Cornell University

Displaying 481-520 of 1113 results

  • White Papers // Feb 2012

    Codes Can Reduce Queueing Delay in Data Centers

    In this paper, the authors quantify how much codes can reduce the data retrieval latency in storage systems. By combining a simple linear code with a novel request scheduling algorithm, which they call Blocking-one Scheduling (BoS), they show analytically that it is possible to reduce data retrieval delay by up...

    Provided By Cornell University

  • White Papers // Feb 2012

    Web Services-Enhanced Agile Modeling and Integrating Business Processes

    In a global business context with continuous changes, the enterprises have to improve their productivity and their brand image according to a given strategy. The authors are expected to face big challenges in order to overcome hard competition and meet the growing demands of clients. Indeed, they should capitalize on...

    Provided By Cornell University

  • White Papers // Feb 2012

    SSCADA: Securing SCADA Infrastructure Communications

    Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA) systems were developed to reduce labor costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water, and wastewater industries. While control...

    Provided By Cornell University

  • White Papers // Feb 2012

    Investigation to Implicate Data on Clouds

    Cloud computing can and does mean different things to different people. The common characteristics most shares are on-demand secure access to metered services from nearly anywhere and dislocation of data from inside to outside the organization. Vision of cloud computing as a new IT procurement model. The system lifecycle, risks...

    Provided By Cornell University

  • White Papers // Feb 2012

    Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In...

    Provided By Cornell University

  • White Papers // Feb 2012

    Exact Scalar Minimum Storage Coordinated Regenerating Codes

    Codes allow to implement redundancy in distributed storage systems so that device failures do no hurt the whole system. Yet, to keep preventing failures, once failures have occurred, codes must be repaired: the redundancy level must be kept above some minimum level. The naive approach to repairing codes consists in...

    Provided By Cornell University

  • White Papers // Feb 2012

    MORSE: Multi-objective Reconfigurable Self-optimizing Memory Scheduler

    Modern high-performance memory subsystems support a high degree of concurrency. This is primarily accomplished by increasing the number of independent channels and/or increasing the number of independent banks in a channel. The authors propose a systematic and general approach to designing self-optimizing memory schedulers that can target arbitrary figures of...

    Provided By Cornell University

  • White Papers // Feb 2012

    Secure and Reliable Routing in Mobile Adhoc Networks

    The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can benefit from anywhere and at any time for impromptu collaboration. However, energy constrained nodes, low channel bandwidth, node mobility, high channel error rates, channel variability and packet loss...

    Provided By Cornell University

  • White Papers // Feb 2012

    A Comparative Study on the Performance of the Top DBMS Systems

    Database management systems are today's most reliable mean to organize data into collections that can be searched and updated. However, many DBMS systems are available on the market each having their pros and cons in terms of reliability, usability, security, and performance. This paper presents a comparative study on the...

    Provided By Cornell University

  • White Papers // Feb 2012

    An Efficient Method for Multichannel Wireless Mesh Networks With Pulse Coupled Neural Network

    Multi cast communication is a key technology for wireless mesh networks. Multicast provides efficient data distribution among a group of nodes, Generally sensor networks and MANETs uses multicast algorithms which are designed to be energy efficient and to achieve optimal route discovery among mobile nodes whereas wireless mesh networks needs...

    Provided By Cornell University

  • White Papers // Feb 2012

    Semantic-Sensitive Web Information Retrieval Model for HTML Documents

    With the advent of the Internet, a new era of digital information exchange has begun. Currently, the Internet encompasses more than five billion online sites and this number is exponentially increasing every day. Fundamentally, Information Retrieval (IR) is the science and practice of storing documents and retrieving information from within...

    Provided By Cornell University

  • White Papers // Jan 2012

    Timely Throughput of Heterogeneous Wireless Networks: Fundamental Limits and Algorithms

    Consumer demand for data services over wireless networks has increased dramatically in recent years, fueled both by the success of online video streaming and popularity of video-friendly mobile devices like smartphones and tablets. This confluence of trends is expected to continue and lead to several fold increase in traffic over...

