Cornell University

Displaying 1-40 of 1114 results

  • White Papers // Jun 2014

    A Tale of Two Data-Intensive Paradigms: Applications, Abstractions, and Architectures

    Scientific problems that depend on processing large amounts of data require overcoming challenges in multiple areas: managing large-scale data distribution, co-placement and scheduling of data with compute resources, and storing and transferring large volumes of data. The authors analyze the ecosystems of the two prominent paradigms for data-intensive applications, hereafter...

    Provided By Cornell University

  • White Papers // Jun 2014

    Integration of a Predictive, Continuous Time Neural Network Into Securities Market Trading Operations

    In this paper, the authors have presented an example of deep learning, namely the integration of a predictive, continuous time recurrent neural network into trading and risk assessment operations. During application within a trading environment the potential need to adapt technical analysis indicators that their use might be continued and...

    Provided By Cornell University

  • White Papers // May 2014

    Bargaining-Based Mobile Data Offloading

    The unprecedented growth of mobile data traffic challenges the performance and economic viability of today's cellular networks, and calls for novel network architectures and communication solutions. Data offloading through third-party WiFi or femtocell Access Points (APs) can effectively alleviate the cellular network congestion in a low operational and capital expenditure....

    Provided By Cornell University

  • White Papers // May 2014

    Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems

    In a wireless storage system, having to communicate over a fading channel makes repair transmissions prone to physical layer errors. The first approach to combat fading is to utilize the existing optimal space-time codes. However, it was recently pointed out that such codes are in general too complex to decode...

    Provided By Cornell University

  • White Papers // May 2014

    The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases

    Numerous SQL-on-Hadoop, NewSQL and NoSQL databases provide semi-structured data model and query language capabilities, but it is difficult to compare these capabilities. Many differences between the data models and (especially) between the query languages are superficial, but nonetheless distract from the essential differences. Other query language differences are direct derivatives...

    Provided By Cornell University

  • White Papers // May 2014

    Repair for Distributed Storage Systems in Packet Erasure Networks

    Reliability is essential for storing files in many applications of distributed storage systems. To maintain reliability, when a storage node fails, a new node should be regenerated by a repair process. Most of the previous results on the repair problem assume perfect (error-free) links in the networks. However, in practice,...

    Provided By Cornell University

  • White Papers // May 2014

    Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint

    The conventional design of cellular systems prescribes the separation of uplink and downlink transmissions via time-division or frequency-division duplex. Recent advances in analog and digital domain self-interference interference cancellation challenge the need for this arrangement and open up the possibility to operate base stations, especially low-power ones, in a full-duplex...

    Provided By Cornell University

  • White Papers // May 2014

    NScale: Neighborhood-Centric Large-Scale Graph Analytics in the Cloud

    There is an increasing interest in executing rich and complex analysis tasks over large-scale graphs, many of which require processing and reasoning about a large number of multi-hop neighborhoods or sub-graphs in the graph. Examples of such tasks include ego network analysis, motif counting, finding social circles, personalized recommendations, link...

    Provided By Cornell University

  • White Papers // May 2014

    Massively Parallel Processor Architectures for Resource-Aware Computing

    The authors present a class of massively parallel processor architectures called invasive Tightly Coupled Processor Arrays (TCPAs). The presented processor class is a highly parameterizable template, which can be tailored before runtime to fulfill costumers' requirements such as performance, area cost, and energy efficiency. These programmable accelerators are well suited...

    Provided By Cornell University

  • White Papers // May 2014

    Anytime Control Using Input Sequences With Markovian Processor Availability

    The authors study an anytime control algorithm for situations where the processing resources available for control are time-varying in an a priori unknown fashion. Thus, at times, processing resources are insufficient to calculate control inputs. To address this issue, the algorithm calculates sequences of tentative future control inputs whenever possible,...

