Cornell University

Displaying 201-240 of 1112 results

  • White Papers // Jan 2013

    An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems

    The increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the maintenance needs of Networked Distributed Storage Systems (NDSS), trying to reach the best compromise among storage space efficiency, fault-tolerance, and maintenance...

    Provided By Cornell University

  • White Papers // Jan 2013

    Increasing Network Visibility Using Coded Repetition Beacon Piggybacking

    Vehicular Ad-hoc NETworks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, the authors propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'Neighbor' table....

    Provided By Cornell University

  • White Papers // Jan 2013

    Why Quantum Computing Is Hard - and Quantum Cryptography Is Not Provably Secure

    Despite high hopes for quantum computation in the 1990s, progress in the past decade has been slow; the people still cannot perform computation with more than about three qubits and are no closer to solving problems of real interest than a decade ago. Separately, recent experiments in fluid mechanics have...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Capacity of Wireless Channels: A Physical Approach

    The capacity of Multiple-Input Multiple-Output (MIMO) channels has been considered to be severely limited by the size of antenna arrays. The capacity scaling for a three-dimensional network and the degree-of-freedom analysis for a polarimetric antenna array were provided based on the spherical vector wave decomposition, and both showed the number...

    Provided By Cornell University

  • White Papers // Jan 2013

    Towards Optimal Broadcast in Wireless Networks

    Broadcast is a fundamental operation in networks, especially in wireless Mobile Ad-hoc NETworks (MANETs). For example, some form of broadcasting is used by all on-demand MANET routing protocols, when there is uncertainty as to the location of the destination node, or for service discovery. Being such a basic operation of...

    Provided By Cornell University

  • White Papers // Jan 2013

    Integrated Approach to Data Center Power Management

    Energy accounts for a significant fraction of the operational costs of a data center, and data center operators are increasingly interested in moving towards low-power designs. Two distinct approaches have emerged towards achieving this end: the power proportional approach focuses on reducing disk and server power consumption, while the green...

    Provided By Cornell University

  • White Papers // Jan 2013

    On the Achievable Region for Interference Networks with Point-to-Point Codes

    This paper studies evaluation of the capacity region for interference networks with Point-to-Point (p2p) capacity-achieving codes. Such capacity region has recently been characterized as union of several sub-regions each of which has distinctive operational characteristics. Detailed evaluation of this region, therefore, can be accomplished in a very simple manner by...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Degrees of Freedom for Network-Coded Cognitive Interference Channel

    The authors explain a two-user cognitive Interference Channel (CIC) where one of the transmitters (primary) has knowledge of a linear combination (over an appropriate finite field) of the two information messages. They refer to this channel model as Network-Coded CIC, since the linear combination may be the result of some...

    Provided By Cornell University

  • White Papers // Jan 2013

    Evaluating Cloud Computing Techniques for Smart Power Grid Design Using Parallel Scripting

    Applications used to evaluate next-generation electrical power grids ("Smart grids") are anticipated to be compute and data-intensive. In this paper, the authors parallelize and improve performance of one such application which was run sequentially prior to the use of their cloud-based configuration. They examine multiple cloud computing offerings, both commercial...

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Compressive Sampling of Spatially Sparse Fields in Wireless Sensor Networks

    Wireless Sensor Networks (WSN), i.e. networks of autonomous, wireless sensing nodes spatially deployed over a geographical area, are often faced with acquisition of spatially sparse fields. In this paper, the authors present a novel bandwidth/energy efficient CS scheme for acquisition of spatially sparse fields in a WSN. The paper contribution...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Cut-Set Bounds for Broadcast Networks

    A broadcast network is a classical network with all source messages collocated at a single source node. For broadcast networks, the standard cut-set bounds, which are known to be loose in general, are closely related to union as a specific set operation to combine the basic cuts of the network....

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Identification of Equivalences in Dynamic Graphs and Pedigree Structures

    The authors propose a new framework for designing test and query functions for complex structures that vary across a given parameter such as genetic marker position. The operations they are interested in include equality testing, set operations, isolating unique states, duplication counting, or finding equivalence classes under identifiability constraints. A...

