Cornell University

Displaying 161-200 of 1385 results

  • White Papers // Oct 2014

    Efficient LTE Access with Collision Resolution for Massive M2M Communications

    LTE random access procedure performs satisfactorily in case of asynchronous, uncorrelated traffic arrivals. However, when the arrivals are correlated and arrive synchronously, the performance of the Random Access CHannel (RACH) is drastically reduced, causing a large number of devices to experience outage. In this paper, the authors propose a LTE...

    Provided By Cornell University

  • White Papers // Oct 2014

    Probabilistic Definitions of Actual Causation Using CP-logic

    Since Pearl's seminal work on providing a formal language for causality, the subject has garnered a lot of interest among philosophers and researchers in artificial intelligence alike. One of the most debated topics in this context regards the notion of actual causation, which concerns itself with specific - as opposed...

    Provided By Cornell University

  • White Papers // Oct 2014

    Timed Influence: Computation and Maximization

    The authors consider a cost model for diffusion in a network that captures both the scope of infection and its propagation time: the edges of the network have associated lengths which model transmission times, and influence scores are higher for faster propagation. They propose an intuitive measure of timed influence,...

    Provided By Cornell University

  • White Papers // Oct 2014

    QoE Modelling, Measurement and Prediction: A Review

    In mobile computing systems, users can access network services anywhere and anytime using mobile devices such as tablets and Smartphone's. These devices connect to the Internet via network or telecommunications operators. Users usually have some expectations about the services provided to them by different operators. Users' expectations along with additional...

    Provided By Cornell University

  • White Papers // Oct 2014

    Lost in Space: Improving Inference of IPv4 Address Space Utilization

    One challenge in understanding the evolution of Internet infrastructure is the lack of systematic mechanisms for monitoring the extent to which allocated IP addresses are actually used. In this paper, the authors try to advance the science of inferring IPv4 address space utilization by analyzing and correlating results obtained through...

    Provided By Cornell University

  • White Papers // Oct 2014

    Applying Agile Requirements Engineering Approach for Re-engineering & Changes in existing Brownfield Adaptive Systems

    Requirements Engineering (RE) is a key activity in the development of software systems and is concerned with the identification of the goals of stakeholders and their elaboration into precise statements of desired services and behavior. The paper describes an agile requirements engineering approach for re-engineering & changes in existing brownfield...

    Provided By Cornell University

  • White Papers // Oct 2014

    Parameterizing the Semantics of Fuzzy Attribute Implications by Systems of Isotone Galois Connections

    The authors study the semantics of fuzzy if-then rules called fuzzy attribute implications parameterized by systems of isotone Galois connections. The rules express dependencies between fuzzy attributes in object-attribute incidence data. The proposed parameterizations are general and include as special cases the parameterizations by linguistic hedges used in earlier approaches....

    Provided By Cornell University

  • White Papers // Oct 2014

    The Quantum Nature of Identity in Human Thought: Bose-Einstein Statistics for Conceptual Indistinguishability

    Increasing experimental evidence shows that humans combine concepts in a way that violates the rules of classical logic and probability theory. On the other hand, mathematical models inspired by the formalism of quantum theory are in accordance with data on concepts and their combinations. In this paper, the authors investigate...

    Provided By Cornell University

  • White Papers // Oct 2014

    On the Complexity of Optimization Problems based on Compiled NNF Representations

    Optimization is a key task in a number of applications. When the set of feasible solutions under consideration is of combinatorial nature and described in an implicit way as a set of constraints, optimization is typically NP-hard. Fortunately, in many problems, the set of feasible solutions does not often change...

    Provided By Cornell University

  • White Papers // Oct 2014

    Practical Massively Parallel Sorting - Basic Algorithmic Ideas

    Sorting is one of the most fundamental non-numeric algorithms which are needed in a multitude of applications. For example, map-reduce based computations in every step have to group the data items by key values. Or load balancing in supercomputers often uses space-filling curves. This boils down to sorting data by...

    Provided By Cornell University

  • White Papers // Oct 2014

    ASTOR: Evolutionary Automatic Software Repair for Java

    During last years, many automatic software repair approaches have been presented by the software engineering research community. According to the corresponding papers, these approaches are able to repair real defects from open source projects. Some previous publications in the automatic repair field do not provide the implementation of theirs approaches...

