Carnegie Mellon University

Displaying 1-40 of 476 results

  • White Papers // Dec 2014

    Approximate Lifted Inference with Probabilistic Databases

    In this paper, the authors propose a new approach for approximate evaluation of P-hard queries with probabilistic databases. In their approach, every query is evaluated entirely in the database engine by evaluating a fixed number of query plans, each providing an upper bound on the true probability, then taking their...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2014

    Phinding Phish: Evaluating Phishing Tools

    "There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. The authors developed an automated test bed for testing anti-phishing tools. They used 200 verified phishing URLs...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2014

    LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks

    Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During the probing process, Wi-Fi clients transmit the names of previously known Wi-Fi Access Points (APs) in plaintext. An eavesdropper can easily collect the information leaked by this Wi-Fi probing process to mount numerous attacks, such as fake AP...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Studying the Effectiveness of Security Images in Internet Banking

    Security images are often used as part of the login process on internet banking websites, under the theory that they can help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users' ability to notice that a security image is missing and their willingness to log in even...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost Via Heterogeneous-Reliability Memory

    Memory devices represent a key component of datacenter Total Cost of Ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. The authors' key insight is...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API

    HTML5 changes many aspects in the browser world by introducing numerous new concepts; in particular, the new HTML5 screen sharing API impacts the security implications of browsers tremendously. One of the core assumptions on which browser security is built is that there is no cross-origin feedback loop from the client...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    The Heterogeneous Block Architecture

    This paper makes two new observations that lead to a new heterogeneous core design. First, the authors observe that most serial code exhibits fine-grained heterogeneity: at the scale of tens or hundreds of instructions, regions of code fit different micro-architectures better (at the same point or at different points in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    Predictable Coherent Caching with Incoherent Caches

    Caches are a well known hardware construct for improving energy consumption and average performance by keeping frequently-used data near processing resources. Yet, at the same time, they form a major hurdle for worst-case execution time analyses, in particular if they are shared between multiple cores. Exploiting that most shared data...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    SpringFS: Bridging Agility and Performance in Elastic Distributed Storage

    The elastic storage systems can be expanded or contracted to meet current demand, allowing servers to be turned off or used for other tasks. However, the usefulness of an elastic distributed storage system is limited by its agility: how quickly it can increase or decrease its number of servers. Due...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Toward Strong, Usable Access Control for Shared Distributed Data

    As non-expert users produce increasing amounts of personal digital data, usable access control becomes critical. Current approaches often fail, because they insufficiently protect data or confuse users about policy specification. This paper presents penumbra, a distributed file system with access control designed to match users' mental models while providing principled...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving Cache Performance by Exploiting Read-Write Disparity

    Cache read misses stall the processor if there are no independent instructions to execute. In contrast, most cache write misses are off the critical path of execution, since writes can be buffered in the cache or the store buffer. With few exceptions, cache lines that serve loads are more critical...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Agentless Cloud-wide Streaming of Guest File System Updates

    The authors propose a non-intrusive approach for monitoring Virtual Machines (VMs) in the cloud. At the core of this approach is a mechanism for selective real-time monitoring of guest file updates within VM instances. This mechanism is agentless, requiring no guest VM support. It has low virtual I/O overhead, low...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving DRAM Performance by Parallelizing Refreshes with Accesses

    Modern main memory is predominantly built using Dynamic Random Access Memory (DRAM) cells. A DRAM cell consists of a capacitor to store one bit of data as electrical charge. The capacitor leaks charge over time, causing stored data to change. As a result, DRAM requires an operation called refresh that...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Bounding Memory Interference Delay in COTS-based Multi-Core Systems

    In Commercial-Off-The-Shelf (COTS) multi-core systems, a task running on one core can be delayed by other tasks running simultaneously on other cores due to interference in the shared DRAM main memory. Such memory interference delay can be large and highly variable, thereby posing a significant challenge for the design of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    ARP Attacks in Wireless Ad Hoc Networks

    Previous research to secure ad hoc network protocols concentrates on key distribution and on securing the routing protocol. Unfortunately, securing the routing layer is not sufficient to secure the ad hoc network, as lower layer and upper layer communication protocols remain vulnerable to attack. In this paper, the authors illustrate...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Matching Database Access Patterns to Storage Characteristics

