Cornell University

Displaying 561-600 of 1119 results

  • White Papers // Sep 2011

    A Software Tool for Legal Drafting

    Although many attempts at automated aids for legal drafting have been made, they were based on the construction of a new tool, completely from scratch. This is at least curious, considering that a strong parallelism can be established between a normative document and a software specification: both describe what an...

    Provided By Cornell University

  • White Papers // Sep 2011

    Convergence Analysis of Saddle Point Problems in Time Varying Wireless Systems - Control Theoretical Approach

    Saddle point problems arise from many wireless applications, and primal-dual iterative algorithms are widely applied to find the saddle points. In the existing literature, the convergence results of such algorithms are established assuming the problem specific parameters remain unchanged during the iterations. However, this assumption is unrealistic in time varying...

    Provided By Cornell University

  • White Papers // Sep 2011

    Data Mining Techniques: A Source for Consumer Behavior Analysis

    Various studies on consumer purchasing behaviors have been presented and used in real problems. Data mining techniques are expected to be a more effective tool for analyzing consumer behaviors. However, the data mining method has disadvantages as well as advantages. Therefore, it is important to select appropriate techniques to mine...

    Provided By Cornell University

  • White Papers // Sep 2011

    Enhanced Secure Algorithm for Message Communion

    This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over...

    Provided By Cornell University

  • White Papers // Sep 2011

    Reliability in Source Coding with Side Information

    The authors study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless Source Coding with Coded Information (SCCSI) and lossy source coding with full side information (Wyner-Ziv). These results recover and extend several existing results on source-coding...

    Provided By Cornell University

  • White Papers // Sep 2011

    Increasing Physical Layer Security Through Scrambled Codes and ARQ

    The authors develop the proposal of non-systematic channel codes on the AWGN wire-tap channel. Such coding technique, based on scrambling, achieves high transmission security with a small degradation of the eavesdropper's channel with respect to the legitimate receiver's channel. In this paper, they show that, by implementing scrambling and descrambling...

    Provided By Cornell University

  • White Papers // Sep 2011

    Optimization of Input Covariance Matrix for Multi-Antenna Correlated Channels

    Optimizing the input covariance matrix of a multiple-antenna transmit system with partial channelstructure feedback is an important issue to fully exploit the channel capacity. Efficient design of the optimal input covariance matrix, however, remains unavailable although its eigenvector structure was clearly revealed in a recent publication. In this paper, the...

    Provided By Cornell University

  • White Papers // Sep 2011

    A Contribution to Secure the Routing Protocol \"Greedy Perimeter Stateless Routing'' Using a Symmetric Signature-Based AES and MD5 Hash

    In this paper, the authors present a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, they examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, they propose a solution to...

    Provided By Cornell University

  • White Papers // Aug 2011

    Scalable Continual Top-K Keyword Search in Relational Databases

    Keyword search in relational databases has been widely studied in recent years because it does not require users neither to master a certain structured query language nor to know the complex underlying database schemas. Most of existing methods focus on answering snapshot keyword queries in static databases. In practice, however,...

    Provided By Cornell University

  • White Papers // Aug 2011

    City on the Sky: Flexible, Secure Data Sharing on the Cloud

    Sharing data from various sources and of diverse kinds, and fusing them together for sophisticated analytics and mash-up applications are emerging trends, and are prerequisites for grand visions such as that of cyber-physical systems enabled smart cities. Cloud infrastructure can enable such data sharing both because it can scale easily...

    Provided By Cornell University

  • White Papers // Aug 2011

    Biometric Authorization System Using Gait Biometry

    Human gait, which is a new biometric aimed to recognize individuals by the way they walk have come to play an increasingly important role in visual surveillance applications. In this paper a novel hybrid holistic approach is proposed to show how behavioral walking characteristics can be used to recognize unauthorized...