    Provided By Cornell University

  • White Papers // Oct 2014

    Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection

    With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices' resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this paper, the authors present a framework SouTu, which enables cloud servers to provide privacy-preserving photo sharing...

    Provided By Cornell University

  • White Papers // Oct 2014

    That Ain't You: Blocking Spearphishing Emails Before they are Sent

    One of the ways in which attackers try to steal sensitive information from corporations is by sending spear-phishing emails. This type of emails typically appears to be sent by one of the victim's coworkers, but have instead been crafted by an attacker. A particularly insidious type of spear-phishing emails are...

    Provided By Cornell University

  • White Papers // Oct 2014

    Locally Estimating Core Numbers

    Graphs are a powerful way to model interactions and relationships in data from a wide variety of application domains. In this setting, entities represented by vertices at the \"Center\" of the graph are often more important than those associated with vertices on the \"Fringes\". For example, central nodes tend to...

    Provided By Cornell University

  • White Papers // Oct 2014

    Matching Entities Across Online Social Networks

    Online Social Networks (OSNs), such as Facebook and Twitter, have become an integral part of the peoples' daily lives. There are hundreds of OSNs; each with its own focus in that each offers particular services and functionalities. Recent studies show that many OSN users create several accounts on multiple OSNs...

    Provided By Cornell University

  • White Papers // Oct 2014

    Reengineering GSM/GPRS Towards a Dedicated Network for Massive Smart Metering

    GSM is a synonym for a major success in wireless technology, achieving widespread use and high technology maturity. However, its future is questionable, as many stakeholders indicate that the GSM spectrum should be refarmed for LTE. On the other hand, the advent of smart grid and the ubiquity of smart...

    Provided By Cornell University

  • White Papers // Oct 2014

    Justifying and Improving Meta-Agent Conflict-Based Search

    The Meta-Agent Conflict-Based Search (MA-CBS) is a recently proposed algorithm for the multi-agent path finding problem. The algorithm is an extension of Conflict-Based Search (CBS), which automatically merges conflicting agents into meta-agents if the number of conflicts exceeds a certain threshold. However, the decision to merge agents is made according...

    Provided By Cornell University

  • White Papers // Oct 2014

    The Lovelace 2.0 Test of Artificial Creativity and Intelligence

    Observing that the creation of certain types of artistic artifacts necessitate intelligence, the authors present the Lovelace 2.0 test of creativity as an alternative to the Turing test as a means of determining whether an agent is intelligent. The Lovelace 2.0 test builds off prior tests of creativity and additionally...

    Provided By Cornell University

  • White Papers // Oct 2014

    Enhanced TKIP Michael Attacks

    In this paper, the author's present new attacks against TKIP within IEEE 802.11 based networks. Using the known Beck-Tews attack, they define schemas to continuously generate new key streams, which allow more and longer arbitrary packets to be injected into the network. They further describe an attack against the Michael...

    Provided By Cornell University

  • White Papers // Oct 2014

    Cryptographic Enforcement of Information Flow Policies without Public Information

    Cryptographic access control has been studied for over 30 years and is now a mature research topic. When symmetric cryptographic primitives are used, each protected resource is encrypted and only authorized users should have access to the encryption key. By treating the keys themselves as protected resources, it is possible...

    Provided By Cornell University

  • White Papers // Oct 2014

    Parallel Prefix Polymorphism Permits Parallelization, Presentation & Proof

    Abstractions are the lifeblood of computer science. Separating higher level concepts from lower level implementation details allows code to be more composable and reusable, and code using appropriate abstractions is simpler to understand and maintain. Polymorphism in programming languages enables code reuse. Here, the authors show that polymorphism has broad...

    Provided By Cornell University

  • White Papers // Oct 2014

    Matching Theory for Future Wireless Networks: Fundamentals and Applications

    The emergence of novel wireless networking paradigms such as small cell and cognitive radio networks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In...

    Provided By Cornell University

  • White Papers // Oct 2014

    Bitcoin Over Tor Isn't a Good Idea

    Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research...