    Provided By Cornell University

  • White Papers // May 2014

    Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture

    In this contribution the emulation of an ASIC Temperature and Power Monitoring system (TPMon) for FPGA prototyping is presented and tested to control processor temperatures under different control targets and operating strategies. The approach for emulating the power monitor is based on an instruction-level energy model. For emulating the temperature...

    Provided By Cornell University

  • White Papers // May 2014

    NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security

    Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach cannot...

    Provided By Cornell University

  • White Papers // Apr 2014

    Intelligent Resource Allocation Technique For Desktop-as-a-Service in Cloud Environment

    The specialty of desktop-as-a-service cloud computing is that user can access their desktop and can execute applications in virtual desktops on remote servers. Resource management and resource utilization are most significant in the area of desktop-as-a-service, cloud computing; however, handling a large amount of clients in the most efficient manner...

    Provided By Cornell University

  • White Papers // Apr 2014

    Computing an Optimal Control Policy for an Energy Storage

    The authors introduce StoDynProg, a small library created to solve Optimal Control problems arising in the management of Renewable Power Sources, in particular when coupled with an Energy Storage System. The library implements generic Stochastic Dynamic Programming (SDP) numerical methods which can solve a large class of Dynamic Optimization problems....

    Provided By Cornell University

  • White Papers // Apr 2014

    Automated Classification of Airborne Laser Scanning Point Clouds

    Making sense of the physical world has always been at the core of mapping. Up until recently, this has always dependent on using the human eye. Using airborne lasers, it has become possible to quickly \"See\" more of the world in many more dimensions. The resulting enormous point clouds serve...

    Provided By Cornell University

  • White Papers // Apr 2014

    Cache-Oblivious VAT-Algorithms

    Modern processors have a memory hierarchy and use virtual memory. The authors concentrate on two-levels of the hierarchy and refer to the faster memory as the cache. Data is moved between the fast and the slow memory in blocks of contiguous memory cells, and only data residing in the fast...

    Provided By Cornell University

  • White Papers // Apr 2014

    A Signal Processor for Gaussian Message Passing

    In this paper, the authors present a novel signal processing unit built upon the theory of factor graphs, which is able to address a wide range of signal processing algorithms. More specifically, the demonstrated Factor Graph Processor (FGP) is tailored to Gaussian message passing algorithms. They show how to use...

    Provided By Cornell University

  • White Papers // Apr 2014

    CernVM Online and Cloud Gateway: A Uniform Interface for CernVM Contextualization and Deployment

    In a virtualized environment, contextualization is the process of configuring a VM instance for the needs of various deployment use cases. Contextualization in CernVM can be done by passing a handwritten context to the user data field of cloud APIs, when running CernVM on the cloud, or by using CernVM...

    Provided By Cornell University

  • White Papers // Apr 2014

    GraphGen: An FPGA Framework for Vertex-Centric Graph Computation

    Vertex-centric graph computations are widely used in many machine learning and data mining applications that operate on graph data structures. This paper presents GraphGen, a vertex-centric framework that targets FPGA for hardware acceleration of graph computations. GraphGen accepts a vertex-centric graph specification and automatically compiles it onto an application-specific synthesized...

    Provided By Cornell University

  • White Papers // Apr 2014

    Hardware Efficient WiMAX Deinterleaver Capable of Address Generation for Random Interleaving Depths

    The variation in the prescribed modulation schemes and code rates for WiMAX interleaver design, as defined by IEEE 802.16 standard, demands a plethora of hardware if all the modulation schemes and code rates have to be unified into a single electronic device. Add to this the complexities involved with the...

    Provided By Cornell University

  • White Papers // Apr 2014

    A New Multi-Tiered Solid State Disk Using SLC/MLC Combined Flash Memory

    Storing digital information, ensuring the accuracy, steady and uninterrupted access to the data is considered as fundamental challenges in enterprise-class organizations and companies. In recent years, new types of storage systems such as Solid State Disks (SSD) have been introduced. Unlike hard disks that have mechanical structure, SSDs are based...

