Cornell University

Displaying 921-960 of 1230 results

  • White Papers // Dec 2010

    A Self-Organising Neural Network for Processing Data From Multiple Sensors

    This paper shows how a folded Markov chain network can be applied to the problem of processing data from multiple sensors, with an emphasis on the special case of 2 sensors. It is necessary to design the network so that it can transform a high dimensional input vector into a...

    Provided By Cornell University

  • White Papers // Dec 2010

    Generalized and Resource-Efficient VNet Embeddings With Migrations

    Network virtualization technology is believed to be a key enabler for the "Future Internet" as it allows to overcome existing ossifications and facilitates fast innovations. A crucial feature of this technology is the decoupling of virtual networks from the underlying substrate: Virtual Networks (VNets) can be mapped to those locations...

    Provided By Cornell University

  • White Papers // Dec 2010

    Financial Markets With Volatility Uncertainty

    The authors investigate financial markets under model risk caused by uncertain volatilities. For this purpose they consider a financial market that features volatility uncertainty. To have a mathematical consistent framework they use the notion of G - expectation and its corresponding G - Brownian motion recently introduced by Peng (2007)....

    Provided By Cornell University

  • White Papers // Dec 2010

    Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria EBanking System

    Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses...

    Provided By Cornell University

  • White Papers // Dec 2010

    Collaborative Knowledge Creation and Management in Information Retrieval

    The final goal of Information Retrieval (IR) is knowledge production. However, it has been argued that knowledge production is not an individual effort but a collaborative effort. Collaboration in information retrieval is geared towards knowledge sharing and creation of new knowledge by users. This paper discusses Collaborative Information Retrieval (CIR)...

    Provided By Cornell University

  • White Papers // Dec 2010

    Throughput and Latency in Finite-Buffer Line Networks

    This paper investigates the effect of finite buffer sizes on the throughput capacity and packet delay of line networks with packet erasure links that have perfect feedback. These performance measures are shown to be linked to the stationary distribution of an underlying irreducible Markov chain that models the system exactly....

    Provided By Cornell University

  • White Papers // Dec 2010

    Insider Trading In The Market With Rational Expected Price

    Kyle (1985) builds a pioneering and influential model, in which an insider with long-lived private information submits an optimal order in each period given the market maker's pricing rule. An inconsistency exists to some extent in the sense that the "Constant pricing rule " actually assumes an adaptive expected price...

    Provided By Cornell University

  • White Papers // Dec 2010

    An Econophysics Model For The Stock-markets Analysis And Diagnosis

    In this paper, the authors present an econophysic model for the description of shares transactions in a capital market. For introducing the fundamentals of this model they used an analogy between the electrical field produced by a system of charges and the overall of economic and financial information of the...

    Provided By Cornell University

  • White Papers // Dec 2010

    Macrostate Parameter And Investment Risk Diagrams For 2008 And 2009

    In this paper, are made some considerations of the application of phenomenological thermodynamics in risk analysis for the transaction on financial markets, using the concept of economic entropy and the macrostate parameter introduced by the authors in a previous works. The investment risk diagrams for a number of Romanian listed...

    Provided By Cornell University

  • White Papers // Dec 2010

    Life Time Of Correlation Between Stocks Prices On Established And Emerging Markets

    The correlation coefficient between stocks depends on price history and includes information on hierarchical structure in financial markets. It is useful for portfolio selection and estimation of risk. The author introduces the Life Time of Correlation between stocks prices to know how far we should investigate the price history to...

    Provided By Cornell University

  • White Papers // Dec 2010

    Hierarchical Structure In Phonographic Market

    The author finds a topological arrangement of assets traded in a phonographic market which has associated a meaningful economic taxonomy. The author continues using the Minimal Spanning Tree and the Life-time Of Correlations between assets, but now outside the stock markets. This is the first attempt to use these methods...

    Provided By Cornell University

  • White Papers // Dec 2010

    Forest: A Language and Toolkit for Programming With Filestores

    Many applications use the file system as a simple persistent data store. This approach is expedient, but not robust. The correctness of such an application depends on the collection of files, directories, and symbolic links having a precise organization. Furthermore these components must have acceptable values for a variety of...

    Provided By Cornell University

  • White Papers // Nov 2010

    Regulatory Medicine Against Financial Market Instability: What Helps And What Hurts?

    Do we know if a short selling ban or a Tobin Tax results in more stable asset prices? Or do they in fact make things worse? Just like medicine regulatory measures in financial markets aim at improving an already complex system. And just like medicine these interventions can cause side...

