Cornell University

Displaying 1-40 of 1221 results

  • White Papers // Apr 2015

    Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks

    Network virtualization enables computing networks and Data Center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, the authors address the existing issues with the classic DC network topologies in virtualized environment and investigate a set of DC network...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Orchestrating Virtual Network Functions in NFV

    Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In...

    Provided By Cornell University

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Memory Networks

    In this paper, the authors describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Evaluation of Security Solutions for Android Systems

    With the increasing usage of Smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not always properly designed for Smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    The Affinity Effects of Parallelized Libraries in Concurrent Environments

    The use of cloud computing grows as it appears to be an additional resource for High-performance Parallel and Distributed Computing (HPDC), especially with respect to its use in support of scientific applications. Many studies have been devoted to determining the effect of the virtualization layer on the performance, but most...

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation

    In this paper, the authors develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. They first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Jan 2015

    High-level Synthesis under I/O Timing and Memory Constraints

    The design of complex systems-on-chip implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper, the authors present a methodology and a tool that allow the high-level synthesis of DSP algorithm, under both I/O timing and memory constraints. Based on...

    Provided By Cornell University

  • White Papers // Jan 2015

    A Novel Architecture for Improving Performance Under Virtualized Environments

    Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Nov 2014

    Privacy-Preserving Content-Based Image Retrieval in the Cloud

    Storage requirements for visual data have been increasing in recent years, following the emergence of many new services and applications for both personal and corporate use. This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. However, outsourcing data storage to the Cloud also leads...

    Provided By Cornell University

  • White Papers // Nov 2014

    Analysis of Memory Ballooning Technique for Dynamic Memory Management of Virtual Machines (VMs)

    Memory ballooning is dynamic memory management technique for Virtual Machines (VMs). Ballooning is a part of memory reclamation technique operations used by a hypervisor to allow the physical host system to retrieve unused memory from certain guest Virtual Machines (VMs) and share it with others. Memory ballooning allows the total...

    Provided By Cornell University

  • White Papers // Oct 2014

    Faster Algorithms for Algebraic Path Properties in RSMs with Constant Treewidth

    Interprocedural analysis is at the heart of numerous applications in programming languages, such as alias analysis, constant propagation, etc. Recursive State Machines (RSMs) are standard models for interprocedural analysis. The authors consider a general framework with RSMs where the transitions are labeled from a semiring, and path properties are algebraic...

    Provided By Cornell University

  • White Papers // Oct 2014

    A Note on Two Notions of Compliance

    Several recent papers have been devoted to the study of contracts as a way to formally specify abstractions of the behavior of software systems. A common aspect that gathers together some of these studies is a notion of compliance. This is a relation between systems which want to interact. Before...

    Provided By Cornell University

  • White Papers // Oct 2014

    Toward Sequentializing Overparallelized Protocol Code

    A promising application domain for coordination languages is programming protocols among threads in multi-core programs: coordination languages typically provide high-level constructs and abstractions that more easily compose into correct - with respect to a programmer's intentions - protocol specifications than do low-level synchronization constructs provided by conventional languages (e.g., locks...

    Provided By Cornell University

  • White Papers // Oct 2014

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Increased coupling between critical infrastructure networks, such as power and communications, has important implications for the reliability and security of these networks. To understand the implications of power-communications coupling, researchers have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient LTE Access with Collision Resolution for Massive M2M Communications

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the Random Access CHannel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this paper, the authors propose a LTE...

    Provided By Cornell University

  • White Papers // Oct 2014

    Statistical Models for Cores Decomposition of Undirected Random Graphs

    The authors develop a rigorous and interpretable statistical model for networks using their shell structure to construct minimal sufficient statistics. The model provides the formalism necessary for using k-cores in statistical considerations of random graphs, and in particular social networks. It cannot be specialized to any known degree-centric model and...

    Provided By Cornell University

  • White Papers // Oct 2014

    Pricing in Social Networks with Negative Externalities

    The authors study the problems of pricing an indivisible product to consumers who are embedded in a given social network. The goal is to maximize the revenue of the seller. They assume impatient consumers who buy the product as soon as the seller posts a price not greater than their...

