Drexel University

Displaying 1-37 of 37 results

  • White Papers // Jul 2013

    Toward an Automatic, Online Behavioral Malware Classification System

    Malware authors are increasingly using specialized toolkits and obfuscation techniques to modify existing malware and avoid detection by traditional antivirus software. The resulting proliferation of obfuscated malware variants poses a challenge to antivirus vendors, who must create signatures to detect each new malware variant. Although the many variants in a...

    Provided By Drexel University

  • White Papers // Jun 2013

    A New Computational Approach for Determining Rate Regions and Optimal Codes for Coded Networks

    A new computational technique is presented for determining rate regions for coded networks. The technique directly manipulates the extreme ray representation of inner and outer bounds for the region of entropic vectors. The authors use new inner bounds on region of entropic vectors based on conic hull of ranks of...

    Provided By Drexel University

  • White Papers // Aug 2012

    ODYS: A Massively-Parallel Search Engine Using a DB-IR Tightly-Integrated Parallel DBMS

    Recently, parallel search engines have been implemented based on scalable distributed file systems such as Google File System. However, the authors claim that building a massively-parallel search engine using a parallel DBMS can be an attractive alternative since it supports a higher-level (i.e., SQL-level) interface than that of a distributed...

    Provided By Drexel University

  • White Papers // Jul 2012

    A Computational Approach for Determining Rate Regions and Codes Using Entropic Vector Bounds

    A computational technique for determining rate regions for networks and multilevel diversity coding systems based on inner and outer bounds for the region of entropic vectors is discussed. An inner bound based on binary representable matroids is discussed that has the added benefit of identifying optimal linear codes. The technique...

    Provided By Drexel University

  • White Papers // Mar 2012

    Rate Region for a Class of Delay Mitigating Codes and P2P Networks

    This paper identifies the relevance of a distributed source coding problem first formulated by Yeung and Zhang in 1999 to two applications in network design: the design of delay mitigating codes, and the design of network coded P2P networks. When transmitting time-sensitive frames from a source to a destination over...

    Provided By Drexel University

  • White Papers // Jan 2012

    Cooperative Topology Control With Adaptation for Improved Lifetime in Wireless Ad Hoc Networks

    Topology control algorithms allow each node in a wireless multi-hop network to adjust the power at which it makes its transmissions and choose the set of neighbors with which it communicates directly, while preserving global goals such as connectivity or coverage. This allows each node to conserve energy and contribute...

    Provided By Drexel University

  • White Papers // Jan 2012

    Flexible Register Management using Reference Counting

    Conventional out-of-order processors that use a unified physical register file allocate and reclaim registers explicitly using a free list that operates as a circular queue. The authors describe and evaluate a more flexible register management scheme - reference counting. They implement reference counting using a bit-matrix with a column for...

    Provided By Drexel University

  • White Papers // Sep 2011

    Diagnosis of Software Failures Using Computational Geometry

    Complex software systems have become commonplace in modern organizations and are considered critical to their daily operations. They are expected to run on a diverse set of platforms while interoperating with a wide variety of other applications. Although there have been advances in the discipline of software engineering, software faults,...

    Provided By Drexel University

  • White Papers // Sep 2011

    Longest Edge Routing on the Spatial Aloha Graph

    The Multihop Spatial Reuse Aloha (MSR-Aloha) protocol was recently introduced by Baccelli et al., where each transmitter selects the receiver among its feasible next hops that maximizes the forward progress of the head of line packet towards its final destination. They identify the optimal Medium Access Probability (MAP) that maximizes...

    Provided By Drexel University

  • White Papers // Sep 2011

    On the Maintenance of UI-Integrated Mashup Applications

    This paper describes the maintenance of long-lived mashup applications that are integrated at the User Interface (UI) layer. It presents techniques that help mashup developers to maintain applications by identifying when and how the original applications' UIs change. It describes a novel mashup editing environment that can be used to...

