Illinois Institute of Technology

Displaying 1-40 of 90 results

  • White Papers // May 2014

    Devising a Cloud Scientific Workflow Platform for Big Data

    Scientific WorkFlow Management Systems (SWFMSs) are facing unprecedented challenges from big data deluge. As revising all the existing workflow applications to fit into cloud computing paradigm is impractical, thus migrating SWFMSs into the cloud to leverage the functionalities of both cloud computing and SWFMSs may provide a viable approach to...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2014

    Scalable State Management for Scientific Applications in the Cloud

    The data generated by scientific simulations and experimental facilities is beginning to revolutionize the infrastructure support needed by these applications. The on-demand aspect and flexibility of cloud computing environments makes it an attractive platform for data-intensive scientific applications. However, cloud computing poses unique challenges for these applications. For example, cloud...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2014

    Achieving Efficient Distributed Scheduling with Message Queues in the Cloud for Many-Task Computing and High-Performance Computing

    Task scheduling and execution over large scale, distributed systems plays an important role on achieving good performance and high system utilization. Due to the explosion of parallelism found in today's hardware, applications need to perform over-decomposition to deliver good performance; this over-decomposition is driving job management systems' requirements to support...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2014

    Exploring Infiniband Hardware Virtualization in OpenNebula towards Efficient High-Performance Computing

    It has been widely accepted that software virtualization has a big negative impact on High-Performance Computing (HPC) application performance. This paper explores the potential use of Infiniband hardware virtualization in an OpenNebula cloud towards the efficient support of MPI-based workloads. The authors have implemented, deployed, and tested an Infiniband network...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2014

    Towards In-Order and Exactly-Once Delivery using Hierarchical Distributed Message Queues

    In today's world, distributed message queues are used in many systems and play different roles (e.g. content delivery, notification system and message delivery tools). It is important for the queue services to be able to deliver messages at large scales with a variety of message sizes with high concurrency. An...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2014

    HyCache+: Towards Scalable High-Performance Caching Middleware for Parallel File Systems

    The ever-growing gap between the computation and I/O is one of the fundamental challenges for future computing systems. This computation-I/O gap is even larger for modern large scale high-performance systems due to their state-of-the-art yet decades long architecture: the compute and storage resources form two cliques that are interconnected with...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2014

    Migrating Scientific Workflow Management Systems from the Grid to the Cloud

    Cloud computing is an emerging computing paradigm that can offer unprecedented scalability and resources on demand, and is gaining significant adoption in the science community. At the same time, scientific workflow management systems provide essential support and functionality to scientific computing, such as management of data and task dependencies, job...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2013

    Understanding the Costs of Many-Task Computing Workloads on Intel Xeon Phi Coprocessors

    Many-Task Computing (MTC) aims to bridge the gap between HPC and HTC. MTC emphasizes running many computational tasks over a short period of time, where tasks can be either dependent or independent of one another. MTC has been well supported on clouds, grids, and supercomputers on traditional computing architectures, but...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Paving the Road to Exascale with Many-Task Computing

    Exascale systems will bring significant challenges. This paper attempts to addresses them through the Many-Task Computing (MTC) paradigm, by delivering data-aware job scheduling systems and fully asynchronous distributed architectures. MTC applications are structured as DAG graphs of tasks, with dependencies forming the edges. The asynchronous nature of MTC makes it...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Towards Efficient Many-Task Computing on Accelerators in High-End Computing Systems

    Current software and hardware limitations prevent Many-Task Computing (MTC) workloads from leveraging hardware accelerators boasting many core computing architectures. This paper aims to address the programmability gap between MTC and accelerators, through the innovative CUDA middleware GeMTC. By working at the warp level, GeMTC enables heterogeneous task scheduling and 10x...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Early Experiences in Running Many-Task Computing Workloads on GPGPUs

    In this paper the authors aim to enable swift to efficiently use accelerators (such as NVIDIA GPUs) to further accelerate a wide range of applications. This paper presents preliminary results in the costs associated with managing and launching concurrent kernels on NVIDIA Kepler GPUs. The authors expect their results to...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2013

    Towards the Support for Many-Task Computing on Many-Core Computing Platforms

    Current software and hardware limitations prevent ManyTask Computing (MTC) from leveraging hardware accelerators (NVIDIA GPUs and Intel MIC) boasting many-core computing architectures. Some broad application classes that t the MTC paradigm is work flows, MapReduce, high-throughput computing, and a subset of high-performance computing. MTC emphasizes using many computing resources over...