    Provided By Cornell University

  • White Papers // Apr 2014

    Towards Cloud Computing: A Swot Analysis on Its Adoption in SMEs

    Over the past few years, emergence of cloud computing has notably made an evolution in the IT industry by putting forward an 'Everything as a service' idea .Cloud computing is of growing interest to companies throughout the world, but there are many barriers associated with its adoption which should be...

    Provided By Cornell University

  • White Papers // Apr 2014

    Estimation of Optimized Energy and Latency Constraint for Task Allocation in 3D Network on Chip

    In Network on Chip (NoC) rooted system, energy consumption is affected by task scheduling and allocation schemes which affect the performance of the system. In this paper, the authors test the pre-existing proposed algorithms and introduced a new energy skilled algorithm for 3D NoC architecture. An efficient dynamic and cluster...

    Provided By Cornell University

  • White Papers // Apr 2014

    Web Log Data Analysis by Enhanced Fuzzy C Means Clustering

    World Wide Web is a huge repository of information and there is a tremendous increase in the volume of information daily. The number of users is also increasing day by day. To reduce users browsing time lot of research is taken place. Web Usage Mining is a type of web...

    Provided By Cornell University

  • White Papers // Mar 2014

    Tile Optimization for Area in FPGA Based Hardware Acceleration of Peptide Identification

    Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence...

    Provided By Cornell University

  • White Papers // Mar 2014

    Design Architecture-Based on Web Server and Application Cluster in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By Cornell University

  • White Papers // Mar 2014

    Increasing Flash Memory Lifetime by Dynamic Voltage Allocation for Constant Mutual Information

    The read channel in Flash memory systems degrades over time because the Fowler-Nordheim tunneling used to apply charge to the floating gate eventually compromises the integrity of the cell because of tunnel oxide degradation. While degradation is commonly measured in the number of program/erase cycles experienced by a cell, the...

    Provided By Cornell University

  • White Papers // Mar 2014

    Applying Mathematical Models in Cloud Computing: A Survey

    As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before they enter into the systems and there is no way how this can be prevented...

    Provided By Cornell University

  • White Papers // Mar 2014

    Capacity of a Nonlinear Optical Channel with Finite Memory

    The channel capacity of a nonlinear, dispersive fiberoptic link is revisited. To this end, the popular Gaussian Noise (GN) model is extended with a parameter to account for the finite memory of realistic fiber channels. This finite-memory model is harder to analyze mathematically but, in contrast to previous models, it...

    Provided By Cornell University

  • White Papers // Mar 2014

    Noise Facilitation in Associative Memories of Exponential Capacity

    Recent advances in associative memory design through structured pattern sets and graph-based inference algorithms have allowed reliable learning and recall of an exponential number of patterns. Although these designs correct external errors in recall, they assume neurons that compute noiselessly, in contrast to the highly variable neurons in brain regions...

    Provided By Cornell University

  • White Papers // Mar 2014

    Readout Optical System of Sapphire Disks Intended for Long-Term Data Storage

    The development of long-term data storage technology is one of the urging problems of the time. This paper presents the results of implementation of technical solution for long-term data storage technology proposed a few years ago on the basis of single crystal sapphire. It is shown that the problem of...

    Provided By Cornell University

  • White Papers // Mar 2014

    Era of Big Data Processing: A New Approach via Tensor Networks and Tensor Decompositions

    Modern applications such as computational neuroscience, neuroinformatics and pattern/image recognition generate massive amounts of multidimensional data with multiple aspects and high dimensionality. Big data require novel technologies to efficiently process massive datasets within tolerable elapsed times. Such a new emerging technology for multidimensional big data is a multi-way analysis via...

    Provided By Cornell University

  • White Papers // Mar 2014

    Large-Scale Geospatial Processing on Multi-Core and Many-Core Processors: Evaluations on CPUs, GPUs and MICs

    Geospatial Processing, such as queries based on point-to-polyline shortest distance and point-in-polygon test, are fundamental to many scientific and engineering applications, including post-processing large-scale environmental and climate model outputs and analyzing traffic and travel patterns from massive GPS collections in transportation engineering and urban studies. Commodity parallel hardware, such as...

