Cornell University

Displaying 1-40 of 1196 results

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Memory Networks

    In this paper, the authors describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Evaluation of Security Solutions for Android Systems

    With the increasing usage of Smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not always properly designed for Smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Jan 2015

    High-level Synthesis under I/O Timing and Memory Constraints

    The design of complex systems-on-chip implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper, the authors present a methodology and a tool that allow the high-level synthesis of DSP algorithm, under both I/O timing and memory constraints. Based on...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Nov 2014

    Privacy-Preserving Content-Based Image Retrieval in the Cloud

    Storage requirements for visual data have been increasing in recent years, following the emergence of many new services and applications for both personal and corporate use. This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. However, outsourcing data storage to the Cloud also leads...

    Provided By Cornell University

  • White Papers // Oct 2014

    Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth

    Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive State Machines (RSMs) are standard models for interprocedural analysis. The authors consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic...

    Provided By Cornell University

  • White Papers // Oct 2014

    A Note on Two Notions of Compliance

    Several recent papers have been devoted to the study of contracts as a way to formally specify abstractions of the behavior of software systems. A common aspect that gathers together some of these studies is a notion of compliance. This is a relation between systems which want to interact. Before...

    Provided By Cornell University

  • White Papers // Oct 2014

    Toward Sequentializing Overparallelized Protocol Code

    A promising application domain for coordination languages is programming protocols among threads in multi-core programs: coordination languages typically provide high-level constructs and abstractions that more easily compose into correct - with respect to a programmer's intentions - protocol specifications than do low-level synchronization constructs provided by conventional languages (e.g., locks...

    Provided By Cornell University

  • White Papers // Oct 2014

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Increased coupling between critical infrastructure networks, such as power and communications, has important implications for the reliability and security of these networks. To understand the implications of power-communications coupling, researchers have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models...

    Provided By Cornell University

  • White Papers // Oct 2014

    Capacity Analysis of Decoupled Downlink and Uplink Access in 5G Heterogeneous Systems

    The peoples' traditional notion of a cell is changing dramatically given the increasing degree of heterogeneity in 4G and emerging 5G systems. Rather than belonging to a specific cell, a device would choose the most suitable connection from the plethora of connections available. In such a setting, given the transmission...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient Key Generation for Dynamic Blom's Scheme

    The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom's scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, the authors...

    Provided By Cornell University

  • White Papers // Oct 2014

    Repairable Threshold Secret Sharing Schemes

    In this paper, the authors propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes...

    Provided By Cornell University

  • White Papers // Oct 2014

    Quantum Clouds: A Future Perspective

    Quantum computing and cloud computing are two gaints for futuristic computing. Both technologies complement each other. Quantum clouds, therefore, is deploying the resources of quantum computation in a cloud environment to provide solution to the challenges and problems faced by present model of classical cloud computation. State of the art...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient LTE Access with Collision Resolution for Massive M2M Communications

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the Random Access CHannel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this paper, the authors propose a LTE...

    Provided By Cornell University

  • White Papers // Oct 2014

    Statistical Models for Cores Decomposition of Undirected Random Graphs

    The authors develop a rigorous and interpretable statistical model for networks using their shell structure to construct minimal sufficient statistics. The model provides the formalism necessary for using k-cores in statistical considerations of random graphs, and in particular social networks. It cannot be specialized to any known degree-centric model and...

    Provided By Cornell University

  • White Papers // Oct 2014

    Pricing in Social Networks with Negative Externalities

    The authors study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. They assume impatient consumers who buy the product as soon as the seller posts a price not greater than their...

    Provided By Cornell University

  • White Papers // Oct 2014

    Hierarchical Sequencing of Online Social Graphs

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, the authors investigate in-depth topology of online social network which is based on MySpace dialogs....

    Provided By Cornell University

  • White Papers // Oct 2014

    Effects of Social Influence in Peer Online Recommendation

    Website providers often use peer recommendation to help people find interesting content. A common method for leveraging opinions of others on these web sites is to display the number of prior recommendations as a social signal. How people react to these social influence signals, in combination with other effects, such...

