Cornell University

Displaying 1-40 of 1369 results

  • White Papers // Jul 2015

    Monitoring in IOT Enabled Devices

    As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of Things (IOTs), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is...

    Provided By Cornell University

  • White Papers // Jul 2015

    Http-Burst: Improving HTTP Efficiency in the Era of Bandwidth Hungry Web Applications

    The HyperText Transfer Protocol (HTTP), a key building block of the world wide web, has succeeded to enable information exchange worldwide. Since its first version in 1996, HTTP/1.0, the average number of inlined objects and average total bytes per webpage has been increasing significantly for desktops and mobiles, from 1-10...

    Provided By Cornell University

  • White Papers // Jul 2015

    Temporal and Spatial Classification of Active IPv6 Addresses

    There is striking volume of world-wide web activity on IPv6 today. In early 2015, one large content distribution network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are observed per month. Address counts, however, obscure the number of...

    Provided By Cornell University

  • White Papers // Jul 2015

    JSKETCH: Sketching for Java

    Sketch-based synthesis, epitomized by the SKETCH tool, lets developers synthesize software starting from a partial program, also called a sketch or template. This paper presents JSKETCH, a tool that brings sketch-based synthesis to Java. JSKETCH's input is a partial Java program that may include holes, which are unknown constants, expression...

    Provided By Cornell University

  • White Papers // Jul 2015

    Research Approaches on Energy-aware Cognitive Radio Networks and Cloud based Infrastructures

    The raise of mobility has make more needs for wireless connectivity and bandwidth. As years passes wireless networks were rapidly improved, introducing new applications and services, as well as important challenges for mobility support. This research field is new with many researchers and scientists making their proposals to optimize the...

    Provided By Cornell University

  • White Papers // Jul 2015

    A Connectivity-Aware Approximation Algorithm for Relay Node Placement in Wireless Sensor Networks

    In two-tiered Wireless Sensor Networks (WSNs) relay node placement is one of the key factors impacting the network energy consumption and the system overhead. In this paper, a novel connectivity-aware approximation algorithm for relay node placement in WSNs is proposed to offer a major step forward in saving system overhead....

    Provided By Cornell University

  • White Papers // Jul 2015

    A New Vision for Smart Objects and the Internet of Things: Mobile Robots and Long-Range UHF RFID Sensor Tags

    In this paper, the authors present a new vision for smart objects and the Internet of Things (IoTs) wherein mobile robots interact with wirelessly-powered, long-range, Ultra-High Frequency Radio Frequency IDentification (UHF RFID) tags outfitted with sensing capabilities. They explore the technology innovations driving this vision by examining recently-commercialized sensor tags...

    Provided By Cornell University

  • White Papers // Jul 2015

    Joint Transmission in Cellular Networks with CoMP - Stability and Scheduling Algorithms

    Due to the current trend towards smaller cells, an increasing number of users of cellular networks reside at the edge between two cells; these users typically receive poor service as a result of the relatively weak signal and strong interference. Coordinated Multi-Point (CoMP) with Joint Transmission (JT) is a cellular...

    Provided By Cornell University

  • White Papers // Jul 2015

    The Society Spectrum: Self-Regulation of Cellular Network Markets

    Today's cellular telecommunications markets require continuous monitoring and intervention by regulators in order to balance the interests of various stakeholders. In order to reduce the extent of regulatory involvements in the day-to-day business of cellular operators, the present paper proposes a "Self-regulating" spectrum market regime named "Society spectrum". This regime...

    Provided By Cornell University

  • White Papers // Jul 2015

    SenseDroid: A Context-Aware Information Exchange Framework for Mobile Sensor Networks Using Android Phones

    Mobile phones and smartphones have evolved to be very powerful devices that have the potential to be utilized in many application areas apart from generic communication. With each passing year, users see increasingly powerful smartphones being manufactured, which have a plethora of powerful embedded sensors like microphone, camera, digital compass,...

