Cornell University

Displaying 481-520 of 1122 results

  • White Papers // Feb 2012

    Open Annotations on Multimedia Web Resources

    Many Web portals allow users to associate additional information with existing multimedia resources such as images, audio, and video. However, these portals are usually closed systems and user-generated annotations are almost always kept locked up and remain inaccessible to the Web of Data. The authors believe that an important step...

    Provided By Cornell University

  • White Papers // Feb 2012

    Sparse Matrix-Vector Multiplication on GPGPU Clusters: A New Storage Format and a Scalable Implementation

    The solution of large eigenvalue problems or extremely sparse systems of linear equations is a central part of many numerical algorithms in science and engineering. Sparse Matrix-Vector Multiplication (spMVM) is often the dominating component in such solvers, and may easily consume most of the total runtime. Sparse Matrix-Vector Multiplication (spMVM)...

    Provided By Cornell University

  • White Papers // Feb 2012

    The Xen-Blanket: Virtualize Once, Run Everywhere

    Current Infrastructure as a Service (IaaS) clouds operate in isolation from each other. Slight variations in the Virtual Machine (VM) abstractions or underlying hypervisor services prevent unified access and control across clouds.While standardization efforts aim to address these issues, they will take years to be agreed upon and adopted, if...

    Provided By Cornell University

  • White Papers // Feb 2012

    Fast Computation of the Performance Evaluation of Biometric Systems: Application to Multibiometrics

    The performance evaluation of biometric systems is a crucial step when designing and evaluating such systems. The evaluation process uses the Equal Error Rate (EER) metric proposed by the International Organization for Standardization (ISO/IEC). The EER metric is a powerful metric which allows easily comparing and evaluating biometric systems. However,...

    Provided By Cornell University

  • White Papers // Feb 2012

    Accomplish the Application Area in Cloud Computing

    In the cloud computing application area of accomplish, the authors find the fact that cloud computing covers a lot of areas are its main asset. At a top level, it is an approach to IT where many users, some even from different companies get access to shared IT resources such...

    Provided By Cornell University

  • White Papers // Feb 2012

    Scalability of Data Binding in ASP.NET Web Applications

    Many, but not all, CS & IT academics tend to have a focus on theory and research and do not give much importance to the practice of software development. This is not an individual opinion. A scientifically conducted survey (hard data) is not needed for establishing that most CS &...

    Provided By Cornell University

  • White Papers // Feb 2012

    On the Reliability of RAID Systems: An Argument for More Check Drives

    In this paper, the authors address issues of reliability of RAID systems. They focus on "Big data" systems with a large number of drives and advanced error correction schemes beyond RAID 6. Their RAID paradigm is based on Reed-Solomon codes, and thus they assume that the RAID consists of N...

    Provided By Cornell University

  • White Papers // Feb 2012

    Conversion Database of the Shapes Into XML Data for Shape Matching

    The authors present a new approach to the matching of 2D shapes using XML language and dynamic programming. Given a 2D shape, they extract its contour and which is represented by set of points. The contour is divided into curves using corner detection. After, each curve is described by local...

    Provided By Cornell University

  • White Papers // Feb 2012

    Worst-Case Additive Noise in Wireless Networks

    An important classical result in Information Theory states that the Gaussian noise is the worst-case additive noise in point-to-point channels. In this paper, the authors significantly generalize this result and show that, under very mild assumptions, Gaussian noise is also the worst-case additive noise in general wireless networks with additive...

    Provided By Cornell University

  • White Papers // Feb 2012

    Survey-Based Analysis of the Proposed Component-Based Development Process

    The concept of Component-Based Development (CBD) is widely practiced in SoftWare (SW) development. CBD is based on reuse of the existing components with the new ones. The objective of this paper is to propose a novel process model for CBD. Importance of repository has also been discussed. A survey has...

    Provided By Cornell University

  • White Papers // Feb 2012

    An Improved XP Software Development Model

    The concept of agile process models has attained great popularity in SoftWare (SW) development community in last few years. Agile models promote fast development. Fast development has certain drawbacks, such as weak documentation and performance for medium and large development projects. Fast development also promotes use of agile process models...

