Cornell University

Displaying 1-40 of 1383 results

  • White Papers // Jul 2015

    Monitoring in IOT Enabled Devices

    As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of Things (IOTs), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is...

    Provided By Cornell University

  • White Papers // Jul 2015

    Http-Burst: Improving HTTP Efficiency in the Era of Bandwidth Hungry Web Applications

    The HyperText Transfer Protocol (HTTP), a key building block of the world wide web, has succeeded to enable information exchange worldwide. Since its first version in 1996, HTTP/1.0, the average number of inlined objects and average total bytes per webpage has been increasing significantly for desktops and mobiles, from 1-10...

    Provided By Cornell University

  • White Papers // Jul 2015

    Temporal and Spatial Classification of Active IPv6 Addresses

    There is striking volume of world-wide web activity on IPv6 today. In early 2015, one large content distribution network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are observed per month. Address counts, however, obscure the number of...

    Provided By Cornell University

  • White Papers // Jul 2015

    JSKETCH: Sketching for Java

    Sketch-based synthesis, epitomized by the SKETCH tool, lets developers synthesize software starting from a partial program, also called a sketch or template. This paper presents JSKETCH, a tool that brings sketch-based synthesis to Java. JSKETCH's input is a partial Java program that may include holes, which are unknown constants, expression...

    Provided By Cornell University

  • White Papers // Jul 2015

    Research Approaches on Energy-aware Cognitive Radio Networks and Cloud based Infrastructures

    The raise of mobility has make more needs for wireless connectivity and bandwidth. As years passes wireless networks were rapidly improved, introducing new applications and services, as well as important challenges for mobility support. This research field is new with many researchers and scientists making their proposals to optimize the...

    Provided By Cornell University

  • White Papers // Jul 2015

    A Connectivity-Aware Approximation Algorithm for Relay Node Placement in Wireless Sensor Networks

    In two-tiered Wireless Sensor Networks (WSNs) relay node placement is one of the key factors impacting the network energy consumption and the system overhead. In this paper, a novel connectivity-aware approximation algorithm for relay node placement in WSNs is proposed to offer a major step forward in saving system overhead....

    Provided By Cornell University

  • White Papers // Jul 2015

    A New Vision for Smart Objects and the Internet of Things: Mobile Robots and Long-Range UHF RFID Sensor Tags

    In this paper, the authors present a new vision for smart objects and the Internet of Things (IoTs) wherein mobile robots interact with wirelessly-powered, long-range, Ultra-High Frequency Radio Frequency IDentification (UHF RFID) tags outfitted with sensing capabilities. They explore the technology innovations driving this vision by examining recently-commercialized sensor tags...

    Provided By Cornell University

  • White Papers // Jul 2015

    Joint Transmission in Cellular Networks with CoMP - Stability and Scheduling Algorithms

    Due to the current trend towards smaller cells, an increasing number of users of cellular networks reside at the edge between two cells; these users typically receive poor service as a result of the relatively weak signal and strong interference. Coordinated Multi-Point (CoMP) with Joint Transmission (JT) is a cellular...

    Provided By Cornell University

  • White Papers // Jul 2015

    The Society Spectrum: Self-Regulation of Cellular Network Markets

    Today's cellular telecommunications markets require continuous monitoring and intervention by regulators in order to balance the interests of various stakeholders. In order to reduce the extent of regulatory involvements in the day-to-day business of cellular operators, the present paper proposes a "Self-regulating" spectrum market regime named "Society spectrum". This regime...

    Provided By Cornell University

  • White Papers // Jul 2015

    SenseDroid: A Context-Aware Information Exchange Framework for Mobile Sensor Networks Using Android Phones

    Mobile phones and smartphones have evolved to be very powerful devices that have the potential to be utilized in many application areas apart from generic communication. With each passing year, users see increasingly powerful smartphones being manufactured, which have a plethora of powerful embedded sensors like microphone, camera, digital compass,...