    Provided By Cornell University

  • White Papers // Nov 2010

    Performance Analysis of a 60 GHz Near Gigabit System for WPAN Applications

    A 60 GHz wireless Gigabit Ethernet (G.E.) communication system capable of near gigabit data rate has been developed at IETR. The realized system covers 2 GHz available bandwidth. This paper describes the design and realization of the overall system including the BaseBand (BB), Intermediate Frequency (IF) and RadioFrequency (RF) blocks....

    Provided By Cornell University

  • White Papers // Nov 2010

    Cost Objective PLM And CE

    Concurrent engineering taking into account product life-cycle factors seems to be one of the industrial challenges of the next years. Cost estimation and management are two main strategic tasks that imply the possibility of managing costs at the earliest stages of product development. This is why it is indispensable to...

    Provided By Cornell University

  • White Papers // Nov 2010

    Wavelet-Based Prediction For Governance, Diversification And Value Creation Variables

    The authors study the possibility of completing data bases of a sample of governance, diversification and value creation variables by providing a well adapted method to reconstruct the missing parts in order to obtain a complete sample to be applied for testing the ownership-structure/diversification relationship. It consists of a dynamic...

    Provided By Cornell University

  • White Papers // Nov 2010

    A Model for Configuration Management of Open Software Systems

    The paper proposes a model for the configuration management of open systems. The model aims at validation of configurations against given specifications. An extension of decision graphs is proposed to express specifications. The proposed model can be used by software developers to validate their own configurations across different versions of...

    Provided By Cornell University

  • White Papers // Nov 2010

    Calibration Of One- And Two-Factor Models For Valuation Of Energy Multi-Asset Derivative Contracts

    The authors study historical calibration of one- and two-factor models that are known to describe relatively well the dynamics of energy underlyings such as spot and index natural gas or oil prices at different physical locations or regional power prices. They take into account uneven frequency of data due to...

    Provided By Cornell University

  • White Papers // Nov 2010

    Compressed Transmission of Route Descriptions

    The authors present two methods to compress the description of a route in a road network, i.e., of a path in a directed graph. The first method represents a path by a sequence of via edges. The subpaths between the via edges have to be unique shortest paths. Instead of...

    Provided By Cornell University

  • White Papers // Nov 2010

    A Coder-Decoder Model for Use in Lossless Data Compression

    This paper describes a technique of using a trigonometric function and combinatorial calculations to code or transform any finite sequence of binary numbers (0s and 1s) of any length to a unique set of three Real numbers. In reverse, these three Real numbers can be used independently to reconstruct the...

    Provided By Cornell University

  • White Papers // Nov 2010

    Virtually Synchronous Methodology for Dynamic Service Replication

    In designing and building distributed systems, it is common engineering practice to separate steady-state ("Normal") operation from abnormal events such as recovery from failure. This way the normal case can be optimized extensively while recovery can be amortized. However, integrating the recovery procedure with the steady-state protocol is often far...

    Provided By Cornell University

  • White Papers // Nov 2010

    Group-Decodable Space-Time Block Codes With Code Rate > 1

    High-rate space-time block codes (STBC with code rate > 1) in Multi-Input Multi-Output (MIMO) systems are able to provide both spatial multiplexing gain and diversity gain, but have high Maximum Likelihood (ML) decoding complexity. Since group-decodable (quasi-orthogonal) code structure can reduce the decoding complexity, the authors present in this paper...

    Provided By Cornell University

  • White Papers // Nov 2010

    The Necessity for Hardware QoS Support for Server Consolidation and Cloud Computing

    Chip MultiProcessors (CMPs) are ubiquitous in most of today's computing fields. Although they provide noticeable benefits in terms of performance, cost and power efficiency, they also introduce some new issues. In this paper, the authors analyze how the interference from Virtual Private Servers running in other cores is a significant...

    Provided By Cornell University

  • White Papers // Nov 2010

    Reduced Form Models Of Bond Portfolios

    The authors derive simple return models for several classes of bond portfolios. With only one or two risk factors the models are able to explain most of the return variations in portfolios of fixed rate government bonds, inflation linked government bonds and investment grade corporate bonds. The underlying risk factors...

    Provided By Cornell University

  • White Papers // Nov 2010

    Risk-Neutral Pricing Of Financial Instruments In Emission Markets

    The authors present a novel approach to the pricing of financial instruments in emission markets, for example, the EU ETS. The proposed hybrid model is positioned between existing complex full equilibrium models and pure risk-neutral models. Using an exogenously specified demand for a polluting good it gives a causal explanation...