    Provided By Cornell University

  • White Papers // Oct 2014

    Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques

    In this paper, the problem of distributed detection in tree networks in the presence of Byzantines is considered. Closed form expressions for optimal attacking strategies that minimize the miss detection error exponent at the Fusion Center (FC) are obtained. The authors also look at the problem from the network designer's...

    Provided By Cornell University

  • White Papers // Oct 2014

    Dynamic Differential Privacy for Location based Applications

    Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and location-based applications. While spatial transformation techniques such as location perturbation or generalization have been studied extensively, most techniques rely on syntactic privacy models without rigorous privacy guarantee. Many of them only consider static scenarios or...

    Provided By Cornell University

  • White Papers // Oct 2014

    QoE-Based Scheduling Algorithm in WiMAX Network using Manhattan Grid Mobility Model

    WiMAX (acronym for Worldwide interoperability for Microwave Access) is a family of technical standards based on IEEE 802.16 standard that defines the high speed connection through radio waves unlike DSL (Digital Subscriber Line) or other wired technology. It can provide coverage to remote rural areas of several kilometers in radius;...

    Provided By Cornell University

  • White Papers // Oct 2014

    Towards A Model Theory for Distributed Representations

    Knowledge representation based approaches to AI involve encoding knowledge in a logical language and performing logical inference to derive conclusions. Distributed representations (such as those based on embeddings) and discrete representations (such as those based on logic) have complementary strengths. The authors explore one possible approach to combining these two...

    Provided By Cornell University

  • White Papers // Oct 2014

    Investigation of A Collective Decision Making System of Different Neighbourhood-Size Based on Hyper-Geometric Distribution

    Distributed and decentralized systems that rely on self-organizations to achieve a specific goal usually characterized by non-linear dynamics. They usually involve amplification or positive feedback as well as damping or negative feedback along with several cooperative-competitive interactions to evolve and navigate towards its desired state. Due to the non-linearity involved...

    Provided By Cornell University

  • White Papers // Oct 2014

    The Tomaco Hybrid Matching Framework for SAWSDL Semantic Web Services

    In this paper, the authors resolve issues related to Web service retrieval, also known as service selection, discovery or essentially matching, in two directions. Firstly, a novel matching algorithm for SAWSDL is introduced. The algorithm is hybrid in nature, combining novel and known concepts, such as a logic-based strategy and...

    Provided By Cornell University

  • White Papers // Oct 2014

    Proving Safety with Trace Automata and Bounded Model Checking

    Loop under-approximation is a technique that enriches C programs with additional branches that represent the effect of a (limited) range of loop iterations. While this technique can speed up the detection of bugs significantly, it introduces the redundant execution traces which may complicate the verification of the program. This holds...

    Provided By Cornell University

  • White Papers // Oct 2014

    Transforming While/Do/For/Foreach-Loops into Recursive Methods

    In software engineering, taking a good election between recursion and iteration is essential because their efficiency and maintenance are different. In fact, developers often need to transform iteration into recursion (e.g., in debugging, to decompose the call graph into iterations); thus, it is quite surprising that there does not exist...

    Provided By Cornell University

  • White Papers // Oct 2014

    Dynamic Optimization For Heterogeneous Powered Wireless Multimedia Sensor Networks With Correlated Sources and Network Coding

    The energy consumption in Wireless Multimedia Sensor Networks (WMSNs) is much greater than that in traditional wireless sensor networks. Thus, it is a huge challenge to remain the perpetual operation for WMSN. In this paper, the authors propose a new heterogeneous energy supply model for WMSN through the coexistence of...

    Provided By Cornell University

  • White Papers // Oct 2014

    Divide and Conquer: Partitioning OSPF Networks with SDN

    Software Defined Networking (SDN) is an emerging network control paradigm focused on logical centralization and programmability. At the same time, distributed routing protocols, most notably OSPF and IS-IS, are still prevalent in IP networks, as they provide shortest path routing, fast topological convergence after network failures, and, perhaps most importantly,...

    Provided By Cornell University

  • White Papers // Oct 2014

    On Content-centric Wireless Delivery Networks

    The flux of social media and the convenience of mobile connectivity have created a mobile data phenomenon that is expected to overwhelm the mobile cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the growth rate of wireless data has far exceeded the capacity increase of the mobile...