    Provided By Cornell University

  • White Papers // Oct 2014

    Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths

    The authors introduce several novel and computationally efficient methods for detecting \"Core-periphery structure\" in networks. Core-periphery structure is a type of meso-scale structure that includes densely-connected core vertices and sparsely-connected peripheral vertices. Core vertices are well-connected both among themselves and to peripheral vertices, which are not well-connected to any vertices....

    Provided By Cornell University

  • White Papers // Oct 2014

    Probabilistic Definitions of Actual Causation Using CP-logic

    Since Pearl's seminal work on providing a formal language for causality, the subject has garnered a lot of interest among philosophers and researchers in artificial intelligence alike. One of the most debated topics in this context regards the notion of actual causation, which concerns itself with specific - as opposed...

    Provided By Cornell University

  • White Papers // Oct 2014

    Timed Influence: Computation and Maximization

    The authors consider a cost model for diffusion in a network that captures both the scope of infection and its propagation time: the edges of the network have associated lengths which model transmission times, and influence scores are higher for faster propagation. They propose an intuitive measure of timed influence,...

    Provided By Cornell University

  • White Papers // Oct 2014

    QoE Modelling, Measurement and Prediction: A Review

    In mobile computing systems, users can access network services anywhere and anytime using mobile devices such as tablets and Smartphone's. These devices connect to the Internet via network or telecommunications operators. Users usually have some expectations about the services provided to them by different operators. Users' expectations along with additional...

    Provided By Cornell University

  • White Papers // Oct 2014

    Lost in Space: Improving Inference of IPv4 Address Space Utilization

    One challenge in understanding the evolution of Internet infrastructure is the lack of systematic mechanisms for monitoring the extent to which allocated IP addresses are actually used. In this paper, the authors try to advance the science of inferring IPv4 address space utilization by analyzing and correlating results obtained through...

    Provided By Cornell University

  • White Papers // Oct 2014

    Parameterizing the Semantics of Fuzzy Attribute Implications by Systems of Isotone Galois Connections

    The authors study the semantics of fuzzy if-then rules called fuzzy attribute implications parameterized by systems of isotone Galois connections. The rules express dependencies between fuzzy attributes in object-attribute incidence data. The proposed parameterizations are general and include as special cases the parameterizations by linguistic hedges used in earlier approaches....

    Provided By Cornell University

  • White Papers // Oct 2014

    Applying Agile Requirements Engineering Approach for Re-engineering & Changes in existing Brownfield Adaptive Systems

    Requirements Engineering (RE) is a key activity in the development of software systems and is concerned with the identification of the goals of stakeholders and their elaboration into precise statements of desired services and behavior. The paper describes an agile requirements engineering approach for re-engineering & changes in existing brownfield...

    Provided By Cornell University

  • White Papers // Oct 2014

    Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection

    With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices' resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this paper, the authors present a framework SouTu, which enables cloud servers to provide privacy-preserving photo sharing...

    Provided By Cornell University

  • White Papers // Oct 2014

    That Ain't You: Blocking Spearphishing Emails Before they are Sent

    One of the ways in which attackers try to steal sensitive information from corporations is by sending spear-phishing emails. This type of emails typically appears to be sent by one of the victim's coworkers, but have instead been crafted by an attacker. A particularly insidious type of spear-phishing emails are...

    Provided By Cornell University

  • White Papers // Apr 2014

    A New Multi-Tiered Solid State Disk Using SLC/MLC Combined Flash Memory

    Storing digital information, ensuring the accuracy, steady and uninterrupted access to the data is considered as fundamental challenges in enterprise-class organizations and companies. In recent years, new types of storage systems such as Solid State Disks (SSD) have been introduced. Unlike hard disks that have mechanical structure, SSDs are based...

    Provided By Cornell University

  • White Papers // Apr 2014

    Hardware Efficient WiMAX Deinterleaver Capable of Address Generation for Random Interleaving Depths

    The variation in the prescribed modulation schemes and code rates for WiMAX interleaver design, as defined by IEEE 802.16 standard, demands a plethora of hardware if all the modulation schemes and code rates have to be unified into a single electronic device. Add to this the complexities involved with the...

