Cornell University
Displaying 1-40 of 977 results
-
Hopping over Big Data: Accelerating Ad-hoc OLAP Queries with Grasshopper Algorithms
This paper presents a family of algorithms for fast subset filtering within ordered sets of integers representing composite keys. Applications include significant acceleration of (ad-hoc) analytic queries against a data warehouse without any additional indexing. The algorithms work for point, range and set restrictions on multiple attributes, in any combination,...
Provided By Cornell University
-
Design of Generic Framework for Botnet Detection in Network Forensics
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal activities, which in turn, bids many network attacks and threats. Network forensics is...
Provided By Cornell University
-
Security Issues on Cloud Computing
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be...
Provided By Cornell University
-
Timing Analysis of SSL/TLS Man in the Middle Attacks
The authors' experiment revealed that SSL MiTM attacks have timing patterns that could be identified by observing victims. More specifically, the attack tools they analyzed shifted most of the delay to the time between when an SSL handshake was started and when the certificate was received. Additionally, most of the...
Provided By Cornell University
-
Communication Steps for Parallel Query Processing
The authors consider the problem of computing a relational query q on a large input database of size n, using a large number p of servers. They establish both lower and upper bounds, in two settings. For a single round of communication, they give lower bounds in the strongest possible...
Provided By Cornell University
-
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, the authors discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view. They argue that many XML-based attacks target the syntactic level, i.e. the tree structure or element content, and syntax validation of XML...
Provided By Cornell University
-
Creating a Relational Distributed Object Store
In and of itself, data storage has apparent business utility. But when the authors can convert data to information, the utility of stored data increases dramatically. It is the layering of relation atop the data mass that is the engine for such conversion. Frank relation amongst discrete objects sporadically ingested...
Provided By Cornell University
-
Partial Spreads in Random Network Coding
Following the approach by R. K?tter and F. R. Kschischang, the authors explain network codes as families of k-dimensional linear subspaces of a vector space Fnq, q being a prime power and Fq the finite field with q elements. In particular, following an idea in finite projective geometry, they introduce...
Provided By Cornell University
-
Cryptocat: Adopting Accessibility and Ease of Use as Security Properties
Cryptocat is a Free and Open Source Software (FL/OSS) browser extension that makes use of web technologies in order to provide easy to use, accessible, encrypted instant messaging to the general public. The authors aim to investigate how to best leverage the accessibility and portability offered by web technologies in...
Provided By Cornell University
-
High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context
Energy minimization of Ising spin-glasses has played a central role in statistical and solid-state physics, facilitating studies of phase transitions and magnetism. Recent proposals suggest using Ising spin-glasses for non-traditional computing as a way to harness the nature's ability to find min-energy configurations, and to take advantage of quantum tunneling...
Provided By Cornell University
-
Equivalence and Comparison of Heterogeneous Cellular Networks
The authors consider a general heterogeneous network in which, besides general propagation effects (shadowing and/or fading), individual base stations can have different emitting powers and be subject to different parameters of Hata-like pathloss models (path-loss exponent and constant) due to, for example, varying antenna heights. They assume also that the...
Provided By Cornell University
-
Towards a Simple Relationship to Estimate the Capacity of Static and Mobile Wireless Networks
Extensive research has been done on studying the capacity of wireless multi-hop networks. These efforts have led to many sophisticated and customized analytical studies on the capacity of particular networks. While most of the analyses are intellectually challenging, they lack universal properties that can be extended to study the capacity...
Provided By Cornell University
-
CSMA Using Statistical Physics Toward Throughput and Utility Optimal CSMA
In the recent past years, CSMA (Carrier Sense Multiple Access), which resolves contentions over wireless networks in a fully distributed fashion, has gained a lot of attentions since it has been proved in several papers that appropriate control of CSMA parameters provably guarantees optimality in terms of throughput and fairness....
Provided By Cornell University
-
Hybrid Coding: An Interface for Joint Source - Channel Coding and Network Communication
A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled. However, unlike the separation...
Provided By Cornell University
-
Cell-Level Modeling of IEEE 802.11 WLANs
The authors develop a scalable cell-level analytical model for multi-cell infrastructure IEEE 802.11 WLANs under a so-called Pairwise Binary Dependence (PBD) condition. The PBD condition is a geometric property under which the relative locations of the nodes inside a cell do not matter and the network is free of hidden...
