Georgia Institute of Technology

Displaying 1-40 of 331 results

  • White Papers // Sep 2013

    ClusterWatch: Flexible, Lightweight Monitoring for High-end GPGPU Clusters

    The ClusterWatch middleware provides runtime flexibility in what system-level metrics are monitored, how frequently such monitoring is done, and how metrics are combined to obtain reliable information about the current behavior of GPGPU clusters. Interesting attributes of ClusterWatch are the ease with which different metrics can be added to the...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Clusters

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices

    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    Personal Clouds: Sharing and Integrating Networked Resources to Enhance End User Experiences

    End user experiences on mobile devices with their rich sets of sensors are constrained by limited device battery lives and restricted form factors, as well as by the 'scope' of the data available locally. The 'Personal Cloud' distributed software abstractions address these issues by enhancing the capabilities of a mobile...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2013

    On Symmetric Encryption with Distinguishable Decryption Failures

    The authors propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Their main purpose is to build models that better reflect the reality of cryptographic implementations, and to surface the security issues that arise from doing so. They systematically explore the consequences of...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Take This Personally: Pollution Attacks on Personalized Services

    Modern web services routinely personalize content to appeal to the specific interests, viewpoints, and contexts of individual users. Ideally, personalization allows sites to highlight information uniquely relevant to each of their users, thereby increasing user satisfaction - and, eventually, the service's bottom line. Unfortunately, as the authors demonstrate in this...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    An Automated Approach to Create, Store, and Analyze Large-scale Experimental Data in Clouds

    The flexibility and scalability of computing clouds make them an attractive application migration target; yet, the cloud remains a black-box for the most part. In particular, their opacity impedes the efficient but necessary testing and tuning prior to moving new applications into the cloud. A natural and presumably unbiased approach...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    FlexIO: Location-Flexible Execution of in Situ Data Analytics for Large Scale Scientific Applications

    Increasingly severe I/O bottlenecks on high-end computing machines are prompting scientists to process simulation output data while simulations are running and before placing data on disk - \"In situ\" and/or \"In-transit\". There are several options in placing in-situ data analytics along the I/O path: on compute nodes, on staging nodes...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    I/O Containers: Managing the Data Analytics and Visualization Pipelines of High End Codes

    Lack of I/O scalability is known to cause measurable slowdowns for large-scale scientific applications running on high end machines. This is prompting researchers to devise 'I/O staging' methods in which outputs are processed via online analysis and visualization methods to support desired science outcomes. Organized as online workflows and carried...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    Cloud Manufacturing: Drivers, Current Status, and Future Trends

    Cloud Manufacturing (CM) refers to a customer-centric manufacturing model that exploits on-demand access to a shared collection of diversified and distributed manufacturing resources to form temporary, reconfigurable production lines which enhance efficiency, reduce product lifecycle costs, and allow for optimal resource loading in response to variable-demand customer generated tasking. The...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Resolution-Aware Network Coded Storage

    In this paper, the authors show that coding can be used in Storage Area Networks (SANs) to improve various Quality of Service metrics under normal SAN operating conditions, without requiring additional storage space. For their analysis, they develop a model which captures modern characteristics such as constrained I/O access bandwidth...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Secure Cloud Storage Service with An Efficient DOKS Protocol

    Storage services based on public clouds provide customers with elastic storage and on-demand accessibility. However, moving data to remote cloud storage also raises privacy concerns. Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. In this paper, the authors present a new approach...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Software-Controlled Transparent Management of Heterogeneous Memory Resources in Virtualized Systems

    This paper presents a software-controlled technique for managing the heterogeneous memory resources of next generation multicore platforms with fast 3D die-stacked memory and additional slow off-chip memory. Implemented for virtualized server systems, the technique detects the 'Hot' pages critical to program performance in order to then maintain them in the...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques

    Network I/O workloads are dominating in many data centers and cloud computing environments today. One way to improve inter Virtual Machine (VM) communication efficiency is to support co-resident VM communication by using shared memory based approaches and to resort to the traditional TCP/IP for inter-VM communications between VMs that are...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks

    Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. The authors conduct experimental measurements of several benchmarks using Hadoop MapReduce to evaluate and compare the performance impact of three popular hypervisors: a commercial hypervisor, Xen, and...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Residency Aware Inter-VM Communication in Virtualized Cloud: Performance Measurement and Analysis

