Illinois Institute of Technology

Displaying 1-40 of 81 results

  • White Papers // Mar 2014

    Achieving Efficient Distributed Scheduling with Message Queues in the Cloud for Many-Task Computing and High-Performance Computing

    Task scheduling and execution over large scale, distributed systems plays an important role on achieving good performance and high system utilization. Due to the explosion of parallelism found in today's hardware, applications need to perform over-decomposition to deliver good performance; this over-decomposition is driving job management systems' requirements to support...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2014

    Exploring Infiniband Hardware Virtualization in OpenNebula towards Efficient High-Performance Computing

    It has been widely accepted that software virtualization has a big negative impact on High-Performance Computing (HPC) application performance. This paper explores the potential use of Infiniband hardware virtualization in an OpenNebula cloud towards the efficient support of MPI-based workloads. The authors have implemented, deployed, and tested an Infiniband network...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2014

    Towards In-Order and Exactly-Once Delivery using Hierarchical Distributed Message Queues

    In today's world, distributed message queues are used in many systems and play different roles (e.g. content delivery, notification system and message delivery tools). It is important for the queue services to be able to deliver messages at large scales with a variety of message sizes with high concurrency. An...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2014

    HyCache+: Towards Scalable High-Performance Caching Middleware for Parallel File Systems

    The ever-growing gap between the computation and I/O is one of the fundamental challenges for future computing systems. This computation-I/O gap is even larger for modern large scale high-performance systems due to their state-of-the-art yet decades long architecture: the compute and storage resources form two cliques that are interconnected with...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Early Experiences in Running Many-Task Computing Workloads on GPGPUs

    In this paper the authors aim to enable swift to efficiently use accelerators (such as NVIDIA GPUs) to further accelerate a wide range of applications. This paper presents preliminary results in the costs associated with managing and launching concurrent kernels on NVIDIA Kepler GPUs. The authors expect their results to...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Towards the Support for Many-Task Computing on Many-Core Computing Platforms

    Current software and hardware limitations prevent ManyTask Computing (MTC) from leveraging hardware accelerators (NVIDIA GPUs and Intel MIC) boasting many-core computing architectures. Some broad application classes that t the MTC paradigm is work flows, MapReduce, high-throughput computing, and a subset of high-performance computing. MTC emphasizes using many computing resources over...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    Enabling Dynamic Memory Management Support for MTC on NVIDIA GPUs

    Many-task computing emphasizes utilizing many computational tasks over a short period of time. Tasks can be either dependent or independent and are arranged as Directed Acyclical Graphs (DAGs). Until recently there had been no support for MTC workloads on accelerators, but the development of GeMTC enables many-task computing to run...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    Optimizing Large Data Transfers Over 100Gbps Wide Area Networks

    The Advanced Networking Initiative (ANI) project from the Energy Services Network provides a 100 Gbps testbed, which offers the opportunity for evaluating applications and middleware used by scientific experiments. This testbed is a prototype of a 100 Gbps wide-area network backbone, which links several Department Of Energy (DOE) national laboratories,...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    HyCache: A User-Level Caching Middleware for Distributed File Systems

    One of the bottlenecks of distributed file systems deals with mechanical Hard Disk Drives (HDD). Although Solid-State Drives (SSD) has been around since the 1990's, HDDs are still dominant due to large capacity and relatively low cost. Hybrid hard drives with a small built-in SSD cache do not meet the...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2013

    Throughput Optimizing Localized Link Scheduling for Multihop Wireless Networks Under Physical Interference Model

    The authors study throughput-optimum localized link scheduling in wireless networks. The majority of results on link scheduling assume binary interference models that simplify interference constraints in actual wireless communication. While the physical interference model reflects the physical reality more precisely, the problem becomes notoriously harder under the physical interference model....

