Cleveland State University

Displaying 1-10 of 10 results

  • White Papers // Jun 2012

    Concurrent Byzantine Fault Tolerance for Software-Transaction-Memory Based Applications

    Typical Byzantine fault tolerance algorithms require the application requests to be executed sequentially, which may severely limit the throughput of the system considering that modern CPUs are equipped with multiple processing cores. In this paper, the authors present the design and implementation of a Byzantine fault tolerance framework for software-transactional-memory...

    Provided By Cleveland State University

  • White Papers // Jan 2012

    Experiments and Analysis of Voice Over Mobile IP

    Supporting mobility in real-time applications such as Internet telephony is in demand as mobile Internet becomes prevalent. A simple solution is to use Mobile IP in order to provide transparent handoffs to upper layer applications. However, due in part to the Mobile IP's limitations such as triangular routing delay and...

    Provided By Cleveland State University

  • White Papers // Aug 2011

    Analysis of Body Communication Parameters Using Software Radio Platform

    Advances in wireless communication and embedded systems together with miniaturization technologies have made body area communication and networking a viable solution in military as well as civilian applications. However, the body communication is a singular phenomenon and has not been well defined due to its unconventional communication environment. For example,...

    Provided By Cleveland State University

  • White Papers // Jan 2011

    Energy Efficient Routing Protocols ForMobile Ad Hoc Networks

    Although establishing correct and efficient routes is an important design issue in Mobile Ad hoc NETworks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes' operation time is the most critical limiting factor. This article surveys and classifies the energy aware routing protocols proposed for...

    Provided By Cleveland State University

  • White Papers // Dec 2009

    Multihop Transmission Opportunity in Wireless Multihop Networks

    Wireless multihop communication is becoming more important due to the increasing popularity of wireless sensor networks, wireless mesh networks, and mobile social networks. They are distinguished from conventional multihop networks in terms of scale, traffic intensity and/or node density. Being readily available in most of 802.11 radios, multirate facility appears...

    Provided By Cleveland State University

  • White Papers // Jun 2009

    A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad Hoc Networks

    In interference-rich and noisy environment, wireless communication is often hampered by unreliable communication links. Recently, there has been active research on cooperative communication that improves the communication reliability by having a collection of radio terminals transmit signals in a cooperative way. This paper proposes a Medium Access Control (MAC) algorithm,...

    Provided By Cleveland State University

  • White Papers // May 2009

    The Impact Of Institutional Environments On Negotiation Styles In EU Decision Making

    Within the Council of the European Union (EU), the institution designed to represent 'National interests,' why do researchers continue to find such differential patterns of cooperation? From obdurate fights to ingrained habits for working consensually towards outcomes everyone can live with, the Council system covers a wide spectrum of bargaining...

    Provided By Cleveland State University

  • White Papers // Mar 2009

    Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems

    This paper describes a proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ensuring long term reliability of fault tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of the proactive recovery scheme is a...

    Provided By Cleveland State University

  • White Papers // Dec 2008

    Design and Implementation of a Byzantine Fault Tolerance Framework for Web Services

    Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web-services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate....

    Provided By Cleveland State University

  • White Papers // Jul 2008

    On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks

    In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In this paper, the authors theoretically analyze the effectiveness of a mix network under flow correlation attacks. Their formulae clearly show how a mix network will ultimately...

    Provided By Cleveland State University

  • White Papers // Jul 2008

    On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks

    In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In this paper, the authors theoretically analyze the effectiveness of a mix network under flow correlation attacks. Their formulae clearly show how a mix network will ultimately...

    Provided By Cleveland State University

  • White Papers // Mar 2009

    Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems

    This paper describes a proactive recovery scheme based on service migration for long-running Byzantine fault tolerant systems. Proactive recovery is an essential method for ensuring long term reliability of fault tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of the proactive recovery scheme is a...

    Provided By Cleveland State University

  • White Papers // Dec 2008

    Design and Implementation of a Byzantine Fault Tolerance Framework for Web Services

    Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web-services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate....

    Provided By Cleveland State University

  • White Papers // May 2009

    The Impact Of Institutional Environments On Negotiation Styles In EU Decision Making

    Within the Council of the European Union (EU), the institution designed to represent 'National interests,' why do researchers continue to find such differential patterns of cooperation? From obdurate fights to ingrained habits for working consensually towards outcomes everyone can live with, the Council system covers a wide spectrum of bargaining...

    Provided By Cleveland State University

  • White Papers // Dec 2009

    Multihop Transmission Opportunity in Wireless Multihop Networks

    Wireless multihop communication is becoming more important due to the increasing popularity of wireless sensor networks, wireless mesh networks, and mobile social networks. They are distinguished from conventional multihop networks in terms of scale, traffic intensity and/or node density. Being readily available in most of 802.11 radios, multirate facility appears...

    Provided By Cleveland State University

  • White Papers // Jun 2009

    A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad Hoc Networks

    In interference-rich and noisy environment, wireless communication is often hampered by unreliable communication links. Recently, there has been active research on cooperative communication that improves the communication reliability by having a collection of radio terminals transmit signals in a cooperative way. This paper proposes a Medium Access Control (MAC) algorithm,...

    Provided By Cleveland State University

  • White Papers // Jan 2011

    Energy Efficient Routing Protocols ForMobile Ad Hoc Networks

    Although establishing correct and efficient routes is an important design issue in Mobile Ad hoc NETworks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes' operation time is the most critical limiting factor. This article surveys and classifies the energy aware routing protocols proposed for...

    Provided By Cleveland State University

  • White Papers // Jan 2012

    Experiments and Analysis of Voice Over Mobile IP

    Supporting mobility in real-time applications such as Internet telephony is in demand as mobile Internet becomes prevalent. A simple solution is to use Mobile IP in order to provide transparent handoffs to upper layer applications. However, due in part to the Mobile IP's limitations such as triangular routing delay and...

    Provided By Cleveland State University

  • White Papers // Jun 2012

    Concurrent Byzantine Fault Tolerance for Software-Transaction-Memory Based Applications

    Typical Byzantine fault tolerance algorithms require the application requests to be executed sequentially, which may severely limit the throughput of the system considering that modern CPUs are equipped with multiple processing cores. In this paper, the authors present the design and implementation of a Byzantine fault tolerance framework for software-transactional-memory...

    Provided By Cleveland State University

  • White Papers // Aug 2011

    Analysis of Body Communication Parameters Using Software Radio Platform

    Advances in wireless communication and embedded systems together with miniaturization technologies have made body area communication and networking a viable solution in military as well as civilian applications. However, the body communication is a singular phenomenon and has not been well defined due to its unconventional communication environment. For example,...

    Provided By Cleveland State University