Cornell University

Displaying 161-200 of 1203 results

  • White Papers // Feb 2014

    Application of Selective Algorithm for Effective Resource Provisioning in Cloud Computing Environment

    Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloud computing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to...

    Provided By Cornell University

  • White Papers // Feb 2014

    Hardware Generation Languages as a Foundation for Credible, Reproducible, and Productive Research Methodologies

    Cycle-Approximate Simulators (CAS) have long been a staple in the experimental toolkit of computer architecture researchers. However, recent technology trends have triggered a growing emphasis on specialization and heterogeneity, bringing into question the viability of a purely CAS-based methodology. In this paper, the authors argue computer architects should consider adopting...

    Provided By Cornell University

  • White Papers // Feb 2014

    Parallel Wisard Object Tracker: A Ram-Based Tracking System

    This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is an important and challenging task in many applications. Difficulties can arise due to weather conditions, target trajectory and appearance,...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Comparison With Two Semantic Sensor Data Storages in Total Data Transmission

    The creation of small and cheap sensors promoted the emergence of large scale sensor networks. Sensor networks allow monitoring a variety of physical phenomena, like weather conditions, traffic levels on highways or rooms occupancy in public buildings. Some of the sensors produce large volume of data such as weather temperature....

    Provided By Cornell University

  • White Papers // Jan 2014

    A Novel Admission Control Model in Cloud Computing

    With the rapid development of cloud computing technologies and wide adopt of cloud services and applications, QoS provisioning in clouds becomes an important research topic. In this paper, the authors propose an admission control mechanism for cloud computing. In particular, they consider the high volume of simultaneous requests for cloud...

    Provided By Cornell University

  • White Papers // Jan 2014

    DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper...

    Provided By Cornell University

  • White Papers // Jan 2014

    New Approaches to Website Fingerprinting Defenses

    Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ineffective. This paper advances the study of website fingerprinting attacks and defenses...

    Provided By Cornell University

  • White Papers // Jan 2014

    Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    High-Dimensional Quantum Key Distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. The authors consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down conversion, and show that it is secure against collective attacks. Its security rests upon visibility data - obtained from Franson...

    Provided By Cornell University

  • White Papers // Jan 2014

    Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing

    In this paper, the authors address the issues of using edge detection techniques on facial images to produce cancellable biometric templates and a novel method for template verification against tampering. With increasing use of biometrics, there is a real threat for the conventional systems using face databases, which store images...

    Provided By Cornell University

  • White Papers // Jan 2014

    Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics

    Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its place. It has provided a unique opportunity for online services, such that the user need not physically present at the service center. These services adopt...

    Provided By Cornell University

  • White Papers // Jan 2014

    Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases

    With the many benefits of cloud computing, an entity may want to outsource its data and their related analytics tasks to a cloud. When data are sensitive, it is in the interest of the entity to outsource encrypted data to the cloud; however, this limits the types of operations that...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Hierarchically Blocked Jacobi SVD Algorithm for Single and Multiple Graphics Processing Units

    The authors present a hierarchically blocked one-sided Jacobi algorithm for the Singular Value Decomposition (SVD), targeting both single and multiple Graphics Processing Units (GPUs). The blocking structure reflects the levels of GPU's memory hierarchy. The algorithm may outperform MAGMA's dgesvd, while retaining high relative accuracy. To this end, they developed...

    Provided By Cornell University

  • White Papers // Jan 2014

    Hardware Implementation of Four Byte Per Clock RC4 Algorithm

    In the field of cryptography till date the 2-byte in 1-clock is the best known RC4 hardware design, while 1-byte in 1-clock and the 1-byte in 3 clocks are the best known implementation. The design algorithm in considers two consecutive bytes together and processes them in 2 clocks. The design...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Network

    Wireless Sensor Networks (WSN) are currently the greatest innovation in the field of telecommunications. WSNs have a wide range of potential applications, including security and surveillance, control, actuation and maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However, security is one of the major aspects of...

    Provided By Cornell University

  • White Papers // Jan 2014

    Power Grid Defense Against Malicious Cascading Failure

    An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns...

    Provided By Cornell University

  • White Papers // Jan 2014

    LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory

    As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replacement policy used for cache. In this paper, the authors' algorithm not only based on the time...

