Cornell University

Displaying 1-40 of 1227 results

  • White Papers // May 2015

    Cats&Co: Categorical Time Series Coclustering

    The authors suggest a novel method of clustering and exploratory analysis of temporal event sequences data (also known as categorical time series) based on three-dimensional data grid models. A dataset of temporal event sequences can be represented as a data set of three-dimensional points; each point is defined by three...

    Provided By Cornell University

  • White Papers // May 2015

    GPU-Accelerated Micromagnetic Simulations Using Cloud Computing

    Highly-parallel Graphics Processing Units (GPUs) can improve the speed of micromagnetic simulations significantly as compared to conventional computing using Central Processing Units (CPUs). The authors present a strategy for performing GPU-accelerated micromagnetic simulations by utilizing cost-effective GPU access offered by cloud computing services with an open-source Python-based program for running...

    Provided By Cornell University

  • White Papers // May 2015

    A Spatiotemporal Context Definition for Service Adaptation Prediction in a Pervasive Computing Environment

    Pervasive system refers to context-aware systems that can sense their context, and adapt their behavior accordingly to provide adaptable services. Pro-active adaptation of such systems allows changing the service and the context based on prediction. However, the definition of the context is still vague and not suitable to prediction. In...

    Provided By Cornell University

  • White Papers // Apr 2015

    Dynamic Bandwidth-Efficient BCube Topologies for Virtualized Data Center Networks

    Network virtualization enables computing networks and Data Center (DC) providers to manage their networking resources in a flexible manner using software running on physical computers. In this paper, the authors address the existing issues with the classic DC network topologies in virtualized environment and investigate a set of DC network...

    Provided By Cornell University

  • White Papers // Apr 2015

    Risk Perceptions for Wearable Devices

    Wearable devices or "Wearables" bring great benefits but also potential risks that could expose users' activities without their awareness or consent. In this paper, the authors report findings from the first large-scale survey conducted to investigate user security and privacy concerns regarding wearables. They surveyed 1,782 Internet users in order...

    Provided By Cornell University

  • White Papers // Apr 2015

    RIOT OS Paves the Way for Implementation of High-Performance MAC Protocols

    Implementing new, high-performance MAC protocols requires real-time features, to be able to synchronize correctly between different unrelated devices. Such features are highly desirable for operating Wireless Sensor Networks (WSNs) that are designed to be part of the Internet of Things (IoTs). Unfortunately, the operating systems commonly used in this domain...

    Provided By Cornell University

  • White Papers // Apr 2015

    Mining Semi-Structured Data

    The need for discovering knowledge from XML documents according to both structure and content features has become challenging, due to the increase in application contexts for which handling both structure and content information in XML data is essential. So, the challenge is to find an hierarchical structure which ensure a...

    Provided By Cornell University

  • White Papers // Apr 2015

    Constant-Optimized Quantum Circuits for Modular Multiplication and Exponentiation

    Reversible circuits for modular multiplication Cx%M with x < M arise as components of modular exponentiation in Shor's quantum number-factoring algorithm. However, existing generic constructions focus on asymptotic gate count and circuit depth rather than actual values, producing fairly large circuits not optimized for specific C and M values. In...

    Provided By Cornell University

  • White Papers // Apr 2015

    Evaluation of Two-Level Global Load Balancing Framework in Cloud Environment

    With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information in the cloud environment. The availability and reliability of the client systems will become increasingly important. Today...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Orchestrating Virtual Network Functions in NFV

    Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In...

    Provided By Cornell University

  • White Papers // Mar 2015

    Efficient Query Processing for SPARQL Federations with Replicated Fragments

    Low reliability and availability of public SPARQL endpoints prevent real-world applications from exploiting all the potential of these querying infrastructures. Fragmenting data on servers can improve data availability but degrades performance. Replicating fragments can offer new tradeoff between performance and availability. The authors propose FEDRA, a framework for querying Linked...