    Provided By Cornell University

  • White Papers // Aug 2011

    SLALOM: A Language for SLA Specification and Monitoring

    IT services provisioning is usually underpinned by Service Level Agreements (SLAs), aimed at guaranteeing services quality. However, there is a gap between the customer perspective (business oriented) and that of the service provider (implementation oriented) that becomes more evident while defining and monitoring SLAs. This paper proposes a domain specific...

    Provided By Cornell University

  • White Papers // Aug 2011

    Capacity of Strong and Very Strong Gaussian Interference Relay-Without-Delay Channels

    In this paper, the authors study the interference relay-without-delay channel which is an interference channel with a relay helping the communication. They assume the relay's transmit symbol depends not only on its past received symbols but also on its current received symbol, which is an appropriate model for studying amplify-and-forward...

    Provided By Cornell University

  • White Papers // Aug 2011

    Information Centric Networking Based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks

    Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this paper, the authors propose architecture of mobile node for NetInf. They call it NetInf Mobile Node. It is an extension...

    Provided By Cornell University

  • White Papers // Aug 2011

    Performance Constraint and Power-Aware Allocation for User Requests in Virtual Computing Lab

    Cloud computing is driven by economies of scale. A cloud system uses virtualization technology to provide cloud resources (e.g. CPU, memory) to users in form of virtual machines. Virtual Machine (VM), which is a sandbox for user application, fits well in the education environment to provide computational resources for teaching...

    Provided By Cornell University

  • White Papers // Aug 2011

    Adding a New Site in an Existing Oracle Multimaster Replication without Quiescing the Replication

    In this paper, the authors present a new solution, which adds a new database server on an existing oracle multi-master data replication system with Online Instantiation method. During this time the system is down, because they cannot execute DML statements on replication objects but they can only make queries. The...

    Provided By Cornell University

  • White Papers // Aug 2011

    A Novel VSWR-Protected and Controllable CMOS Class E Power Amplifier for Bluetooth Applications

    This paper describes the design of a differential class-E PA for Bluetooth applications in 0.18?m CMOS technology with load mismatch protection and power control features. The breakdown induced by load mismatch can be avoided by attenuating the RF power to the final stage during over voltage conditions. Power control is...

    Provided By Cornell University

  • White Papers // Aug 2011

    8-Valent Fuzzy Logic for Iris Recognition and Biometry

    This paper shows that maintaining logical consistency of an iris recognition system is a matter of finding a suitable partitioning of the input space in enrollable and unenrollable pairs by negotiating the user comfort and the safety of the biometric system. In other words, consistent enrollment is mandatory in order...

    Provided By Cornell University

  • White Papers // Aug 2011

    A Fault Tolerant Trajectory Clustering (FTTC) for Selecting Cluster Heads in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) suffers from the hot spot problem where the sensor nodes closest to the base station are need to relay more packet than the nodes farther away from the base station. Thus, lifetime of sensory network depends on these closest nodes. Clustering methods are used to extend...

    Provided By Cornell University

  • White Papers // Aug 2011

    Privacy-Aware Personalization for Mobile Advertising

    The authors address the problem of personalizing ad delivery to a smart phone, without violating user privacy. They propose a flexible framework where users can decide how much information about their private context they are willing to share with the ad server. Based on this limited information the server selects...

    Provided By Cornell University

  • White Papers // Aug 2011

    Minimum Spanning Tree Based Routing Strategy for Homogeneous WSN

    A Wireless Sensor Network (WSN) is composed of sensor nodes spread over the field to sense the data. The sensed data must be gathered & transmitted to Base Station (BS) for end user queries. The used sensor nodes being in-expensive having low computation power & limited energy so are not...

    Provided By Cornell University

  • White Papers // Aug 2011

    Sparse Recovery with Graph Constraints: Fundamental Limits and Measurement Construction

    This paper addresses the problem of sparse recovery with graph constraints in the sense that the authors can take additive measurements over nodes only if they induce a connected sub-graph. They provide explicit measurement constructions for several special graphs. A general measurement construction algorithm is also proposed and evaluated. Network...

