Carnegie Mellon University

Displaying 201-240 of 523 results

  • White Papers // Apr 2011

    FOG: Fairness in Mobile Opportunistic Networking

    The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents

    Motivated attackers cannot always be blocked or deterred. In the physical-world security context, examples include suicide bombers and sexual predators. In computer networks, zero-day exploits unpredictably threaten the information economy and end users. In this paper, the authors study the conflicting incentives of individuals to act in the light of...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    R-BATCH: Task Partitioning for Fault-Tolerant Multiprocessor Real-Time Systems

    Many emerging embedded real-time applications such as SCADA (Supervisory Control And Data Acquisition), autonomous vehicles and advanced avionics, require a high degree of dependability. Dealing with tasks having both hard real-time requirements and high reliability constraints is a key challenge faced in such systems. This paper addresses the problem of...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    The Case for VOS: The Vector Operating System

    Operating systems research for many-core systems has recently focused its efforts on supporting the scalability of OS-intensive applications running on increasingly parallel hardware. Lost amidst the march towards this parallel future is efficiency: perfectly parallel software may saturate the parallel capabilities of the host system, but in doing so can...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Local Isomorphism to Solve the Pre-Image Problem in Kernel Methods

    Kernel methods have been popular over the last decade to solve many computer vision, statistics and machine learning problems. An important, both theoretically and practically, open problem in kernel methods is the pre-image problem. The pre-image problem consists of finding a vector in the input space whose mapping is known...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Principles of Operation for Shingled Disk Devices

    A leading strategy for driving the areal density of magnetic disk drives through 1 - 10 terabit/inch (the coming decade) is to shingle (partially overlap) adjacent tracks, imposing significant restrictions on where data can be written without incurring multi-track read-modify-write penalties. These restrictions and penalties can be fully hidden from...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Draco: Top-Down Statistical Diagnosis of Large-Scale VoIP Networks

    Large scale integrated services such as VoIP running over IP networks are the future of telecommunications. The high availability requirements of such services require scalable techniques for rapid diagnosis and localization of user-visible failures. However, state-of-the-art network event correlation techniques often produce alarms that cannot easily be correlated to customer...

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2011

    Agile Development & Software Architecture - Crossing the Great Divide

    Agile development and software architecture are frequently seen as two divergent schools of thought or "Camps". Agile developers often refer to architecture as Big Design Upfront (BDUF) and may regard the architect's major output as merely shelf-ware. Proponents of architecture-centric software development may see Agilists as undisciplined or short-sighted, engaged...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Diagnosing Performance Changes by Comparing Request Flows

    The causes of performance changes in a distributed system often elude even its developers. This paper develops a new technique for gaining insight into such changes: comparing request flows from two executions (e.g., of two system versions or time periods). Building on end-to-end request-flow tracing within and across components, algorithms...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2011

    Social-Based Trust Mechanisms in Mobile Opportunistic Networks

    The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, the authors investigate...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2011

    Polonium: Tera-Scale Graph Mining and Inference for Malware Detection

    The authors present polonium, a novel Symantec technology that detects malware through large-scale graph inference. Based on the scalable belief propagation algorithm, polonium infers every file's reputation, flagging les with low reputation as malware. They evaluated Polonium with a billion-node graph constructed from the largest le submissions dataset ever published...

    Provided By Carnegie Mellon University

  • Webcasts // Mar 2011

    Empower Your Smart Grid Transformation

    Around the globe, progressive utilities see the inevitability of adopting a smart grid that uses digital technology to modernize the power grid. More than meters and mobility, the smart grid represents a whole new framework for improved management of electricity generation, transmission and distribution. Embarking on a smart grid journey...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    A Spatial-Epistemic Logic for Reasoning About Security Protocols

    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Verification of Information Flow and Access Control Policies With Dependent Types

    The authors present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. They show that a number of security policies which have been formalized separately in the literature can all be expressed in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Teaching the Cloud

    Cloud computing is a disruptive technology, one that embodies a major conceptual shift and is rapidly changing the way users, developers, and organizations work with computing infrastructure. Carnegie Mellon University in Qatar offered a one-semester undergraduate course to introduce students to cloud computing. In this paper, the authors describe their...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Distributed Throughput-Optimal Scheduling in Ad Hoc Wireless Networks

    In this paper, the authors propose a distributed throughput optimal ad hoc wireless network scheduling algorithm, which is motivated by the celebrated simplex algorithm for solving Linear Programming (LP) problems. The scheduler stores a sparse set of basic schedules, and chooses the max-weight basic schedule for transmission in each time...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms With Directed Gossip Communication