    Provided By Cornell University

  • White Papers // Mar 2015

    EmptyHeaded: Boolean Algebra Based Graph Processing

    The authors present a graph pattern engine, EmptyHeaded that uses recent algorithmic advances in join processing to compile patterns into Boolean algebra operations that exploit SIMD parallelism. The EmptyHeaded engine demonstrates that treating graph patterns as a general join processing problem can compete with and often outperform both specialized approaches...

    Provided By Cornell University

  • White Papers // Mar 2015

    Memory Networks

    In this paper, the authors describe a new class of learning models called memory networks. Memory networks reason with inference components combined with a long-term memory component; they learn how to use these jointly. The long-term memory can be read and written to, with the goal of using it for...

    Provided By Cornell University

  • White Papers // Mar 2015

    Mapping-Equivalence and Oid-Equivalence of Single-Function Object-Creating Conjunctive Queries

    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data ex-change, data integration, and ontology-based data access. Object creation generates new object identifiers in the result that do not belong to the set of constants in the source database. The new...

    Provided By Cornell University

  • White Papers // Mar 2015

    Android Based Security and Home Automation System

    The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of everyone's daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this...

    Provided By Cornell University

  • White Papers // Mar 2015

    A New Secure Mobile Cloud Architecture

    The demand and use of mobile phones, PDAs and smart phones are constantly on the rise as such, manufacturers of these devices are improving the technology and usability of these devices constantly. Due to the handy shape and size these devices come in, their processing capabilities and functionalities, they are...

    Provided By Cornell University

  • White Papers // Mar 2015

    On Defining SPARQL with Boolean Tensor Algebra

    The Resource Description Framework (RDF) represents information as subject - predicate - object triples. These triples are commonly interpreted as a directed labelled graph. The authors propose an alternative approach, interpreting the data as a 3-way Boolean tensor. They show how SPARQL queries - the standard queries for RDF -...

    Provided By Cornell University

  • White Papers // Feb 2015

    Designing Applications with Distributed Databases in a Hybrid Cloud

    The authors present a set of technological approaches for efficient application development in a hybrid cloud infrastructure. Under the hybrid cloud infrastructure, they understand the distributed databases in the private and public cloud, as well as communication channels and programs providing the interaction between the components of the database. Designing...

    Provided By Cornell University

  • White Papers // Feb 2015

    Mathematical Modeling of Insurance Mechanisms for E-commerce Systems

    Electronic commerce (a.k.a. E-commerce) systems such as eBay and Taobao of Alibaba are becoming increasingly popular. Having an effective reputation system is critical to this type of internet service because it can assist buyers to evaluate the trustworthiness of sellers and it can also improve the revenue for reputable sellers...

    Provided By Cornell University

  • White Papers // Feb 2015

    Evaluation of Security Solutions for Android Systems

    With the increasing usage of Smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not always properly designed for Smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the...

    Provided By Cornell University

  • White Papers // Feb 2015

    Fraudulent Electronic Transaction Detection Using Dynamic KDA Model

    Clustering analysis and data mining methodologies were applied to the problem of identifying illegal and fraud transactions. The researchers independently developed model and software using data provided by a bank and using rapid-miner modeling tool. This paper is to propose dynamic model and mechanism to cover fraud detection system limitations....

    Provided By Cornell University

  • White Papers // Jan 2015

    The Affinity Effects of Parallelized Libraries in Concurrent Environments

    The use of cloud computing grows as it appears to be an additional resource for High-performance Parallel and Distributed Computing (HPDC), especially with respect to its use in support of scientific applications. Many studies have been devoted to determining the effect of the virtualization layer on the performance, but most...

    Provided By Cornell University

  • White Papers // Jan 2015

    Photometric Redshift Estimation Based on Data Mining with PhotoRApToR

    The ever growing amount of astronomical data provided by the new large scale digital surveys in a wide range of wavelengths of the electromagnetic spectrum has been challenging the way astronomers carry out their everyday analysis of astronomical sources and the authors can safely assert that the human ability to...