    Provided By Cornell University

  • White Papers // Aug 2011

    Malicious Data Attacks on the Smart Grid

    Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network...

    Provided By Cornell University

  • White Papers // Aug 2011

    Metadata Challenge for Query Processing Over Heterogeneous Wireless Sensor Network

    Wireless sensor networks become integral part of the people life. These networks can be used for monitoring the data in various domains due to their flexibility and functionality. Query processing and optimization in the WSN is a very challenging task because of their energy and memory constraint. In this paper,...

    Provided By Cornell University

  • White Papers // Aug 2011

    Using Java for Distributed Computing in the Gaia Satellite Data Processing

    In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language. When, the authors started using Java for astronomical applications around 1999 they were the first of their kind in astronomy....

    Provided By Cornell University

  • White Papers // Aug 2011

    Decision Support for e-Governance: A Text Mining Approach

    Information and communication technology has the capability to improve the process by which governments involve citizens in formulating public policy and public projects. Even though much of government regulations may now be in digital form (and often available online), due to their complexity and diversity, identifying the ones relevant to...

    Provided By Cornell University

  • White Papers // Jul 2011

    Automatic Network Reconstruction Using ASP

    Building biological models by inferring functional dependencies from experimental data is an important issue in molecular biology. To relieve the biologist from this traditionally manual process, various approaches have been proposed to increase the degree of automation. However, available approaches often yield a single model only, rely on specific assumptions,...

    Provided By Cornell University

  • White Papers // Jul 2011

    The Evolving Dynamics Of Global Economic Power In The Post-Crisis World: Revelations From A New Index Of Government Economic Power

    This paper develops an index for measuring the economic power of governments viewed as entities in themselves. The basic idea is to encapsulate the economic representative power of a nation's government in the international arena in as simple and parsimonious a manner as possible. For this a set of standard...

    Provided By Cornell University

  • White Papers // Jul 2011

    Abstract Reduction Semantics for Modular Higher-Order Contract Verification

    The authors contribute a new approach to the modular verification of higher-order programs that leverages behavioral software contracts as a rich source of symbolic values. Their approach is based on the idea of an abstract reduction semantics that gives meaning to programs with missing or opaque components. Such components are...

    Provided By Cornell University

  • White Papers // Jul 2011

    Homomorphic Self-Repairing Codes for Agile Maintenance of Distributed Storage Systems

    Distributed data storage systems are essential to deal with the need to store massive volumes of data. In order to make such a system fault-tolerant, some form of redundancy becomes crucial. There are various overheads that are incurred due to such redundancy - most prominent ones being overheads in terms...

    Provided By Cornell University

  • White Papers // Jul 2011

    A Novel Algorithm for Crypto Key Generation by Unification of Encoding Plus Image Pixel Shuffling and Chaotic Blended Blum Blum Shub Generator and Its Applicability in Image Based Cryptosystems

    The use of the data exchange in e-way along with the tremendous growth in ecommerce and m-commerce has created an intense demand for information security. Information security becomes very significant in data storage and transmission. However, widespread popularity of wireless data communication gadgets, integrated with the availability of higher bandwidths,...

    Provided By Cornell University

  • White Papers // Jul 2011

    Speed Scaling on Parallel Processors with Migration

    The authors study the problem of scheduling a set of jobs with release dates, deadlines and processing requirements (or works), on parallel speed-scaled processors so as to minimize the total energy consumption. They consider that both preemption and migration of jobs are allowed. An exact polynomial-time algorithm has been proposed...

    Provided By Cornell University

  • White Papers // Jul 2011

    KISS Approach To Credit Portfolio Modeling

    A simple, yet reasonably accurate, analytical technique is proposed for multi-factor structural credit portfolio models. The accuracy of the technique is demonstrated by benchmarking against Monte Carlo simulations. The approach presented here may be of high interest to practitioners looking for transparent, intuitive, easy to implement and high performance credit...