    Provided By Cornell University

  • White Papers // Jul 2015

    Computationally Aware Sum-Rate Optimal Scheduling for Centralized Radio Access Networks

    In a centralized or cloud radio access network, certain portions of the digital baseband processing of a group of several radio access points are executed at a central data center. Centralizing the processing improves the flexibility, scalability, and utilization of computational assets. However, the performance depends critically on how the...

    Provided By Cornell University

  • White Papers // Jul 2015

    Securing Physical-Layer Communications for Cognitive Radio Networks

    In this paper, the authors investigate the physical-layer security of Cognitive Radio (CR) networks, which are vulnerable to various newly arising attacks targeting on the weaknesses of CR communications and networking. They first review a range of physical-layer attacks in CR networks, including the primary user emulation, sensing falsification, intelligence...

    Provided By Cornell University

  • White Papers // Jun 2015

    5G mmWave Module for the ns-3 Network Simulator

    The increasing demand of data, along with the spectrum scarcity, is motivating a urgent shift towards exploiting new bands. This is the main reason behind identifying mmWaves as the key disruptive enabling technology for 5G cellular networks. Indeed, utilizing new bands means facing new challenges; in this context, they are...

    Provided By Cornell University

  • White Papers // Jun 2015

    Interference Mitigation In Wireless Mesh Networks Through Radio Co-location Aware Conflict Graphs

    Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest. But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference. Conflict graphs are indispensable tools used to theoretically represent and estimate the interference in...

    Provided By Cornell University

  • White Papers // Jun 2015

    A Java Implementation of Parameter-less Evolutionary Algorithms

    The parameter-less genetic algorithm was first presented by the researchers as an alternative to the usual trial-and-error method of finding, for each given problem, an acceptable set-up of the parameter values of the genetic algorithm. Since then, the same strategy has been successfully applied to create parameter-less versions of other...

    Provided By Cornell University

  • White Papers // Jun 2015

    Java Implementation of a Parameter-less Evolutionary Portfolio

    The Java implementation of a portfolio of parameter-less evolutionary algorithms is presented. The parameter-less evolutionary portfolio implements a heuristic that performs adaptive selection of parameter-less evolutionary algorithms in accordance with performance criteria that are measured during running time. At present time, the portfolio includes three parameter-less evolutionary algorithms: parameter-less univariate...

    Provided By Cornell University

  • White Papers // Jun 2015

    The Complexity-Rate Tradeoff of Centralized Radio Access Networks

    In a centralized Radio Access Network (RAN), the signals from multiple Radio Access Points (RAPs) are processed centrally in a data center. Centralized RAN enables advanced interference coordination strategies while leveraging the elastic provisioning of data processing resources. It is particularly well suited for dense deployments, such as within a...

    Provided By Cornell University

  • White Papers // Jun 2015

    Impact of Node Speed on Throughput of Energy-Constrained Mobile Networks with Wireless Power Transfer

    A Wireless Charging Station (WCS) transfers energy wirelessly to mobile nodes within its charging region. This paper investigates the impact of node speed on the throughput of WCS overlaid mobile networks when packet transmissions are constrained by the energy status of each node. The energy provision for each node depends...

    Provided By Cornell University

  • White Papers // Jun 2015

    On Modeling Heterogeneous Wireless Networks Using Non-Poisson Point Processes

    Future wireless networks are required to support 1000 times higher data rate, than the current LTE (Long Term Evolution) standard. In order to meet the ever increasing demand for achieving reliable and ubiquitous coverage, it is inevitable that, future wireless networks will have to develop seamless interconnection between multiple technologies....

    Provided By Cornell University

  • White Papers // Jun 2015

    Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)

    The Secure SHell (SSH) protocol requires all implementations to support public key authentication method ("Publickey") for authentication purposes. HyperText Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support "Publickey". However, restrictions in HTTP, such as same origin policy, make it difficult to perform...