    Provided By Cornell University

  • White Papers // Jan 2015

    Phase-Sensitive Detection in the Undergraduate Lab Using a Low-Cost Microcontroller

    Phase-Sensitive Detection (PSD) is an important experimental technique that allows signals to be extracted from noisy data. PSD is also used in modulation spectroscopy and is used in the stabilization of optical sources. Commercial lock-in amplifiers that use PSD are often expensive and host a bewildering array of controls that...

    Provided By Cornell University

  • White Papers // Jan 2015

    Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements

    In this paper, the authors develop a new technique for estimating fine clock errors and range between two nodes simultaneously by two-way time-of-arrival measurements using impulse-radio ultra-wideband signals. Estimators for clock parameters and the range are proposed that are robust with respect to outliers. They are analyzed numerically and by...

    Provided By Cornell University

  • White Papers // Jan 2015

    Sketch and Validate for Big Data Clustering

    In response to the need for learning tools tuned to big data analytics, the present paper introduces a framework for efficient clustering of huge sets of (possibly high-dimensional) data. Building on RANdom Sampling And Consensus (RANSAC) ideas pursued earlier in a different (computer vision) context for robust regression, a suite...

    Provided By Cornell University

  • White Papers // Jan 2015

    QoE-Centric Localized Mobility Management for Future Mobile Networks

    Mobility support in future networks will be predominately based on micro mobility protocols. Current proposed schemes such as Hierarchical Mobile IPv6 (HMIPv6) and more importantly Proxy Mobile IPv6 (PMIPv6) provide localized mobility support by electing a node within the network (topologically close to the Access Routers (AR)) to act as...

    Provided By Cornell University

  • White Papers // Jan 2015

    Designing Low Cost and Energy Efficient Access Network for the Developing World

    The authors' main observation is the existence of users that allow switching o the networking devices during night hours. However, it is not straightforward to implement the energy savings as the network topology is a tree in which any switched o node may imply disconnection of the users. The issue...

    Provided By Cornell University

  • White Papers // Jan 2015

    Seeking Black Lining in Cloud

    In this paper, the authors focus on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis...

    Provided By Cornell University

  • White Papers // Jan 2015

    Cloud-Assisted Remote Sensor Network Virtualization for Distributed Consensus Estimation

    In this paper, the authors develop cloud-assisted remote sensing techniques for enabling distributed consensus estimation of unknown parameters in a given geographic area. They first propose a distributed sensor network virtualization algorithm that searches for, selects, and coordinates Internet-accessible sensors to perform a sensing task in a specific region. The...

    Provided By Cornell University

  • White Papers // Jan 2015

    Open-Source Software Implications in the Competitive Mobile Platforms Market

    The era of the PC platform left a legacy of competitive strategies for the future technologies to follow. However, this notion became more complicated, once the future grew out to be a present with huge bundle of innovative technologies, Internet capabilities, communication possibilities, and ease in life. A major step...

    Provided By Cornell University

  • White Papers // Jan 2015

    Microcontroller-based Locking in Optics Experiments

    Optics experiments critically require the stable and accurate locking of relative phases between light beams or the stabilization of Fabry-Perot cavity lengths. Here, the authors present a simple and inexpensive technique based on a stand-alone microcontroller unit to perform such tasks. Easily programmed in C language, this reconfigurable digital locking...

    Provided By Cornell University

  • White Papers // Jan 2015

    Limits on Fundamental Limits to Computation

    An indispensable part of everyone's lives, computing has also become essential to industries and governments. Steady improvements in computer hardware have been supported by periodic doubling of transistor densities in integrated circuits over the last fifty years. Such Moore scaling now requires increasingly heroic efforts, stimulating research in alternative hardware...

    Provided By Cornell University

  • White Papers // Jan 2015

    High-level Synthesis under I/O Timing and Memory Constraints

    The design of complex systems-on-chip implies to take into account communication and memory access constraints for the integration of dedicated hardware accelerator. In this paper, the authors present a methodology and a tool that allow the high-level synthesis of DSP algorithm, under both I/O timing and memory constraints. Based on...

    Provided By Cornell University

  • White Papers // Jan 2015

    A Novel Architecture for Improving Performance Under Virtualized Environments

    Even though virtualization provides a lot of advantages in cloud computing, it does not provide effective performance isolation between the virtualization machines. In other words, the performance may get affected due the interferences caused by co-virtual machines. This can be achieved by the proper management of resource allocations between the...