    Provided By Cornell University

  • White Papers // Feb 2012

    The Artifacts of Component-Based Development

    Process model is a framework having standard procedures used in an organization to analyze, design and develop software. The goal of process models is to establish a relationship between quality of process model and quality of software. Quality of software means it must function according to customer requirements. It must...

    Provided By Cornell University

  • White Papers // Feb 2012

    Distributed Demand and Response Algorithm for Optimizing Social-Welfare in Smart Grid

    This paper presents a distributed Demand and Response algorithm for smart grid with the objective of optimizing social-welfare. Assuming the power demand range is known or predictable ahead of time, the authors' proposed distributed algorithm will calculate demand and response of all participating energy demanders and suppliers, as well as...

    Provided By Cornell University

  • White Papers // Feb 2012

    Fast Packed String Matching for Short Patterns

    Searching for all occurrences of a pattern in a text is a fundamental problem in computer science with applications in many other fields, like natural language processing, information retrieval and computational biology. In the last two decades a general trend has appeared trying to exploit the power of the word...

    Provided By Cornell University

  • White Papers // Feb 2012

    Assessment of OGC Web Processing Services for REST principles

    Recent distributed computing trends advocate the use of REpresentational State Transfer (REST) to alleviate the inherent complexity of the Web services standards in building service-oriented web applications. In this paper, the authors focus on the particular case of geospatial services interfaced by the OGC Web Processing Service (WPS) specification in...

    Provided By Cornell University

  • White Papers // Feb 2012

    Codes Can Reduce Queueing Delay in Data Centers

    In this paper, the authors quantify how much codes can reduce the data retrieval latency in storage systems. By combining a simple linear code with a novel request scheduling algorithm, which they call Blocking-one Scheduling (BoS), they show analytically that it is possible to reduce data retrieval delay by up...

    Provided By Cornell University

  • White Papers // Feb 2012

    Web Services-Enhanced Agile Modeling and Integrating Business Processes

    In a global business context with continuous changes, the enterprises have to improve their productivity and their brand image according to a given strategy. The authors are expected to face big challenges in order to overcome hard competition and meet the growing demands of clients. Indeed, they should capitalize on...

    Provided By Cornell University

  • White Papers // Feb 2012

    SSCADA: Securing SCADA Infrastructure Communications

    Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (SCADA) systems were developed to reduce labor costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water, and wastewater industries. While control...

    Provided By Cornell University

  • White Papers // Feb 2012

    Investigation to Implicate Data on Clouds

    Cloud computing can and does mean different things to different people. The common characteristics most shares are on-demand secure access to metered services from nearly anywhere and dislocation of data from inside to outside the organization. Vision of cloud computing as a new IT procurement model. The system lifecycle, risks...

    Provided By Cornell University

  • White Papers // Feb 2012

    Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In...

    Provided By Cornell University

  • White Papers // Feb 2012

    Exact Scalar Minimum Storage Coordinated Regenerating Codes

    Codes allow to implement redundancy in distributed storage systems so that device failures do no hurt the whole system. Yet, to keep preventing failures, once failures have occurred, codes must be repaired: the redundancy level must be kept above some minimum level. The naive approach to repairing codes consists in...

    Provided By Cornell University

  • White Papers // Feb 2012

    Secure and Reliable Routing in Mobile Adhoc Networks

    The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can benefit from anywhere and at any time for impromptu collaboration. However, energy constrained nodes, low channel bandwidth, node mobility, high channel error rates, channel variability and packet loss...

    Provided By Cornell University

  • White Papers // Feb 2012

    A Comparative Study on the Performance of the Top DBMS Systems

    Database management systems are today's most reliable mean to organize data into collections that can be searched and updated. However, many DBMS systems are available on the market each having their pros and cons in terms of reliability, usability, security, and performance. This paper presents a comparative study on the...

