Cornell University

Displaying 1-40 of 1230 results

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // Apr 2015

    Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks

    Network virtualization enables computing networks and Data Center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, the authors address the existing issues with the classic DC network topologies in virtualized environment and investigate a set of DC network...

    Provided By Cornell University

  • White Papers // Apr 2015

    Constant-Optimized Quantum Circuits for Modular Multiplication and Exponentiation

    Reversible circuits for modular multiplication Cx%M with x < M arise as components of modular exponentiation in Shor's quantum number-factoring algorithm. However, existing generic constructions focus on asymptotic gate count and circuit depth rather than actual values, producing fairly large circuits not optimized for specific C and M values. In...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Orchestrating Virtual Network Functions in NFV

    Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In...

    Provided By Cornell University

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Memory Networks

    In this paper, the authors describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Evaluation of Security Solutions for Android Systems

    With the increasing usage of Smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not always properly designed for Smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    The Affinity Effects of Parallelized Libraries in Concurrent Environments

    The use of cloud computing grows as it appears to be an additional resource for High-performance Parallel and Distributed Computing (HPDC), especially with respect to its use in support of scientific applications. Many studies have been devoted to determining the effect of the virtualization layer on the performance, but most...

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation

    In this paper, the authors develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. They first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Jan 2015

    Limits on Fundamental Limits to Computation

    An indispensable part of everyone's lives, computing has also become essential to industries and governments. Steady improvements in computer hardware have been supported by periodic doubling of transistor densities in integrated circuits over the last fifty years. Such Moore scaling now requires increasingly heroic efforts, stimulating research in alternative hardware...

    Provided By Cornell University

  • White Papers // Jan 2015

    High-level Synthesis under I/O Timing and Memory Constraints

    The design of complex systems-on-chip implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper, the authors present a methodology and a tool that allow the high-level synthesis of DSP algorithm, under both I/O timing and memory constraints. Based on...

    Provided By Cornell University

  • White Papers // Jan 2015

    A Novel Architecture for Improving Performance Under Virtualized Environments

    Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Memcomputing NP-Complete Problems in Polynomial Time Using Polynomial Resources and Collective States

    Memcomputing is a novel non-Turing paradigm of computation that uses interacting memory cells (memprocessors for short) to store and process information on the same physical platform. It was recently proved mathematically that memcomputing machines have the same computational power of non-deterministic Turing machines. Therefore they can solve NP-complete problems in...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Nov 2014

    Privacy-Preserving Content-Based Image Retrieval in the Cloud

    Storage requirements for visual data have been increasing in recent years, following the emergence of many new services and applications for both personal and corporate use. This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. However, outsourcing data storage to the Cloud also leads...

    Provided By Cornell University

  • White Papers // Nov 2014

    Analysis of Memory Ballooning Technique for Dynamic Memory Management of Virtual Machines (VMs)

    Memory ballooning is dynamic memory management technique for Virtual Machines (VMs). Ballooning is a part of memory reclamation technique operations used by a hypervisor to allow the physical host system to retrieve unused memory from certain guest Virtual Machines (VMs) and share it with others. Memory ballooning allows the total...

    Provided By Cornell University

  • White Papers // Oct 2014

    Learning Circuits with Few Negations

    Monotone Boolean functions and the monotone Boolean circuits that compute them have been intensively studied in complexity theory. In this paper, the authors study the structure of Boolean functions in terms of the minimum number of negations in any circuit computing them, a complexity measure that interpolates between monotone functions...

    Provided By Cornell University

  • White Papers // Oct 2014

    Toward Sequentializing Overparallelized Protocol Code

    A promising application domain for coordination languages is programming protocols among threads in multi-core programs: coordination languages typically provide high-level constructs and abstractions that more easily compose into correct - with respect to a programmer's intentions - protocol specifications than do low-level synchronization constructs provided by conventional languages (e.g., locks...

    Provided By Cornell University

  • White Papers // Oct 2014

    Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth

    Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive State Machines (RSMs) are standard models for interprocedural analysis. The authors consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic...

    Provided By Cornell University

  • White Papers // Oct 2014

    A Note on Two Notions of Compliance

    Several recent papers have been devoted to the study of contracts as a way to formally specify abstractions of the behavior of software systems. A common aspect that gathers together some of these studies is a notion of compliance. This is a relation between systems which want to interact. Before...