    Provided By Cornell University

  • White Papers // Jan 2013

    Toward a Reliable, Secure and Fault Tolerant Smart Grid State Estimation in the Cloud

    The collection and prompt analysis of synchrophasor measurements is a key step towards enabling the future smart power grid, in which grid management applications would be deployed to monitor and react intelligently to changing conditions. The potential exists to slash inefficiencies and to adaptively reconfigure the grid to take better...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

    Secure network coding was first introduced by Cai and Yeung, and further investigated by Feldman et al... In the scenario of secure network coding, a source node transmits n packets from n outgoing links to sink nodes through a network that implements network coding, and each sink node receives N...

    Provided By Cornell University

  • White Papers // Jan 2013

    Utility-Privacy Tradeoff in Databases: An Information-Theoretic Approach

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. This paper presents...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relay Augmentation for Lifetime Extension of Wireless Sensor Networks

    The authors propose a novel relay augmentation strategy for extending the lifetime of a certain class of Wireless Sensor Networks. In this class, sensors are located at fixed and pre-determined positions and all communication takes place via multi-hop paths in a fixed routing tree rooted at the base station. It...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Space-Time Decision Feedback Neural Detectors with Data Selection for High-Data Rate Users in DS-CDMA Systems

    A space-time adaptive Decision Feedback (DF) receiver using Recurrent Neural Networks (RNN) is proposed for joint equalization and interference suppression in Direct Sequence Code-Division-Multiple-Access (DS-CDMA) systems equipped with antenna arrays. The proposed receiver structure employs dynamically driven RNNs in the feed forward section for equalization and multi-access interference suppression and...

    Provided By Cornell University

  • White Papers // Jan 2013

    Blind Adaptive Algorithms for Decision Feedback DS-CDMA Receivers in Multipath Channels

    In this paper, the authors examine blind adaptive and iterative Decision Feedback (DF) receivers for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in frequency selective channels. Code-constrained Minimum Variance (CMV) and Constant Modulus (CCM) design criteria for DF receivers based on constrained optimization techniques are investigated for scenarios subject...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Interference Suppression for CDMA Systems using Interpolated FIR Filters with Adaptive Interpolators in Multipath Channels

    In this paper, the authors propose an adaptive linear receiver structure based on interpolated Finite Impulse Response (FIR) filters with adaptive interpolators for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in multipath channels. The interpolated Minimum Mean-Squared Error (MMSE) and the interpolated Constrained Minimum Variance (CMV) solutions are described...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Case for Cross-Layer Optimizations in Storage: A Workflow-Optimized Storage System

    In this paper, the authors propose using file system custom metadata as a bidirectional communication channel between applications and the storage system. This channel can be used to pass hints that enable cross-layer optimizations, an option hindered today by the ossified file-system interface. The authors study this approach in context...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for Two-Way Relaying with QAM

    The design of modulation schemes for the physical layer network-coded two way relaying scenario was studied. It was shown that every network coding map that satisfies the exclusive law is represent able by a Latin Square and conversely, and this relationship can be used to get the network coding maps...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for the K-User Multiple Access Relay Channel

    A Physical layer Network Coding (PNC) scheme is proposed for the K-user wireless Multiple Access Relay Channel (MARC), in which K source nodes transmit their messages to the destination node D with the help of a relay node R: The proposed PNC scheme involves two transmission phases: Phase 1 during...

    Provided By Cornell University

  • White Papers // Jan 2013

    Decentralized Lifetime Minimizing Tree for Data Aggregation in Wireless Sensor Networks

    To meet the demands of Wireless Sensor Networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside any given event region. In this paper, the authors propose a novel technique to create...

    Provided By Cornell University

  • White Papers // Jan 2013

    Network Throughput Optimization via Error Correcting Codes

    A new network construction method is presented for building of scalable, high throughput, low latency networks. The method is based on the exact equivalence discovered between the problems of maximizing network throughput (measured as bisection bandwidth) for a large class of practically interesting Cayley graphs and the problem of maximizing...