    Provided By Cornell University

  • White Papers // Dec 2014

    Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs

    Data processing systems impose multiple views on data as it is processed by the system. These views include spreadsheets, databases, matrices, and graphs. The common theme amongst these views is the need to store and operate on data as whole sets instead of as individual data elements. This paper describes...

    Provided By Cornell University

  • White Papers // Dec 2014

    Graph Analytics Using the Vertica Relational Database

    Graph analytics is becoming increasingly popular, with a deluge of new systems for graph analytics having been proposed in the past few years. These systems often start from the assumption that a new storage or query processing system is needed, in spite of graph data being often collected and stored...

    Provided By Cornell University

  • White Papers // Dec 2014

    Memcomputing NP-Complete Problems in Polynomial Time Using Polynomial Resources and Collective States

    Memcomputing is a novel non-Turing paradigm of computation that uses interacting memory cells (memprocessors for short) to store and process information on the same physical platform. It was recently proved mathematically that memcomputing machines have the same computational power of non-deterministic Turing machines. Therefore they can solve NP-complete problems in...

    Provided By Cornell University

  • White Papers // Dec 2014

    Material Recognition in the Wild with the Materials in Context Database

    Recognizing materials in images in the wild is a challenging task. Real-world materials have rich surface texture, geometry, lighting conditions, and clutter, which combine to make the problem particularly difficult. Recently, deep learning combined with large datasets is proving to be an effective approach to tackling hard problems in scene...

    Provided By Cornell University

  • White Papers // Nov 2014

    Survey of End-to-End Mobile Network Measurement Testbeds

    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, research, development, and regulatory communities have taken an increased interest in measuring mobile network performance and its impact on...

    Provided By Cornell University

  • White Papers // Sep 2010

    Making Human Capital The Creative Core Of Strategy Execution

    In the face of intense competition and rapidly changing market requirements, business leaders must continually calculate how to achieve ambitious goals. They must confront economic uncertainty, environmental risk, social change and other volatile forces. To execute successfully in this difficult environment, they must embrace a new way of thinking, one...

    Provided By Cornell University

  • White Papers // Sep 2010

    The Role Of The World Bank In Middle Income Countries

    This paper establishes some general principles of the rationale for development assistance in Middle Income Countries and then applies these principles to the operations of the World Bank. It then puts the argument through its paces for the specific case of India, which has just transitioned into middle income status....

    Provided By Cornell University

  • White Papers // Jul 2010

    The Effect Of Advertising And Deceptive Advertising On Consumption: The Case Of Over-The-Counter Weight Loss Products

    This paper is the first to estimate the impact of exposure to deceptive advertising on consumption of the advertised product and its substitutes. They study the market for over the-counter (OTC) weight-loss products, in which deceptive advertising is rampant. Strengths of the paper include matching of specific advertisements to individual...

    Provided By Cornell University

  • White Papers // Jul 2010

    Behavioral Biases Of Mutual Fund Investors

    The authors examine the effect of behavioral biases on the mutual fund choices of a large sample of U.S. discount brokerage investors using new measures of attention to news, tax awareness, and fund-level familiarity bias, in addition to behavioral and demographic characteristics of earlier studies. Behaviorally-biased investors typically make poor...

    Provided By Cornell University

  • White Papers // Jun 2010

    Improving Enterprise Decision-Making: The Benefits Of Metric Commonality

    The objective of this research is to identify a new approach in managing, and making internal program-level decisions from, externally tracked performance metrics. Industry observations indicate the increasing challenge for program managers and internal development teams to identify performance improvement opportunities for products, services, organizations, etc., in an effective and...

    Provided By Cornell University

  • White Papers // Aug 2009

    The U.S. Automotive Industry: National And State Trends In Manufacturing Employment

    The U.S. motor vehicle manufacturing industry' employs 880,000 workers, or approximately 6.6% of the U.S. manufacturing workforce, including those who work in the large motor vehicle parts manufacturing sector, as well as those who assemble motor vehicles. Since the beginning of the decade, the nation's automotive manufacturing sector has eliminated...