    Provided By Cornell University

  • White Papers // Jan 2014

    SMTp: An Architecture for Next-Generation Scalable Multi-Threading

    The authors introduce the SMTp architecture - an SMT processor augmented with a coherence protocol thread context that together with a standard integrated memory controller can enable the design of scalable cache-coherent hardware Distributed Shared Memory (DSM) machines from commodity nodes. They describe the minor changes needed to a conventional...

    Provided By Cornell University

  • White Papers // Dec 2013

    Application of Different Metaheuristic Techniques for Finding Optimal Test Order During Integration Testing of Object Oriented Systems and their Comparative Study

    In recent past, a number of researchers have proposed Genetic Algorithm (GA) based strategies for finding optimal test order while minimizing the stub complexity during integration testing. Even though, metaheuristic algorithms have a wide variety of use in various medium to large size optimization problems, their application to solve the...

    Provided By Cornell University

  • White Papers // Dec 2013

    Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis

    Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection....

    Provided By Cornell University

  • White Papers // Dec 2013

    Early Observations on Performance of Google Compute Engine for Scientific Computing

    Although cloud computing emerged for business applications in industry, public cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific...

    Provided By Cornell University

  • White Papers // Dec 2013

    Network Coded TCP (CTCP) Performance over Satellite Networks

    The authors show preliminary results for the performance of network Coded TCP (CTCP) over large latency networks. While CTCP performs very well in networks with relatively short RT T, the slow-start mechanism currently employed does not adequately fill the available bandwidth when the RT T is large. Regardless, they show...

    Provided By Cornell University

  • White Papers // Dec 2013

    Cache-Aware Static Scheduling for Hard Real-Time Multicore Systems Based on Communication Affinities

    The growing need for continuous processing capabilities has led to the development of multicore systems with a complex cache hierarchy. Such multicore systems are generally designed for improving the performance in average case, while hard real-time systems must consider worst-case scenarios. An open challenge is therefore to efficiently schedule hard...

    Provided By Cornell University

  • White Papers // Dec 2013

    A Survey on Cloud Security Issues and Techniques

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and...

    Provided By Cornell University

  • White Papers // Dec 2013

    Verifying the Consistency of Remote Untrusted Services with Commutative Operations

    A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of...

    Provided By Cornell University

  • White Papers // Dec 2013

    E-Commerce Business Models in the Context of Web 3.0 Paradigm

    Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and play, how companies use information to market and sell their products, as well as operate their businesses. The basic shift occurring in web 3.0 is from information-centric to knowledge-centric patterns of...

    Provided By Cornell University

  • White Papers // Nov 2013

    Thwarting Selfish Behavior in 802.11 WLANs

    The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper, the authors propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react,...

    Provided By Cornell University

  • White Papers // Nov 2013

    Scalable Data Cube Analysis over Big Data

    Data cubes are widely used as a powerful tool to provide multidimensional views in data warehousing and On-Line Analytical Processing (OLAP). However, with increasing data sizes, it is becoming computationally expensive to perform data cube analysis. The problem is exacerbated by the demand of supporting more complicated aggregate functions (e.g....

    Provided By Cornell University

  • White Papers // Nov 2013

    Parallel Tempering Simulation of the three-dimensional Edwards-Anderson Model with Compact Asynchronous Multispin Coding on GPU

    Monte Carlo simulations of the Ising model play an important role in the field of computational statistical physics, and they have revealed many properties of the model over the past few decades. However, the effect of frustration due to random disorder, in particular the possible spin glass phase, remains a...

    Provided By Cornell University

  • White Papers // Nov 2013

    Limits of Extractability Assumptions with Distributional Auxiliary Input

    Extractability, or \"Knowledge\", assumptions (such as the \"Knowledge-of-exponent\" assumption) have recently gained popularity in the cryptographic community - leading to the study of primitives such as extractable one-way functions, extractable hash functions, Succinct Non-interactive ARguments of Knowledge (SNARKs), and extractable obfuscation, and spurring the development of a wide spectrum of...

    Provided By Cornell University

  • White Papers // Nov 2013

    Big Data Analytics in Future Internet of Things

    Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, the authors argue that only connected is not enough, beyond that, general objects should...

