Cornell University

Displaying 1-40 of 1226 results

  • White Papers // May 2015

    Cats&Co: Categorical Time Series Coclustering

    The authors suggest a novel method of clustering and exploratory analysis of temporal event sequences data (also known as categorical time series) based on three-dimensional data grid models. A dataset of temporal event sequences can be represented as a data set of three-dimensional points; each point is defined by three...

    Provided By Cornell University

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // May 2015

    A Spatiotemporal Context Definition for Service Adaptation Prediction in a Pervasive Computing Environment

    Pervasive system refers to context-aware systems that can sense their context, and adapt their behavior accordingly to provide adaptable services. Pro-active adaptation of such systems allows changing the service and the context based on prediction. However, the definition of the context is still vague and not suitable to prediction. In...

    Provided By Cornell University

  • White Papers // Apr 2015

    Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks

    Network virtualization enables computing networks and Data Center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, the authors address the existing issues with the classic DC network topologies in virtualized environment and investigate a set of DC network...

    Provided By Cornell University

  • White Papers // Apr 2015

    Risk Perceptions for Wearable Devices

    Wearable devices or "Wearables" bring great benefits but also potential risks that could expose users' activities without their awareness or consent. In this paper, the authors report findings from the first large-scale survey conducted to investigate user security and privacy concerns regarding wearables. They surveyed 1,782 Internet users in order...

    Provided By Cornell University

  • White Papers // Apr 2015

    RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols

    Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating Wireless Sensor Networks (WSNs) that are designed to be part of the Internet of Things (IoTs). Unfortunately, the operating systems commonly used in this domain...

    Provided By Cornell University

  • White Papers // Apr 2015

    Mining Semi-Structured Data

    The need for discovering knowledge from XML documents according to both structure and content features has become challenging, due to the increase in application contexts for which handling both structure and content information in XML data is essential. So, the challenge is to find an hierarchical structure which ensure a...

    Provided By Cornell University

  • White Papers // Apr 2015

    Constant-Optimized Quantum Circuits for Modular Multiplication and Exponentiation

    Reversible circuits for modular multiplication Cx%M with x < M arise as components of modular exponentiation in Shor's quantum number-factoring algorithm. However, existing generic constructions focus on asymptotic gate count and circuit depth rather than actual values, producing fairly large circuits not optimized for specific C and M values. In...

    Provided By Cornell University

  • White Papers // Apr 2015

    Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment

    With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information in the cloud environment. The availability and reliability of the client systems will become increasingly important. Today...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Orchestrating Virtual Network Functions in NFV

    Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In...

    Provided By Cornell University

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Memory Networks

    In this paper, the authors describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Mar 2015

    Android Based Security and Home Automation System

    The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of everyone's daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this...

    Provided By Cornell University

  • White Papers // Mar 2015

    A New Secure Mobile Cloud Architecture

    The demand and use of mobile phones, PDAs and smart phones are constantly on the rise as such, manufacturers of these devices are improving the technology and usability of these devices constantly. Due to the handy shape and size these devices come in, their processing capabilities and functionalities, they are...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Defining SPARQL with Boolean Tensor Algebra

    The Resource Description Framework (RDF) represents information as subject - predicate - object triples. These triples are commonly interpreted as a directed labelled graph. The authors propose an alternative approach, interpreting the data as a 3-way Boolean tensor. They show how SPARQL queries - the standard queries for RDF -...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Mathematical Modeling of Insurance Mechanisms for E-commerce Systems

    Electronic commerce (a.k.a. E-commerce) systems such as eBay and Taobao of Alibaba are becoming increasingly popular. Having an effective reputation system is critical to this type of internet service because it can assist buyers to evaluate the trustworthiness of sellers and it can also improve the revenue for reputable sellers...

    Provided By Cornell University

  • White Papers // Feb 2015

    Evaluation of Security Solutions for Android Systems

    With the increasing usage of Smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not always properly designed for Smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    The Affinity Effects of Parallelized Libraries in Concurrent Environments

    The use of cloud computing grows as it appears to be an additional resource for High-performance Parallel and Distributed Computing (HPDC), especially with respect to its use in support of scientific applications. Many studies have been devoted to determining the effect of the virtualization layer on the performance, but most...