    Recently, there has been increased interest in large scale networked systems including networks of agents, wireless ad-hoc networks, and Wireless Sensor Networks (WSNs.) Typically, these systems lack a central unit, and the inter-node communication is prone to random failures (e.g., random packet dropouts in WSNs.) In this paper, the authors...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    CPU Scheduling and Memory Management for Interactive Real-Time Applications

    In this paper, the authors propose, design, implement, and evaluate a CPU scheduler and a memory management scheme for interactive soft real-time applications. Their CPU scheduler provides a new CPU reservation algorithm that is based on the well-known Constant Bandwidth Server (CBS) algorithm but is more flexible in allocating the...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Segment Based Inter-Networking to Accommodate Diversity at the Edge

    In this paper, the authors introduce Tapa, a network architecture that accommodates diversity at the network edge: different access networks, heterogeneous edge devices, and rich applications and network services. The core idea underlying Tapa is to use network segments, rather than IP links, as the basis on top of which...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Applying Simple Performance Models to Understand Inefficiencies in Data-Intensive Computing

    New programming frameworks for scale-out parallel analysis, such as MapReduce and Hadoop, have become a cornerstone for exploiting large datasets. However, there has been little analysis of how these systems perform relative to the capabilities of the hardware on which they run. This paper describes a simple analytical model that...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Intelligent Humidity Sensor for - Wireless Sensor Network Agricultural Application

    Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The traditional humidity sensors employed in the agriculture have a drawback that they acquire a large amount of data which is to be transmitted or processed. Whereas the intelligent sensor proposed...

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2011

    Architectural Knowledge Management: Decision Guidance in Service-Oriented Architecture Design

    Architectural decisions are design decisions that are hard to make and costly to change. Hence, mature software engineering and architecture design methods emphasize the importance of architectural decision making and capturing. However, inhibitors such as a lack of immediate benefits often prevent decisions from being captured.

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Scale and Concurrency of GIGA+: File System Directories with Millions of Files

    The authors examine the problem of scalable file system directories, motivated by data-intensive applications requiring millions to billions of small files to be ingested in a single directory at rates of hundreds of thousands of file creates every second. They introduce a POSIX-compliant scalable directory design, GIGA+, which distributes directory...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    DSRP: Distributed SensorWeb Routing Protocol

    The authors propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarchical architectures to create a new hybrid that draws on current protocol theories. The protocol uses a hybrid network structure to achieve...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Here Are My Data Files. Here Are My Queries. Where Are My Results?

    DataBase Management Systems (DBMS) provide incredible flexibility and performance when it comes to query processing, scalability and accuracy. To fully exploit DBMS features, however, the user must define a schema, load the data, tune the system for the expected workload, and answer several questions. Should the database use a column-store,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Exact Pattern Matching With Feed-Forward Bloom Filters

    This paper presents a new, memory efficient and cache-optimized algorithm for simultaneously searching for a large number of patterns in a very large corpus. This algorithm builds upon the Rabin-Karp string search algorithm and incorporates a new type of Bloom filter that the authors call a feed-forward Bloom filter. While...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Efcient Mechanisms to Provide Convoy Member and Vehicle Sequence Authentication in VANETs

    Vehicular Ad hoc NETworks (VANETs) are on the verge of deployment. In the near future, wireless vehicle-to-vehicle and vehicle-to-infrastructure communication will enable numerous safety, convenience, and business applications. Security is a necessary pre-requisite for adoption of these technologies. As the authors demonstrate in this paper, VANETs require two new security...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Challenges and Opportunities for Efficient Computing With FAWN

    This paper presents the architecture and motivation for a cluster-based, many-core computing architecture for energy-efficient, data-intensive computing. FAWN, a Fast Array of Wimpy Nodes, consists of a large number of slower but efficient nodes coupled with low-power storage. The authors present the computing trends that motivate a FAWN-like approach, for...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Improving Web Availability for Clients With MONET

    Despite the increasing degree of multi-homing, path and data redundancy, and capacity available in the Internet, today's clients experience outage rates of a few percent when accessing Web sites. MONET ("Multi-homed Overlay NETwork), is a new system that improves client availability to Web sites using a combination of link multi-homing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Athena: A New Efficient Automatic Checker for Security Protocol Analysis

    The authors propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authentication, secrecy and properties related to electronic commerce. They have developed an automatic procedure for evaluating well-formed formulae in this logic. For a well-formed formula, if the...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis

    The authors propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient representation - the extension to the Strand Space Model, and utilizes techniques from both model checking and theorem proving approaches. Athena is fully automatic and is able to prove the correctness...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    New Streaming Algorithms for Fast Detection of Super spreaders

    High-speed monitoring of Internet traffic is an important and challenging problem, with applications to real time attack detection and mitigation, traffic engineering, etc. However, packet-level monitoring requires fast streaming algorithms that use very little memory and little communication among collaborating network monitoring points. In this paper, the authors consider the...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Random Key Predistribution Schemes for Sensor Networks

    Wide-spread deployment of sensor networks is on the horizon. Networks of thousands of sensors may present an economical solution to some of the challenging problems: real-time traffic monitoring, building safety monitoring (structural, fire, and physical security monitoring), military sensing and tracking, distributed measurement of seismic activity, real-time pollution monitoring, wildlife...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software

    Software vulnerabilities have had a devastating effect on the Internet. Worms such as Code Red and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage. To successfully combat these fast automatic Internet attacks, one needs fast automatic attack detection...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Statistical Approach to Contention Modeling for High-Level Heterogeneous Multiprocessor Simulation

    Single chip systems featuring multiple heterogeneous processors and a variety of communication and memory architectures have emerged to satisfy the demand for networking, handheld computing, and other custom devices. The complex interactions between applications, schedulers, and processor resources, along with the resulting contention delays for shared busses and memories, are...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Size-Based Scheduling to Improve Web Performance

    Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which people schedule the requests? That is the question the authors ask in this paper. This paper proposes a method for improving the performance of web servers servicing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness

    While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative setup may be described simply as a collection of multiprocessors or a distributed server system. This collection of multiprocessors is fed by a single common...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    XIA: An Architecture for an Evolvable and Trustworthy Internet

    Motivated by limitations in today's host-based IP network architecture, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, much like the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Trust and Trusted Computing Platforms

    This paper examines the capabilities and limitations of hardware-based trusted platforms in general, and the Trusted Platform Module (TPM) from the perspective of trusted applications in particular. Through this examination, the authors obtain an understanding of the methods recommended and used to extend trust to higher levels of infrastructure and...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Deriving Candidate Technical Controls and Indicators of Insider Attack From Socio-Technical Models and Data

    The insider threat continues to be one of the prime issues facing government entities and organizations across critical infrastructure sectors. This paper seeks to demonstrate how a useful method for extracting technical information from previous insider crimes and mapping it to previous modeling work can create informed candidate technical controls...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    The CERT Approach to Cybersecurity Workforce Development

    For a cybersecurity workforce to be effective, its members must possess the knowledge, skills, and experience required to perform their job duties. Proficiency and relevance are key factors in determining the effectiveness of each of these components. Proficiency refers to how well someone understands a subject matter or can apply...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    Combining Architecture-Centric Engineering With the Team Software Process

    This paper contains a description of an architecture-centric life-cycle model that uses the Carnegie Mellon Software Engineering Institute's Architecture-Centric Engineering (ACE) methods embedded in a Team Software Process (TSP) framework and of the experience in piloting the approach in an actual development effort. Combining ACE and TSP provides an iterative...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    Performance Analysis of WS-Security Mechanisms in SOAP-Based Web Services

    Identity Management (IdM) solutions in web services environments are often compared on the levels of performance and security they provide. Selecting the appropriate IdM solution for a given system or application often requires making tradeoffs between security and performance, while also considering the system's contextual and environmental requirements and constraints....

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    A Workshop on Analysis and Evaluation of Enterprise Architectures

    This paper summarizes a workshop on analysis and evaluation of enterprise architectures that was held at the Carnegie Mellon Software Engineering Institute (SEI). The SEI invited accomplished practitioners from government and industry to discuss key issues in analyzing and evaluating enterprise architectures. After several opening talks by individuals who presented...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Integrated Measurement and Analysis Framework for Software Security

    In today's business and operational environments, multiple organizations routinely work collaboratively to acquire, develop, deploy, and maintain technical capabilities via a set of interdependent, networked systems. Measurement in these distributed management environments can be an extremely challenging problem. The CERT Program, part of Carnegie Mellon University's Software Engineering Institute (SEI),...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Using TSP Data to Evaluate Your Project Performance

    The Team Software Process (TSP) provides a framework to predictably and effectively build software-intensive products. It relies on data collected by team members to provide insight into how a software project is operating. For this paper, an exploratory data analysis was conducted to investigate other ways that TSP data could...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Suggestions for Documenting SOA-Based Systems

