Cornell University

Displaying 281-320 of 1175 results

  • White Papers // Feb 2013

    Facilitating Machine to Machine (M2M) Communication Using GSM Network

    In this paper, a method to facilitate M2M communication using existing GSM networks is proposed - as M2M devices primarily use SMS as their data bearer, the focus is on increasing the number of devices that can use the associated GSM signaling channels at a time. This is achieved by...

    Provided By Cornell University

  • White Papers // Feb 2013

    Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee

    In this paper, the authors consider a multi-antenna downlink network where a Secure User (SU) coexists with a passive eavesdropper. There are two design requirements for such a network. First, the information should be transferred in a secret and efficient manner. Second, the Quality of Service (QoS), i.e. delay sensitivity,...

    Provided By Cornell University

  • White Papers // Feb 2013

    Joint Physical Network Coding and LDPC decoding for Two Way Wireless Relaying

    In this paper, the authors investigate the joint design of channel and network coding in bi-directional relaying systems and propose a combined low complexity physical network coding and LDPC decoding scheme. For the same LDPC codes employed at both source nodes, they show that the relay can decodes the network...

    Provided By Cornell University

  • White Papers // Feb 2013

    A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

    Energy efficiency has become an important measurement of scheduling algorithm for private cloud. The challenge is trade-off between minimizing of energy consumption and satisfying Quality of Service (QoS) (e.g. performance or resource availability on time for reservation request). The authors consider resource needs in context of a private cloud system...

    Provided By Cornell University

  • White Papers // Feb 2013

    Throughput Analysis of CSMA Wireless Networks with Finite Offered-Load

    In this paper, the authors propose an approximate method, Equivalent Access Intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, they...

    Provided By Cornell University

  • White Papers // Feb 2013

    Partial Third-Party Information Exchange with Network Coding

    In this paper, the authors consider the problem of exchanging channel state information in a wireless network such that a subset of the clients can obtain the complete channel state information of all the links in the network. They first derive the minimum number of required transmissions for such partial...

    Provided By Cornell University

  • White Papers // Feb 2013

    On Weak Dress Codes for Cloud Storage

    In a distributed storage network, reliability and bandwidth optimization can be provided by regenerating codes. Recently table based regenerating codes viz. DRESS (Distributed Replication-based Exact Simple Storage) codes has been proposed which also optimizes the disk I/O. Dress codes consists of an outer MDS code with an inner Fractional Repetition...

    Provided By Cornell University

  • White Papers // Feb 2013

    Silent Transitions in Automata with Storage

    The authors consider the problem of removing silent transitions from one-way automata with various kinds of storage. Specifically, they ask for which kinds of storage the real-time and the general version have equal computational power. They consider the computational power of silent transitions in one-way automata with storage. Specifically, they...

    Provided By Cornell University

  • White Papers // Feb 2013

    Efficient Computations of a Security Index for False Data Attacks in Power Networks

    The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks are considered. The authors analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless P=NP there is...

    Provided By Cornell University

  • White Papers // Feb 2013

    Error Rate Analysis of GF(q) Network Coded Detect-and-Forward Wireless Relay Networks Using Equivalent Relay Channel Models

    This paper investigates simple means of analyzing the error rate performance of a general qary Galois Field network coded detect-and-forward cooperative relay network with known relay error statistics at the destination. Equivalent relay channels are used in obtaining an approximate error rate of the relay network, from which the diversity...

    Provided By Cornell University

  • White Papers // Feb 2013

    Face Recognition for Social Media With Mobile Cloud Computing

    Social Networking has become today's lifestyle and anyone can easily receive information about everyone in the world. It is very useful if a personal identity can be obtained from the mobile device and also connected to social networking. Therefore, the authors proposed a face recognition system on mobile devices by...

    Provided By Cornell University

  • White Papers // Jan 2013

    Energy Efficiency of Network Cooperation for Cellular Uplink Transmissions

    There is a growing interest in energy efficient or so-called "Green" wireless communication to reduce the energy consumption in cellular networks. Since today's wireless terminals are typically equipped with multiple network access interfaces such as Bluetooth, Wi-Fi, and cellular networks, this paper investigates user terminals cooperating with each other in...

