Cornell University

Displaying 241-280 of 1114 results

  • White Papers // Dec 2012

    Underlay Cognitive Radios with Capacity Guarantees for Primary Users

    To use the spectrum efficiently, cognitive radios leverage knowledge of the Channel State Information (CSI) to optimize the performance of the Secondary Users (SUs) while limiting the interference to the Primary Users (PUs). The algorithms in this paper are designed to maximize the weighted ergodic sum-capacity of SUs, which transmit...

    Provided By Cornell University

  • White Papers // Dec 2012

    Compositional VerifiCation of Evolving Software Product Lines

    This paper presents a novel approach to the design verification of Software Product Lines (SPL). The proposed approach assumes that the requirements and designs are modeled as finite state machines with variability information. The variability information at the requirement and design levels are expressed differently and at different levels of...

    Provided By Cornell University

  • White Papers // Dec 2012

    Metric-Aware Secure Service Orchestration

    Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy...

    Provided By Cornell University

  • White Papers // Dec 2012

    Secure CDMA Sequences

    Mobile communications require flexible networks which can accommodate variable numbers of users under adverse propagation environments. Multiplexing by frequency or time division is inefficient and ineffective in guarding against multipath and mutual interference, noise and jamming. Code Division Multiple Access (CDMA), frequency hopping, Orthogonal Frequency Division Multiplexing (OFDM), and Ultra...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Metric for Software Vulnerabilities Classication

    A software bug is an error, flaw, mistake, failure, or fault in a computer program that prevents it from behaving as intended. Most bugs arise from mistakes and errors made by people in either a programs source code or its design. Vulnerability discovery and exploits detection are two wide areas...

    Provided By Cornell University

  • White Papers // Dec 2012

    Sensing as a Service and Big Data

    Internet of Things (IoT) will comprise billions of devices that can sense, communicate, compute and potentially actuate. Data streams coming from these devices will challenge the traditional approaches to data management and contribute to the emerging paradigm of big data. This paper discusses emerging Internet of Things (IoT) architecture, large...

    Provided By Cornell University

  • White Papers // Dec 2012

    Measures of Fault Tolerance in Distributed Simulated Annealing

    In this paper, the authors examine the different measures of Fault Tolerance in a Distributed Simulated Annealing process. Optimization by Simulated Annealing on a distributed system is prone to various sources of failure. They analyze simulated annealing algorithm, its architecture in distributed platform and potential sources of failures. They examine...

    Provided By Cornell University

  • White Papers // Dec 2012

    Proofs of Writing for Efficient and Robust Storage

    The authors present PoWerStore, the first efficient robust storage protocol that achieves optimal latency without using digital signatures. PoWerStore's robustness comprises tolerating asynchrony, maximum number of Byzantine storage servers, any number of Byzantine readers and crash-faulty writers, and guaranteeing wait-freedom and linearizability of read/write operations. Furthermore, PoWerStore's efficiency stems from...

    Provided By Cornell University

  • White Papers // Dec 2012

    Accelerating Inference: Towards a Full Language, Compiler and Hardware Stack

    To a large extent, probabilistic graphical models unify a great number of models from machine learning, statistical text processing, vision, bioinformatics, and many other fields concerned with the analysis and understanding of noisy, incomplete, or inconsistent data. Graphical models alleviate the complexity inherent to large dimensional statistical models (the so-called...

    Provided By Cornell University

  • White Papers // Dec 2012

    Feasibility Tests for Recurrent Real-Time Tasks in the Sporadic DAG Model

    A model has been proposed in for representing recurrent precedence-constrained tasks to be executed on multiprocessor platforms, where each recurrent task is modeled by a Directed Acyclic Graph (DAG), a period, and a relative deadline. Each vertex of the DAG represents a sequential job, while the edges of the DAG...

    Provided By Cornell University

  • White Papers // Dec 2012

    Controlled Conflict Resolution for Replicated Document

    Collaborative working is increasingly popular, but it presents challenges due to the need for high responsiveness and disconnected work support. To address these challenges the data is optimistically replicated at the edges of the network, i.e. personal computers or mobile devices. This replication requires a merge mechanism that preserves the...