    Provided By Cornell University

  • White Papers // Jan 2013

    Low-Complexity Scheduling Policies for Achieving Throughput and Delay Optimality in Multi-Channel Wireless Networks

    In this paper, the authors study the scheduling problem for downlink transmission in a multi-channel (e.g., OFDM-based) wireless network. They focus on a single cell, with the aim of developing a unifying framework for designing low-complexity scheduling policies that can provide optimal performance in terms of both throughput and delay....

    Provided By Cornell University

  • White Papers // Jan 2013

    Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Networks

    Energy efficiency is the most important issue in all facets of Wireless Sensor Networks (WSNs) operations because of the limited and non-replenish able energy supply. Data aggregation mechanism is one of the possible solutions to prolong the life time of sensor nodes and on the other hand it also helps...

    Provided By Cornell University

  • White Papers // Jan 2013

    New Variant of ElGamal Signature Scheme

    Since the invention of the public key cryptography in the late 1970s, several new subjects related to the data security as identification, authentication, zero-knowledge proof and secret sharing were explored. In this paper, the authors described a new variant of ElGamal signature scheme and analyzed its security. Their method relies...

    Provided By Cornell University

  • White Papers // Jan 2013

    An Efficient Hybrid Localization Technique in Wireless Sensor Networks

    Sensor nodes are low cost, low power devices that are used to collect physical data and monitor environmental conditions from remote locations. Wireless Sensor Networks (WSN's) are collection of sensor nodes, coordinating among themselves to perform a particular task. Localization is defined as the deployment of the sensor nodes at...

    Provided By Cornell University

  • White Papers // Jan 2013

    High Volume Computing: Identifying and Characterizing Throughput Oriented Workloads in Data Centers

    For the first time, this paper systematically identifies three categories of throughput oriented workloads in data centers: services, data processing applications, and interactive real-time applications, whose targets are to increase the volume of throughput in terms of processed requests or data, or supported maximum number of simultaneous subscribers, respectively, and...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Realistic Distributed Storage System that Minimizes Data Storage and Repair Bandwidth

    In a realistic distributed storage environment, storage nodes are usually placed in racks, a metallic support designed to accommodate electronic equipment. It is known that the communication (bandwidth) cost between nodes within a rack is much lower than the communication (bandwidth) cost between nodes within different racks. In this paper,...

    Provided By Cornell University

  • White Papers // Jan 2013

    A New Metric for Routing in Multi-Hop Wireless Sensor Networks for Detection of Correlated Random Fields

    The problem of combining task performance and routing for the detection of correlated random fields using multi-hop wireless sensor networks is considered. Under the assumption of Gauss-Markov structure along a given route, a link metric that captures the detection performance associated with a route is derived. Under Bayesian formulation Chernoff...

    Provided By Cornell University

  • White Papers // Jan 2013

    CloudSVM : Training an SVM Classi Er in Cloud Computing Systems

    In conventional method, distributed Support Vector Machines (SVM) algorithms are trained over pre-configured intranet/internet environments to find out an optimal classifier. These methods are very complicated and costly for large datasets. Hence, the authors propose a method that is referred as the Cloud SVM training mechanism (CloudSVM) in a cloud...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Digital Signature with Threshold Generation and Verification

    This paper proposes a signature scheme where the signatures are generated by the cooperation of a number of people from a given group of senders and the signatures are verified by a certain number of people from the group of recipients. Shamir's threshold scheme and Schnorr's signature scheme are used...

    Provided By Cornell University

  • White Papers // Dec 2012

    Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems

    Managing, analyzing and extracting information from multidimensional data are very important activities in a broad range of domains, like business planning and integration, scientific research, statistics and even distributed systems. In this paper, the author consider problems like the largest empty circle and hyper-rectangle in a given set of points,...