    Provided By Cornell University

  • White Papers // Jul 2015

    Computationally Aware Sum-Rate Optimal Scheduling for Centralized Radio Access Networks

    In a centralized or cloud radio access network, certain portions of the digital baseband processing of a group of several radio access points are executed at a central data center. Centralizing the processing improves the flexibility, scalability, and utilization of computational assets. However, the performance depends critically on how the...

    Provided By Cornell University

  • White Papers // Jul 2015

    Securing Physical-Layer Communications for Cognitive Radio Networks

    In this paper, the authors investigate the physical-layer security of Cognitive Radio (CR) networks, which are vulnerable to various newly arising attacks targeting on the weaknesses of CR communications and networking. They first review a range of physical-layer attacks in CR networks, including the primary user emulation, sensing falsification, intelligence...

    Provided By Cornell University

  • White Papers // Jun 2015

    5G mmWave Module for the ns-3 Network Simulator

    The increasing demand of data, along with the spectrum scarcity, is motivating a urgent shift towards exploiting new bands. This is the main reason behind identifying mmWaves as the key disruptive enabling technology for 5G cellular networks. Indeed, utilizing new bands means facing new challenges; in this context, they are...

    Provided By Cornell University

  • White Papers // Jun 2015

    Interference Mitigation In Wireless Mesh Networks Through Radio Co-location Aware Conflict Graphs

    Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest. But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference. Conflict graphs are indispensable tools used to theoretically represent and estimate the interference in...

    Provided By Cornell University

  • White Papers // Jun 2015

    A Java Implementation of Parameter-less Evolutionary Algorithms

    The parameter-less genetic algorithm was first presented by the researchers as an alternative to the usual trial-and-error method of finding, for each given problem, an acceptable set-up of the parameter values of the genetic algorithm. Since then, the same strategy has been successfully applied to create parameter-less versions of other...

    Provided By Cornell University

  • White Papers // Jun 2015

    Java Implementation of a Parameter-less Evolutionary Portfolio

    The Java implementation of a portfolio of parameter-less evolutionary algorithms is presented. The parameter-less evolutionary portfolio implements a heuristic that performs adaptive selection of parameter-less evolutionary algorithms in accordance with performance criteria that are measured during running time. At present time, the portfolio includes three parameter-less evolutionary algorithms: parameter-less univariate...

    Provided By Cornell University

  • White Papers // Jun 2015

    The Complexity-Rate Tradeoff of Centralized Radio Access Networks

    In a centralized Radio Access Network (RAN), the signals from multiple Radio Access Points (RAPs) are processed centrally in a data center. Centralized RAN enables advanced interference coordination strategies while leveraging the elastic provisioning of data processing resources. It is particularly well suited for dense deployments, such as within a...

    Provided By Cornell University

  • White Papers // Jun 2015

    Impact of Node Speed on Throughput of Energy-Constrained Mobile Networks with Wireless Power Transfer

    A Wireless Charging Station (WCS) transfers energy wirelessly to mobile nodes within its charging region. This paper investigates the impact of node speed on the throughput of WCS overlaid mobile networks when packet transmissions are constrained by the energy status of each node. The energy provision for each node depends...

    Provided By Cornell University

  • White Papers // Jun 2015

    On Modeling Heterogeneous Wireless Networks Using Non-Poisson Point Processes

    Future wireless networks are required to support 1000 times higher data rate, than the current LTE (Long Term Evolution) standard. In order to meet the ever increasing demand for achieving reliable and ubiquitous coverage, it is inevitable that, future wireless networks will have to develop seamless interconnection between multiple technologies....

    Provided By Cornell University

  • White Papers // Jun 2015

    Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)

    The Secure SHell (SSH) protocol requires all implementations to support public key authentication method ("Publickey") for authentication purposes. HyperText Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support "Publickey". However, restrictions in HTTP, such as same origin policy, make it difficult to perform...