    Provided By Cornell University

  • White Papers // Dec 2012

    Model-Order Reduction of Biochemical Reaction Networks

    In this paper, the authors propose a model-order reduction method for chemical reaction networks governed by general enzyme kinetics, including the mass-action and Michaelis-Menten kinetics. The model-order reduction method is based on the Kron reduction of the weighted Laplacian matrix which describes the graph structure of complexes in the chemical...

    Provided By Cornell University

  • White Papers // Dec 2012

    Automated Verification of Termination Certificates

    In order to increase user confidence, many automated theorem proverbs provide certificates that can be independently verified. In this paper, the authors report on their progress in developing a standalone tool for checking the correctness of certificates for the termination of term rewrite systems, and formally proving its correctness in...

    Provided By Cornell University

  • White Papers // Dec 2012

    Distributed MIMO Coding Scheme With Low Decoding Complexity for Future Mobile TV Broadcasting

    A novel distributed Space-Time Block Code (STBC) for the next generation mobile TV broadcasting is proposed. The new code provides efficient performance within a wide range of power imbalance showing strong adaptivity to the Single Frequency Network (SFN) broadcasting deployments. The new code outperforms existing STBCs with equivalent decoding complexity...

    Provided By Cornell University

  • White Papers // Dec 2012

    Amortized Communication Complexity of an Equality Predicate

    The authors explain the communication complexity of the direct sum of independent copies of the equality predicate. They prove that the probabilistic communication complexity of this problem is equal to O (N); computational complexity of the proposed protocol is polynomial in size of inputs. Their protocol improves the result achieved....

    Provided By Cornell University

  • White Papers // Dec 2012

    Robust Face Recognition Using Local Illumination Normalization and Discriminant Feature Point Selection

    Face recognition systems must be robust to the variation of various factors such as facial expression, illumination, head pose and aging. Especially, the robustness against illumination variation is one of the most important problems to be solved for the practical use of face recognition systems. Gabor wavelet is widely used...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Use Case Driven Approach for System Level Testing

    Use case scenarios are created during the analysis phase to specify software system's requirements and can also be used for creating system level test cases. Using use cases to get system tests has several benefits including test design at early stages of software development life cycle that reduces over all...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Approach to Secure Mobile Enterprise Architectures

    Due to increased security awareness of enterprises for mobile applications operating with sensitive or personal data as well as extended regulations form legislative (the principle of proportionality) various approaches, how to implement (extended) two-factor authentication, multi-factor authentication or virtual private network within enterprise mobile environments to ensure delivery of secure...

    Provided By Cornell University

  • White Papers // Dec 2012

    Soft Constraint Logic Programming for Electric Vehicle Travel Optimization

    Soft Constraint Logic Programming is a natural and flexible declarative programming formalism, which allows to model and solve real-life problems involving constraints of different types. In this paper, after providing a slightly more general and elegant presentation of the framework, the authors show how they can apply it to the...

    Provided By Cornell University

  • White Papers // Dec 2012

    SDMS-Based Disk Encryption Method

    The authors propose a disk encryption method, called Secure Disk Mixed System (SDMS) in this paper, for data protection of disk storages such as USB ash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitation problems of existing disk encryption methods and to control...

    Provided By Cornell University

  • White Papers // Dec 2012

    Demand Shaping to Achieve Steady Electricity Consumption With Load Balancing in a Smart Grid

    The purpose of this paper is to study conflicting objectives between the grid operator and consumers in a future smart grid. Traditionally, customers in electricity grids have different demand profiles and it is generally assumed that the grid has to match and satisfy the demand profiles of all its users....

    Provided By Cornell University

  • White Papers // Dec 2012

    Electricity Cost Minimization for a Residential Smart Grid with Distributed Generation and Bidirectional Power Transactions

    In this paper, the authors consider the electricity cost minimization problem in a residential network where each community is equipped with a distributed power generation source and every household in the community has a set of essential and shiftable power demands. They allow bi-directional power transactions and assume a two-tier...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Note on Quantum McEliece Public-Key Cryptosystem

    The security of McEliece Public-Key Cryptosystem (PKC) relies on the difficulty of decoding general linear codes, an NP-complete problem. McEliece PKC has been analyzed for more than thirty years, and is still regarded as a secure one. It is generally accepted that quantum computer cannot solve NP-complete problems in polynomial...