    Provided By Cornell University

  • White Papers // Jun 2015

    Encog: Library of Interchangeable Machine Learning Models for Java and C#

    This paper describes the Encog API for Java and C# that is provided as a JAR or DLL library. This paper introduces the Encog library for Java and C#, a scalable, adaptable, multi-platform machine learning framework that was first released in 2008. Encog allows a variety of machine learning models...

    Provided By Cornell University

  • White Papers // Jun 2015

    Fog Computing based Radio Access Networks: Issues and Challenges

    A Fog computing based Radio Access Network (F-RAN) is presented in this paper as a promising paradigm for the Fifth Generation (5G) wireless communication system to provide high spectral and energy efficiency. The core idea is to take full advantages of local radio signal processing, cooperative radio resource management, and...

    Provided By Cornell University

  • White Papers // Jun 2015

    NFV Based Gateways for Virtualized Wireless Sensor Networks: A Case Study

    Virtualization enables the sharing of a same Wireless Sensor Network (WSN) by multiple applications. However, in heterogeneous environments, Virtualized Wireless Sensor Networks (VWSNs) raise new challenges such as the need for on-the-fly, dynamic, elastic and scalable provisioning of gateways. Network Functions Virtualization (NFV) is an emerging paradigm that can certainly...

    Provided By Cornell University

  • White Papers // Jun 2015

    Throughput of a Cognitive Radio Network under Congestion Constraints: A Network-Level Study

    In this paper, the authors analyze a cognitive radio network with one primary and one secondary transmitter, in which the primary transmitter has bursty arrivals while the secondary node is assumed to be saturated (i.e. always has a packet waiting to be transmitted). The secondary node transmits in a cognitive...

    Provided By Cornell University

  • White Papers // Jun 2015

    EMMA: A Resource Oriented Framework for Service Choreography over Wireless Sensor and Actor Networks

    Current Internet of Things (IoTs) development requires service distribution over Wireless Sensor and Actor Networks (WSANs) to deal with the drastic increasing of network management complexity. Because of the specific constraints of WSAN, centralized approaches are strongly limited. Multi-hop communication used by WSAN introduces transmission latency, packet errors, router congestion...

    Provided By Cornell University

  • White Papers // Jun 2015

    Secure Ad-hoc Routing Scheme for Cooperative Multihop Wireless Networks

    In this paper, the authors investigate on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. They propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a...

    Provided By Cornell University

  • White Papers // Jun 2015

    A New Approach to Coding in Content Based MANETs

    In Content-Based Mobile Ad hoc NETworks (CB-MANETs), random linear Network Coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to re-strict the...

    Provided By Cornell University

  • White Papers // Jun 2015

    Passive Loop Interference Suppression in Large-Scale Full-Duplex Cellular Networks

    Loop Interference (LI) in wireless communications, is a notion resulting from the Full-Duplex (FD) operation. In a large-scale network, FD also increases the multiuser interference due to the large number of active wireless links that exist. Hence, in order to realize the FD potentials, this interference needs to be restricted....

    Provided By Cornell University

  • White Papers // Jun 2015

    Large-Deviation Principles for Connectable Receivers in Wireless Networks

    In this paper, the authors study large-deviation principles for a model of wireless networks consisting of Poisson point processes of transmitters and receivers, respectively. To each transmitter they associate a family of connectable receivers whose signal-to-interference-and-noise ratio is larger than a certain connectivity threshold. First, they show a large-deviation principle...

    Provided By Cornell University

  • White Papers // May 2015

    Interest-Based Access Control for Content Centric Networks

    Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP (Internet Protocol)-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network. Consumers request content by issuing interest messages with the desired...

    Provided By Cornell University

  • White Papers // May 2015

    Opportunities for a Truffle-based Golo Interpreter

    Golo is a simple dynamically-typed language for the Java Virtual Machine (JVM). Initially implemented as an ahead-of-time compiler to JVM bytecode, it leverages invokedynamic and JSR 292 method handles to implement a reasonably efficient runtime. Truffle is emerging as a framework for building interpreters for JVM languages with self-specializing AST...