    A known problem for virtualized cloud data centers is the inter-VM communication inefficiency for data transfer between co-resident VMs. Several engineering efforts have been made on building a shared memory based channel between co-resident VMs. The implementations differ in terms of whether user/program transparency, OS kernel transparency or VMM transparency...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications over the web. However, the drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Cloud-Based Information Technology Framework for Data Driven Intelligent Transportation Systems

    The authors present a novel cloud based IT framework, CloudTrack, for data driven intelligent transportation systems. They describe how the proposed framework can be leveraged for real-time fresh food supply tracking and monitoring. Cloud-Track allows efficient storage, processing and analysis of real-time location and sensor data collected from fresh food...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers

    Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected....

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2013

    Cloud Implications on Software Network Structure and Security Risks

    By software vendors offering, via the cloud, Software-as-a-Service (SaaS) versions of traditionally on-premises products, security risks associated with software usage become more diversified which can greatly increase the value associated with network software. In an environment where negative security externalities are present and users make complex consumption and patching decisions,...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2013

    Technical Support and Service Demand: Evidence From the Cloud

    The authors study how a provider's technical support influences service demand in a business-to-business setting. The provider offers two levels of support, basic and full, reflecting its involvement with the buyer in co-producing the service. Using a unique nano-data set on public cloud infrastructure services consumption by 20,298 firms from...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    High-Speed Formal Verification of Heterogeneous Coherence Hierarchies

    As more heterogeneous architecture solutions continue to emerge, coherence solutions tailored for these architectures will become mandatory. Coherence hierarchies will likely continue to be prevalent in future large-scale shared memory architectures. However, past experience has shown that hierarchical coherence protocol design is a non-trivial problem, especially when considering the verification...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    IC-Cloud: Computation Offloading to an Intermittently-Connected Cloud

    Offloading computation-intensive components of mobile applications to the cloud is of great potential to speed-up the execution and reduce the energy consumption for mobile devices. The gain from computation offloading is typically counterbalanced by communication costs and delays. It is, therefore, important to undertake offloading decisions based on future prediction...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    User Controllable Security and Privacy for Mobile Mashups

    A new paradigm in the domain of mobile applications is 'Mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2013

    Characterizing and Mitigating Inter-Domain Policy Violations in Overlay Routes

    The Internet is a complex structure arising from the interconnection of numerous Autonomous Systems (AS), each exercising its own administrative policies to reflect the commercial agreements behind the interconnection. However, routing in service overlay networks is quite capable of violating these policies to its advantage. To prevent these violations, the...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2012

    Computing Infrastructure for Big Data Processing

    With computing systems transforming from single-processor devices to the ubiquitous and networked devices and the datacenter-scale computing in the cloud, the parallelism has become ubiquitous at many levels. At micro level, parallelisms are being explored from the underlying circuits, to pipelining and instruction level parallelism on multi-cores or many cores...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2012

    Learning the Dependency Structure of Latent Factors

    In this paper, the authors study latent factor models with dependency structure in the latent space. They propose a general learning framework which induces sparsity on the undirected graphical model imposed on the vector of latent factors. A novel latent factor model SLFA is then proposed as a matrix factorization...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2012

    A Complete Femtocell Network Modeling and Development Platform

    Femtocells have emerged as an alternative solution for operators to improve coverage and throughput in indoor environments. However, modeling and development platforms are still needed in order to test implementation-specific characteristics of femtocells, such as interference mitigation techniques and self-organizing algorithms. Using OPNET, a high fidelity simulation environment for wireless...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2012

    QoS Driven Energy-Efficient Design for Downlink OFDMA Networks

    The ubiquitous applications of high-data-rate real-time wireless services have promptly boomed energy consumption in wireless networks. Therefore, energy-efficient design in wireless networks is very important and is attracting more and more research attention. In this paper, the authors study the Quality-of-Service (QoS) driven energy-efficient design in the downlink Orthogonal Frequency...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Exploiting Partial Channel State Information for Secrecy Over Wireless Channels

    In this paper, the authors investigate the effect of partial channel state information on the achievable secure communication rates and secret-key generation rates over ergodic fading channels. In particular, they establish lower bounds for the strong secrecy capacity and the strong secret-key capacity of ergodic and block-ergodic fading channels with...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Designing Configurable, Modifiable And Reusable Components for Simulation of Multicore Systems

