Cornell University

Displaying 521-560 of 1363 results

  • White Papers // Jan 2013

    Energy Efficiency of Network Cooperation for Cellular Uplink Transmissions

    There is a growing interest in energy efficient or so-called "Green" wireless communication to reduce the energy consumption in cellular networks. Since today's wireless terminals are typically equipped with multiple network access interfaces such as Bluetooth, Wi-Fi, and cellular networks, this paper investigates user terminals cooperating with each other in...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Fully Distributed Opportunistic Network Coding Scheme for Cellular Relay Networks

    In this paper, the authors propose an Opportunistic Network Coding (ONC) scheme in cellular relay networks, which operates depending on whether the relay decodes source messages successfully or not. A fully distributed method is presented to implement the proposed opportunistic network coding scheme without the need of any feedback between...

    Provided By Cornell University

  • White Papers // Jan 2013

    An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems

    The increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the maintenance needs of Networked Distributed Storage Systems (NDSS), trying to reach the best compromise among storage space efficiency, fault-tolerance, and maintenance...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Study of Influential Factors in the Adoption and Diffusion of B2C E-Commerce

    In this paper, the authors look at the present standing of e-commerce in Saudi Arabia, as well as the challenges and strengths of Business To Customers (B2C) electronic commerce. Many studies have been conducted around the world in order to gain a better understanding of the demands, needs and effectiveness...

    Provided By Cornell University

  • White Papers // Jan 2013

    Increasing Network Visibility Using Coded Repetition Beacon Piggybacking

    Vehicular Ad-hoc NETworks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, the authors propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'Neighbor' table....

    Provided By Cornell University

  • White Papers // Jan 2013

    Why Quantum Computing Is Hard - and Quantum Cryptography Is Not Provably Secure

    Despite high hopes for quantum computation in the 1990s, progress in the past decade has been slow; the people still cannot perform computation with more than about three qubits and are no closer to solving problems of real interest than a decade ago. Separately, recent experiments in fluid mechanics have...

    Provided By Cornell University

  • White Papers // Jan 2013

    Towards Optimal Broadcast in Wireless Networks

    Broadcast is a fundamental operation in networks, especially in wireless Mobile Ad-hoc NETworks (MANETs). For example, some form of broadcasting is used by all on-demand MANET routing protocols, when there is uncertainty as to the location of the destination node, or for service discovery. Being such a basic operation of...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Capacity of Wireless Channels: A Physical Approach

    The capacity of Multiple-Input Multiple-Output (MIMO) channels has been considered to be severely limited by the size of antenna arrays. The capacity scaling for a three-dimensional network and the degree-of-freedom analysis for a polarimetric antenna array were provided based on the spherical vector wave decomposition, and both showed the number...

    Provided By Cornell University

  • White Papers // Jan 2013

    Integrated Approach to Data Center Power Management

    Energy accounts for a significant fraction of the operational costs of a data center, and data center operators are increasingly interested in moving towards low-power designs. Two distinct approaches have emerged towards achieving this end: the power proportional approach focuses on reducing disk and server power consumption, while the green...

    Provided By Cornell University

  • White Papers // Jan 2013

    On the Achievable Region for Interference Networks with Point-to-Point Codes

    This paper studies evaluation of the capacity region for interference networks with Point-to-Point (p2p) capacity-achieving codes. Such capacity region has recently been characterized as union of several sub-regions each of which has distinctive operational characteristics. Detailed evaluation of this region, therefore, can be accomplished in a very simple manner by...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Degrees of Freedom for Network-Coded Cognitive Interference Channel

    The authors explain a two-user cognitive Interference Channel (CIC) where one of the transmitters (primary) has knowledge of a linear combination (over an appropriate finite field) of the two information messages. They refer to this channel model as Network-Coded CIC, since the linear combination may be the result of some...