    Provided By Cornell University

  • White Papers // Feb 2014

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes...

    Provided By Cornell University

  • White Papers // Feb 2014

    Distributed Storage over Unidirectional Ring Networks

    In this paper, the authors study distributed storage problems over unidirectional ring networks, whose storage nodes form a directed ring and data is transmitted along the same direction. The original data is distributed to store on these nodes. Each user can connect one and only one storage node to download...

    Provided By Cornell University

  • White Papers // Feb 2014

    Intensional RDB Manifesto: a Unifying NewSQL Model for Flexible Big Data

    In this paper, the authors present a new family of Intensional RDBs (IRDBs) which extends the traditional RDBs with the Big Data and flexible and 'Open schema' features, able to preserve the user-defined relational database schemas and all preexisting user's applications containing the SQL statements for a deployment of such...

    Provided By Cornell University

  • White Papers // Feb 2014

    Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3d Network on Chip

    Energy efficiency is one of the most critical issues in design of System on Chip. In Network-on-Chip (NoC) based system, energy consumption is influenced dramatically by mapping of Intellectual Property (IP) which affect the performance of the system. In this paper, the authors test the antecedently extant proposed algorithms and...

    Provided By Cornell University

  • White Papers // Feb 2014

    The Case for Cloud Service Trustmarks and Assurance-as-a-Service

    Cloud computing represents a significant economic opportunity for Europe. However, this growth is threatened by adoption barriers largely related to trust. This position paper examines trust and confidence issues in cloud computing and advances a case for addressing them through the implementation of a novel trustmark scheme for cloud service...

    Provided By Cornell University

  • White Papers // Feb 2014

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor is presented. The approach is based on control-loop feedback mechanism to maximize the efficiency on exploiting available resources such as CPU time, operating frequency, etc. Each Processing Element (PE) in the architecture is equipped with a frequency scaling module responsible...

    Provided By Cornell University

  • White Papers // Feb 2014

    A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment

    Cloud computing is a new trend emerging in IT environment with huge requirements of infrastructure and resources. Load Balancing is an important aspect of cloud computing environment. Efficient load balancing scheme ensures efficient resource utilization by provisioning of resources to cloud user's on-demand basis in pay-as-you-say-manner. Load Balancing may even...

    Provided By Cornell University

  • White Papers // May 2012

    Experience on Re-Engineering Applying With Software Product Line

    In this paper, the authors present their experience based on a reengineering project. The software project is to re-engineer the original system of a company to answer the new requirements and changed business functions. Reengineering is a process that involves not only the software system, but also underlying business model....

    Provided By Cornell University

  • White Papers // May 2012

    Software Aging Analysis of Web Server Using Neural Networks

    Software aging is a phenomenon that refers to progressive performance degradation or transient failures or even crashes in long running software systems such as web servers. It mainly occurs due to the deterioration of operating system resource, fragmentation and numerical error accumulation. A primitive method to fight against software aging...

    Provided By Cornell University

  • White Papers // Jun 2012

    ACME Vs PDDL: Support for Dynamic Reconfiguration of Software Architectures

    On the one hand, ACME is a language designed in the late 90s as an interchange format for software architectures. The need for reconfiguration at runtime has led to extend the language with specific support in Plastik. On the other hand, PDDL is a predicative language for the description of...

    Provided By Cornell University

  • White Papers // Apr 2012

    Evaluation of the Design Metric to Reduce the Number of Defects in Software Development

    Software design is one of the most important and key activities in the System Development Life Cycle (SDLC) phase that ensures the quality of software. Different key areas of design are very vital to be taken into consideration while designing software. Software design describes how the software system is decomposed...

    Provided By Cornell University

  • White Papers // Apr 2012

    Airborne Software Tests on a Fully Virtual Platform

    This paper presents the early deployment of a fully virtual platform to perform the tests of certified airborne software. This is an alternative to the current approach based on the use of dedicated hardware platforms. The verification process is a major process in the development of airborne software. Its purpose...