    Provided By Cornell University

  • White Papers // Oct 2014

    Optimized Disk Layouts for Adaptive Storage of Interaction Graphs

    The people are living in an ever more connected world, where data recording the interactions between people, software systems, and the physical world is becoming increasingly prevalent. This data often takes the form of a temporally evolving graph, where entities are the vertices and the interactions between them are the...

    Provided By Cornell University

  • White Papers // Oct 2014

    Type Targeted Testing

    The authors present a new technique called type targeted testing, which translates precise refinement types into comprehensive test-suites. The key insight behind their approach is that through the lens of SMT solvers, refinement types can also be viewed as a high-level, declarative, test generation technique, wherein types are converted to...

    Provided By Cornell University

  • White Papers // Oct 2014

    A Stronger Null Hypothesis for Crossing Dependencies

    The syntactic structure of a sentence can be modeled as a tree where vertices are words and edges indicates syntactic dependencies between words. It is well-known that those edges normally do not cross when drawn over the sentence. Here a new null hypothesis for the number of edge crossings of...

    Provided By Cornell University

  • White Papers // Oct 2014

    On the Provenance of Linked Data Statistics

    As the amount of linked data published on the web grows, attempts are being made to describe and measure it. However even basic statistics about a graph, such as its size, are difficult to express in a uniform and predictable way. In order to be able to sensibly interpret a...

    Provided By Cornell University

  • White Papers // Oct 2014

    GYM: A Multiround Join Algorithm in MapReduce

    The problem of evaluating joins efficiently in distributed environments has gained importance since the advent of Google's Map-Reduce and the emergence of a series of distributed systems with relational operators, such as pig, hive, SparkSQL, and Myria. The costs of join algorithms in such systems can be broken down to:...

    Provided By Cornell University

  • White Papers // Oct 2014

    Load & Backhaul Aware Decoupled Downlink/Uplink Access in 5G Systems

    Until the 4th Generation (4G) cellular 3GPP systems, a User Equipment's (UE) cell association has been based on the downlink received power from the strongest base station. Recent paper has shown that - with an increasing degree of heterogeneity in emerging 5G systems - such an approach is dramatically suboptimal,...

    Provided By Cornell University

  • White Papers // Feb 2010

    Wireless Congestion Control Protocol for Multihop Ad Hoc Networks

    The traditional TCP congestion control mechanism encounters a number of new problems and suffers a poor performance when the IEEE 802.11 MAC protocol is used in multihop ad hoc networks. Many of the problems result from medium contention at the MAC layer. In this paper, the authors first illustrate that...

    Provided By Cornell University

  • White Papers // May 2012

    Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File

    In this paper, the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. The secret message is encrypted using TTJSA algorithm. The authors embed this encrypted message inside one known image or audio file using 4-th bit from LSB substitution method. They again...

    Provided By Cornell University

  • White Papers // Jul 2012

    A Review of Routing Protocols for Mobile Cognitive Radio Ad Hoc Networks

    Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The...

    Provided By Cornell University

  • White Papers // Jun 2012

    Live Network Streaming With Utilities and Cost

    The growth in Internet traffic associated with video streaming and sharing of videos is so rapid that it may soon dwarf all other forms of Internet content. One reason for this is that only some forms of content can be cached (such as movies). Data generated in real time such...

    Provided By Cornell University

  • White Papers // Apr 2011

    Extracting Device Fingerprints From Flash Memory by Exploiting Physical Variations

    Many computing applications require the ability to uniquely identify a particular electronic device. Personalized services, digital rights management, and authentication schemes can all leverage per-device identifiers that are difficult (or impossible) to forge. At the same time, the growing economic importance and popularity of electronic devices has provided criminals with...

    Provided By Cornell University

  • White Papers // Sep 2012

    ShadowDB: A Replicated Database on a Synthesized Consensus Core

    This paper describes ShadowDB, a replicated version of the BerkeleyDB database. ShadowDB is a primary-backup based replication protocol where failure handling, the critical part of the protocol, is taken care of by a synthesized consensus service that is correct by construction. The service has been proven correct semi-automatically by the...

