Cornell University

Displaying 241-280 of 1243 results

  • White Papers // Sep 2013

    Knowledge-Based Expressive Technologies Within Cloud Computing Environments

    In this paper, the authors describe the development of comprehensive approach for knowledge processing within e-Sceince tasks. Considering the task solving within a simulation-driven approach a set of knowledge-based procedures for task definition and composite application processing can be identified. This procedure could be supported by the use of domain-specific...

    Provided By Cornell University

  • White Papers // Sep 2013

    Unmixing Incoherent Structures of Big Data by Randomized or Greedy Decomposition

    Learning big data by matrix decomposition always suffers from expensive computation, mixing of complicated structures and noise. In this paper, the authors study more adaptive models and efficient algorithms that decompose a data matrix as the sum of semantic components with incoherent structures. They firstly introduce \"GO Decomposition (GoDec)\", an...

    Provided By Cornell University

  • White Papers // Aug 2013

    Security Issues on Cloud Computing

    The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure. In order for this to become reality, however, there are still some challenges to be...

    Provided By Cornell University

  • White Papers // Aug 2013

    On Optimal and Fair Service Allocation in Mobile Cloud Computing

    In this paper the authors study the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. They exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Timing Analysis of SSL/TLS Man in the Middle Attacks

    The authors' experiment revealed that SSL MiTM attacks have timing patterns that could be identified by observing victims. More specifically, the attack tools they analyzed shifted most of the delay to the time between when an SSL handshake was started and when the certificate was received. Additionally, most of the...

    Provided By Cornell University

  • White Papers // Aug 2013

    Distributed Object Store Principles of Operation The Case for Intelligent Storage

    In this paper, the authors look at the growth of Distributed Object Stores (DOS) and examine the underlying mechanisms that guide their use and development. Their focus is on the fundamental principles of operation that define this class of system, how it has evolved, and where it is heading as...

    Provided By Cornell University

  • White Papers // Aug 2013

    Hardware-based Security for Virtual Trusted Platform Modules

    Virtual Trusted Platform Modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments. However, virtualizing TPMs, especially virtualizing the Platform Configuration Registers (PCRs), strikes...

    Provided By Cornell University

  • White Papers // Aug 2013

    Efficient Inner-product Algorithm for Stabilizer States

    Large-scale quantum computation is likely to require massive Quantum Error Correction (QEC). QEC codes and circuits are described via the stabilizer formalism, which represents stabilizer states by keeping track of the operators that preserve them. Such states are obtained by stabilizer circuits (consisting of CNOT, Hadamard and Phase only) and...

    Provided By Cornell University

  • White Papers // Aug 2013

    Intensional view of General Single Processor Operating Systems

    Operating systems are currently viewed ostensively. As a result they mean different things to different people. The ostensive character makes it is hard to understand OSes formally. An intensional view can enable better formal work, and also offer constructive support for some important problems, e.g. OS architecture. This paper argues...

    Provided By Cornell University

  • White Papers // Aug 2013

    Secure Authentication of Cloud Data Mining API

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multifold benefits to the users moving to a cloud, while posing unknown security and privacy...

    Provided By Cornell University

  • White Papers // Aug 2013

    Apple IOS Devices for Network Administrators

    As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform...

    Provided By Cornell University

  • White Papers // Aug 2013

    TCP-Aware Backpressure Routing and Scheduling

    In this paper, the authors explore the performance of backpressure routing and scheduling for TCP flows over wireless networks. TCP and backpressure are not compatible due to a mismatch between the congestion control mechanism of TCP and the queue size based routing and scheduling of the backpressure framework. They propose...

    Provided By Cornell University

  • White Papers // Aug 2013

    Low Power-Area Designs of 1Bit Full Adder in Cadence Virtuoso Platform

    Power consumption has emerged as a primary design constraint for Integrated Circuits (ICs). In the nano meter technology regime, leakage power has become a major component of total power. Full adder is the basic functional unit of an ALU. The power consumption of a processor is lowered by lowering the...