    Provided By Cornell University

  • White Papers // Nov 2010

    A Finite Dimensional Approximation For Pricing Moving Average Options

    The authors propose a method for pricing American options whose pay-off depends on the moving average of the underlying asset price. The method uses a finite dimensional approximation of the infinite-dimensional dynamics of the moving average process based on a truncated Laguerre series expansion. The resulting problem is a finite-dimensional...

    Provided By Cornell University

  • White Papers // Nov 2010

    An Intelligent Software Workflow Process Design for Location Management on Mobile Devices

    Advances in the technologies of networking, wireless communication and trimness of computers lead to the rapid development in mobile communication infrastructure, and have drastically changed information processing on mobile devices. Users carrying portable devices can freely move around, while still connected to the network. This provides flexibility in accessing information...

    Provided By Cornell University

  • White Papers // Nov 2010

    Individual Privacy vs Population Privacy: Learning to Attack Anonymization

    Over the last decade there have been great strides made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as k-anonymity and l-diversity) have been criticized...

    Provided By Cornell University

  • White Papers // Nov 2010

    A Semigroup Point Of View On Splitting Schemes For Stochastic (Partial) Differential Equations

    The authors construct normed spaces of real-valued functions with controlled growth on possibly infinite-dimensional state spaces such that semigroups of positive, bounded operators (Pt)t??0 thereon with limt??0+ Ptf(x) = f(x) are in fact strongly continuous. This result applies to prove optimal rates of convergence of splitting schemes for stochastic (partial)...

    Provided By Cornell University

  • White Papers // Nov 2010

    The Role Of Confidence In Finance

    It has been realized for a long time by bankers and politicians that confidence plays an important role in finance. Economists, in contrast, have been slow to realize this. As a result there does not exist a strong tradition in the economics literature that discusses what confidence is and what...

    Provided By Cornell University

  • White Papers // Nov 2010

    Ruin Probability In The Presence Of Risky Investments

    It is well known that the analysis of activity of an insurance company in conditions of uncertainty is of great importance. Starting from the classical papers of Cramer and Lundberg which first considered the ruin problem in stochastic environment, this subject has attracted much attention. Recall that, in the classical...

    Provided By Cornell University

  • White Papers // Nov 2010

    Parsimonious HJM Modelling For Multiple Yield-curve Dynamics

    For a long time interest-rate models were built on a single yield curve used both for discounting and forwarding. However, the crisis that has affected financial markets in the last years led market players to revise this assumption and accommodate basis-swap spreads, whose remarkable widening can no longer be neglected....

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Nov 2010

    Hedging Pure Endowments With Mortality Derivatives

    In recent years, a market for mortality derivatives began developing as a way to handle systematic mortality risk, which is inherent in life insurance and annuity contracts. Systematic mortality risk is due to the uncertain development of future mortality intensities, or hazard rates. In this paper, the authors develop a...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Oct 2010

    Entering New Markets-A Challenge In Times Of Crisis

    After September 2008, the advanced economies severe decline caused demand for emerging economies' exports to drop and the crisis became truly global, much deeper and broader than expected. In these times of global depression, most countries and companies are affected, some more than others. The financial crisis has turned out...

    Provided By Cornell University

  • White Papers // Oct 2010

    The Nature Of Price Returns During Periods Of High Market Activity

    By studying all the trades and best bids/asks of ultra high frequency snapshots recorded from the order books of a basket of 10 futures assets, the authors bring qualitative empirical evidence that the impact of a single trade depends on the intertrade time lags. They find that when the trading...

    Provided By Cornell University

  • White Papers // Oct 2010

    E-Net Models of a Software System for Web Pages Security

    This paper presents solutions for cryptography protection for web pages. The solutions comprise the authors' experience in development and implementation of systems for information security in the Automated Information Systems of Bulgarian Armed Forces. The architecture, the models and the methods are being explained. With the increase of the possibilities...

    Provided By Cornell University

  • White Papers // Oct 2010

    Time-Changed Fast Mean-Reverting Stochastic Volatility Models

    The authors introduce a class of randomly time-changed fast mean-reverting stochastic volatility models and, using spectral theory and singular perturbation techniques, they derive an approximation for the prices of European options in this setting. Three examples of random time-changes are provided and the implied volatility surfaces induced by these time-changes...

