Cornell University

Displaying 201-240 of 1175 results

  • White Papers // Jun 2013

    Toward a Unified Performance and Power Consumption NAND Flash Memory Model of Embedded and Solid State Secondary Storage Systems

    In this paper, the authors present a set of models dedicated to describe a flash storage subsystem structure, functions, performance and power consumption behaviors. These models cover a large range of today's NAND flash memory applications. They are designed to be implemented in simulation tools allowing to estimate and compare...

    Provided By Cornell University

  • White Papers // Jun 2013

    Equivalence and Comparison of Heterogeneous Cellular Networks

    The authors consider a general heterogeneous network in which, besides general propagation effects (shadowing and/or fading), individual base stations can have different emitting powers and be subject to different parameters of Hata-like pathloss models (path-loss exponent and constant) due to, for example, varying antenna heights. They assume also that the...

    Provided By Cornell University

  • White Papers // Jun 2013

    Towards a Simple Relationship to Estimate the Capacity of Static and Mobile Wireless Networks

    Extensive research has been done on studying the capacity of wireless multi-hop networks. These efforts have led to many sophisticated and customized analytical studies on the capacity of particular networks. While most of the analyses are intellectually challenging, they lack universal properties that can be extended to study the capacity...

    Provided By Cornell University

  • White Papers // Jun 2013

    CSMA Using Statistical Physics Toward Throughput and Utility Optimal CSMA

    In the recent past years, CSMA (Carrier Sense Multiple Access), which resolves contentions over wireless networks in a fully distributed fashion, has gained a lot of attentions since it has been proved in several papers that appropriate control of CSMA parameters provably guarantees optimality in terms of throughput and fairness....

    Provided By Cornell University

  • White Papers // Jun 2013

    Hybrid Coding: An Interface for Joint Source - Channel Coding and Network Communication

    A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled. However, unlike the separation...

    Provided By Cornell University

  • White Papers // Jun 2013

    Cell-Level Modeling of IEEE 802.11 WLANs

    The authors develop a scalable cell-level analytical model for multi-cell infrastructure IEEE 802.11 WLANs under a so-called Pairwise Binary Dependence (PBD) condition. The PBD condition is a geometric property under which the relative locations of the nodes inside a cell do not matter and the network is free of hidden...

    Provided By Cornell University

  • White Papers // Jun 2013

    A Novel Defence Scheme Against Selfish Node Attack in MANET

    Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one...

    Provided By Cornell University

  • White Papers // May 2013

    ASURA: Scalable and Uniform Data Distribution Algorithm for Storage Clusters

    Large-scale storage cluster systems need to manage a vast amount of information denoting combinations of data IDentifiers (IDs) and corresponding nodes that store the data. Management using data distribution algorithms, rather than management using tables, has been proposed in recent research. In algorithm management, data are distributed in accordance with...

    Provided By Cornell University

  • White Papers // May 2013

    Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution

    Reconciliation is an important step to correct errors in Quantum Key Distribution (QKD). In QKD, after comparing basis, two legitimate parties possess two correlative keys which have some differences and they could obtain identical keys through reconciliation. In this paper, the authors present a new rate compatible reconciliation scheme based...

    Provided By Cornell University

  • White Papers // May 2013

    Building Internal Cloud at NIC : A Preview

    The most of computing environments in the IT support organization like NIC are designed to run in centralized data centre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that data centre from all the stations of organization. Currently these...

    Provided By Cornell University

  • White Papers // May 2013

    Enhancing Information Dissemination in a Device to Device Communication Based Metapopulation using Human Mobility Trace and Beamforming

    In communication network based on device to device interactions, dissemination of the information has lately picked up lot of interest. In this paper, the authors would like to propose a mechanism for studying and enhancing the dissemination of information as in the use case proposed for the future device to...

    Provided By Cornell University

  • White Papers // May 2013

    Java Card for PayTV Application

    Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest...

    Provided By Cornell University

  • White Papers // May 2013

    Secure Biometrics: Concepts, Authentication Architectures & Challenges

    Biometrics is an important and widely used class of methods for identity verification and access control. Biometrics is attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, biometrics is...