Provided By Cornell University
-
Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution
Reconciliation is an important step to correct errors in Quantum Key Distribution (QKD). In QKD, after comparing basis, two legitimate parties possess two correlative keys which have some differences and they could obtain identical keys through reconciliation. In this paper, the authors present a new rate compatible reconciliation scheme based...
Provided By Cornell University
-
Building Internal Cloud at NIC : A Preview
The most of computing environments in the IT support organization like NIC are designed to run in centralized data centre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that data centre from all the stations of organization. Currently these...
Provided By Cornell University
-
Enhancing Information Dissemination in a Device to Device Communication Based Metapopulation using Human Mobility Trace and Beamforming
In communication network based on device to device interactions, dissemination of the information has lately picked up lot of interest. In this paper, the authors would like to propose a mechanism for studying and enhancing the dissemination of information as in the use case proposed for the future device to...
Provided By Cornell University
-
Java Card for PayTV Application
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest...
Provided By Cornell University
-
Secure Biometrics: Concepts, Authentication Architectures & Challenges
Biometrics is an important and widely used class of methods for identity verification and access control. Biometrics is attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics is...
Provided By Cornell University
-
Proportional Fair MU-MIMO in 802.11 WLANs
The next generation of 802.11 WLANs is expected to support Multi-User MIMO (MUMIMO) transmission, whereby parallel transmissions can be simultaneously made to multiple stations. This significantly extends the MIMO support introduced by the 802.11n standard and is, for example, included as part of the current draft 802.11ac standard that aims...
Provided By Cornell University
-
Multicut Lower Bounds via Network Coding
The authors introduce a new technique to certify lower bounds on the multi-cut size using network coding. In directed networks the network coding rate is not a lower bound on the multi-cut, but they identify a class of networks on which the rate is equal to the size of the...
Provided By Cornell University
-
Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells
In this paper, the authors propose a novel solution called Dynamic Spectrum Refarming (DSR) for deploying LTE small cells using the same spectrum as existing GSM networks. The basic idea of DSR is that LTE small cells are deployed in the GSM spectrum but suppress transmission of all signals including...
Provided By Cornell University
-
Osculating Spaces of Varieties and Linear Network Codes
The authors present a general theory to obtain good linear network codes utilizing the osculating nature of algebraic varieties. In particular, they obtain from the osculating spaces of Veronese varieties explicit families of equidimensional vector spaces, in which any pair of distinct vector spaces intersect in the same dimension. Linear...
Provided By Cornell University
-
Cloud Computing Benefits for Educational Institutions
Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers...
Provided By Cornell University
-
Endow a Service-Oriented Architecture by a Decisional Aspect
SOA architecture is more and more used in the companies, The importance of the service orientation and its advantages with the information system of the company, confront one to a new challenge. It is primarily to ensure the decisional aspect of the information system of company by adopting Ser-vices Orientated...
Provided By Cornell University
-
Intelligent Agent Based Semantic Web in Cloud Computing Environment
Considering today's web scenario, there is a need of effective and meaningful search over the web which is provided by Semantic Web. Existing search engines are keyword based. They are vulnerable in answering intelligent queries from the user due to the dependence of their results on information available in web...
Provided By Cornell University
-
Optimal Distributed Scheduling in Wireless Networks Under SINR Interference Model
Radio resource sharing mechanisms are key to ensuring good performance in wireless networks. In their seminal paper, Tassiulas and Ephremides introduced the Maximum Weighted Scheduling algorithm, and proved its throughput-optimality. Since then, there have been extensive research efforts to devise distributed implementations of this algorithm. Recently, distributed adaptive CSMA scheduling...
Provided By Cornell University
-
Designing Run-Time Environments to Have Predefined Global Dynamics
The stability and the predictability of a computer network algorithm's performance are as important as the main functional purpose of networking software. However, asserting or deriving such properties from the finite state machine implementations of protocols is hard and, except for singular cases like TCP, is not done today. In...
Provided By Cornell University
-
Implementation of DYMO Routing Protocol
Mobile Ad-hoc NETworks communicate without any fixed infrastructure or ant centralized domain. All the nodes are free to move randomly within the network and share information dynamically. To achieve an efficient routing various protocols have been developed so far which vary in their nature and have their own salient properties....
Provided By Cornell University
-
Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
The authors investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. They show that attacks taking advantage of the systems false acceptance rate, i.e. false-accept attacks, pose a very...