    Provided By Cornell University

  • White Papers // Jun 2015

    Encog: Library of Interchangeable Machine Learning Models for Java and C#

    This paper describes the Encog API for Java and C# that is provided as a JAR or DLL library. This paper introduces the Encog library for Java and C#, a scalable, adaptable, multi-platform machine learning framework that was first released in 2008. Encog allows a variety of machine learning models...

    Provided By Cornell University

  • White Papers // Jun 2015

    Fog Computing based Radio Access Networks: Issues and Challenges

    A Fog computing based Radio Access Network (F-RAN) is presented in this paper as a promising paradigm for the Fifth Generation (5G) wireless communication system to provide high spectral and energy efficiency. The core idea is to take full advantages of local radio signal processing, cooperative radio resource management, and...

    Provided By Cornell University

  • White Papers // Jun 2015

    NFV Based Gateways for Virtualized Wireless Sensor Networks: A Case Study

    Virtualization enables the sharing of a same Wireless Sensor Network (WSN) by multiple applications. However, in heterogeneous environments, Virtualized Wireless Sensor Networks (VWSNs) raise new challenges such as the need for on-the-fly, dynamic, elastic and scalable provisioning of gateways. Network Functions Virtualization (NFV) is an emerging paradigm that can certainly...

    Provided By Cornell University

  • White Papers // Jun 2015

    Throughput of a Cognitive Radio Network under Congestion Constraints: A Network-Level Study

    In this paper, the authors analyze a cognitive radio network with one primary and one secondary transmitter, in which the primary transmitter has bursty arrivals while the secondary node is assumed to be saturated (i.e. always has a packet waiting to be transmitted). The secondary node transmits in a cognitive...

    Provided By Cornell University

  • White Papers // Jun 2015

    EMMA: A Resource Oriented Framework for Service Choreography over Wireless Sensor and Actor Networks

    Current Internet of Things (IoTs) development requires service distribution over Wireless Sensor and Actor Networks (WSANs) to deal with the drastic increasing of network management complexity. Because of the specific constraints of WSAN, centralized approaches are strongly limited. Multi-hop communication used by WSAN introduces transmission latency, packet errors, router congestion...

    Provided By Cornell University

  • White Papers // Jun 2015

    Secure Ad-hoc Routing Scheme for Cooperative Multihop Wireless Networks

    In this paper, the authors investigate on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. They propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a...

    Provided By Cornell University

  • White Papers // Jun 2015

    A New Approach to Coding in Content Based MANETs

    In Content-Based Mobile Ad hoc NETworks (CB-MANETs), random linear Network Coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to re-strict the...

    Provided By Cornell University

  • White Papers // Jun 2015

    Passive Loop Interference Suppression in Large-Scale Full-Duplex Cellular Networks

    Loop Interference (LI) in wireless communications, is a notion resulting from the Full-Duplex (FD) operation. In a large-scale network, FD also increases the multiuser interference due to the large number of active wireless links that exist. Hence, in order to realize the FD potentials, this interference needs to be restricted....

    Provided By Cornell University

  • White Papers // Jun 2015

    Large-Deviation Principles for Connectable Receivers in Wireless Networks

    In this paper, the authors study large-deviation principles for a model of wireless networks consisting of Poisson point processes of transmitters and receivers, respectively. To each transmitter they associate a family of connectable receivers whose signal-to-interference-and-noise ratio is larger than a certain connectivity threshold. First, they show a large-deviation principle...

    Provided By Cornell University

  • White Papers // May 2015

    Interest-Based Access Control for Content Centric Networks

    Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP (Internet Protocol)-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network. Consumers request content by issuing interest messages with the desired...

    Provided By Cornell University

  • White Papers // May 2015

    Opportunities for a Truffle-based Golo Interpreter

    Golo is a simple dynamically-typed language for the Java Virtual Machine (JVM). Initially implemented as an ahead-of-time compiler to JVM bytecode, it leverages invokedynamic and JSR 292 method handles to implement a reasonably efficient runtime. Truffle is emerging as a framework for building interpreters for JVM languages with self-specializing AST...