    Provided By Cornell University

  • White Papers // Apr 2014

    A Signal Processor for Gaussian Message Passing

    In this paper, the authors present a novel signal processing unit built upon the theory of factor graphs, which is able to address a wide range of signal processing algorithms. More specifically, the demonstrated Factor Graph Processor (FGP) is tailored to Gaussian message passing algorithms. They show how to use...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Hierarchically Blocked Jacobi SVD Algorithm for Single and Multiple Graphics Processing Units

    The authors present a hierarchically blocked one-sided Jacobi algorithm for the Singular Value Decomposition (SVD), targeting both single and multiple Graphics Processing Units (GPUs). The blocking structure reflects the levels of GPU's memory hierarchy. The algorithm may outperform MAGMA's dgesvd, while retaining high relative accuracy. To this end, they developed...

    Provided By Cornell University

  • White Papers // Feb 2014

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes...

    Provided By Cornell University

  • White Papers // Mar 2014

    Tile Optimization for Area in FPGA Based Hardware Acceleration of Peptide Identification

    Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence...

    Provided By Cornell University

  • White Papers // Oct 2012

    A Flexible Design for Optimization of Hardware Architecture in Distributed Arithmetic based FIR Filters

    FIR filters are used in many performance/power critical applications such as mobile communication devices, analogue to digital converters and digital signal processing applications. Design of appropriate FIR filters usually causes the order of filter to be increased. Synthesis and tape-out of high-order FIR filters with reasonable delay, area and power...

    Provided By Cornell University

  • White Papers // Jan 2014

    Hardware Implementation of Four Byte Per Clock RC4 Algorithm

    In the field of cryptography till date the 2-byte in 1-clock is the best known RC4 hardware design, while 1-byte in 1-clock and the 1-byte in 3 clocks are the best known implementation. The design algorithm in considers two consecutive bytes together and processes them in 2 clocks. The design...

    Provided By Cornell University

  • White Papers // May 2014

    Massively Parallel Processor Architectures for Resource-Aware Computing

    The authors present a class of massively parallel processor architectures called invasive Tightly Coupled Processor Arrays (TCPAs). The presented processor class is a highly parameterizable template, which can be tailored before runtime to fulfill costumers' requirements such as performance, area cost, and energy efficiency. These programmable accelerators are well suited...

    Provided By Cornell University

  • White Papers // May 2014

    Anytime Control Using Input Sequences With Markovian Processor Availability

    The authors study an anytime control algorithm for situations where the processing resources available for control are time-varying in an a priori unknown fashion. Thus, at times, processing resources are insufficient to calculate control inputs. To address this issue, the algorithm calculates sequences of tentative future control inputs whenever possible,...

    Provided By Cornell University

  • White Papers // Mar 2014

    Increasing Flash Memory Lifetime by Dynamic Voltage Allocation for Constant Mutual Information

    The read channel in Flash memory systems degrades over time because the Fowler-Nordheim tunneling used to apply charge to the floating gate eventually compromises the integrity of the cell because of tunnel oxide degradation. While degradation is commonly measured in the number of program/erase cycles experienced by a cell, the...

    Provided By Cornell University

  • White Papers // Mar 2014

    Capacity of a Nonlinear Optical Channel with Finite Memory

    The channel capacity of a nonlinear, dispersive fiberoptic link is revisited. To this end, the popular Gaussian Noise (GN) model is extended with a parameter to account for the finite memory of realistic fiber channels. This finite-memory model is harder to analyze mathematically but, in contrast to previous models, it...

    Provided By Cornell University

  • White Papers // Mar 2014

    Noise Facilitation in Associative Memories of Exponential Capacity

    Recent advances in associative memory design through structured pattern sets and graph-based inference algorithms have allowed reliable learning and recall of an exponential number of patterns. Although these designs correct external errors in recall, they assume neurons that compute noiselessly, in contrast to the highly variable neurons in brain regions...

    Provided By Cornell University

  • White Papers // Jan 2014

    LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory

    As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replacement policy used for cache. In this paper, the authors' algorithm not only based on the time...

    Provided By Cornell University

  • White Papers // Jan 2014

    SMTp: An Architecture for Next-Generation Scalable Multi-Threading

    The authors introduce the SMTp architecture - an SMT processor augmented with a coherence protocol thread context that together with a standard integrated memory controller can enable the design of scalable cache-coherent hardware Distributed Shared Memory (DSM) machines from commodity nodes. They describe the minor changes needed to a conventional...