    Provided By Cornell University

  • White Papers // Jan 2013

    A Fully Distributed Opportunistic Network Coding Scheme for Cellular Relay Networks

    In this paper, the authors propose an Opportunistic Network Coding (ONC) scheme in cellular relay networks, which operates depending on whether the relay decodes source messages successfully or not. A fully distributed method is presented to implement the proposed opportunistic network coding scheme without the need of any feedback between...

    Provided By Cornell University

  • White Papers // Jan 2013

    Energy-Efficient Power Allocation in OFDM Systems with Wireless Information and Power Transfer

    In this paper, the authors consider an Orthogonal Frequency Division Multiplexing (OFDM) downlink point-to-point system with simultaneous wireless information and power transfer. It is assumed that the receiver is able to harvest energy from noise, interference, and the desired signals. They study the design of power allocation algorithms maximizing the...

    Provided By Cornell University

  • White Papers // Jan 2013

    An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems

    The increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the maintenance needs of Networked Distributed Storage Systems (NDSS), trying to reach the best compromise among storage space efficiency, fault-tolerance, and maintenance...

    Provided By Cornell University

  • White Papers // Jan 2013

    Increasing Network Visibility Using Coded Repetition Beacon Piggybacking

    Vehicular Ad-hoc NETworks (VANET) is one of the most challenging research areas in the field of Mobile Ad Hoc Networks. In this research, the authors propose a new mechanism for increasing network visibility, by taking the information gained from periodic safety messages (beacons), and inserting it into a 'Neighbor' table....

    Provided By Cornell University

  • White Papers // Jan 2013

    Why Quantum Computing Is Hard - and Quantum Cryptography Is Not Provably Secure

    Despite high hopes for quantum computation in the 1990s, progress in the past decade has been slow; the people still cannot perform computation with more than about three qubits and are no closer to solving problems of real interest than a decade ago. Separately, recent experiments in fluid mechanics have...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Capacity of Wireless Channels: A Physical Approach

    The capacity of Multiple-Input Multiple-Output (MIMO) channels has been considered to be severely limited by the size of antenna arrays. The capacity scaling for a three-dimensional network and the degree-of-freedom analysis for a polarimetric antenna array were provided based on the spherical vector wave decomposition, and both showed the number...

    Provided By Cornell University

  • White Papers // Jan 2013

    Towards Optimal Broadcast in Wireless Networks

    Broadcast is a fundamental operation in networks, especially in wireless Mobile Ad-hoc NETworks (MANETs). For example, some form of broadcasting is used by all on-demand MANET routing protocols, when there is uncertainty as to the location of the destination node, or for service discovery. Being such a basic operation of...

    Provided By Cornell University

  • White Papers // Jan 2013

    Integrated Approach to Data Center Power Management

    Energy accounts for a significant fraction of the operational costs of a data center, and data center operators are increasingly interested in moving towards low-power designs. Two distinct approaches have emerged towards achieving this end: the power proportional approach focuses on reducing disk and server power consumption, while the green...

    Provided By Cornell University

  • White Papers // Jan 2013

    On the Achievable Region for Interference Networks with Point-to-Point Codes

    This paper studies evaluation of the capacity region for interference networks with Point-to-Point (p2p) capacity-achieving codes. Such capacity region has recently been characterized as union of several sub-regions each of which has distinctive operational characteristics. Detailed evaluation of this region, therefore, can be accomplished in a very simple manner by...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Degrees of Freedom for Network-Coded Cognitive Interference Channel

    The authors explain a two-user cognitive Interference Channel (CIC) where one of the transmitters (primary) has knowledge of a linear combination (over an appropriate finite field) of the two information messages. They refer to this channel model as Network-Coded CIC, since the linear combination may be the result of some...

