Cornell University

Displaying 201-240 of 1230 results

  • White Papers // Dec 2013

    Early Observations on Performance of Google Compute Engine for Scientific Computing

    Although cloud computing emerged for business applications in industry, public cloud services have been widely accepted and encouraged for scientific computing in academia. The recently available Google Compute Engine (GCE) is claimed to support high-performance and computationally intensive tasks, while little evaluation studies can be found to reveal GCE's scientific...

    Provided By Cornell University

  • White Papers // Dec 2013

    Network Coded TCP (CTCP) Performance over Satellite Networks

    The authors show preliminary results for the performance of network Coded TCP (CTCP) over large latency networks. While CTCP performs very well in networks with relatively short RT T, the slow-start mechanism currently employed does not adequately fill the available bandwidth when the RT T is large. Regardless, they show...

    Provided By Cornell University

  • White Papers // Dec 2013

    Leveraging VMware vCloud Director Virtual Applications (vApps) for Operational Expense (OpEx) Efficiency

    Virtualization technology has provided many benefits to organizations, but it cannot provide automation. This causes Operational Expenditure (OpEx) inefficiencies, which are solved by cloud computing (vCloud Director vApps). Organizations have adopted virtualization technology to reduce IT costs and meet business needs. In addition to improved CapEx efficiency, virtualization has enabled...

    Provided By Cornell University

  • White Papers // Dec 2013

    Cache-Aware Static Scheduling for Hard Real-Time Multicore Systems Based on Communication Affinities

    The growing need for continuous processing capabilities has led to the development of multicore systems with a complex cache hierarchy. Such multicore systems are generally designed for improving the performance in average case, while hard real-time systems must consider worst-case scenarios. An open challenge is therefore to efficiently schedule hard...

    Provided By Cornell University

  • White Papers // Dec 2013

    A Survey on Cloud Security Issues and Techniques

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and...

    Provided By Cornell University

  • White Papers // Dec 2013

    Verifying the Consistency of Remote Untrusted Services with Commutative Operations

    A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of...

    Provided By Cornell University

  • White Papers // Dec 2013

    E-Commerce Business Models in the Context of Web 3.0 Paradigm

    Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and play, how companies use information to market and sell their products, as well as operate their businesses. The basic shift occurring in web 3.0 is from information-centric to knowledge-centric patterns of...

    Provided By Cornell University

  • White Papers // Nov 2013

    Thwarting Selfish Behavior in 802.11 WLANs

    The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper, the authors propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react,...

    Provided By Cornell University

  • White Papers // Nov 2013

    Scalable Data Cube Analysis over Big Data

    Data cubes are widely used as a powerful tool to provide multidimensional views in data warehousing and On-Line Analytical Processing (OLAP). However, with increasing data sizes, it is becoming computationally expensive to perform data cube analysis. The problem is exacerbated by the demand of supporting more complicated aggregate functions (e.g....

    Provided By Cornell University

  • White Papers // Nov 2013

    Parallel Tempering Simulation of the three-dimensional Edwards-Anderson Model with Compact Asynchronous Multispin Coding on GPU

    Monte Carlo simulations of the Ising model play an important role in the field of computational statistical physics, and they have revealed many properties of the model over the past few decades. However, the effect of frustration due to random disorder, in particular the possible spin glass phase, remains a...

    Provided By Cornell University

  • White Papers // Nov 2013

    Limits of Extractability Assumptions with Distributional Auxiliary Input

    Extractability, or \"Knowledge\", assumptions (such as the \"Knowledge-of-exponent\" assumption) have recently gained popularity in the cryptographic community - leading to the study of primitives such as extractable one-way functions, extractable hash functions, Succinct Non-interactive ARguments of Knowledge (SNARKs), and extractable obfuscation, and spurring the development of a wide spectrum of...

    Provided By Cornell University

  • White Papers // Nov 2013

    Big Data Analytics in Future Internet of Things

    Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, the authors argue that only connected is not enough, beyond that, general objects should...

    Provided By Cornell University

  • White Papers // Nov 2013

    On the Inequality of the 3V's of Big Data Architectural Para-Digms: A Case for Heterogeneity

    The well-known 3V architectural paradigm for Big Data introduced by Laney (2011) provides a simplified framework for defining the architecture of a big data platform to be deployed in various scenarios tackling processing of massive datasets. While additional components such as Variability and Veracity have been discussed as an extension...