    Provided By Cornell University

  • White Papers // Jul 2011

    Adjoints And Automatic (Algorithmic) Differentiation In Computational Finance

    Two of the most important areas in computational finance: Greeks and, respectively, calibration, are based on efficient and accurate computation of a large number of sensitivities. This paper gives an overview of adjoint and Automatic Differentiation (AD), also known as algorithmic differentiation, techniques to calculate these sensitivities. When compared to...

    Provided By Cornell University

  • White Papers // Jul 2011

    GraphLab: A Distributed Framework for Machine Learning in the Cloud

    Machine Learning (ML) techniques are indispensable in a wide range of fields. Unfortunately, the exponential increase of dataset sizes are rapidly extending the runtime of sequential algorithms and threatening to slow future progress in ML. With the promise of affordable largescale parallel computing, Cloud systems offer a viable platform to...

    Provided By Cornell University

  • White Papers // Jul 2011

    Semantic-Ontological Combination of Business Rules and Business Processes in IT Service Management

    IT Service Management deals with managing a broad range of items related to complex system environments. As there is both, a close connection to business interests and IT infrastructure, the application of semantic expressions which are seamlessly integrated within applications for managing ITSM environments, can help to improve transparency and...

    Provided By Cornell University

  • White Papers // Jul 2011

    How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET

    Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these protocols is mostly lacking. In this paper, the authors are concerned with this problem, how to specify and how to prove...

    Provided By Cornell University

  • White Papers // Jul 2011

    Smart Radio Spectrum Management for Cognitive Radio

    Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node...

    Provided By Cornell University

  • White Papers // Jul 2011

    Secure and Robust IPV6 Autoconfiguration Protocol for Mobile Adhoc Networks Under Strong Adversarial Model

    Automatic IP address assignment in Mobile Ad hoc NETworks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security...

    Provided By Cornell University

  • White Papers // Jul 2011

    Real Time Face Recognition Using Adaboost Improved Fast PCA Algorithm

    This paper presents an automated system for human face recognition in a real time background world for a large homemade dataset of persons face. The task is very difficult as the real time background subtraction in an image is still a challenge. Addition to this there is a huge variation...

    Provided By Cornell University

  • White Papers // Mar 2012

    Search Algorithms for Conceptual Graph Databases

    The authors consider a database composed of a set of conceptual graphs. Using conceptual graphs and graph homomorphism it is possible to build a basic query-answering mechanism based on semantic search. Graph homomorphism defines a partial order over conceptual graphs. Since graph homomorphism checking is an NP-Complete problem, the main...

    Provided By Cornell University

  • White Papers // Jul 2012

    Camera Identification by Grouping Images From Database, Based on Shared Noise Patterns

    Previous research showed that camera specific noise patterns, so-called PRNU-patterns, are extracted from images and related images could be found. In this particular research the focus is on grouping images from a database, based on a shared noise pattern as an identification method for cameras. Using the method as described...

    Provided By Cornell University

  • White Papers // Jun 2012

    Linear Spaces and Transversal Designs: K-Anonymous Combinatorial Configurations for Anonymous Database Search

    Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peer-to-peer community and post queries on behalf of each other. In this paper, the authors discuss an application of combinatorial configurations (also known as regular and uniform partial linear...

    Provided By Cornell University

  • White Papers // Jun 2012

    Developing a Model for a Text Database Indexed Pedagogically for Teaching the Arabic Language

    In this memory, the authors made the design of an indexing model for Arabic language and adapting standards for describing learning resources used (the LOM and their application profiles) with learning conditions such as levels education of students, their levels of understanding. The pedagogical context with taking into account the...