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2012

    A Cooperative Message Authentication Protocol in VANETs

    Safety provision is a crucial application for the Vehicular Ad hoc NETworks (VANETs). In the VANETs, vehicles periodically broadcast their geographic information. Therefore, collisions can be avoided. In this paper, the authors address the issue of large computation overhead caused by the safety message authentication. A Cooperative Message Authentication Protocol...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2012

    Routing Metrics for Minimizing End-to-End Delay in Multi-Radio Multi-Channel Wireless Networks

    This paper studies how to select a path with the minimum expected End-to-End Delay (EED) in a Multi-Radio Multi-Channel (MRMC) wireless mesh network. While the existing studies mainly focus on the packet transmission delay due to Medium Access Control (MAC), their new EED metric further takes into account the queuing...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2012

    On-line Scheduling of Real-time Services for Cloud Computing

    In this paper, the authors introduce a novel utility accrual scheduling algorithm for real-time cloud computing services. The real-time tasks are scheduled non-preemptively with the objective to maximize the total utility. The most unique characteristic of their approach is that, different from the traditional utility accrual approach that works under...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2012

    Real-Time Misbehavior Detection in IEEE 802.11 Based Wireless Networks: An Analytical Approach

    The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 Distributed Coordinated Function (DCF), allows malicious nodes to deliberately manipulate their back-off parameters and thus unfairly gain a large share of the network throughput. In this paper, the authors first design a real-time back-off misbehavior detector, termed...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Efficient and Secure Key Extraction Using CSI Without Chasing Down Errors

    Generating keys and keeping them secret is critical in secure communications. Due to the "Open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference

    The authors consider the problem of link scheduling for throughput maximization in multi-hop wireless networks. Majority of previous methods for this problem are still restricted to graph-based interference models. In this paper, they study the link scheduling problem using a more realistic physical interference model. Through some key observations about...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Rejecting the Attack: Source Authentication for Wi-Fi Management Frames Using CSI Information

    Comparing to well protected data frames, Wi-Fi Management Frames (MFs) are extremely vulnerable to various attacks. Since MFs are transmitted without encryption, attackers can forge them easily. Such attacks can be detected in cooperative environment such as Wireless Intrusion Detection System (WIDS). However, in non-cooperative environment it is difficult for...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Data Aggregation Without Secure Channel: How to Evaluate a Multivariate Polynomial Securely

    Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity....

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control....

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2012

    Network Agile Preference-Based Prefetching for Mobile Devices

    For mobile devices, communication via cellular networks consumes more energy, and has a lower data rate than Wi-Fi networks, and suffers an expensive limited data plan. However the Wi-Fi network coverage range and density are smaller than those of the cellular networks. In this paper, the authors present a behavior-aware...

    Provided By Illinois Institute of Technology

  • White Papers // May 2012

    Capacity Enhancement of Cognitive Wireless Networks With Distance Spectrum Usage Policy

    How much information can one transmit over a randomly distributed ad hoc network of n secondary devices, overlaid with m primary devices? Such a network model is referred to as Cognitive Wireless Network (CWN) and the authors' paper addresses the above question by characterizing its throughput capacity. Although a handful...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2012

    Performance Modelling of Opportunistic Forwarding With Imprecise Knowledge

    Mobility-assisted networking is becoming very popular as a mean of delivering messages in disconnected or very dynamic networks, such as opportunistic networks. Despite the rapid growth in the number of proposals for routing protocols that exploit the mobility of nodes, there is a lack of general theoretical frameworks to be...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2012

    ADAPT: Availability-Aware MapReduce Data Placement for Non-Dedicated Distributed Computing

    The MapReduce programming paradigm is gaining more and more popularity recently due to its merits of ease of programming, data distribution and fault tolerance. The low barrier of adoption of MapReduce makes it a promising framework for non-dedicated distributed computing environments. However, the variability of hosts resources and availability could...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2012

    Security Policy Management Process within Six Sigma Framework

    In this paper, the authors present a management process for creating adaptive, real-time security policies within the Six Sigma framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2011

