Carnegie Mellon University

Displaying 161-200 of 480 results

  • White Papers // Oct 2011

    Reclaiming the White Spaces: Spectrum Efficient Coexistence With Primary Users

    TV white spaces offer an exciting opportunity for increasing spectrum availability, but White Space Devices (WSDs) cannot interfere with primary users, including TV channels and wireless microphones (mics). Mics are particularly challenging because their use is dynamic and it is hard to avoid interference since mic receivers are receive-only devices....

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    The Case for Sleep States in Servers

    While sleep states have existed for mobile devices and workstations for some time, these sleep states have largely not been incorporated into the servers in today's data centers. Chip designers have been unmotivated to design sleep states because data center administrators haven't expressed any desire to have them. High setup...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Survivable Smart Grid Communication: Smart-Meters Meshes to the Rescue

    Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this paper, the authors propose a resilient and survivable hierarchical communication architecture for the smart grid that...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Locality-Aware Reduce Task Scheduling for Mapreduce

    MapReduce offers a promising programming model for big data processing. Inspired by functional languages, MapReduce allows programmers to write functional-style code which gets automatically divided into multiple map and/or reduce tasks and scheduled over distributed data across multiple machines. Hadoop, an open source implementation of MapReduce, schedules map tasks in...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    SCION: Scalability, Control, and Isolation on Next-Generation Networks

    The authors present the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications. SCION separates ASes into groups of independent routing sub-planes, called trust domains, which then interconnect to form complete routes. Trust domains provide natural isolation of routing failures and human...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    I Know Where You Live: Analyzing Privacy Protection in Public Databases

    Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property assessment database using property owners' names. The authors conducted a user study to determine whether this strategy provides...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Clearing the Clouds: A Study of Emerging Workloads on Modern Hardware

    Emerging scale-out cloud applications need extensive amounts of computational resources. However, data centers using modern server hardware face physical constraints in space and power, limiting further expansion and calling for improvements in the computational density per server and in the per-operation energy use. Therefore, continuing to improve the computational resources...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

    Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals' activities on the web, data aggregation companies that compile massive databases...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Design of Heterogeneous On-Chip Networks: An Application Driven Approach

    An on-chip interconnect is a critical shared resource that affects the performance-energy envelope of an entire multicore system. This aspect has led to a plethora of proposals in recent years for efficiently architecting the NoC substrate. However, most of these designs are agnostic to the actual application requirements in that...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Collaborating With Executable Content Across Space and Time

    Executable content is of growing importance in many domains. How does one share and archive such content at Internet-scale for spatial and temporal collaboration? Spatial collaboration refers to the classic concept of user collaboration: two or more users who are at different Internet locations performing a task using shared context....

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Scheduling Heterogeneous Processors Isn't As Easy As You Think

    The authors consider preemptive online scheduling algorithms to minimize the total weighted/unweighted flow time plus energy for speed-scalable heterogeneous multiprocessors. They show that the well-known priority scheduling algorithms highest density first, weighted shortest elapsed time first, and weighted late arrival processor sharing, are not O(1)-speed O(1)-competitive for the objective of...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Improving Cache Performance Using Victim Tag Stores

    With increasing pressure on memory bandwidth, there have been a number of proposals that improve the cache replacement policy. These mechanisms monitor the cache blocks while they are in the cache and evict blocks that are deemed to have low temporal locality. However, a majority of these mechanisms are agnostic...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    All Your Jammers Belong to Us - Localization of Wireless Sensors Under Jamming Attack

    Accurately determining locations of nodes in mobile wireless network is crucial for a myriad of applications. Unfortunately, most localization techniques are vulnerable to jamming attacks where the adversary attempts to disrupt communication between legitimate nodes in the network. In this paper, the authors propose an approach to localize a wireless...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A Learning Theory Approach to Non-Interactive Database Privacy

    In this paper, the authors demonstrate that, ignoring computational constraints, it is possible to privately release synthetic databases that are useful for large classes of queries - much larger in size than the database itself. Specifically, they give a mechanism that privately releases synthetic data for a class of queries...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    SAV-V: Securing Anti-Virus with Virtualization

    Today's desktop PCs rely on security software such as anti-virus products and personal firewalls for protection. Unfortunately, malware authors have adapted by specifically targeting and disabling these defenses, a practice exacerbated by the rise in zero-day exploits. In this paper, the authors present the design, implementation, and evaluation of SAV-V,...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Adaptive Cluster Throttling: Improving High-Load Performance in Bufferless On-Chip Networks