    Provided By Cornell University

  • White Papers // May 2012

    The Use of Self Organizing Map Method and Feature Selection in Image Database Classification System

    This paper presents a technique in classifying the images into a number of classes or clusters desired by means of Self Organizing Map (SOM) Artificial Neural Network method. A number of 250 color images to be classified as previously done some processing, such as RGB to grayscale color conversion, color...

    Provided By Cornell University

  • White Papers // Feb 2012

    Conversion Database of the Shapes Into XML Data for Shape Matching

    The authors present a new approach to the matching of 2D shapes using XML language and dynamic programming. Given a 2D shape, they extract its contour and which is represented by set of points. The contour is divided into curves using corner detection. After, each curve is described by local...

    Provided By Cornell University

  • White Papers // Jan 2012

    Mapping Relational Database Into OWL Structure with Data Semantic Preservation

    This paper proposes a solution for migrating an RDB into Web semantic. The solution takes an existing RDB as input, and extracts its Metadata representation (MTRDB). Based on the MTRDB, a Canonical Data Model (CDM) is generated. Finally, the structure of the classification scheme in the CDM model is converted...

    Provided By Cornell University

  • White Papers // Oct 2012

    House of Graphs: A Database of Interesting Graphs

    In this paper, the authors present House of Graphs which is a new database of graphs. The key principle is to have a searchable database and offer next to complete lists of some graph classes also a list of special graphs that already turned out to be interesting and relevant...

    Provided By Cornell University

  • White Papers // Jul 2012

    Database Queries and Constraints Via Lifting Problems

    Previous paper has demonstrated that categories are useful and expressive models for databases. In the paper, the authors build on that model, showing that certain queries and constraints correspond to lifting problems, as found in modern approaches to algebraic topology. In their formulation, each so-called SPARQL graph pattern query corresponds...

    Provided By Cornell University

  • White Papers // Aug 2011

    Scalable Continual Top-K Keyword Search in Relational Databases

    Keyword search in relational databases has been widely studied in recent years because it does not require users neither to master a certain structured query language nor to know the complex underlying database schemas. Most of existing methods focus on answering snapshot keyword queries in static databases. In practice, however,...

    Provided By Cornell University

  • White Papers // May 2012

    Experience on Re-Engineering Applying With Software Product Line

    In this paper, the authors present their experience based on a reengineering project. The software project is to re-engineer the original system of a company to answer the new requirements and changed business functions. Reengineering is a process that involves not only the software system, but also underlying business model....

    Provided By Cornell University

  • White Papers // May 2012

    Software Aging Analysis of Web Server Using Neural Networks

    Software aging is a phenomenon that refers to progressive performance degradation or transient failures or even crashes in long running software systems such as web servers. It mainly occurs due to the deterioration of operating system resource, fragmentation and numerical error accumulation. A primitive method to fight against software aging...

    Provided By Cornell University

  • White Papers // Jun 2012

    ACME Vs PDDL: Support for Dynamic Reconfiguration of Software Architectures

    On the one hand, ACME is a language designed in the late 90s as an interchange format for software architectures. The need for reconfiguration at runtime has led to extend the language with specific support in Plastik. On the other hand, PDDL is a predicative language for the description of...

    Provided By Cornell University

  • White Papers // Apr 2012

    Evaluation of the Design Metric to Reduce the Number of Defects in Software Development

    Software design is one of the most important and key activities in the System Development Life Cycle (SDLC) phase that ensures the quality of software. Different key areas of design are very vital to be taken into consideration while designing software. Software design describes how the software system is decomposed...

    Provided By Cornell University

  • White Papers // Apr 2012

    Airborne Software Tests on a Fully Virtual Platform

    This paper presents the early deployment of a fully virtual platform to perform the tests of certified airborne software. This is an alternative to the current approach based on the use of dedicated hardware platforms. The verification process is a major process in the development of airborne software. Its purpose...