    Provided By Cornell University

  • White Papers // Jan 2013

    Evaluating Cloud Computing Techniques for Smart Power Grid Design Using Parallel Scripting

    Applications used to evaluate next-generation electrical power grids ("Smart grids") are anticipated to be compute and data-intensive. In this paper, the authors parallelize and improve performance of one such application which was run sequentially prior to the use of their cloud-based configuration. They examine multiple cloud computing offerings, both commercial...

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Compressive Sampling of Spatially Sparse Fields in Wireless Sensor Networks

    Wireless Sensor Networks (WSN), i.e. networks of autonomous, wireless sensing nodes spatially deployed over a geographical area, are often faced with acquisition of spatially sparse fields. In this paper, the authors present a novel bandwidth/energy efficient CS scheme for acquisition of spatially sparse fields in a WSN. The paper contribution...

    Provided By Cornell University

  • White Papers // Jan 2013

    Generalized Cut-Set Bounds for Broadcast Networks

    A broadcast network is a classical network with all source messages collocated at a single source node. For broadcast networks, the standard cut-set bounds, which are known to be loose in general, are closely related to union as a specific set operation to combine the basic cuts of the network....

    Provided By Cornell University

  • White Papers // Jan 2013

    Efficient Identification of Equivalences in Dynamic Graphs and Pedigree Structures

    The authors propose a new framework for designing test and query functions for complex structures that vary across a given parameter such as genetic marker position. The operations they are interested in include equality testing, set operations, isolating unique states, duplication counting, or finding equivalence classes under identifiability constraints. A...

    Provided By Cornell University

  • White Papers // Jan 2013

    Toward a Reliable, Secure and Fault Tolerant Smart Grid State Estimation in the Cloud

    The collection and prompt analysis of synchrophasor measurements is a key step towards enabling the future smart power grid, in which grid management applications would be deployed to monitor and react intelligently to changing conditions. The potential exists to slash inefficiencies and to adaptively reconfigure the grid to take better...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

    Secure network coding was first introduced by Cai and Yeung, and further investigated by Feldman et al... In the scenario of secure network coding, a source node transmits n packets from n outgoing links to sink nodes through a network that implements network coding, and each sink node receives N...

    Provided By Cornell University

  • White Papers // Jan 2013

    Utility-Privacy Tradeoff in Databases: An Information-Theoretic Approach

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. This paper presents...

    Provided By Cornell University

  • White Papers // Jan 2013

    Relay Augmentation for Lifetime Extension of Wireless Sensor Networks

    The authors propose a novel relay augmentation strategy for extending the lifetime of a certain class of Wireless Sensor Networks. In this class, sensors are located at fixed and pre-determined positions and all communication takes place via multi-hop paths in a fixed routing tree rooted at the base station. It...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Space-Time Decision Feedback Neural Detectors with Data Selection for High-Data Rate Users in DS-CDMA Systems

    A space-time adaptive Decision Feedback (DF) receiver using Recurrent Neural Networks (RNN) is proposed for joint equalization and interference suppression in Direct Sequence Code-Division-Multiple-Access (DS-CDMA) systems equipped with antenna arrays. The proposed receiver structure employs dynamically driven RNNs in the feed forward section for equalization and multi-access interference suppression and...

    Provided By Cornell University

  • White Papers // Jan 2013

    Blind Adaptive Algorithms for Decision Feedback DS-CDMA Receivers in Multipath Channels

    In this paper, the authors examine blind adaptive and iterative Decision Feedback (DF) receivers for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in frequency selective channels. Code-constrained Minimum Variance (CMV) and Constant Modulus (CCM) design criteria for DF receivers based on constrained optimization techniques are investigated for scenarios subject...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Interference Suppression for CDMA Systems using Interpolated FIR Filters with Adaptive Interpolators in Multipath Channels

    In this paper, the authors propose an adaptive linear receiver structure based on interpolated Finite Impulse Response (FIR) filters with adaptive interpolators for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in multipath channels. The interpolated Minimum Mean-Squared Error (MMSE) and the interpolated Constrained Minimum Variance (CMV) solutions are described...