    Provided By Cornell University

  • White Papers // Oct 2014

    Hierarchical Sequencing of Online Social Graphs

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, the authors investigate in-depth topology of online social network which is based on MySpace dialogs....

    Provided By Cornell University

  • White Papers // Oct 2014

    Effects of Social Influence in Peer Online Recommendation

    Website providers often use peer recommendation to help people find interesting content. A common method for leveraging opinions of others on these web sites is to display the number of prior recommendations as a social signal. How people react to these social influence signals, in combination with other effects, such...

    Provided By Cornell University

  • White Papers // Oct 2014

    Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths

    The authors introduce several novel and computationally efficient methods for detecting \"Core-periphery structure\" in networks. Core-periphery structure is a type of meso-scale structure that includes densely-connected core vertices and sparsely-connected peripheral vertices. Core vertices are well-connected both among themselves and to peripheral vertices, which are not well-connected to any vertices....

    Provided By Cornell University

  • White Papers // Oct 2014

    Quantum Clouds: A Future Perspective

    Quantum computing and cloud computing are two gaints for futuristic computing. Both technologies complement each other. Quantum clouds, therefore, is deploying the resources of quantum computation in a cloud environment to provide solution to the challenges and problems faced by present model of classical cloud computation. State of the art...

    Provided By Cornell University

  • White Papers // Oct 2014

    Capacity Analysis of Decoupled Downlink and Uplink Access in 5G Heterogeneous Systems

    The peoples' traditional notion of a cell is changing dramatically given the increasing degree of heterogeneity in 4G and emerging 5G systems. Rather than belonging to a specific cell, a device would choose the most suitable connection from the plethora of connections available. In such a setting, given the transmission...

    Provided By Cornell University

  • White Papers // Oct 2014

    Efficient Key Generation for Dynamic Blom's Scheme

    The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom's scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, the authors...

    Provided By Cornell University

  • White Papers // Oct 2014

    Repairable Threshold Secret Sharing Schemes

    In this paper, the authors propose a class of new threshold secret sharing schemes with repairing function between shares. Specifically, each share, when it is broken or lost, can be repaired by some others without the help of the dealer. Further, a construction of such repairable threshold secret sharing schemes...

    Provided By Cornell University

  • White Papers // Oct 2014

    Timed Influence: Computation and Maximization

    The authors consider a cost model for diffusion in a network that captures both the scope of infection and its propagation time: the edges of the network have associated lengths which model transmission times, and influence scores are higher for faster propagation. They propose an intuitive measure of timed influence,...

    Provided By Cornell University

  • White Papers // Oct 2014

    Probabilistic Definitions of Actual Causation Using CP-logic

    Since Pearl's seminal work on providing a formal language for causality, the subject has garnered a lot of interest among philosophers and researchers in artificial intelligence alike. One of the most debated topics in this context regards the notion of actual causation, which concerns itself with specific - as opposed...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Sep 2006

    Dynamic Capacity-Speed Tradeoffs in SMT Processor Caches

    Caches are designed to provide the best tradeoff between access speed and capacity for a set of target applications. Unfortunately, different applications, and even different phases within the same application, may require a different capacity-speed tradeoff. This problem is exacerbated in a Simultaneous Multi-Threaded (SMT) processor where the optimal cache...

    Provided By Cornell University

  • White Papers // Oct 2013

    C2MS: Dynamic Monitoring and Management of Cloud Infrastructures

    Server clustering is a common design principle employed by many organizations that require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the service they provide whether it is the applications installed the role of the server or server accessibility for example. In order...

    Provided By Cornell University

  • White Papers // Jun 2014

    Integration of a Predictive, Continuous Time Neural Network Into Securities Market Trading Operations

    In this paper, the authors have presented an example of deep learning, namely the integration of a predictive, continuous time recurrent neural network into trading and risk assessment operations. During application within a trading environment the potential need to adapt technical analysis indicators that their use might be continued and...

