Case Western Reserve University

Displaying 1-20 of 20 results

  • White Papers // Aug 2012

    Hush Functions Extended to Any Size Input versus Any Size Output

    Traditional hush functions map a large number to a small number such that the reverse-hush has infinity of solutions, and nonetheless a collision is hard to come by. This primitive is so abundantly useful that one is tempted to extend it such that any number large or small may be...

    Provided By Case Western Reserve University

  • White Papers // Jan 2012

    Towards Capacity and Profit Optimization of Video-on-Demand Services in a Peer-Assisted IPTV Platform

    This paper studies the conditions under which Peer-To-Peer (P2P) technology may be beneficial in providing IPTV services over typical network architectures. It has three major contributions. First, the authors contrast two network models used to study the performance of such a system: a commonly used logical "Internet as a cloud"...

    Provided By Case Western Reserve University

  • White Papers // Jan 2012

    Congestion Control Without a Startup Phase

    The traditional TCP congestion control scheme often yields limited performance due to its conservative Slow Start algorithm, which can require many round-trip times to reach an appropriate sending rate that well utilizes the available capacity. A number of techniques in the literature address this issue, but the authors offer a...

    Provided By Case Western Reserve University

  • White Papers // May 2011

    Application Placement and Demand Distribution in a Global Cloud Platform: A Unified Approach

    This paper addresses a problem of efficient hosting of multiple applications in a globally distributed cloud computing platform. The authors present a unified approach for placing replicas of these applications across geographically distributed data centers and for distributing client demand among the replicas. They consider the utilization of data centers...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Computational LPPL Fit To Financial Bubbles

    The Log-Periodic Power Law (LPPL) is a model of asset prices during endogenous bubbles. If the on-going development of a bubble is suspected, asset prices can be fit numerically to the LPPL law. The best solutions can then indicate whether a bubble is in progress and, if so, the bubble...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?

    Previous work has shown that the network dynamics experienced by both the initial packet and an entire connection carrying an email can be leveraged to classify the email as spam or ham. In the case of packet properties, the prior work has investigated their efficacy based on models of traffic...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Asian Drama: Discovering and Unleashing the Mobile Services

    The purpose of this research has been to study privatization, liberalization1, competition, and the establishment of independent regulatory regimes in the telecommunications sector in several centrally planned economies. The liberalization of telecommunication markets through the introduction of regulatory reforms is changing the way countries approach universal access and service policies....

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks

    Wireless sensor networks have stringent constraints on system resources and data aggregation techniques are critically important. However, accurate data aggregation is difficult due to the variation of sensor readings and due to the frequent communication failures. To address these difficulties, the authors propose a scalable and robust data aggregation algorithm....

    Provided By Case Western Reserve University

  • White Papers // Dec 2010

    Corporate Governance Propagation Through Overlapping Directors

    How do firms determine which governance practices to adopt? This paper proposes, and empirically verifies, that observed governance practices are partly the outcome of network effects among firms with common directors. While firms attempt to select directors whose other directorships are at firms with similar governance practices ("Familiarity effect"), this...

    Provided By Case Western Reserve University

  • White Papers // May 2010

    Self-Referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

    Malicious modification of Integrated Circuits (ICs) in untrusted foundry, referred to as \"Hardware Trojan\", has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware trojans, increasing process variations in nano-scale technologies pose a major challenge, since process noise can easily...

    Provided By Case Western Reserve University

  • White Papers // Mar 2010

    The Impact Of Product Strategies On The Viral Growth Of Internet Businesses

    The exponential growth of users on internet sites is a much desired outcome but one that is difficult to orchestrate. The research proposed will examine how internet based startups achieve viral growth. In particular, this study will attempt to identify how user attitudes influence the sharing and usage behavior that...

    Provided By Case Western Reserve University

  • White Papers // Feb 2010

    A Longitudinal View of HTTP Traffic

    In this paper, the authors analyze three and a half years of HTTP traffic observed at a small research institute to characterize the evolution of various facets of web operation. While the dataset is modest in terms of user population, it is unique in its temporal breadth. They leverage the...