    Provided By Drexel University

  • White Papers // May 2011

    Energy and Environmental Aspects of Data Centers

    Data centers have become an essential operational component of nearly every sector of the economy, and as a result growing consumers of energy and emitters of Green-House Gases (GHGs). Developing strategies for optimizing power usage and reducing the associated life cycle GHG emissions are critical priorities for meeting climate policy...

    Provided By Drexel University

  • White Papers // Mar 2011

    Risk Management Of Precious Metals

    This paper examines volatility and correlation dynamics in price returns of gold, silver, platinum and palladium, and explores the corresponding risk management implications for market risk and hedging. Value-at-Risk (VaR) is used to analyze the downside market risk associated with investments in precious metals, and to design optimal risk management...

    Provided By Drexel University

  • White Papers // Feb 2011

    Practical Codes for Lossy Compression When Side Information May Be Absent

    Practical codes are developed for quadratic Gaussian lossy compression when side information may be absent by hybridizing Successively Refinable Trellis Coded Quantization (SR-TCQ) and Low-Density Parity-Check (LDPC) codes. A 2-refinement level SR-TCQ is used to generate a common description for both decoders and an individual description for the decoder with...

    Provided By Drexel University

  • White Papers // Jan 2011

    SDC Testbed: Software Defined Communications Testbed for Wireless Radio and Optical Networking

    This paper describes the development of a new Software Defined Communications (SDC) testbed architecture. SDC aims to generalize the area of software defined radio to include propagation media not exclusively limited to radio frequencies (optical, ultrasonic, etc.). This SDC platform leverages existing and custom hardware in combination with reference software...

    Provided By Drexel University

  • White Papers // Jan 2011

    Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications

    Recently there has been a shift in distributed computing from middleware-oriented architectures to Service Oriented Architectures (SOA). However, security is a crucial requirement for the serious usage and adoption of the services technology. This paper discusses a number of security standards in the context of SOA and argues the need...

    Provided By Drexel University

  • White Papers // Jan 2011

    Application of SOA in Content Management Systems (CMS)

    There exists a large genre of Content Management System in the domain of finance, insurance, and retail industries. In real world systems, data frequently comes from various sources including relational databases, custom data access layers and XML. Most of the existing Content Management Systems are limited by incompatible data formats...

    Provided By Drexel University

  • White Papers // Sep 2010

    Detecting Software Modularity Violations

    This paper presents Clio, an approach that detects modularity violations, which can cause software defects, modularity decay, or expensive refactorings. Clio computes the discrepancies between how components should change together based on the modular structure, and how components actually change together as revealed in version histories. The authors evaluated Clio...

    Provided By Drexel University

  • White Papers // Aug 2010

    Reverse Engineering Utility Functions using Genetic Programming to Detect Anomalous Behavior in Software

    Recent studies have shown the promise of using utility functions to detect anomalous behavior in software systems at runtime. However, it remains a challenge for software engineers to hand-craft a utility function that achieves both a high precision (i.e., few false alarms) and a high recall (i.e., few undetected faults)....

    Provided By Drexel University

  • White Papers // Jun 2010

    Sources Of Gains In Corporate Mergers: Refined Tests From A Neglected Industry

    This paper provides refined tests of the existence and source of merger gains in a neglected industry: utilities. While excluded from traditional analyses, utilities offer fertile ground for a detailed analysis of the traditional theories of synergy, collusion, hubris and anticipation. The analysis of utilities provides methodological advantages and is...

    Provided By Drexel University

  • White Papers // Jun 2010

    Coding Perspectives for Collaborative Estimation Over Networks

    A collaborative distributed estimation problem over a communication constrained network is considered from an information theory perspective. A suitable architecture for the codes for this multi-terminal information theory problem is determined under source-channel separation. In particular, distributed source codes in which each node multicasts a different message to each subset...