    Provided By Cornell University

  • White Papers // Jul 2013

    Non-Homogeneous Two-Rack Model for Distributed Storage Systems

    In the traditional two-rack Distributed Storage System (DSS) model, due to the assumption that the storage capacity of each node is the same, the Minimum Bandwidth Regenerating (MBR) point becomes infeasible. In this paper, the authors design a new non-homogeneous two-rack model by proposing a generalization of the threshold function...

    Provided By Cornell University

  • White Papers // Jul 2013

    The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems

    In the past decades, in order to store big data and provide services, more and more organizations around the world build data centers with scales varying from several nodes to hundreds of thousands of nodes. The people live in an era of big data, and big data applications are becoming...

    Provided By Cornell University

  • White Papers // Jul 2013

    TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure Codes

    The authors' paper presents solutions using erasure coding, parallel connections to storage cloud and limited chunking (i.e., dividing the object into a few smaller segments) together to significantly improve the delay performance of uploading and downloading data in and out of cloud storage. TOFEC is a strategy that helps front-end...

    Provided By Cornell University

  • White Papers // Jul 2013

    Energy Storage System Design for a Power Buffer System to Provide Load Ride-through

    The design of a power buffer to mitigate the negative impact of constant power loads on voltage stability as well as enhancing ride-through capability for the loads during upstream voltage disturbances is examined. The power buffer adjusts its front-end converter control so that the buffer-load combination would appear as a...

    Provided By Cornell University

  • White Papers // Jul 2013

    An Efficient Multiplication Algorithm Using Nikhilam Method

    In this paper, the authors have explored the possibility of applying the Nikhilam sutra of Vedic mathematics to binary number multiplication. They can take advantage of the fact that this sutra can convert large-digit multiplication to corresponding small digit multiplication. Nikhilam method is particularly efficient when both multiplicand and multiplier...

    Provided By Cornell University

  • White Papers // Jul 2013

    IDS in Telecommunication Network Using PCA

    Data Security has become a very serious part of any organizational information system. Internet threats have become more intelligent so it can deceive the basic security solutions such as firewalls and antivirus scanners. To enhance the overall security of the network an additional security layer such as Intrusion Detection System...

    Provided By Cornell University

  • White Papers // Jul 2013

    BigDataBench: a Big Data Benchmark Suite from Web Search Engines

    In this paper, the authors present joint research efforts on big data benchmarking with several industrial partners. Considering the complexity, diversity, workload churns, and rapid evolution of big data systems, they take an incremental approach in big data benchmarking. For the first step, they pay attention to search engines, which...

    Provided By Cornell University

  • White Papers // Jun 2013

    Towards a Better Insight of RDF Triples Ontology-Guided Storage System Abilities

    The vision of the semantic web is becoming a reality with billions of RDF triples being distributed over multiple queryable end-points (e.g. linked data). Although there has been a body of work on RDF triples persistent storage, it seems that, considering reasoning de-pendent queries, the problem of providing an efficient,...

    Provided By Cornell University

  • White Papers // Jun 2013

    Communication Steps for Parallel Query Processing

    The authors consider the problem of computing a relational query q on a large input database of size n, using a large number p of servers. They establish both lower and upper bounds, in two settings. For a single round of communication, they give lower bounds in the strongest possible...

    Provided By Cornell University

  • White Papers // Jun 2013

    A Grammatical Inference Approach to Language-Based Anomaly Detection in XML

    False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, the authors discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view. They argue that many XML-based attacks target the syntactic level, i.e. the tree structure or element content, and syntax validation of XML...

    Provided By Cornell University

  • White Papers // Jun 2013

    Creating a Relational Distributed Object Store

    In and of itself, data storage has apparent business utility. But when the authors can convert data to information, the utility of stored data increases dramatically. It is the layering of relation atop the data mass that is the engine for such conversion. Frank relation amongst discrete objects sporadically ingested...

    Provided By Cornell University

  • White Papers // Jun 2013

    Partial Spreads in Random Network Coding

    Following the approach by R. K?tter and F. R. Kschischang, the authors explain network codes as families of k-dimensional linear subspaces of a vector space Fnq, q being a prime power and Fq the finite field with q elements. In particular, following an idea in finite projective geometry, they introduce...