    Provided By Cornell University

  • White Papers // May 2014

    Bargaining-Based Mobile Data Offloading

    The unprecedented growth of mobile data traffic challenges the performance and economic viability of today's cellular networks, and calls for novel network architectures and communication solutions. Data offloading through third-party WiFi or femtocell Access Points (APs) can effectively alleviate the cellular network congestion in a low operational and capital expenditure....

    Provided By Cornell University

  • White Papers // Apr 2014

    Web Log Data Analysis by Enhanced Fuzzy C Means Clustering

    World Wide Web is a huge repository of information and there is a tremendous increase in the volume of information daily. The number of users is also increasing day by day. To reduce users browsing time lot of research is taken place. Web Usage Mining is a type of web...

    Provided By Cornell University

  • White Papers // May 2014

    The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases

    Numerous SQL-on-Hadoop, NewSQL and NoSQL databases provide semi-structured data model and query language capabilities, but it is difficult to compare these capabilities. Many differences between the data models and (especially) between the query languages are superficial, but nonetheless distract from the essential differences. Other query language differences are direct derivatives...

    Provided By Cornell University

  • White Papers // Feb 2014

    Parallel Wisard Object Tracker: A Ram-Based Tracking System

    This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is an important and challenging task in many applications. Difficulties can arise due to weather conditions, target trajectory and appearance,...

    Provided By Cornell University

  • White Papers // May 2014

    Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture

    In this contribution the emulation of an ASIC Temperature and Power Monitoring system (TPMon) for FPGA prototyping is presented and tested to control processor temperatures under different control targets and operating strategies. The approach for emulating the power monitor is based on an instruction-level energy model. For emulating the temperature...

    Provided By Cornell University

  • White Papers // Feb 2014

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor is presented. The approach is based on control-loop feedback mechanism to maximize the efficiency on exploiting available resources such as CPU time, operating frequency, etc. Each Processing Element (PE) in the architecture is equipped with a frequency scaling module responsible...

    Provided By Cornell University

  • White Papers // Feb 2014

    Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3d Network on Chip

    Energy efficiency is one of the most critical issues in design of System on Chip. In Network-on-Chip (NoC) based system, energy consumption is influenced dramatically by mapping of Intellectual Property (IP) which affect the performance of the system. In this paper, the authors test the antecedently extant proposed algorithms and...

    Provided By Cornell University

  • White Papers // Apr 2014

    Estimation of Optimized Energy and Latency Constraint for Task Allocation in 3D Network on Chip

    In Network on Chip (NoC) rooted system, energy consumption is affected by task scheduling and allocation schemes which affect the performance of the system. In this paper, the authors test the pre-existing proposed algorithms and introduced a new energy skilled algorithm for 3D NoC architecture. An efficient dynamic and cluster...

    Provided By Cornell University

  • White Papers // May 2014

    Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint

    The conventional design of cellular systems prescribes the separation of uplink and downlink transmissions via time-division or frequency-division duplex. Recent advances in analog and digital domain self-interference interference cancellation challenge the need for this arrangement and open up the possibility to operate base stations, especially low-power ones, in a full-duplex...

    Provided By Cornell University

  • White Papers // Apr 2014

    Towards Cloud Computing: A Swot Analysis on Its Adoption in SMEs

    Over the past few years, emergence of cloud computing has notably made an evolution in the IT industry by putting forward an 'Everything as a service' idea .Cloud computing is of growing interest to companies throughout the world, but there are many barriers associated with its adoption which should be...

    Provided By Cornell University

  • White Papers // May 2014

    NScale: Neighborhood-Centric Large-Scale Graph Analytics in the Cloud

    There is an increasing interest in executing rich and complex analysis tasks over large-scale graphs, many of which require processing and reasoning about a large number of multi-hop neighborhoods or sub-graphs in the graph. Examples of such tasks include ego network analysis, motif counting, finding social circles, personalized recommendations, link...

    Provided By Cornell University

  • White Papers // May 2014

    NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security

    Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach cannot...