    Provided By Cornell University

  • White Papers // Nov 2013

    Parallel Tempering Simulation of the three-dimensional Edwards-Anderson Model with Compact Asynchronous Multispin Coding on GPU

    Monte Carlo simulations of the Ising model play an important role in the field of computational statistical physics, and they have revealed many properties of the model over the past few decades. However, the effect of frustration due to random disorder, in particular the possible spin glass phase, remains a...

    Provided By Cornell University

  • White Papers // Dec 2013

    Early Observations on Performance of Google Compute Engine for Scientific Computing

    Although cloud computing emerged for business applications in industry, public cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific...

    Provided By Cornell University

  • White Papers // Jun 2014

    A Tale of Two Data-Intensive Paradigms: Applications, Abstractions, and Architectures

    Scientific problems that depend on processing large amounts of data require overcoming challenges in multiple areas: managing large-scale data distribution, co-placement and scheduling of data with compute resources, and storing and transferring large volumes of data. The authors analyze the ecosystems of the two prominent paradigms for data-intensive applications, hereafter...

    Provided By Cornell University

  • White Papers // Feb 2012

    MORSE: Multi-objective Reconfigurable Self-optimizing Memory Scheduler

    Modern high-performance memory subsystems support a high degree of concurrency. This is primarily accomplished by increasing the number of independent channels and/or increasing the number of independent banks in a channel. The authors propose a systematic and general approach to designing self-optimizing memory schedulers that can target arbitrary figures of...

    Provided By Cornell University

  • White Papers // Apr 2014

    GraphGen: An FPGA Framework for Vertex-Centric Graph Computation

    Vertex-centric graph computations are widely used in many machine learning and data mining applications that operate on graph data structures. This paper presents GraphGen, a vertex-centric framework that targets FPGA for hardware acceleration of graph computations. GraphGen accepts a vertex-centric graph specification and automatically compiles it onto an application-specific synthesized...

    Provided By Cornell University

  • White Papers // Jun 2008

    Shared Reconfigurable Architectures for CMPS

    In this paper, the authors investigate reconfigurable architectures suitable for Chip Multi-Processors (CMPs). Prior research has established that augmenting a conventional processor with reconfigurable logic can dramatically improve the performance of certain application classes, but this comes at nontrivial power and area costs. Given substantial observed time and space differences...

    Provided By Cornell University

  • White Papers // Sep 2010

    ReMAP: A Reconfigurable Heterogeneous Multicore Architecture

    In this paper, the authors present ReMAP, a reconfigurable architecture geared towards accelerating and parallelizing applications within a heterogeneous CMP. In ReMAP, threads share a common reconfigurable fabric that can be configured for individual thread computation or fine-grained communication with integrated computation. The architecture supports both fine-grained point-to-point communication for...

    Provided By Cornell University

  • White Papers // Jun 2010

    Dynamic Power Redistribution in Failure Prone CMPs

    Future Chip Multi-Processors (CMPs) will be capable of deconfiguring faulty units in order to permit continued operation in the presence of wear-out failures. However, the unforeseen downside is pipeline imbalance due to other portions of the pipeline now being over provisioned with respect to the deconfigured functionality. The authors propose...

    Provided By Cornell University

  • White Papers // Mar 2008

    Scheduling Algorithms for Unpredictably Heterogeneous CMP Architectures

    In future large-scale multi-core microprocessors, hard errors and process variations will create dynamic heterogeneity, causing performance and power characteristics to differ among the cores in an unanticipated manner. Under this scenario, naive assignments of applications to cores degraded by various faults and variations may result in large performance losses and...

    Provided By Cornell University

  • White Papers // Feb 2014

    Hardware Generation Languages as a Foundation for Credible, Reproducible, and Productive Research Methodologies

    Cycle-Approximate Simulators (CAS) have long been a staple in the experimental toolkit of computer architecture researchers. However, recent technology trends have triggered a growing emphasis on specialization and heterogeneity, bringing into question the viability of a purely CAS-based methodology. In this paper, the authors argue computer architects should consider adopting...