    Provided By Cornell University

  • White Papers // May 2013

    Proportional Fair MU-MIMO in 802.11 WLANs

    The next generation of 802.11 WLANs is expected to support Multi-User MIMO (MUMIMO) transmission, whereby parallel transmissions can be simultaneously made to multiple stations. This significantly extends the MIMO support introduced by the 802.11n standard and is, for example, included as part of the current draft 802.11ac standard that aims...

    Provided By Cornell University

  • White Papers // May 2013

    Multicut Lower Bounds via Network Coding

    The authors introduce a new technique to certify lower bounds on the multi-cut size using network coding. In directed networks the network coding rate is not a lower bound on the multi-cut, but they identify a class of networks on which the rate is equal to the size of the...

    Provided By Cornell University

  • White Papers // May 2013

    Parity Declustering for Fault-Tolerant Storage Systems Via T-Designs

    RAID (Redundant Array of Independent Disks) has been widely used as a large-scaled and reliable storage system since its introduction in 1988. Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that...

    Provided By Cornell University

  • White Papers // May 2013

    Analysis of a Non-Work Conserving Generalized Processor Sharing Queue

    In this paper, the authors consider a non work-conserving Generalized Processor Sharing (GPS) system composed of two queues with Poisson arrivals and exponential service times. Using general results due to Fayolle et al, they first establish the stability condition for this system. They then determine the functional equation satisfied by...

    Provided By Cornell University

  • White Papers // May 2013

    Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells

    In this paper, the authors propose a novel solution called Dynamic Spectrum Refarming (DSR) for deploying LTE small cells using the same spectrum as existing GSM networks. The basic idea of DSR is that LTE small cells are deployed in the GSM spectrum but suppress transmission of all signals including...

    Provided By Cornell University

  • White Papers // May 2013

    Osculating Spaces of Varieties and Linear Network Codes

    The authors present a general theory to obtain good linear network codes utilizing the osculating nature of algebraic varieties. In particular, they obtain from the osculating spaces of Veronese varieties explicit families of equidimensional vector spaces, in which any pair of distinct vector spaces intersect in the same dimension. Linear...

    Provided By Cornell University

  • White Papers // May 2013

    Cloud Computing Benefits for Educational Institutions

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers...

    Provided By Cornell University

  • White Papers // May 2013

    Storage and Search in Dynamic Peer-to-Peer Networks

    The authors study robust and efficient distributed algorithms for searching, storing, and maintaining data in dynamic Peer-To-Peer (P2P) networks. P2P networks are highly dynamic networks that experience heavy node churn (i.e., nodes join and leave the network continuously over time). Their goal is to guarantee, despite high node churn rate,...

    Provided By Cornell University

  • White Papers // May 2013

    Intelligent Agent Based Semantic Web in Cloud Computing Environment

    Considering today's web scenario, there is a need of effective and meaningful search over the web which is provided by Semantic Web. Existing search engines are keyword based. They are vulnerable in answering intelligent queries from the user due to the dependence of their results on information available in web...

    Provided By Cornell University

  • White Papers // May 2013

    Endow a Service-Oriented Architecture by a Decisional Aspect

    SOA architecture is more and more used in the companies, The importance of the service orientation and its advantages with the information system of the company, confront one to a new challenge. It is primarily to ensure the decisional aspect of the information system of company by adopting Ser-vices Orientated...

    Provided By Cornell University

  • White Papers // May 2013

    Off-Path Hacking: The Illusion of Challenge-Response Authentication

    Everyone is concerned about the Internet security, yet most traffic is not cryptographically protected. The usual justification is that most attackers are only off-path and cannot intercept traffic; hence, challenge-response mechanisms suffice to ensure authenticity. Usually, the challenges reuse existing `Unpredictable' header fields to protect widely-deployed protocols such as TCP...