    Provided By Cornell University

  • White Papers // Jan 2013

    The Case for Cross-Layer Optimizations in Storage: A Workflow-Optimized Storage System

    In this paper, the authors propose using file system custom metadata as a bidirectional communication channel between applications and the storage system. This channel can be used to pass hints that enable cross-layer optimizations, an option hindered today by the ossified file-system interface. The authors study this approach in context...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for Two-Way Relaying with QAM

    The design of modulation schemes for the physical layer network-coded two way relaying scenario was studied. It was shown that every network coding map that satisfies the exclusive law is represent able by a Latin Square and conversely, and this relationship can be used to get the network coding maps...

    Provided By Cornell University

  • White Papers // Jan 2013

    Physical Layer Network Coding for the K-User Multiple Access Relay Channel

    A Physical layer Network Coding (PNC) scheme is proposed for the K-user wireless Multiple Access Relay Channel (MARC), in which K source nodes transmit their messages to the destination node D with the help of a relay node R: The proposed PNC scheme involves two transmission phases: Phase 1 during...

    Provided By Cornell University

  • White Papers // Jan 2013

    Decentralized Lifetime Minimizing Tree for Data Aggregation in Wireless Sensor Networks

    To meet the demands of Wireless Sensor Networks (WSNs) where data are usually aggregated at a single source prior to transmitting to any distant user, there is a need to establish a tree structure inside any given event region. In this paper, the authors propose a novel technique to create...

    Provided By Cornell University

  • White Papers // Jan 2013

    Network Throughput Optimization via Error Correcting Codes

    A new network construction method is presented for building of scalable, high throughput, low latency networks. The method is based on the exact equivalence discovered between the problems of maximizing network throughput (measured as bisection bandwidth) for a large class of practically interesting Cayley graphs and the problem of maximizing...

    Provided By Cornell University

  • White Papers // Jan 2013

    Low-Complexity Scheduling Policies for Achieving Throughput and Delay Optimality in Multi-Channel Wireless Networks

    In this paper, the authors study the scheduling problem for downlink transmission in a multi-channel (e.g., OFDM-based) wireless network. They focus on a single cell, with the aim of developing a unifying framework for designing low-complexity scheduling policies that can provide optimal performance in terms of both throughput and delay....

    Provided By Cornell University

  • White Papers // Jan 2013

    Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Networks

    Energy efficiency is the most important issue in all facets of Wireless Sensor Networks (WSNs) operations because of the limited and non-replenish able energy supply. Data aggregation mechanism is one of the possible solutions to prolong the life time of sensor nodes and on the other hand it also helps...

    Provided By Cornell University

  • White Papers // Nov 2011

    A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance

    Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become necessary to protect sensitive and personal...

    Provided By Cornell University

  • White Papers // Dec 2010

    Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria EBanking System

    Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses...

    Provided By Cornell University

  • White Papers // Aug 2011

    Biometric Authorization System Using Gait Biometry

    Human gait, which is a new biometric aimed to recognize individuals by the way they walk have come to play an increasingly important role in visual surveillance applications. In this paper a novel hybrid holistic approach is proposed to show how behavioral walking characteristics can be used to recognize unauthorized...

    Provided By Cornell University

  • White Papers // Jan 2011

    Analysis of Biometric Authentication Protocols in the Blackbox Model

    In this paper, the authors analyze different biometric authentication protocols considering an internal adversary. Their contribution takes place at two levels. On the one hand, they introduce a new comprehensive framework that encompasses the various schemes they want to look at. On the other hand, they exhibit actual attacks on...

    Provided By Cornell University

  • White Papers // Apr 2013

    Exclusion and Guard Zones in DS-CDMA Ad Hoc Networks

    The central issue in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Space-Time Decision Feedback Neural Detectors with Data Selection for High-Data Rate Users in DS-CDMA Systems

    A space-time adaptive Decision Feedback (DF) receiver using Recurrent Neural Networks (RNN) is proposed for joint equalization and interference suppression in Direct Sequence Code-Division-Multiple-Access (DS-CDMA) systems equipped with antenna arrays. The proposed receiver structure employs dynamically driven RNNs in the feed forward section for equalization and multi-access interference suppression and...