    Provided By Cornell University

  • White Papers // Jan 2015

    Photometric Redshift Estimation Based on Data Mining with PhotoRApToR

    The ever growing amount of astronomical data provided by the new large scale digital surveys in a wide range of wavelengths of the electromagnetic spectrum has been challenging the way astronomers carry out their everyday analysis of astronomical sources and the authors can safely assert that the human ability to...

    Provided By Cornell University

  • White Papers // Jan 2015

    Phase-Sensitive Detection in the Undergraduate Lab Using a Low-Cost Microcontroller

    Phase-Sensitive Detection (PSD) is an important experimental technique that allows signals to be extracted from noisy data. PSD is also used in modulation spectroscopy and is used in the stabilization of optical sources. Commercial lock-in amplifiers that use PSD are often expensive and host a bewildering array of controls that...

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    Sketch and Validate for Big Data Clustering

    In response to the need for learning tools tuned to big data analytics, the present paper introduces a framework for efficient clustering of huge sets of (possibly high-dimensional) data. Building on RANdom Sampling And Consensus (RANSAC) ideas pursued earlier in a different (computer vision) context for robust regression, a suite...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation

    In this paper, the authors develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. They first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Jan 2015

    Microcontroller-based Locking in Optics Experiments

    Optics experiments critically require the stable and accurate locking of relative phases between light beams or the stabilization of Fabry-Perot cavity lengths. Here, the authors present a simple and inexpensive technique based on a stand-alone microcontroller unit to perform such tasks. Easily programmed in C language, this reconfigurable digital locking...

    Provided By Cornell University

  • White Papers // Jan 2015

    Limits on Fundamental Limits to Computation

    An indispensable part of everyone's lives, computing has also become essential to industries and governments. Steady improvements in computer hardware have been supported by periodic doubling of transistor densities in integrated circuits over the last fifty years. Such Moore scaling now requires increasingly heroic efforts, stimulating research in alternative hardware...

    Provided By Cornell University

  • White Papers // Jan 2015

    High-level Synthesis under I/O Timing and Memory Constraints

    The design of complex systems-on-chip implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper, the authors present a methodology and a tool that allow the high-level synthesis of DSP algorithm, under both I/O timing and memory constraints. Based on...

    Provided By Cornell University

  • White Papers // Jan 2015

    A Novel Architecture for Improving Performance Under Virtualized Environments

    Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Memcomputing NP-Complete Problems in Polynomial Time Using Polynomial Resources and Collective States

    Memcomputing is a novel non-Turing paradigm of computation that uses interacting memory cells (memprocessors for short) to store and process information on the same physical platform. It was recently proved mathematically that memcomputing machines have the same computational power of non-deterministic Turing machines. Therefore they can solve NP-complete problems in...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Resume Writing: Preparation- Elements Of A Resume

    Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Sep 2010

    Making Human Capital The Creative Core Of Strategy Execution

    In the face of intense competition and rapidly changing market requirements, business leaders must continually calculate how to achieve ambitious goals. They must confront economic uncertainty, environmental risk, social change and other volatile forces. To execute successfully in this difficult environment, they must embrace a new way of thinking, one...

    Provided By Cornell University

  • White Papers // Jul 2010

    The Effect Of Advertising And Deceptive Advertising On Consumption: The Case Of Over-The-Counter Weight Loss Products

    This paper is the first to estimate the impact of exposure to deceptive advertising on consumption of the advertised product and its substitutes. They study the market for over the-counter (OTC) weight-loss products, in which deceptive advertising is rampant. Strengths of the paper include matching of specific advertisements to individual...

    Provided By Cornell University

  • White Papers // Jan 2011

    Networking With Secrecy Constraints

    Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Aug 2009

    The U.S. Automotive Industry: National And State Trends In Manufacturing Employment

    The U.S. motor vehicle manufacturing industry' employs 880,000 workers, or approximately 6.6% of the U.S. manufacturing workforce, including those who work in the large motor vehicle parts manufacturing sector, as well as those who assemble motor vehicles. Since the beginning of the decade, the nation's automotive manufacturing sector has eliminated...