    Provided By Cornell University

  • White Papers // Jan 2012

    Wireless Capacity and Admission Control in Cognitive Radio

    The authors give algorithms with constant-factor performance guarantees for several capacity and throughput problems in the SINR model. The algorithms are all based on a novel LP formulation for capacity problems. First, they give a new constant-factor approximation algorithm for selecting the maximum subset of links that can be scheduled...

    Provided By Cornell University

  • White Papers // Jan 2012

    Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    This paper introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data...

    Provided By Cornell University

  • White Papers // Jan 2012

    Combined Haar-Hilbert and Log-Gabor Based Iris Encoders

    This paper shows that combining Haar-Hilbert and Log-Gabor improves iris recognition performance leading to a less ambiguous biometric decision landscape in which the overlap between the experimental intra- and interclass score distributions diminishes or even vanishes. Haar-Hilbert, Log-Gabor and combined Haar-Hilbert and Log-Gabor encoders are tested here both for single...

    Provided By Cornell University

  • White Papers // Jan 2012

    Stability of the Max-Weight Protocol in Adversarial Wireless Networks

    In this paper, the authors consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of attention dating back to the papers of Tassiulas and Ephremides. In particular, this protocol is known to be throughput-optimal whenever the traffic...

    Provided By Cornell University

  • White Papers // Jan 2012

    Deducing Security Goals From Shape Analysis Sentences

    Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a...

    Provided By Cornell University

  • White Papers // Jan 2012

    The Capacity Region of the Restricted Two-Way Relay Channel with Any Deterministic Uplink

    The Two-Way Relay Channel (TWRC), where two users exchange data through a relay, was first investigated by Wu et al.. In this model the users cannot communicate directly and must exchange data by first transmitting to the relay, called the uplink. In this paper, the authors consider the Two-Way Relay...

    Provided By Cornell University

  • White Papers // Jan 2012

    Holographic Grid Cloud, a Futurable High Storage Technology for the Next Generation Astronomical Facilities

    In the immediate future holographic technology will be available to store a very large amount of data in HVD (Holographic Versatile Disk) devices. This technology make extensive use of the WORM (Write-Once-Read-Many) paradigm: this means that such devices allow for a simultaneous and parallel reading of millions of volumetric pixels...

    Provided By Cornell University

  • White Papers // Jan 2012

    A Theoretical and Empirical Evaluation of Software Component Search Engines, Semantic Search Engines and Google Search Engine in the Context of COTS-Based Development

    COTS-based development is a component reuse approach promising to reduce costs and risks, and ensure higher quality. The growing availability of COTS components on the Web has concretized the possibility of achieving these objectives. In this multitude, a recurrent problem is the identification of the COTS components that best satisfy...

    Provided By Cornell University

  • White Papers // Jan 2012

    Secure SQL Server - Enabling Secure Access to Remote Relational Data

    The Secure SQL Server - SecSS, is a technology primarily developed to enable self service governance of states, as described in (Paulin 2012). Self service governance is a novel model of governance that rejects service based public administration and instead proposes that governed subjects manage their legal relations in a...

    Provided By Cornell University

  • White Papers // Jan 2012

    Optimal Distributed Power Allocation for Decode-and-Forward Relay Networks

    This paper presents a fully distributed power allocation algorithm for Decode-and-Forward (DF) relay networks with a large number of sources, relays, and destination nodes. The well-known mathematical decomposition based distributed optimization techniques cannot directly be applied to DF relay networks, because the achievable rate of DF relaying is not strictly...

    Provided By Cornell University

  • White Papers // Jan 2012

    Performance Analysis of Sequential Method for Handover in Cognitive Radio Networks

    Powerful spectrum handover schemes enable Cognitive Radios (CRs) to use transmission opportunities in primary users' channels appropriately. In this paper, the authors consider the cognitive access of primary channels by a Secondary User (SU). They evaluate the average detection time and the maximum achievable average throughput of the SU when...