    Provided By Cornell University

  • White Papers // Jun 2013

    Cryptocat: Adopting Accessibility and Ease of Use as Security Properties

    Cryptocat is a Free and Open Source Software (FL/OSS) browser extension that makes use of web technologies in order to provide easy to use, accessible, encrypted instant messaging to the general public. The authors aim to investigate how to best leverage the accessibility and portability offered by web technologies in...

    Provided By Cornell University

  • White Papers // Jun 2013

    High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context

    Energy minimization of Ising spin-glasses has played a central role in statistical and solid-state physics, facilitating studies of phase transitions and magnetism. Recent proposals suggest using Ising spin-glasses for non-traditional computing as a way to harness the nature's ability to find min-energy configurations, and to take advantage of quantum tunneling...

    Provided By Cornell University

  • White Papers // Jun 2013

    Toward a Unified Performance and Power Consumption NAND Flash Memory Model of Embedded and Solid State Secondary Storage Systems

    In this paper, the authors present a set of models dedicated to describe a flash storage subsystem structure, functions, performance and power consumption behaviors. These models cover a large range of today's NAND flash memory applications. They are designed to be implemented in simulation tools allowing to estimate and compare...

    Provided By Cornell University

  • White Papers // Jun 2013

    Equivalence and Comparison of Heterogeneous Cellular Networks

    The authors consider a general heterogeneous network in which, besides general propagation effects (shadowing and/or fading), individual base stations can have different emitting powers and be subject to different parameters of Hata-like pathloss models (path-loss exponent and constant) due to, for example, varying antenna heights. They assume also that the...

    Provided By Cornell University

  • White Papers // Jun 2013

    Towards a Simple Relationship to Estimate the Capacity of Static and Mobile Wireless Networks

    Extensive research has been done on studying the capacity of wireless multi-hop networks. These efforts have led to many sophisticated and customized analytical studies on the capacity of particular networks. While most of the analyses are intellectually challenging, they lack universal properties that can be extended to study the capacity...

    Provided By Cornell University

  • White Papers // Jun 2013

    Exploring Indonesian Web Based Career Center

    Utilization of the Internet in higher education focus on the learning process or the provision of academic information for students. The subject of this paper is in the form of web-based management alumnus career center with specific sub domain. Colleges that already have a career center only 34 of the...

    Provided By Cornell University

  • White Papers // Jun 2013

    CSMA Using Statistical Physics Toward Throughput and Utility Optimal CSMA

    In the recent past years, CSMA (Carrier Sense Multiple Access), which resolves contentions over wireless networks in a fully distributed fashion, has gained a lot of attentions since it has been proved in several papers that appropriate control of CSMA parameters provably guarantees optimality in terms of throughput and fairness....

    Provided By Cornell University

  • White Papers // Jun 2013

    Hybrid Coding: An Interface for Joint Source - Channel Coding and Network Communication

    A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled. However, unlike the separation...

    Provided By Cornell University

  • White Papers // Jun 2013

    Cell-Level Modeling of IEEE 802.11 WLANs

    The authors develop a scalable cell-level analytical model for multi-cell infrastructure IEEE 802.11 WLANs under a so-called Pairwise Binary Dependence (PBD) condition. The PBD condition is a geometric property under which the relative locations of the nodes inside a cell do not matter and the network is free of hidden...

    Provided By Cornell University

  • White Papers // Jun 2013

    A Novel Defence Scheme Against Selfish Node Attack in MANET

    Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one...

    Provided By Cornell University

  • White Papers // Jun 2013

    CMOS Low Power Cell Library for Digital Design

    In the earlier period, the chief concern of the VLSI designer was area, performance, cost and reliability; power considerations were mostly of only secondary significance. The benefit of utilizing an arrangement of low-power components in conjunction with low-power design techniques is more important now than ever before. Historically, VLSI designers...