    A simulation system for modern multicore architectures is composed of various component models. For such a system to be useful for research purposes, modifiability is a key quality attribute. Users, when building a simulation model, need to have the capability to adjust various aspects of a component, or even replace...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Network Compression: Memory-Assisted Universal Coding of Sources with Correlated Parameters

    The existence of significant amount of correlation in the network traffic has stimulated the development of in-network traffic reduction techniques since end-to-end universal compression solutions would not perform well over Internet packets due to the finite-length nature of data. Recently, the authors proposed a memory-assisted universal compression technique that holds...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Strong Coordination with Polar Codes

    In this paper, the authors design explicit codes for strong coordination in two-node networks. Specifically, they consider a two-node network in which the action imposed by nature is binary and uniform, and the action to coordinate is obtained via a symmetric discrete memory-less channel. By observing that polar codes are...

    Provided By Georgia Institute of Technology

  • White Papers // Oct 2012

    Migration Energy-Aware Workload Consolidation in Enterprise Clouds

    Consolidation through live VM migrations is a promising approach to improve server utilization. The authors' research finds that energy impact of migration can offset over 12% of the energy saved through energy conscious workload packing. To address this limitation of the current state of research, in this paper they devise...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    Cloud Computing Operations Research

    In this paper, the authors argue that the cloud computing industry faces many decision problems where operations research could add tremendous value. To this end, they provide an OR perspective on cloud computing in three ways. First, they compare the cloud computing process with the traditional pull supply chain and...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    Net-Cohort: Detecting and Managing VM Ensembles in Virtualized Data Centers

    Bi-section bandwidth is a critical resource in today's data centers because of the high cost and limited bandwidth of higher-level network switches and routers. This problem is aggravated in virtualized environments where a set of virtual machines, jointly implementing some service, may run across multiple L2 hops. Since data center...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security

    Porting browsers to mobile platforms may lead to new vulnerabilities whose solutions require careful balancing between usability and security and might not always be equivalent to those in desktop browsers. In this paper, the authors perform the first large-scale security comparison between mobile and desktop browsers. They focus their efforts...

    Provided By Georgia Institute of Technology

  • White Papers // Sep 2012

    VScope: Middleware for Troubleshooting Time-Sensitive Data Center Applications

    Data-intensive infrastructures are increasingly used for on-line processing of live data to guide operations and decision making. VScope is a flexible monitoring and analysis middleware for trouble-shooting such large-scale, time-sensitive, multi-tier applications. With VScope, lightweight anomaly detection and interaction tracking methods can be run continuously throughout an application's execution. The...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2012

    Under New Management: Practical Attacks on SNMPv3

    Network monitoring is a necessity for both reducing downtime and ensuring rapid response in the case of software or hardware failure. Unfortunately, one of the most widely used protocols for monitoring networks, the Simple Network Management Protocol (SNMPv3), does not offer an acceptable level of confidentiality or integrity for these...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2013

    Residency Aware Inter-VM Communication in Virtualized Cloud: Performance Measurement and Analysis

    A known problem for virtualized cloud data centers is the inter-VM communication inefficiency for data transfer between co-resident VMs. Several engineering efforts have been made on building a shared memory based channel between co-resident VMs. The implementations differ in terms of whether user/program transparency, OS kernel transparency or VMM transparency...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2013

    An Automated Approach to Create, Store, and Analyze Large-scale Experimental Data in Clouds

    The flexibility and scalability of computing clouds make them an attractive application migration target; yet, the cloud remains a black-box for the most part. In particular, their opacity impedes the efficient but necessary testing and tuning prior to moving new applications into the cloud. A natural and presumably unbiased approach...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Residency-Aware Virtual Machine Communication Optimization: Design Choices and Techniques

    Network I/O workloads are dominating in many data centers and cloud computing environments today. One way to improve inter Virtual Machine (VM) communication efficiency is to support co-resident VM communication by using shared memory based approaches and to resort to the traditional TCP/IP for inter-VM communications between VMs that are...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    An Infrastructure for Automating Large-scale Performance Studies and Data Processing

    The cloud has enabled the computing model to shift from traditional data centers to publicly shared computing infrastructure; yet, applications leveraging this new computing model can experience performance and scalability issues, which arise from the hidden complexities of the cloud. The most reliable path for better understanding these complexities is...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks

    Hypervisors are widely used in cloud environments and their impact on application performance has been a topic of significant research and practical interest. The authors conduct experimental measurements of several benchmarks using Hadoop MapReduce to evaluate and compare the performance impact of three popular hypervisors: a commercial hypervisor, Xen, and...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Secure Cloud Storage Service with An Efficient DOKS Protocol

    Storage services based on public clouds provide customers with elastic storage and on-demand accessibility. However, moving data to remote cloud storage also raises privacy concerns. Cryptographic cloud storage and search over encrypted data have attracted attentions from both industry and academics. In this paper, the authors present a new approach...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2013

    Oncilla: A GAS Runtime for Efficient Resource Allocation and Data Movement in Accelerated Clusters

    Accelerated and in-core implementations of big data applications typically require large amounts of host and accelerator memory as well as efficient mechanisms for transferring data to and from accelerators in heterogeneous clusters. Scheduling for heterogeneous CPU and GPU clusters has been investigated in depth in the High-Performance Computing (HPC) and...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2011

    A Power Capping Controller for Multicore Processors

    In this paper, the authors present an online controller for tracking power-budgets in multicore processors using dynamic voltage-frequency scaling. The proposed control law comprises an integral controller whose gain is adjusted online based on the derivative of the power-frequency relationship. The control law is designed to achieve rapid settling time,...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2012

    Challenges and Opportunities in Consolidation at High Resource Utilization: Non-monotonic Response Time Variations in n-Tier Applications

    A central goal of cloud computing is high resource utilization through hardware sharing; however, utilization often remains modest in practice due to the challenges in predicting consolidated application performance accurately. The authors present a thorough experimental study of consolidated n-tier application performance at high utilization to address this issue through...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    HyperTransport Over Ethernet - A Scalable, Commodity Standard for Resource Sharing in the Data Center

    Future data center configurations are driven by Total Cost of Ownership (TCO) for specific performance capabilities. Low-latency interconnects are central to performance, while the use of commodity interconnects is central to cost. This paper reports on an effort to combine a very high-performance, commodity interconnect HT (Hyper-Transport) with a high-volume...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2011

    ResourceExchange: Latency-Aware Scheduling in Virtualized Environments with High Performance Fabrics

    Virtualized infrastructures have seen strong acceptance in data center systems and applications, but have not yet seen adoptance for latency-sensitive codes which require I/O to arrive predictability, or response times to be generated within certain timeliness guarantees. Examples of such applications include certain classes of parallel HPC codes, server systems...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2012

    Xerxes: Distributed Load Generator for Cloud-scale Experimentation

    With the growing acceptance of cloud computing as a viable computing paradigm, a number of research and real-life dynamic cloud-scale resource allocation and management systems have been developed over the last few years. An important problem facing system developers is the evaluation of such systems at scale. In this paper,...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2012

    Computing Infrastructure for Big Data Processing

    With computing systems transforming from single-processor devices to the ubiquitous and networked devices and the datacenter-scale computing in the cloud, the parallelism has become ubiquitous at many levels. At micro level, parallelisms are being explored from the underlying circuits, to pipelining and instruction level parallelism on multi-cores or many cores...

    Provided By Georgia Institute of Technology

  • White Papers // May 2013

    Software-Controlled Transparent Management of Heterogeneous Memory Resources in Virtualized Systems

    This paper presents a software-controlled technique for managing the heterogeneous memory resources of next generation multicore platforms with fast 3D die-stacked memory and additional slow off-chip memory. Implemented for virtualized server systems, the technique detects the 'Hot' pages critical to program performance in order to then maintain them in the...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2011

    Pegasus: Coordinated Scheduling for Virtualized Accelerator-Based Systems

    Heterogeneous multi-cores - platforms comprised of both general purpose and accelerator cores - are becoming increasingly common. While applications wish to freely utilize all cores present on such platforms, operating systems continue to view accelerators as specialized devices. The Pegasus system described in this paper uses an alternative approach that...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    Statistical Techniques for Online Anomaly Detection in Data Centers

    Online anomaly detection is an important step in data center management, requiring light-weight techniques that provide sufficient accuracy for subsequent diagnosis and management actions. This paper presents statistical techniques based on the Tukey and Relative Entropy statistics, and applies them to data collected from a production environment and to data...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2012

    Network Stability of Cognitive Radio Networks in the Presence of Heavy Tailed Traffic

    The heavy tailed nature in dynamic spectrum networks challenges the applicability of conventional network stability criterions. To encounter this, a new stability criterion, namely moment stability, is introduced, which requires that the queue length of each secondary user has finite moments for every achievable order. Then, the necessary and sufficient...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2012

    Intersymbol and Co-Channel Interference in Diffusion-Based Molecular Communication

    Molecular Communication (MC) is a bio-inspired paradigm where information is exchanged by the release, the propagation and the reception of molecules. The objective of this paper is to analyze the effects of interference in the most general type of MC system, i.e., the diffusion of molecules in a fluidic medium....