    Provided By Cornell University

  • White Papers // Nov 2013

    A Big Data Approach to Computational Creativity

    Computational creativity is an emerging branch of artificial intelligence that places computers in the center of the creative process. Broadly, creativity involves a generative step to produce many ideas and a selective step to determine the ones that are the best. Many previous attempts at computational creativity, however, have not...

    Provided By Cornell University

  • White Papers // Oct 2013

    Quest-V: A Virtualized Multikernel for Safety-Critical Real-Time Systems

    Modern processors are increasingly featuring multiple cores, as well as support for hardware virtualization. While these processors are common in desktop and server-class computing, they are less prevalent in embedded and real-time systems. However, smartphones and tablet PCs are starting to feature multicore processors with hardware virtualization. If the trend...

    Provided By Cornell University

  • White Papers // Oct 2013

    Analyzing Big Data with Dynamic Quantum Clustering

    How does one search for a needle in a multi-dimensional haystack without knowing what a needle is and without knowing if there is one in the haystack? This kind of problem requires a paradigm shift - away from hypothesis driven searches of the data - towards a methodology that lets...

    Provided By Cornell University

  • White Papers // Oct 2013

    EPOBF: Energy Efficient Allocation of Virtual Machines in High Performance Computing Cloud

    Cloud computing has become more popular in provision of computing resources under Virtual Machine (VM) abstraction for High Performance Computing (HPC) users to run their applications. A HPC cloud is such cloud computing environment. One of challenges of energy-efficient resource allocation for VMs in HPC cloud is trade-off between minimizing...

    Provided By Cornell University

  • White Papers // Oct 2013

    Software in e-Learning Architecture, Processes and Management

    The peoples' entire society is becoming more and more dependent on technology and specifically on software. The integration of e-learning software systems into their day-by-day life especially in e-learning applications generates modifications upon the society and, at the same time, the society itself changes the process of software development. This...

    Provided By Cornell University

  • White Papers // Oct 2013

    C2MS: Dynamic Monitoring and Management of Cloud Infrastructures

    Server clustering is a common design principle employed by many organizations that require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the service they provide whether it is the applications installed the role of the server or server accessibility for example. In order...

    Provided By Cornell University

  • White Papers // Oct 2013

    Hopping over Big Data: Accelerating Ad-hoc OLAP Queries with Grasshopper Algorithms

    This paper presents a family of algorithms for fast subset filtering within ordered sets of integers representing composite keys. Applications include significant acceleration of (ad-hoc) analytic queries against a data warehouse without any additional indexing. The algorithms work for point, range and set restrictions on multiple attributes, in any combination,...

    Provided By Cornell University

  • White Papers // Oct 2013

    Reliability Models for Highly Fault-Tolerant Storage Systems

    The authors found that a reliability model commonly used to estimate Mean-Time-To-Data-Loss (MTTDL), while suitable for modeling RAID 0 and RAID 5, fails to accurately model systems having a fault-tolerance greater than 1. Therefore, to model the reliability of RAID 6, Triple-Replication, or k-of-n systems requires an alternate technique. In...

    Provided By Cornell University

  • White Papers // Oct 2013

    Load Balancing Using Ant Colony in Cloud Computing

    Ants are very small insects. They are capable to find food even they are complete blind. The ants live in their nest and their job is to search food while they get hungry. The authors are not interested in their living style, such as how they live, how they sleep....

    Provided By Cornell University

  • White Papers // Sep 2013

    Neural Spiking Dynamics in Asynchronous Digital Circuits

    The authors implement a digital neuron in silicon using delay-insensitive asynchronous circuits. Their design numerically solves the Izhikevich equations with a fixed-point number representation, resulting in a compact and energy-efficient neuron with a variety of dynamical characteristics. A digital implementation results in stable, reliable and highly programmable circuits, while an...

    Provided By Cornell University

  • White Papers // Sep 2013

    Design of Generic Framework for Botnet Detection in Network Forensics

    With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal activities, which in turn, bids many network attacks and threats. Network forensics is...

    Provided By Cornell University

  • White Papers // Sep 2013

    EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity

    Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and retrieval. One interesting open problem in this context involves two parties that need to assess the similarity of their...

    Provided By Cornell University

  • White Papers // Sep 2013

    CellTK: Automated Layout for Asynchronous Circuits with Nonstandard Cells

    Asynchronous circuits are an attractive option to overcome many challenges currently faced by chip designers, such as increased process variation. However, the lack of CAD tools to generate asynchronous circuits limits the adoption of this promising technology. In this absence of CAD tools, the most time consuming part of chip...