    Provided By Cornell University

  • White Papers // Jan 2013

    Blind Adaptive Algorithms for Decision Feedback DS-CDMA Receivers in Multipath Channels

    In this paper, the authors examine blind adaptive and iterative Decision Feedback (DF) receivers for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in frequency selective channels. Code-constrained Minimum Variance (CMV) and Constant Modulus (CCM) design criteria for DF receivers based on constrained optimization techniques are investigated for scenarios subject...

    Provided By Cornell University

  • White Papers // Jan 2013

    Adaptive Interference Suppression for CDMA Systems using Interpolated FIR Filters with Adaptive Interpolators in Multipath Channels

    In this paper, the authors propose an adaptive linear receiver structure based on interpolated Finite Impulse Response (FIR) filters with adaptive interpolators for Direct Sequence Code Division Multiple Access (DS-CDMA) systems in multipath channels. The interpolated Minimum Mean-Squared Error (MMSE) and the interpolated Constrained Minimum Variance (CMV) solutions are described...

    Provided By Cornell University

  • White Papers // Feb 2013

    Facilitating Machine to Machine (M2M) Communication Using GSM Network

    In this paper, a method to facilitate M2M communication using existing GSM networks is proposed - as M2M devices primarily use SMS as their data bearer, the focus is on increasing the number of devices that can use the associated GSM signaling channels at a time. This is achieved by...

    Provided By Cornell University

  • White Papers // Dec 2011

    Transferring Voice Using SMS Over GSM Network

    In this paper, the authors present a methodology of transmitting voice in SMS (Short Message Service) over GSM network. Usually SMS contents are text based and limited to 140 bytes. It supports national and international roaming, but also supported by other telecommunication such as TDMA (Time Division Multiple Access), CDMA...

    Provided By Cornell University

  • White Papers // Apr 2013

    Secure End-to-End Communication with Optimal Throughput in Unreliable Networks

    The authors demonstrate the feasibility of end-to-end communication in highly unreliable networks. Modeling a network as a graph with vertices representing nodes and edges representing the links between them, they consider two forms of unreliability: unpredictable edge-failures and deliberate deviation from protocol specifications by corrupt nodes. they present a robust...

    Provided By Cornell University

  • White Papers // Apr 2013

    Towards a Networks-of-Networks Framework for Cyber Security

    Networks-of-Networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Approach to Secure Mobile Enterprise Architectures

    Due to increased security awareness of enterprises for mobile applications operating with sensitive or personal data as well as extended regulations form legislative (the principle of proportionality) various approaches, how to implement (extended) two-factor authentication, multi-factor authentication or virtual private network within enterprise mobile environments to ensure delivery of secure...

    Provided By Cornell University

  • White Papers // May 2012

    Security Threats Analysis in Bluetooth Enabled Mobile Devices

    Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled...

    Provided By Cornell University

  • White Papers // Jan 2013

    Toward a Reliable, Secure and Fault Tolerant Smart Grid State Estimation in the Cloud

    The collection and prompt analysis of synchrophasor measurements is a key step towards enabling the future smart power grid, in which grid management applications would be deployed to monitor and react intelligently to changing conditions. The potential exists to slash inefficiencies and to adaptively reconfigure the grid to take better...

    Provided By Cornell University

  • White Papers // Apr 2013

    Application-Driven TCP Recovery and Non-Stop BGP

    Some network protocols tie application state to underlying TCP connections, leading to unacceptable service outages when an endpoint loses TCP state during fail-over or migration. For example, BGP ties forwarding tables to its control plane connections so that the failure of a BGP endpoint can lead to widespread routing disruption,...

    Provided By Cornell University

  • White Papers // Feb 2011

    Running Smart Grid Control Software on Cloud Computing Architectures

    There are pressing economic as well as environmental arguments for the overhaul of the current outdated power grid, and its replacement with a Smart Grid that integrates new kinds of green power generating systems, monitors power use, and adapts consumption to match power costs and system load. This paper identifies...