    Provided By Cornell University

  • White Papers // Jan 2012

    ProofPeer - A Cloud-Based Interactive Theorem Proving System

    Interactive Theorem Proving (ITP) has a long history. Most of that history, starting roughly around 1970, can be traced back to three systems: Automath, Edinburgh LCF, and Mizar. Probably the most popular ITP systems these days are Isabelle and Coq. Isabelle is a descendant of Edinburgh LCF. Its declarative extension...

    Provided By Cornell University

  • White Papers // Jan 2012

    Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks

    The objective of this paper is to increase life time of homogeneous Wireless Sensor Networks (WSNs) through minimizing long range communication and energy balancing. Sensor nodes are resource constrained particularly with limited energy that is difficult o r impossible to replenish. LEACH (Low Energy Adaptive Clustering Hierarchy) is most well...

    Provided By Cornell University

  • White Papers // Jan 2012

    Securing Mobile Ad Hoc Networks

    The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc NETworking (MANET) technology. Those infrastructureless, self-organized networks that either operate autonomously or as an extension to the wired networking infrastructure, are expected to support new MANET-based applications. However, the proliferation of this...

    Provided By Cornell University

  • White Papers // Jan 2012

    Building Sustainable Ecosystem-Oriented Architectures

    Currently, organizations are transforming their business processes into e-services and service-oriented architectures to improve coordination across sales, marketing, and partner channels, to build flexible and scalable systems, and to reduce integration-related maintenance and development costs. However, this new paradigm is still fragile and lacks many features crucial for building sustainable...

    Provided By Cornell University

  • White Papers // Jan 2012

    Novel Component-Based Development Model for SIP-Based Mobile Application (1202)

    Universities and Institutions these days' deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in different institutions to examining the ability of an individual, starting from manual means of using paper and pencil to electronic, from oral to written,...

    Provided By Cornell University

  • White Papers // Jan 2012

    Mapping Relational Database Into OWL Structure with Data Semantic Preservation

    This paper proposes a solution for migrating an RDB into Web semantic. The solution takes an existing RDB as input, and extracts its Metadata representation (MTRDB). Based on the MTRDB, a Canonical Data Model (CDM) is generated. Finally, the structure of the classification scheme in the CDM model is converted...

    Provided By Cornell University

  • White Papers // Jan 2012

    Autonomic HTML Interface Generator for Web Applications

    Recent advances in computing systems have led to a new digital era in which every area of life is nearly interrelated with information technology. However, with the trend towards large-scale IT systems, a new challenge has emerged. The complexity of IT systems is becoming an obstacle that hampers the manageability,...

    Provided By Cornell University

  • White Papers // Dec 2011

    Transferring Voice Using SMS Over GSM Network

    In this paper, the authors present a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA...

    Provided By Cornell University

  • White Papers // Dec 2011

    A Pairwise Abstraction for Round-Based Protocols

    Distributed systems are hard to program, for a number of reasons. Some of these reasons are inherent. System state is scattered across multiple nodes, and is not random access. Bandwidth is an ever-present concern. Fault tolerance is much more complicated in a partial-failure model. This presents both a challenge and...

    Provided By Cornell University

  • White Papers // Dec 2011

    Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU

    In this paper, the authors present a new PseudoRandom Number Generator (PRNG) on Graphics Processing Units (GPU). This PRNG is based on the so-called chaotic iterations. It is firstly proven to be chaotic according to the Devaney's formulation. They thus propose an efficient implementation for GPU that successfully passes the...

    Provided By Cornell University

  • White Papers // Dec 2011

    Design of Wireless Electronic Stethoscope Based on Zigbee

    Heart sound stethoscope is primary stage to access diseases. In this paper design of an electronic stethoscope with the functions of wireless transmission is discussed. This electronic stethoscope based on embedded processor. The data can be transmitted through wireless transmission using Zigbee module. A microphone is used to pick up...