    Provided By Cornell University

  • White Papers // Nov 2013

    On the Inequality of the 3V's of Big Data Architectural Para-Digms: A Case for Heterogeneity

    The well-known 3V architectural paradigm for Big Data introduced by Laney (2011) provides a simplified framework for defining the architecture of a big data platform to be deployed in various scenarios tackling processing of massive datasets. While additional components such as Variability and Veracity have been discussed as an extension...

    Provided By Cornell University

  • White Papers // Nov 2013

    A Big Data Approach to Computational Creativity

    Computational creativity is an emerging branch of artificial intelligence that places computers in the center of the creative process. Broadly, creativity involves a generative step to produce many ideas and a selective step to determine the ones that are the best. Many previous attempts at computational creativity, however, have not...

    Provided By Cornell University

  • White Papers // Oct 2013

    Analyzing Big Data with Dynamic Quantum Clustering

    How does one search for a needle in a multi-dimensional haystack without knowing what a needle is and without knowing if there is one in the haystack? This kind of problem requires a paradigm shift - away from hypothesis driven searches of the data - towards a methodology that lets...

    Provided By Cornell University

  • White Papers // Oct 2013

    EPOBF: Energy Efficient Allocation of Virtual Machines in High Performance Computing Cloud

    Cloud computing has become more popular in provision of computing resources under Virtual Machine (VM) abstraction for High Performance Computing (HPC) users to run their applications. A HPC cloud is such cloud computing environment. One of challenges of energy-efficient resource allocation for VMs in HPC cloud is trade-off between minimizing...

    Provided By Cornell University

  • White Papers // Oct 2013

    Software in e-Learning Architecture, Processes and Management

    The peoples' entire society is becoming more and more dependent on technology and specifically on software. The integration of e-learning software systems into their day-by-day life especially in e-learning applications generates modifications upon the society and, at the same time, the society itself changes the process of software development. This...

    Provided By Cornell University

  • White Papers // Oct 2013

    C2MS: Dynamic Monitoring and Management of Cloud Infrastructures

    Server clustering is a common design principle employed by many organizations that require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the service they provide whether it is the applications installed the role of the server or server accessibility for example. In order...

    Provided By Cornell University

  • White Papers // Oct 2013

    Hopping over Big Data: Accelerating Ad-hoc OLAP Queries with Grasshopper Algorithms

    This paper presents a family of algorithms for fast subset filtering within ordered sets of integers representing composite keys. Applications include significant acceleration of (ad-hoc) analytic queries against a data warehouse without any additional indexing. The algorithms work for point, range and set restrictions on multiple attributes, in any combination,...

    Provided By Cornell University

  • White Papers // Oct 2013

    Reliability Models for Highly Fault-Tolerant Storage Systems

    The authors found that a reliability model commonly used to estimate Mean-Time-To-Data-Loss (MTTDL), while suitable for modeling RAID 0 and RAID 5, fails to accurately model systems having a fault-tolerance greater than 1. Therefore, to model the reliability of RAID 6, Triple-Replication, or k-of-n systems requires an alternate technique. In...

    Provided By Cornell University

  • White Papers // Oct 2013

    Load Balancing Using Ant Colony in Cloud Computing

    Ants are very small insects. They are capable to find food even they are complete blind. The ants live in their nest and their job is to search food while they get hungry. The authors are not interested in their living style, such as how they live, how they sleep....

    Provided By Cornell University

  • White Papers // Sep 2013

    Neural Spiking Dynamics in Asynchronous Digital Circuits

    The authors implement a digital neuron in silicon using delay-insensitive asynchronous circuits. Their design numerically solves the Izhikevich equations with a fixed-point number representation, resulting in a compact and energy-efficient neuron with a variety of dynamical characteristics. A digital implementation results in stable, reliable and highly programmable circuits, while an...

    Provided By Cornell University

  • White Papers // Oct 2010

    Identification Of Social Interactions

    While interest in social determinants of individual behavior has led to a rich theoretical literature and many efforts to measure these influences, a mature "Social econometrics" has yet to emerge. This paper provides a critical overview of the identification of social interactions. The authors consider linear and discrete choice models...

    Provided By Cornell University

  • White Papers // Aug 2009

    Fabric: A Platform for Secure Distributed Computation and Storage

    Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share both information and computation resources despite mutual distrust. Its high-level programming language makes distribution and persistence largely transparent to programmers. Fabric supports data-shipping and...