    Provided By Cornell University

  • White Papers // Sep 2013

    Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services

    As tools for personal storage, file synchronization and data sharing, cloud storage services such as Dropbox have quickly gained popularity. These services provide users with ubiquitous, reliable data storage that can be automatically synced across multiple devices, and also shared among a group of users. To minimize the network overhead,...

    Provided By Cornell University

  • White Papers // Sep 2013

    Knowledge-Based Expressive Technologies Within Cloud Computing Environments

    In this paper, the authors describe the development of comprehensive approach for knowledge processing within e-Sceince tasks. Considering the task solving within a simulation-driven approach a set of knowledge-based procedures for task definition and composite application processing can be identified. This procedure could be supported by the use of domain-specific...

    Provided By Cornell University

  • White Papers // Sep 2013

    Unmixing Incoherent Structures of Big Data by Randomized or Greedy Decomposition

    Learning big data by matrix decomposition always suffers from expensive computation, mixing of complicated structures and noise. In this paper, the authors study more adaptive models and efficient algorithms that decompose a data matrix as the sum of semantic components with incoherent structures. They firstly introduce \"GO Decomposition (GoDec)\", an...

    Provided By Cornell University

  • White Papers // Aug 2013

    Security Issues on Cloud Computing

    The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be...

    Provided By Cornell University

  • White Papers // Aug 2013

    On Optimal and Fair Service Allocation in Mobile Cloud Computing

    In this paper the authors study the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. They exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Timing Analysis of SSL/TLS Man in the Middle Attacks

    The authors' experiment revealed that SSL MiTM attacks have timing patterns that could be identified by observing victims. More specifically, the attack tools they analyzed shifted most of the delay to the time between when an SSL handshake was started and when the certificate was received. Additionally, most of the...

    Provided By Cornell University

  • White Papers // Aug 2013

    Distributed Object Store Principles of Operation The Case for Intelligent Storage

    In this paper, the authors look at the growth of Distributed Object Stores (DOS) and examine the underlying mechanisms that guide their use and development. Their focus is on the fundamental principles of operation that define this class of system, how it has evolved, and where it is heading as...

    Provided By Cornell University

  • White Papers // Aug 2013

    Hardware-based Security for Virtual Trusted Platform Modules

    Virtual Trusted Platform Modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments. However, virtualizing TPMs, especially virtualizing the Platform Configuration Registers (PCRs), strikes...

    Provided By Cornell University

  • White Papers // Aug 2013

    Efficient Inner-product Algorithm for Stabilizer States

    Large-scale quantum computation is likely to require massive Quantum Error Correction (QEC). QEC codes and circuits are described via the stabilizer formalism, which represents stabilizer states by keeping track of the operators that preserve them. Such states are obtained by stabilizer circuits (consisting of CNOT, Hadamard and Phase only) and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Intensional view of General Single Processor Operating Systems

    Operating systems are currently viewed ostensively. As a result they mean different things to different people. The ostensive character makes it is hard to understand OSes formally. An intensional view can enable better formal work, and also offer constructive support for some important problems, e.g. OS architecture. This paper argues...

    Provided By Cornell University

  • White Papers // Aug 2013

    Secure Authentication of Cloud Data Mining API

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy...

    Provided By Cornell University

  • White Papers // Aug 2013

    Apple IOS Devices for Network Administrators

    As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform...

    Provided By Cornell University

  • White Papers // Aug 2013

    TCP-Aware Backpressure Routing and Scheduling

    In this paper, the authors explore the performance of backpressure routing and scheduling for TCP flows over wireless networks. TCP and backpressure are not compatible due to a mismatch between the congestion control mechanism of TCP and the queue size based routing and scheduling of the backpressure framework. They propose...

    Provided By Cornell University

  • White Papers // Aug 2013

    Low Power-Area Designs of 1Bit Full Adder in Cadence Virtuoso Platform

    Power consumption has emerged as a primary design constraint for Integrated Circuits (ICs). In the nano meter technology regime, leakage power has become a major component of total power. Full adder is the basic functional unit of an ALU. The power consumption of a processor is lowered by lowering the...