    Provided By Cornell University

  • White Papers // Oct 2014

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Increased coupling between critical infrastructure networks, such as power and communications, has important implications for the reliability and security of these networks. To understand the implications of power-communications coupling, researchers have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models...

    Provided By Cornell University

  • White Papers // Oct 2014

    Capacity Analysis of Decoupled Downlink and Uplink Access in 5G Heterogeneous Systems

    The peoples' traditional notion of a cell is changing dramatically given the increasing degree of heterogeneity in 4G and emerging 5G systems. Rather than belonging to a specific cell, a device would choose the most suitable connection from the plethora of connections available. In such a setting, given the transmission...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient Key Generation for Dynamic Blom's Scheme

    The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom's scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, the authors...

    Provided By Cornell University

  • White Papers // Oct 2014

    Repairable Threshold Secret Sharing Schemes

    In this paper, the authors propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes...

    Provided By Cornell University

  • White Papers // Oct 2014

    Statistical Models for Cores Decomposition of Undirected Random Graphs

    The authors develop a rigorous and interpretable statistical model for networks using their shell structure to construct minimal sufficient statistics. The model provides the formalism necessary for using k-cores in statistical considerations of random graphs, and in particular social networks. It cannot be specialized to any known degree-centric model and...

    Provided By Cornell University

  • White Papers // Oct 2014

    Pricing in Social Networks with Negative Externalities

    The authors study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. They assume impatient consumers who buy the product as soon as the seller posts a price not greater than their...

    Provided By Cornell University

  • White Papers // Oct 2014

    Hierarchical Sequencing of Online Social Graphs

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, the authors investigate in-depth topology of online social network which is based on MySpace dialogs....

    Provided By Cornell University

  • White Papers // Oct 2014

    Effects of Social Influence in Peer Online Recommendation

    Website providers often use peer recommendation to help people find interesting content. A common method for leveraging opinions of others on these web sites is to display the number of prior recommendations as a social signal. How people react to these social influence signals, in combination with other effects, such...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Processing of Medical Signals (ECG) in Wireless Sensor Networks

    Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // Mar 2011

    Sharing the Data Center Network

    While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as the authors show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. They present Seawall, a network...

    Provided By Cornell University

  • White Papers // Dec 2010

    Forest: A Language and Toolkit for Programming With Filestores

    Many applications use the file system as a simple persistent data store. This approach is expedient, but not robust. The correctness of such an application depends on the collection of files, directories, and symbolic links having a precise organization. Furthermore these components must have acceptable values for a variety of...

    Provided By Cornell University

  • White Papers // Jul 2009

    Impact Of Foreign Intellectual Property Rights Protection On U.S. Exports And FDI

    Since the early 1990s, there has been a growing interest in the potential contribution of Intellectual Property Rights (IPR) protection to global trade and investment. However, there is an ongoing debate among analysts regarding the extent to which stronger IPR actually stimulate international transactions via transfer of technology. This paper...

    Provided By Cornell University

  • White Papers // Oct 2009

    GO: Platform Support for Gossip Applications

    Gossip-based protocols are increasingly popular in large-scale distributed applications that disseminate updates to replicated or cached content. GO (Gossip Objects) is a per-node gossip platform that the authors developed in support of this class of protocols. In addition to making it easy to develop new gossip protocols and applications, GO...

    Provided By Cornell University

  • White Papers // Oct 2009

    Cloudifying Source Code Repositories: How Much Does It Cost?

    Cloud computing provides one with general purpose storage and server hosting platforms at a reasonable price. The authors explore the possibility of tapping these resources for the purpose of hosting source code repositories for individual projects as well as entire open source communities. An analysis of storage costs is presented,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // Jan 2011

    Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

    The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols. Anti-entropy, or gossip, is an attractive way of replicating state that does not have strong consistency requirements....

    Provided By Cornell University

  • White Papers // Jan 2011

    Network-Aware Adaptation Techniques for Mobile File Systems

    Wireless networks present unusual challenges for mobile file system clients since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditional approach to adapting network communication to these conditions is to write back file updates asynchronously when bandwidth is low. Unfortunately, this can lead to underutilisation of bandwidth and...