    Provided By Cornell University

  • White Papers // Jun 2013

    Power Efficient Carry Propagate Adder

    In this paper, the authors describe the design details and performance of proposed Carry Propagate Adder based on GDI technique. GDI technique is power efficient technique for designing digital circuit that consumes less power as compare to most commonly used CMOS technique. GDI also has an advantage of minimum propagation...

    Provided By Cornell University

  • White Papers // May 2013

    ASURA: Scalable and Uniform Data Distribution Algorithm for Storage Clusters

    Large-scale storage cluster systems need to manage a vast amount of information denoting combinations of data IDentifiers (IDs) and corresponding nodes that store the data. Management using data distribution algorithms, rather than management using tables, has been proposed in recent research. In algorithm management, data are distributed in accordance with...

    Provided By Cornell University

  • White Papers // May 2013

    Building Internal Cloud at NIC : A Preview

    The most of computing environments in the IT support organization like NIC are designed to run in centralized data centre. The centralized infrastructure of various development projects are used to deploy their services on it and connecting remotely to that data centre from all the stations of organization. Currently these...

    Provided By Cornell University

  • White Papers // May 2013

    Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution

    Reconciliation is an important step to correct errors in Quantum Key Distribution (QKD). In QKD, after comparing basis, two legitimate parties possess two correlative keys which have some differences and they could obtain identical keys through reconciliation. In this paper, the authors present a new rate compatible reconciliation scheme based...

    Provided By Cornell University

  • White Papers // Dec 2010

    American Step-Up And Step-Down Credit Default Swaps Under Levy Models

    This paper studies the valuation of a class of Credit Default Swaps (CDSs) with the embedded option to switch to a different premium and notional principal any time prior to a credit event. These are early exercisable contracts that give the protection buyer or seller the right to step-up, step-down,...

    Provided By Cornell University

  • White Papers // Dec 2010

    Insider Trading In The Market With Rational Expected Price

    Kyle (1985) builds a pioneering and influential model, in which an insider with long-lived private information submits an optimal order in each period given the market maker's pricing rule. An inconsistency exists to some extent in the sense that the "Constant pricing rule " actually assumes an adaptive expected price...

    Provided By Cornell University

  • White Papers // Dec 2010

    Financial Markets With Volatility Uncertainty

    The authors investigate financial markets under model risk caused by uncertain volatilities. For this purpose they consider a financial market that features volatility uncertainty. To have a mathematical consistent framework they use the notion of G - expectation and its corresponding G - Brownian motion recently introduced by Peng (2007)....

    Provided By Cornell University

  • White Papers // Oct 2010

    The Dual Optimizer For The Growth-optimal Portfolio Under Transaction Costs

    The authors consider the maximization of the long-term growth rate in the Black-Scholes model under proportional transaction costs as in Taksar, Klass and Assaf [Math. Oper. Res. 13, 1988]. Similarly as in Kallsen and Muhle-Karbe [Ann. Appl. Probab., 20, 2010] for optimal consumption over an infinite horizon, they tackle this...

    Provided By Cornell University

  • White Papers // Dec 2010

    Robust Maximization Of Asymptotic Growth

    This paper addresses the question of how to invest in a robust growth-optimal way in a market where the instantaneous expected return of the underlying process is unknown. The optimal investment strategy is identified using a generalized version of the principal eigenfunction for an elliptic second-order differential operator which depends...

    Provided By Cornell University

  • White Papers // May 2010

    Quantification of Integrity

    Two kinds of integrity measures - contamination and suppression - are introduced. Contamination measures how much untrusted information reaches trusted outputs; it is the dual of information-flow confidentiality. Suppression measures how much information is lost from outputs; it does not have a confidentiality dual. Two forms of suppression are considered:...

    Provided By Cornell University

  • White Papers // Jul 2010

    Analytical Framework For Credit Portfolios

    Analytical, free of time consuming Monte Carlo simulations, framework for credit portfolio systematic risk metrics calculations is presented. Techniques are described that allow calculation of portfolio-level systematic risk measures (standard deviation, VaR and Expected Shortfall) as well as allocation of risk down to individual transactions. The underlying model is the...