    Provided By Cornell University

  • White Papers // Dec 2012

    Non-Hierarchical Clock Synchronization for Wireless Sensor Networks

    Time synchronization is important for a variety of applications in wireless sensor networks including scheduling communication resources, coordinating sensor wake/sleep cycles, and aligning signals for distributed transmission/reception. This paper describes a non-hierarchical approach to time synchronization in wireless sensor networks that has low overhead and can be implemented at the...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Ontology-Based Approach to Relax Traffic Regulation for Autonomous Vehicle Assistance

    Traffic regulation must be respected by all vehicles, either human- or computer-driven. However, extreme traffic situations might exhibit practical cases in which a vehicle should safely and reasonably relax traffic regulation, e.g., in order not to be indefinitely blocked and to keep circulating. In this paper, the authors propose a...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Potential Game for Power and Frequency Allocation in Large-Scale Wireless Networks

    In this paper, the authors analyze power and frequency allocation in wireless networks through potential games. Potential games are used frequently in the literature for this purpose due to their desirable properties, such as convergence and stability. However, potential games usually assume massive message passing to obtain the necessary neighbor...

    Provided By Cornell University

  • White Papers // Dec 2012

    Semi Symmetric Method of San Storage Virtualization

    Virtualization is one of the biggest buzzwords of the technology industry right at this moment. The fast growth in storage capacity and processing power in enterprise installations coupled with the need for high availability, requires Storage Area Network (SAN) architecture to provide seamless addition of storage and performance elements without...

    Provided By Cornell University

  • White Papers // Dec 2012

    How Many Software Engineering Professionals Hold This Certificate?

    Estimates of quantity of the certificates issued during 10 years of existence of the professional's certification program in the area of software engineering implemented by one of the leading professional associations are presented. The estimates have been obtained by way of processing certificate records openly accessible at the certification program...

    Provided By Cornell University

  • White Papers // Dec 2012

    Private Cloud Initiatives Using Bioinformatics Resources and Applications Facility (BRAF)

    The bioinformatics research community has a demand of enormous compute resources to run bioinformatics tools. Next generation sequencing technologies have further increased the overall demand for computational analysis. The traditional Cluster and Grid computing are having their own complexities to program and use while there is a silver-line in cloud...

    Provided By Cornell University

  • White Papers // Dec 2012

    Cloud Algebra for Handling Unstructured Data in Cloud Database Management System

    The handling of unstructured data in database management system is very difficult. The managing unstructured data like image, video textual data etc. are not easy task in database system. In this work a concept of cloud algebra introduced to handle unstructured data in CDBMS. The most popular concept, relational algebra...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Ontology-Based System for Cloud Infrastructure Services' Discovery

    The Cloud infrastructure services landscape advances steadily leaving users in the agony of choice. As a result, Cloud service identification and discovery remains a hard problem due to different service descriptions, non-standardised naming conventions and heterogeneous types and features of Cloud services. In this paper, the authors present an OWL-based...

    Provided By Cornell University

  • White Papers // Dec 2012

    A Data Warehouse Design for a Typical University Information System

    Presently, large enterprises rely on database systems to manage their data and information. These databases are useful for conducting daily business transactions. However, the tight competition in the marketplace has led to the concept of data mining in which data are analyzed to derive effective business strategies and discover better...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Image Steganography Scheme Using Randomized Algorithm and Context-Free Grammar

    Currently, cryptography is in wide use as it is being exploited in various domains from data confidentiality to data integrity and message authentication. Basically, cryptography shuffles data so that they become unreadable by unauthorized parties. However, clearly visible encrypted messages, no matter how unbreakable, will arouse suspicions. A better approach...

    Provided By Cornell University

  • White Papers // Nov 2012

    Intrusion Detection on Smartphones

    Smartphone technology is more and more becoming the predominant communication tool for people across the world. People use their smartphones to keep their contact data, to browse the internet, to exchange messages, to keep notes, carry their personal files and documents, etc. Users while browsing are also capable of shopping...

    Provided By Cornell University

  • White Papers // Nov 2012

    An Equivalence between Network Coding and Index Coding

    The authors show that the network coding and index coding problems are equivalent. This equivalence holds in the general setting which includes linear and non-linear codes. Specifically, they present an efficient reduction that maps a network coding instance to an index coding one while preserving feasibility. Previous connections were restricted...