Provided By Cornell University
-
Power-Efficient Assignment of Virtual Machines to Physical Machines
Motivated by current trends in cloud computing, the authors explain study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency they say that a set of Virtual Machines (VMs) is assigned to a...
Provided By Cornell University
-
A C++11 Implementation of Arbitrary-Rank Tensors for High-Performance Computing
In this paper, the authors discusses an efficient implementation of tensors of arbitrary rank by using some of the idioms introduced by the recently published C++ ISO Standard (C++11). With the aims at providing a basic building block for high-performance computing, a single Array class template is carefully crafted, from...
Provided By Cornell University
-
Towards a Networks-of-Networks Framework for Cyber Security
Networks-of-Networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed...
Provided By Cornell University
-
Application-Driven TCP Recovery and Non-Stop BGP
Some network protocols tie application state to underlying TCP connections, leading to unacceptable service outages when an endpoint loses TCP state during fail-over or migration. For example, BGP ties forwarding tables to its control plane connections so that the failure of a BGP endpoint can lead to widespread routing disruption,...
Provided By Cornell University
-
Exclusion and Guard Zones in DS-CDMA Ad Hoc Networks
The central issue in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by...
Provided By Cornell University
-
Coding Opportunity Densification Strategies for Instantly Decodable Network Coding
In this paper, the authors aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in Instantly Decodable Network Coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission...
Provided By Cornell University
-
Two Trivial Attacks on A5/1: A GSM Stream Cipher
Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher that ensure confidentiality of conversations in GSM mobile phones. However careful security analysis of such cipher is very important...
Provided By Cornell University
-
Dynamic Clustering Protocol for Data Forwarding in Wireless Sensor Networks
Energy being the very key concern area with sensor networks, so the main focus lies in developing a mechanism to increase the lifetime of a sensor network by energy balancing. To achieve energy balancing and maximizing network lifetime the authors use an idea of clustering and dividing the whole network...
Provided By Cornell University
-
Secure End-to-End Communication with Optimal Throughput in Unreliable Networks
The authors demonstrate the feasibility of end-to-end communication in highly unreliable networks. Modeling a network as a graph with vertices representing nodes and edges representing the links between them, they consider two forms of unreliability: unpredictable edge-failures and deliberate deviation from protocol specifications by corrupt nodes. they present a robust...
Provided By Cornell University
-
Power-Efficient Assignment of Virtual Machines to Physical Machines
Motivated by current trends in cloud computing, the authors explain study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency they say that a set of Virtual Machines (VMs) is assigned to a...
Provided By Cornell University
-
Open Source CRM Systems for SMEs
Customer Relationship Management (CRM) systems are very common in large companies. However, CRM systems are not very common in Small and Medium Enterprises (SMEs). Most SMEs do not implement CRM systems due to several reasons, such as lack of knowledge about CRM or lack of financial resources to implement CRM...
Provided By Cornell University
-
Leveraging Information Technology, Social Entrepreneurship, and Global Collaboration for Just Sustainable Development
Currently, those working for a sustainable development in a vast array of contexts all over the world are often duplicating efforts. In an era where a rapid transition towards sustainability is needed, such wasted effort is no longer tolerable. This paper will discuss current work to overcome this challenge by...
Provided By Cornell University
-
Endow a Service-Oriented Architecture by a Decisional Aspect
SOA architecture is more and more used in the companies, The importance of the service orientation and its advantages with the information system of the company, confront one to a new challenge. It is primarily to ensure the decisional aspect of the information system of company by adopting Ser-vices Orientated...
Provided By Cornell University
-
Network Coding Based on Chinese Remainder Theorem
Random linear network code has to sacrifice part of bandwidth to transfer the coding vectors, thus a head of size k log |T | is appended to each packet. The authors present a distributed random network coding approach based on the Chinese remainder theorem for general multicast networks. It uses...
Provided By Cornell University
-
SLALOM: A Language for SLA Specification and Monitoring
IT services provisioning is usually underpinned by Service Level Agreements (SLAs), aimed at guaranteeing services quality. However, there is a gap between the customer perspective (business oriented) and that of the service provider (implementation oriented) that becomes more evident while defining and monitoring SLAs. This paper proposes a domain specific...