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Compressive Sampling of Spatially Sparse Fields in Wireless Sensor Networks

    Wireless Sensor Networks (WSN), i.e. networks of autonomous, wireless sensing nodes spatially deployed over a geographical area, are often faced with acquisition of spatially sparse fields. In this paper, the authors present a novel bandwidth/energy efficient CS scheme for acquisition of spatially sparse fields in a WSN. The paper contribution...

    Provided By Cornell University

  • White Papers // Jan 2013

    Evaluating Cloud Computing Techniques for Smart Power Grid Design Using Parallel Scripting

    Applications used to evaluate next-generation electrical power grids ("Smart grids") are anticipated to be compute and data-intensive. In this paper, the authors parallelize and improve performance of one such application which was run sequentially prior to the use of their cloud-based configuration. They examine multiple cloud computing offerings, both commercial...

    Provided By Cornell University

  • White Papers // Jan 2013

    Toward a Reliable, Secure and Fault Tolerant Smart Grid State Estimation in the Cloud

    The collection and prompt analysis of synchrophasor measurements is a key step towards enabling the future smart power grid, in which grid management applications would be deployed to monitor and react intelligently to changing conditions. The potential exists to slash inefficiencies and to adaptively reconfigure the grid to take better...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Cut-Set Bounds for Broadcast Networks

    A broadcast network is a classical network with all source messages collocated at a single source node. For broadcast networks, the standard cut-set bounds, which are known to be loose in general, are closely related to union as a specific set operation to combine the basic cuts of the network....

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Identification of Equivalences in Dynamic Graphs and Pedigree Structures

    The authors propose a new framework for designing test and query functions for complex structures that vary across a given parameter such as genetic marker position. The operations they are interested in include equality testing, set operations, isolating unique states, duplication counting, or finding equivalence classes under identifiability constraints. A...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

    Secure network coding was first introduced by Cai and Yeung, and further investigated by Feldman et al... In the scenario of secure network coding, a source node transmits n packets from n outgoing links to sink nodes through a network that implements network coding, and each sink node receives N...

    Provided By Cornell University

  • White Papers // Jan 2013

    Utility-Privacy Tradeoff in Databases: An Information-Theoretic Approach

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. This paper presents...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Space-Time Decision Feedback Neural Detectors with Data Selection for High-Data Rate Users in DS-CDMA Systems

    A space-time adaptive Decision Feedback (DF) receiver using Recurrent Neural Networks (RNN) is proposed for joint equalization and interference suppression in Direct Sequence Code-Division-Multiple-Access (DS-CDMA) systems equipped with antenna arrays. The proposed receiver structure employs dynamically driven RNNs in the feed forward section for equalization and multi-access interference suppression and...

    Provided By Cornell University

  • White Papers // Jan 2013

    Blind Adaptive Algorithms for Decision Feedback DS-CDMA Receivers in Multipath Channels

    In this paper, the authors examine blind adaptive and iterative Decision Feedback (DF) receivers for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in frequency selective channels. Code-constrained Minimum Variance (CMV) and Constant Modulus (CCM) design criteria for DF receivers based on constrained optimization techniques are investigated for scenarios subject...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Interference Suppression for CDMA Systems using Interpolated FIR Filters with Adaptive Interpolators in Multipath Channels

    In this paper, the authors propose an adaptive linear receiver structure based on interpolated Finite Impulse Response (FIR) filters with adaptive interpolators for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in multipath channels. The interpolated Minimum Mean-Squared Error (MMSE) and the interpolated Constrained Minimum Variance (CMV) solutions are described...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relay Augmentation for Lifetime Extension of Wireless Sensor Networks

    The authors propose a novel relay augmentation strategy for extending the lifetime of a certain class of Wireless Sensor Networks. In this class, sensors are located at fixed and pre-determined positions and all communication takes place via multi-hop paths in a fixed routing tree rooted at the base station. It...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Case for Cross-Layer Optimizations in Storage: A Workflow-Optimized Storage System

    In this paper, the authors propose using file system custom metadata as a bidirectional communication channel between applications and the storage system. This channel can be used to pass hints that enable cross-layer optimizations, an option hindered today by the ossified file-system interface. The authors study this approach in context...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for Two-Way Relaying with QAM

    The design of modulation schemes for the physical layer network-coded two way relaying scenario was studied. It was shown that every network coding map that satisfies the exclusive law is represent able by a Latin Square and conversely, and this relationship can be used to get the network coding maps...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for the K-User Multiple Access Relay Channel

    A Physical layer Network Coding (PNC) scheme is proposed for the K-user wireless Multiple Access Relay Channel (MARC), in which K source nodes transmit their messages to the destination node D with the help of a relay node R: The proposed PNC scheme involves two transmission phases: Phase 1 during...