    Provided By Cornell University

  • White Papers // Jan 2013

    A New Metric for Routing in Multi-Hop Wireless Sensor Networks for Detection of Correlated Random Fields

    The problem of combining task performance and routing for the detection of correlated random fields using multi-hop wireless sensor networks is considered. Under the assumption of Gauss-Markov structure along a given route, a link metric that captures the detection performance associated with a route is derived. Under Bayesian formulation Chernoff...

    Provided By Cornell University

  • White Papers // Jul 2012

    Reputation Algebra for Cloud-Based Anonymous Data Storage Systems

    Given a cloud-based anonymous data storage system, there are two ways for managing the nodes involved in file transfers. One of them is using reputations and the other uses a micropayment system. In reputation-based approach, each node has a reputation associated with it, which is used as a currency or...

    Provided By Cornell University

  • White Papers // Mar 2013

    Enhanced Security for Cloud Storage Using File Encryption

    Cloud computing is a term coined to a network that offers incredible processing power, a wide array of storage space and unbelievable speed of computation. Social media channels, corporate structures and individual consumers are all switching to the magnificent world of cloud computing. The flip side to this coin is...

    Provided By Cornell University

  • White Papers // Oct 2009

    On the Performance of Cascaded Generalized K Fading Channels

    A novel distribution referred to as N???generalized K, constructed as the product of N statistically independent, but not necessarily identically distributed, generalized K Random Variables (RVs) is introduced. Statistical characterization of the proposed distribution is carried out via the derivation of closed-form expressions for its moment generating, probability density, cumulative...

    Provided By Cornell University

  • White Papers // Feb 2013

    Joint Physical Network Coding and LDPC decoding for Two Way Wireless Relaying

    In this paper, the authors investigate the joint design of channel and network coding in bi-directional relaying systems and propose a combined low complexity physical network coding and LDPC decoding scheme. For the same LDPC codes employed at both source nodes, they show that the relay can decodes the network...

    Provided By Cornell University

  • White Papers // Feb 2013

    Throughput Analysis of CSMA Wireless Networks with Finite Offered-Load

    In this paper, the authors propose an approximate method, Equivalent Access Intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, they...

    Provided By Cornell University

  • White Papers // Jan 2013

    CloudSVM : Training an SVM Classi Er in Cloud Computing Systems

    In conventional method, distributed Support Vector Machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly for large datasets. Hence, the authors propose a method that is referred as the Cloud SVM training mechanism (CloudSVM) in a cloud...

    Provided By Cornell University

  • White Papers // Jan 2013

    Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Networks

    Energy efficiency is the most important issue in all facets of Wireless Sensor Networks (WSNs) operations because of the limited and non-replenish able energy supply. Data aggregation mechanism is one of the possible solutions to prolong the life time of sensor nodes and on the other hand it also helps...

    Provided By Cornell University

  • White Papers // Mar 2013

    Wireless Information and Power Transfer: Energy Efficiency Optimization in OFDMA Systems

    In this paper, the authors consider Orthogonal Frequency Division Multiple Access (OFDMA) systems with simultaneous wireless information and power transfer. They study the resource allocation algorithm design for maximization of the energy efficiency of data transmission (bits/Joule delivered to the receivers). In particular, they focus on power splitting hybrid receivers...

    Provided By Cornell University

  • White Papers // Mar 2013

    Low-Complexity Channel Estimation with Set-Membership Algorithms for Cooperative Wireless Sensor Networks

    In this paper, the authors consider a general cooperative Wireless Sensor Network (WSN) with multiple hops and the problem of channel estimation. Two matrix-based set-membership algorithms are developed for the estimation of the complex matrix channel parameters. The main goal is to reduce the computational complexity significantly as compared with...

    Provided By Cornell University

  • White Papers // Mar 2013

    Secure Wireless Communications via Cooperative Transmitting

    Information theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at...

    Provided By Cornell University

  • White Papers // Aug 2012

    Integration of SOA and Cloud Computing in RMODP

    The objective of ODP is according to ITU-T Recommendation X.901 stated as follows: "The objective of ODP standardization is the development of standards that allow the benefits of distributing information processing services to be realized in an environment of heterogeneous IT resources and multiple organizational domains. These standards address constraints...