    Provided By Cornell University

  • White Papers // May 2015

    A Java Math.BigDecimal Implementation of Core Mathematical Functions

    Whereas many Java applications can use the Java Native Interface to bind to (c-based) multi-precision programs on a host platform when a higher precision than the 64-bit standard is needed, others may observe that there is only rudimentary support on the native platform if standard mathematical functions are needed. This...

    Provided By Cornell University

  • White Papers // May 2015

    IEEE 802.11ax: High-Efficiency WLANs

    IEEE 802.11ax-2019 will replace both IEEE 802.11n-2009 and IEEE 802.11ac-2013 as the next high-throughput Wireless Local Area Network (WLAN) amendment. In this paper, the authors review the expected future WLAN scenarios and use-cases that justify the push for a new PHY/MAC IEEE 802.11 amendment and after that they overview a...

    Provided By Cornell University

  • White Papers // May 2015

    Context-Aware Small Cell Networks: How Social Metrics Improve Wireless Resource Allocation

    In this paper, a novel approach for optimizing and managing resource allocation in wireless Small Cell Networks (SCNs) with Device-To-Device (D2D) communication is proposed. The proposed approach allows to jointly exploit both the wireless and social context of wireless users for optimizing the overall allocation of resources and improving traffic...

    Provided By Cornell University

  • White Papers // May 2015

    A Subset Selection Algorithm for Wireless Sensor Networks

    One of the main challenges facing Wireless Sensor Networks (WSNs) is the limited power resources available at small sensor nodes. It is therefore desired to reduce the power consumption of sensors while keeping the distortion between the source information and its estimate at the Fusion Centre (FC) below a specific...

    Provided By Cornell University

  • White Papers // May 2015

    Reliability Improvement of Uplink Communication through Double Association in Wireless Heterogeneous Networks

    Traditionally, the focus of wireless cellular networks has been on the DownLink (DL) traffic due to its higher volume compared to the UpLink (UL) traffic. The authors investigate methods for network association that improve the reliability of uplink transmissions in dense wireless heterogeneous networks. The stochastic geometry analysis shows that...

    Provided By Cornell University

  • White Papers // May 2015

    Cats&Co: Categorical Time Series Coclustering

    The authors suggest a novel method of clustering and exploratory analysis of temporal event sequences data (also known as categorical time series) based on three-dimensional data grid models. A dataset of temporal event sequences can be represented as a data set of three-dimensional points; each point is defined by three...

    Provided By Cornell University

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // May 2015

    A Spatiotemporal Context Definition for Service Adaptation Prediction in a Pervasive Computing Environment

    Pervasive system refers to context-aware systems that can sense their context, and adapt their behavior accordingly to provide adaptable services. Pro-active adaptation of such systems allows changing the service and the context based on prediction. However, the definition of the context is still vague and not suitable to prediction. In...

    Provided By Cornell University

  • White Papers // May 2015

    Resource Management of Energy-Aware Cognitive Radio Networks and Cloud-Based Infrastructures

    The field of wireless networks has been rapidly developed during the past decade due to the increasing popularity of the mobile devices. The great demand for mobility and connectivity makes wireless networking a field whose continuous technological development is very important as new challenges and issues are arising. Many scientists...

    Provided By Cornell University

  • White Papers // Sep 2010

    Making Human Capital The Creative Core Of Strategy Execution

    In the face of intense competition and rapidly changing market requirements, business leaders must continually calculate how to achieve ambitious goals. They must confront economic uncertainty, environmental risk, social change and other volatile forces. To execute successfully in this difficult environment, they must embrace a new way of thinking, one...