    Database storage managers employ sophisticated algorithms attempting to exploit the performance available inside today's storage systems. However, because the communication between the Storage Manager (SM) and a storage device is limited by a high-level protocol, both the SM and the device make decisions largely in isolation and do not realize...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Exploiting Compressed Block Size as an Indicator of Future Reuse

    The authors introduce a set of new Compression-Aware Management Policies (CAMP) for on-chip caches that employ data compression. Their management policies are based on two key ideas. First, they show that it is possible to build a more efficient management policy for compressed caches if the compressed block size is...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Tetrisched: Space-Time Scheduling for Heterogeneous Datacenters

    Tetrisched is a new scheduler that explicitly considers both job-specific preferences and estimated job runtimes in its allocation of resources. Combined, this information allows tetrisched to provide higher overall value to complex application mixes consolidated on heterogeneous collections of machines. Job-specific preferences, provided by tenants in the form of composable...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server

    The authors propose a parameter server system for distributed ML, which follows a Stale Synchronous Parallel (SSP) model of computation that maximizes the time computational workers spend doing useful work on ML algorithms, while still providing correctness guarantees. The parameter server provides an easy-to-use shared interface for read/write access to...

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    Energy-Governed Resilient Networked Systems

    Connected embedded systems in the realm of smart infrastructures comprise ubiquitous end-point devices supported by a communication infrastructure. Device, energy supply and network failures are a reality and provisioned communications could fail. Self-organization is a process where network devices cooperate with each other to restore network connectivity on detecting network...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    GOTCHA Password Hackers!

    The authors introduce GOTCHAs (Generating panOptic Turing tests to tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    Challenges in Security and Privacy for Mobile Edge-Clouds

    Mobile devices such as Smartphone and tablets are ubiquitous today, and many of them possess significant computation power, powerful sensors such as high-resolution cameras and GPS sensors, and a wealth of sensor data such as photos, videos, and location information. Collections of mobile devices in close geographical proximity present both...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Designing for Self-Configuration and Self-Adaptation in the Internet of Things

    The Internet of Things (IoT) paradigm comprises a heterogenous mix of connected devices connected to the Internet. This promises a wealth of opportunity for a large collection of distributed applications and services. However, the IoT introduces significant changes to the Internet model, largely in the form of billions to trillions...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    LightTx: A Lightweight Transactional Design in Flash-based SSDs to Support Flexible Transactions

    Flash memory has accelerated the architectural evolution of storage systems with its unique characteristics compared to magnetic disks. The no-overwrite property of flash memory has been leveraged to efficiently support transactions, a commonly used mechanism in systems to provide consistency. However, existing transaction designs embedded in flash-based Solid State Drives...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Program Interference in MLC NAND Flash Memory: Characterization, Modeling, and Mitigation

    As NAND flash memory continues to scale down to smaller process technology nodes, its reliability and endurance are degrading. One important source of reduced reliability is the phenomenon of program interference: when a flash cell is programmed to a value, the programming operation affects the threshold voltage of not only...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    HAT: Heterogeneous Adaptive Throttling for On-Chip Networks

    The Network-on-Chip (NoC) is a primary shared resource in a Chip Multi-Processor (CMP) system. As core counts continue to increase and applications become increasingly data-intensive, the network load will also increase, leading to more congestion in the network. This network congestion can degrade system performance if the network load is...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Secure Two-Party Computation with Reusable Bit-Commitments, via A Cut-and-Choose with Forge-and-Lose Technique

    A Secure Two-Party Computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if inter-mediated by a trusted third party. In the active model, security is maintained even if one party is malicious, deviating from the protocol specification. For example, an honest party retains privacy of...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Design of a Write-Optimized Data Store

    The WriteBuffer (WB) tree is a new write-optimized data structure that can be used to implement per-node storage in unordered key-value stores. The WB tree provides faster writes than the Log-Structured Merge (LSM) tree that is used in many current high-performance key-value stores. It achieves this by replacing compactions in...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Observations of Successful Cyber Security Operations

    In this Webcast, the presenter going explain about the cyber security The presenter will also discuss the observations of successful cyber security operations from the virtual event showing the users a big picture about the organization how they successfully react to new specific accessories build on the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Responding to a Large Scale Cybersecurity Incident