    Provided By Cornell University

  • White Papers // Aug 2012

    On the Use of Latency Graphs for the Construction of Tor Circuits

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Cornell University

  • White Papers // Jul 2012

    Bio Inspired Approach to Secure Routing in MANETs

    In this paper, the author explores the challenges with respect to the security aspect in MANETs and proposes a new approach which makes use of a bio-inspired methodology. This paper elaborates various attacks which can be perpetrated on MANETs and current solutions to the aforementioned problems, and then it describes...

    Provided By Cornell University

  • White Papers // Jun 2012

    Anonymous Communication in Peer-to-Peer Networks for Providing More Privacy and Security

    One of the most important issues in peer-to-peer networks is anonymity. The major anonymity for peer-to-peer users concerned with the users' identities and actions which can be revealed by any other members. There are many approaches proposed to provide anonymous peer-to-peer communications. An intruder can get information about the content...

    Provided By Cornell University

  • White Papers // Jun 2012

    Multi-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing is drastically growing technology which provides an on-demand software, hardware, infrastructure and data storage as services. This technology is used worldwide to improve the business infrastructure and performance. However, to utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password...

    Provided By Cornell University

  • White Papers // Sep 2012

    An Agent-Based Framework for Cooperation in Supply Chain

    Supply Chain coordination has become a critical success factor for Supply Chain management (SCM) and effectively improving the performance of organizations in various industries. Companies are increasingly located at the intersection of one or more corporate networks which are designated by "Supply Chain". Managing this chain is mainly based on...

    Provided By Cornell University

  • White Papers // Oct 2012

    Inferring the Underlying Structure of Information Cascades

    In social networks, information and influence diffuse among users as cascades. While the importance of studying cascades has been recognized in various applications, it is difficult to observe the complete structure of cascades in practice. Moreover, much less is known on how to infer cascades based on partial observations. In...

    Provided By Cornell University

  • White Papers // Oct 2012

    Artex is Another Text Summarizer

    This paper describes Artex, another algorithm for Automatic Text Summarization. In order to rank sentences, a simple inner product is calculated between each sentence, a document vector (text topic) and a lexical vector (vocabulary used by a sentence). Summaries are then generated by assembling the highest ranked sentences. No ruled-based...

    Provided By Cornell University

  • White Papers // Oct 2012

    Variable-Length Hill Cipher with MDS Key Matrix

    The Hill Cipher is a classical symmetric cipher which breaks plaintext into blocks of size and then multiplies each block by an key matrix to yield ciphertext. However, it is well known that the Hill cipher succumbs to cryptanalysis relatively easily. As a result, there have been efforts to strengthen...

    Provided By Cornell University

  • White Papers // Oct 2012

    Detecting Dense Communities in Large Social and Information Networks with the Core & Peel Algorithm

    Detecting and characterizing dense subgraphs (tight communities) in social and information networks is an important exploratory tool in social network analysis. Several approaches have been proposed that either partition the whole network into "Clusters", even in low density region, or are aimed at finding a single densest community (and need...

    Provided By Cornell University

  • White Papers // Oct 2012

    Scheduling Resources for Executing a Partial Set of Jobs

    In this paper, the authors consider the problem of choosing a minimum cost set of resources for executing a specified set of jobs. Each input job is an interval, determined by its start-time and end-time. Each resource is also an interval determined by its start-time and end-time; moreover, every resource...

    Provided By Cornell University

  • White Papers // Oct 2012

    Sudoku as a Special Transportation Problem

    Sudoku is a popular combinatorial puzzle. A new method of solving Sudoku is presented, which involves formulating a puzzle as a special type of transportation problem. This model allows one to solve puzzles with more than one solution, keeping the constraints of the problem fixed, and simply changing a cost...