    Provided By Cornell University

  • White Papers // Apr 2010

    Simple Fuzzy Score For Russian Public Companies Risk Of Default

    Current economy crisis of 2008-2009 has resulted in severe credit crunch and significant NPL rise in Russian financial system. Bad debt rate has almost tripled to 6% of total loans to corporate sector, while provisions reached 9%. Corporate bonds market cannot be called safe heaven either having almost 25% of...

    Provided By Cornell University

  • White Papers // Jan 2011

    Precautionary Measures For Credit Risk Management In Jump Models

    Sustaining efficiency and stability by properly controlling the equity to asset ratio is one of the most important and difficult challenges in bank management. Due to unexpected and abrupt decline of asset values, a bank must closely monitor its net worth as well as market conditions, and one of its...

    Provided By Cornell University

  • White Papers // Jul 2011

    KISS Approach To Credit Portfolio Modeling

    A simple, yet reasonably accurate, analytical technique is proposed for multi-factor structural credit portfolio models. The accuracy of the technique is demonstrated by benchmarking against Monte Carlo simulations. The approach presented here may be of high interest to practitioners looking for transparent, intuitive, easy to implement and high performance credit...

    Provided By Cornell University

  • White Papers // Jun 2011

    A Random Matrix Approach To Credit Risk

    The authors estimate generic statistical properties of a structural credit risk model by considering an ensemble of correlation matrices. This ensemble is set up by Random Matrix Theory. They demonstrate analytically that the presence of correlations severely limits the effect of diversification in a credit portfolio if the correlations are...

    Provided By Cornell University

  • White Papers // Jul 2009

    A Minsky Perspective On The Global Recession Of 2009

    As the U.S. credit crunch of 2007 evolved into a global recession in late 2008 and early 2009, the economic ideas of the late Hyman Minsky received increasing attention on both sides of the Atlantic Ocean. However, few observers seem to appreciate that about the last dozen years of Minsky's...

    Provided By Cornell University

  • White Papers // Jul 2011

    The Evolving Dynamics Of Global Economic Power In The Post-Crisis World: Revelations From A New Index Of Government Economic Power

    This paper develops an index for measuring the economic power of governments viewed as entities in themselves. The basic idea is to encapsulate the economic representative power of a nation's government in the international arena in as simple and parsimonious a manner as possible. For this a set of standard...

    Provided By Cornell University

  • White Papers // Aug 2009

    A Simple Model Of The Financial Crisis Of 2007-9 With Implications For The Design Of A Stimulus Package

    The financial crisis of 2007-09 began as a local problem in the mortgage finance market in the United States and Europe but, within months, escalated into a general global financial crisis, resulting in collapsing investment not just in developed nations but also in Shanghai, Rio and Mumbai, and has led...

    Provided By Cornell University

  • White Papers // Jul 2011

    Adjoints And Automatic (Algorithmic) Differentiation In Computational Finance

    Two of the most important areas in computational finance: Greeks and, respectively, calibration, are based on efficient and accurate computation of a large number of sensitivities. This paper gives an overview of adjoint and Automatic Differentiation (AD), also known as algorithmic differentiation, techniques to calculate these sensitivities. When compared to...

    Provided By Cornell University

  • White Papers // May 2011

    Rough Paths In Idealized Financial Markets

    This paper considers possible price paths of a financial security in an idealized market. Its main result is that the variation index of typical price paths is at most 2; in this sense, typical price paths are not rougher than typical paths of Brownian motion. The authors do not make...

    Provided By Cornell University

  • White Papers // Jul 2009

    Impact Of Foreign Intellectual Property Rights Protection On U.S. Exports And FDI

    Since the early 1990s, there has been a growing interest in the potential contribution of Intellectual Property Rights (IPR) protection to global trade and investment. However, there is an ongoing debate among analysts regarding the extent to which stronger IPR actually stimulate international transactions via transfer of technology. This paper...