    Provided By Cornell University

  • White Papers // Dec 2012

    Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks

    An online user joins multiple social networks in order to enjoy different services. On each joined social network, the user creates an identity and constitutes its three major dimensions namely profile, content and connection network. The user largely governs the identity formulation on any social network and therefore can manipulate...

    Provided By Cornell University

  • White Papers // Dec 2012

    Cumulative Sum Algorithm for Detecting SYN Flooding Attacks

    SYN flooding attacks generate enormous packets by a large number of agents and can easily exhaust the computing and communication resources of a victim within a short period of time. In this paper, the authors propose a lightweight method for detecting SYN flooding attack by non-parametric cumulative sum algorithm. They...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks

    Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, the authors propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles,...

    Provided By Cornell University

  • White Papers // Dec 2012

    Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths

    In this paper, the author investigates several offline and online data transfer scheduling problems and propose efficient algorithms and techniques for addressing them. In the offline case, he present a novel, heuristic, algorithm for scheduling files with divisible sizes on multiple disjoint paths, in order to maximize the total profit...

    Provided By Cornell University

  • White Papers // Dec 2012

    Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks

    The issue of optimizing the limited and often non-renewable energy of sensor nodes due to its direct impact on network lifetime dominates every aspect of wireless sensor networks. Existing techniques for optimizing energy consumption are based on exploiting node redundancy, adaptive radio transmission power and topology control. Topology control protocols...

    Provided By Cornell University

  • White Papers // Dec 2012

    Jerarca: Efficient Analysis of Complex Networks Using Hierarchical Clustering

    There are many types of data, both biological and non-biological, which can be represented as undirected graphs. Examples in biology are networks based on protein-protein interaction data, those based on shared protein domains, genetic interaction networks or co-expression networks. Developing heuristic strategies to extract useful information from them is an...

    Provided By Cornell University

  • White Papers // Oct 2010

    Scalable XML Collaborative Editing With Undo Short Paper

    Commutative Replicated Data-Type (CRDT) is a new class of algorithms that ensures scalable consistency of replicated data. It has been successfully applied to collaborative editing of texts without complex concurrency control. In this paper, the authors present a CRDT to edit XML data. Compared to existing approaches for XML collaborative...

    Provided By Cornell University

  • White Papers // Oct 2010

    Equivalence Checking in Embedded Systems Design Verification

    In this paper the authors focus on some aspects related to modeling and formal verification of embedded systems. Many models have been proposed to represent embedded systems. These models encompass a broad range of styles, characteristics, and application domains and include the extensions of finite state machines, data flow graphs,...

    Provided By Cornell University

  • White Papers // Oct 2010

    Server Consolidation: An Approach to Make Data Centers Energy Efficient & Green

    Data centers are the building blocks of IT business organizations providing the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers...

    Provided By Cornell University

  • White Papers // Mar 2009

    A Novel Algorithm for Compressive Sensing: Iteratively Reweighed Operator Algorithm (IROA)

    Recent years, the well-known compressive sensing (or compressed sampling, compressive sampling, and so on) has been fast developed due to its strong potential in the field of the signal/imaging/video process, radar, remote sensing, medical imaging, wireless communication, sensor network, and so on, The basic principle is that the sparse or...

    Provided By Cornell University

  • White Papers // Apr 2009

    TCP Over 3G Links: Problems and Solutions

    This paper presents analytical information regarding the transfer of TCP data flows on paths towards interconnected wireless systems, with emphasis on 3G cellular networks. The focus is on protocol modifications in face of problems arising from terminal mobility and wireless transmission. The objective of this paper is not to present...

    Provided By Cornell University

  • White Papers // Mar 2009

    On the Necessary and Sufficient Condition of Greedy Routing Supporting Geographical Data Networks

    Large scale decentralized communication systems have introduced the new trend towards online routing where routing decisions are performed based on a limited and localized knowledge of the network. Geometrical greedy routing has been among the simplest and most common online routing schemes. A perfect geometrical routing scheme is expected to...