    Provided By Cornell University

  • White Papers // Dec 2011

    Employees Adoption of E-Procurement System: An Empirical Study

    Today, organizations are investing a lot in their IT infrastructure and reengineering their business processes by digitizing firms. If organizational employees will not optimum utilize its IT infrastructure, the productivity gain reduced enormously. In Uttarakhand e-procurement system implemented by public sector under e-governance integrated mission mode projects. So, there is...

    Provided By Cornell University

  • White Papers // Dec 2011

    The Dispersion of Joint Source-Channel Coding

    In this paper the authors investigate the behavior of the distortion threshold that can be guaranteed in joint source-channel coding, to within a prescribed excess-distortion probability. They show that the gap between this threshold and the optimal average distortion is governed by a constant that they call the joint source-channel...

    Provided By Cornell University

  • White Papers // Dec 2011

    Models of Quantum Computation and Quantum Programming Languages

    The goal of this paper is to provide an introduction to the basic computational models used in quantum information theory. The authors review various models of quantum Turing machine, quantum circuits and Quantum Random Access Machine (QRAM) along with their classical counterparts. They also provide an introduction to quantum programming...

    Provided By Cornell University

  • White Papers // Dec 2011

    Speech Recognition: Increasing Efficiency of Support Vector Machines

    With the advancement of communication and security technologies, it has become crucial to have robustness of embedded biometric systems. This paper presents the realization of such technologies which demands reliable and error-free biometric identity verification systems. High dimensional patterns are not permitted due to eigen-decomposition in high dimensional feature space...

    Provided By Cornell University

  • White Papers // Dec 2011

    Information Hiding in CSS : A Secure Scheme Text-Steganography Using Public Key Cryptosystem

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS...

    Provided By Cornell University

  • White Papers // Nov 2011

    Open Source CRM Systems for SMEs

    Customer Relationship Management (CRM) systems are very common in large companies. However, CRM systems are not very common in Small and Medium Enterprises (SMEs). Most SMEs do not implement CRM systems due to several reasons, such as lack of knowledge about CRM or lack of financial resources to implement CRM...

    Provided By Cornell University

  • White Papers // Aug 2012

    Instantly Decodable Versus Random Linear Network Coding: A Comparative Framework for Throughput and Decoding Delay Performance

    This paper explains the tension between throughput and decoding delay performance of two widely-used network coding schemes: Random Linear Network Coding (RLNC) and Instantly Decodable Network Coding (IDNC). A single-hop broadcasting system model is considered that aims to deliver a block of packets to all receivers in the presence of...

    Provided By Cornell University

  • White Papers // Jul 2012

    Coding Delay Analysis of Dense and Chunked Network Codes Over Line Networks

    In this paper, the authors analyze the coding delay and the average coding delay of random linear network codes (a.k.a. dense codes) and Chunked Codes (CC), which are an attractive alternative to dense codes due to their lower complexity, over line networks with Bernoulli losses and deterministic regular or Poisson...

    Provided By Cornell University

  • White Papers // Mar 2013

    Building Blocks of Physical-Layer Network Coding

    This paper investigates the fundamental building blocks of Physical-layer Network Coding (PNC). Since its conception, PNC has developed into a subfield of network coding investigated by many. Most of the prior work, however, focused on the simplest communication setup in which PNC could be applied, namely the Two-Way-Relay Channel (TWRC)....

    Provided By Cornell University

  • White Papers // Jul 2012

    Efficient Feedback-Based Scheduling Policies for Chunked Network Codes Over Networks with Loss and Delay

    The problem of designing efficient feedback-based scheduling policies for Chunked Codes (CC) over packet networks with delay and loss is considered. For networks with feedback, two scheduling policies, referred to as Random Push (RP) and Local-Rarest-First (LRF), already exist. The authors propose a new scheduling policy, referred to as minimum-Distance-First...