    Provided By Cornell University

  • White Papers // Feb 2013

    A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

    Energy efficiency has become an important measurement of scheduling algorithm for private cloud. The challenge is trade-off between minimizing of energy consumption and satisfying Quality of Service (QoS) (e.g. performance or resource availability on time for reservation request). The authors consider resource needs in context of a private cloud system...

    Provided By Cornell University

  • White Papers // Feb 2013

    On Weak Dress Codes for Cloud Storage

    In a distributed storage network, reliability and bandwidth optimization can be provided by regenerating codes. Recently table based regenerating codes viz. DRESS (Distributed Replication-based Exact Simple Storage) codes has been proposed which also optimizes the disk I/O. Dress codes consists of an outer MDS code with an inner Fractional Repetition...

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Compressive Sampling of Spatially Sparse Fields in Wireless Sensor Networks

    Wireless Sensor Networks (WSN), i.e. networks of autonomous, wireless sensing nodes spatially deployed over a geographical area, are often faced with acquisition of spatially sparse fields. In this paper, the authors present a novel bandwidth/energy efficient CS scheme for acquisition of spatially sparse fields in a WSN. The paper contribution...

    Provided By Cornell University

  • White Papers // Mar 2013

    Anytime Reliable LDPC Convolutional Codes for Networked Control Over Wireless Channel

    In this paper, the authors deal with the problem of stabilizing an unstable system through networked control over the wireless medium. In such a situation, a remote sensor communicates the measurements to the system controller through a noisy channel. In particular, in the AWGN scenario, they show that protograph-based LDPC...

    Provided By Cornell University

  • White Papers // Mar 2013

    Spectral Efficient Optimization in OFDM Systems with Wireless Information and Power Transfer

    In this paper, the authors consider an Orthogonal Frequency Division Multiplexing (OFDM) point-to-point wireless communication system with simultaneous wireless information and power transfer. They study a receiver which is able to harvest energy from the desired signal, noise, and interference. In particular, they consider a power splitting receiver which dynamically...

    Provided By Cornell University

  • White Papers // Feb 2013

    Wireless Intrusion Detection Systems (WIDS)

    The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security, the wireless networks have changed the way business, organizations work and offered a new range of possibilities and flexibilities; it is clear that wireless solutions are transforming the way the authors work and...

    Provided By Cornell University

  • White Papers // Mar 2013

    Closed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wireless Networks Under Nakagami-m Channels

    Rate outage probability is an important performance metric to measure the level of Quality of Service (QoS) in the Generation (4G) broadband access networks. Thus, in this paper, the authors calculate a closed form expression of the rate outage probability for a given user in a down-link multi-hop OFDMA based...

    Provided By Cornell University

  • White Papers // Mar 2013

    Adaptive Energy-Aware Encoding for DWT-Based Wireless EEG Monitoring System

    Wireless ElectroencephaloGraphy (EEG) tele-monitoring systems performing encoding and streaming over energy-hungry wireless channels are limited in energy supply. However, excessive power consumption either in encoding or radio channels may render some applications inapplicable. Hence, energy efficient methods are needed to improve such applications. In this paper, an embedded EEG encoding...

    Provided By Cornell University

  • White Papers // Mar 2013

    A Practical System for Improved Efficiency in Frequency Division Multiplexed Wireless Networks

    Spectral efficiency is a key design issue for all wireless communication systems. Orthogonal Frequency Division Multiplexing (OFDM) is a very well-known technique for efficient data transmission over many carriers overlapped in frequency. Recently, several papers have appeared which describe spectrally efficient variations of multi-carrier systems where the condition of orthogonality...

    Provided By Cornell University

  • White Papers // Jan 2011

    Adaptive Topology Discovery in Hybrid Wireless Networks

    Wireless networks in home, office and sensor applications consist of nodes with low mobility. Most of these networks have at least a few powerful machines additionally connected by a wireline network. Topology information of the wireless network at these powerful nodes can be used to control transmission power, avoid congestion,...

    Provided By Cornell University

  • White Papers // Dec 2009

    Opportunistic Spectrum Access With Multiple Users: Learning Under Competition

    The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total...