    Provided By Cornell University

  • White Papers // Sep 2010

    Detection of Time-Varying Flows in Wireless Networks

    The problem of detecting the presence of time-varying flows in multi-hop wireless networks is considered. In particular, from transmission timing measurements, a test is constructed to determine whether there is a flow of data packets between a pair of nodes. It is assumed that the packet flows may have time-varying...

    Provided By Cornell University

  • White Papers // Feb 2011

    Secondary Job Scheduling in the Cloud With Deadlines

    The highly dynamic nature of the cloud environment leads to a time-varying resource utilization and the cloud provider can potentially accommodate secondary jobs with the remaining resource. To better implement the idea of resource reutilization in the cloud environment, the problem of secondary job scheduling with deadlines under time-varying resource...

    Provided By Cornell University

  • White Papers // Apr 2010

    Timing-Based Detection of Packet Forwarding in MANETs

    In Mobile Ad hoc NETworks (MANETs), timing information is easily available due to the use of a shared medium, even when the traffic is encrypted. This paper addresses how such timing information can be used for detecting packet forwarding activities in MANETs. The authors' results depend in part on the...

    Provided By Cornell University

  • White Papers // Feb 2010

    Multiuser Cognitive Access of Continuous Time Markov Channels: Maximum Throughput and Effective Bandwidth Regions

    The problem of sharing multiple channels owned by primary users with multiple cognitive users is considered. Each primary user transmits on its dedicated channel, and its occupancy is modeled by a continuous time Markov process. Each cognitive user is capable of sensing one channel at a time and it transmits...

    Provided By Cornell University

  • White Papers // Sep 2009

    A Sensing-Based Cognitive Coexistence Method for Interfering Infrastructure and Ad-Hoc Systems

    The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an infrastructure system to reduce interference to ad-hoc or peer-to-peer communication links in close proximity. Motivated by the superior resources of the infrastructure system, the authors study...

    Provided By Cornell University

  • White Papers // Sep 2009

    Cognitive Frequency Hopping Based on Interference Prediction: Theory and Experimental Results

    Wireless services in the unlicensed bands are proliferating, but frequently face high interference from other devices due to a lack of coordination among heterogeneous technologies. In this paper, the authors study how cognitive radio concepts enable systems to sense and predict interference patterns and adapt their spectrum access accordingly. This...

    Provided By Cornell University

  • White Papers // Mar 2010

    Protecting The Poor Against The Next Crisis

    Crises are likely to be new normal for developing and transition economies. In designing programs to protect the poor against crises, governments face two uncertainties - uncertainty of crisis type and uncertainty of crisis timing. In the face of these uncertainties, the author proposes three lines of action for governments...

    Provided By Cornell University

  • White Papers // Jun 2011

    Beyond Power Proportionality: Designing Power-Lean Cloud Storage

    The authors present a power-lean storage system, where racks of servers, or even entire data center shipping containers, can be powered down to save energy. They show that racks and containers are more than the sum of their servers, and demonstrate the feasibility of designing a storage system that powers...

    Provided By Cornell University

  • White Papers // Nov 2010

    Virtually Synchronous Methodology for Dynamic Service Replication

    In designing and building distributed systems, it is common engineering practice to separate steady-state ("Normal") operation from abnormal events such as recovery from failure. This way the normal case can be optimized extensively while recovery can be amortized. However, integrating the recovery procedure with the steady-state protocol is often far...

    Provided By Cornell University

  • White Papers // Jun 2010

    Maelstrom: Transparent Error Correction for Communication Between Data Centers

    The global network of data centers is emerging as an important distributed systems paradigm - commodity clusters running high-performance applications, connected by high-speed 'Lambda' networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple the performance of applications and protocols - a loss rate as...

    Provided By Cornell University

  • White Papers // Sep 2010

    Man-in-the-Middle TCP Recovery

    When an application connects with a remote peer using TCP, its network stack encapsulates the state of that connection. As a consequence, even if the application is capable of recovering its own state after failure (for example, by restarting at a backup location), the peer may experience a disruption of...

    Provided By Cornell University

  • White Papers // Jun 2009

    Is Unlevered Firm Volatility Asymmetric?