    Provided By Cornell University

  • White Papers // Nov 2012

    Optimal Achievable Rates for Interference Networks with Random Codes

    The optimal rate region for interference networks is characterized when encoding is restricted to random code ensembles with superposition coding and time sharing. A simple simultaneous non-unique decoding rule, under which each receiver decodes for the intended message as well as the interfering messages, is shown to achieve this optimal...

    Provided By Cornell University

  • White Papers // Nov 2012

    Reconfigurable Antennas, Preemptive Switching and Virtual Channel Management

    This paper considers the performance of wireless communication systems that utilize reconfigurable or pattern dynamic antennas. The focus is on finite-state channels with memory and performance is assessed in terms of real-time behavior. In a wireless setting, when a slow fading channel enters a deep fade, the corresponding communication system...

    Provided By Cornell University

  • White Papers // Nov 2012

    WiSANCloud: A Set of UML-Based Specifications for the Integration of Wireless Sensor and Actor Networks (WSANs) With the Cloud Computing

    Giving the current trend to combine the advantages of Wireless Sensor and Actor Networks (WSANs) with the Cloud Computing technology, this work proposes a set of specifications, based on the Unified Modeling Language - UML, in order to provide the general framework for the design of the integration of said...

    Provided By Cornell University

  • White Papers // Nov 2012

    Cost Efficient High Capacity Indoor Wireless Access: Denser Wi-Fi or Coordinated Pico-cellular?

    Rapidly increasing traffic demand has forced indoor operators to deploy more and more Wi-Fi Access Points (APs). As AP density increases, inter-AP interference rises and may limit the capacity. Alternatively, cellular technologies using centralized interference coordination can provide the same capacity with the fewer number of APs at the price...

    Provided By Cornell University

  • White Papers // Nov 2012

    Network Coding Meets Multimedia: a Review

    While every network node only relays messages in a traditional communication system, the recent Network Coding (NC) paradigm proposes to implement simple in-network processing with packet combinations in the nodes. NC extends the concept of "Encoding" a message beyond source coding (for compression) and channel coding (for protection against errors...

    Provided By Cornell University

  • White Papers // Nov 2008

    Nozzle: A Defense Against Heap-Spraying Code Injection Attacks

    Heap spraying is a new security attack that significantly increases the exploitability of existing memory corruption errors in type-unsafe applications. With heap spraying, attackers leverage their ability to allocate arbitrary objects in the heap of a type-safe language, such as JavaScript, literally filling the heap with objects that contain dangerous...

    Provided By Cornell University

  • White Papers // Apr 2009

    Towards a Cloud Computing Research Agenda

    The 2008 LADIS workshop on Large Scale Distributed Systems brought together leaders from the commercial cloud computing community with researchers working on a variety of topics in distributed computing. The dialog yielded some surprises: some hot research topics seem to be of limited near-term importance to the cloud builders, while...

    Provided By Cornell University

  • White Papers // Apr 2009

    Building Collaboration Applications That Mix Web Services Hosted Content With P2P Protocols

    The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. This paper makes the case for Service-Oriented Collaboration applications that combine service-hosted data with collaboration features implemented using peer-to-peer protocols. Collaboration features are awkward to support solely based on...

    Provided By Cornell University

  • White Papers // Jan 2010

    Quality-of-Service Specific Information Retrieval for Densely Deployed Sensor Networks

    A new MAC protocol is proposed for the reachback operation in large scale, densely deployed sensor networks. Referred to as Quality-of-service specific Information REtrieval (QUIRE), the proposed protocol aims to assure QoS requirement with a minimum amount of transmissions from sensors. By enabling only one sensor in a neighborhood to...

    Provided By Cornell University

  • White Papers // Jun 2010

    Resume Writing: Preparation- Elements Of A Resume

    Writing an effective resume will require preparation. Spend time conducting a self-inventory of your experiences, activities, and skills. Review your educational, extracurricular, employment, and volunteer experiences. Think about course work, honors and awards, and any technical skills you have developed. Begin by brainstorming about these experiences and writing everything down....

    Provided By Cornell University

  • White Papers // Jun 2010

    Maximizing the Spread of Cascades Using Network Design

    This paper introduces a new optimization framework to maximize the expected spread of cascades in networks. The model allows a rich set of actions that directly manipulate cascade dynamics by adding nodes or edges to the network. The motivating application is one in spatial conservation planning, where a cascade models...