    Provided By Cornell University

  • White Papers // May 2013

    Optimal Distributed Scheduling in Wireless Networks Under SINR Interference Model

    Radio resource sharing mechanisms are key to ensuring good performance in wireless networks. In their seminal paper, Tassiulas and Ephremides introduced the Maximum Weighted Scheduling algorithm, and proved its throughput-optimality. Since then, there have been extensive research efforts to devise distributed implementations of this algorithm. Recently, distributed adaptive CSMA scheduling...

    Provided By Cornell University

  • White Papers // May 2013

    Designing Run-Time Environments to Have Predefined Global Dynamics

    The stability and the predictability of a computer network algorithm's performance are as important as the main functional purpose of networking software. However, asserting or deriving such properties from the finite state machine implementations of protocols is hard and, except for singular cases like TCP, is not done today. In...

    Provided By Cornell University

  • White Papers // May 2013

    Implementation of DYMO Routing Protocol

    Mobile Ad-hoc NETworks communicate without any fixed infrastructure or ant centralized domain. All the nodes are free to move randomly within the network and share information dynamically. To achieve an efficient routing various protocols have been developed so far which vary in their nature and have their own salient properties....

    Provided By Cornell University

  • White Papers // May 2013

    Effect of Data Preprocessing on Software Effort Estimation

    Software effort estimation requires high accuracy, but accurate estimations are difficult to achieve. Increasingly, data mining is used to improve an organization's software process quality, e.g. the accuracy of effort estimations .There are a large number of different method combination exists for software effort estimation, selecting the most suitable combination...

    Provided By Cornell University

  • White Papers // May 2013

    HTTPI Based Web Service Security Over SOAP

    Now-a-days, a new family of web applications 'open applications', are emerging (e.g., social networking, news and blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a new transport protocol is...

    Provided By Cornell University

  • White Papers // May 2013

    Trust Value Algorithm: A Secure Approach Against Packet Drop Attack in Wireless Ad-Hoc Networks

    Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio...

    Provided By Cornell University

  • White Papers // May 2013

    Password Based Scheme and Group Testing for Defending DDOS Attacks

    DoS attacks are one of the top security problems affecting networks and disrupting services to legitimate users. The vital step in dealing with this problem is the network's ability to detect such attacks. Application DDoS attack, which aims at disrupting application service rather than depleting the network resource. Up to...

    Provided By Cornell University

  • White Papers // Apr 2013

    Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems

    The authors investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. They show that attacks taking advantage of the systems false acceptance rate, i.e. false-accept attacks, pose a very...

    Provided By Cornell University

  • White Papers // Apr 2013

    Power-Efficient Assignment of Virtual Machines to Physical Machines

    Motivated by current trends in cloud computing, the authors explain study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency they say that a set of Virtual Machines (VMs) is assigned to a...

    Provided By Cornell University

  • White Papers // Apr 2013

    A C++11 Implementation of Arbitrary-Rank Tensors for High-Performance Computing

    In this paper, the authors discusses an efficient implementation of tensors of arbitrary rank by using some of the idioms introduced by the recently published C++ ISO Standard (C++11). With the aims at providing a basic building block for high-performance computing, a single Array class template is carefully crafted, from...

    Provided By Cornell University

  • White Papers // Apr 2013

    Towards a Networks-of-Networks Framework for Cyber Security

    Networks-of-Networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed...

    Provided By Cornell University

  • White Papers // Apr 2013

    Application-Driven TCP Recovery and Non-Stop BGP

    Some network protocols tie application state to underlying TCP connections, leading to unacceptable service outages when an endpoint loses TCP state during fail-over or migration. For example, BGP ties forwarding tables to its control plane connections so that the failure of a BGP endpoint can lead to widespread routing disruption,...

    Provided By Cornell University

  • White Papers // Apr 2013

    Exclusion and Guard Zones in DS-CDMA Ad Hoc Networks

    The central issue in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by...

    Provided By Cornell University

  • White Papers // Apr 2013

    Coding Opportunity Densification Strategies for Instantly Decodable Network Coding

    In this paper, the authors aim to identify the strategies that can maximize and monotonically increase the density of the coding opportunities in Instantly Decodable Network Coding (IDNC).Using the well-known graph representation of IDNC, first derive an expression for the exact evolution of the edge set size after the transmission...