    Provided By Cornell University

  • White Papers // Mar 2011

    Instrumentation for Exact Packet Timings in Networks

    The authors design and implement a novel class of highly precise network instrumentation, capable of the first-ever capture of exact packet timings of network traffic. Their instrumentation - combining real-time physics test equipment with off-line post-processing software - prevents interference with the system under test, provides reproducible measurements by eliminating...

    Provided By Cornell University

  • White Papers // Mar 2010

    Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols

    Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes. The authors will discuss a few problems introduced by the RTS/CTS mechanism of collision avoidance and focus on the virtual jamming problem, which allows a malicious node to...

    Provided By Cornell University

  • White Papers // Aug 2012

    A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud

    With advances in the field of cloud computing many computing resources and/or services are being provided to the end user on a pay-as-you-use basis. Data outsourcing is a new paradigm in which a third party provides storage services. This is more cost effective for the user as there is no...

    Provided By Cornell University

  • White Papers // Aug 2012

    Privacy Preservation Algorithm Using Effective Data Lookup Organization for Storage Clouds

    In the era of cloud computing, many cloud service providers like Amazon, Microsoft, Google, etc are offering cloud storage as a service. The authors can migrate their data to the storage offered by them and can retrieve it back at any point of time or can share it with other...

    Provided By Cornell University

  • White Papers // Aug 2012

    Cpassport - A Passport System Based on Cloud Computing and Near Field Communication

    Wireless communication has penetrated into all fields of technology, especially in mobility, where wireless transactions are gaining importance with improvements in standards like 3G and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC - Near Field Communication. In addition...

    Provided By Cornell University

  • White Papers // Dec 2012

    Private Cloud Initiatives Using Bioinformatics Resources and Applications Facility (BRAF)

    The bioinformatics research community has a demand of enormous compute resources to run bioinformatics tools. Next generation sequencing technologies have further increased the overall demand for computational analysis. The traditional Cluster and Grid computing are having their own complexities to program and use while there is a silver-line in cloud...

    Provided By Cornell University

  • White Papers // Dec 2012

    Cloud Algebra for Handling Unstructured Data in Cloud Database Management System

    The handling of unstructured data in database management system is very difficult. The managing unstructured data like image, video textual data etc. are not easy task in database system. In this work a concept of cloud algebra introduced to handle unstructured data in CDBMS. The most popular concept, relational algebra...

    Provided By Cornell University

  • White Papers // Feb 2013

    Face Recognition for Social Media With Mobile Cloud Computing

    Social Networking has become today's lifestyle and anyone can easily receive information about everyone in the world. It is very useful if a personal identity can be obtained from the mobile device and also connected to social networking. Therefore, the authors proposed a face recognition system on mobile devices by...

    Provided By Cornell University

  • White Papers // Aug 2011

    Minimum Spanning Tree Based Routing Strategy for Homogeneous WSN

    A Wireless Sensor Network (WSN) is composed of sensor nodes spread over the field to sense the data. The sensed data must be gathered & transmitted to Base Station (BS) for end user queries. The used sensor nodes being in-expensive having low computation power & limited energy so are not...

    Provided By Cornell University

  • White Papers // Dec 2012

    An Ontology-Based System for Cloud Infrastructure Services' Discovery

    The Cloud infrastructure services landscape advances steadily leaving users in the agony of choice. As a result, Cloud service identification and discovery remains a hard problem due to different service descriptions, non-standardised naming conventions and heterogeneous types and features of Cloud services. In this paper, the authors present an OWL-based...

    Provided By Cornell University

  • White Papers // Apr 2012

    Using Channel Output Feedback to Increase Throughput in Hybrid-ARQ

    Hybrid-ARQ protocols have become common in many packet transmission systems due to their incorporation in various standards. Hybrid-ARQ combines the normal Automatic Repeat reQuest (ARQ) method with error correction codes to increase reliability and throughput. In this paper, the authors look at improving upon this performance using feedback information from...

    Provided By Cornell University

  • White Papers // May 2013

    Proportional Fair MU-MIMO in 802.11 WLANs

    The next generation of 802.11 WLANs is expected to support Multi-User MIMO (MUMIMO) transmission, whereby parallel transmissions can be simultaneously made to multiple stations. This significantly extends the MIMO support introduced by the 802.11n standard and is, for example, included as part of the current draft 802.11ac standard that aims...