    Provided By Cornell University

  • White Papers // Jan 2013

    Decentralized Lifetime Minimizing Tree for Data Aggregation in Wireless Sensor Networks

    To meet the demands of Wireless Sensor Networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside any given event region. In this paper, the authors propose a novel technique to create...

    Provided By Cornell University

  • White Papers // Jan 2013

    Network Throughput Optimization via Error Correcting Codes

    A new network construction method is presented for building of scalable, high throughput, low latency networks. The method is based on the exact equivalence discovered between the problems of maximizing network throughput (measured as bisection bandwidth) for a large class of practically interesting Cayley graphs and the problem of maximizing...

    Provided By Cornell University

  • White Papers // Jan 2013

    Low-Complexity Scheduling Policies for Achieving Throughput and Delay Optimality in Multi-Channel Wireless Networks

    In this paper, the authors study the scheduling problem for downlink transmission in a multi-channel (e.g., OFDM-based) wireless network. They focus on a single cell, with the aim of developing a unifying framework for designing low-complexity scheduling policies that can provide optimal performance in terms of both throughput and delay....

    Provided By Cornell University

  • White Papers // Jan 2013

    Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Networks

    Energy efficiency is the most important issue in all facets of Wireless Sensor Networks (WSNs) operations because of the limited and non-replenish able energy supply. Data aggregation mechanism is one of the possible solutions to prolong the life time of sensor nodes and on the other hand it also helps...

    Provided By Cornell University

  • White Papers // Jan 2013

    New Variant of ElGamal Signature Scheme

    Since the invention of the public key cryptography in the late 1970s, several new subjects related to the data security as identification, authentication, zero-knowledge proof and secret sharing were explored. In this paper, the authors described a new variant of ElGamal signature scheme and analyzed its security. Their method relies...

    Provided By Cornell University

  • White Papers // Jan 2013

    Faster Quantum Number Factoring via Circuit Synthesis

    Shor's number factoring remains the most striking algorithm for quantum computation as it quickly solves an important task for which no conventional fast algorithms were found in 2,300 years. A major obstacle to implementing Shor's quantum number-factoring algorithm is the large size of modular-exponentiation circuits. The authors reduce this bottleneck...

    Provided By Cornell University

  • White Papers // Jan 2013

    An Efficient Hybrid Localization Technique in Wireless Sensor Networks

    Sensor nodes are low cost, low power devices that are used to collect physical data and monitor environmental conditions from remote locations. Wireless Sensor Networks (WSN's) are collection of sensor nodes, coordinating among themselves to perform a particular task. Localization is defined as the deployment of the sensor nodes at...

    Provided By Cornell University

  • White Papers // Jan 2013

    High Volume Computing: Identifying and Characterizing Throughput Oriented Workloads in Data Centers

    For the first time, this paper systematically identifies three categories of throughput oriented workloads in data centers: services, data processing applications, and interactive real-time applications, whose targets are to increase the volume of throughput in terms of processed requests or data, or supported maximum number of simultaneous subscribers, respectively, and...

    Provided By Cornell University

  • White Papers // Jan 2013

    Power Consumption Analysis of a Modern Smartphone

    Smartphones saw their advent some 16 years ago with the introduction of Nokia communicator series. Growth of smartphones only started increasing exponentially in recent years. This paper presents observations about power consumption of a latest smartphone. Modern smartphones are powerful devices with different choices of data connections and other functional...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Realistic Distributed Storage System that Minimizes Data Storage and Repair Bandwidth

    In a realistic distributed storage environment, storage nodes are usually placed in racks, a metallic support designed to accommodate electronic equipment. It is known that the communication (bandwidth) cost between nodes within a rack is much lower than the communication (bandwidth) cost between nodes within different racks. In this paper,...