    Provided By Cornell University

  • White Papers // Mar 2009

    Intermediaries In Negotiations If Complex Contracts: The Role Of Attorneys In Venture Capital Transactions

    Author shows that intermediaries can affect the design of financial contracts by reducing asymmetry in contracting parties' knowledge about complicated and interrelated contract contingencies. Across 908 contracts used in venture capital (VC) transactions, entrepreneurs counseled by attorneys with high VC expertise sign contracts with fewer investor-friendly cash flow contingencies, particularly...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fast Firewall Implementations for Software-Based Routers

    Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls. The classification can be based on an arbitrary number of prefix arid range fields in the packet header. The classification required for firewalls is beyond the capabilities offered by standard Operating System classifiers such as...

    Provided By Cornell University

  • White Papers // May 2010

    Global Teams: Trends, Challenges And Solutions

    Evolving technologies allow organizations to become increasingly global. This trend has led organizations to adopt virtual communication to face global challenges. This paper explores the debate between face-to-face and virtual communication and identifies the costs and benefits associated with each, in addition to identifying strategies for effectively utilizing virtual communication....

    Provided By Cornell University

  • White Papers // Nov 2010

    Are Franchises Bad Employers?

    Franchise jobs are often viewed as epitomizing a "Low-road" employee-management approach characterized by high turnover and several practices that are deemed unsophisticated, such as low investment in training, deskilling of work, and little encouragement of employee involvement. Research on franchise operations suggests, however, that the basic operating principles and practices...

    Provided By Cornell University

  • White Papers // Dec 2008

    Video Games Can Waste Children's Time

    Video games can be found in all shapes and sizes, from hand-held models to CD-ROM programs with sophisticated imagery and sound. Kids, even those who have a hard time paying attention in school, can spend hours in front of a computer monitor or television screen playing these games. Some video...

    Provided By Cornell University

  • White Papers // Nov 2010

    Does Public Transit Use Enhance The Economic Efficiency Of Urban Areas?

    A variety of arguments are made in favor of public investments in mass transit. Some relate to its environmental advantages over auto use, and these have some scientific evidence supporting them. Other arguments relate to the benefits of mass transit in making urban economies more efficient by enhancing employer access...

    Provided By Cornell University

  • White Papers // Apr 2009

    National Security Review Of Foreign Mergers And Acquisitions Of Domestic Companies In China And The United States

    China's recently enacted Anti-Monopoly Law has received much academic attention. In particular, many articles and comments have been written about the Anti-Monopoly Law, a provision on national security review of foreign mergers and acquisitions of domestic companies. The provision has often been labelled as draconian and protectionist. This paper argues...

    Provided By Cornell University

  • White Papers // Oct 2008

    Why Firms Smooth Dividends: Empirical Evidence

    While dividend smoothing is taken as an article of faith, little is known about the cross-sectional properties of smoothing policies. Why do some firms smooth more than others? The authors examine firms' dividend smoothing behavior across a wide spectrum of publicly traded firms in the U.S. The authors find that...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Mar 2012

    The Distributed Network Processor: A Novel Off-Chip and On-Chip Interconnection Network Architecture

    One of the most demanding challenges for the designers of parallel computing architectures is to deliver an efficient network infrastructure providing low latency, high bandwidth communications while preserving scalability. Besides off-chip communications between processors, recent multi-tile (i.e. multi-core) architectures face the challenge for an efficient on-chip interconnection network between processor's...

    Provided By Cornell University

  • White Papers // Nov 2011

    Design and Simulation of an 8-Bit Dedicated Processor for Calculating the Sine and Cosine of an Angle Using the CORDIC Algorithm

    In this paper, the authors describe the design and simulation of an 8-bit dedicated processor for calculating the Sine and Cosine of an Angle using CORDIC Algorithm (COordinate Rotation DIgital Computer), a simple and efficient algorithm to calculate hyperbolic and trigonometric functions. They have proposed a dedicated processor system, modeled...

    Provided By Cornell University

  • White Papers // Oct 2011

    Cameleon language Part 1 : Processor

    Emergence is the way complex systems arise out of a multiplicity of relatively simple interactions between primitives. An example of emergence is the Lego game where the primitives are plastic bricks and their interaction is the interlocking. Since programming problems become more and more complexes and transverses, their vision is...