    Provided By Cornell University

  • White Papers // Sep 2010

    The Role Of The World Bank In Middle Income Countries

    This paper establishes some general principles of the rationale for development assistance in Middle Income Countries and then applies these principles to the operations of the World Bank. It then puts the argument through its paces for the specific case of India, which has just transitioned into middle income status....

    Provided By Cornell University

  • White Papers // Jul 2010

    The Effect Of Advertising And Deceptive Advertising On Consumption: The Case Of Over-The-Counter Weight Loss Products

    This paper is the first to estimate the impact of exposure to deceptive advertising on consumption of the advertised product and its substitutes. They study the market for over the-counter (OTC) weight-loss products, in which deceptive advertising is rampant. Strengths of the paper include matching of specific advertisements to individual...

    Provided By Cornell University

  • White Papers // Jul 2010

    Behavioral Biases Of Mutual Fund Investors

    The authors examine the effect of behavioral biases on the mutual fund choices of a large sample of U.S. discount brokerage investors using new measures of attention to news, tax awareness, and fund-level familiarity bias, in addition to behavioral and demographic characteristics of earlier studies. Behaviorally-biased investors typically make poor...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // May 2010

    Seawall: Performance Isolation for Cloud Datacenter Networks

    While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants share the network.ˆis opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. This...

    Provided By Cornell University

  • White Papers // Jan 2011

    Networking With Secrecy Constraints

    Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when...

    Provided By Cornell University

  • White Papers // Oct 2009

    XPaXS: Improved Data Acquisition and Real-Time Analysis at CHESS

    The Scanning X-ray Fluorescence Microscopy (SFXM) capability at CHESS draws users from diverse fields, including Environmental Science, Soil Science, Anthropology and Native American Studies, Dendrochronology and Classics. When the author inherited responsibility for the F3 beamline, two of the elements essential for the success of this research program were already...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Sensor Database Systems

    Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination of stored data and sensor data. Most existing applications rely on a centralized system for collecting sensor data. These systems lack flexibility because data is extracted in...

    Provided By Cornell University

  • White Papers // Apr 2010

    Self-Replicating Objects for Multicore Platforms

    The paper introduces Self-Replicating Objects (SROs), a new concurrent programming abstraction. An SRO is implemented and used much like an ordinary .NET object and can expose arbitrary user-defined APIs, but it is aggressive about automatically exploiting multicore CPUs. It does so by spontaneously and transparently partitioning its state into a...

    Provided By Cornell University

  • White Papers // Feb 2011

    Energy and Environmental Aspects of Mobile Communication Systems

    The reduction of the energy consumptions of a Telecommunication Power System represents one of the critical factors of the telecommunication technologies, both to allow a sizeable saving of economic resources and to realize "Sustainable" development actions. The consumption of about one hundred base stations for mobile phones were monitored for...

    Provided By Cornell University

  • White Papers // Feb 2011

    A Flow-Aware Mac Protocol for a Passive Optical Metropolitan Area Network

    The paper introduces an original MAC protocol for a passive optical metropolitan area network using Time-domain Wavelength Interleaved Networking (TWIN). Optical channels are shared under the distributed control of destinations using a packet-based polling algorithm. This MAC is inspired more by EPON dynamic bandwidth allocation than the slotted, GPON-like access...

    Provided By Cornell University

  • White Papers // May 2010

    Enabling Parallelization Via a Reconfigurable Chip Multiprocessor

    While reconfigurable computing has traditionally involved attaching a reconfigurable fabric to a single processor core, the prospect of large-scale CMPs calls for a reevaluation of reconfigurable computing from the perspective of multicore architectures. This paper presents ReMAPP, a reconfigurable architecture geared towards application acceleration and parallelization. In ReMAPP, parallel threads...

    Provided By Cornell University

  • White Papers // Mar 2011

    Sharing the Data Center Network

    While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as the authors show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. They present Seawall, a network...