    Provided By Cornell University

  • White Papers // Jan 2013

    CloudSVM : Training an SVM Classi Er in Cloud Computing Systems

    In conventional method, distributed Support Vector Machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly for large datasets. Hence, the authors propose a method that is referred as the Cloud SVM training mechanism (CloudSVM) in a cloud...

    Provided By Cornell University

  • White Papers // Jan 2013

    A New Metric for Routing in Multi-Hop Wireless Sensor Networks for Detection of Correlated Random Fields

    The problem of combining task performance and routing for the detection of correlated random fields using multi-hop wireless sensor networks is considered. Under the assumption of Gauss-Markov structure along a given route, a link metric that captures the detection performance associated with a route is derived. Under Bayesian formulation Chernoff...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Digital Signature with Threshold Generation and Verification

    This paper proposes a signature scheme where the signatures are generated by the cooperation of a number of people from a given group of senders and the signatures are verified by a certain number of people from the group of recipients. Shamir's threshold scheme and Schnorr's signature scheme are used...

    Provided By Cornell University

  • White Papers // Dec 2012

    Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems

    Managing, analyzing and extracting information from multidimensional data are very important activities in a broad range of domains, like business planning and integration, scientific research, statistics and even distributed systems. In this paper, the author consider problems like the largest empty circle and hyper-rectangle in a given set of points,...

    Provided By Cornell University

  • White Papers // Dec 2012

    Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks

    An online user joins multiple social networks in order to enjoy different services. On each joined social network, the user creates an identity and constitutes its three major dimensions namely profile, content and connection network. The user largely governs the identity formulation on any social network and therefore can manipulate...

    Provided By Cornell University

  • White Papers // Mar 2013

    Enhanced Security for Cloud Storage Using File Encryption

    Cloud computing is a term coined to a network that offers incredible processing power, a wide array of storage space and unbelievable speed of computation. Social media channels, corporate structures and individual consumers are all switching to the magnificent world of cloud computing. The flip side to this coin is...

    Provided By Cornell University

  • White Papers // Oct 2009

    On the Performance of Cascaded Generalized K Fading Channels

    A novel distribution referred to as N???generalized K, constructed as the product of N statistically independent, but not necessarily identically distributed, generalized K Random Variables (RVs) is introduced. Statistical characterization of the proposed distribution is carried out via the derivation of closed-form expressions for its moment generating, probability density, cumulative...

    Provided By Cornell University

  • White Papers // May 2012

    Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File

    In this paper, the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. The secret message is encrypted using TTJSA algorithm. The authors embed this encrypted message inside one known image or audio file using 4-th bit from LSB substitution method. They again...

    Provided By Cornell University

  • White Papers // Jan 2013

    Energy Efficiency of Network Cooperation for Cellular Uplink Transmissions

    There is a growing interest in energy efficient or so-called "Green" wireless communication to reduce the energy consumption in cellular networks. Since today's wireless terminals are typically equipped with multiple network access interfaces such as Bluetooth, Wi-Fi, and cellular networks, this paper investigates user terminals cooperating with each other in...

    Provided By Cornell University

  • White Papers // Nov 2012

    Cost Efficient High Capacity Indoor Wireless Access: Denser Wi-Fi or Coordinated Pico-cellular?

    Rapidly increasing traffic demand has forced indoor operators to deploy more and more Wi-Fi Access Points (APs). As AP density increases, inter-AP interference rises and may limit the capacity. Alternatively, cellular technologies using centralized interference coordination can provide the same capacity with the fewer number of APs at the price...

    Provided By Cornell University

  • White Papers // Feb 2010

    Challenges of Next-Generation Wireless Sensor Networks and its Impact on Society

    Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the proliferation in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. The paper discusses about classification of WSN and challenges of the Next Generation WSN. One of the major challenges of Next Generation...