    Higher core counts and increasing focus on energy efficiency in modern Chip Multi-Processors (CMP) have led to renewed interest in simple and energy-efficient Network-on-Chip (NoC) designs. Several recent proposed designs trade off network capacity for efficiency, based on the observation that traditional networks are overprovisioned for many workloads. Bufferless routing...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A High-Performance Hierarchical Ring On-Chip Interconnect with Low-Cost Routers

    Energy consumption of routers in commonly used mesh-based on-chip networks for chip multiprocessors is an increasingly important concern: these routers consist of a crossbar and complex control logic and can require significant buffers, hence high energy and area consumption. In contrast, an alternative design uses ring-based networks to connect network...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Row Buffer Locality-Aware Data Placement in Hybrid Memories

    Phase Change Memory (PCM) is a promising alternative to DRAM, though its high latency and energy costs prohibit its adoption as a drop-in DRAM replacement. Hybrid memory systems comprising DRAM and PCM attempt to achieve the low access latencies of DRAM at the large capacities of PCM. However, known solutions...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Network Fault Localization With Small TCB

    Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault Localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    Time Boxing Planning: Buffered Moscow Rules

    Time boxing is a management technique which prioritizes schedule over deliverables but time boxes which are merely a self, or an outside, imposed target without agreed partial outcomes and justified certainty are at best, an expression of good will on the part of the team. This paper proposes the use...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Investigating the Viability of Bufferless NoCs in Modern Chip Multi-Processor Systems

    Chip Multi-Processors (CMP) are quickly growing to dozens and potentially hundreds of cores, and as such the design of the interconnect for on chip resources has become an important field of study. Of the available topologies, tiled mesh networks are an appealing approach in tiled CMPs, as they are relatively...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Q: Exploit Hardening Made Easy

    Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller amounts of executable code unrandomized and it has been unclear whether an attacker can use these small code fragments to construct payloads in...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    All Your Droid are Belong to Us: A Survey of Current Android Attacks

    In the past few years, mobile devices (Smartphones, PDAs) have seen both their computational power and their data connectivity rise to a level nearly equivalent to that available on small desktop computers, while becoming ubiquitous. On the downside, these mobile devices are now an extremely attractive target for large-scale security...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2011

    Congestion Control for Scalability in Bufferless On-Chip Networks

    In this paper, the authors present Network-on-Chip (NoC) design and contrast it to traditional network design, highlighting both similarities and differences between NoCs and traditional networks. As an initial case study, they examine network congestion in bufferless NoCs. They show that congestion manifests itself differently in a NoC than in...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2011

    Secure Distributed Data Aggregation

    The authors present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In their survey, they focus on the important algorithmic features of each approach, and provide an overview of a family of secure aggregation protocols which use resilient distributed estimation...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Resource Sharing in GPU-Accelerated Windowing Systems

    Recent windowing systems allow graphics applications to directly access the Graphics Processing Unit (GPU) for fast rendering. However, application tasks that render frames on the GPU contend heavily with the windowing server that also accesses the GPU to blit the rendered frames to the screen. This resource-sharing nature of direct...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Predicting Handoffs in 3G Networks

    Cellular data networks have recently seen an explosion in their usage due to the widespread deployment of 3G technologies and the rapid proliferation of smartphones. People are increasingly using their smartphones on the go and expect always-on, high quality connectivity at all times. A key network primitive that enables continuous...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux

    In this paper, the authors present a Hierarchical Scheduling Framework (HSF) recorder for Linux-based operating systems. The HSF recorder is a loadable kernel module that is capable of recording tasks and servers without requiring any kernel modifications. Hence, it complies with the reliability and stability requirements in the area of...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Lucy in the Sky Without Diamonds: Stealing Confidential Data in the Cloud

    Cloud computing is a recent paradigm that is creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns about security. In a public cloud, the user's data storage and processing is no longer done inside its premises, but in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    TFP During A Credit Crunch

    The financial crisis of 2008 was followed by sharp contractions in aggregate output and employment and an unusual increase in aggregate Total Factor Productivity (TFP). This paper attempts to explain these facts by modeling the creation and destruction of jobs in the presence of heterogeneity in firm productivity and frictional...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study

    Although online retailers detail their privacy practices in online privacy policies, this information often remains invisible to consumers, who seldom make the effort to read and understand those policies. This paper reports on research undertaken to determine whether a more prominent display of privacy information will cause consumers to incorporate...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Towards Secure Multi-Path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy

    Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in Mobile Ad-hoc NETworks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, the authors propose a routing mechanism that uses cross-layer strategies. The cross-layer strategy involves incorporating feedback...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    A Proof-Carrying File System With Revocable and Use-Once Certificates