    Provided By Cornell University

  • White Papers // Jul 2012

    On the Capacity Region of Two-User Linear Deterministic Interference Channel and Its Application to Multi-Session Network Coding

    In this paper, the authors study the capacity of the two-user Multiple-Input Multiple-Output (MIMO) linear deterministic Interference Channel (IC), with possible correlations within/between the channel matrices. The capacity region is characterized in terms of the rank of the channel matrices. It is shown that linear precoding with Han-Kobayashi type of...

    Provided By Cornell University

  • White Papers // Feb 2012

    The Xen-Blanket: Virtualize Once, Run Everywhere

    Current Infrastructure as a Service (IaaS) clouds operate in isolation from each other. Slight variations in the Virtual Machine (VM) abstractions or underlying hypervisor services prevent unified access and control across clouds.While standardization efforts aim to address these issues, they will take years to be agreed upon and adopted, if...

    Provided By Cornell University

  • White Papers // Jan 2011

    Virtual Machines and Networks-Installation, Performance Study, Advantages and Virtualization Options

    The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions...

    Provided By Cornell University

  • White Papers // Apr 2013

    Power-Efficient Assignment of Virtual Machines to Physical Machines

    Motivated by current trends in cloud computing, the authors explain study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency they say that a set of Virtual Machines (VMs) is assigned to a...

    Provided By Cornell University

  • White Papers // Nov 2011

    Open Source CRM Systems for SMEs

    Customer Relationship Management (CRM) systems are very common in large companies. However, CRM systems are not very common in Small and Medium Enterprises (SMEs). Most SMEs do not implement CRM systems due to several reasons, such as lack of knowledge about CRM or lack of financial resources to implement CRM...

    Provided By Cornell University

  • White Papers // Feb 2008

    Leveraging Information Technology, Social Entrepreneurship, and Global Collaboration for Just Sustainable Development

    Currently, those working for a sustainable development in a vast array of contexts all over the world are often duplicating efforts. In an era where a rapid transition towards sustainability is needed, such wasted effort is no longer tolerable. This paper will discuss current work to overcome this challenge by...

    Provided By Cornell University

  • White Papers // May 2013

    Endow a Service-Oriented Architecture by a Decisional Aspect

    SOA architecture is more and more used in the companies, The importance of the service orientation and its advantages with the information system of the company, confront one to a new challenge. It is primarily to ensure the decisional aspect of the information system of company by adopting Ser-vices Orientated...

    Provided By Cornell University

  • White Papers // Aug 2011

    SLALOM: A Language for SLA Specification and Monitoring

    IT services provisioning is usually underpinned by Service Level Agreements (SLAs), aimed at guaranteeing services quality. However, there is a gap between the customer perspective (business oriented) and that of the service provider (implementation oriented) that becomes more evident while defining and monitoring SLAs. This paper proposes a domain specific...

    Provided By Cornell University

  • White Papers // Mar 2012

    Originator Usage Control With Business Process Slicing

    Originator Control allows information providers to define the information re-dissemination condition. Combined with usage control policy, fine-grained 'Downstream usage control' can be achieved, which specifies what attributes the downstream consumers should have and how data is used. This paper discusses originator usage control, paying particular attention to enterprise-level dynamic business...

    Provided By Cornell University

  • White Papers // Aug 2012

    Business Intelligence: A Rapidly Growing Option through Web Mining

    The World Wide Web is a popular and interactive medium to distribute information in this scenario. The web is huge, diverse, ever changing, widely disseminated global information service center. The authors are familiar with terms like e-commerce, e-governance, e-market, e-finance, e-learning, e-banking etc. for an organization it is new challenge...