    Provided By Cornell University

  • White Papers // Feb 2012

    An Efficient Method for Multichannel Wireless Mesh Networks With Pulse Coupled Neural Network

    Multi cast communication is a key technology for wireless mesh networks. Multicast provides efficient data distribution among a group of nodes, Generally sensor networks and MANETs uses multicast algorithms which are designed to be energy efficient and to achieve optimal route discovery among mobile nodes whereas wireless mesh networks needs...

    Provided By Cornell University

  • White Papers // Feb 2012

    Semantic-Sensitive Web Information Retrieval Model for HTML Documents

    With the advent of the Internet, a new era of digital information exchange has begun. Currently, the Internet encompasses more than five billion online sites and this number is exponentially increasing every day. Fundamentally, Information Retrieval (IR) is the science and practice of storing documents and retrieving information from within...

    Provided By Cornell University

  • White Papers // Feb 2012

    MORSE: Multi-objective Reconfigurable Self-optimizing Memory Scheduler

    Modern high-performance memory subsystems support a high degree of concurrency. This is primarily accomplished by increasing the number of independent channels and/or increasing the number of independent banks in a channel. The authors propose a systematic and general approach to designing self-optimizing memory schedulers that can target arbitrary figures of...

    Provided By Cornell University

  • White Papers // Jan 2012

    Timely Throughput of Heterogeneous Wireless Networks: Fundamental Limits and Algorithms

    Consumer demand for data services over wireless networks has increased dramatically in recent years, fueled both by the success of online video streaming and popularity of video-friendly mobile devices like smartphones and tablets. This confluence of trends is expected to continue and lead to several fold increase in traffic over...

    Provided By Cornell University

  • White Papers // Jan 2012

    Wireless Capacity and Admission Control in Cognitive Radio

    The authors give algorithms with constant-factor performance guarantees for several capacity and throughput problems in the SINR model. The algorithms are all based on a novel LP formulation for capacity problems. First, they give a new constant-factor approximation algorithm for selecting the maximum subset of links that can be scheduled...

    Provided By Cornell University

  • White Papers // Jan 2012

    Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    This paper introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data...

    Provided By Cornell University

  • White Papers // Jan 2012

    Combined Haar-Hilbert and Log-Gabor Based Iris Encoders

    This paper shows that combining Haar-Hilbert and Log-Gabor improves iris recognition performance leading to a less ambiguous biometric decision landscape in which the overlap between the experimental intra- and interclass score distributions diminishes or even vanishes. Haar-Hilbert, Log-Gabor and combined Haar-Hilbert and Log-Gabor encoders are tested here both for single...

    Provided By Cornell University

  • White Papers // Jan 2012

    Stability of the Max-Weight Protocol in Adversarial Wireless Networks

    In this paper, the authors consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of attention dating back to the papers of Tassiulas and Ephremides. In particular, this protocol is known to be throughput-optimal whenever the traffic...

    Provided By Cornell University

  • White Papers // Jan 2012

    Deducing Security Goals From Shape Analysis Sentences

    Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a...

    Provided By Cornell University

  • White Papers // Jan 2012

    The Capacity Region of the Restricted Two-Way Relay Channel with Any Deterministic Uplink

    The Two-Way Relay Channel (TWRC), where two users exchange data through a relay, was first investigated by Wu et al.. In this model the users cannot communicate directly and must exchange data by first transmitting to the relay, called the uplink. In this paper, the authors consider the Two-Way Relay...

    Provided By Cornell University

  • White Papers // Jan 2012

    Holographic Grid Cloud, a Futurable High Storage Technology for the Next Generation Astronomical Facilities

    In the immediate future holographic technology will be available to store a very large amount of data in HVD (Holographic Versatile Disk) devices. This technology make extensive use of the WORM (Write-Once-Read-Many) paradigm: this means that such devices allow for a simultaneous and parallel reading of millions of volumetric pixels...