    Provided By Cornell University

  • White Papers // Oct 2012

    Local Search Is Better Than Random Assignment for Bounded Occurrence Ordering K-CSPs

    The authors prove that the Bounded Occurrence Ordering k-CSP Problem is not approximation resistant. They give a very simple local search algorithm that always performs better than the random assignment algorithm (unless, the number of satisfied constraints does not depend on the ordering). In this paper, they give a very...

    Provided By Cornell University

  • White Papers // Oct 2012

    Providing an Object Allocation Algorithm in Distributed Databases Using Efficient Factors

    Data replication is a common method used to improve the performance of data access in distributed database systems. In this paper, the authors present an Object Replication Algorithm in Distributed database systems (ORAD). They optimize the created replicated data in distributed database systems by using activity functions of previous algorithms,...

    Provided By Cornell University

  • White Papers // Oct 2012

    Investigating Decision Support Techniques for Automating Cloud Service Selection

    The compass of Cloud infrastructure services advances steadily leaving users in the agony of choice. To be able to select the best mix of service offering from an abundance of possibilities, users must consider complex dependencies and heterogeneous sets of criteria. Therefore, the authors present a PhD paper proposal on...

    Provided By Cornell University

  • White Papers // Oct 2012

    A Map-Reduce Parallel Approach to Automatic Synthesis of Control Software

    Many Control Systems are indeed Software Based Control Systems, i.e. control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for automatic synthesis of control software. Available algorithms and tools (e.g., QKS) may require weeks or even months...

    Provided By Cornell University

  • White Papers // Oct 2009

    GO: Platform Support for Gossip Applications

    Gossip-based protocols are increasingly popular in large-scale distributed applications that disseminate updates to replicated or cached content. GO (Gossip Objects) is a per-node gossip platform that the authors developed in support of this class of protocols. In addition to making it easy to develop new gossip protocols and applications, GO...

    Provided By Cornell University

  • White Papers // Oct 2009

    Cloudifying Source Code Repositories: How Much Does It Cost?

    Cloud computing provides one with general purpose storage and server hosting platforms at a reasonable price. The authors explore the possibility of tapping these resources for the purpose of hosting source code repositories for individual projects as well as entire open source communities. An analysis of storage costs is presented,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // May 2009

    Sharing Private Information Across Distributed Databases

    In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. The authors show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any...

    Provided By Cornell University

  • White Papers // Feb 2009

    Ajil: Distributed Rate-Limiting for Multicast Networks

    Multicast traffic patterns play a key role in dependable data centers, arising when data is replicated and distributed over multiple machines for fault-tolerance and availability. Such settings involve large numbers of multicast groups as well as multiple senders to each group - a single system can have hundreds of such...

    Provided By Cornell University

  • White Papers // Jan 2011

    Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

    The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols. Anti-entropy, or gossip, is an attractive way of replicating state that does not have strong consistency requirements....

    Provided By Cornell University

  • White Papers // Jan 2011

    Network-Aware Adaptation Techniques for Mobile File Systems

    Wireless networks present unusual challenges for mobile file system clients since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditional approach to adapting network communication to these conditions is to write back file updates asynchronously when bandwidth is low. Unfortunately, this can lead to underutilisation of bandwidth and...

    Provided By Cornell University

  • White Papers // Jan 2011

    On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks

    Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A key and difficult requirement of many such applications is heterogeneity: peers have different node degrees in the random graph based on their...

    Provided By Cornell University

  • White Papers // Sep 2010

    Detection of Time-Varying Flows in Wireless Networks

    The problem of detecting the presence of time-varying flows in multi-hop wireless networks is considered. In particular, from transmission timing measurements, a test is constructed to determine whether there is a flow of data packets between a pair of nodes. It is assumed that the packet flows may have time-varying...

    Provided By Cornell University

  • White Papers // Feb 2011

    Secondary Job Scheduling in the Cloud With Deadlines

    The highly dynamic nature of the cloud environment leads to a time-varying resource utilization and the cloud provider can potentially accommodate secondary jobs with the remaining resource. To better implement the idea of resource reutilization in the cloud environment, the problem of secondary job scheduling with deadlines under time-varying resource...