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    Multiagent Jamming-Resilient Control Channel Game for Cognitive Radio Ad Hoc Networks

    Control channel jamming is a severe security problem in wireless networks. This results from the fact that the attackers can effectively launch the denial of service attacks by jamming the control channels. Traditional approaches to combating this problem such as channel hopping sequences may not be the secure solution against...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2012

    A Receiver Architecture for Pulse-Based Electromagnetic Nanonetworks in the Terahertz Band

    Graphene-enabled wireless communications set the Terahertz Band as the frequency band of operation of future nano-devices (0.1-10 THz). Amongst others, femto-second-long pulse-based modulation schemes have been recently proposed to enable the communication among nano-devices. Within this context, a receiver architecture suitable for nano-devices must be ultra compact, must have high...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2012

    The Internet of Multimedia Nano-Things in the Terahertz Band

    Nanotechnology is providing the engineering community with a new set of tools to design and manufacture advanced devices which are able to generate, process and transmit multimedia content at the nanoscale. The wireless interconnection of pervasively deployed multimedia nano-devices with existing communication networks and ultimately the Internet defines a truly...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    Low-Weight Channel Coding for Interference Mitigation in Electromagnetic Nanonetworks in the Terahertz Band

    Nanotechnology is providing a new set of tools to the engineering community to design and manufacture integrated devices just a few hundred nanometers in total size. Communication among these nano-devices will boost the range of applications of nanotechnology in several fields, ranging from biomedical research to military technology or environmental...

    Provided By Georgia Institute of Technology

  • White Papers // Feb 2011

    Modulation Techniques for Communication Via Diffusion in Nanonetworks

    Communication via diffusion of molecules is an effective method for transporting information in nano-networks. In this paper, novel modulation techniques called Concentration Shift Keying (CSK) and Molecule Shift Keying (MoSK) are proposed for coding and decoding information of the so-called messenger molecule concentration waves in nano-networks. The first technique, CSK,...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2011

    Bio-Inspired Synchronization for Nanocommunication Networks

    Nano-networks are networks of devices inherently working and communicating at a scale ranging between one and hundreds of nanometers. The motivation behind these nano-networks is to enhance the complexity and range of operation of the system, as the nano-machines that will be part of these networks have significant limitations in...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2011

    Information Capacity of Diffusion-Based Molecular Communication in Nanonetworks

    Molecular Communication (MC) is a promising bio-inspired paradigm in which molecules are transmitted, propagated and received between nanoscale machines. One of the main challenges is the theoretical study of the maximum achievable information rate (capacity). The objective of this paper is to provide a mathematical expression for the capacity in...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    Cooperation Reliability Based on Reinforcement Learning for Cognitive Radio Networks

    The primary objective of cooperation in Cognitive Radio (CR) networks is to increase the efficiency and improve the network performance. However, CR users may act destructively and decrease both their own and others' performances. This can be due to Byzantine adversaries or unintentional erroneous conduct in cooperation. This paper presents...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    Propagation Models for Nanocommunication Networks

    Nanotechnology is enabling the development of devices in a scale ranging from one to a few hundred nanometers. Communication among these nano-devices will expand the capabilities and applications of individual devices both in terms of complexity and range of operation, enabling new applications of nanotechnology in the medical, environmental and...

    Provided By Georgia Institute of Technology

  • White Papers // Jul 2010

    Graphene-Based Nano-Antennas for Electromagnetic Nanocommunications in the Terahertz Band

    Nanotechnology is enabling the development of devices in a scale ranging from one to a few hundred nanometers. Coordination and information sharing among these nano-devices will lead towards the development of future nano-networks, boosting the range of applications of nanotechnology in the biomedical, environmental and military fields. Despite the major...