    Provided By Cornell University

  • White Papers // Feb 2013

    Wi-Fi & WiMAX: A Comparative Study

    Usually broadband wireless access networks are considered to be enterprise level networks providing the user with more capacity as well as coverage. The authors have seen that in remote inaccessible areas wired networks are not at all cost effective. Wireless networking has offered the user an alternative solution for such...

    Provided By Cornell University

  • White Papers // Feb 2010

    Automatic Performance Debugging of SPMD Parallel Programs

    Automatic performance debugging of parallel applications usually involves two steps: automatic detection of performance bottlenecks and uncovering their root causes for performance optimization. Previous work fails to resolve this challenging issue in several ways: first, several previous efforts automate analysis processes, but present the results in a confined way that...

    Provided By Cornell University

  • White Papers // Mar 2013

    An Overview of Wireless Local Area Networks

    Wireless communication is an application of science and technology that has come to be vital for modern existence. From the early radio and telephone to current devices such as mobile phones and laptops, accessing the global network has become the most essential and indispensable part of the authors' lifestyle. Wireless...

    Provided By Cornell University

  • White Papers // Jan 2013

    An Efficient Hybrid Localization Technique in Wireless Sensor Networks

    Sensor nodes are low cost, low power devices that are used to collect physical data and monitor environmental conditions from remote locations. Wireless Sensor Networks (WSN's) are collection of sensor nodes, coordinating among themselves to perform a particular task. Localization is defined as the deployment of the sensor nodes at...

    Provided By Cornell University

  • White Papers // Dec 2009

    Effort-Oriented Classification Matrix of Web Service Composition

    Within the service-oriented computing domain, Web service composition is an effective realization to satisfy the rapidly changing requirements of business. Therefore, the research into Web service composition has unfolded broadly. Since examining all of the related work in this area becomes a mission next to impossible, the classification of composition...

    Provided By Cornell University

  • White Papers // Oct 2011

    Implementing a Web Browser with Phishing Detection Techniques

    Phishing is the combination of social engineering and technical exploits designed to convince a victim to provide personal information, usually for the monetary gain of the attacker. Phishing has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more frequent and sophisticated. The impact...

    Provided By Cornell University

  • White Papers // Apr 2010

    Autoplot: A Browser for Scientific Data on the Web

    Autoplot is software developed for the Virtual Observatories in Heliophysics to provide intelligent and automated plotting capabilities for many typical data products that are stored in a variety of file formats or databases. Autoplot has proven to be a flexible tool for exploring, accessing, and viewing data resources as typically...

    Provided By Cornell University

  • White Papers // Mar 2013

    Schema Formalisms for Unordered XML

    The authors consider unordered XML, where the relative order among siblings is ignored, and propose two simple yet practical schema formalisms: Disjunctive Multiplicity Schemas (DMS), and its restriction, disjunction-free Multiplicity Schemas (MS). They investigate their computational properties and characterize the complexity of the following static analysis problems: schema satisfiability, membership...

    Provided By Cornell University

  • White Papers // Mar 2013

    Improving Network Efficiency by Removing Energy Holes in WSNs

    Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally,...

    Provided By Cornell University

  • White Papers // Mar 2013

    Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, the authors proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol,...

    Provided By Cornell University

  • White Papers // Mar 2013

    Link Scheduling for Multiple Multicast Sessions in Distributed Wireless Networks

    In this paper, the authors investigate link scheduling algorithms for throughput maximization in multicast wireless networks. According to their system model, each source node transmits to a multicast group that resides one hop away. They adopt the physical interference model to reflect the aggregate Signal to Interference and Noise Ratio...

    Provided By Cornell University

  • White Papers // Mar 2013

    CellTV - on the Benefit of TV Distribution Over Cellular Networks: A Case Study

    As mobile IP-access is becoming the dominant technology for providing wireless services, the demand for more spectrum for this type of access is increasing rapidly. Since IP-access can be used for all types of services, instead of a plethora of dedicated, single-service systems, there is a significant potential to make...