    This paper provides suggestions for documenting service-oriented architecture-based systems based on the Views & Beyond (V&B) software documentation approach. The V&B documentation approach is a lightweight and flexible approach to documenting software architecture developed by Carnegie Mellon University's Software Engineering Institute. This paper also includes an overview of several well-known...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Security Requirements Reusability and the SQUARE Methodology

    Security is an important and complex quality attribute in many software-intensive systems. Unfortunately security is often neglected in the requirements stage of the development life cycle. Security is introduced later, in design and implementation, which results in inadequate analysis, cost overruns, and vulnerabilities costing billions of dollars annually. Even when...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Emerging Technologies for Software-Reliant Systems of Systems

    This paper presents general computation trends and a particular set of emerging technologies to support the trends for software-reliant Systems of Systems (SoSs). Software-reliant SoSs now tend to be highly distributed software systems, formed from constituent software systems that are operated and managed by different organizations. These SoSs are moving...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    T-Check in System-of-Systems Technologies: Cloud Computing

    This paper presents the results of applying the T-Check method in an initial investigation of cloud computing. In this report, three hypotheses are examined: an organization can use its existing infrastructure simultaneously with cloud resources with relative ease; cloud computing environments provide ways to continuously update the amount of resources...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum

    Modern society is deeply and irreversibly dependent on software systems of remarkable scope and complexity in areas including defense, government, energy, communication, transportation, manufacturing, and finance. The security and correct functionality of these systems are absolutely vital; poor or absent security and incorrect functionality can have devastating consequences including loss...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Measurement and Analysis Infrastructure Diagnostic, Version 1.0: Method Definition Document

    Given the importance of measurement and analysis in decision making, organizations need to ensure their data, analyses, and corresponding reports are of high quality and meet the information needs of practitioners and managers. Yet, organizations often have no method for evaluating the quality of their measurement and analysis infrastructure and...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    A Framework for Modeling the Software Assurance Ecosystem: Insights From the Software Assurance Landscape Project

    Today's operational environments are complex and dynamic. User needs and environmental factors are constantly changing, which leads to unanticipated usage, reconfiguration, and continuous evolution of practices and technologies. Operational requirements for software-reliant systems are often ambiguous, incomplete, or incorrect. New defects and vulnerabilities are continually discovered. In environments characterized by...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Getting Started With Service-Oriented Architecture (SOA) Terminology

    This white paper presents basic terminology related to Service-Oriented Architecture (SOA). The goal of the paper is to establish a baseline of terms for service-oriented systems. Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems, in which: Services provide reusable business functionality via well-defined interfaces. There...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Comparison of Overlay Routing and Multihoming Route Control

    The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to effectively bypass BGP's path selection in order to improve performance and fault tolerance. In this paper, the authors explore the possibility that intelligent control of...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    RAIDE for Engineering Architecture-Based Self-Adaptive Systems

    Rainbow is an approach for engineering self-adaptive systems, with run-time, closed-loop control over target systems to monitor, detect, decide, and act on opportunities for system improvement. RAIDE enables adaptation engineers to customize the Rainbow framework, simulate adaptation behavior, and deploy Rainbow run-time components. Imagine a world where a software engineer...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    In Search of an API for Scalable File Systems: Under the Table or Above It?

    Big Data is everywhere - both the IT industry and the scientific computing community are routinely handling terabytes to petabytes of data. This preponderance of data has fueled the development of Data-Intensive Scalable Computing (DISC) systems that manage, process and store massive data-sets in a distributed manner. For example, Google...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    Mochi: Visual Log-Analysis Based Tools for Debugging Hadoop

    Mochi, a new visual, log-analysis based debugging tool correlates Hadoop's behavior in space, time and volume, and extracts a causal, unified control- and data-flow model of Hadoop across the nodes of a cluster. Mochi's analysis produces visualizations of Hadoop's behavior using which users can reason about and debug performance issues....

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

    The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine Fault-Tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to continue to provide a correct service even when some of their replicas fail arbitrarily, either accidentally...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Lucy in the Sky Without Diamonds: Stealing Confidential Data in the Cloud

    Cloud computing is a recent paradigm that is creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns about security. In a public cloud, the user's data storage and processing is no longer done inside its premises, but in...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    An Experiment Towards Adaptive Quality of Service in Mobile Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, mobile ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs

    Vehicular Ad Hoc NETworks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location,...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    The Cognitive Virtues of Dynamic Networks

    For the most part, studies in the network science literature tend to focus on networks whose functional connectivity is largely invariant with respect to some episode of collective information processing. In the real world, however, networks with highly dynamic functional topologies tend to be the norm. In order to improve...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Challenges in Anticipatory Information Management Under Network Constraints