    Provided By Cornell University

  • White Papers // May 2010

    Seawall: Performance Isolation for Cloud Datacenter Networks

    While today's virtual datacenters have hypervisor based mechanisms to partition compute resources between the tenants co-located on an end host, they provide little control over how tenants share the network.&#136;is opens cloud applications to interference from other tenants, resulting in unpredictable performance and exposure to denial of service attacks. This...

    Provided By Cornell University

  • White Papers // Jan 2011

    Networking With Secrecy Constraints

    Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when...

    Provided By Cornell University

  • White Papers // Oct 2009

    XPaXS: Improved Data Acquisition and Real-Time Analysis at CHESS

    The Scanning X-ray Fluorescence Microscopy (SFXM) capability at CHESS draws users from diverse fields, including Environmental Science, Soil Science, Anthropology and Native American Studies, Dendrochronology and Classics. When the author inherited responsibility for the F3 beamline, two of the elements essential for the success of this research program were already...

    Provided By Cornell University

  • White Papers // Jan 2011

    Towards Sensor Database Systems

    Sensor networks are being widely deployed for measurement, detection and surveillance applications. In these new applications, users issue long-running queries over a combination of stored data and sensor data. Most existing applications rely on a centralized system for collecting sensor data. These systems lack flexibility because data is extracted in...

    Provided By Cornell University

  • White Papers // Aug 2009

    Network Security and the Need to Consider Provider Coordination in Network Access Policy

    The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness - a set of properties (Including security) that guarantee that a network will behave as expected. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination,...

    Provided By Cornell University

  • White Papers // Apr 2010

    Self-Replicating Objects for Multicore Platforms

    The paper introduces Self-Replicating Objects (SROs), a new concurrent programming abstraction. An SRO is implemented and used much like an ordinary .NET object and can expose arbitrary user-defined APIs, but it is aggressive about automatically exploiting multicore CPUs. It does so by spontaneously and transparently partitioning its state into a...

    Provided By Cornell University

  • White Papers // Aug 2009

    Is Dual Agency In Real Estate Transactions A Cause For Concern?

    The authors study dual agency in residential real estate, where the same agent/agency represents both the buyer and seller. They assess the extent to which dual agency suffers from an inherent conflict of interest, where the dual agent furthers the interest of one client at the expense of the other...

    Provided By Cornell University

  • White Papers // Feb 2011

    Energy and Environmental Aspects of Mobile Communication Systems

    The reduction of the energy consumptions of a Telecommunication Power System represents one of the critical factors of the telecommunication technologies, both to allow a sizeable saving of economic resources and to realize "Sustainable" development actions. The consumption of about one hundred base stations for mobile phones were monitored for...

    Provided By Cornell University

  • White Papers // Feb 2011

    A Flow-Aware Mac Protocol for a Passive Optical Metropolitan Area Network

    The paper introduces an original MAC protocol for a passive optical metropolitan area network using Time-domain Wavelength Interleaved Networking (TWIN). Optical channels are shared under the distributed control of destinations using a packet-based polling algorithm. This MAC is inspired more by EPON dynamic bandwidth allocation than the slotted, GPON-like access...

    Provided By Cornell University

  • White Papers // May 2010

    Enabling Parallelization Via a Reconfigurable Chip Multiprocessor

    While reconfigurable computing has traditionally involved attaching a reconfigurable fabric to a single processor core, the prospect of large-scale CMPs calls for a reevaluation of reconfigurable computing from the perspective of multicore architectures. This paper presents ReMAPP, a reconfigurable architecture geared towards application acceleration and parallelization. In ReMAPP, parallel threads...

    Provided By Cornell University

  • White Papers // Mar 2011

    Sharing the Data Center Network

    While today's data centers are multiplexed across many non-cooperating applications, they lack effective means to share their network. Relying on TCP's congestion control, as the authors show from experiments in production data centers, opens up the network to denial of service attacks and performance interference. They present Seawall, a network...