    Provided By Cornell University

  • White Papers // Feb 2010

    Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor

    Strength of RSA lies in integer factorization problem. That is when the authors are given a number n; they have to find its prime factors. It becomes quite complicated when dealing with large numbers. RSA (Rivest, Shamir and Adleman) is being used as a public key exchange and key agreement...

    Provided By Cornell University

  • White Papers // Jul 2011

    Speed Scaling on Parallel Processors with Migration

    The authors study the problem of scheduling a set of jobs with release dates, deadlines and processing requirements (or works), on parallel speed-scaled processors so as to minimize the total energy consumption. They consider that both preemption and migration of jobs are allowed. An exact polynomial-time algorithm has been proposed...

    Provided By Cornell University

  • White Papers // May 2011

    A Simple Multi-Processor Computer Based on Subleqa

    Subleq (Subtract and Branch on result less than or equal to zero) is both an instruction set and a programming language for One Instruction Set Computer (OISC). The authors describe a hardware implementation of an array of 28 one-instruction Subleq processors on a low-cost FPGA board. Their test results demonstrate...

    Provided By Cornell University

  • White Papers // Jul 2010

    Solving k-Nearest Neighbor Problem on Multiple Graphics Processors

    A recommendation system is a software system to predict customers' unknown preferences from known preferences. In a recommendation system, customers' preferences are encoded into vectors, and finding the nearest vectors to each vector is an essential part. This vector-searching part of the problem is called a k-nearest neighbor problem. The...

    Provided By Cornell University

  • White Papers // Aug 2010

    Associative Control Processor With a Rigid Structure

    An important place among various real-world problems is occupied by problems of developing logical-linguistic control models for complex technical systems; i.e. in the case study of applying logical-linguistic control model for vehicle crashworthiness modeling the approach of applying associative processor for decision making problem was proposed. It focuses on hardware...

    Provided By Cornell University

  • White Papers // Feb 2014

    Application of Selective Algorithm for Effective Resource Provisioning in Cloud Computing Environment

    Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloud computing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to...

    Provided By Cornell University

  • White Papers // Feb 2014

    Concept of Feedback in Future Computing Models to Cloud Systems

    Currently, it is urgent to ensure QoS in distributed computing systems. This became especially important to the development and spread of cloud services. Big data structures become heavily distributed. Necessary to consider the communication channels and data transmission systems and virtualization and scalability in future design of computational models in...

    Provided By Cornell University

  • White Papers // Sep 2013

    Knowledge-Based Expressive Technologies Within Cloud Computing Environments

    In this paper, the authors describe the development of comprehensive approach for knowledge processing within e-Sceince tasks. Considering the task solving within a simulation-driven approach a set of knowledge-based procedures for task definition and composite application processing can be identified. This procedure could be supported by the use of domain-specific...

    Provided By Cornell University

  • White Papers // Oct 2013

    Load Balancing Using Ant Colony in Cloud Computing

    Ants are very small insects. They are capable to find food even they are complete blind. The ants live in their nest and their job is to search food while they get hungry. The authors are not interested in their living style, such as how they live, how they sleep....

    Provided By Cornell University

  • White Papers // Oct 2013

    EPOBF: Energy Efficient Allocation of Virtual Machines in High Performance Computing Cloud

    Cloud computing has become more popular in provision of computing resources under Virtual Machine (VM) abstraction for High Performance Computing (HPC) users to run their applications. A HPC cloud is such cloud computing environment. One of challenges of energy-efficient resource allocation for VMs in HPC cloud is trade-off between minimizing...

    Provided By Cornell University

  • White Papers // Dec 2013

    Cache-Aware Static Scheduling for Hard Real-Time Multicore Systems Based on Communication Affinities

    The growing need for continuous processing capabilities has led to the development of multicore systems with a complex cache hierarchy. Such multicore systems are generally designed for improving the performance in average case, while hard real-time systems must consider worst-case scenarios. An open challenge is therefore to efficiently schedule hard...

    Provided By Cornell University

  • White Papers // Apr 2014

    Hardware Efficient WiMAX Deinterleaver Capable of Address Generation for Random Interleaving Depths

    The variation in the prescribed modulation schemes and code rates for WiMAX interleaver design, as defined by IEEE 802.16 standard, demands a plethora of hardware if all the modulation schemes and code rates have to be unified into a single electronic device. Add to this the complexities involved with the...