    Provided By Cornell University

  • White Papers // May 2014

    Bargaining-Based Mobile Data Offloading

    The unprecedented growth of mobile data traffic challenges the performance and economic viability of today's cellular networks, and calls for novel network architectures and communication solutions. Data offloading through third-party WiFi or femtocell Access Points (APs) can effectively alleviate the cellular network congestion in a low operational and capital expenditure....

    Provided By Cornell University

  • White Papers // Apr 2014

    Web Log Data Analysis by Enhanced Fuzzy C Means Clustering

    World Wide Web is a huge repository of information and there is a tremendous increase in the volume of information daily. The number of users is also increasing day by day. To reduce users browsing time lot of research is taken place. Web Usage Mining is a type of web...

    Provided By Cornell University

  • White Papers // May 2014

    The SQL++ Semi-structured Data Model and Query Language: A Capabilities Survey of SQL-on-Hadoop, NoSQL and NewSQL Databases

    Numerous SQL-on-Hadoop, NewSQL and NoSQL databases provide semi-structured data model and query language capabilities, but it is difficult to compare these capabilities. Many differences between the data models and (especially) between the query languages are superficial, but nonetheless distract from the essential differences. Other query language differences are direct derivatives...

    Provided By Cornell University

  • White Papers // Feb 2014

    Parallel Wisard Object Tracker: A Ram-Based Tracking System

    This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is an important and challenging task in many applications. Difficulties can arise due to weather conditions, target trajectory and appearance,...

    Provided By Cornell University

  • White Papers // May 2014

    Emulated ASIC Power and Temperature Monitor System for FPGA Prototyping of an Invasive MPSoC Computing Architecture

    In this contribution the emulation of an ASIC Temperature and Power Monitoring system (TPMon) for FPGA prototyping is presented and tested to control processor temperatures under different control targets and operating strategies. The approach for emulating the power monitor is based on an instruction-level energy model. For emulating the temperature...

    Provided By Cornell University

  • White Papers // Feb 2014

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor

    Control Loop Feedback Mechanism for Generic Array Logic Chip Multiprocessor is presented. The approach is based on control-loop feedback mechanism to maximize the efficiency on exploiting available resources such as CPU time, operating frequency, etc. Each Processing Element (PE) in the architecture is equipped with a frequency scaling module responsible...

    Provided By Cornell University

  • White Papers // Feb 2014

    Energy and Latency Aware Application Mapping Algorithm & Optimization for Homogeneous 3d Network on Chip

    Energy efficiency is one of the most critical issues in design of System on Chip. In Network-on-Chip (NoC) based system, energy consumption is influenced dramatically by mapping of Intellectual Property (IP) which affect the performance of the system. In this paper, the authors test the antecedently extant proposed algorithms and...

    Provided By Cornell University

  • White Papers // Apr 2014

    Estimation of Optimized Energy and Latency Constraint for Task Allocation in 3D Network on Chip

    In Network on Chip (NoC) rooted system, energy consumption is affected by task scheduling and allocation schemes which affect the performance of the system. In this paper, the authors test the pre-existing proposed algorithms and introduced a new energy skilled algorithm for 3D NoC architecture. An efficient dynamic and cluster...

    Provided By Cornell University

  • White Papers // May 2014

    Full-Duplex Cloud Radio Access Networks: An Information-Theoretic Viewpoint

    The conventional design of cellular systems prescribes the separation of uplink and downlink transmissions via time-division or frequency-division duplex. Recent advances in analog and digital domain self-interference interference cancellation challenge the need for this arrangement and open up the possibility to operate base stations, especially low-power ones, in a full-duplex...

    Provided By Cornell University

  • White Papers // Apr 2014

    Towards Cloud Computing: A Swot Analysis on Its Adoption in SMEs

    Over the past few years, emergence of cloud computing has notably made an evolution in the IT industry by putting forward an 'Everything as a service' idea .Cloud computing is of growing interest to companies throughout the world, but there are many barriers associated with its adoption which should be...

    Provided By Cornell University

  • White Papers // May 2014

    NScale: Neighborhood-Centric Large-Scale Graph Analytics in the Cloud

    There is an increasing interest in executing rich and complex analysis tasks over large-scale graphs, many of which require processing and reasoning about a large number of multi-hop neighborhoods or sub-graphs in the graph. Examples of such tasks include ego network analysis, motif counting, finding social circles, personalized recommendations, link...