    Provided By Cornell University

  • White Papers // Oct 2009

    GO: Platform Support for Gossip Applications

    Gossip-based protocols are increasingly popular in large-scale distributed applications that disseminate updates to replicated or cached content. GO (Gossip Objects) is a per-node gossip platform that the authors developed in support of this class of protocols. In addition to making it easy to develop new gossip protocols and applications, GO...

    Provided By Cornell University

  • White Papers // Oct 2009

    Cloudifying Source Code Repositories: How Much Does It Cost?

    Cloud computing provides one with general purpose storage and server hosting platforms at a reasonable price. The authors explore the possibility of tapping these resources for the purpose of hosting source code repositories for individual projects as well as entire open source communities. An analysis of storage costs is presented,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // May 2009

    Sharing Private Information Across Distributed Databases

    In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. The authors show how this can be done while allowing organizations to keep their legacy databases and maintain ownership of the data that they currently store. Without sending or mirroring data to any...

    Provided By Cornell University

  • White Papers // Jan 2011

    Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

    The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols. Anti-entropy, or gossip, is an attractive way of replicating state that does not have strong consistency requirements....

    Provided By Cornell University

  • White Papers // Nov 2010

    Virtually Synchronous Methodology for Dynamic Service Replication

    In designing and building distributed systems, it is common engineering practice to separate steady-state ("Normal") operation from abnormal events such as recovery from failure. This way the normal case can be optimized extensively while recovery can be amortized. However, integrating the recovery procedure with the steady-state protocol is often far...

    Provided By Cornell University

  • White Papers // Sep 2010

    Man-in-the-Middle TCP Recovery

    When an application connects with a remote peer using TCP, its network stack encapsulates the state of that connection. As a consequence, even if the application is capable of recovering its own state after failure (for example, by restarting at a backup location), the peer may experience a disruption of...

    Provided By Cornell University

  • White Papers // Apr 2010

    Empirical Characterization of Uncongested Optical Lambda Networks and 10GbE Commodity Endpoints

    High-bandwidth, semi-private optical lambda networks carry growing volumes of data on behalf of large data centers, both in cloud computing environments and for scientific, financial, defense, and other enterprises. This paper undertakes a careful examination of the end-to-end characteristics of an uncongested lambda network running at high speeds over long...

    Provided By Cornell University

  • White Papers // Mar 2010

    A Middleware for Gossip Protocols

    Gossip protocols are known to be highly robust in scenarios with high churn, but if the data that is being gossiped becomes corrupted, a protocol's very robustness can make it hard to fix the problem. All participants need to be taken down, any disk-based data need to be scrubbed, the...

    Provided By Cornell University

  • White Papers // Mar 2010

    Balancing Gossip Exchanges in Networks With Firewalls

    Gossip protocols are an important building block of many large-scale systems. They have inherent load-balancing properties as long as nodes are deployed over a network with a "Flat" topology that is, a topology where any pair of nodes may engage in a gossip exchange. Unfortunately, the Internet is not flat...

    Provided By Cornell University

  • White Papers // Jan 2011

    Network-Aware Adaptation Techniques for Mobile File Systems

    Wireless networks present unusual challenges for mobile file system clients since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditional approach to adapting network communication to these conditions is to write back file updates asynchronously when bandwidth is low. Unfortunately, this can lead to underutilisation of bandwidth and...

    Provided By Cornell University

  • White Papers // Jan 2011

    On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks

    Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A key and difficult requirement of many such applications is heterogeneity: peers have different node degrees in the random graph based on their...

    Provided By Cornell University

  • White Papers // Jul 2011

    KISS Approach To Credit Portfolio Modeling

    A simple, yet reasonably accurate, analytical technique is proposed for multi-factor structural credit portfolio models. The accuracy of the technique is demonstrated by benchmarking against Monte Carlo simulations. The approach presented here may be of high interest to practitioners looking for transparent, intuitive, easy to implement and high performance credit...

    Provided By Cornell University

  • White Papers // Jun 2011

    A Random Matrix Approach To Credit Risk

    The authors estimate generic statistical properties of a structural credit risk model by considering an ensemble of correlation matrices. This ensemble is set up by Random Matrix Theory. They demonstrate analytically that the presence of correlations severely limits the effect of diversification in a credit portfolio if the correlations are...