    Provided By Cornell University

  • White Papers // May 2015

    A Java Math.BigDecimal Implementation of Core Mathematical Functions

    Whereas many Java applications can use the Java Native Interface to bind to (c-based) multi-precision programs on a host platform when a higher precision than the 64-bit standard is needed, others may observe that there is only rudimentary support on the native platform if standard mathematical functions are needed. This...

    Provided By Cornell University

  • White Papers // May 2015

    IEEE 802.11ax: High-Efficiency WLANs

    IEEE 802.11ax-2019 will replace both IEEE 802.11n-2009 and IEEE 802.11ac-2013 as the next high-throughput Wireless Local Area Network (WLAN) amendment. In this paper, the authors review the expected future WLAN scenarios and use-cases that justify the push for a new PHY/MAC IEEE 802.11 amendment and after that they overview a...

    Provided By Cornell University

  • White Papers // May 2015

    Context-Aware Small Cell Networks: How Social Metrics Improve Wireless Resource Allocation

    In this paper, a novel approach for optimizing and managing resource allocation in wireless Small Cell Networks (SCNs) with Device-To-Device (D2D) communication is proposed. The proposed approach allows to jointly exploit both the wireless and social context of wireless users for optimizing the overall allocation of resources and improving traffic...

    Provided By Cornell University

  • White Papers // May 2015

    A Subset Selection Algorithm for Wireless Sensor Networks

    One of the main challenges facing Wireless Sensor Networks (WSNs) is the limited power resources available at small sensor nodes. It is therefore desired to reduce the power consumption of sensors while keeping the distortion between the source information and its estimate at the Fusion Centre (FC) below a specific...

    Provided By Cornell University

  • White Papers // May 2015

    Reliability Improvement of Uplink Communication through Double Association in Wireless Heterogeneous Networks

    Traditionally, the focus of wireless cellular networks has been on the DownLink (DL) traffic due to its higher volume compared to the UpLink (UL) traffic. The authors investigate methods for network association that improve the reliability of uplink transmissions in dense wireless heterogeneous networks. The stochastic geometry analysis shows that...

    Provided By Cornell University

  • White Papers // May 2015

    Cats&Co: Categorical Time Series Coclustering

    The authors suggest a novel method of clustering and exploratory analysis of temporal event sequences data (also known as categorical time series) based on three-dimensional data grid models. A dataset of temporal event sequences can be represented as a data set of three-dimensional points; each point is defined by three...

    Provided By Cornell University

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // May 2015

    A Spatiotemporal Context Definition for Service Adaptation Prediction in a Pervasive Computing Environment

    Pervasive system refers to context-aware systems that can sense their context, and adapt their behavior accordingly to provide adaptable services. Pro-active adaptation of such systems allows changing the service and the context based on prediction. However, the definition of the context is still vague and not suitable to prediction. In...

    Provided By Cornell University

  • White Papers // May 2015

    Resource Management of Energy-Aware Cognitive Radio Networks and Cloud-Based Infrastructures

    The field of wireless networks has been rapidly developed during the past decade due to the increasing popularity of the mobile devices. The great demand for mobility and connectivity makes wireless networking a field whose continuous technological development is very important as new challenges and issues are arising. Many scientists...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Resume Writing: Preparation- Elements Of A Resume

    Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Sep 2010

    Making Human Capital The Creative Core Of Strategy Execution

    In the face of intense competition and rapidly changing market requirements, business leaders must continually calculate how to achieve ambitious goals. They must confront economic uncertainty, environmental risk, social change and other volatile forces. To execute successfully in this difficult environment, they must embrace a new way of thinking, one...