    Exploring Distributed Hash Tables in High-End Computing

    Over the last decade, storage systems have experienced a 10- fold increase between their capacity and bandwidth. This gap is predicted to grow faster with exponentially growing concurrency levels, with future exascales delivering millions of nodes and billions of threads of execution. A critical component of future file systems for...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2011

    Pattern-Aware File Reorganization in MPI-IO

    Scientific computing is becoming more data-intensive; however I/O throughput is not growing at the same rate. MPI-IO and parallel file systems are expected to help bridge the gap by increasing data access parallelism. Compared to traditional I/O systems, some factors are more important in parallel I/O system in order to...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    A Generic Framework for Throughput-Optimal Control in MR-MC Wireless Networks

    In this paper, the authors study the throughput-optimal control in Multi-Radio Multi-Channel (MR-MC) wireless networks, which is an open challenging research issue due to the coupled link scheduling and channel/radio assignment issues. There are three main contributions in this report: they develop a new model by transforming a network node...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    Opportunities and Challenges in Running Scientific Workflows on the Cloud

    Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. The authors...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    Opportunities and Challenges for Running Scientific Workflows on the Cloud

    Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. The authors...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Flash-Based Audio and Video Communication in the Cloud

    Internet telephony and multimedia communication protocols have matured over the last fifteen years. Recently, the web is evolving as a popular platform for everything the authors do on the Internet including email, text chat, voice calls, discussions, enterprise apps and multi-party collaboration. Unfortunately, there is a disconnect between web and...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Counterparty Risk And The Impact Of Collateralization In CDS Contracts

    The authors analyze the counterparty risk embedded in CDS contracts, in presence of a bilateral margin agreement. First, they investigate the pricing of collateralized counterparty risk and they derive the bilateral Credit Valuation Adjustment (CVA), Unilateral Credit Valuation Adjustment (UCVA) and Debt Valuation Adjustment (DVA). They propose a model for...

    Provided By Illinois Institute of Technology

  • White Papers // May 2011

    Dynamic Coherent Acceptability Indices And Their Applications To Finance

    In this paper, the authors present a theoretical framework for studying coherent acceptability indices in a dynamic setup. They study dynamic coherent acceptability indices and dynamic coherent risk measures, and they establish a duality between them. They derive a representation theorem for dynamic coherent risk measures in terms of so...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    ActSee: Activity-Aware Radio Duty Cycling for Sensor Networks in Smart Environments

    In this paper, the authors present ActSee, an activity-aware radio duty cycling protocol that utilizes the learned event activity pattern information to intelligently adjust radio duty cycles in wireless sensor networks. The goal is to minimize data delivery latency and maximize throughput, while still conserving energy in the network. Based...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    An Empirical Evaluation of MapReduce under Interruptions

    The presence of interruptions is an unwanted but inevitable fact that all large-scale distributed computing systems have to face. The interruptions are more prevailed for MapReduce applications, as often MapReduce runs on the top of the commodity hardware based clusters, which are more vulnerable than traditional HEC systems. The problem...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

    Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers' confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable Linear Programming (LP) computations. The mechanism...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Achieving Distributed Buffering in Multi-Path Routing Using Fair Allocation

    Traditional network routing algorithms send data from the source to destination along a single path. The selected path may experience congestion due to other traffic, thereby reducing throughput. Multi-path routing divides the data along multiple paths, with the aim of increasing overall throughput. Due to the different latencies of using...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Delay-Bounded Adaptive UFH-Based Anti-Jamming Wireless Communication

    Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of Uncoordinated Frequency Hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strategies, lacking of theoretical foundations for scheme design and performance evaluation. To...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks

    Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several interesting approaches have been developed and demonstrated for their feasibility. The state-of-the-art, however, still has much room for improving their practicality. This is because the key...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    General Capacity Scaling of Wireless Networks

    The authors focus on the issue of capacity scaling laws for wireless networks that is initiated by Gupta and Kumar. Most of the existing results differ from each other because of the diversity of analytical models and assumptions to be used. In terms of scaling patterns, there are two typical...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2012