    Provided By Cornell University

  • White Papers // Apr 2010

    Timing-Based Detection of Packet Forwarding in MANETs

    In Mobile Ad hoc NETworks (MANETs), timing information is easily available due to the use of a shared medium, even when the traffic is encrypted. This paper addresses how such timing information can be used for detecting packet forwarding activities in MANETs. The authors' results depend in part on the...

    Provided By Cornell University

  • White Papers // Feb 2010

    Multiuser Cognitive Access of Continuous Time Markov Channels: Maximum Throughput and Effective Bandwidth Regions

    The problem of sharing multiple channels owned by primary users with multiple cognitive users is considered. Each primary user transmits on its dedicated channel, and its occupancy is modeled by a continuous time Markov process. Each cognitive user is capable of sensing one channel at a time and it transmits...

    Provided By Cornell University

  • White Papers // Sep 2009

    A Sensing-Based Cognitive Coexistence Method for Interfering Infrastructure and Ad-Hoc Systems

    The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an infrastructure system to reduce interference to ad-hoc or peer-to-peer communication links in close proximity. Motivated by the superior resources of the infrastructure system, the authors study...

    Provided By Cornell University

  • White Papers // Sep 2009

    Cognitive Frequency Hopping Based on Interference Prediction: Theory and Experimental Results

    Wireless services in the unlicensed bands are proliferating, but frequently face high interference from other devices due to a lack of coordination among heterogeneous technologies. In this paper, the authors study how cognitive radio concepts enable systems to sense and predict interference patterns and adapt their spectrum access accordingly. This...

    Provided By Cornell University

  • White Papers // Jul 2011

    Adjoints And Automatic (Algorithmic) Differentiation In Computational Finance

    Two of the most important areas in computational finance: Greeks and, respectively, calibration, are based on efficient and accurate computation of a large number of sensitivities. This paper gives an overview of adjoint and Automatic Differentiation (AD), also known as algorithmic differentiation, techniques to calculate these sensitivities. When compared to...

    Provided By Cornell University

  • White Papers // May 2011

    Rough Paths In Idealized Financial Markets

    This paper considers possible price paths of a financial security in an idealized market. Its main result is that the variation index of typical price paths is at most 2; in this sense, typical price paths are not rougher than typical paths of Brownian motion. The authors do not make...

    Provided By Cornell University

  • White Papers // Jun 2009

    Is Unlevered Firm Volatility Asymmetric?

    Asymmetric volatility refers to the stylized fact that stock volatility is negatively correlated to stock returns. Traditionally, this phenomenon has been explained by the financial leverage effect. This explanation has recently been challenged in favor of a risk premium based explanation. The authors develop a new, unlevering approach to document...

    Provided By Cornell University

  • White Papers // Jan 2009

    Investment Decisions And Offspring Gender

    Economic research has documented many economic effects of offspring gender on parental behavior. However, an open question exists as to whether offspring gender has any influence on parental investment decision making. Specifically, the author investigates whether female offspring have an impact on investment decisions with respect to stock and bondholding....

    Provided By Cornell University

  • White Papers // Jul 2011

    KISS Approach To Credit Portfolio Modeling

    A simple, yet reasonably accurate, analytical technique is proposed for multi-factor structural credit portfolio models. The accuracy of the technique is demonstrated by benchmarking against Monte Carlo simulations. The approach presented here may be of high interest to practitioners looking for transparent, intuitive, easy to implement and high performance credit...

    Provided By Cornell University

  • White Papers // Jun 2011

    A Random Matrix Approach To Credit Risk

    The authors estimate generic statistical properties of a structural credit risk model by considering an ensemble of correlation matrices. This ensemble is set up by Random Matrix Theory. They demonstrate analytically that the presence of correlations severely limits the effect of diversification in a credit portfolio if the correlations are...

    Provided By Cornell University