    Provided By Cornell University

  • White Papers // Jul 2010

    Analytical Framework For Credit Portfolios

    Analytical, free of time consuming Monte Carlo simulations, framework for credit portfolio systematic risk metrics calculations is presented. Techniques are described that allow calculation of portfolio-level systematic risk measures (standard deviation, VaR and Expected Shortfall) as well as allocation of risk down to individual transactions. The underlying model is the...

    Provided By Cornell University

  • White Papers // Apr 2010

    Simple Fuzzy Score For Russian Public Companies Risk Of Default

    Current economy crisis of 2008-2009 has resulted in severe credit crunch and significant NPL rise in Russian financial system. Bad debt rate has almost tripled to 6% of total loans to corporate sector, while provisions reached 9%. Corporate bonds market cannot be called safe heaven either having almost 25% of...

    Provided By Cornell University

  • White Papers // Jan 2011

    Precautionary Measures For Credit Risk Management In Jump Models

    Sustaining efficiency and stability by properly controlling the equity to asset ratio is one of the most important and difficult challenges in bank management. Due to unexpected and abrupt decline of asset values, a bank must closely monitor its net worth as well as market conditions, and one of its...

    Provided By Cornell University

  • White Papers // Jul 2009

    A Minsky Perspective On The Global Recession Of 2009

    As the U.S. credit crunch of 2007 evolved into a global recession in late 2008 and early 2009, the economic ideas of the late Hyman Minsky received increasing attention on both sides of the Atlantic Ocean. However, few observers seem to appreciate that about the last dozen years of Minsky's...

    Provided By Cornell University

  • White Papers // May 2011

    How Do Health And Social Insurance Programs Affect The Land And Labor Allocations Of Farm Households? Evidence From Taiwan

    Using a unique dataset of 703,287 farm operators from the Taiwanese Census of Agriculture merged to administrative records from the National Farmers' Health Insurance (FHI) program, the authors examine the effects of the enrollment in the FHI program on farmers' on- and off-farm labor supply and the amount of land...

    Provided By Cornell University

  • White Papers // May 2010

    Quantification of Integrity

    Two kinds of integrity measures - contamination and suppression - are introduced. Contamination measures how much untrusted information reaches trusted outputs; it is the dual of information-flow confidentiality. Suppression measures how much information is lost from outputs; it does not have a confidentiality dual. Two forms of suppression are considered:...

    Provided By Cornell University

  • White Papers // Apr 2009

    Tight Enforcement of Information-Release Policies for Dynamic Languages

    This paper studies the problem of securing information release in dynamic languages. The authors propose an intuitive framework for information-release policies expressing both what can be released by an application and where in the code this release may take place and tight and modular enforcement by hybrid mechanisms that combine...

    Provided By Cornell University

  • White Papers // Mar 2010

    Protecting The Poor Against The Next Crisis

    Crises are likely to be new normal for developing and transition economies. In designing programs to protect the poor against crises, governments face two uncertainties - uncertainty of crisis type and uncertainty of crisis timing. In the face of these uncertainties, the author proposes three lines of action for governments...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maelstrom: Transparent Error Correction for Communication Between Data Centers

    The global network of data centers is emerging as an important distributed systems paradigm - commodity clusters running high-performance applications, connected by high-speed 'Lambda' networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple the performance of applications and protocols - a loss rate as...

    Provided By Cornell University

  • White Papers // Jun 2011

    Beyond Power Proportionality: Designing Power-Lean Cloud Storage

    The authors present a power-lean storage system, where racks of servers, or even entire data center shipping containers, can be powered down to save energy. They show that racks and containers are more than the sum of their servers, and demonstrate the feasibility of designing a storage system that powers...

    Provided By Cornell University

  • White Papers // May 2011

    Rough Paths In Idealized Financial Markets

    This paper considers possible price paths of a financial security in an idealized market. Its main result is that the variation index of typical price paths is at most 2; in this sense, typical price paths are not rougher than typical paths of Brownian motion. The authors do not make...

    Provided By Cornell University

  • White Papers // Jul 2011

    Adjoints And Automatic (Algorithmic) Differentiation In Computational Finance

    Two of the most important areas in computational finance: Greeks and, respectively, calibration, are based on efficient and accurate computation of a large number of sensitivities. This paper gives an overview of adjoint and Automatic Differentiation (AD), also known as algorithmic differentiation, techniques to calculate these sensitivities. When compared to...