    Provided By Cornell University

  • White Papers // Jan 2012

    A Theoretical and Empirical Evaluation of Software Component Search Engines, Semantic Search Engines and Google Search Engine in the Context of COTS-Based Development

    COTS-based development is a component reuse approach promising to reduce costs and risks, and ensure higher quality. The growing availability of COTS components on the Web has concretized the possibility of achieving these objectives. In this multitude, a recurrent problem is the identification of the COTS components that best satisfy...

    Provided By Cornell University

  • White Papers // Jan 2012

    Secure SQL Server - Enabling Secure Access to Remote Relational Data

    The Secure SQL Server - SecSS, is a technology primarily developed to enable self service governance of states, as described in (Paulin 2012). Self service governance is a novel model of governance that rejects service based public administration and instead proposes that governed subjects manage their legal relations in a...

    Provided By Cornell University

  • White Papers // Jan 2012

    Optimal Distributed Power Allocation for Decode-and-Forward Relay Networks

    This paper presents a fully distributed power allocation algorithm for Decode-and-Forward (DF) relay networks with a large number of sources, relays, and destination nodes. The well-known mathematical decomposition based distributed optimization techniques cannot directly be applied to DF relay networks, because the achievable rate of DF relaying is not strictly...

    Provided By Cornell University

  • White Papers // Jan 2012

    Performance Analysis of Sequential Method for Handover in Cognitive Radio Networks

    Powerful spectrum handover schemes enable Cognitive Radios (CRs) to use transmission opportunities in primary users' channels appropriately. In this paper, the authors consider the cognitive access of primary channels by a Secondary User (SU). They evaluate the average detection time and the maximum achievable average throughput of the SU when...

    Provided By Cornell University

  • White Papers // Jan 2012

    ProofPeer - A Cloud-Based Interactive Theorem Proving System

    Interactive Theorem Proving (ITP) has a long history. Most of that history, starting roughly around 1970, can be traced back to three systems: Automath, Edinburgh LCF, and Mizar. Probably the most popular ITP systems these days are Isabelle and Coq. Isabelle is a descendant of Edinburgh LCF. Its declarative extension...

    Provided By Cornell University

  • White Papers // Jan 2012

    Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks

    The objective of this paper is to increase life time of homogeneous Wireless Sensor Networks (WSNs) through minimizing long range communication and energy balancing. Sensor nodes are resource constrained particularly with limited energy that is difficult o r impossible to replenish. LEACH (Low Energy Adaptive Clustering Hierarchy) is most well...

    Provided By Cornell University

  • White Papers // Apr 2012

    The Transitivity of Trust Problem in the Interaction of Android Applications

    Mobile phones have developed into complex platforms with large numbers of installed applications and a wide range of sensitive data. Application security policies limit the permissions of each installed application. As applications may interact, restricting single applications may create a false sense of security for the end users while data...

    Provided By Cornell University

  • White Papers // Dec 2009

    Google Android: A State-of-the-Art Review of Security Mechanisms

    Google's Android is a comprehensive software framework for mobile communication devices (i.e., Smartphone, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various...

    Provided By Cornell University

  • White Papers // Oct 2011

    Symbian 'Vulnerability' and Mobile Threats

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. The authors are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all...

    Provided By Cornell University

  • White Papers // Sep 2011

    A Software Tool for Legal Drafting

    Although many attempts at automated aids for legal drafting have been made, they were based on the construction of a new tool, completely from scratch. This is at least curious, considering that a strong parallelism can be established between a normative document and a software specification: both describe what an...

    Provided By Cornell University

  • White Papers // Nov 2012

    Resource Allocation in Mobile WiMAX Network: An Optimal Approach

    In the last few years there has been significant growth in the area of wireless communication. IEEE 802.16/WiMAX is the network which is designed for providing high speed wide area broadband wireless access; WiMAX is an emerging wireless technology for creating multi-hop Mesh network. Future generation networks will be characterized...

    Provided By Cornell University

  • White Papers // Feb 2012

    A Comparative Study on the Performance of the Top DBMS Systems

    Database management systems are today's most reliable mean to organize data into collections that can be searched and updated. However, many DBMS systems are available on the market each having their pros and cons in terms of reliability, usability, security, and performance. This paper presents a comparative study on the...