    Provided By Cornell University

  • White Papers // Feb 2011

    Asymptotic Fingerprinting Capacity for Non-Binary Alphabets

    Watermarking provides a means for tracing the origin and distribution of digital data. Before distribution of digital content, the content is modified by applying an imperceptible WaterMark (WM), embedded using a watermarking algorithm. Once an unauthorized copy of the content is found, it is possible to trace those users who...

    Provided By Cornell University

  • White Papers // Jan 2011

    Optimal Band Allocation for Cognitive Cellular Networks

    FCC new regulation for cognitive use of the TV white space spectrum provides a new means for improving traditional cellular network performance. But it also introduces a number of technical challenges. This letter studies one of the challenges, that is, given the significant differences in the propagation property and the...

    Provided By Cornell University

  • White Papers // Jan 2010

    Dynamic Resource Allocation in Cognitive Radio Networks: A Convex Optimization Perspective

    This paper provides an overview of the state-of-art results on communication resource allocation over space, time, and frequency for emerging Cognitive Radio (CR) wireless networks. Focusing on the interference-power/Interference-Temperature (IT) constraint approach for CRs to protect primary radio transmissions, many new and challenging problems regarding the design of CR systems...

    Provided By Cornell University

  • White Papers // Jan 2010

    Applying MVC and PAC Patterns in Mobile Applications

    Additional requirements are set for mobile applications in relation to applications for desktop computers. These requirements primarily concern the support to different platforms on which such applications are performed, as well as the requirement for providing more modalities of input/output interaction. These requirements have influence on the user interface and...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cooperative Proxy Servers Architecture for VoD to Achieve High QoS With Reduced Transmission Time and Cost

    The aim of this paper is to propose a novel Voice On Demand (VoD) architecture and implementation of an efficient load sharing algorithm to achieve Quality of Service (QoS). This scheme reduces the transmission cost from the Centralized Multimedia Sever (CMS) to Proxy Servers (PS) by sharing the videos among...

    Provided By Cornell University

  • White Papers // Oct 2009

    Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

    One of the challenges in the wireless sensor applications which are gaining much attention is the real-time transmission of continuous data packets across the network. Though advances in communication in sensor networks are providing guaranteed quality data packet delivery they still have some drawbacks. One such drawback is transmission of...

    Provided By Cornell University

  • White Papers // Jan 2010

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    The authors present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, they prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing...

    Provided By Cornell University

  • White Papers // Jan 2010

    Performance and Fault Tolerance in the StoreTorrent Parallel Filesystem

    With a goal of supporting the timely and cost-effective analysis of Terabyte datasets on commodity components, the authors present and evaluate StoreTorrent, a simple distributed filesystem with integrated fault tolerance for efficient handling of small data records. The contributions include an application-OS pipelining technique and metadata structure to increase small...

    Provided By Cornell University

  • White Papers // Jan 2010

    Fault Tolerance in Real Time Multiprocessors - Embedded Systems

    All real time tasks which are termed as critical tasks by nature have to complete its execution before its deadline, even in presence of faults. The most popularly used real time task assignment algorithms are First Fit (FF), Best Fit (BF), Bin Packing (BP).The common task scheduling algorithms are Rate...

    Provided By Cornell University

  • White Papers // Jan 2010

    Software Components for Web Services

    Service oriented software engineering has emerged to address software as a set of services which deal with user needs. Therefore a service may make call requests to a range of systems (integrated software applications) and hence the emphasis is on design flexibility. The authors need to understand the concept behind...

    Provided By Cornell University

  • White Papers // Dec 2009

    VLSI Architectures for WIMAX Channel Decoders

    WIMAX has gained a wide popularity due to the growing interest and diffusion of broadband wireless access systems. In order to be flexible and reliable WIMAX adopts several different channel codes, namely Convolutional-Codes (CC), Convolutional-TurboCodes (CTC), Block-Turbo-Codes (BTC) and Low-Density-Parity-Check (LDPC) codes, that are able to cope with different channel...