    The authors present the design and implementation of a file system which allows authorizations dependent on revocable and use-once policy certificates. Authorizations require explicit proof objects, combining ideas from previous authorization logics and Girard's linear logic. Use-once certificates and revocations lists are maintained in a database that is consulted during...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Application-to-Core Mapping Policies to Reduce Interference in On-Chip Networks

    As the industry moves toward many-core processors, Network-on-Chips (NoCs) will likely become the communication backbone of future microprocessor designs. The NoC is a critical shared resource and its effective utilization is essential for improving overall system performance and fairness. In this paper, the authors propose application-to-core mapping policies to reduce...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    New Modalities for Access Control Logics: Permission, Control and Ratification

    The authors present a new modal access control logic ACL+ to specify, reason about and enforce access control policies. The logic includes new modalities for permission, control, and ratification to overcome some limits of current access control logics. They present a Hilbert-style proof system for ACL+ and a sound and...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Traffic Information Systems: Efficient Message Dissemination Via Adaptive Beaconing

    Traffic Information Systems (TIS) are one of the key non-safety application areas of Vehicular Ad Hoc NETworks (VANETs). As such, TIS are much less delay sensitive compared to safety applications, which have recently attracted a lot of attention in VANET research. The authors propose a new message dissemination protocol, Adaptive...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Exertion-Based Billing for Cloud Storage Access

    Charging for cloud storage must account for two costs: the cost of the capacity used and the cost of access to that capacity. For the cost of access, current systems focus on the paper requested, such as data transferred or I/O operations completed, rather than the exertion (i.e., effort/resources expended)...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Privacy-Sensitive VM Retrospection

    The success of cloud computing leads to large centralized collections of Virtual Machine (VM) images. The ability to retrospect (examine the historical state of) these images at a high semantic level can be valuable in many aspects of IT management such as debugging and troubleshooting, software quality control, legal establishment...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    A Picture IsWorth a ThousandWords: Improving Usability and Robustness of Online Recommendation Systems

    Recent statistics show that the number of online shoppers are increasing where the majority of them use online recommendation systems for product/service reviews. Although online reviews are becoming increasingly important, consumers face two major challenges of usability and robustness when they make purchase decisions based on the available reviews. More...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Curbing Android Permission Creep

    The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Constraining Credential Usage in Logic-Based Access Control

    Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owners issue credentials to specify policies, and the consequences of these policies are derived using logical inference rules. Proofs in authorization logics can serve as capabilities for gaining access...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    Efficient Proving for Practical Distributed Access-Control Systems

    The authors present a new technique for generating a formal proof that an access request satisfies access-control policy, for use in logic-based access-control frameworks. The approach is tailored to settings where credentials needed to complete a proof might need to be obtained from, or reactively created by, distant components in...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Exertion-Based Billing for Cloud Storage Access

    Charging for cloud storage must account for two costs: the cost of the capacity used and the cost of access to that capacity. For the cost of access, current systems focus on the paper requested, such as data transferred or I/O operations completed, rather than the exertion (i.e., effort/resources expended)...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    The Cognitive Virtues of Dynamic Networks

    For the most part, studies in the network science literature tend to focus on networks whose functional connectivity is largely invariant with respect to some episode of collective information processing. In the real world, however, networks with highly dynamic functional topologies tend to be the norm. In order to improve...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    TFP During A Credit Crunch

    The financial crisis of 2008 was followed by sharp contractions in aggregate output and employment and an unusual increase in aggregate Total Factor Productivity (TFP). This paper attempts to explain these facts by modeling the creation and destruction of jobs in the presence of heterogeneity in firm productivity and frictional...

    Provided By Carnegie Mellon University

  • Presentations // Jan 2003

    Pricing

    Pricing spells out the amount of money that would be charged in exchange for a particular product or service. An effective pricing strategy helps in building strong customer loyalty over time. Different types of pricing strategies are called into operation at different stages of the product life cycle. The paper...

    Provided By Carnegie Mellon University

  • White Papers // May 2000

    Real Time Automated Transcription of Live Music Into Sheet Music using Common Music Notation

    This document reports on a project, whose objective is to implement a system on the C67 EVM board that will accept live music through a microphone, detect the notes, and transcribe them into sheet music in real time. Past projects have only attempted the transcription of recorded music, while this...