    Provided By Cornell University

  • White Papers // Dec 2012

    Secure CDMA Sequences

    Mobile communications require flexible networks which can accommodate variable numbers of users under adverse propagation environments. Multiplexing by frequency or time division is inefficient and ineffective in guarding against multipath and mutual interference, noise and jamming. Code Division Multiple Access (CDMA), frequency hopping, Orthogonal Frequency Division Multiplexing (OFDM), and Ultra...

    Provided By Cornell University

  • White Papers // Dec 2012

    Cumulative Sum Algorithm for Detecting SYN Flooding Attacks

    SYN flooding attacks generate enormous packets by a large number of agents and can easily exhaust the computing and communication resources of a victim within a short period of time. In this paper, the authors propose a lightweight method for detecting SYN flooding attack by non-parametric cumulative sum algorithm. They...

    Provided By Cornell University

  • White Papers // Dec 2012

    Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths

    In this paper, the author investigates several offline and online data transfer scheduling problems and propose efficient algorithms and techniques for addressing them. In the offline case, he present a novel, heuristic, algorithm for scheduling files with divisible sizes on multiple disjoint paths, in order to maximize the total profit...

    Provided By Cornell University

  • White Papers // Sep 2011

    Sum Degrees-of-Freedom of Two-Unicast Wireless Networks

    Characterizing network capacity is one of the central problems in network information theory. While this problem is in general unsolved, there has been considerable success in two research fronts. The first one focuses on single-flow multi-hop networks, in which one source sends the same message to one or more destinations....

    Provided By Cornell University

  • White Papers // Apr 2010

    The Two-User Deterministic Interference Channel With Rate-Limited Feedback

    In this paper, the authors study the effect of rate-limited feedback on the sum-rate capacity of the deterministic interference channel. They characterize the sum-rate capacity of this channel in the symmetric case and show that having feedback links can increase the sum-rate capacity by at most the rate of the...

    Provided By Cornell University

  • White Papers // Aug 2009

    On the Maximum Throughput of Clandestine Sensor Networking

    The authors consider the problem of clandestine communications, i.e., communications that are meant to be invisible to third-party eavesdroppers, in the context of wireless sensor networks. Although encryption and anonymous routing protocols can hide the content and the routing information, the transmission activities of sensors on the same route can...

    Provided By Cornell University

  • White Papers // Apr 2011

    Reactive Imperative Programming With Dataflow Constraints

    Dataflow languages provide natural support for specifying constraints between objects in dynamic applications, where programs need to react efficiently to changes of their environment. Researchers have long investigated how to take advantage of dataflow constraints by embedding them into procedural languages. Previous mixed imperative/dataflow systems, however, require syntactic extensions or...

    Provided By Cornell University

  • White Papers // Sep 2011

    Optimization of Input Covariance Matrix for Multi-Antenna Correlated Channels

    Optimizing the input covariance matrix of a multiple-antenna transmit system with partial channelstructure feedback is an important issue to fully exploit the channel capacity. Efficient design of the optimal input covariance matrix, however, remains unavailable although its eigenvector structure was clearly revealed in a recent publication. In this paper, the...

    Provided By Cornell University

  • White Papers // Dec 2011

    A Pairwise Abstraction for Round-Based Protocols

    Distributed systems are hard to program, for a number of reasons. Some of these reasons are inherent. System state is scattered across multiple nodes, and is not random access. Bandwidth is an ever-present concern. Fault tolerance is much more complicated in a partial-failure model. This presents both a challenge and...

    Provided By Cornell University

  • White Papers // Apr 2011

    PadSteg: Introducing Inter-Protocol Steganography

    Hiding information in network traffic may lead to leakage of confidential information. In this paper, the authors introduce a new steganographic system: the PadSteg (Padding Steganography). To their best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols...

    Provided By Cornell University

  • White Papers // Jan 2010

    A Semantic Framework for Declassification and Endorsement

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security...