    Provided By Cornell University

  • White Papers // May 2014

    NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security

    Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach cannot...

    Provided By Cornell University

  • White Papers // Apr 2014

    Intelligent Resource Allocation Technique For Desktop-as-a-Service in Cloud Environment

    The specialty of desktop-as-a-service cloud computing is that user can access their desktop and can execute applications in virtual desktops on remote servers. Resource management and resource utilization are most significant in the area of desktop-as-a-service, cloud computing; however, handling a large amount of clients in the most efficient manner...

    Provided By Cornell University

  • White Papers // Apr 2014

    Automated Classification of Airborne Laser Scanning Point Clouds

    Making sense of the physical world has always been at the core of mapping. Up until recently, this has always dependent on using the human eye. Using airborne lasers, it has become possible to quickly \"See\" more of the world in many more dimensions. The resulting enormous point clouds serve...

    Provided By Cornell University

  • White Papers // Apr 2014

    CernVM Online and Cloud Gateway: A Uniform Interface for CernVM Contextualization and Deployment

    In a virtualized environment, contextualization is the process of configuring a VM instance for the needs of various deployment use cases. Contextualization in CernVM can be done by passing a handwritten context to the user data field of cloud APIs, when running CernVM on the cloud, or by using CernVM...

    Provided By Cornell University

  • White Papers // Feb 2014

    A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment

    Cloud computing is a new trend emerging in IT environment with huge requirements of infrastructure and resources. Load Balancing is an important aspect of cloud computing environment. Efficient load balancing scheme ensures efficient resource utilization by provisioning of resources to cloud user's on-demand basis in pay-as-you-say-manner. Load Balancing may even...

    Provided By Cornell University

  • White Papers // Dec 2013

    A Survey on Cloud Security Issues and Techniques

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and...

    Provided By Cornell University

  • White Papers // Mar 2014

    Design Architecture-Based on Web Server and Application Cluster in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By Cornell University

  • White Papers // May 2014

    Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems

    In a wireless storage system, having to communicate over a fading channel makes repair transmissions prone to physical layer errors. The first approach to combat fading is to utilize the existing optimal space-time codes. However, it was recently pointed out that such codes are in general too complex to decode...

    Provided By Cornell University

  • White Papers // May 2014

    Repair for Distributed Storage Systems in Packet Erasure Networks

    Reliability is essential for storing files in many applications of distributed storage systems. To maintain reliability, when a storage node fails, a new node should be regenerated by a repair process. Most of the previous results on the repair problem assume perfect (error-free) links in the networks. However, in practice,...

    Provided By Cornell University

  • White Papers // Apr 2014

    Computing an Optimal Control Policy for an Energy Storage

    The authors introduce StoDynProg, a small library created to solve Optimal Control problems arising in the management of Renewable Power Sources, in particular when coupled with an Energy Storage System. The library implements generic Stochastic Dynamic Programming (SDP) numerical methods which can solve a large class of Dynamic Optimization problems....

    Provided By Cornell University

  • White Papers // Jul 2008

    Teaching Network Storage Technology- Assessment Outcomes and Directions

    Technologically, gap between processors' speed and access time on individual disks is widening and network access to combined disk storage with its promise of high bandwidth to mask latency, lead to the rapid development of a set of distinct storage technologies commonly named Networked Storage Technology. The Networked Storage Technology...

    Provided By Cornell University

  • White Papers // Mar 2014

    Readout Optical System of Sapphire Disks Intended for Long-Term Data Storage

    The development of long-term data storage technology is one of the urging problems of the time. This paper presents the results of implementation of technical solution for long-term data storage technology proposed a few years ago on the basis of single crystal sapphire. It is shown that the problem of...

    Provided By Cornell University

  • White Papers // Mar 2014

    Applying Mathematical Models in Cloud Computing: A Survey

    As more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. It is better to prevent security threats before they enter into the systems and there is no way how this can be prevented...

    Provided By Cornell University