    On-line Scheduling of Real-time Services for Cloud Computing

    In this paper, the authors introduce a novel utility accrual scheduling algorithm for real-time cloud computing services. The real-time tasks are scheduled non-preemptively with the objective to maximize the total utility. The most unique characteristic of their approach is that, different from the traditional utility accrual approach that works under...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Efficient and Secure Key Extraction Using CSI Without Chasing Down Errors

    Generating keys and keeping them secret is critical in secure communications. Due to the "Open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Data Aggregation Without Secure Channel: How to Evaluate a Multivariate Polynomial Securely

    Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity....

    Provided By Illinois Institute of Technology

  • White Papers // May 2012

    Capacity Enhancement of Cognitive Wireless Networks With Distance Spectrum Usage Policy

    How much information can one transmit over a randomly distributed ad hoc network of n secondary devices, overlaid with m primary devices? Such a network model is referred to as Cognitive Wireless Network (CWN) and the authors' paper addresses the above question by characterizing its throughput capacity. Although a handful...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control....

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2010

    TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks

    The spectrum usage by a secondary user often happens in a certain geographical region and in a certain time interval, and the requests often come in an online fashion. Considering the selfish behaviors of primary users and secondary users, it is imperative to design online double spectrum auction methods. The...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2010

    Multi-Commodity Network Flows Over Multipaths With Bounded Buffers

    In this paper, the authors address the issue of designing multipath routing algorithms. Multi-path routing has the potential of improving the throughput but requires buffers at the destination. Their model assumes a network with capacitated edges and a delay function associated with the network links (edges). They consider the problem...

    Provided By Illinois Institute of Technology

  • White Papers // May 2010

    Multipath Network Flows: Bounded Buffers and Jitter

    In this paper, the authors address the issue of designing multipath routing algorithms. Multi-path routing has the potential of improving the throughput but requires buffers at the destination. Their model assumes a network with capacitated edges and a delay function associated with the network links (edges). They consider the problem...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2010

    Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks

    Gray hole attacks (a.k.a selective forwarding attacks) are a special case of Denial of Service (DoS) attack, where a misbehaving mesh router just forwards a subset of the packets it receives but drops the others. In wireless networks, it is particularly hard to detect the presence of such attackers because...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Achieving Distributed Buffering in Multi-Path Routing Using Fair Allocation

    Traditional network routing algorithms send data from the source to destination along a single path. The selected path may experience congestion due to other traffic, thereby reducing throughput. Multi-path routing divides the data along multiple paths, with the aim of increasing overall throughput. Due to the different latencies of using...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2010

    Extracting More Capacity From Multi-Channel Multi-Radio Wireless Networks by Exploiting Power

    Transmission power plays a crucial role in the design and performance of wireless networks. The issue is therefore complex since an increase in transmission power implies that a high quality signal is received at the receiver and hence an increase in channel capacity. Conversely, due to the shared nature of...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2008

    A Game Theoretic Approach to Gray Hole Attacks in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are multi-hop networks in which the mesh clients rely on static mesh routers (or directly via other mesh clients) to relay data from one point to another in a multihop fashion. WMN gained significant attention because of the numerous applications it supports, e.g., broadband home networking,...

    Provided By Illinois Institute of Technology

  • White Papers // May 2009

    Minimum-Latency Schedulings for Group Communications in Multi-Channel Multihop Wireless Networks

    This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. The authors focus on how to utilize the multiple channels to speed up four group communications including broadcast, aggregation, gathering, and gossiping in wireless networks under protocol...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2010

    TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks

    In wireless networks, the authors need to allocate spectrum efficiently. One challenge is that the spectrum usage requests often come in an online fashion. The second challenge is that the secondary users in a cognitive radio network are often selfish and prefer to maximize their own benefits. In this paper,...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    General Capacity Scaling of Wireless Networks