    Provided By Cornell University

  • White Papers // May 2013

    Optimal Distributed Scheduling in Wireless Networks Under SINR Interference Model

    Radio resource sharing mechanisms are key to ensuring good performance in wireless networks. In their seminal paper, Tassiulas and Ephremides introduced the Maximum Weighted Scheduling algorithm, and proved its throughput-optimality. Since then, there have been extensive research efforts to devise distributed implementations of this algorithm. Recently, distributed adaptive CSMA scheduling...

    Provided By Cornell University

  • White Papers // Nov 2012

    Performance Analysis of Bio-Inspired Routing Protocols Based on Random Waypoint Mobility Model

    A Mobile Ad hoc NETwork (MANET) is a non-centralised, multihop, wireless network that lacks a common infrastructure and hence it needs self-organisation. The biggest challenge in MANETs is to find a path between communicating nodes, which is the MANET routing problem. Biology-inspired techniques such as Ant Colony Optimisation (ACO) which...

    Provided By Cornell University

  • White Papers // May 2013

    Intelligent Agent Based Semantic Web in Cloud Computing Environment

    Considering today's web scenario, there is a need of effective and meaningful search over the web which is provided by Semantic Web. Existing search engines are keyword based. They are vulnerable in answering intelligent queries from the user due to the dependence of their results on information available in web...

    Provided By Cornell University

  • White Papers // May 2013

    Cloud Computing Benefits for Educational Institutions

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers...

    Provided By Cornell University

  • White Papers // May 2013

    Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells

    In this paper, the authors propose a novel solution called Dynamic Spectrum Refarming (DSR) for deploying LTE small cells using the same spectrum as existing GSM networks. The basic idea of DSR is that LTE small cells are deployed in the GSM spectrum but suppress transmission of all signals including...

    Provided By Cornell University

  • White Papers // May 2013

    Enhancing Information Dissemination in a Device to Device Communication Based Metapopulation using Human Mobility Trace and Beamforming

    In communication network based on device to device interactions, dissemination of the information has lately picked up lot of interest. In this paper, the authors would like to propose a mechanism for studying and enhancing the dissemination of information as in the use case proposed for the future device to...

    Provided By Cornell University

  • White Papers // May 2013

    Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution

    Reconciliation is an important step to correct errors in Quantum Key Distribution (QKD). In QKD, after comparing basis, two legitimate parties possess two correlative keys which have some differences and they could obtain identical keys through reconciliation. In this paper, the authors present a new rate compatible reconciliation scheme based...

    Provided By Cornell University

  • White Papers // Jul 2012

    Implementation of Decoders for LDPC Block Codes and LDPC Convolutional Codes Based on GPUs

    Low-Density Parity-Check (LDPC) codes were invented by Robert Gallager but had been ignored for years until Mackay rediscovered them. They have attracted much attention recently because they can achieve excellent error correcting performance based on the Belief Propagation (BP) decoding algorithm. However, the BP decoding algorithm requires intensive computations. Fortunately,...

    Provided By Cornell University

  • White Papers // May 2010

    Network Coded Transmission of Fountain Codes over Cooperative Relay Networks

    In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, the authors apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is...

    Provided By Cornell University

  • White Papers // Apr 2010

    Universal Secure Network Coding via Rank-Metric Codes

    The paradigm of network coding has provided a rich source of new problems that generalize traditional problems in communications. One such problem, introduced in by Cai and Yeung, is that of securing a multicast network against an eavesdropper adversary. The problem of securing a network coding communication system against an...

    Provided By Cornell University

  • White Papers // Feb 2010

    Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio

    The authors study the problem of dynamic spectrum sensing and access in cognitive radio systems as a Partially Observed Markov Decision Process (POMDP). A group of cognitive users cooperatively tries to exploit vacancies in primary (licensed) channels whose occupancies follow a Markovian evolution. They first consider the scenario where the...

    Provided By Cornell University