    Provided By Cornell University

  • White Papers // Mar 2014

    Tile Optimization for Area in FPGA Based Hardware Acceleration of Peptide Identification

    Advances in life sciences over the last few decades have lead to the generation of a huge amount of biological data. Computing research has become a vital part in driving biological discovery where analysis and categorization of biological data are involved. String matching algorithms can be applied for protein/gene sequence...

    Provided By Cornell University

  • White Papers // Oct 2012

    A Flexible Design for Optimization of Hardware Architecture in Distributed Arithmetic based FIR Filters

    FIR filters are used in many performance/power critical applications such as mobile communication devices, analogue to digital converters and digital signal processing applications. Design of appropriate FIR filters usually causes the order of filter to be increased. Synthesis and tape-out of high-order FIR filters with reasonable delay, area and power...

    Provided By Cornell University

  • White Papers // Jan 2014

    Hardware Implementation of Four Byte Per Clock RC4 Algorithm

    In the field of cryptography till date the 2-byte in 1-clock is the best known RC4 hardware design, while 1-byte in 1-clock and the 1-byte in 3 clocks are the best known implementation. The design algorithm in considers two consecutive bytes together and processes them in 2 clocks. The design...

    Provided By Cornell University

  • White Papers // May 2014

    Massively Parallel Processor Architectures for Resource-Aware Computing

    The authors present a class of massively parallel processor architectures called invasive Tightly Coupled Processor Arrays (TCPAs). The presented processor class is a highly parameterizable template, which can be tailored before runtime to fulfill costumers' requirements such as performance, area cost, and energy efficiency. These programmable accelerators are well suited...

    Provided By Cornell University

  • White Papers // May 2014

    Anytime Control Using Input Sequences With Markovian Processor Availability

    The authors study an anytime control algorithm for situations where the processing resources available for control are time-varying in an a priori unknown fashion. Thus, at times, processing resources are insufficient to calculate control inputs. To address this issue, the algorithm calculates sequences of tentative future control inputs whenever possible,...

    Provided By Cornell University

  • White Papers // Apr 2014

    A Signal Processor for Gaussian Message Passing

    In this paper, the authors present a novel signal processing unit built upon the theory of factor graphs, which is able to address a wide range of signal processing algorithms. More specifically, the demonstrated Factor Graph Processor (FGP) is tailored to Gaussian message passing algorithms. They show how to use...

    Provided By Cornell University

  • White Papers // Jan 2014

    A Hierarchically Blocked Jacobi SVD Algorithm for Single and Multiple Graphics Processing Units

    The authors present a hierarchically blocked one-sided Jacobi algorithm for the Singular Value Decomposition (SVD), targeting both single and multiple Graphics Processing Units (GPUs). The blocking structure reflects the levels of GPU's memory hierarchy. The algorithm may outperform MAGMA's dgesvd, while retaining high relative accuracy. To this end, they developed...

    Provided By Cornell University

  • White Papers // Feb 2014

    Two Stage Prediction Process with Gradient Descent Methods Aligning with the Data Privacy Preservation

    Privacy preservation emphasize on authorization of data, which signifies that data should be accessed only by authorized users. Ensuring the privacy of data is considered as one of the challenging task in data management. The generalization of data with varying concept hierarchies seems to be interesting solution. This paper proposes...

    Provided By Cornell University

  • White Papers // Apr 2014

    A New Multi-Tiered Solid State Disk Using SLC/MLC Combined Flash Memory

    Storing digital information, ensuring the accuracy, steady and uninterrupted access to the data is considered as fundamental challenges in enterprise-class organizations and companies. In recent years, new types of storage systems such as Solid State Disks (SSD) have been introduced. Unlike hard disks that have mechanical structure, SSDs are based...

    Provided By Cornell University

  • White Papers // Mar 2014

    Increasing Flash Memory Lifetime by Dynamic Voltage Allocation for Constant Mutual Information

    The read channel in Flash memory systems degrades over time because the Fowler-Nordheim tunneling used to apply charge to the floating gate eventually compromises the integrity of the cell because of tunnel oxide degradation. While degradation is commonly measured in the number of program/erase cycles experienced by a cell, the...

    Provided By Cornell University