    Provided By Cornell University

  • White Papers // Sep 2010

    The Role Of The World Bank In Middle Income Countries

    This paper establishes some general principles of the rationale for development assistance in Middle Income Countries and then applies these principles to the operations of the World Bank. It then puts the argument through its paces for the specific case of India, which has just transitioned into middle income status....

    Provided By Cornell University

  • White Papers // May 2010

    Seawall: Performance Isolation for Cloud Datacenter Networks

    While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants share the network.&#136;is opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. This...

    Provided By Cornell University

  • White Papers // Oct 2009

    XPaXS: Improved Data Acquisition and Real-Time Analysis at CHESS

    The Scanning X-ray Fluorescence Microscopy (SFXM) capability at CHESS draws users from diverse fields, including Environmental Science, Soil Science, Anthropology and Native American Studies, Dendrochronology and Classics. When the author inherited responsibility for the F3 beamline, two of the elements essential for the success of this research program were already...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Sensor Database Systems

    Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination of stored data and sensor data. Most existing applications rely on a centralized system for collecting sensor data. These systems lack flexibility because data is extracted in...

    Provided By Cornell University

  • White Papers // Aug 2009

    Network Security and the Need to Consider Provider Coordination in Network Access Policy

    The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness - a set of properties (Including security) that guarantee that a network will behave as expected. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination,...

    Provided By Cornell University

  • White Papers // Feb 2011

    Energy and Environmental Aspects of Mobile Communication Systems

    The reduction of the energy consumptions of a Telecommunication Power System represents one of the critical factors of the telecommunication technologies, both to allow a sizeable saving of economic resources and to realize "Sustainable" development actions. The consumption of about one hundred base stations for mobile phones were monitored for...

    Provided By Cornell University

  • White Papers // Feb 2011

    A Flow-Aware Mac Protocol for a Passive Optical Metropolitan Area Network

    The paper introduces an original MAC protocol for a passive optical metropolitan area network using Time-domain Wavelength Interleaved Networking (TWIN). Optical channels are shared under the distributed control of destinations using a packet-based polling algorithm. This MAC is inspired more by EPON dynamic bandwidth allocation than the slotted, GPON-like access...

    Provided By Cornell University

  • White Papers // Apr 2010

    Self-Replicating Objects for Multicore Platforms

    The paper introduces Self-Replicating Objects (SROs), a new concurrent programming abstraction. An SRO is implemented and used much like an ordinary .NET object and can expose arbitrary user-defined APIs, but it is aggressive about automatically exploiting multicore CPUs. It does so by spontaneously and transparently partitioning its state into a...

    Provided By Cornell University

  • White Papers // Jul 2010

    Behavioral Biases Of Mutual Fund Investors

    The authors examine the effect of behavioral biases on the mutual fund choices of a large sample of U.S. discount brokerage investors using new measures of attention to news, tax awareness, and fund-level familiarity bias, in addition to behavioral and demographic characteristics of earlier studies. Behaviorally-biased investors typically make poor...

    Provided By Cornell University

  • White Papers // Aug 2009

    Is Dual Agency In Real Estate Transactions A Cause For Concern?

    The authors study dual agency in residential real estate, where the same agent/agency represents both the buyer and seller. They assess the extent to which dual agency suffers from an inherent conflict of interest, where the dual agent furthers the interest of one client at the expense of the other...

    Provided By Cornell University

  • White Papers // Mar 2011

    Sharing the Data Center Network

    While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as the authors show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. They present Seawall, a network...

    Provided By Cornell University

  • White Papers // Dec 2009

    Opportunistic Adaptation Knowledge Discovery

    Adaptation has long been considered as the Achilles' heel of case-based reasoning since it requires some domain-specific knowledge that is difficult to acquire. In this paper, two strategies are combined in order to reduce the knowledge engineering cost induced by the Adaptation Knowledge (AK) acquisition task: AK is learned from...

    Provided By Cornell University

  • White Papers // Dec 2009

    Modular Workflow Engine for Distributed Services Using Lightweight Java Clients

    In this paper the authors introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files...

    Provided By Cornell University

  • White Papers // Nov 2009

    A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks

    Research on sensor networks has become much more active and is currently being applied to many different fields. However since sensor networks are limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an...