    Provided By Cornell University

  • White Papers // Jan 2011

    On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks

    Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A key and difficult requirement of many such applications is heterogeneity: peers have different node degrees in the random graph based on their...

    Provided By Cornell University

  • White Papers // Jul 2010

    Analytical Framework For Credit Portfolios

    Analytical, free of time consuming Monte Carlo simulations, framework for credit portfolio systematic risk metrics calculations is presented. Techniques are described that allow calculation of portfolio-level systematic risk measures (standard deviation, VaR and Expected Shortfall) as well as allocation of risk down to individual transactions. The underlying model is the...

    Provided By Cornell University

  • White Papers // Apr 2010

    Simple Fuzzy Score For Russian Public Companies Risk Of Default

    Current economy crisis of 2008-2009 has resulted in severe credit crunch and significant NPL rise in Russian financial system. Bad debt rate has almost tripled to 6% of total loans to corporate sector, while provisions reached 9%. Corporate bonds market cannot be called safe heaven either having almost 25% of...

    Provided By Cornell University

  • White Papers // Jan 2011

    Precautionary Measures For Credit Risk Management In Jump Models

    Sustaining efficiency and stability by properly controlling the equity to asset ratio is one of the most important and difficult challenges in bank management. Due to unexpected and abrupt decline of asset values, a bank must closely monitor its net worth as well as market conditions, and one of its...

    Provided By Cornell University

  • White Papers // Jul 2011

    KISS Approach To Credit Portfolio Modeling

    A simple, yet reasonably accurate, analytical technique is proposed for multi-factor structural credit portfolio models. The accuracy of the technique is demonstrated by benchmarking against Monte Carlo simulations. The approach presented here may be of high interest to practitioners looking for transparent, intuitive, easy to implement and high performance credit...

    Provided By Cornell University

  • White Papers // Jun 2011

    A Random Matrix Approach To Credit Risk

    The authors estimate generic statistical properties of a structural credit risk model by considering an ensemble of correlation matrices. This ensemble is set up by Random Matrix Theory. They demonstrate analytically that the presence of correlations severely limits the effect of diversification in a credit portfolio if the correlations are...

    Provided By Cornell University

  • White Papers // Aug 2009

    Fabric: A Platform for Secure Distributed Computation and Storage

    Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share both information and computation resources despite mutual distrust. Its high-level programming language makes distribution and persistence largely transparent to programmers. Fabric supports data-shipping and...

    Provided By Cornell University

  • White Papers // Jun 2011

    Beyond Power Proportionality: Designing Power-Lean Cloud Storage

    The authors present a power-lean storage system, where racks of servers, or even entire data center shipping containers, can be powered down to save energy. They show that racks and containers are more than the sum of their servers, and demonstrate the feasibility of designing a storage system that powers...

    Provided By Cornell University

  • White Papers // Nov 2010

    Virtually Synchronous Methodology for Dynamic Service Replication

    In designing and building distributed systems, it is common engineering practice to separate steady-state ("Normal") operation from abnormal events such as recovery from failure. This way the normal case can be optimized extensively while recovery can be amortized. However, integrating the recovery procedure with the steady-state protocol is often far...

    Provided By Cornell University

  • White Papers // Apr 2010

    Empirical Characterization of Uncongested Optical Lambda Networks and 10GbE Commodity Endpoints

    High-bandwidth, semi-private optical lambda networks carry growing volumes of data on behalf of large data centers, both in cloud computing environments and for scientific, financial, defense, and other enterprises. This paper undertakes a careful examination of the end-to-end characteristics of an uncongested lambda network running at high speeds over long...

    Provided By Cornell University

  • White Papers // Mar 2010

    A Middleware for Gossip Protocols

    Gossip protocols are known to be highly robust in scenarios with high churn, but if the data that is being gossiped becomes corrupted, a protocol's very robustness can make it hard to fix the problem. All participants need to be taken down, any disk-based data need to be scrubbed, the...