    Provided By Cornell University

  • White Papers // Jul 2010

    The Effect Of Advertising And Deceptive Advertising On Consumption: The Case Of Over-The-Counter Weight Loss Products

    This paper is the first to estimate the impact of exposure to deceptive advertising on consumption of the advertised product and its substitutes. They study the market for over the-counter (OTC) weight-loss products, in which deceptive advertising is rampant. Strengths of the paper include matching of specific advertisements to individual...

    Provided By Cornell University

  • White Papers // Jan 2011

    Networking With Secrecy Constraints

    Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Aug 2009

    The U.S. Automotive Industry: National And State Trends In Manufacturing Employment

    The U.S. motor vehicle manufacturing industry' employs 880,000 workers, or approximately 6.6% of the U.S. manufacturing workforce, including those who work in the large motor vehicle parts manufacturing sector, as well as those who assemble motor vehicles. Since the beginning of the decade, the nation's automotive manufacturing sector has eliminated...

    Provided By Cornell University

  • White Papers // Sep 2010

    The Role Of The World Bank In Middle Income Countries

    This paper establishes some general principles of the rationale for development assistance in Middle Income Countries and then applies these principles to the operations of the World Bank. It then puts the argument through its paces for the specific case of India, which has just transitioned into middle income status....

    Provided By Cornell University

  • White Papers // May 2010

    Seawall: Performance Isolation for Cloud Datacenter Networks

    While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants share the network.ˆis opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. This...

    Provided By Cornell University

  • White Papers // Oct 2009

    XPaXS: Improved Data Acquisition and Real-Time Analysis at CHESS

    The Scanning X-ray Fluorescence Microscopy (SFXM) capability at CHESS draws users from diverse fields, including Environmental Science, Soil Science, Anthropology and Native American Studies, Dendrochronology and Classics. When the author inherited responsibility for the F3 beamline, two of the elements essential for the success of this research program were already...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Sensor Database Systems

    Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination of stored data and sensor data. Most existing applications rely on a centralized system for collecting sensor data. These systems lack flexibility because data is extracted in...

    Provided By Cornell University

  • White Papers // Aug 2009

    Network Security and the Need to Consider Provider Coordination in Network Access Policy

    The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness - a set of properties (Including security) that guarantee that a network will behave as expected. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination,...

    Provided By Cornell University

  • White Papers // Feb 2011

    Energy and Environmental Aspects of Mobile Communication Systems

    The reduction of the energy consumptions of a Telecommunication Power System represents one of the critical factors of the telecommunication technologies, both to allow a sizeable saving of economic resources and to realize "Sustainable" development actions. The consumption of about one hundred base stations for mobile phones were monitored for...

    Provided By Cornell University

  • White Papers // Feb 2011

    A Flow-Aware Mac Protocol for a Passive Optical Metropolitan Area Network

    The paper introduces an original MAC protocol for a passive optical metropolitan area network using Time-domain Wavelength Interleaved Networking (TWIN). Optical channels are shared under the distributed control of destinations using a packet-based polling algorithm. This MAC is inspired more by EPON dynamic bandwidth allocation than the slotted, GPON-like access...

    Provided By Cornell University

  • White Papers // Apr 2010

    Self-Replicating Objects for Multicore Platforms

    The paper introduces Self-Replicating Objects (SROs), a new concurrent programming abstraction. An SRO is implemented and used much like an ordinary .NET object and can expose arbitrary user-defined APIs, but it is aggressive about automatically exploiting multicore CPUs. It does so by spontaneously and transparently partitioning its state into a...

    Provided By Cornell University

  • White Papers // Jul 2010

    Behavioral Biases Of Mutual Fund Investors

    The authors examine the effect of behavioral biases on the mutual fund choices of a large sample of U.S. discount brokerage investors using new measures of attention to news, tax awareness, and fund-level familiarity bias, in addition to behavioral and demographic characteristics of earlier studies. Behaviorally-biased investors typically make poor...

    Provided By Cornell University

  • White Papers // Mar 2011

    Sharing the Data Center Network

    While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as the authors show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. They present Seawall, a network...