    The authors focus on the issue of capacity scaling laws for wireless networks that is initiated by Gupta and Kumar. Most of the existing results differ from each other because of the diversity of analytical models and assumptions to be used. In terms of scaling patterns, there are two typical...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Delay-Bounded Adaptive UFH-Based Anti-Jamming Wireless Communication

    Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of Uncoordinated Frequency Hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strategies, lacking of theoretical foundations for scheme design and performance evaluation. To...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2010

    iLight: Indoor Device-Free Passive Tracking Using Wireless Sensor Networks

    Target tracking is a main application of Wireless Sensor Networks (WSNs), and has been studied widely. In this paper, the authors study indoor passive tracking problem using WSNs, in which they assume no equipment is carried by the target and the tracking procedure is passive. They propose to use light...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Approximate Capacity Subregions of Uniform Multihop Wireless Networks

    The capacity region of multihop wireless network is involved in many capacity optimization problems. However, the membership of the capacity region is NP-complete in general, and hence the direct application of capacity region is quite limited. As a compromise, the authors often substitute the capacity region with a polynomial approximate...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2009

    Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks

    Optimal capacity analysis in multi-radio multichannel wireless networks by nature incurs the formulation of a mixed integer programming, which is NP-hard in general. The current state of the art mainly resorts to heuristic algorithms to obtain an approximate solution. In this paper, the authors propose a novel concept of Multi-Dimensional...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    A Generic Framework for Throughput-Optimal Control in MR-MC Wireless Networks

    In this paper, the authors study the throughput-optimal control in Multi-Radio Multi-Channel (MR-MC) wireless networks, which is an open challenging research issue due to the coupled link scheduling and channel/radio assignment issues. There are three main contributions in this report: they develop a new model by transforming a network node...

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2009

    Efficient Data Aggregation in Multi-Hop WSNs

    Wireless Sensor Networks (WSNs) have drawn considerable amount of research interests for their omnipresent applications such as environmental monitoring, spatial exploration and battlefield surveillance. To design and deploy successful wireless sensor networks, many issues need to be resolved such as deployment strategies, energy conservation, routing in dynamic environment, localization and...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2010

    SPA: Almost Optimal Sequential Channel Sensing, Probing, Accessing in Cognitive Radio Networks

    In this paper, the authors address the spectrum utilization problem in Cognitive Radio (CR) networks, in which a CR can only utilize spectrum opportunities when the channel is idle. One challenge for a CR is to balance exploring new channels and exploiting existing channel, due to the fact that the...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    Opportunities and Challenges in Running Scientific Workflows on the Cloud

    Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. The authors...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    ActSee: Activity-Aware Radio Duty Cycling for Sensor Networks in Smart Environments

    In this paper, the authors present ActSee, an activity-aware radio duty cycling protocol that utilizes the learned event activity pattern information to intelligently adjust radio duty cycles in wireless sensor networks. The goal is to minimize data delivery latency and maximize throughput, while still conserving energy in the network. Based...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2009

    Distributed Topology Control for Efficient OSPF Routing in Multi-Hop Wireless Networks

    This paper studies distributed topology control algorithms to support the efficient Open Shortest Path First (OSPF) link state routing in multi-hop wireless networks. It is highly desirable to retain the basic OSPF model of reliable flooding, especially when large quantities of external, rarely-changing routing data must be carried across the...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

    Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers' confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable Linear Programming (LP) computations. The mechanism...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks

    Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely associate a group of sensor nodes to a patient, and generate necessary secret keys to protect the subsequent wireless communications. Due...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2010

    Toward an Architecture of a Component-Based System Supporting Separation of Non-Functional Concerns

    The promises of component-based technology can only be fully realized when the system contains in its design a necessary level of separation of concerns. The authors propose to focus on the concerns that emerge throughout the lifecycle of the system and use them as an architectural foundation for the design...