    Provided By Cornell University

  • White Papers // Jan 2013

    A New Metric for Routing in Multi-Hop Wireless Sensor Networks for Detection of Correlated Random Fields

    The problem of combining task performance and routing for the detection of correlated random fields using multi-hop wireless sensor networks is considered. Under the assumption of Gauss-Markov structure along a given route, a link metric that captures the detection performance associated with a route is derived. Under Bayesian formulation Chernoff...

    Provided By Cornell University

  • White Papers // Jun 2010

    CORMEN: Coding-Aware Opportunistic Routing in Wireless Mess Network

    These network coding improves the network operation beyond the traditional routing or store-and-forward, by mixing of data stream within a network. Network coding techniques explicitly minimizes the total no of transmission in wireless network. The Coding-aware routing maximizes the coding opportunity by finding the coding possible path for every packet...

    Provided By Cornell University

  • White Papers // Jul 2012

    Characterizing the Impact of the Workload on the Value of Dynamic Resizing in Data Centers

    Energy consumption imposes a significant cost for data centers; yet much of that energy is used to maintain excess service capacity during periods of predictably low load. Resultantly, there has recently been interest in developing designs that allow the service capacity to be dynamically resized to match the current workload....

    Provided By Cornell University

  • White Papers // May 2013

    Multicut Lower Bounds via Network Coding

    The authors introduce a new technique to certify lower bounds on the multi-cut size using network coding. In directed networks the network coding rate is not a lower bound on the multi-cut, but they identify a class of networks on which the rate is equal to the size of the...

    Provided By Cornell University

  • White Papers // Sep 2011

    Reliability in Source Coding with Side Information

    The authors study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless Source Coding with Coded Information (SCCSI) and lossy source coding with full side information (Wyner-Ziv). These results recover and extend several existing results on source-coding...

    Provided By Cornell University

  • White Papers // Jan 2013

    High Volume Computing: Identifying and Characterizing Throughput Oriented Workloads in Data Centers

    For the first time, this paper systematically identifies three categories of throughput oriented workloads in data centers: services, data processing applications, and interactive real-time applications, whose targets are to increase the volume of throughput in terms of processed requests or data, or supported maximum number of simultaneous subscribers, respectively, and...

    Provided By Cornell University

  • White Papers // Feb 2012

    Codes Can Reduce Queueing Delay in Data Centers

    In this paper, the authors quantify how much codes can reduce the data retrieval latency in storage systems. By combining a simple linear code with a novel request scheduling algorithm, which they call Blocking-one Scheduling (BoS), they show analytically that it is possible to reduce data retrieval delay by up...

    Provided By Cornell University

  • White Papers // Jan 2013

    Integrated Approach to Data Center Power Management

    Energy accounts for a significant fraction of the operational costs of a data center, and data center operators are increasingly interested in moving towards low-power designs. Two distinct approaches have emerged towards achieving this end: the power proportional approach focuses on reducing disk and server power consumption, while the green...

    Provided By Cornell University

  • White Papers // Jan 2013

    Evaluating Cloud Computing Techniques for Smart Power Grid Design Using Parallel Scripting

    Applications used to evaluate next-generation electrical power grids ("Smart grids") are anticipated to be compute and data-intensive. In this paper, the authors parallelize and improve performance of one such application which was run sequentially prior to the use of their cloud-based configuration. They examine multiple cloud computing offerings, both commercial...

    Provided By Cornell University

  • White Papers // Apr 2013

    Power-Efficient Assignment of Virtual Machines to Physical Machines

    Motivated by current trends in cloud computing, the authors explain study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency they say that a set of Virtual Machines (VMs) is assigned to a...

    Provided By Cornell University

  • White Papers // Jan 2012

    The Capacity Region of the Restricted Two-Way Relay Channel with Any Deterministic Uplink

    The Two-Way Relay Channel (TWRC), where two users exchange data through a relay, was first investigated by Wu et al.. In this model the users cannot communicate directly and must exchange data by first transmitting to the relay, called the uplink. In this paper, the authors consider the Two-Way Relay...