    Provided By Cornell University

  • White Papers // Mar 2009

    Stochastic Models of User-Contributory Web Sites

    The authors describe a general stochastic processes-based approach to modeling user-contributory web sites, where users create, rate and share content. These models describe aggregate measures of activity and how they arise from simple models of individual users. This approach provides a tractable method to understand user activity on the web...

    Provided By Cornell University

  • White Papers // Apr 2009

    Deterministic Capacity of MIMO Relay Networks

    Recently there has been a large renewed interest in analyzing capacity of networks, in particular wireless networks. It has been found that the capacity of wireless networks can be increased by using the fact that the wireless signal propagates widely (the multicast advantage) and letting nodes cooperate (cooperative diversity). Coding...

    Provided By Cornell University

  • White Papers // Sep 2010

    Mobile Information Collectors Trajectory Data Warehouse Design

    To analyze complex phenomena which involve moving objects, Trajectory Data Warehouse (TDW) seems to be an answer for many recent decision problems related to various professions (physicians, commercial representatives, transporters, ecologists ?) concerned with mobility. This work aims to make trajectories as a first class concept in the trajectory data...

    Provided By Cornell University

  • White Papers // May 2010

    Power-Efficient Routing & Increased Yield Approach For WSNs

    The sensor nodes in a Wireless Sensor Network are generally constrained with limited power supply. Efficient power management is a must for any sensor network to keep the sensor nodes in the network to be operational for a longer period of time this increasing the lifetime of the sensor network....

    Provided By Cornell University

  • White Papers // Sep 2010

    Efficient Collaborative Application Monitoring Scheme for Mobile Networks

    New operating systems for mobile devices allow their users to download millions of applications created by various individual programmers, some of which may be malicious or awed. In order to detect that an application is malicious, monitoring its operation in a real environment for a significant period of time is...

    Provided By Cornell University

  • White Papers // Sep 2010

    Functorial Data Migration

    Database management is a huge industry, yet logical database design remains problematic. While the relational algebra is sufficient to understand single tables and operations that can be performed on them, it has no means to capture the structure of the database as a whole. The idea presented in this paper...

    Provided By Cornell University

  • White Papers // Aug 2010

    Network Evolution and QoS Provisioning for Integrated Femtocell/macrocell Networks

    Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of service, and access network capacity. The key element to successful femtocells/macrocell integration lies in its selforganizing capability. Provisioning of quality of service is the main technical challenge of the...

    Provided By Cornell University

  • White Papers // Mar 2009

    Relations, Constraints and Abstractions: Using the Tools of Logic Programming in the Security Industry

    Logic programming is sometimes described as relational programming: a paradigm in which the programmer specifies and composes n-ary relations using systems of constraints. An advanced logic programming environment will provide tools that abstract these relations to transform, optimise, or even verify the correctness of a logic program. This talk will...

    Provided By Cornell University

  • White Papers // Oct 2010

    Temporal Logics on Words With Multiple Data Values

    The paper proposes and studies temporal logics for attributed words, that is, data words with a (finite) set of (attribute, value)-pairs at each position. It considers a basic logic which is a semantical fragment of the logic LTL?" 1 of Demri and Lazic with operators for navigation into the future...

    Provided By Cornell University

  • White Papers // Jul 2009

    Generating Hierarchically Modular Networks Via Link Switching

    This paper introduces a method to generate hierarchically modular networks with prescribed node degree list by link switching. Unlike many existing network generating models, the method does not use link probabilities to achieve modularity. Instead, it utilizes a user-specified topology to determine relatedness between pairs of nodes in terms of...

    Provided By Cornell University

  • White Papers // Aug 2009

    Worst Case Attacks Against Binary Probabilistic Traitor Tracing Codes

    An insightful view into the design of traitor tracing codes should necessarily consider the worst case attacks that the colluders can lead. This paper takes an information-theoretic point of view where the worst case attack is defined as the collusion strategy minimizing the achievable rate of the traitor tracing code....