    Provided By Cornell University

  • White Papers // Mar 2010

    Balancing Gossip Exchanges in Networks With Firewalls

    Gossip protocols are an important building block of many large-scale systems. They have inherent load-balancing properties as long as nodes are deployed over a network with a "Flat" topology that is, a topology where any pair of nodes may engage in a gossip exchange. Unfortunately, the Internet is not flat...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maelstrom: Transparent Error Correction for Communication Between Data Centers

    The global network of data centers is emerging as an important distributed systems paradigm - commodity clusters running high-performance applications, connected by high-speed 'Lambda' networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple the performance of applications and protocols - a loss rate as...

    Provided By Cornell University

  • White Papers // Sep 2010

    Man-in-the-Middle TCP Recovery

    When an application connects with a remote peer using TCP, its network stack encapsulates the state of that connection. As a consequence, even if the application is capable of recovering its own state after failure (for example, by restarting at a backup location), the peer may experience a disruption of...

    Provided By Cornell University

  • White Papers // Jun 2009

    Is Unlevered Firm Volatility Asymmetric?

    Asymmetric volatility refers to the stylized fact that stock volatility is negatively correlated to stock returns. Traditionally, this phenomenon has been explained by the financial leverage effect. This explanation has recently been challenged in favor of a risk premium based explanation. The authors develop a new, unlevering approach to document...

    Provided By Cornell University

  • White Papers // Oct 2010

    The Dual Optimizer For The Growth-optimal Portfolio Under Transaction Costs

    The authors consider the maximization of the long-term growth rate in the Black-Scholes model under proportional transaction costs as in Taksar, Klass and Assaf [Math. Oper. Res. 13, 1988]. Similarly as in Kallsen and Muhle-Karbe [Ann. Appl. Probab., 20, 2010] for optimal consumption over an infinite horizon, they tackle this...

    Provided By Cornell University

  • White Papers // Dec 2010

    Robust Maximization Of Asymptotic Growth

    This paper addresses the question of how to invest in a robust growth-optimal way in a market where the instantaneous expected return of the underlying process is unknown. The optimal investment strategy is identified using a generalized version of the principal eigenfunction for an elliptic second-order differential operator which depends...

    Provided By Cornell University

  • White Papers // May 2011

    How Do Health And Social Insurance Programs Affect The Land And Labor Allocations Of Farm Households? Evidence From Taiwan

    Using a unique dataset of 703,287 farm operators from the Taiwanese Census of Agriculture merged to administrative records from the National Farmers' Health Insurance (FHI) program, the authors examine the effects of the enrollment in the FHI program on farmers' on- and off-farm labor supply and the amount of land...

    Provided By Cornell University

  • White Papers // Sep 2010

    Detection of Time-Varying Flows in Wireless Networks

    The problem of detecting the presence of time-varying flows in multi-hop wireless networks is considered. In particular, from transmission timing measurements, a test is constructed to determine whether there is a flow of data packets between a pair of nodes. It is assumed that the packet flows may have time-varying...

    Provided By Cornell University

  • White Papers // Feb 2011

    Secondary Job Scheduling in the Cloud With Deadlines

    The highly dynamic nature of the cloud environment leads to a time-varying resource utilization and the cloud provider can potentially accommodate secondary jobs with the remaining resource. To better implement the idea of resource reutilization in the cloud environment, the problem of secondary job scheduling with deadlines under time-varying resource...

    Provided By Cornell University

  • White Papers // Apr 2010

    Timing-Based Detection of Packet Forwarding in MANETs

    In Mobile Ad hoc NETworks (MANETs), timing information is easily available due to the use of a shared medium, even when the traffic is encrypted. This paper addresses how such timing information can be used for detecting packet forwarding activities in MANETs. The authors' results depend in part on the...

    Provided By Cornell University

  • White Papers // Feb 2010

    Multiuser Cognitive Access of Continuous Time Markov Channels: Maximum Throughput and Effective Bandwidth Regions

    The problem of sharing multiple channels owned by primary users with multiple cognitive users is considered. Each primary user transmits on its dedicated channel, and its occupancy is modeled by a continuous time Markov process. Each cognitive user is capable of sensing one channel at a time and it transmits...

    Provided By Cornell University

  • White Papers // Sep 2009

    A Sensing-Based Cognitive Coexistence Method for Interfering Infrastructure and Ad-Hoc Systems

    The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an infrastructure system to reduce interference to ad-hoc or peer-to-peer communication links in close proximity. Motivated by the superior resources of the infrastructure system, the authors study...

    Provided By Cornell University