    Provided By Cornell University

  • White Papers // Apr 2014

    Intelligent Resource Allocation Technique For Desktop-as-a-Service in Cloud Environment

    The specialty of desktop-as-a-service cloud computing is that user can access their desktop and can execute applications in virtual desktops on remote servers. Resource management and resource utilization are most significant in the area of desktop-as-a-service, cloud computing; however, handling a large amount of clients in the most efficient manner...

    Provided By Cornell University

  • White Papers // Apr 2014

    Automated Classification of Airborne Laser Scanning Point Clouds

    Making sense of the physical world has always been at the core of mapping. Up until recently, this has always dependent on using the human eye. Using airborne lasers, it has become possible to quickly \"See\" more of the world in many more dimensions. The resulting enormous point clouds serve...

    Provided By Cornell University

  • White Papers // Apr 2014

    Cache-Oblivious VAT-Algorithms

    Modern processors have a memory hierarchy and use virtual memory. The authors concentrate on two-levels of the hierarchy and refer to the faster memory as the cache. Data is moved between the fast and the slow memory in blocks of contiguous memory cells, and only data residing in the fast...

    Provided By Cornell University

  • White Papers // Apr 2014

    CernVM Online and Cloud Gateway: A Uniform Interface for CernVM Contextualization and Deployment

    In a virtualized environment, contextualization is the process of configuring a VM instance for the needs of various deployment use cases. Contextualization in CernVM can be done by passing a handwritten context to the user data field of cloud APIs, when running CernVM on the cloud, or by using CernVM...

    Provided By Cornell University

  • White Papers // Feb 2014

    A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment

    Cloud computing is a new trend emerging in IT environment with huge requirements of infrastructure and resources. Load Balancing is an important aspect of cloud computing environment. Efficient load balancing scheme ensures efficient resource utilization by provisioning of resources to cloud user's on-demand basis in pay-as-you-say-manner. Load Balancing may even...

    Provided By Cornell University

  • White Papers // Dec 2013

    A Survey on Cloud Security Issues and Techniques

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and...

    Provided By Cornell University

  • White Papers // Mar 2014

    Design Architecture-Based on Web Server and Application Cluster in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By Cornell University

  • White Papers // May 2014

    Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems

    In a wireless storage system, having to communicate over a fading channel makes repair transmissions prone to physical layer errors. The first approach to combat fading is to utilize the existing optimal space-time codes. However, it was recently pointed out that such codes are in general too complex to decode...

    Provided By Cornell University

  • White Papers // May 2014

    Repair for Distributed Storage Systems in Packet Erasure Networks

    Reliability is essential for storing files in many applications of distributed storage systems. To maintain reliability, when a storage node fails, a new node should be regenerated by a repair process. Most of the previous results on the repair problem assume perfect (error-free) links in the networks. However, in practice,...

    Provided By Cornell University

  • White Papers // Apr 2014

    Computing an Optimal Control Policy for an Energy Storage

    The authors introduce StoDynProg, a small library created to solve Optimal Control problems arising in the management of Renewable Power Sources, in particular when coupled with an Energy Storage System. The library implements generic Stochastic Dynamic Programming (SDP) numerical methods which can solve a large class of Dynamic Optimization problems....

    Provided By Cornell University

  • White Papers // Jul 2008

    Teaching Network Storage Technology- Assessment Outcomes and Directions

    Technologically, gap between processors' speed and access time on individual disks is widening and network access to combined disk storage with its promise of high bandwidth to mask latency, lead to the rapid development of a set of distinct storage technologies commonly named Networked Storage Technology. The Networked Storage Technology...

    Provided By Cornell University

  • White Papers // Mar 2014

    Readout Optical System of Sapphire Disks Intended for Long-Term Data Storage

    The development of long-term data storage technology is one of the urging problems of the time. This paper presents the results of implementation of technical solution for long-term data storage technology proposed a few years ago on the basis of single crystal sapphire. It is shown that the problem of...

    Provided By Cornell University

  • White Papers // Mar 2014

    Applying Mathematical Models in Cloud Computing: A Survey

    As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before they enter into the systems and there is no way how this can be prevented...

    Provided By Cornell University