobile...

    Provided By Carleton University

  • White Papers // Oct 2009

    A Hop Count Based Greedy Face Greedy Routing Protocol on Localized Geometric Spanners

    The authors describe a Fast Delivery Guaranteed Face Routing (FDGF) in ad hoc wireless networks. Since it is expensive for wireless nodes to get the whole network topology information, geometric routing decisions should be made locally by nodes using location information of neighboring nodes which are at most k hops...

    Provided By Carleton University

  • White Papers // Jan 2011

    Online Routing in Quasi-Planar and Quasi-Polyhedral Graphs

    The authors address the problem of online route discovery for a class of graphs that can be embedded either in two or in three dimensional space. In two dimensions they propose the class of quasi-planar graphs and in three dimensions the class of quasi-polyhedral graphs. In both cases they provide...

    Provided By Carleton University

  • White Papers // May 2010

    Maintaining Connectivity in Sensor Networks Using Directional Antennae

    Connectivity in wireless sensor networks may be established using either omnidirectional or directional antennae. The former radiate power uniformly in all directions while the latter emit greater power in a specified direction thus achieving increased transmission range and encountering reduced interference from unwanted sources. Regardless of the type of antenna...

    Provided By Carleton University

  • White Papers // Mar 2010

    WIMAX/802.16 Broadband Wireless Networks

    WiMAX/802.16 is a kind of network providing IP-based broadband wireless access to infrastructure networks such as the Internet. The two main envisioned applications are Web access and voice over IP. Highlights of WiMAX/802.16 are secure communications and broadband access in remote areas. This paper covers the background, physical layer, medium...

    Provided By Carleton University

  • White Papers // Feb 2011

    Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks

    The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc NETworks (MANETs). HOLSR is derived from the OLSR protocol and implements Multi-Point Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical...

    Provided By Carleton University

  • White Papers // Jan 2010

    Network Capacity Region of Multi-Queue Multi-Server Queueing System With Time Varying Connectivities

    Network capacity region of multi-queue multi-server queueing system with random ON-OFF connectivities and stationary arrival processes is derived in this paper. Specifically, the necessary and sufficient conditions for the stability of the system are derived under general arrival processes with finite first and second moments. In the case of stationary...

    Provided By Carleton University

  • White Papers // Aug 2011

    Wireless Hop-by-Hop Credit-Based Flow Control Extended to Source for Stable Best Effort Traffic

    Data traffic is expected to grow faster than capacity in future wireless networks. Therefore it will become unavoidable to deal with congestion. Bottlenecks are located on the wireless links because back-haul and Internet are over-provisioned. Traffic routed towards the User Terminal (UT) in down-link direction keeps coming in through a...

    Provided By Carleton University

  • White Papers // Mar 2011

    Aspect-Oriented Model Development at Different Levels of Abstraction

    The last decade has seen the development of diverse Aspect-Oriented Modeling (AOM) approaches. This paper presents eight different AOM approaches that produce models at different level of abstraction. The approaches are different with respect to the phases of the development lifecycle they target, and the support they provide for model...

    Provided By Carleton University

  • White Papers // Aug 2011

    Parallel Data Cubes On Multi-Core Processors With Multiple Disks

    On-Line Analytical Processing (OLAP) has be-come one of the most powerful and prominent technologies for knowledge discovery in VLDB (Very Large DataBase) environments. Central to the OLAP paradigm is the data cube, a multi-dimensional hierarchy of aggregate values that provides a rich analytical model for decision support. Various sequential algorithms...

    Provided By Carleton University

  • White Papers // Aug 2009

    Parallel Catastrophe Modelling on a Cell Processor

    In this paper, the authors study the potential performance improvements for catastrophe modeling systems that can be achieved through parallelization on a Cell Processor. They studied and parallelized a critical section of catastrophe modeling, the so called \"Inner loop\", and implemented it on a Cell Processor running on a regular...

    Provided By Carleton University

  • White Papers // Sep 2013

    Network Latency Impact on Performance of Software Deployed Across Multiple Clouds

    In cloud computing, an \"Edge cloud\" may be introduced close to some of the end users, to give faster service for very demanding applications. The transactions that require heavy processing capacity and longer processing times are seen as more suitable to be carried out at the \"Core\" cloud. Parts in...

    Provided By Carleton University

  • White Papers // Aug 2013

    CloudOpt: Incremental Optimal Deployment for Dynamic Management of Clouds

    Management of large service centers and clouds requires adaptation to changing conditions and workload, which is usually based on ad hoc strategies. To obtain deployments that are close to the best possible, this paper applies large-scale optimization techniques to minimize energy use or other costs. Constraints force the satisfaction of...

    Provided By Carleton University