    Provided By Cornell University

  • White Papers // Mar 2012

    Debunking Some Myths About Biometric Authentication

    Biometric authentication systems are presented as the best way to reach high security levels in controlling access to IT systems or sensitive infrastructures. But several issues are often not taken properly into account. In order for the implementation of those systems to be successful, the hidden risks and the related...

    Provided By Cornell University

  • White Papers // Apr 2011

    Survey of Cognitive Radio Techniques in Wireless Network

    Wireless access networks were originally developed for different communication scenarios. Wireless networks aim to provide ubiquitous, flexible communications mainly in community areas. In wireless network, there always exists the need for the communication services at higher data rates and Quality of Service (QoS). Thus lots of different techniques have been...

    Provided By Cornell University

  • White Papers // Feb 2009

    Bureaucracy And Financial Markets

    Recent research on financial market development has focused on the nature of the legal system. The law and finance literature, however, exclusively focuses on the abuse of management power as a major cause of shareholder expropriation. The authors examine the role of the administrative capability of the state in providing...

    Provided By Cornell University

  • White Papers // Oct 2010

    Identification Of Social Interactions

    While interest in social determinants of individual behavior has led to a rich theoretical literature and many efforts to measure these influences, a mature "Social econometrics" has yet to emerge. This paper provides a critical overview of the identification of social interactions. The authors consider linear and discrete choice models...

    Provided By Cornell University

  • White Papers // Feb 2011

    Fast Reinforcement Learning for Energy-Efficient Wireless Communications

    The authors consider the problem of energy-efficient point-to-point transmission of delay-sensitive data (e.g. multimedia data) over a fading channel. Existing research on this topic utilizes either physical-layer centric solutions, namely power-control and Adaptive Modulation and Coding (AMC), or system-level solutions based on Dynamic Power Management (DPM); however, there is currently...

    Provided By Cornell University

  • White Papers // Jan 2011

    Adaptive Topology Discovery in Hybrid Wireless Networks

    Wireless networks in home, office and sensor applications consist of nodes with low mobility. Most of these networks have at least a few powerful machines additionally connected by a wireline network. Topology information of the wireless network at these powerful nodes can be used to control transmission power, avoid congestion,...

    Provided By Cornell University

  • White Papers // Jul 2011

    Abstract Reduction Semantics for Modular Higher-Order Contract Verification

    The authors contribute a new approach to the modular verification of higher-order programs that leverages behavioral software contracts as a rich source of symbolic values. Their approach is based on the idea of an abstract reduction semantics that gives meaning to programs with missing or opaque components. Such components are...

    Provided By Cornell University

  • White Papers // Dec 2009

    Opportunistic Spectrum Access With Multiple Users: Learning Under Competition

    The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total...

    Provided By Cornell University

  • White Papers // May 2011

    Unshackle the Cloud!

    Infrastructure-as-a-Service (IaaS) clouds are evolving from offering simple on-demand resources to providing diverse sets of tightly-coupled monolithic services. Like OS kernels of the 1980's and 1990's, these monolithic offerings, albeit rich in features, are significantly constraining users' freedom and control over the underlying - cloud - resources. For example, the...

    Provided By Cornell University

  • White Papers // Aug 2009

    Study of Proposed Methods for Improving TCP Performance Over Wireless Links

    TCP is designed for networks with assumption that major losses occur only due to congestion of network traffic. On a wireless network TCP misinterprets the transmission losses due to bit errors and handoffs as losses caused by congestion, and triggers congestion control mechanisms. Because of its end to end delivery...

    Provided By Cornell University

  • White Papers // Nov 2008

    Individual Investor Trading And Return Patterns Around Earnings Announcements

    This paper investigates the behavior of individual investors around earnings announcements using a unique dataset of NYSE stocks. The authors find that intense individual buying (selling) prior to the announcement is associated with significant positive (negative) abnormal returns in the three months following the event. Compensation for risk-averse liquidity provision...