    Provided By Cornell University

  • White Papers // Aug 2011

    City on the Sky: Flexible, Secure Data Sharing on the Cloud

    Sharing data from various sources and of diverse kinds, and fusing them together for sophisticated analytics and mash-up applications are emerging trends, and are prerequisites for grand visions such as that of cyber-physical systems enabled smart cities. Cloud infrastructure can enable such data sharing both because it can scale easily...

    Provided By Cornell University

  • White Papers // Jul 2011

    GraphLab: A Distributed Framework for Machine Learning in the Cloud

    Machine Learning (ML) techniques are indispensable in a wide range of fields. Unfortunately, the exponential increase of dataset sizes are rapidly extending the runtime of sequential algorithms and threatening to slow future progress in ML. With the promise of affordable largescale parallel computing, Cloud systems offer a viable platform to...

    Provided By Cornell University

  • White Papers // Nov 2009

    Spatial Analysis of Opportunistic Downlink Relaying in a Two-Hop Cellular System

    The authors consider a two-hop cellular system in which the mobile nodes help the base station by relaying information to the dead spots. While two-hop cellular schemes have been analyzed previously, the distribution of the node locations has not been explicitly taken into account. In this paper, they model the...

    Provided By Cornell University

  • White Papers // Jul 2011

    Abstract Reduction Semantics for Modular Higher-Order Contract Verification

    The authors contribute a new approach to the modular verification of higher-order programs that leverages behavioral software contracts as a rich source of symbolic values. Their approach is based on the idea of an abstract reduction semantics that gives meaning to programs with missing or opaque components. Such components are...

    Provided By Cornell University

  • White Papers // Aug 2009

    Study of Proposed Methods for Improving TCP Performance Over Wireless Links

    TCP is designed for networks with assumption that major losses occur only due to congestion of network traffic. On a wireless network TCP misinterprets the transmission losses due to bit errors and handoffs as losses caused by congestion, and triggers congestion control mechanisms. Because of its end to end delivery...

    Provided By Cornell University

  • White Papers // May 2010

    Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks - A Survey

    Wireless sensor networks are basically used for gathering information needed by smart environments but they are particularly useful in unattended situations where terrain, climate and other environmental constraints may hinder in the deployment of wired/conventional networks. Unlike traditional networks, these sensor networks do not have a continuous power supply at...

    Provided By Cornell University

  • White Papers // Feb 2011

    Fast Reinforcement Learning for Energy-Efficient Wireless Communications

    The authors consider the problem of energy-efficient point-to-point transmission of delay-sensitive data (e.g. multimedia data) over a fading channel. Existing research on this topic utilizes either physical-layer centric solutions, namely power-control and Adaptive Modulation and Coding (AMC), or system-level solutions based on Dynamic Power Management (DPM); however, there is currently...

    Provided By Cornell University

  • White Papers // May 2011

    Unshackle the Cloud!

    Infrastructure-as-a-Service (IaaS) clouds are evolving from offering simple on-demand resources to providing diverse sets of tightly-coupled monolithic services. Like OS kernels of the 1980's and 1990's, these monolithic offerings, albeit rich in features, are significantly constraining users' freedom and control over the underlying - cloud - resources. For example, the...

    Provided By Cornell University

  • White Papers // May 2010

    Enabling the Tactical Cloud

    Cloud Computing platforms have the capacity to host staggering amounts of data and to perform massive computations, with impressive cost benefits relative to smaller-scale computing models. Mobile users with powerful handheld devices are eager consumers for a new class of data-rich information applications. This would seem to be an ideal...

    Provided By Cornell University

  • White Papers // Jan 2012

    Autonomic HTML Interface Generator for Web Applications

    Recent advances in computing systems have led to a new digital era in which every area of life is nearly interrelated with information technology. However, with the trend towards large-scale IT systems, a new challenge has emerged. The complexity of IT systems is becoming an obstacle that hampers the manageability,...

    Provided By Cornell University

  • White Papers // Oct 2012

    ASP Modulo CSP: The Clingcon System

    The authors present the hybrid ASP solver clingcon, combining the simple modeling language and the high performance Boolean solving capacities of Answer Set Programming (ASP) with techniques for using non-Boolean constraints from the area of Constraint Programming (CP). The new clingcon system features an extended syntax supporting global constraints and...

    Provided By Cornell University