    Provided By Drexel University

  • White Papers // Mar 2010

    On Improving the Representation of a Region Achieved by a Sensor Network

    This paper considers the class of applications of sensor networks in which each sensor node makes measurements, such as temperature or humidity, at the precise location of the node. Such spot-sensing applications approximate the physical condition of the entire region of interest by the measurements made at only the points...

    Provided By Drexel University

  • White Papers // Jan 2010

    Page-Differential Logging: An Efficient and DBMS-independent Approach for Storing Data into Flash Memory

    Flash memory is widely used as the secondary storage in lightweight computing devices due to its outstanding advantages over magnetic disks. Flash memory has many access characteristics different from those of magnetic disks, and how to take advantage of them is becoming an important research issue. There are two existing...

    Provided By Drexel University

  • White Papers // Jan 2010

    Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security

    The authors consider a cooperative wireless network in the presence of one of more eavesdroppers, and exploit node cooperation for achieving PHYsical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a Decode-and-Forward (DF)...

    Provided By Drexel University

  • White Papers // Jan 2010

    Performance Comparison and Analysis of Two QoS Schemes: SWAN and Diffserv

    This paper compares and analyzes the performance of two QoS schemes for MANETs: SWAN and DiffServ. The comparison is performed both qualitatively and quantitatively (by simulations). Authors also suggest a hybrid QoS model which combines the merits of the two models to produce an effective QoS model for MANETs. Quality...

    Provided By Drexel University

  • White Papers // Dec 2009

    Coding Perspectives for Collaborative Distributed Estimation Over Networks

    A collaborative distributed estimation problem over a communication constrained network is considered from an information theory perspective. It is shown that the distributed estimation problem is related to multi-terminal information theory and a suitable architecture for the codes for this multi-terminal information theory problem is determined under source-channel separation. In...

    Provided By Drexel University

  • White Papers // Dec 2009

    The Ubiquitous DBMS

    Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigators, and Ultra Mobile PCs (UMPCs). The authors term the database systems that are customizable for small computing devices as Ubiquitous DataBase Management Systems...

    Provided By Drexel University

  • White Papers // Nov 2009

    A New Distributed Topology Control Algorithm for Wireless Environments with Non-Uniform Path Loss and Multipath Propagation

    Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors with which it directly communicates. Many previous algorithms for distributed topology control have assumed an ability at each node...

    Provided By Drexel University

  • White Papers // Sep 2009

    ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation

    A cross-layer scheme, namely ALOHA with Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmissions occur in a time-slotted ALOHA-type fashion but with an important difference: simultaneous transmissions of two users can be successful. If more than two users transmit in the same slot...

    Provided By Drexel University

  • White Papers // Sep 2009

    Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels

    The authors consider a Gaussian Multiple-Input Multiple-Output (MIMO) wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each node equipped with multiple antennas. They study the problem of finding the optimal input covariance matrix that achieves secrecy capacity subject to a power constraint, which leads...

    Provided By Drexel University

  • White Papers // Aug 2009

    From Retrospect to Prospect: Assessing Modularity and Stability From Software Architecture

    Architecture-level decisions, directly influenced by environmental factors, are crucial to preserve modularity and stability throughout software development life-cycle. Tradeoffs of modularization alternatives, such as aspect-oriented vs. object-oriented decompositions, thus need to be assessed from architecture models instead of source code. In this paper, the authors present a suite of architecture-level...

    Provided By Drexel University

  • White Papers // Aug 2009

    Trade Liberalization, Firm Heterogeneity, And Layoffs: An Empirical Investigation

    In this paper, the authors attempted to fill a gap between the vast amount of theoretical literature devoted to studying the interactions between firm productivity, trade, and trade liberalization, and the lack of empirical evidence for these relationships when labor markets are in question. The main contribution of their work...

    Provided By Drexel University

  • White Papers // Aug 2009

    A Tutorial on Transmission Capacity

    This paper unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or ad hoc networks, the Transmission Capacity (TC) framework allows for quantification of achievable...