    Provided By Cornell University

  • White Papers // Feb 2011

    Asymptotic Fingerprinting Capacity for Non-Binary Alphabets

    Watermarking provides a means for tracing the origin and distribution of digital data. Before distribution of digital content, the content is modified by applying an imperceptible WaterMark (WM), embedded using a watermarking algorithm. Once an unauthorized copy of the content is found, it is possible to trace those users who...

    Provided By Cornell University

  • White Papers // Jan 2011

    Optimal Band Allocation for Cognitive Cellular Networks

    FCC new regulation for cognitive use of the TV white space spectrum provides a new means for improving traditional cellular network performance. But it also introduces a number of technical challenges. This letter studies one of the challenges, that is, given the significant differences in the propagation property and the...

    Provided By Cornell University

  • White Papers // Jan 2010

    Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective

    This paper provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging Cognitive Radio (CR) wireless networks. Focusing on the interference-power/Interference-Temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems...

    Provided By Cornell University

  • White Papers // Jan 2010

    Applying MVC and PAC Patterns in Mobile Applications

    Additional requirements are set for mobile applications in relation to applications for desktop computers. These requirements primarily concern the support to different platforms on which such applications are performed, as well as the requirement for providing more modalities of input/output interaction. These requirements have influence on the user interface and...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cooperative Proxy Servers Architecture for VoD to Achieve High QoS With Reduced Transmission Time and Cost

    The aim of this paper is to propose a novel Voice On Demand (VoD) architecture and implementation of an efficient load sharing algorithm to achieve Quality of Service (QoS). This scheme reduces the transmission cost from the Centralized Multimedia Sever (CMS) to Proxy Servers (PS) by sharing the videos among...

    Provided By Cornell University

  • White Papers // Oct 2009

    Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

    One of the challenges in the wireless sensor applications which are gaining much attention is the real-time transmission of continuous data packets across the network. Though advances in communication in sensor networks are providing guaranteed quality data packet delivery they still have some drawbacks. One such drawback is transmission of...

    Provided By Cornell University

  • White Papers // Jan 2010

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    The authors present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, they prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing...

    Provided By Cornell University

  • White Papers // Jan 2010

    Performance and Fault Tolerance in the StoreTorrent Parallel Filesystem

    With a goal of supporting the timely and cost-effective analysis of Terabyte datasets on commodity components, the authors present and evaluate StoreTorrent, a simple distributed filesystem with integrated fault tolerance for efficient handling of small data records. The contributions include an application-OS pipelining technique and metadata structure to increase small...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fault Tolerance in Real Time Multiprocessors - Embedded Systems

    All real time tasks which are termed as critical tasks by nature have to complete its execution before its deadline, even in presence of faults. The most popularly used real time task assignment algorithms are First Fit (FF), Best Fit (BF), Bin Packing (BP).The common task scheduling algorithms are Rate...

    Provided By Cornell University

  • White Papers // Jan 2010

    Software Components for Web Services

    Service oriented software engineering has emerged to address software as a set of services which deal with user needs. Therefore a service may make call requests to a range of systems (integrated software applications) and hence the emphasis is on design flexibility. The authors need to understand the concept behind...

    Provided By Cornell University

  • White Papers // Dec 2009

    VLSI Architectures for WIMAX Channel Decoders

    WIMAX has gained a wide popularity due to the growing interest and diffusion of broadband wireless access systems. In order to be flexible and reliable WIMAX adopts several different channel codes, namely Convolutional-Codes (CC), Convolutional-TurboCodes (CTC), Block-Turbo-Codes (BTC) and Low-Density-Parity-Check (LDPC) codes, that are able to cope with different channel...

    Provided By Cornell University

  • White Papers // Jan 2010

    Rate Region of the Gaussian Scalar-Help-Vector Source-Coding Problem

    The authors determine the rate region of the Gaussian scalar-help-vector source-coding problem under a covariance matrix distortion constraint. The rate region is achieved by a Gaussian achievable scheme. They introduce a novel outer bounding technique to establish the converse of the main result. The approach is based on lower bounding...