    Provided By Cornell University

  • White Papers // Apr 2013

    Two Trivial Attacks on A5/1: A GSM Stream Cipher

    Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher that ensure confidentiality of conversations in GSM mobile phones. However careful security analysis of such cipher is very important...

    Provided By Cornell University

  • White Papers // Apr 2013

    Dynamic Clustering Protocol for Data Forwarding in Wireless Sensor Networks

    Energy being the very key concern area with sensor networks, so the main focus lies in developing a mechanism to increase the lifetime of a sensor network by energy balancing. To achieve energy balancing and maximizing network lifetime the authors use an idea of clustering and dividing the whole network...

    Provided By Cornell University

  • White Papers // Feb 2000

    Questions You Should Answer Before Starting A New Dairy Processing Enterprise

    This set of questions provides a beginning point for an individual or group looking at starting up a new dairy business. These questions are not meant to include all of the factors needed to determine the economic feasibility of a prospective enterprise nor are they meant to comprise all of...

    Provided By Cornell University

  • White Papers // Sep 2002

    Black-White Differences in Tipping of Various Service Providers

    Data from a national telephone survey revealed four general patterns in the tipping behaviors of Blacks and Whites. This paper briefly discusses the theoretical and practical implications of these findings. First, Blacks appear more likely than Whites to stiff commonly encountered service providers, but not less commonly encountered ones. Second,...

    Provided By Cornell University

  • White Papers // Jun 2001

    A Picture Is Worth a Thousand Words: A Content Analysis of Consumer Complaints, Remedies, and Repatronage Intentions Regarding Dissatisfying Service Experiences

    Building on a research examining customers' complaints about service experiences, this study examined restaurant consumers' episode specific reactions to service failures. In the first stage of this work, restaurant patrons were asked to describe a recent service experience where they complained about some element of the service they received. From...

    Provided By Cornell University

  • White Papers // Jun 2009

    Processing of Medical Signals (ECG) in Wireless Sensor Networks

    Combination of embedded systems and wireless technology provides a lot of opportunities for acquisition, processing and transmission of data. It is useful to apply these technology approaches for solving medical problems. ECG is the record of the heart muscle electric impulses. Received and processed ECG signal could be analyzed, and...

    Provided By Cornell University

  • White Papers // Apr 2009

    Towards a Cloud Computing Research Agenda

    The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while...

    Provided By Cornell University

  • White Papers // Apr 2009

    Building Collaboration Applications That Mix Web Services Hosted Content With P2P Protocols

    The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. This paper makes the case for Service-Oriented Collaboration applications that combine service-hosted data with collaboration features implemented using peer-to-peer protocols. Collaboration features are awkward to support solely based on...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Resume Writing: Preparation- Elements Of A Resume

    Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Mar 2009

    Intermediaries In Negotiations If Complex Contracts: The Role Of Attorneys In Venture Capital Transactions

    Author shows that intermediaries can affect the design of financial contracts by reducing asymmetry in contracting parties' knowledge about complicated and interrelated contract contingencies. Across 908 contracts used in venture capital (VC) transactions, entrepreneurs counseled by attorneys with high VC expertise sign contracts with fewer investor-friendly cash flow contingencies, particularly...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Apr 2009

    National Security Review Of Foreign Mergers And Acquisitions Of Domestic Companies In China And The United States

    China's recently enacted Anti-Monopoly Law has received much academic attention. In particular, many articles and comments have been written about the Anti-Monopoly Law, a provision on national security review of foreign mergers and acquisitions of domestic companies. The provision has often been labelled as draconian and protectionist. This paper argues...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Jan 2012

    Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks

    The objective of this paper is to increase life time of homogeneous Wireless Sensor Networks (WSNs) through minimizing long range communication and energy balancing. Sensor nodes are resource constrained particularly with limited energy that is difficult o r impossible to replenish. LEACH (Low Energy Adaptive Clustering Hierarchy) is most well...