    Provided By Cornell University

  • White Papers // Oct 2010

    Ordering Of Multivariate Probability Distributions With Respect To Extreme Portfolio Losses

    A new notion of stochastic ordering is introduced to compare multivariate stochastic risk models with respect to extreme portfolio losses. In the framework of multivariate regular variation comparison criteria are derived in terms of ordering conditions on the spectral measures, which allows for analytical or numerical verification in practical applications....

    Provided By Cornell University

  • White Papers // Dec 2013

    Verifying the Consistency of Remote Untrusted Services with Commutative Operations

    A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of...

    Provided By Cornell University

  • White Papers // Dec 2012

    Sensing as a Service and Big Data

    Internet of Things (IoT) will comprise billions of devices that can sense, communicate, compute and potentially actuate. Data streams coming from these devices will challenge the traditional approaches to data management and contribute to the emerging paradigm of big data. This paper discusses emerging Internet of Things (IoT) architecture, large...

    Provided By Cornell University

  • White Papers // Jan 2007

    Dynamic Security Labels and Static Information Flow Control

    In this paper, the authors present a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies provide the means to express strong security requirements for data confidentiality and integrity. Recent work on security-typed programming languages...

    Provided By Cornell University

  • White Papers // Jan 2011

    Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs

    Concurrent Non-Malleable Zero-Knowledge (CNMZK) considers the concurrent execution of zero-knowledge protocols in a setting where the attacker can simultaneously corrupt multiple provers and verifiers. The authors provide the first construction of a CNMZK protocol that, without any trusted set-up, remains secure even if the attacker may adaptively select the statements...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy

    The authors put forward a zero-knowledge based definition of privacy. Their notion is strictly stronger than the notion of differential privacy and is particularly attractive when modeling privacy in social networks. They furthermore demonstrate that it can be meaningfully achieved for tasks such as computing averages, fractions, histograms, and a...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Non-Black-Box Lower Bounds in Cryptography

    In the past four decades, many cryptographic tasks have been put under rigorous treatment in an effort to realize these tasks under minimal assumptions. The authors consider average-case strengthening's of the traditional assumption that coNP is not contained in AM. Under these assumptions, they rule out generic and potentially non-black-box...

    Provided By Cornell University

  • White Papers // Nov 2013

    Limits of Extractability Assumptions with Distributional Auxiliary Input

    Extractability, or \"Knowledge\", assumptions (such as the \"Knowledge-of-exponent\" assumption) have recently gained popularity in the cryptographic community - leading to the study of primitives such as extractable one-way functions, extractable hash functions, Succinct Non-interactive ARguments of Knowledge (SNARKs), and extractable obfuscation, and spurring the development of a wide spectrum of...

    Provided By Cornell University

  • White Papers // Apr 2013

    Optimizing Cost, Delay, Packet Loss and Network Load in AODV Routing Protocol

    AODV is Ad-hoc On-Demand Distance Vector. A mobile ad-hoc network is a self-configuring network of mobile devices connected by wireless. MANET does not have any fixed infrastructure. The device in a MANET is free to move in any direction and will form the connection as per the requirement of the...

    Provided By Cornell University

  • White Papers // Jan 2014

    DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper...

    Provided By Cornell University

  • White Papers // Dec 2013

    Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis

    Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection....

    Provided By Cornell University

  • White Papers // Jan 2014

    Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases

    With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that...

    Provided By Cornell University

  • White Papers // Jan 2014

    New Approaches to Website Fingerprinting Defenses

    Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ineffective. This paper advances the study of website fingerprinting attacks and defenses...

    Provided By Cornell University

  • White Papers // Jan 2014

    Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    High-Dimensional Quantum Key Distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. The authors consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down conversion, and show that it is secure against collective attacks. Its security rests upon visibility data - obtained from Franson...

    Provided By Cornell University

  • White Papers // Jan 2014

    Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing

    In this paper, the authors address the issues of using edge detection techniques on facial images to produce cancellable biometric templates and a novel method for template verification against tampering. With increasing use of biometrics, there is a real threat for the conventional systems using face databases, which store images...

    Provided By Cornell University

  • White Papers // Jan 2014

    Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics

    Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its place. It has provided a unique opportunity for online services, such that the user need not physically present at the service center. These services adopt...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Novel Admission Control Model in Cloud Computing

    With the rapid development of cloud computing technologies and wide adopt of cloud services and applications, QoS provisioning in clouds becomes an important research topic. In this paper, the authors propose an admission control mechanism for cloud computing. In particular, they consider the high volume of simultaneous requests for cloud...