Provided By Cornell University
-
Dynamic Rate Adaptation for Improved Throughput and Delay in Wireless Network Coded Broadcast
In this paper, the authors provide theoretical and simulation based study of the delay performance for a number of existing throughput optimal broadcast schemes and uses the results to design a new dynamic rate adaptation scheme which achieves higher transmission rates at lower packet delivery delays. Under the Bernoulli packet...
Provided By Cornell University
-
Originator Usage Control With Business Process Slicing
Originator Control allows information providers to define the information re-dissemination condition. Combined with usage control policy, fine-grained 'Downstream usage control' can be achieved, which specifies what attributes the downstream consumers should have and how data is used. This paper discusses originator usage control, paying particular attention to enterprise-level dynamic business...
Provided By Cornell University
-
Modeling Network Coded TCP: Analysis of Throughput and Energy Cost
The authors analyze the performance of TCP and TCP with Network Coding (TCP/NC) in lossy networks. They build upon the framework introduced by Padhye et al. and characterize the throughput behavior of classical TCP and TCP/NC as a function of erasure probability, round-trip time, maximum window size, and duration of...
Provided By Cornell University
-
Business Intelligence: A Rapidly Growing Option through Web Mining
The World Wide Web is a popular and interactive medium to distribute information in this scenario. The web is huge, diverse, ever changing, widely disseminated global information service center. The authors are familiar with terms like e-commerce, e-governance, e-market, e-finance, e-learning, e-banking etc. for an organization it is new challenge...
Provided By Cornell University
-
Instantly Decodable Versus Random Linear Network Coding: A Comparative Framework for Throughput and Decoding Delay Performance
This paper explains the tension between throughput and decoding delay performance of two widely-used network coding schemes: Random Linear Network Coding (RLNC) and Instantly Decodable Network Coding (IDNC). A single-hop broadcasting system model is considered that aims to deliver a block of packets to all receivers in the presence of...
Provided By Cornell University
-
Semantic-Ontological Combination of Business Rules and Business Processes in IT Service Management
IT Service Management deals with managing a broad range of items related to complex system environments. As there is both, a close connection to business interests and IT infrastructure, the application of semantic expressions which are seamlessly integrated within applications for managing ITSM environments, can help to improve transparency and...
Provided By Cornell University
-
Coding Delay Analysis of Dense and Chunked Network Codes Over Line Networks
In this paper, the authors analyze the coding delay and the average coding delay of random linear network codes (a.k.a. dense codes) and Chunked Codes (CC), which are an attractive alternative to dense codes due to their lower complexity, over line networks with Bernoulli losses and deterministic regular or Poisson...
Provided By Cornell University
-
Questions You Should Answer Before Starting A New Dairy Processing Enterprise
This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...
Provided By Cornell University
-
Building Blocks of Physical-Layer Network Coding
This paper investigates the fundamental building blocks of Physical-layer Network Coding (PNC). Since its conception, PNC has developed into a subfield of network coding investigated by many. Most of the prior work, however, focused on the simplest communication setup in which PNC could be applied, namely the Two-Way-Relay Channel (TWRC)....
Provided By Cornell University
-
Black-White Differences in Tipping of Various Service Providers
Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...
Provided By Cornell University
-
Efficient Feedback-Based Scheduling Policies for Chunked Network Codes Over Networks with Loss and Delay
The problem of designing efficient feedback-based scheduling policies for Chunked Codes (CC) over packet networks with delay and loss is considered. For networks with feedback, two scheduling policies, referred to as Random Push (RP) and Local-Rarest-First (LRF), already exist. The authors propose a new scheduling policy, referred to as minimum-Distance-First...
Provided By Cornell University
-
On the Capacity Region of Two-User Linear Deterministic Interference Channel and Its Application to Multi-Session Network Coding
In this paper, the authors study the capacity of the two-user Multiple-Input Multiple-Output (MIMO) linear deterministic Interference Channel (IC), with possible correlations within/between the channel matrices. The capacity region is characterized in terms of the rank of the channel matrices. It is shown that linear precoding with Han-Kobayashi type of...
Provided By Cornell University
-
The Xen-Blanket: Virtualize Once, Run Everywhere
Current Infrastructure as a Service (IaaS) clouds operate in isolation from each other. Slight variations in the Virtual Machine (VM) abstractions or underlying hypervisor services prevent unified access and control across clouds.While standardization efforts aim to address these issues, they will take years to be agreed upon and adopted, if...