    Provided By Drexel University

  • White Papers // Jul 2009

    Cooperative Jamming for Wireless Physical Layer Security

    Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper,...

    Provided By Drexel University

  • White Papers // Jun 2009

    Thr2csp: Toward Transforming Threads Into Communicating Sequential Processes

    As multicore and heterogeneous multiprocessor platforms replace uni-processor systems, software programs must be designed with a greater emphasis on concurrency. Threading has become the dominant paradigm of concurrent computation in the most popular programming languages. Large threaded programs are known to be difficult to implement correctly, comprehend, and maintain, while...

    Provided By Drexel University

  • White Papers // Jul 2008

    A Logical Model and Data Placement Strategies for Mems Storage Devices

    MEMS storage devices are new non-volatile secondary storages that have outstanding advantages over magnetic disks. MEMS storage devices, however, are much different from magnetic disks in the structure and access characteristics. They have thousands of heads called probe tips and provide the following two major access facilities: flexibility : freely...

    Provided By Drexel University

  • White Papers // Sep 2006

    Determining Factors for the Adoption of e-Business: The Case of SMEs in Korea

    In this paper, the authors investigate the determining factors of the successful adoption of e-business by Small and Medium sized Enterprises (SMEs) in Korea using survey data. After the major determining factors were identified from the innovation adoption literature and were extracted by applying the principal component analysis to the...

    Provided By Drexel University

  • White Papers // Jun 2004

    Deciding When to Switch Tasks in Time-Critical Multitasking

    While cognitive modeling has begun to make good progress in accounting for human multitasking behavior, current models typically focus on externally-driven task switching in laboratory-task settings. In contrast, many real-world complex tasks, particularly time-critical tasks, involve internally-driven multitasking in which the person her/himself decides when to switch between tasks. This...

    Provided By Drexel University

  • White Papers // Jun 2004

    Deciding When to Switch Tasks in Time-Critical Multitasking

    While cognitive modeling has begun to make good progress in accounting for human multitasking behavior, current models typically focus on externally-driven task switching in laboratory-task settings. In contrast, many real-world complex tasks, particularly time-critical tasks, involve internally-driven multitasking in which the person her/himself decides when to switch between tasks. This...

    Provided By Drexel University

  • White Papers // Jan 2010

    Performance Comparison and Analysis of Two QoS Schemes: SWAN and Diffserv

    This paper compares and analyzes the performance of two QoS schemes for MANETs: SWAN and DiffServ. The comparison is performed both qualitatively and quantitatively (by simulations). Authors also suggest a hybrid QoS model which combines the merits of the two models to produce an effective QoS model for MANETs. Quality...

    Provided By Drexel University

  • White Papers // Sep 2009

    Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels

    The authors consider a Gaussian Multiple-Input Multiple-Output (MIMO) wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each node equipped with multiple antennas. They study the problem of finding the optimal input covariance matrix that achieves secrecy capacity subject to a power constraint, which leads...

    Provided By Drexel University

  • White Papers // Sep 2009

    ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation

    A cross-layer scheme, namely ALOHA with Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmissions occur in a time-slotted ALOHA-type fashion but with an important difference: simultaneous transmissions of two users can be successful. If more than two users transmit in the same slot...

    Provided By Drexel University

  • White Papers // Mar 2010

    On Improving the Representation of a Region Achieved by a Sensor Network

    This paper considers the class of applications of sensor networks in which each sensor node makes measurements, such as temperature or humidity, at the precise location of the node. Such spot-sensing applications approximate the physical condition of the entire region of interest by the measurements made at only the points...

    Provided By Drexel University

  • White Papers // Nov 2009

    A New Distributed Topology Control Algorithm for Wireless Environments with Non-Uniform Path Loss and Multipath Propagation

    Each node in a wireless multi-hop network can adjust the power level at which it transmits and thus change the topology of the network to save energy by choosing the neighbors with which it directly communicates. Many previous algorithms for distributed topology control have assumed an ability at each node...