    Provided By Cornell University

  • White Papers // Jul 2009

    A New Approach to Services Differentiation Between Mobile Terminals of a Wireless LAN

    This paper aims to identify the advantages and disadvantages of several mechanisms for service differentiation in mobile terminals of a wireless LAN to establish a better and more efficient network. According to the analysis of available approaches for the quality of service of the IEEE 802.11 standard, this paper is...

    Provided By Cornell University

  • White Papers // Sep 2012

    ShadowDB: A Replicated Database on a Synthesized Consensus Core

    This paper describes ShadowDB, a replicated version of the BerkeleyDB database. ShadowDB is a primary-backup based replication protocol where failure handling, the critical part of the protocol, is taken care of by a synthesized consensus service that is correct by construction. The service has been proven correct semi-automatically by the...

    Provided By Cornell University

  • White Papers // Nov 2012

    Intrusion Detection on Smartphones

    Smartphone technology is more and more becoming the predominant communication tool for people across the world. People use their smartphones to keep their contact data, to browse the internet, to exchange messages, to keep notes, carry their personal files and documents, etc. Users while browsing are also capable of shopping...

    Provided By Cornell University

  • White Papers // Sep 2012

    The Curious Case of Non-Interactive Commitments

    It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existence of non-interactive commitments. Furthermore the construction is black-box (i.e., the underlying one-way function is used as an oracle to implement the commitment scheme, and an adversary attacking the commitment scheme is used as an oracle in...

    Provided By Cornell University

  • White Papers // Jul 2012

    The Half-Duplex AWGN Single-Relay Channel: Full Decoding or Partial Decoding?

    This paper compares the partial-decode-forward and the complete-decode-forward coding strategies for the half-duplex Gaussian single-relay channel. The authors analytically show that the rate achievable by partial-decode-forward outperforms that of the more straightforward complete-decode-forward by at most 12.5%. Furthermore, in the following asymptotic cases, the gap between the partial-decode-forward and the...

    Provided By Cornell University

  • White Papers // Dec 2012

    Demand Shaping to Achieve Steady Electricity Consumption With Load Balancing in a Smart Grid

    The purpose of this paper is to study conflicting objectives between the grid operator and consumers in a future smart grid. Traditionally, customers in electricity grids have different demand profiles and it is generally assumed that the grid has to match and satisfy the demand profiles of all its users....

    Provided By Cornell University

  • White Papers // Aug 2011

    Capacity of Strong and Very Strong Gaussian Interference Relay-Without-Delay Channels

    In this paper, the authors study the interference relay-without-delay channel which is an interference channel with a relay helping the communication. They assume the relay's transmit symbol depends not only on its past received symbols but also on its current received symbol, which is an appropriate model for studying amplify-and-forward...

    Provided By Cornell University

  • White Papers // Oct 2011

    Capacity of a Class of Multicast Tree Networks

    In this paper, the authors characterize the capacity of a new class of single-source multicast discrete memoryless relay networks having a tree topology in which the root node is the source and each parent node in the graph has at most one noisy child node and any number of noiseless...

    Provided By Cornell University

  • White Papers // Feb 2012

    Distributed Demand and Response Algorithm for Optimizing Social-Welfare in Smart Grid

    This paper presents a distributed Demand and Response algorithm for smart grid with the objective of optimizing social-welfare. Assuming the power demand range is known or predictable ahead of time, the authors' proposed distributed algorithm will calculate demand and response of all participating energy demanders and suppliers, as well as...

    Provided By Cornell University

  • White Papers // Oct 2011

    Robust Estimators for Variance-Based Device-Free Localization and Tracking

    Human motion in the vicinity of a wireless link causes variations in the link Received Signal Strength (RSS). Device-Free Localization (DFL) systems, such as Variance-based Radio Tomographic Imaging (VRTI), use these RSS variations in a static wireless network to detect, locate and track people in the area of the network,...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Cut-Set Bounds for Broadcast Networks

    A broadcast network is a classical network with all source messages collocated at a single source node. For broadcast networks, the standard cut-set bounds, which are known to be loose in general, are closely related to union as a specific set operation to combine the basic cuts of the network....