    Provided By Cornell University

  • White Papers // Jul 2009

    Web of Lossy Adapters for Interface Interoperability: An Algorithm and NP-Completeness of Minimization

    Different services that provide similar functionality will often be accessed using widely different interfaces, especially if standardization is lacking. To avoid having to rewrite separate code for all interfaces that may have to be used, interface adapters can be used to translate calls to one interface into calls to another...

    Provided By Cornell University

  • White Papers // Jul 2009

    Optimal Routing and Power Control for a Single Cell, Dense, Ad Hoc Wireless Network

    The authors consider a dense, ad hoc wireless network, confined to a small region. The wireless network is operated as a single cell, i.e., only one successful transmission is supported at a time. Data packets are sent between source-destination pairs by multihop relaying. They assume that nodes self-organise into a...

    Provided By Cornell University

  • White Papers // Jun 2010

    Efficient Batch Update of Unique Identifiers in a Distributed Hash Table for Resources in a Mobile Host

    Resources in a distributed system can be identified using identifiers based on random numbers. When using a distributed hash table to resolve such identifiers to network locations, the straightforward approach is to store the network location directly in the hash table entry associated with an identifier. When a mobile host...

    Provided By Cornell University

  • White Papers // Jul 2009

    4G Wireless Networks: Opportunities and Challenges

    With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set...

    Provided By Cornell University

  • White Papers // Apr 2010

    Interacting Branching Processes and Linear File-Sharing Networks

    File-sharing networks are distributed systems used to disseminate files among nodes of a communication network. The general simple principle of these systems is that once a node has retrieved a file, it may become a server for this file. In this paper, the capacity of these networks is analyzed with...

    Provided By Cornell University

  • White Papers // Aug 2009

    Predictability of Fixed-Job Priority Schedulers on Heterogeneous Multiprocessor Real-Time Systems

    The multiprocessor Fixed-Job Priority (FJP) scheduling of real-time systems is studied. An important property for the schedulability analysis, the predictability (regardless to the execution times), is studied for heterogeneous multiprocessor platforms. The main contribution is to show that any FJP schedulers are predictable on unrelated platforms. A convenient consequence is...

    Provided By Cornell University

  • White Papers // Aug 2009

    Lazy Mixin Modules and Disciplined Effects

    Programming languages are expected to support programmer's effort to structure program code. The ML module system, object systems and mixins are good examples of language constructs promoting modular programming. Among the three, mixins can be thought of as a generalization of the two others in the sense that mixins can...

    Provided By Cornell University

  • White Papers // Aug 2009

    Performance Analysis Over Slow Fading Channels of a Half-Duplex Single-Relay Protocol: Decode or Quantize and Forward

    In this work, a new static relaying protocol is introduced for half duplex single-relay networks, and its performance is studied in the context of communications over slow fading wireless channels. The proposed protocol is based on a Decode or Quantize and Forward (DoQF) approach. In slow fading scenarios, two performance...

    Provided By Cornell University

  • White Papers // May 2010

    Rapid Self-Organised Initiation of Ad Hoc Sensor Networks Close Above the Percolation Threshold

    This work shows potentials for rapid self-organisation of sensor networks where nodes collaborate to relay messages to a common data collecting unit (sink node). The study problem is, in the sense of graph theory, to find a shortest path tree spanning a weighted graph. This is a well-studied problem where...

    Provided By Cornell University

  • White Papers // Jul 2011

    The Evolving Dynamics Of Global Economic Power In The Post-Crisis World: Revelations From A New Index Of Government Economic Power

    This paper develops an index for measuring the economic power of governments viewed as entities in themselves. The basic idea is to encapsulate the economic representative power of a nation's government in the international arena in as simple and parsimonious a manner as possible. For this a set of standard...

    Provided By Cornell University

  • White Papers // Aug 2009

    A Simple Model Of The Financial Crisis Of 2007-9 With Implications For The Design Of A Stimulus Package

    The financial crisis of 2007-09 began as a local problem in the mortgage finance market in the United States and Europe but, within months, escalated into a general global financial crisis, resulting in collapsing investment not just in developed nations but also in Shanghai, Rio and Mumbai, and has led...

    Provided By Cornell University