    Provided By Cornell University

  • White Papers // Aug 2009

    The U.S. Automotive Industry: National And State Trends In Manufacturing Employment

    The U.S. motor vehicle manufacturing industry' employs 880,000 workers, or approximately 6.6% of the U.S. manufacturing workforce, including those who work in the large motor vehicle parts manufacturing sector, as well as those who assemble motor vehicles. Since the beginning of the decade, the nation's automotive manufacturing sector has eliminated...

    Provided By Cornell University

  • White Papers // Sep 2010

    Making Human Capital The Creative Core Of Strategy Execution

    In the face of intense competition and rapidly changing market requirements, business leaders must continually calculate how to achieve ambitious goals. They must confront economic uncertainty, environmental risk, social change and other volatile forces. To execute successfully in this difficult environment, they must embrace a new way of thinking, one...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Sensor Database Systems

    Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination of stored data and sensor data. Most existing applications rely on a centralized system for collecting sensor data. These systems lack flexibility because data is extracted in...

    Provided By Cornell University

  • White Papers // May 2010

    Seawall: Performance Isolation for Cloud Datacenter Networks

    While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants share the network.ˆis opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. This...

    Provided By Cornell University

  • White Papers // Sep 2010

    The Role Of The World Bank In Middle Income Countries

    This paper establishes some general principles of the rationale for development assistance in Middle Income Countries and then applies these principles to the operations of the World Bank. It then puts the argument through its paces for the specific case of India, which has just transitioned into middle income status....

    Provided By Cornell University

  • White Papers // Oct 2009

    XPaXS: Improved Data Acquisition and Real-Time Analysis at CHESS

    The Scanning X-ray Fluorescence Microscopy (SFXM) capability at CHESS draws users from diverse fields, including Environmental Science, Soil Science, Anthropology and Native American Studies, Dendrochronology and Classics. When the author inherited responsibility for the F3 beamline, two of the elements essential for the success of this research program were already...

    Provided By Cornell University

  • White Papers // Jul 2010

    The Effect Of Advertising And Deceptive Advertising On Consumption: The Case Of Over-The-Counter Weight Loss Products

    This paper is the first to estimate the impact of exposure to deceptive advertising on consumption of the advertised product and its substitutes. They study the market for over the-counter (OTC) weight-loss products, in which deceptive advertising is rampant. Strengths of the paper include matching of specific advertisements to individual...

    Provided By Cornell University

  • White Papers // Jan 2011

    Networking With Secrecy Constraints

    Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when...

    Provided By Cornell University

  • White Papers // Apr 2010

    Self-Replicating Objects for Multicore Platforms

    The paper introduces Self-Replicating Objects (SROs), a new concurrent programming abstraction. An SRO is implemented and used much like an ordinary .NET object and can expose arbitrary user-defined APIs, but it is aggressive about automatically exploiting multicore CPUs. It does so by spontaneously and transparently partitioning its state into a...

    Provided By Cornell University

  • White Papers // Jul 2010

    Behavioral Biases Of Mutual Fund Investors

    The authors examine the effect of behavioral biases on the mutual fund choices of a large sample of U.S. discount brokerage investors using new measures of attention to news, tax awareness, and fund-level familiarity bias, in addition to behavioral and demographic characteristics of earlier studies. Behaviorally-biased investors typically make poor...

    Provided By Cornell University

  • White Papers // Feb 2011

    Energy and Environmental Aspects of Mobile Communication Systems

    The reduction of the energy consumptions of a Telecommunication Power System represents one of the critical factors of the telecommunication technologies, both to allow a sizeable saving of economic resources and to realize "Sustainable" development actions. The consumption of about one hundred base stations for mobile phones were monitored for...

    Provided By Cornell University

  • White Papers // Feb 2011

    A Flow-Aware Mac Protocol for a Passive Optical Metropolitan Area Network

    The paper introduces an original MAC protocol for a passive optical metropolitan area network using Time-domain Wavelength Interleaved Networking (TWIN). Optical channels are shared under the distributed control of destinations using a packet-based polling algorithm. This MAC is inspired more by EPON dynamic bandwidth allocation than the slotted, GPON-like access...

    Provided By Cornell University

  • White Papers // Dec 2009

    Contextual Mobile Learning Strongly Related to Industrial Activities: Principles and Case Study

    M-learning (mobile learning) can take various forms. The authors are interested in contextualized M-learning, i.e. the training related to the situation physically or logically localized. Contextualization and pervasivity are important aspects of the approach. They propose in particular MOCOCO principles (Mobility - COntextualisation - COoperation) using IMERA platform (Mobile Interaction...