    Provided By Drexel University

  • White Papers // Jan 2011

    Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications

    Recently there has been a shift in distributed computing from middleware-oriented architectures to Service Oriented Architectures (SOA). However, security is a crucial requirement for the serious usage and adoption of the services technology. This paper discusses a number of security standards in the context of SOA and argues the need...

    Provided By Drexel University

  • White Papers // Jan 2011

    Application of SOA in Content Management Systems (CMS)

    There exists a large genre of Content Management System in the domain of finance, insurance, and retail industries. In real world systems, data frequently comes from various sources including relational databases, custom data access layers and XML. Most of the existing Content Management Systems are limited by incompatible data formats...

    Provided By Drexel University

  • White Papers // Jun 2010

    Sources Of Gains In Corporate Mergers: Refined Tests From A Neglected Industry

    This paper provides refined tests of the existence and source of merger gains in a neglected industry: utilities. While excluded from traditional analyses, utilities offer fertile ground for a detailed analysis of the traditional theories of synergy, collusion, hubris and anticipation. The analysis of utilities provides methodological advantages and is...

    Provided By Drexel University

  • White Papers // Jan 2010

    Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security

    The authors consider a cooperative wireless network in the presence of one of more eavesdroppers, and exploit node cooperation for achieving PHYsical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a Decode-and-Forward (DF)...

    Provided By Drexel University

  • White Papers // Jan 2010

    Page-Differential Logging: An Efficient and DBMS-independent Approach for Storing Data into Flash Memory

    Flash memory is widely used as the secondary storage in lightweight computing devices due to its outstanding advantages over magnetic disks. Flash memory has many access characteristics different from those of magnetic disks, and how to take advantage of them is becoming an important research issue. There are two existing...

    Provided By Drexel University

  • White Papers // Mar 2011

    Risk Management Of Precious Metals

    This paper examines volatility and correlation dynamics in price returns of gold, silver, platinum and palladium, and explores the corresponding risk management implications for market risk and hedging. Value-at-Risk (VaR) is used to analyze the downside market risk associated with investments in precious metals, and to design optimal risk management...

    Provided By Drexel University

  • White Papers // Jul 2009

    Cooperative Jamming for Wireless Physical Layer Security

    Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper,...

    Provided By Drexel University

  • White Papers // Dec 2009

    Coding Perspectives for Collaborative Distributed Estimation Over Networks

    A collaborative distributed estimation problem over a communication constrained network is considered from an information theory perspective. It is shown that the distributed estimation problem is related to multi-terminal information theory and a suitable architecture for the codes for this multi-terminal information theory problem is determined under source-channel separation. In...

    Provided By Drexel University

  • White Papers // Aug 2009

    Trade Liberalization, Firm Heterogeneity, And Layoffs: An Empirical Investigation

    In this paper, the authors attempted to fill a gap between the vast amount of theoretical literature devoted to studying the interactions between firm productivity, trade, and trade liberalization, and the lack of empirical evidence for these relationships when labor markets are in question. The main contribution of their work...

    Provided By Drexel University

  • White Papers // Aug 2009

    From Retrospect to Prospect: Assessing Modularity and Stability From Software Architecture

    Architecture-level decisions, directly influenced by environmental factors, are crucial to preserve modularity and stability throughout software development life-cycle. Tradeoffs of modularization alternatives, such as aspect-oriented vs. object-oriented decompositions, thus need to be assessed from architecture models instead of source code. In this paper, the authors present a suite of architecture-level...

    Provided By Drexel University

  • White Papers // Sep 2010

    Detecting Software Modularity Violations

    This paper presents Clio, an approach that detects modularity violations, which can cause software defects, modularity decay, or expensive refactorings. Clio computes the discrepancies between how components should change together based on the modular structure, and how components actually change together as revealed in version histories. The authors evaluated Clio...