    Provided By Carnegie Mellon University

  • Case Studies // Dec 2004

    Overview and Cryptanalysis of the DVD Contents Scrambling System and DeCSS

    This paper presents an overview of DVD's Contents Scrambling System. The purpose of this overview is to then construct an attack tree [14] of the attacks used, which could be used for developing a tool to test other proprietary (unknown) encryption algorithms. The CSS was put in place to prevent...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2004

    Sentiment Extraction From Unstructured Text Using Tabu Search-Enhanced Markov Blanket

    This white paper proposes a two-stage Bayesian algorithm that is able to capture the dependencies among words, and, at the same time, finds a vocabulary that is efficient for the purpose of extracting sentiments. It also reveals that experimental results on the Movie Reviews data set show that the algorithm...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2001

    Understanding Popout: Pre-attentive Segmentation Through Non-Directional Repulsion

    This white paper document identifies two measures which are to mark conspicuous image locations such as region boundaries, smooth contours and pop out targets against backgrounds, with attraction and non-directional repulsion, and unifies the dual processes of association by attraction and segregation by repulsion in one grouping framework. The paper...

    Provided By Carnegie Mellon University

  • White Papers // May 2004

    ScamSlam: An Architecture for Learning the Criminal Relations Behind Scam Spam

    This white paper introduces Scam Slam, a software system designed to learn the underlying number criminal cells perpetrating a particular type of scam, as well as to identify which scam spam messages were written by which cell. The system consists of two main components; a filtering mechanism based on a...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2004

    Toward Automatic Context-Based Attribute Assignment for Semantic File Systems

    Semantic file systems enable users to search for files based on attributes rather than just pre-assigned names. This paper develops and evaluates several new approaches to automatically generating file attributes based on context, complementing existing approaches based on content analysis. Based on this study of ten systems over four months,...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2003

    Attribute-Based Prediction of File Properties

    This paper presents the evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, it shows...

    Provided By Carnegie Mellon University

  • White Papers // May 2004

    Determining Collusion in Negotiations

    This article provides a method for determining the legal outcomes of a labor contract negotiation through determining the limits of rational negotiation and irrational negotiation bounded by labor law. Given certain laws protecting union workers, leverage in detecting colluding strategies is available. Manipulation of labor negotiations remains a problem in...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2009

    LSM-Based Secure System Monitoring Using Kernel Protection Schemes

    Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    I Just Found 10 Million SSNs

    The threat originates from the interaction of three (individually innocuous) trends: greater (self) publication of personal information; well-meaning government attempts to prevent SSN fraud (which backfires); and the increasing automation of SSN assignment systems (which introduces regularities attackers can exploit). An attacker could exploit these trends by analyzing publicly available...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Modeling TCP-Vegas Under On/Off Traffic

    There has been a significant amount of research toward modeling variants of the Transmission Control Protocol (TCP) in order to understand the impact of this protocol on file transmission times and network utilization. Analytical models have emerged as a way to reduce the time required for evaluation when compared with...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    The Case for Energy-Oriented Partial Desktop Migration

    Office and home environments are increasingly crowded with personal computers. Even though these computers see little use in the course of the day, they often remain powered, even when idle. Leaving idle PCs running is not only wasteful, but with rising energy costs it is increasingly more expensive. Authors propose...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Physical Layer-Constrained Routing in Ad-hoc Wireless Networks: A Modified AODV Protocol with Power Control

    Routing in Ad Hoc wireless networks is not only a problem of finding a route with shortest length, but it is also a problem of finding a stable and good quality communication route in order to avoid any unnecessary packet loss. In this paper, authors propose a modified ad hoc...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Database Servers on Chip Multiprocessors: Limitations and Opportunities

    Database management systems are a multibillion dollar industry with high-end database servers employing state-of-the-art processors to maximize performance. Recent studies show that processors are far from realizing their maximum performance. Research also indicates that adverse memory access patterns in database workloads result in poor cache locality and overall performance. Database...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    When and How to Change Quorums on Wide Area Networks

    In wide-area settings, unpredictable events, such as flash crowds caused by nearly instantaneous popularity of services, can cause servers that are expected to respond quickly to instead suddenly respond slowly. This presents a problem for achieving consistently good performance in quorum-based distributed systems, in which clients must choose which quorums...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Dynamic Source Routing in Ad Hoc Wireless Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Tree Embeddings for Two-Edge-Connected Network Design

    The group Steiner problem is a classical network design problem where the authors are given a graph and a collection of groups of vertices, and want to build a min-cost subgraph that connects the root vertex to at least one vertex from each group. What if they wanted to build...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Configuring Your Web Browser and Using WebISO

    To be compatible with the Carnegie Mellon Web Portal and services provided by Administrative Computing, Computing Services and the Office of Technology for Education, your web browser must meet the following requirements: 1)The browser must be configured to accept cookies. 2) The browser must be configured to run JavaScript. 3)...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    Online and Stochastic Survivable Network Design