    Provided By Cornell University

  • White Papers // Jan 2010

    The Serializability of Network Codes

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of "Entropic...

    Provided By Cornell University

  • White Papers // Dec 2009

    Synchronization Analysis in Physical Layer Network Coding

    Physical-layer Network Coding (PNC) makes use of the additive nature of the ElectroMagnetic (EM) waves to apply network coding arithmetic at the physical layer. With PNC, the destructive effect of interference in wireless networks is eliminated and the capacity of networks can be boosted significantly. This paper addresses a key...

    Provided By Cornell University

  • White Papers // Nov 2010

    Individual Privacy vs Population Privacy: Learning to Attack Anonymization

    Over the last decade there have been great strides made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as k-anonymity and l-diversity) have been criticized...

    Provided By Cornell University

  • White Papers // Sep 2009

    Identification With Encrypted Biometric Data

    Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. This paper introduces a new method to identify someone using his biometrics in an encrypted way. The construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. The...

    Provided By Cornell University

  • White Papers // Feb 2011

    Algebraic Independence and Blackbox Identity Testing

    Polynomial Identity Testing (PIT) is the problem of checking whether a given n-variate arithmetic circuit computes the zero polynomial in F[x1,. .., xn]. It is a central question in complexity theory as circuits model computation and PIT leads one to a better understanding of circuits. There are several classical randomized...

    Provided By Cornell University

  • White Papers // Mar 2011

    Two-Unicast Wireless Networks: Characterizing the Degrees-of-Freedom

    The authors consider two-source two-destination (i.e., two-unicast) multi-hop wireless networks that have a layered structure with arbitrary connectivity. They show that, if the channel gains are chosen independently according to continuous distributions, then, with probability 1, two-unicast layered Gaussian networks can only have 1, 3=2 or 2 sum degrees-of-freedom1. They...

    Provided By Cornell University

  • White Papers // Mar 2011

    The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations

    One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here the authors discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are...

    Provided By Cornell University

  • White Papers // Mar 2011

    Multidimensional or Relational? How to Organize an On-Line Analytical Processing Database

    In the past few years, the number of On-line Analytical Processing (OLAP) applications increased quickly. These applications use two significantly different database structures: multidimensional and table-based. One can show that the traditional model of relational databases cannot make difference between these two structures. Another model is necessary to make the...

    Provided By Cornell University

  • White Papers // Mar 2011

    The Embedding Capacity of Information Flows Under Renewal Traffic

    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding...

    Provided By Cornell University

  • White Papers // Dec 2010

    The Ethics of Robotics

    The term 'Robot' first appeared in the play R.U.R (Rossum's Universal Robots) by Czech writer Karel Capek in the year 1921. The term arises from the Polish word 'Robota' which literally means self-labourer, or hard worker. Although the term Robot can cover a multitude of definitions; there is general consensus...

    Provided By Cornell University

  • White Papers // Dec 2010

    Collaborative Knowledge Creation and Management in Information Retrieval

    The final goal of Information Retrieval (IR) is knowledge production. However, it has been argued that knowledge production is not an individual effort but a collaborative effort. Collaboration in information retrieval is geared towards knowledge sharing and creation of new knowledge by users. This paper discusses Collaborative Information Retrieval (CIR)...

    Provided By Cornell University

  • White Papers // Dec 2010

    Generalized and Resource-Efficient VNet Embeddings With Migrations

    Network virtualization technology is believed to be a key enabler for the "Future Internet" as it allows to overcome existing ossifications and facilitates fast innovations. A crucial feature of this technology is the decoupling of virtual networks from the underlying substrate: Virtual Networks (VNets) can be mapped to those locations...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cooperative Proxy Servers Architecture for VoD to Achieve High QoS With Reduced Transmission Time and Cost

    The aim of this paper is to propose a novel Voice On Demand (VoD) architecture and implementation of an efficient load sharing algorithm to achieve Quality of Service (QoS). This scheme reduces the transmission cost from the Centralized Multimedia Sever (CMS) to Proxy Servers (PS) by sharing the videos among...

    Provided By Cornell University

  • White Papers // Oct 2009

    Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

    One of the challenges in the wireless sensor applications which are gaining much attention is the real-time transmission of continuous data packets across the network. Though advances in communication in sensor networks are providing guaranteed quality data packet delivery they still have some drawbacks. One such drawback is transmission of...

    Provided By Cornell University

  • White Papers // Jan 2010

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    The authors present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, they prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing...