    As various militaries move towards a vision of network centric warfare and network centric operations, multiple issues regarding information acquisition and presentation arise as one tries to use the full potential of a networked environment while overcoming the limitations imposed by the realities faced by the warfighter. In such an...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Credit-Rating Shopping, Selection And The Equilibrium Structure Of Ratings

    An important feature of the microstructure of credit ratings is the ability of a security issuer to choose which ratings to purchase. Such choices can reflect explicit or even implicit shopping for favorable credit reviews and induce "Selection" effects in the structure of ratings. When there is considerable heterogeneity in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    TFP During A Credit Crunch

    The financial crisis of 2008 was followed by sharp contractions in aggregate output and employment and an unusual increase in aggregate Total Factor Productivity (TFP). This paper attempts to explain these facts by modeling the creation and destruction of jobs in the presence of heterogeneity in firm productivity and frictional...

    Provided By Carnegie Mellon University

  • White Papers // May 2009

    The Role Of "Determinacy" In Monetary Policy Analysis

    It is well known that the concept of "Determinacy" - a single stable solution - plays a major role in contemporary monetary policy analysis. But while determinacy is desirable, other things equal, it is not necessary for a solution to be plausible and is not sufficient for a solution to...

    Provided By Carnegie Mellon University

  • Podcasts // Sep 2009

    The Smart Grid: Managing Electrical Power Distribution and Use

    In this podcast, the speaker discusses the growing digitization of electrical power distribution (referred to as the smart grid) and some of the related security and privacy issues. He also introduces new work at the SEI on a smart grid maturity model that will be discussed in more detail in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Topology-Aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors

    Current design complexity trends, poor wire scalability, and power limitations argue in favor of highly modular on-chip systems. Today's state-of-the-art CMPs already feature up to a hundred discrete cores. With increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future....

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Exertion-Based Billing for Cloud Storage Access

    Charging for cloud storage must account for two costs: the cost of the capacity used and the cost of access to that capacity. For the cost of access, current systems focus on the paper requested, such as data transferred or I/O operations completed, rather than the exertion (i.e., effort/resources expended)...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Traffic Information Systems: Efficient Message Dissemination Via Adaptive Beaconing

    Traffic Information Systems (TIS) are one of the key non-safety application areas of Vehicular Ad Hoc NETworks (VANETs). As such, TIS are much less delay sensitive compared to safety applications, which have recently attracted a lot of attention in VANET research. The authors propose a new message dissemination protocol, Adaptive...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Clearing the Clouds: A Study of Emerging Workloads on Modern Hardware

    Emerging scale-out cloud applications need extensive amounts of computational resources. However, data centers using modern server hardware face physical constraints in space and power, limiting further expansion and calling for improvements in the computational density per server and in the per-operation energy use. Therefore, continuing to improve the computational resources...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Engineering Robust Next-Generation Networks

    Next-Generation Networks (NGNs) employ the Internet Protocol (IP) over a wide variety of packet-switching technologies, which often lack in fault resilience enabling features. An overlay MPLS infrastructure with its fast-reroute mechanisms can be deployed to overcome such an issue. Addressing NGNs robust to single link and node failures, an offline...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2009

    CHARQ: Cooperative Hybrid ARQ for Wireless Video Streaming

    Forward Error Correction (FEC) coding and Automatic Repeat reQuest (ARQ) are two commonly used techniques to tackle packet erasures in wireless video streaming. To preserve flexibility while reducing end-to-end latency, Hybird ARQ (HARQ) has been proposed as an alternative that combines the advantages of FEC and ARQ. This paper presents...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Classification-Based Relay Selection for Video Streaming Over Wireless Multihop Networks

    Real-time streaming of audiovisual content over wireless networks is emerging as an important technology in multimedia communication. In this paper, the authors present a classification-based method to select appropriate relays in support of their prior work on Time-aware Opportunistic Relaying for video streaming over wireless mesh networks. The proposed scheme...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Towards Secure Multi-Path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy

    Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in Mobile Ad-hoc NETworks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, the authors propose a routing mechanism that uses cross-layer strategies. The cross-layer strategy involves incorporating feedback...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Digital Filter Design for Jamming Mitigation in 802.15.4 Communication

    Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, the authors analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Anubis: An Attestation Protocol for Distributed Context-Aware Applications

    Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper, the authors present the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Improving Anti-Jamming Capability and Increasing Jamming Impact With Mobility Control

    The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2011

    Social-Based Trust Mechanisms in Mobile Opportunistic Networks

    The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, the authors investigate...

    Provided By Carnegie Mellon University