    Provided By Drexel University

  • White Papers // Jun 2010

    Coding Perspectives for Collaborative Estimation Over Networks

    A collaborative distributed estimation problem over a communication constrained network is considered from an information theory perspective. A suitable architecture for the codes for this multi-terminal information theory problem is determined under source-channel separation. In particular, distributed source codes in which each node multicasts a different message to each subset...

    Provided By Drexel University

  • White Papers // Jan 2011

    SDC Testbed: Software Defined Communications Testbed for Wireless Radio and Optical Networking

    This paper describes the development of a new Software Defined Communications (SDC) testbed architecture. SDC aims to generalize the area of software defined radio to include propagation media not exclusively limited to radio frequencies (optical, ultrasonic, etc.). This SDC platform leverages existing and custom hardware in combination with reference software...

    Provided By Drexel University

  • White Papers // Aug 2009

    A Tutorial on Transmission Capacity

    This paper unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or ad hoc networks, the Transmission Capacity (TC) framework allows for quantification of achievable...

    Provided By Drexel University

  • White Papers // Jan 2012

    Cooperative Topology Control With Adaptation for Improved Lifetime in Wireless Ad Hoc Networks

    Topology control algorithms allow each node in a wireless multi-hop network to adjust the power at which it makes its transmissions and choose the set of neighbors with which it communicates directly, while preserving global goals such as connectivity or coverage. This allows each node to conserve energy and contribute...

    Provided By Drexel University

  • White Papers // Sep 2011

    Diagnosis of Software Failures Using Computational Geometry

    Complex software systems have become commonplace in modern organizations and are considered critical to their daily operations. They are expected to run on a diverse set of platforms while interoperating with a wide variety of other applications. Although there have been advances in the discipline of software engineering, software faults,...

    Provided By Drexel University

  • White Papers // Sep 2011

    On the Maintenance of UI-Integrated Mashup Applications

    This paper describes the maintenance of long-lived mashup applications that are integrated at the User Interface (UI) layer. It presents techniques that help mashup developers to maintain applications by identifying when and how the original applications' UIs change. It describes a novel mashup editing environment that can be used to...

    Provided By Drexel University

  • White Papers // Aug 2010

    Reverse Engineering Utility Functions using Genetic Programming to Detect Anomalous Behavior in Software

    Recent studies have shown the promise of using utility functions to detect anomalous behavior in software systems at runtime. However, it remains a challenge for software engineers to hand-craft a utility function that achieves both a high precision (i.e., few false alarms) and a high recall (i.e., few undetected faults)....

    Provided By Drexel University

  • White Papers // Jun 2009

    Thr2csp: Toward Transforming Threads Into Communicating Sequential Processes

    As multicore and heterogeneous multiprocessor platforms replace uni-processor systems, software programs must be designed with a greater emphasis on concurrency. Threading has become the dominant paradigm of concurrent computation in the most popular programming languages. Large threaded programs are known to be difficult to implement correctly, comprehend, and maintain, while...

    Provided By Drexel University

  • White Papers // Sep 2011

    Longest Edge Routing on the Spatial Aloha Graph

    The Multihop Spatial Reuse Aloha (MSR-Aloha) protocol was recently introduced by Baccelli et al., where each transmitter selects the receiver among its feasible next hops that maximizes the forward progress of the head of line packet towards its final destination. They identify the optimal Medium Access Probability (MAP) that maximizes...

    Provided By Drexel University

  • White Papers // Feb 2011

    Practical Codes for Lossy Compression When Side Information May Be Absent

    Practical codes are developed for quadratic Gaussian lossy compression when side information may be absent by hybridizing Successively Refinable Trellis Coded Quantization (SR-TCQ) and Low-Density Parity-Check (LDPC) codes. A 2-refinement level SR-TCQ is used to generate a common description for both decoders and an individual description for the decoder with...