    Provided By Case Western Reserve University

  • White Papers // Jan 2010

    Web Timeouts and Their Implications

    Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documented a class of Denial of Service (DoS) attacks that leverage timeouts to force a host to preserve state with a bare minimum level of interactivity...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    Hardware Trojan by Hot Carrier Injection

    This paper discusses how Hot Carrier Injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    Exploiting Semiconductor Properties for Hardware Trojans

    This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    MERO: A Statistical Approach for Hardware Trojan Detection

    In order to ensure trusted in-field operation of integrated circuits, it is important to develop efficient low-cost techniques to detect malicious tampering (also referred to as hardware Trojan) that cause's undesired change in functional behavior. Conventional post-manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to...

    Provided By Case Western Reserve University

  • White Papers // Apr 2009

    Dynamic TCP Proxies: Coping With Disadvantaged Hosts in MANETs

    Applications in mobile ad-hoc networks can suffer from poor link quality and degraded network services. In particular, standard TCP over low-quality, long routing paths, can have disproportionally low throughput as the result of a double penalty: long end-to-end round-trip time - due to long path length, and frequent congestion window...

    Provided By Case Western Reserve University

  • White Papers // Mar 2009

    High-Speed VLSI Architecture for Low-Complexity Chase Soft-Decision Reed-Solomon Decoding

    Interpolation-based Algebraic Soft-decision Decoding (ASD) of Reed-Solomon (RS) codes can achieve significant coding gain with polynomial complexity. Among available ASD algorithms, the Low-Complexity Chase (LCC) algorithm can achieve a good performance-complexity tradeoff. In addition, the multiplicity of each interpolation point involved in this algorithm is one. These features make the...

    Provided By Case Western Reserve University

  • White Papers // Feb 2009

    Inside Or Outside The IP System? Business Creation In Academia

    Research and public policy on academic entrepreneurship is largely based on the assumption that the entrepreneurial activity of academics is represented by efforts of faculty to commercialize inventions that they have disclosed to university administrators and that, in most cases, have been patented. In this paper, the authors analyze a...

    Provided By Case Western Reserve University

  • White Papers // Oct 2003

    Delay Compensation in Networked Computer Games

    This white paper seeks to explore the topic in detail through the development of a demonstrative networked game and implementation of an application-layer delay compensation strategy. It emphasizes on the fact that to develop this game requires a very high level of network service, primarily in the area of latency...

    Provided By Case Western Reserve University

  • White Papers // Aug 2012

    Hush Functions Extended to Any Size Input versus Any Size Output

    Traditional hush functions map a large number to a small number such that the reverse-hush has infinity of solutions, and nonetheless a collision is hard to come by. This primitive is so abundantly useful that one is tempted to extend it such that any number large or small may be...

    Provided By Case Western Reserve University

  • White Papers // Mar 2009

    High-Speed VLSI Architecture for Low-Complexity Chase Soft-Decision Reed-Solomon Decoding

    Interpolation-based Algebraic Soft-decision Decoding (ASD) of Reed-Solomon (RS) codes can achieve significant coding gain with polynomial complexity. Among available ASD algorithms, the Low-Complexity Chase (LCC) algorithm can achieve a good performance-complexity tradeoff. In addition, the multiplicity of each interpolation point involved in this algorithm is one. These features make the...

    Provided By Case Western Reserve University

  • White Papers // Oct 2003

    Delay Compensation in Networked Computer Games

    This white paper seeks to explore the topic in detail through the development of a demonstrative networked game and implementation of an application-layer delay compensation strategy. It emphasizes on the fact that to develop this game requires a very high level of network service, primarily in the area of latency...

    Provided By Case Western Reserve University

  • White Papers // Feb 2009

    Inside Or Outside The IP System? Business Creation In Academia

    Research and public policy on academic entrepreneurship is largely based on the assumption that the entrepreneurial activity of academics is represented by efforts of faculty to commercialize inventions that they have disclosed to university administrators and that, in most cases, have been patented. In this paper, the authors analyze a...

    Provided By Case Western Reserve University

  • White Papers // Mar 2010

    The Impact Of Product Strategies On The Viral Growth Of Internet Businesses

    The exponential growth of users on internet sites is a much desired outcome but one that is difficult to orchestrate. The research proposed will examine how internet based startups achieve viral growth. In particular, this study will attempt to identify how user attitudes influence the sharing and usage behavior that...

    Provided By Case Western Reserve University

  • White Papers // Dec 2010

    Corporate Governance Propagation Through Overlapping Directors

    How do firms determine which governance practices to adopt? This paper proposes, and empirically verifies, that observed governance practices are partly the outcome of network effects among firms with common directors. While firms attempt to select directors whose other directorships are at firms with similar governance practices ("Familiarity effect"), this...