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    NBS: A Network-Bandwidth-Aware Streaming Version Switcher for Mobile Streaming Applications Under Fuzzy Logic Control

    Good quality of service for a video streaming application under time-varying network bandwidth capacity is often required in many real-world scenarios, e.g., streaming in a typical high-speed vehicular environment. However, developing the enabling algorithms and techniques have been proven to be very challenging. Adaptive bit-rate streaming method can detect a...

    Provided By Georgia Institute of Technology

  • White Papers // Mar 2011

    Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-Level Control Approach

    Resource provisioning for N-tier web applications in Clouds is non-trivial due to at least two reasons. First, there is an inherent optimization conflict between cost of resources and Service Level Agreement (SLA) compliance. Second, the resource demands of the multiple tiers can be different from each other, and varying along...

    Provided By Georgia Institute of Technology

  • White Papers // Apr 2011

    Variations in Performance and Scalability When Migrating N-Tier Applications to Different Clouds

    The increasing popularity of computing clouds continues to drive both industry and research to provide answers to a large variety of new and challenging questions. The authors aim to answer some of these questions by evaluating performance and scalability when an n-tier application is migrated from a traditional datacenter environment...

    Provided By Georgia Institute of Technology

  • White Papers // Nov 2009

    A Petri Net Siphon Based Solution to Protocol-Level Service Composition Mismatches

    Protocol-level mismatch is one of the most important problems in service composition. The commonly used reachability exploration method focuses on verifying deadlock-freeness. When this property is violated, the states and traces in the reachability graph only give clues to re-design the composition. The process must then repeat itself until no...

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    SCT-MAC: A Scheduling Duty Cycle MAC Protocol for Cooperative Wireless Sensor Network

    Effective techniques for extending lifetime in multi-hop Wireless Sensor Networks (WSNs) include duty cycling and more recently introduced cooperative transmission range extension. However a scalable MAC protocol has not been presented that combines both. In this paper, the authors present a new Scheduling Co-operaTive MAC protocol (SCT-MAC) for the multi-hop...

    Provided By Georgia Institute of Technology

  • White Papers // May 2012

    On the Modeling of Randomized Distributed Cooperation for Linear Multi-Hop Networks

    A one-dimensional cooperative network is modeled stochastically, such that the nodes are randomly placed according to a Bernoulli process. A discrete time quasi-stationary Markov chain model is considered to characterize the multi-hop transmissions and its transition probability matrix has been derived. By the Perron-Frobenious theorem, the eigen-decomposition of the matrix...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2012

    An Agent-Based Model for the Evolution of the Internet Ecosystem

    The authors propose an agent-based model for the evolution of the Internet ecosystem. They model networks in the Internet as selfish agents, each of which tries to maximize a certain utility function in a distributed manner. They consider a utility function that represents the monetary profit of a network. Their...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces

    Recent FCC rules allowing unlicensed use on a secondary basis of the TeleVision White Spaces (TVWS) promise a whole new set of possible applications. The first step towards realizing these applications is the creation and adoption of industry standards. In this paper, the authors present the first such standard for...

    Provided By Georgia Institute of Technology

  • White Papers // Jun 2010

    On the Relevance of Social Information to Opportunistic Forwarding

    In opportunistic ad-hoc networks, multi-hop data transfer over contemporaneous paths is unlikely since the devices are often disconnected from each other. However, data can still be stored and forwarded over time in an opportunistic hop-by-hop manner. Previous work has considered how the availability of various types of information such as...

    Provided By Georgia Institute of Technology

  • White Papers // Dec 2009

    PeopleRank: Social Opportunistic Forwarding

    In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between cost (number of message replicas)...

    Provided By Georgia Institute of Technology

  • White Papers // Aug 2011

    Asymptotic Queueing Analysis for Dynamic Spectrum Access Networks

    This paper provides an asymptotic analysis of the steady-state queue length distribution of Secondary Users (SUs) for Dynamic Spectrum Access (DSA) networks. Specifically, two network scenarios are investigated. In the first scenario where each SU has its exclusive access to a Primary User (PU) channel, it is shown that if...

    Provided By Georgia Institute of Technology

  • White Papers // Jan 2009

    Recursive DNS Architectures and Vulnerability Implications

    DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques to improve DNS forgery resistance. The authors explore how different resolver architectures can affect the risk of DNS poisoning. The contributions of this work include:...

    Provided By Georgia Institute of Technology