    This paper discusses online and stochastic network design while taking into consideration the edge-connectivity survivable network design problem where a graph with edge costs and edge-connectivity requirements for different sets of vertices finds a minimum-cost network that provides the required connectivity. This problem has been known to admit good approximation...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Routing Design in Operational Networks: A Look from the Inside

    By constructing the collective distributed routing state, routing protocols create the network-wide intelligence that transforms a collection of individual links and routers into an IP network. A network's routing design is embodied in the configuration of these protocols. Creating a routing design is in practice a policy driven design task...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Kahuna: Problem Diagnosis for MapReduce-Based Cloud Computing Environments

    The authors present Kahuna, an approach that aims to diagnose performance problems in Map Reduce systems. Central to Kahuna's approach is the insight on peer-similarity, that nodes behave alike in the absence of performance problems, and that a node that behaves differently is the likely culprit of a performance problem....

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    A Performance Comparison of On-Demand Multicast Routing Protocols for Ad Hoc Networks

    In this paper, authors present a comparative performance evaluation of three general-purpose ondemand multicast protocols, namely ADMR, MAODV, and ODMRP, focusing on the effects of changes such as increasing number of multicast receivers or sources, application sending pattern, and increasing number of nodes in the network. Authors use mobile networks...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    On the Approximability of Some Network Design Problems

    Approximation algorithms have had much success in the area of network design, with both combinatorial and linear-programming based techniques leading to many constant factor approximation algorithms. Despite these successes, several basic network design problems have eluded the quest for constant-factor approximations, with the current best approximation guarantees being logarithmic or...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Impact of Customer Web Portals on Call Center: An Empirical Analysis

    Firms are investing millions to deploy web based self-services at their call centers primarily to reduce operating costs. The rationale is that the firm's cost of interacting with its customers through the web based channel is an order of magnitude cheaper than the assisted channels like telephony. The authors conduct...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Hermes: a Context-Aware Application Development Framework for the Mobile Environment

    This paper describes a next generation software toolkit which provides a framework, including security and intelligibility support, for developing more powerful context-aware applications for the modern mobile environment. Modern mobile computing environments, with reasonable connectivity, processing power and sensing capabilities on portable devices provide a means of achieving truly ubiquitous...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Software Engineering Issues for Mobile Application Development

    While application development for mobile devices goes back at least 10 years, there has been exponential growth in mobile application development since the iPhone AppStore opened in July, 2008. Since then, device makers have created outlets for other mobile devices, including Android, BlackBerry, Nokia Ovi, Windows Phone, and more. Industry...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    A Resource Allocation Model for QoS Management

    Quality of Service (QoS) has been receiving wide attention in recent years in many research communities including networking, multimedia systems and distributed systems. In large distributed systems such as those used in defense systems, on demand service and inter-networked systems, applications contending for system resources must satisfy timing, reliability and...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    Java Concurrency Guidelines

    An essential element of secure coding in the Java programming language is well-documented and enforceable coding standards. Coding standards encourage programmers to follow a uniform set of guidelines determined by the requirements of the project and organization, rather than by the programmer's familiarity or preference. Once established, these standards can...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2010

    Location-Sharing Technologies: Privacy Risks and Controls

    "Due to the ability of cell phone providers to use cell phone towers to pinpoint users' locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been developed that share users' real-time location...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2014

    Phinding Phish: Evaluating Phishing Tools

    "There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. The authors developed an automated test bed for testing anti-phishing tools. They used 200 verified phishing URLs...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Studying the Effectiveness of Security Images in Internet Banking

    Security images are often used as part of the login process on internet banking websites, under the theory that they can help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users' ability to notice that a security image is missing and their willingness to log in even...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising

    Online Behavioral Advertising (OBA) is the practice of tailoring ads based on an individual's activities online. Users have expressed privacy concerns regarding this practice, and both the advertising industry and third parties offer tools for users to control the OBA they receive. The authors provide the first systematic method for...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Cruel Intentions: A Security Analysis of Web Intents

    Web intents are a new web collaboration framework intended to bring the benefits of Android's Intent model to the web. Web Intents are currently implemented as a JavaScript shim, supporting several major local storage enabled browsers. A prototype native implementation is under development for Google Chrome. While Android's intent model...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Self-Exfiltration: The Dangers of Browser-Enforced Information Flow Control

    Since the early days of Netscape, browser vendors and web security researchers have restricted out-going data based on its destination. The security argument accompanying these mechanisms is that they prevent sensitive user data from being sent to the attacker's domain. However, in this paper, the authors show that regulating web...

    Provided By Carnegie Mellon University