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Identification of Equivalences in Dynamic Graphs and Pedigree Structures

    The authors propose a new framework for designing test and query functions for complex structures that vary across a given parameter such as genetic marker position. The operations they are interested in include equality testing, set operations, isolating unique states, duplication counting, or finding equivalence classes under identifiability constraints. A...

    Provided By Cornell University

  • White Papers // Jul 2011

    A Novel Algorithm for Crypto Key Generation by Unification of Encoding Plus Image Pixel Shuffling and Chaotic Blended Blum Blum Shub Generator and Its Applicability in Image Based Cryptosystems

    The use of the data exchange in e-way along with the tremendous growth in ecommerce and m-commerce has created an intense demand for information security. Information security becomes very significant in data storage and transmission. However, widespread popularity of wireless data communication gadgets, integrated with the availability of higher bandwidths,...

    Provided By Cornell University

  • White Papers // Jul 2012

    A Review of Routing Protocols for Mobile Cognitive Radio Ad Hoc Networks

    Ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates. The...

    Provided By Cornell University

  • White Papers // Jun 2012

    Live Network Streaming With Utilities and Cost

    The growth in Internet traffic associated with video streaming and sharing of videos is so rapid that it may soon dwarf all other forms of Internet content. One reason for this is that only some forms of content can be cached (such as movies). Data generated in real time such...

    Provided By Cornell University

  • White Papers // Apr 2011

    Extracting Device Fingerprints From Flash Memory by Exploiting Physical Variations

    Many computing applications require the ability to uniquely identify a particular electronic device. Personalized services, digital rights management, and authentication schemes can all leverage per-device identifiers that are difficult (or impossible) to forge. At the same time, the growing economic importance and popularity of electronic devices has provided criminals with...

    Provided By Cornell University

  • White Papers // Feb 2010

    Wireless Congestion Control Protocol for Multihop Ad Hoc Networks

    The traditional TCP congestion control mechanism encounters a number of new problems and suffers a poor performance when the IEEE 802.11 MAC protocol is used in multihop ad hoc networks. Many of the problems result from medium contention at the MAC layer. In this paper, the authors first illustrate that...

    Provided By Cornell University

  • White Papers // Mar 2013

    An Overview of Wireless Local Area Networks

    Wireless communication is an application of science and technology that has come to be vital for modern existence. From the early radio and telephone to current devices such as mobile phones and laptops, accessing the global network has become the most essential and indispensable part of the authors' lifestyle. Wireless...

    Provided By Cornell University

  • White Papers // Mar 2013

    Schema Formalisms for Unordered XML

    The authors consider unordered XML, where the relative order among siblings is ignored, and propose two simple yet practical schema formalisms: Disjunctive Multiplicity Schemas (DMS), and its restriction, disjunction-free Multiplicity Schemas (MS). They investigate their computational properties and characterize the complexity of the following static analysis problems: schema satisfiability, membership...

    Provided By Cornell University

  • White Papers // Mar 2013

    Improving Network Efficiency by Removing Energy Holes in WSNs

    Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally,...

    Provided By Cornell University

  • White Papers // Mar 2013

    Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, the authors proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol,...

    Provided By Cornell University

  • White Papers // Mar 2013

    Link Scheduling for Multiple Multicast Sessions in Distributed Wireless Networks

    In this paper, the authors investigate link scheduling algorithms for throughput maximization in multicast wireless networks. According to their system model, each source node transmits to a multicast group that resides one hop away. They adopt the physical interference model to reflect the aggregate Signal to Interference and Noise Ratio...

    Provided By Cornell University

  • White Papers // Mar 2013

    CellTV - on the Benefit of TV Distribution Over Cellular Networks: A Case Study

    As mobile IP-access is becoming the dominant technology for providing wireless services, the demand for more spectrum for this type of access is increasing rapidly. Since IP-access can be used for all types of services, instead of a plethora of dedicated, single-service systems, there is a significant potential to make...

    Provided By Cornell University