    Asymmetric volatility refers to the stylized fact that stock volatility is negatively correlated to stock returns. Traditionally, this phenomenon has been explained by the financial leverage effect. This explanation has recently been challenged in favor of a risk premium based explanation. The authors develop a new, unlevering approach to document...

    Provided By Cornell University

  • White Papers // Oct 2009

    GO: Platform Support for Gossip Applications

    Gossip-based protocols are increasingly popular in large-scale distributed applications that disseminate updates to replicated or cached content. GO (Gossip Objects) is a per-node gossip platform that the authors developed in support of this class of protocols. In addition to making it easy to develop new gossip protocols and applications, GO...

    Provided By Cornell University

  • White Papers // Oct 2009

    Cloudifying Source Code Repositories: How Much Does It Cost?

    Cloud computing provides one with general purpose storage and server hosting platforms at a reasonable price. The authors explore the possibility of tapping these resources for the purpose of hosting source code repositories for individual projects as well as entire open source communities. An analysis of storage costs is presented,...

    Provided By Cornell University

  • White Papers // Jun 2009

    Storing and Accessing Live Mashup Content in the Cloud

    Today's Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of replication, publish-subscribe, or peer-to-peer mechanisms for better scalability or responsiveness. This is particularly true of storage: content is typically persisted in data centers and consumed via...

    Provided By Cornell University

  • White Papers // Jan 2011

    Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

    The paper shows that anti-entropy protocols can process only a limited rate of updates, and proposes and evaluates a new state reconciliation mechanism as well as a flow control scheme for anti-entropy protocols. Anti-entropy, or gossip, is an attractive way of replicating state that does not have strong consistency requirements....

    Provided By Cornell University

  • White Papers // Apr 2010

    Empirical Characterization of Uncongested Optical Lambda Networks and 10GbE Commodity Endpoints

    High-bandwidth, semi-private optical lambda networks carry growing volumes of data on behalf of large data centers, both in cloud computing environments and for scientific, financial, defense, and other enterprises. This paper undertakes a careful examination of the end-to-end characteristics of an uncongested lambda network running at high speeds over long...

    Provided By Cornell University

  • White Papers // Mar 2010

    A Middleware for Gossip Protocols

    Gossip protocols are known to be highly robust in scenarios with high churn, but if the data that is being gossiped becomes corrupted, a protocol's very robustness can make it hard to fix the problem. All participants need to be taken down, any disk-based data need to be scrubbed, the...

    Provided By Cornell University

  • White Papers // Mar 2010

    Balancing Gossip Exchanges in Networks With Firewalls

    Gossip protocols are an important building block of many large-scale systems. They have inherent load-balancing properties as long as nodes are deployed over a network with a "Flat" topology that is, a topology where any pair of nodes may engage in a gossip exchange. Unfortunately, the Internet is not flat...

    Provided By Cornell University

  • White Papers // Jan 2011

    Network-Aware Adaptation Techniques for Mobile File Systems

    Wireless networks present unusual challenges for mobile file system clients since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditional approach to adapting network communication to these conditions is to write back file updates asynchronously when bandwidth is low. Unfortunately, this can lead to underutilisation of bandwidth and...

    Provided By Cornell University

  • White Papers // Jan 2011

    On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks

    Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A key and difficult requirement of many such applications is heterogeneity: peers have different node degrees in the random graph based on their...

    Provided By Cornell University

  • White Papers // Dec 2010

    An Econophysics Model For The Stock-markets Analysis And Diagnosis

    In this paper, the authors present an econophysic model for the description of shares transactions in a capital market. For introducing the fundamentals of this model they used an analogy between the electrical field produced by a system of charges and the overall of economic and financial information of the...

    Provided By Cornell University

  • White Papers // Dec 2010

    Macrostate Parameter And Investment Risk Diagrams For 2008 And 2009

    In this paper, are made some considerations of the application of phenomenological thermodynamics in risk analysis for the transaction on financial markets, using the concept of economic entropy and the macrostate parameter introduced by the authors in a previous works. The investment risk diagrams for a number of Romanian listed...

    Provided By Cornell University