    Provided By Cornell University

  • White Papers // Jul 2013

    The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems

    In the past decades, in order to store big data and provide services, more and more organizations around the world build data centers with scales varying from several nodes to hundreds of thousands of nodes. The people live in an era of big data, and big data applications are becoming...

    Provided By Cornell University

  • White Papers // Feb 2014

    Intensional RDB Manifesto: a Unifying NewSQL Model for Flexible Big Data

    In this paper, the authors present a new family of Intensional RDBs (IRDBs) which extends the traditional RDBs with the Big Data and flexible and 'Open schema' features, able to preserve the user-defined relational database schemas and all preexisting user's applications containing the SQL statements for a deployment of such...

    Provided By Cornell University

  • White Papers // Oct 2013

    Analyzing Big Data with Dynamic Quantum Clustering

    How does one search for a needle in a multi-dimensional haystack without knowing what a needle is and without knowing if there is one in the haystack? This kind of problem requires a paradigm shift - away from hypothesis driven searches of the data - towards a methodology that lets...

    Provided By Cornell University

  • White Papers // Oct 2012

    Fast Data in the Era of Big Data: Twitter's Real-Time Related Query Suggestion Architecture

    The authors present the architecture behind Twitter's real-time related query suggestion and spelling correction service. Although these tasks have received much attention in the web search literature, the Twitter context introduces a real-time \"Twist\": after significant breaking news events, they aim to provide relevant results within minutes. This paper provides...

    Provided By Cornell University

  • White Papers // Sep 2013

    Unmixing Incoherent Structures of Big Data by Randomized or Greedy Decomposition

    Learning big data by matrix decomposition always suffers from expensive computation, mixing of complicated structures and noise. In this paper, the authors study more adaptive models and efficient algorithms that decompose a data matrix as the sum of semantic components with incoherent structures. They firstly introduce \"GO Decomposition (GoDec)\", an...

    Provided By Cornell University

  • White Papers // Feb 2014

    Big Data and the SP Theory of Intelligence

    This paper is about how the SP theory of intelligence and its realization in the SP machine may, with advantage, be applied to the management and analysis of big data. The issues which are discussed are general and need to be addressed in any scenario. The SP system introduced in...

    Provided By Cornell University

  • White Papers // Mar 2014

    Era of Big Data Processing: A New Approach via Tensor Networks and Tensor Decompositions

    Modern applications such as computational neuroscience, neuroinformatics and pattern/image recognition generate massive amounts of multidimensional data with multiple aspects and high dimensionality. Big data require novel technologies to efficiently process massive datasets within tolerable elapsed times. Such a new emerging technology for multidimensional big data is a multi-way analysis via...

    Provided By Cornell University

  • White Papers // Nov 2013

    Scalable Data Cube Analysis over Big Data

    Data cubes are widely used as a powerful tool to provide multidimensional views in data warehousing and On-Line Analytical Processing (OLAP). However, with increasing data sizes, it is becoming computationally expensive to perform data cube analysis. The problem is exacerbated by the demand of supporting more complicated aggregate functions (e.g....

    Provided By Cornell University

  • White Papers // Nov 2013

    Big Data Analytics in Future Internet of Things

    Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, the authors argue that only connected is not enough, beyond that, general objects should...

    Provided By Cornell University

  • White Papers // Nov 2013

    A Big Data Approach to Computational Creativity

    Computational creativity is an emerging branch of artificial intelligence that places computers in the center of the creative process. Broadly, creativity involves a generative step to produce many ideas and a selective step to determine the ones that are the best. Many previous attempts at computational creativity, however, have not...

    Provided By Cornell University

  • White Papers // Nov 2013

    On the Inequality of the 3V's of Big Data Architectural Para-Digms: A Case for Heterogeneity

    The well-known 3V architectural paradigm for Big Data introduced by Laney (2011) provides a simplified framework for defining the architecture of a big data platform to be deployed in various scenarios tackling processing of massive datasets. While additional components such as Variability and Veracity have been discussed as an extension...

    Provided By Cornell University

  • White Papers // Jul 2013

    BigDataBench: a Big Data Benchmark Suite from Web Search Engines

    In this paper, the authors present joint research efforts on big data benchmarking with several industrial partners. Considering the complexity, diversity, workload churns, and rapid evolution of big data systems, they take an incremental approach in big data benchmarking. For the first step, they pay attention to search engines, which...