    In this Webcast, the presenter explain about how to respond to a large scale cyber security incidents, with an introduction about the role of technology. Technology which is an important one, but the limitations of that need to be understood.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    20+ Years of Cyber (in)Security

    The use of information and communications technology is pervasive. The information systems are increasingly interconnected and interdependent. Attack technology is outpacing defensive technology. In this webcast, the presenter will give an introduction to the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Achieving Mission Assurance Through Resilience Management

    In this webcast, the presenter going to explain about the resilience management. Resilience management is to protect a sustain organizations mission and business operations. The presenter will also explain about how the organizations are constant operational stress on these days.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Developing Your Cyber Workforce

    In this webcast, the presenter going to explain about the how to develop the cyber workforce against the security attacks. The presenter going to discuss about the new solutions and research that he had done to improve the security.

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Breaking the DDoS Attack Chain

    Department of Defense (DoD) communications and data networks continue to be targets for adversaries to deny operational use of those networks. Distributed Denial of Service (DDoS) is one such attack strategy that has proven to be an effective method of denying service to military, political, infrastructure, and economic targets. The...

    Provided By Carnegie Mellon University

  • Presentations // Jan 2003

    Pricing

    Pricing spells out the amount of money that would be charged in exchange for a particular product or service. An effective pricing strategy helps in building strong customer loyalty over time. Different types of pricing strategies are called into operation at different stages of the product life cycle. The paper...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2004

    Toward Automatic Context-Based Attribute Assignment for Semantic File Systems

    Semantic file systems enable users to search for files based on attributes rather than just pre-assigned names. This paper develops and evaluates several new approaches to automatically generating file attributes based on context, complementing existing approaches based on content analysis. Based on this study of ten systems over four months,...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2003

    Attribute-Based Prediction of File Properties

    This paper presents the evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, it shows...

    Provided By Carnegie Mellon University

  • Case Studies // Dec 2004

    Overview and Cryptanalysis of the DVD Contents Scrambling System and DeCSS

    This paper presents an overview of DVD's Contents Scrambling System. The purpose of this overview is to then construct an attack tree [14] of the attacks used, which could be used for developing a tool to test other proprietary (unknown) encryption algorithms. The CSS was put in place to prevent...

    Provided By Carnegie Mellon University

  • White Papers // May 2000

    Real Time Automated Transcription of Live Music Into Sheet Music using Common Music Notation

    This document reports on a project, whose objective is to implement a system on the C67 EVM board that will accept live music through a microphone, detect the notes, and transcribe them into sheet music in real time. Past projects have only attempted the transcription of recorded music, while this...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2004

    Sentiment Extraction From Unstructured Text Using Tabu Search-Enhanced Markov Blanket

    This white paper proposes a two-stage Bayesian algorithm that is able to capture the dependencies among words, and, at the same time, finds a vocabulary that is efficient for the purpose of extracting sentiments. It also reveals that experimental results on the Movie Reviews data set show that the algorithm...

    Provided By Carnegie Mellon University

  • White Papers // May 2004

    ScamSlam: An Architecture for Learning the Criminal Relations Behind Scam Spam

    This white paper introduces Scam Slam, a software system designed to learn the underlying number criminal cells perpetrating a particular type of scam, as well as to identify which scam spam messages were written by which cell. The system consists of two main components; a filtering mechanism based on a...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2001

    Understanding Popout: Pre-attentive Segmentation Through Non-Directional Repulsion

    This white paper document identifies two measures which are to mark conspicuous image locations such as region boundaries, smooth contours and pop out targets against backgrounds, with attraction and non-directional repulsion, and unifies the dual processes of association by attraction and segregation by repulsion in one grouping framework. The paper...