    Provided By Cornell University

  • White Papers // Jul 2011

    Semantic-Ontological Combination of Business Rules and Business Processes in IT Service Management

    IT Service Management deals with managing a broad range of items related to complex system environments. As there is both, a close connection to business interests and IT infrastructure, the application of semantic expressions which are seamlessly integrated within applications for managing ITSM environments, can help to improve transparency and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Security Issues on Cloud Computing

    The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be...

    Provided By Cornell University

  • White Papers // May 2012

    On the Security of Arbitrated Quantum Signature Schemes

    Due to potential capability of providing unconditional security, Arbitrated Quantum Signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were crypt analyzed and improved. In this paper, the authors analyze security property of...

    Provided By Cornell University

  • White Papers // Sep 2011

    A Contribution to Secure the Routing Protocol \"Greedy Perimeter Stateless Routing'' Using a Symmetric Signature-Based AES and MD5 Hash

    In this paper, the authors present a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, they examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, they propose a solution to...

    Provided By Cornell University

  • White Papers // Sep 2012

    Managing Complex Structured Data In a Fast Evolving Environment

    Criminal data comes in a variety of formats, mandated by state, federal, and international standards. Specifying the data in a unified fashion is necessary for any system that intends to integrate with state, federal, and international law enforcement agencies. However, the contents, format, and structure of the data is highly...

    Provided By Cornell University

  • White Papers // Mar 2013

    URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme

    Design efficient lattice-based cryptosystem secure against adaptive Chosen Ciphertext Attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based cryptosystems achieved by using a generic transformations such as either Strongly Unforgeable One-Time Signature Schemes (SU-OT-SS), or a Message Authentication Code (MAC) and weak form of...

    Provided By Cornell University

  • White Papers // Feb 2008

    Rethinking OpenPGP PKI and OpenPGP Public Keyserver

    OpenPGP, an IETF Proposed Standard based on PGP R application, has its own Public Key Infrastructure (PKI) architecture which is different from the one based on X.509, another standard from ITU. This paper describes the OpenPGP PKI; the historical perspective as well as its current use. The authors also compare...

    Provided By Cornell University

  • White Papers // Oct 2012

    Evaluation of Distributed Intelligence on the Smart Card

    The authors describe challenges in the risk management of smart card based electronic cash industry and describe a method to evaluate the effectiveness of distributed intelligence on the smart card. More specifically, they discuss the evaluation of distributed intelligence function called \"On-chip risk management\" of the smart card for the...

    Provided By Cornell University

  • White Papers // May 2013

    Secure Biometrics: Concepts, Authentication Architectures & Challenges

    Biometrics is an important and widely used class of methods for identity verification and access control. Biometrics is attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics is...

    Provided By Cornell University

  • White Papers // Apr 2013

    Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems

    The authors investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. They show that attacks taking advantage of the systems false acceptance rate, i.e. false-accept attacks, pose a very...

    Provided By Cornell University

  • White Papers // Aug 2013

    Timing Analysis of SSL/TLS Man in the Middle Attacks

    The authors' experiment revealed that SSL MiTM attacks have timing patterns that could be identified by observing victims. More specifically, the attack tools they analyzed shifted most of the delay to the time between when an SSL handshake was started and when the certificate was received. Additionally, most of the...

    Provided By Cornell University

  • White Papers // May 2013

    Java Card for PayTV Application

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest...

    Provided By Cornell University

  • White Papers // Sep 2013

    Design of Generic Framework for Botnet Detection in Network Forensics

    With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal activities, which in turn, bids many network attacks and threats. Network forensics is...

    Provided By Cornell University

  • White Papers // Oct 2013

    Hopping over Big Data: Accelerating Ad-hoc OLAP Queries with Grasshopper Algorithms

    This paper presents a family of algorithms for fast subset filtering within ordered sets of integers representing composite keys. Applications include significant acceleration of (ad-hoc) analytic queries against a data warehouse without any additional indexing. The algorithms work for point, range and set restrictions on multiple attributes, in any combination,...