    Provided By Cornell University

  • White Papers // Aug 2012

    On the Use of Latency Graphs for the Construction of Tor Circuits

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Cornell University

  • White Papers // Jul 2012

    Bio Inspired Approach to Secure Routing in MANETs

    In this paper, the author explores the challenges with respect to the security aspect in MANETs and proposes a new approach which makes use of a bio-inspired methodology. This paper elaborates various attacks which can be perpetrated on MANETs and current solutions to the aforementioned problems, and then it describes...

    Provided By Cornell University

  • White Papers // Jun 2012

    Anonymous Communication in Peer-to-Peer Networks for Providing More Privacy and Security

    One of the most important issues in peer-to-peer networks is anonymity. The major anonymity for peer-to-peer users concerned with the users' identities and actions which can be revealed by any other members. There are many approaches proposed to provide anonymous peer-to-peer communications. An intruder can get information about the content...

    Provided By Cornell University

  • White Papers // Jun 2012

    Multi-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing is drastically growing technology which provides an on-demand software, hardware, infrastructure and data storage as services. This technology is used worldwide to improve the business infrastructure and performance. However, to utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password...

    Provided By Cornell University

  • White Papers // Sep 2012

    An Agent-Based Framework for Cooperation in Supply Chain

    Supply Chain coordination has become a critical success factor for Supply Chain management (SCM) and effectively improving the performance of organizations in various industries. Companies are increasingly located at the intersection of one or more corporate networks which are designated by "Supply Chain". Managing this chain is mainly based on...

    Provided By Cornell University

  • White Papers // Oct 2012

    Inferring the Underlying Structure of Information Cascades

    In social networks, information and influence diffuse among users as cascades. While the importance of studying cascades has been recognized in various applications, it is difficult to observe the complete structure of cascades in practice. Moreover, much less is known on how to infer cascades based on partial observations. In...

    Provided By Cornell University

  • White Papers // Oct 2012

    Artex is Another Text Summarizer

    This paper describes Artex, another algorithm for Automatic Text Summarization. In order to rank sentences, a simple inner product is calculated between each sentence, a document vector (text topic) and a lexical vector (vocabulary used by a sentence). Summaries are then generated by assembling the highest ranked sentences. No ruled-based...

    Provided By Cornell University

  • White Papers // Oct 2012

    Variable-Length Hill Cipher with MDS Key Matrix

    The Hill Cipher is a classical symmetric cipher which breaks plaintext into blocks of size and then multiplies each block by an key matrix to yield ciphertext. However, it is well known that the Hill cipher succumbs to cryptanalysis relatively easily. As a result, there have been efforts to strengthen...

    Provided By Cornell University

  • White Papers // Oct 2012

    Detecting Dense Communities in Large Social and Information Networks with the Core & Peel Algorithm

    Detecting and characterizing dense subgraphs (tight communities) in social and information networks is an important exploratory tool in social network analysis. Several approaches have been proposed that either partition the whole network into "Clusters", even in low density region, or are aimed at finding a single densest community (and need...

    Provided By Cornell University

  • White Papers // Oct 2012

    Scheduling Resources for Executing a Partial Set of Jobs

    In this paper, the authors consider the problem of choosing a minimum cost set of resources for executing a specified set of jobs. Each input job is an interval, determined by its start-time and end-time. Each resource is also an interval determined by its start-time and end-time; moreover, every resource...

    Provided By Cornell University

  • White Papers // Oct 2012

    Sudoku as a Special Transportation Problem

    Sudoku is a popular combinatorial puzzle. A new method of solving Sudoku is presented, which involves formulating a puzzle as a special type of transportation problem. This model allows one to solve puzzles with more than one solution, keeping the constraints of the problem fixed, and simply changing a cost...

    Provided By Cornell University

  • White Papers // Oct 2012

    Local Search Is Better Than Random Assignment for Bounded Occurrence Ordering K-CSPs

    The authors prove that the Bounded Occurrence Ordering k-CSP Problem is not approximation resistant. They give a very simple local search algorithm that always performs better than the random assignment algorithm (unless, the number of satisfied constraints does not depend on the ordering). In this paper, they give a very...