    Provided By Carnegie Mellon University

  • White Papers // May 2004

    Determining Collusion in Negotiations

    This article provides a method for determining the legal outcomes of a labor contract negotiation through determining the limits of rational negotiation and irrational negotiation bounded by labor law. Given certain laws protecting union workers, leverage in detecting colluding strategies is available. Manipulation of labor negotiations remains a problem in...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2009

    LSM-Based Secure System Monitoring Using Kernel Protection Schemes

    Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Physical Layer-Constrained Routing in Ad-hoc Wireless Networks: A Modified AODV Protocol with Power Control

    Routing in Ad Hoc wireless networks is not only a problem of finding a route with shortest length, but it is also a problem of finding a stable and good quality communication route in order to avoid any unnecessary packet loss. In this paper, authors propose a modified ad hoc...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Routing Design in Operational Networks: A Look from the Inside

    By constructing the collective distributed routing state, routing protocols create the network-wide intelligence that transforms a collection of individual links and routers into an IP network. A network's routing design is embodied in the configuration of these protocols. Creating a routing design is in practice a policy driven design task...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Dynamic Source Routing in Ad Hoc Wireless Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Kahuna: Problem Diagnosis for MapReduce-Based Cloud Computing Environments

    The authors present Kahuna, an approach that aims to diagnose performance problems in Map Reduce systems. Central to Kahuna's approach is the insight on peer-similarity, that nodes behave alike in the absence of performance problems, and that a node that behaves differently is the likely culprit of a performance problem....

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Configuring Your Web Browser and Using WebISO

    To be compatible with the Carnegie Mellon Web Portal and services provided by Administrative Computing, Computing Services and the Office of Technology for Education, your web browser must meet the following requirements: 1)The browser must be configured to accept cookies. 2) The browser must be configured to run JavaScript. 3)...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Tree Embeddings for Two-Edge-Connected Network Design

    The group Steiner problem is a classical network design problem where the authors are given a graph and a collection of groups of vertices, and want to build a min-cost subgraph that connects the root vertex to at least one vertex from each group. What if they wanted to build...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Case for Energy-Oriented Partial Desktop Migration

    Office and home environments are increasingly crowded with personal computers. Even though these computers see little use in the course of the day, they often remain powered, even when idle. Leaving idle PCs running is not only wasteful, but with rising energy costs it is increasingly more expensive. Authors propose...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    When and How to Change Quorums on Wide Area Networks

    In wide-area settings, unpredictable events, such as flash crowds caused by nearly instantaneous popularity of services, can cause servers that are expected to respond quickly to instead suddenly respond slowly. This presents a problem for achieving consistently good performance in quorum-based distributed systems, in which clients must choose which quorums...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    On Sparse Nonparametric Conditional Covariance Selection

    The authors develop a penalized kernel smoothing method for the problem of selecting nonzero elements of the conditional precision matrix, known as conditional covariance selection. This problem has a key role in many modern applications such as finance and computational biology. However, it has not been properly addressed. The estimator...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    An Empirical Analysis of Mobile Voice and SMS Service: A Structural Model

    In addition to wireless telephony boom, a similar exponential increasing trend in wireless data service -for example, Short Message Service (SMS) - is visible as technology advances. The authors develop a structural model to examine user demand for voice and SMS services. Specifically, they measure the own- and the cross-price...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Online and Stochastic Survivable Network Design

    This paper discusses online and stochastic network design while taking into consideration the edge-connectivity survivable network design problem where a graph with edge costs and edge-connectivity requirements for different sets of vertices finds a minimum-cost network that provides the required connectivity. This problem has been known to admit good approximation...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Database Servers on Chip Multiprocessors: Limitations and Opportunities

    Database management systems are a multibillion dollar industry with high-end database servers employing state-of-the-art processors to maximize performance. Recent studies show that processors are far from realizing their maximum performance. Research also indicates that adverse memory access patterns in database workloads result in poor cache locality and overall performance. Database...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Modeling TCP-Vegas Under On/Off Traffic

    There has been a significant amount of research toward modeling variants of the Transmission Control Protocol (TCP) in order to understand the impact of this protocol on file transmission times and network utilization. Analytical models have emerged as a way to reduce the time required for evaluation when compared with...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Software Engineering Issues for Mobile Application Development

    While application development for mobile devices goes back at least 10 years, there has been exponential growth in mobile application development since the iPhone AppStore opened in July, 2008. Since then, device makers have created outlets for other mobile devices, including Android, BlackBerry, Nokia Ovi, Windows Phone, and more. Industry...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    A Resource Allocation Model for QoS Management

    Quality of Service (QoS) has been receiving wide attention in recent years in many research communities including networking, multimedia systems and distributed systems. In large distributed systems such as those used in defense systems, on demand service and inter-networked systems, applications contending for system resources must satisfy timing, reliability and...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Java Concurrency Guidelines