    Provided By Cornell University

  • White Papers // Jan 2010

    Performance and Fault Tolerance in the StoreTorrent Parallel Filesystem

    With a goal of supporting the timely and cost-effective analysis of Terabyte datasets on commodity components, the authors present and evaluate StoreTorrent, a simple distributed filesystem with integrated fault tolerance for efficient handling of small data records. The contributions include an application-OS pipelining technique and metadata structure to increase small...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fault Tolerance in Real Time Multiprocessors - Embedded Systems

    All real time tasks which are termed as critical tasks by nature have to complete its execution before its deadline, even in presence of faults. The most popularly used real time task assignment algorithms are First Fit (FF), Best Fit (BF), Bin Packing (BP).The common task scheduling algorithms are Rate...

    Provided By Cornell University

  • White Papers // Jan 2010

    Software Components for Web Services

    Service oriented software engineering has emerged to address software as a set of services which deal with user needs. Therefore a service may make call requests to a range of systems (integrated software applications) and hence the emphasis is on design flexibility. The authors need to understand the concept behind...

    Provided By Cornell University

  • White Papers // Dec 2009

    VLSI Architectures for WIMAX Channel Decoders

    WIMAX has gained a wide popularity due to the growing interest and diffusion of broadband wireless access systems. In order to be flexible and reliable WIMAX adopts several different channel codes, namely Convolutional-Codes (CC), Convolutional-TurboCodes (CTC), Block-Turbo-Codes (BTC) and Low-Density-Parity-Check (LDPC) codes, that are able to cope with different channel...

    Provided By Cornell University

  • White Papers // Jan 2010

    Rate Region of the Gaussian Scalar-Help-Vector Source-Coding Problem

    The authors determine the rate region of the Gaussian scalar-help-vector source-coding problem under a covariance matrix distortion constraint. The rate region is achieved by a Gaussian achievable scheme. They introduce a novel outer bounding technique to establish the converse of the main result. The approach is based on lower bounding...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cognitive Routing With Stretched Network Awareness Through Hidden Markov Model Learning at Router Level

    The routing of packets are generally performed based on the destination address and forward link channel available from the instantaneous router without sufficient cognizance of either the performance of the forward router or forward channel characteristics. The lack of awareness of forward channel property can lead to packet loss or...

    Provided By Cornell University

  • White Papers // Jan 2011

    The Computing of Digital Ecosystems

    A primary motivation for the research in digital ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the computing technologies that contribute to these properties have not been made explicit in...

    Provided By Cornell University

  • White Papers // Mar 2011

    On the Cost of Concurrency in Transactional Memory

    The crux of Software Transactional Memory (STM) is to combine an easy-to-use programming interface with an efficient utilization of the concurrent computing abilities provided by modern machines. But does this combination come with an inherent cost? The authors evaluate the cost of concurrency by measuring the amount of expensive synchronization...

    Provided By Cornell University

  • White Papers // Feb 2011

    DB Category: Denotational Semantics for View-based Database Mappings

    The authors present a categorical denotational semantics for a database mapping, based on views, in the most general framework of a database integration/exchange. Developed database category DB, for databases (objects) and view-based mappings (morphisms) between them, is different from Set category: the morphisms (based on a set of complex query...

    Provided By Cornell University

  • White Papers // Feb 2011

    Asymptotic Fingerprinting Capacity for Non-Binary Alphabets

    Watermarking provides a means for tracing the origin and distribution of digital data. Before distribution of digital content, the content is modified by applying an imperceptible WaterMark (WM), embedded using a watermarking algorithm. Once an unauthorized copy of the content is found, it is possible to trace those users who...

    Provided By Cornell University

  • White Papers // Jan 2011

    Optimal Band Allocation for Cognitive Cellular Networks

    FCC new regulation for cognitive use of the TV white space spectrum provides a new means for improving traditional cellular network performance. But it also introduces a number of technical challenges. This letter studies one of the challenges, that is, given the significant differences in the propagation property and the...

    Provided By Cornell University

  • White Papers // Aug 2009

    On Capacity Scaling in Arbitrary Wireless Networks

    recent work, Ozgur, Leveque, and Tse (2007) obtained a complete scaling characterization of throughput scaling for random extended wireless networks (i.e., n nodes are placed uniformly at random in a square region of area n). They showed that for small path-loss exponents ???? (2, 3] cooperative communication is order optimal,...

    Provided By Cornell University