    Provided By Cornell University

  • White Papers // Oct 2012

    Providing an Object Allocation Algorithm in Distributed Databases Using Efficient Factors

    Data replication is a common method used to improve the performance of data access in distributed database systems. In this paper, the authors present an Object Replication Algorithm in Distributed database systems (ORAD). They optimize the created replicated data in distributed database systems by using activity functions of previous algorithms,...

    Provided By Cornell University

  • White Papers // Oct 2012

    Investigating Decision Support Techniques for Automating Cloud Service Selection

    The compass of Cloud infrastructure services advances steadily leaving users in the agony of choice. To be able to select the best mix of service offering from an abundance of possibilities, users must consider complex dependencies and heterogeneous sets of criteria. Therefore, the authors present a PhD paper proposal on...

    Provided By Cornell University

  • White Papers // Oct 2012

    A Map-Reduce Parallel Approach to Automatic Synthesis of Control Software

    Many Control Systems are indeed Software Based Control Systems, i.e. control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for automatic synthesis of control software. Available algorithms and tools (e.g., QKS) may require weeks or even months...

    Provided By Cornell University

  • White Papers // Oct 2009

    GO: Platform Support for Gossip Applications

    Gossip-based protocols are increasingly popular in large-scale distributed applications that disseminate updates to replicated or cached content. GO (Gossip Objects) is a per-node gossip platform that the authors developed in support of this class of protocols. In addition to making it easy to develop new gossip protocols and applications, GO...

    Provided By Cornell University

  • White Papers // Oct 2009

    Cloudifying Source Code Repositories: How Much Does It Cost?

    Cloud computing provides one with general purpose storage and server hosting platforms at a reasonable price. The authors explore the possibility of tapping these resources for the purpose of hosting source code repositories for individual projects as well as entire open source communities. An analysis of storage costs is presented,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // May 2009

    Sharing Private Information Across Distributed Databases

    In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. The authors show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any...

    Provided By Cornell University

  • White Papers // Feb 2009

    Ajil: Distributed Rate-Limiting for Multicast Networks

    Multicast traffic patterns play a key role in dependable data centers, arising when data is replicated and distributed over multiple machines for fault-tolerance and availability. Such settings involve large numbers of multicast groups as well as multiple senders to each group - a single system can have hundreds of such...

    Provided By Cornell University

  • White Papers // Jan 2011

    Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

    The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols. Anti-entropy, or gossip, is an attractive way of replicating state that does not have strong consistency requirements....

    Provided By Cornell University

  • White Papers // Jan 2011

    Network-Aware Adaptation Techniques for Mobile File Systems

    Wireless networks present unusual challenges for mobile file system clients since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditional approach to adapting network communication to these conditions is to write back file updates asynchronously when bandwidth is low. Unfortunately, this can lead to underutilisation of bandwidth and...

    Provided By Cornell University

  • White Papers // Jan 2011

    On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks

    Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A key and difficult requirement of many such applications is heterogeneity: peers have different node degrees in the random graph based on their...

    Provided By Cornell University

  • White Papers // Sep 2010

    Detection of Time-Varying Flows in Wireless Networks

    The problem of detecting the presence of time-varying flows in multi-hop wireless networks is considered. In particular, from transmission timing measurements, a test is constructed to determine whether there is a flow of data packets between a pair of nodes. It is assumed that the packet flows may have time-varying...

    Provided By Cornell University

  • White Papers // Feb 2011

    Secondary Job Scheduling in the Cloud With Deadlines

    The highly dynamic nature of the cloud environment leads to a time-varying resource utilization and the cloud provider can potentially accommodate secondary jobs with the remaining resource. To better implement the idea of resource reutilization in the cloud environment, the problem of secondary job scheduling with deadlines under time-varying resource...

    Provided By Cornell University