    Provided By Cornell University

  • White Papers // Aug 2011

    City on the Sky: Flexible, Secure Data Sharing on the Cloud

    Sharing data from various sources and of diverse kinds, and fusing them together for sophisticated analytics and mash-up applications are emerging trends, and are prerequisites for grand visions such as that of cyber-physical systems enabled smart cities. Cloud infrastructure can enable such data sharing both because it can scale easily...

    Provided By Cornell University

  • White Papers // Jul 2011

    GraphLab: A Distributed Framework for Machine Learning in the Cloud

    Machine Learning (ML) techniques are indispensable in a wide range of fields. Unfortunately, the exponential increase of dataset sizes are rapidly extending the runtime of sequential algorithms and threatening to slow future progress in ML. With the promise of affordable largescale parallel computing, Cloud systems offer a viable platform to...

    Provided By Cornell University

  • White Papers // Nov 2009

    Spatial Analysis of Opportunistic Downlink Relaying in a Two-Hop Cellular System

    The authors consider a two-hop cellular system in which the mobile nodes help the base station by relaying information to the dead spots. While two-hop cellular schemes have been analyzed previously, the distribution of the node locations has not been explicitly taken into account. In this paper, they model the...

    Provided By Cornell University

  • White Papers // May 2010

    Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks - A Survey

    Wireless sensor networks are basically used for gathering information needed by smart environments but they are particularly useful in unattended situations where terrain, climate and other environmental constraints may hinder in the deployment of wired/conventional networks. Unlike traditional networks, these sensor networks do not have a continuous power supply at...

    Provided By Cornell University

  • White Papers // May 2010

    Enabling the Tactical Cloud

    Cloud Computing platforms have the capacity to host staggering amounts of data and to perform massive computations, with impressive cost benefits relative to smaller-scale computing models. Mobile users with powerful handheld devices are eager consumers for a new class of data-rich information applications. This would seem to be an ideal...

    Provided By Cornell University

  • White Papers // Aug 2011

    Privacy-Aware Personalization for Mobile Advertising

    The authors address the problem of personalizing ad delivery to a smart phone, without violating user privacy. They propose a flexible framework where users can decide how much information about their private context they are willing to share with the ad server. Based on this limited information the server selects...

    Provided By Cornell University

  • White Papers // Sep 2011

    Architectural Solutions of Conformal Network-Centric Staring-Sensor Systems With Spherical Field of View

    The paper presents the concept of network-centric conformal electro-optical systems construction with spherical field of view. It discusses abstract passive distributed electro-optical systems with focal array detectors based on a group of moving objects distributed in space. The system performs conformal processing of information from sensor matrix in a single...

    Provided By Cornell University

  • White Papers // Aug 2011

    A Novel VSWR-Protected and Controllable CMOS Class E Power Amplifier for Bluetooth Applications

    This paper describes the design of a differential class-E PA for Bluetooth applications in 0.18?m CMOS technology with load mismatch protection and power control features. The breakdown induced by load mismatch can be avoided by attenuating the RF power to the final stage during over voltage conditions. Power control is...

    Provided By Cornell University

  • White Papers // Jul 2011

    Smart Radio Spectrum Management for Cognitive Radio

    Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node...

    Provided By Cornell University

  • White Papers // Aug 2011

    Metadata Challenge for Query Processing Over Heterogeneous Wireless Sensor Network

    Wireless sensor networks become integral part of the people life. These networks can be used for monitoring the data in various domains due to their flexibility and functionality. Query processing and optimization in the WSN is a very challenging task because of their energy and memory constraint. In this paper,...

    Provided By Cornell University

  • White Papers // Aug 2011

    Information Centric Networking Based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks

    Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this paper, the authors propose architecture of mobile node for NetInf. They call it NetInf Mobile Node. It is an extension...

    Provided By Cornell University

  • White Papers // Oct 2011

    Wireless Connectivity and Capacity

    A key architectural goal in wireless adhoc networks is to ensure that each node in the network can communicate with every other node (perhaps by routing through other nodes). This requires that the nodes be connected through a communication overlay. The problem can be abstracted as such: given n points...

    Provided By Cornell University