    Provided By Case Western Reserve University

  • White Papers // Apr 2009

    Dynamic TCP Proxies: Coping With Disadvantaged Hosts in MANETs

    Applications in mobile ad-hoc networks can suffer from poor link quality and degraded network services. In particular, standard TCP over low-quality, long routing paths, can have disproportionally low throughput as the result of a double penalty: long end-to-end round-trip time - due to long path length, and frequent congestion window...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?

    Previous work has shown that the network dynamics experienced by both the initial packet and an entire connection carrying an email can be leveraged to classify the email as spam or ham. In the case of packet properties, the prior work has investigated their efficacy based on models of traffic...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    Hardware Trojan by Hot Carrier Injection

    This paper discusses how Hot Carrier Injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    Exploiting Semiconductor Properties for Hardware Trojans

    This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing...

    Provided By Case Western Reserve University

  • White Papers // Feb 2010

    A Longitudinal View of HTTP Traffic

    In this paper, the authors analyze three and a half years of HTTP traffic observed at a small research institute to characterize the evolution of various facets of web operation. While the dataset is modest in terms of user population, it is unique in its temporal breadth. They leverage the...

    Provided By Case Western Reserve University

  • White Papers // Jan 2010

    Web Timeouts and Their Implications

    Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documented a class of Denial of Service (DoS) attacks that leverage timeouts to force a host to preserve state with a bare minimum level of interactivity...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Computational LPPL Fit To Financial Bubbles

    The Log-Periodic Power Law (LPPL) is a model of asset prices during endogenous bubbles. If the on-going development of a bubble is suspected, asset prices can be fit numerically to the LPPL law. The best solutions can then indicate whether a bubble is in progress and, if so, the bubble...

    Provided By Case Western Reserve University

  • White Papers // May 2011

    Application Placement and Demand Distribution in a Global Cloud Platform: A Unified Approach

    This paper addresses a problem of efficient hosting of multiple applications in a globally distributed cloud computing platform. The authors present a unified approach for placing replicas of these applications across geographically distributed data centers and for distributing client demand among the replicas. They consider the utilization of data centers...

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Asian Drama: Discovering and Unleashing the Mobile Services

    The purpose of this research has been to study privatization, liberalization1, competition, and the establishment of independent regulatory regimes in the telecommunications sector in several centrally planned economies. The liberalization of telecommunication markets through the introduction of regulatory reforms is changing the way countries approach universal access and service policies....

    Provided By Case Western Reserve University

  • White Papers // Jan 2011

    Scalable and Robust Aggregation Techniques for Extracting Statistical Information in Sensor Networks

    Wireless sensor networks have stringent constraints on system resources and data aggregation techniques are critically important. However, accurate data aggregation is difficult due to the variation of sensor readings and due to the frequent communication failures. To address these difficulties, the authors propose a scalable and robust data aggregation algorithm....

    Provided By Case Western Reserve University

  • White Papers // Jan 2012

    Towards Capacity and Profit Optimization of Video-on-Demand Services in a Peer-Assisted IPTV Platform

    This paper studies the conditions under which Peer-To-Peer (P2P) technology may be beneficial in providing IPTV services over typical network architectures. It has three major contributions. First, the authors contrast two network models used to study the performance of such a system: a commonly used logical "Internet as a cloud"...

    Provided By Case Western Reserve University

  • White Papers // Jan 2012

    Congestion Control Without a Startup Phase

    The traditional TCP congestion control scheme often yields limited performance due to its conservative Slow Start algorithm, which can require many round-trip times to reach an appropriate sending rate that well utilizes the available capacity. A number of techniques in the literature address this issue, but the authors offer a...

    Provided By Case Western Reserve University

  • White Papers // Jun 2009

    MERO: A Statistical Approach for Hardware Trojan Detection

    In order to ensure trusted in-field operation of integrated circuits, it is important to develop efficient low-cost techniques to detect malicious tampering (also referred to as hardware Trojan) that cause's undesired change in functional behavior. Conventional post-manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to...

    Provided By Case Western Reserve University

  • White Papers // May 2010

    Self-Referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

    Malicious modification of Integrated Circuits (ICs) in untrusted foundry, referred to as \"Hardware Trojan\", has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware trojans, increasing process variations in nano-scale technologies pose a major challenge, since process noise can easily...

    Provided By Case Western Reserve University