    An essential element of secure coding in the Java programming language is well-documented and enforceable coding standards. Coding standards encourage programmers to follow a uniform set of guidelines determined by the requirements of the project and organization, rather than by the programmer's familiarity or preference. Once established, these standards can...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    A Performance Comparison of On-Demand Multicast Routing Protocols for Ad Hoc Networks

    In this paper, authors present a comparative performance evaluation of three general-purpose ondemand multicast protocols, namely ADMR, MAODV, and ODMRP, focusing on the effects of changes such as increasing number of multicast receivers or sources, application sending pattern, and increasing number of nodes in the network. Authors use mobile networks...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    On the Approximability of Some Network Design Problems

    Approximation algorithms have had much success in the area of network design, with both combinatorial and linear-programming based techniques leading to many constant factor approximation algorithms. Despite these successes, several basic network design problems have eluded the quest for constant-factor approximations, with the current best approximation guarantees being logarithmic or...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Impact of Customer Web Portals on Call Center: An Empirical Analysis

    Firms are investing millions to deploy web based self-services at their call centers primarily to reduce operating costs. The rationale is that the firm's cost of interacting with its customers through the web based channel is an order of magnitude cheaper than the assisted channels like telephony. The authors conduct...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Hermes: a Context-Aware Application Development Framework for the Mobile Environment

    This paper describes a next generation software toolkit which provides a framework, including security and intelligibility support, for developing more powerful context-aware applications for the modern mobile environment. Modern mobile computing environments, with reasonable connectivity, processing power and sensing capabilities on portable devices provide a means of achieving truly ubiquitous...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    BASIL: Automated IO Load Balancing Across Storage Devices

    Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO load balancing across multiple storage arrays. This problem is quite challenging because the performance of IO workloads depends heavily on their...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Mobile Computing: the Next Decade

    Information at the fingertips anywhere, anytime has been the driving vision of mobile computing for the past two decades. Through relentless pursuit of this vision, spurring innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have now largely attained this goal. Ubiquitous email and Web access is a...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Impact of Clustering on the BER Performance of Ad Hoc Wireless Networks

    Ad hoc wireless networks are characterized by multi-hop radio communications. The spatial distribution of the nodes is seldom perfectly regular. In particular, in a realistic ad hoc wireless network communication scenario, the nodes are likely to be clustered, i.e., to configure themselves in subgroups such that the nodes inside each...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Requirements for an Integrity-Protected Hypervisor on the X86 Hardware Virtualized Architecture

    Virtualization has been purported to be a panacea for many security problems. The authors analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardware that includes virtualization support, observing that without the fundamental property of hypervisor integrity, no secrecy properties can be achieved. Unfortunately, they find that significant...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Comparison of Overlay Routing and Multihoming Route Control

    The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to effectively bypass BGP's path selection in order to improve performance and fault tolerance. In this paper, the authors explore the possibility that intelligent control of...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    SCI-FI: Domain-Based Scalability, Control and Isolation for the Future Internet

    This paper presents the first Internet architecture designed for control and isolation. The authors of this paper propose to separate ASes into groups of independent routing sub-planes which then in-terconnect to form complete routes. The architecture, SCI-FI, provides superior resilience and security proper-ties as an intrinsic consequence of good design...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Performance Analysis of IPSec and IKE for Mobile IP on Wireless Environments

    The Mobile IP protocol enables a node to change its point of attachment to an internet without changing its IP address. Mobile users are likely to take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases these users will...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Early Experience With an Internet Broadcast System Based on Overlay Multicast

    In this paper, the authors report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing a cost-effective alternative for Internet broadcast, used by over 3600 users spread across multiple continents in home, academic and commercial...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Voice Over Sensor Networks

    Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due to typically slow changes in physical variables, the need to keep node costs low and the goal of extending battery lifetime. However, there...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Analysis and Verification Challenges for Cyber-Physical Transportation Systems

    Substantial technological and engineering advances in various disciplines make it possible more than ever before to provide autonomous control choices for cars, trains, and aircraft. Correct automatic control can improve overall safety tremendously. Yet, ensuring a safe operation of those control assistants under all circumstances requires analysis techniques that are...

    Provided By Carnegie Mellon University