Provided By Cornell University
-
Virtual Machines and Networks-Installation, Performance Study, Advantages and Virtualization Options
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions...
Provided By Cornell University
-
A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences
Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...
Provided By Cornell University
-
Semi-Oblivious Routing: Lower Bounds
This paper initiates the study of semi-oblivious routing; a relaxation of oblivious routing which is first introduced by Racke and led to many subsequent improvements and applications. In semi-oblivious routing like oblivious routing, the algorithm should select only a polynomial number of paths between the source and the sink of...
Provided By Cornell University
-
An Experimental Study of the Skype Peer-to-Peer VoIP System
Despite its popularity, relatively little is known about the traffic characteristics of the Skype VoIP system and how they differ from other P2P systems. The paper describes an experimental study of Skype VoIP traffic conducted over a five month period, where over 82 million datapoints were collected regarding the population...
Provided By Cornell University
-
MultiMATLAB: MATLAB on Multiple Processors
MATLAB, a commercial product of The MathWorks, Inc., has become one of the principal languages of desktop scientific computing. A system is described that enables one to run MATLAB conveniently on multiple processors. Using short, MATLAB-style commands like Eval, Send, Recv, Bcast, Min, and Sum, the user operating within one...
Provided By Cornell University
-
Employee Handbook Basics
By formulating standard answers, instructions or explanations and putting them in writing you place the information where everyone can see and refer to it whenever necessary. That's why developing internal organizational communication tools like newsletters, informational bulletins, standard operating procedures, job descriptions, employee handbooks, and policy manuals make so much...
Provided By Cornell University
-
Processing of Medical Signals (ECG) in Wireless Sensor Networks
Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...
Provided By Cornell University
-
Nozzle: A Defense Against Heap-Spraying Code Injection Attacks
Heap spraying is a new security attack that significantly increases the exploitability of existing memory corruption errors in type-unsafe applications. With heap spraying, attackers leverage their ability to allocate arbitrary objects in the heap of a type-safe language, such as JavaScript, literally filling the heap with objects that contain dangerous...
Provided By Cornell University
-
Towards a Cloud Computing Research Agenda
The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while...
Provided By Cornell University
-
The Data Acquisition System (DAQ) of the Flash Facility
Nowadays the photon science experiments and the machines providing these photon beams, produce enormous amounts of data. To capture the data from the photon science experiments and from the machine itself the authors' developed a novel Data AcQusition (DAQ) system for the FLASH (Free electron LASer in Hamburg) facility. Meanwhile...
Provided By Cornell University
-
The Network Structure of Exploration and Exploitation
Whether as team members brainstorming or cultures experimenting with new technologies, problem solvers communicate and share ideas. This paper examines how the structure of communication networks among actors can affect system-level performance. Authors present an agent-based computer simulation model of information sharing in which the less successful emulate the more...
Provided By Cornell University
-
Building Collaboration Applications That Mix Web Services Hosted Content With P2P Protocols
The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. This paper makes the case for Service-Oriented Collaboration applications that combine service-hosted data with collaboration features implemented using peer-to-peer protocols. Collaboration features are awkward to support solely based on...
Provided By Cornell University
-
Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks
A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...
Provided By Cornell University
-
Resume Writing: Preparation- Elements Of A Resume
Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....
Provided By Cornell University
-
Maximizing the Spread of Cascades Using Network Design
This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...
Provided By Cornell University
-
Intermediaries In Negotiations If Complex Contracts: The Role Of Attorneys In Venture Capital Transactions
Author shows that intermediaries can affect the design of financial contracts by reducing asymmetry in contracting parties' knowledge about complicated and interrelated contract contingencies. Across 908 contracts used in venture capital (VC) transactions, entrepreneurs counseled by attorneys with high VC expertise sign contracts with fewer investor-friendly cash flow contingencies, particularly...
Provided By Cornell University
-
Fast Firewall Implementations for Software-Based Routers
Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...
Provided By Cornell University
-
Global Teams: Trends, Challenges And Solutions
Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....
Provided By Cornell University
-
Are Franchises Bad Employers?
Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...
Provided By Cornell University
-
Video Games Can Waste Children's Time
Video games can be found in all shapes and sizes, from hand-held models to CD-ROM programs with sophisticated imagery and sound. Kids, even those who have a hard time paying attention in school, can spend hours in front of a computer monitor or television screen playing these games. Some video...
Provided By Cornell University
-
Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?
A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...
Provided By Cornell University