    Provided By Cornell University

  • White Papers // Oct 2012

    Non-Commutative Digital Signatures

    The authors start by describing digital signatures using an analogy of a signed message (document) from the non-digital world, whereby a person signs a document, seals it in an envelope and mails it to a recipient. Upon receipt of the envelope the recipient opens and examines the document, specifically the...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Digital Signature with Threshold Generation and Verification

    This paper proposes a signature scheme where the signatures are generated by the cooperation of a number of people from a given group of senders and the signatures are verified by a certain number of people from the group of recipients. Shamir's threshold scheme and Schnorr's signature scheme are used...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Capacity of Wireless Channels: A Physical Approach

    The capacity of Multiple-Input Multiple-Output (MIMO) channels has been considered to be severely limited by the size of antenna arrays. The capacity scaling for a three-dimensional network and the degree-of-freedom analysis for a polarimetric antenna array were provided based on the spherical vector wave decomposition, and both showed the number...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relay Augmentation for Lifetime Extension of Wireless Sensor Networks

    The authors propose a novel relay augmentation strategy for extending the lifetime of a certain class of Wireless Sensor Networks. In this class, sensors are located at fixed and pre-determined positions and all communication takes place via multi-hop paths in a fixed routing tree rooted at the base station. It...

    Provided By Cornell University

  • White Papers // Jan 2013

    Decentralized Lifetime Minimizing Tree for Data Aggregation in Wireless Sensor Networks

    To meet the demands of Wireless Sensor Networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside any given event region. In this paper, the authors propose a novel technique to create...

    Provided By Cornell University

  • White Papers // Jan 2013

    Low-Complexity Scheduling Policies for Achieving Throughput and Delay Optimality in Multi-Channel Wireless Networks

    In this paper, the authors study the scheduling problem for downlink transmission in a multi-channel (e.g., OFDM-based) wireless network. They focus on a single cell, with the aim of developing a unifying framework for designing low-complexity scheduling policies that can provide optimal performance in terms of both throughput and delay....

    Provided By Cornell University

  • White Papers // Oct 2009

    On the Performance of Cascaded Generalized K Fading Channels

    A novel distribution referred to as N???generalized K, constructed as the product of N statistically independent, but not necessarily identically distributed, generalized K Random Variables (RVs) is introduced. Statistical characterization of the proposed distribution is carried out via the derivation of closed-form expressions for its moment generating, probability density, cumulative...

    Provided By Cornell University

  • White Papers // Mar 2013

    Security Analysis on "An Authentication Code Against Pollution Attacks in Network Coding"

    The authors analyze the security of the authentication code against pollution attacks in network coding given by Oggier and Fathi and show one way to remove one very strong condition they required. Actually, they find a way to attack their authentication scheme. In their scheme, they considered that if some...

    Provided By Cornell University

  • White Papers // Feb 2013

    Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee

    In this paper, the authors consider a multi-antenna downlink network where a Secure User (SU) coexists with a passive eavesdropper. There are two design requirements for such a network. First, the information should be transferred in a secret and efficient manner. Second, the Quality of Service (QoS), i.e. delay sensitivity,...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks

    Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, the authors propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles,...

    Provided By Cornell University

  • White Papers // Feb 2013

    Generation of Biometric Key for Use in DES

    Cryptography is an important field in the area of data encryption. There are different cryptographic techniques available varying from the simplest to complex. Biometrics is the science of identification of humans by their characteristics. Fingerprints are the most widely used parameter for human identification amongst all biometrics. Fingerprint comprises a...

    Provided By Cornell University

  • White Papers // Aug 2012

    The Biometric Menagerie - A Fuzzy and Inconsistent Concept

    This paper proves that in iris recognition, the concepts of sheep, goats, lambs and wolves - as proposed by Doddington and Yager in the so-called Biometric Menagerie, are at most fuzzy and at least not quite well defined. They depend not only on the users or on their biometric templates,...

    Provided By Cornell University