    Provided By Cornell University

  • White Papers // Jan 2010

    Rate Region of the Gaussian Scalar-Help-Vector Source-Coding Problem

    The authors determine the rate region of the Gaussian scalar-help-vector source-coding problem under a covariance matrix distortion constraint. The rate region is achieved by a Gaussian achievable scheme. They introduce a novel outer bounding technique to establish the converse of the main result. The approach is based on lower bounding...

    Provided By Cornell University

  • White Papers // Jan 2010

    Implementation of Connectivity and Handover Through Wireless Sensor Node Based Techniques

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to co-operatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as...

    Provided By Cornell University

  • White Papers // Jan 2010

    RFID Key Establishment Against Active Adversaries

    Wireless communication is the source of many opportunities and challenges, one of which being its confidentiality. A convenient way to achieve confidentiality is to use cryptography, which requires for the communicating entities to detain a cryptographic key beforehand. The authors focus on particular wireless devices, called RFID (for Radio-Frequency IDentification...

    Provided By Cornell University

  • White Papers // Jan 2010

    Cognitive Routing With Stretched Network Awareness Through Hidden Markov Model Learning at Router Level

    The routing of packets are generally performed based on the destination address and forward link channel available from the instantaneous router without sufficient cognizance of either the performance of the forward router or forward channel characteristics. The lack of awareness of forward channel property can lead to packet loss or...

    Provided By Cornell University

  • White Papers // Jan 2011

    The Computing of Digital Ecosystems

    A primary motivation for the research in digital ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the computing technologies that contribute to these properties have not been made explicit in...

    Provided By Cornell University

  • White Papers // Jan 2010

    Towards a Participatory E-Larning 2.0

    The aim is to propose a collaborative methodological approach centred on learners and based on the Web 2.0 tools in order to make E-learning 2.0. It is based on a process consisting of four iterative steps which are: grouping, collaborating, validating and publishing content. In this context, learners will be...

    Provided By Cornell University

  • White Papers // Aug 2009

    On Capacity Scaling in Arbitrary Wireless Networks

    recent work, Ozgur, Leveque, and Tse (2007) obtained a complete scaling characterization of throughput scaling for random extended wireless networks (i.e., n nodes are placed uniformly at random in a square region of area n). They showed that for small path-loss exponents ???? (2, 3] cooperative communication is order optimal,...

    Provided By Cornell University

  • White Papers // Nov 2010

    Compressed Transmission of Route Descriptions

    The authors present two methods to compress the description of a route in a road network, i.e., of a path in a directed graph. The first method represents a path by a sequence of via edges. The subpaths between the via edges have to be unique shortest paths. Instead of...

    Provided By Cornell University

  • White Papers // Dec 2009

    Contextual Mobile Learning Strongly Related to Industrial Activities: Principles and Case Study

    M-learning (mobile learning) can take various forms. The authors are interested in contextualized M-learning, i.e. the training related to the situation physically or logically localized. Contextualization and pervasivity are important aspects of the approach. They propose in particular MOCOCO principles (Mobility - COntextualisation - COoperation) using IMERA platform (Mobile Interaction...

    Provided By Cornell University

  • White Papers // Jan 2010

    The Serializability of Network Codes

    Network coding theory studies the transmission of information in networks whose vertices may perform nontrivial encoding and decoding operations on data as it passes through the network. The main approach to deciding the feasibility of network coding problems aims to reduce the problem to optimization over a polytope of "Entropic...

    Provided By Cornell University

  • White Papers // Dec 2009

    Synchronization Analysis in Physical Layer Network Coding

    Physical-layer Network Coding (PNC) makes use of the additive nature of the ElectroMagnetic (EM) waves to apply network coding arithmetic at the physical layer. With PNC, the destructive effect of interference in wireless networks is eliminated and the capacity of networks can be boosted significantly. This paper addresses a key...

    Provided By Cornell University

  • White Papers // Nov 2010

    Individual Privacy vs Population Privacy: Learning to Attack Anonymization

    Over the last decade there have been great strides made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as k-anonymity and l-diversity) have been criticized...

    Provided By Cornell University