    Provided By Cornell University

  • White Papers // Jan 2010

    Implementation of Connectivity and Handover Through Wireless Sensor Node Based Techniques

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to co-operatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as...

    Provided By Cornell University

  • White Papers // Jan 2010

    RFID Key Establishment Against Active Adversaries

    Wireless communication is the source of many opportunities and challenges, one of which being its confidentiality. A convenient way to achieve confidentiality is to use cryptography, which requires for the communicating entities to detain a cryptographic key beforehand. The authors focus on particular wireless devices, called RFID (for Radio-Frequency IDentification...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cognitive Routing With Stretched Network Awareness Through Hidden Markov Model Learning at Router Level

    The routing of packets are generally performed based on the destination address and forward link channel available from the instantaneous router without sufficient cognizance of either the performance of the forward router or forward channel characteristics. The lack of awareness of forward channel property can lead to packet loss or...

    Provided By Cornell University

  • White Papers // Jan 2011

    The Computing of Digital Ecosystems

    A primary motivation for the research in digital ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the computing technologies that contribute to these properties have not been made explicit in...

    Provided By Cornell University

  • White Papers // Jan 2010

    Towards a Participatory E-Larning 2.0

    The aim is to propose a collaborative methodological approach centred on learners and based on the Web 2.0 tools in order to make E-learning 2.0. It is based on a process consisting of four iterative steps which are: grouping, collaborating, validating and publishing content. In this context, learners will be...

    Provided By Cornell University

  • White Papers // Nov 2010

    Compressed Transmission of Route Descriptions

    The authors present two methods to compress the description of a route in a road network, i.e., of a path in a directed graph. The first method represents a path by a sequence of via edges. The subpaths between the via edges have to be unique shortest paths. Instead of...

    Provided By Cornell University

  • White Papers // Dec 2009

    Contextual Mobile Learning Strongly Related to Industrial Activities: Principles and Case Study

    M-learning (mobile learning) can take various forms. The authors are interested in contextualized M-learning, i.e. the training related to the situation physically or logically localized. Contextualization and pervasivity are important aspects of the approach. They propose in particular MOCOCO principles (Mobility - COntextualisation - COoperation) using IMERA platform (Mobile Interaction...

    Provided By Cornell University

  • White Papers // Jan 2010

    The Serializability of Network Codes

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of "Entropic...

    Provided By Cornell University

  • White Papers // Dec 2009

    Synchronization Analysis in Physical Layer Network Coding

    Physical-layer Network Coding (PNC) makes use of the additive nature of the ElectroMagnetic (EM) waves to apply network coding arithmetic at the physical layer. With PNC, the destructive effect of interference in wireless networks is eliminated and the capacity of networks can be boosted significantly. This paper addresses a key...

    Provided By Cornell University

  • White Papers // Nov 2010

    Individual Privacy vs Population Privacy: Learning to Attack Anonymization

    Over the last decade there have been great strides made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as k-anonymity and l-diversity) have been criticized...

    Provided By Cornell University

  • White Papers // Sep 2009

    Identification With Encrypted Biometric Data

    Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. This paper introduces a new method to identify someone using his biometrics in an encrypted way. The construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. The...

    Provided By Cornell University

  • White Papers // Mar 2011

    The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations

    One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here the authors discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are...

    Provided By Cornell University

  • White Papers // Mar 2011

    Multidimensional or Relational? How to Organize an On-Line Analytical Processing Database

    In the past few years, the number of On-line Analytical Processing (OLAP) applications increased quickly. These applications use two significantly different database structures: multidimensional and table-based. One can show that the traditional model of relational databases cannot make difference between these two structures. Another model is necessary to make the...

    Provided By Cornell University

  • White Papers // Mar 2011

    The Embedding Capacity of Information Flows Under Renewal Traffic

    Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e.g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding...

    Provided By Cornell University