    Provided By Cornell University

  • White Papers // Apr 2009

    Boolean Logic With Fault Tolerant Coding

    Error detectable and error correctable coding in Hamming space was researched to discover possible fault tolerant coding constellations, which can implement Boolean logic with fault tolerant property. Basic logic operators of the Boolean algebra were developed to apply fault tolerant coding in the logic circuits. It was shown that application...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Jan 2009

    Employee Handbook Basics

    By formulating standard answers, instructions or explanations and putting them in writing you place the information where everyone can see and refer to it whenever necessary. That's why developing internal organizational communication tools like newsletters, informational bulletins, standard operating procedures, job descriptions, employee handbooks, and policy manuals make so much...

    Provided By Cornell University

  • White Papers // Jun 2009

    Processing of Medical Signals (ECG) in Wireless Sensor Networks

    Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...

    Provided By Cornell University

  • White Papers // Nov 2008

    Nozzle: A Defense Against Heap-Spraying Code Injection Attacks

    Heap spraying is a new security attack that significantly increases the exploitability of existing memory corruption errors in type-unsafe applications. With heap spraying, attackers leverage their ability to allocate arbitrary objects in the heap of a type-safe language, such as JavaScript, literally filling the heap with objects that contain dangerous...

    Provided By Cornell University

  • White Papers // Apr 2009

    Towards a Cloud Computing Research Agenda

    The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while...

    Provided By Cornell University

  • White Papers // Apr 2009

    Building Collaboration Applications That Mix Web Services Hosted Content With P2P Protocols

    The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. This paper makes the case for Service-Oriented Collaboration applications that combine service-hosted data with collaboration features implemented using peer-to-peer protocols. Collaboration features are awkward to support solely based on...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Resume Writing: Preparation- Elements Of A Resume

    Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Mar 2009

    Intermediaries In Negotiations If Complex Contracts: The Role Of Attorneys In Venture Capital Transactions

    Author shows that intermediaries can affect the design of financial contracts by reducing asymmetry in contracting parties' knowledge about complicated and interrelated contract contingencies. Across 908 contracts used in venture capital (VC) transactions, entrepreneurs counseled by attorneys with high VC expertise sign contracts with fewer investor-friendly cash flow contingencies, particularly...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Dec 2008

    Video Games Can Waste Children's Time

    Video games can be found in all shapes and sizes, from hand-held models to CD-ROM programs with sophisticated imagery and sound. Kids, even those who have a hard time paying attention in school, can spend hours in front of a computer monitor or television screen playing these games. Some video...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Apr 2009

    National Security Review Of Foreign Mergers And Acquisitions Of Domestic Companies In China And The United States

    China's recently enacted Anti-Monopoly Law has received much academic attention. In particular, many articles and comments have been written about the Anti-Monopoly Law, a provision on national security review of foreign mergers and acquisitions of domestic companies. The provision has often been labelled as draconian and protectionist. This paper argues...

    Provided By Cornell University

  • White Papers // Oct 2008

    Why Firms Smooth Dividends: Empirical Evidence

    While dividend smoothing is taken as an article of faith, little is known about the cross-sectional properties of smoothing policies. Why do some firms smooth more than others? The authors examine firms' dividend smoothing behavior across a wide spectrum of publicly traded firms in the U.S. The authors find that...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Jan 2012

    Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks

    The objective of this paper is to increase life time of homogeneous Wireless Sensor Networks (WSNs) through minimizing long range communication and energy balancing. Sensor nodes are resource constrained particularly with limited energy that is difficult o r impossible to replenish. LEACH (Low Energy Adaptive Clustering Hierarchy) is most well...

    Provided By Cornell University

  • White Papers // Jul 2009

    A New Approach to Services Differentiation Between Mobile Terminals of a Wireless LAN

    This paper aims to identify the advantages and disadvantages of several mechanisms for service differentiation in mobile terminals of a wireless LAN to establish a better and more efficient network. According to the analysis of available approaches for the quality of service of the IEEE 802.11 standard, this paper is...

    Provided By Cornell University