    Provided By Cornell University

  • White Papers // Mar 2011

    Transparent Data Encryption-Solution for Security of Database Contents

    The present paper deals with transparent data encryption which is a technology used to solve the problems of security of data. Transparent data encryption means encrypting databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against...

    Provided By Cornell University

  • White Papers // Aug 2011

    Sparse Recovery with Graph Constraints: Fundamental Limits and Measurement Construction

    This paper addresses the problem of sparse recovery with graph constraints in the sense that the authors can take additive measurements over nodes only if they induce a connected sub-graph. They provide explicit measurement constructions for several special graphs. A general measurement construction algorithm is also proposed and evaluated. Network...

    Provided By Cornell University

  • White Papers // Feb 2008

    Leveraging Information Technology, Social Entrepreneurship, and Global Collaboration for Just Sustainable Development

    Currently, those working for a sustainable development in a vast array of contexts all over the world are often duplicating efforts. In an era where a rapid transition towards sustainability is needed, such wasted effort is no longer tolerable. This paper will discuss current work to overcome this challenge by...

    Provided By Cornell University

  • White Papers // May 2013

    Building Internal Cloud at NIC : A Preview

    The most of computing environments in the IT support organization like NIC are designed to run in centralized data centre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that data centre from all the stations of organization. Currently these...

    Provided By Cornell University

  • White Papers // Jul 2012

    Optimal Recovery of Damaged Infrastructure Networks

    Natural disasters or attacks may disrupt infrastructure networks on a vast scale. Parts of the damaged network are interdependent, making it difficult to plan and optimally execute the recovery operations. To study how interdependencies affect the recovery schedule, the authors introduce a new discrete optimization problem where the goal is...

    Provided By Cornell University

  • White Papers // Dec 2012

    Electricity Cost Minimization for a Residential Smart Grid with Distributed Generation and Bidirectional Power Transactions

    In this paper, the authors consider the electricity cost minimization problem in a residential network where each community is equipped with a distributed power generation source and every household in the community has a set of essential and shiftable power demands. They allow bi-directional power transactions and assume a two-tier...

    Provided By Cornell University

  • White Papers // Feb 2013

    Partial Third-Party Information Exchange with Network Coding

    In this paper, the authors consider the problem of exchanging channel state information in a wireless network such that a subset of the clients can obtain the complete channel state information of all the links in the network. They first derive the minimum number of required transmissions for such partial...

    Provided By Cornell University

  • White Papers // Apr 2013

    A C++11 Implementation of Arbitrary-Rank Tensors for High-Performance Computing

    In this paper, the authors discusses an efficient implementation of tensors of arbitrary rank by using some of the idioms introduced by the recently published C++ ISO Standard (C++11). With the aims at providing a basic building block for high-performance computing, a single Array class template is carefully crafted, from...

    Provided By Cornell University

  • White Papers // Jun 2013

    High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context

    Energy minimization of Ising spin-glasses has played a central role in statistical and solid-state physics, facilitating studies of phase transitions and magnetism. Recent proposals suggest using Ising spin-glasses for non-traditional computing as a way to harness the nature's ability to find min-energy configurations, and to take advantage of quantum tunneling...

    Provided By Cornell University

  • White Papers // Mar 2010

    High-Performance Energy Minimization in Spin-Glasses With Applications to Adiabatic Quantum Computing

    In this paper, the authors presents two conceptually simple methods for parallelizing a Parallel Tempering Monte Carlo simulation in a distributed volunteer computing context, where computers belonging to the general public are used. The first method uses conventional multi-threading. The second method uses CUDA, a graphics card computing system. Parallel...

    Provided By Cornell University

  • White Papers // Jun 2013

    Hybrid Coding: An Interface for Joint Source - Channel Coding and Network Communication

    A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled. However, unlike the separation...

    Provided By Cornell University