    Provided By Illinois Institute of Technology

  • White Papers // May 2011

    Dynamic Coherent Acceptability Indices And Their Applications To Finance

    In this paper, the authors present a theoretical framework for studying coherent acceptability indices in a dynamic setup. They study dynamic coherent acceptability indices and dynamic coherent risk measures, and they establish a duality between them. They derive a representation theorem for dynamic coherent risk measures in terms of so...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Counterparty Risk And The Impact Of Collateralization In CDS Contracts

    The authors analyze the counterparty risk embedded in CDS contracts, in presence of a bilateral margin agreement. First, they investigate the pricing of collateralized counterparty risk and they derive the bilateral Credit Valuation Adjustment (CVA), Unilateral Credit Valuation Adjustment (UCVA) and Debt Valuation Adjustment (DVA). They propose a model for...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Flash-Based Audio and Video Communication in the Cloud

    Internet telephony and multimedia communication protocols have matured over the last fifteen years. Recently, the web is evolving as a popular platform for everything the authors do on the Internet including email, text chat, voice calls, discussions, enterprise apps and multi-party collaboration. Unfortunately, there is a disconnect between web and...

    Provided By Illinois Institute of Technology

  • White Papers // May 2008

    A UML-Based Metric Approach to Estimate Total Effort Using Software Project Designs

    The authors have developed three distinct UML approaches to calculate effort corresponding to the early, mid, and late stages of design using Carlson's UML Design Methodology. In early-design, the focus of the effort calculation is on the object components and their Requirement Responsibilities parameter, shown with the object-relationship diagram, to...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2009

    Effective Multi-User Broadcast Authentication in Wireless Sensor Networks

    Broadcast authentication is a critical security service in Wireless Sensor Networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. Previous solutions on broadcast authentication are mostly symmetric-key-based solutions such as ?TESLA and multilevel ?TESLA. These schemes are usually...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks

    Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several interesting approaches have been developed and demonstrated for their feasibility. The state-of-the-art, however, still has much room for improving their practicality. This is because the key...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2009

    Reliability-Aware Scalability Models for High Performance Computing

    Scalability models are powerful analytical tools for evaluating and predicting the performance of parallel applications. Unfortunately, existing scalability models do not quantify failure impact and therefore cannot accurately account for application performance in the presence of failures. In this paper, the authors extend two well-known models, namely Amdahl's law and...

    Provided By Illinois Institute of Technology

  • White Papers // May 2008

    A Fast Restart Mechanism for Checkpoint/Recovery Protocols in Networked Environments

    Checkpoint/recovery has been studied extensively, and various optimization techniques have been presented for its improvement. Regardless of the considerable research efforts, little work has been done on improving its restart latency. The time spent on retrieving and loading the checkpoint image during a recovery is non-trivial, especially in networked environments....

    Provided By Illinois Institute of Technology

  • White Papers // May 2008

    Enhancing Application Robustness Through Adaptive Fault Tolerance

    As the scale of High Performance Computing (HPC) continues to grow, application fault resilience becomes crucial. To address this problem, the authors are working on the design of an adaptive fault tolerance system for HPC applications. It aims to enable parallel applications to avoid anticipated failures via preventive migration, and...

    Provided By Illinois Institute of Technology

  • White Papers // May 2010

    MaxOPP: A Novel Opportunistic Routing for Wireless Mesh Networks

    Opportunistic Routing is emerging as a promising paradigm to mitigate performance degradation in wireless multi-hop networks due to lossy links and varying channel conditions. Opportunistic routing protocols exploit the broadcast nature of the wireless medium to perform hop-by-hop route construction, and to take advantage of path diversity. However, most of...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2012

    Performance Modelling of Opportunistic Forwarding With Imprecise Knowledge

    Mobility-assisted networking is becoming very popular as a mean of delivering messages in disconnected or very dynamic networks, such as opportunistic networks. Despite the rapid growth in the number of proposals for routing protocols that exploit the mobility of nodes, there is a lack of general theoretical frameworks to be...

    Provided By Illinois Institute of Technology