    Provided By Cornell University

  • White Papers // Dec 2013

    Cache-Aware Static Scheduling for Hard Real-Time Multicore Systems Based on Communication Affinities

    The growing need for continuous processing capabilities has led to the development of multicore systems with a complex cache hierarchy. Such multicore systems are generally designed for improving the performance in average case, while hard real-time systems must consider worst-case scenarios. An open challenge is therefore to efficiently schedule hard...

    Provided By Cornell University

  • White Papers // Feb 2014

    Erasure-Coded Byzantine Storage with Separate Metadata

    Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be...

    Provided By Cornell University

  • White Papers // Feb 2014

    Distributed Storage over Unidirectional Ring Networks

    In this paper, the authors study distributed storage problems over unidirectional ring networks, whose storage nodes form a directed ring and data is transmitted along the same direction. The original data is distributed to store on these nodes. Each user can connect one and only one storage node to download...

    Provided By Cornell University

  • White Papers // Feb 2014

    On Heterogeneous Regenerating Codes and Capacity of Distributed Storage Syste

    Heterogeneous Distributed Storage Systems (DSS) are close to real world applications for data storage. Internet caching system and peer-to-peer storage clouds are the examples of such DSS. In this paper, the authors calculate the capacity formula for such systems where each node store different number of packets and each having...

    Provided By Cornell University

  • White Papers // Feb 2014

    On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems

    A passive adversary can eavesdrop stored content or downloaded content of some storage nodes, in order to learn illegally about the file stored across a Distributed Storage System (DSS). Previous work in the literature focuses on code constructions that trade storage capacity for perfect security. In other words, by decreasing...

    Provided By Cornell University

  • White Papers // Aug 2013

    Distributed Object Store Principles of Operation The Case for Intelligent Storage

    In this paper, the authors look at the growth of Distributed Object Stores (DOS) and examine the underlying mechanisms that guide their use and development. Their focus is on the fundamental principles of operation that define this class of system, how it has evolved, and where it is heading as...

    Provided By Cornell University

  • White Papers // Jul 2013

    Non-Homogeneous Two-Rack Model for Distributed Storage Systems

    In the traditional two-rack Distributed Storage System (DSS) model, due to the assumption that the storage capacity of each node is the same, the Minimum Bandwidth Regenerating (MBR) point becomes infeasible. In this paper, the authors design a new non-homogeneous two-rack model by proposing a generalization of the threshold function...

    Provided By Cornell University

  • White Papers // Jul 2013

    TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure Codes

    The authors' paper presents solutions using erasure coding, parallel connections to storage cloud and limited chunking (i.e., dividing the object into a few smaller segments) together to significantly improve the delay performance of uploading and downloading data in and out of cloud storage. TOFEC is a strategy that helps front-end...

    Provided By Cornell University

  • White Papers // Jul 2013

    Energy Storage System Design for a Power Buffer System to Provide Load Ride-through

    The design of a power buffer to mitigate the negative impact of constant power loads on voltage stability as well as enhancing ride-through capability for the loads during upstream voltage disturbances is examined. The power buffer adjusts its front-end converter control so that the buffer-load combination would appear as a...

    Provided By Cornell University

  • White Papers // Jun 2013

    Toward a Unified Performance and Power Consumption NAND Flash Memory Model of Embedded and Solid State Secondary Storage Systems

    In this paper, the authors present a set of models dedicated to describe a flash storage subsystem structure, functions, performance and power consumption behaviors. These models cover a large range of today's NAND flash memory applications. They are designed to be implemented in simulation tools allowing to estimate and compare...

    Provided By Cornell University

  • White Papers // Jun 2013

    Towards a Better Insight of RDF Triples Ontology-Guided Storage System Abilities

    The vision of the semantic web is becoming a reality with billions of RDF triples being distributed over multiple queryable end-points (e.g. linked data). Although there has been a body of work on RDF triples persistent storage, it seems that, considering reasoning de-pendent queries, the problem of providing an efficient,...

    Provided By Cornell University

  • White Papers // May 2013

    Storage and Search in Dynamic Peer-to-Peer Networks

    The authors study robust and efficient distributed algorithms for searching, storing, and maintaining data in dynamic Peer-To-Peer (P2P) networks. P2P networks are highly dynamic networks that experience heavy node churn (i.e., nodes join and leave the network continuously over time). Their goal is to guarantee, despite high node churn rate,...

    Provided By Cornell University