    Provided By Cornell University

  • White Papers // Jun 2009

    Processing of Medical Signals (ECG) in Wireless Sensor Networks

    Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...

    Provided By Cornell University

  • White Papers // Feb 2011

    Fast Reinforcement Learning for Energy-Efficient Wireless Communications

    The authors consider the problem of energy-efficient point-to-point transmission of delay-sensitive data (e.g. multimedia data) over a fading channel. Existing research on this topic utilizes either physical-layer centric solutions, namely power-control and Adaptive Modulation and Coding (AMC), or system-level solutions based on Dynamic Power Management (DPM); however, there is currently...

    Provided By Cornell University

  • White Papers // Jan 2011

    Adaptive Topology Discovery in Hybrid Wireless Networks

    Wireless networks in home, office and sensor applications consist of nodes with low mobility. Most of these networks have at least a few powerful machines additionally connected by a wireline network. Topology information of the wireless network at these powerful nodes can be used to control transmission power, avoid congestion,...

    Provided By Cornell University

  • White Papers // May 2011

    Unshackle the Cloud!

    Infrastructure-as-a-Service (IaaS) clouds are evolving from offering simple on-demand resources to providing diverse sets of tightly-coupled monolithic services. Like OS kernels of the 1980's and 1990's, these monolithic offerings, albeit rich in features, are significantly constraining users' freedom and control over the underlying - cloud - resources. For example, the...

    Provided By Cornell University

  • White Papers // Aug 2009

    Study of Proposed Methods for Improving TCP Performance Over Wireless Links

    TCP is designed for networks with assumption that major losses occur only due to congestion of network traffic. On a wireless network TCP misinterprets the transmission losses due to bit errors and handoffs as losses caused by congestion, and triggers congestion control mechanisms. Because of its end to end delivery...

    Provided By Cornell University

  • White Papers // Nov 2009

    Spatial Analysis of Opportunistic Downlink Relaying in a Two-Hop Cellular System

    The authors consider a two-hop cellular system in which the mobile nodes help the base station by relaying information to the dead spots. While two-hop cellular schemes have been analyzed previously, the distribution of the node locations has not been explicitly taken into account. In this paper, they model the...

    Provided By Cornell University

  • White Papers // Jul 2011

    Abstract Reduction Semantics for Modular Higher-Order Contract Verification

    The authors contribute a new approach to the modular verification of higher-order programs that leverages behavioral software contracts as a rich source of symbolic values. Their approach is based on the idea of an abstract reduction semantics that gives meaning to programs with missing or opaque components. Such components are...

    Provided By Cornell University

  • White Papers // Dec 2009

    Opportunistic Spectrum Access With Multiple Users: Learning Under Competition

    The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initially unknown to the secondary users and are learnt via sensing samples. Two distributed learning and allocation schemes which maximize the cognitive system throughput or equivalently minimize the total...

    Provided By Cornell University

  • White Papers // Aug 2011

    City on the Sky: Flexible, Secure Data Sharing on the Cloud

    Sharing data from various sources and of diverse kinds, and fusing them together for sophisticated analytics and mash-up applications are emerging trends, and are prerequisites for grand visions such as that of cyber-physical systems enabled smart cities. Cloud infrastructure can enable such data sharing both because it can scale easily...

    Provided By Cornell University

  • White Papers // Jul 2011

    GraphLab: A Distributed Framework for Machine Learning in the Cloud

    Machine Learning (ML) techniques are indispensable in a wide range of fields. Unfortunately, the exponential increase of dataset sizes are rapidly extending the runtime of sequential algorithms and threatening to slow future progress in ML. With the promise of affordable largescale parallel computing, Cloud systems offer a viable platform to...

    Provided By Cornell University

  • White Papers // May 2010

    Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks - A Survey

    Wireless sensor networks are basically used for gathering information needed by smart environments but they are particularly useful in unattended situations where terrain, climate and other environmental constraints may hinder in the deployment of wired/conventional networks. Unlike traditional networks, these sensor networks do not have a continuous power supply at...

    Provided By Cornell University

  • White Papers // Oct 2011

    Wireless Connectivity and Capacity

    A key architectural goal in wireless adhoc networks is to ensure that each node in the network can communicate with every other node (perhaps by routing through other nodes). This requires that the nodes be connected through a communication overlay. The problem can be abstracted as such: given n points...

    Provided By Cornell University