    Provided By Drexel University

  • White Papers // Jul 2013

    Toward an Automatic, Online Behavioral Malware Classification System

    Malware authors are increasingly using specialized toolkits and obfuscation techniques to modify existing malware and avoid detection by traditional antivirus software. The resulting proliferation of obfuscated malware variants poses a challenge to antivirus vendors, who must create signatures to detect each new malware variant. Although the many variants in a...

    Provided By Drexel University

  • White Papers // Sep 2006

    Determining Factors for the Adoption of e-Business: The Case of SMEs in Korea

    In this paper, the authors investigate the determining factors of the successful adoption of e-business by Small and Medium sized Enterprises (SMEs) in Korea using survey data. After the major determining factors were identified from the innovation adoption literature and were extracted by applying the principal component analysis to the...

    Provided By Drexel University

  • White Papers // Jun 2013

    A New Computational Approach for Determining Rate Regions and Optimal Codes for Coded Networks

    A new computational technique is presented for determining rate regions for coded networks. The technique directly manipulates the extreme ray representation of inner and outer bounds for the region of entropic vectors. The authors use new inner bounds on region of entropic vectors based on conic hull of ranks of...

    Provided By Drexel University

  • White Papers // Jul 2012

    A Computational Approach for Determining Rate Regions and Codes Using Entropic Vector Bounds

    A computational technique for determining rate regions for networks and multilevel diversity coding systems based on inner and outer bounds for the region of entropic vectors is discussed. An inner bound based on binary representable matroids is discussed that has the added benefit of identifying optimal linear codes. The technique...

    Provided By Drexel University

  • White Papers // Mar 2012

    Rate Region for a Class of Delay Mitigating Codes and P2P Networks

    This paper identifies the relevance of a distributed source coding problem first formulated by Yeung and Zhang in 1999 to two applications in network design: the design of delay mitigating codes, and the design of network coded P2P networks. When transmitting time-sensitive frames from a source to a destination over...

    Provided By Drexel University

  • White Papers // May 2011

    Energy and Environmental Aspects of Data Centers

    Data centers have become an essential operational component of nearly every sector of the economy, and as a result growing consumers of energy and emitters of Green-House Gases (GHGs). Developing strategies for optimizing power usage and reducing the associated life cycle GHG emissions are critical priorities for meeting climate policy...

    Provided By Drexel University

  • White Papers // Dec 2009

    The Ubiquitous DBMS

    Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigators, and Ultra Mobile PCs (UMPCs). The authors term the database systems that are customizable for small computing devices as Ubiquitous DataBase Management Systems...

    Provided By Drexel University

  • White Papers // Jul 2008

    A Logical Model and Data Placement Strategies for Mems Storage Devices

    MEMS storage devices are new non-volatile secondary storages that have outstanding advantages over magnetic disks. MEMS storage devices, however, are much different from magnetic disks in the structure and access characteristics. They have thousands of heads called probe tips and provide the following two major access facilities: flexibility : freely...

    Provided By Drexel University

  • White Papers // Jan 2012

    Flexible Register Management using Reference Counting

    Conventional out-of-order processors that use a unified physical register file allocate and reclaim registers explicitly using a free list that operates as a circular queue. The authors describe and evaluate a more flexible register management scheme - reference counting. They implement reference counting using a bit-matrix with a column for...

    Provided By Drexel University

  • White Papers // Aug 2012

    ODYS: A Massively-Parallel Search Engine Using a DB-IR Tightly-Integrated Parallel DBMS

    Recently, parallel search engines have been implemented based on scalable distributed file systems such as Google File System. However, the authors claim that building a massively-parallel search engine using a parallel DBMS can be an attractive alternative since it supports a higher-level (i.e., SQL-level) interface than that of a distributed...

    Provided By Drexel University