    Provided By Cornell University

  • White Papers // Nov 2014

    Analysis of Memory Ballooning Technique for Dynamic Memory Management of Virtual Machines (VMs)

    Memory ballooning is dynamic memory management technique for Virtual Machines (VMs). Ballooning is a part of memory reclamation technique operations used by a hypervisor to allow the physical host system to retrieve unused memory from certain guest Virtual Machines (VMs) and share it with others. Memory ballooning allows the total...

    Provided By Cornell University

  • White Papers // Jul 2011

    Analysis and Study of Incremental DBSCAN Clustering Algorithm

    In this paper, the authors describe the incremental behaviors of density based clustering. It specially focuses on the Density Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm and its incremental approach. DBSCAN relies on a density based notion of clusters. It discovers clusters of arbitrary shapes in spatial databases...

    Provided By Cornell University

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // Apr 2013

    Making I/O Virtualization Easy with Device Files

    Personal computers have diverse and fast-evolving I/O devices, making their I/O virtualization different from that of servers and data centers. In this paper, the authors present their recent endeavors in simplifying I/O virtualization for personal computers. Their key insight is that many operating systems, including Unix-like ones, abstract I/O devices...

    Provided By Cornell University

  • White Papers // Apr 2015

    Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks

    Network virtualization enables computing networks and Data Center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, the authors address the existing issues with the classic DC network topologies in virtualized environment and investigate a set of DC network...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Orchestrating Virtual Network Functions in NFV

    Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In...

    Provided By Cornell University

  • White Papers // Aug 2014

    Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey

    With the proliferation of mobile demands and increasingly multifarious services and applications, mobile Internet has been an irreversible trend. Unfortunately, the current Mobile and Wireless Network (MWN) faces a series of pressing challenges caused by the inherent design. In this paper, the authors extend two latest and promising innovations of...

    Provided By Cornell University

  • White Papers // Apr 2013

    Survey of Server Virtualization

    Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage...

    Provided By Cornell University

  • White Papers // May 2012

    High Availability using Virtualization

    High availability has always been one of the main problems for a data center. Till now high availability was achieved by host per host redundancy, a highly expensive method in terms of hardware and human costs. A new approach to the problem can be offered by virtualization. Using virtualization, it...

    Provided By Cornell University

  • White Papers // Dec 2013

    Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency

    Virtualization technology has provided many benefits to organizations, but it cannot provide automation. This causes Operational Expenditure (OpEx) inefficiencies, which are solved by cloud computing (vCloud Director vApps). Organizations have adopted virtualization technology to reduce IT costs and meet business needs. In addition to improved CapEx efficiency, virtualization has enabled...

    Provided By Cornell University

  • White Papers // Jul 2014

    Security of OS-Level Virtualization Technologies

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study...

    Provided By Cornell University

  • White Papers // Oct 2013

    Quest-V: A Virtualized Multikernel for Safety-Critical Real-Time Systems

    Modern processors are increasingly featuring multiple cores, as well as support for hardware virtualization. While these processors are common in desktop and server-class computing, they are less prevalent in embedded and real-time systems. However, smartphones and tablet PCs are starting to feature multicore processors with hardware virtualization. If the trend...

    Provided By Cornell University

  • White Papers // Jan 2014

    Anception: Application Virtualization for Android

    The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for android. Designing mechanisms for application virtualization is a significant challenge for several reasons: graphics performance is important due to popularity...

    Provided By Cornell University

  • White Papers // Jan 2015

    A Novel Architecture for Improving Performance Under Virtualized Environments

    Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the...

    Provided By Cornell University

  • White Papers // Jan 2014

    Securing Virtualized Datacenters

    Virtualization is a very popular solution to many problems in datacenter management. It offers increased utilization of existing system resources through effective consolidation, negating the need for more servers and additional rack space. Furthermore, it offers essential capabilities in terms of disaster recovery and potential savings on energy and maintenance...

    Provided By Cornell University