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2013

    Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems

    In this paper, the authors study the problem of how to execute a real-time frame-based task set on DVFS-enabled processors so that the system's reliability can be guaranteed and the energy consumption of executing the task set is minimized. To ensure the reliability requirement, processing resources are reserved to re-execute...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    Modeling Many-Task Computing Workloads on a Petaflop IBM Blue Gene/P Supercomputer

    Understanding the behavior of Bag-Of-Tasks (BOT) is crucial for analyzing workflow-generated Many-Task Computing (MTC) workloads to aid in designing optimized job scheduling systems. Future job scheduling systems will need to be able to schedule large bags of tasks onto large-scale supercomputers and adaptive clouds with heterogeneous processors, I/O performance, and...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    Enabling Dynamic Memory Management Support for MTC on NVIDIA GPUs

    Many-task computing emphasizes utilizing many computational tasks over a short period of time. Tasks can be either dependent or independent and are arranged as Directed Acyclical Graphs (DAGs). Until recently there had been no support for MTC workloads on accelerators, but the development of GeMTC enables many-task computing to run...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    Optimizing Large Data Transfers Over 100Gbps Wide Area Networks

    The Advanced Networking Initiative (ANI) project from the Energy Services Network provides a 100 Gbps testbed, which offers the opportunity for evaluating applications and middleware used by scientific experiments. This testbed is a prototype of a 100 Gbps wide-area network backbone, which links several Department Of Energy (DOE) national laboratories,...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    HyCache: A User-Level Caching Middleware for Distributed File Systems

    One of the bottlenecks of distributed file systems deals with mechanical Hard Disk Drives (HDD). Although Solid-State Drives (SSD) has been around since the 1990's, HDDs are still dominant due to large capacity and relatively low cost. Hybrid hard drives with a small built-in SSD cache do not meet the...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2013

    SimMatrix: SIMulator for MAny-Task Computing Execution FabRIc at EXascale

    Exascale computers (expected to be composed of millions of nodes and billions of threads of execution) will enable the unraveling of significant scientific mysteries. Many-task computing is a distributed paradigm, which can potentially address three of the four major challenges of exascale computing, namely memory/storage, concurrency/locality, and resiliency. Exascale computing...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2013

    Exploring Reliability of Exascale Systems through Simulations

    Exascale computers are predicted to emerge by the end of this decade with millions of nodes and billions of concurrent cores/threads. One of the most critical challenges for exascale computing is how to effectively and efficiently maintain the system reliability. Checkpointing is the state-of-the-art technique for high-end computing system reliability...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2013

    ZHT: A Light-Weight Reliable Persistent Dynamic Scalable Zero-Hop Distributed Hash Table

    In this paper, the authors present ZHT, a zero-hop distributed hash table, which has been tuned for the requirements of high-end computing systems. ZHT aims to be a building block for future distributed systems, such as parallel and distributed file systems, distributed job management systems, and parallel programming systems. The...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2013

    Throughput Optimizing Localized Link Scheduling for Multihop Wireless Networks Under Physical Interference Model

    The authors study throughput-optimum localized link scheduling in wireless networks. The majority of results on link scheduling assume binary interference models that simplify interference constraints in actual wireless communication. While the physical interference model reflects the physical reality more precisely, the problem becomes notoriously harder under the physical interference model....

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2012

    A Cooperative Message Authentication Protocol in VANETs

    Safety provision is a crucial application for the Vehicular Ad hoc NETworks (VANETs). In the VANETs, vehicles periodically broadcast their geographic information. Therefore, collisions can be avoided. In this paper, the authors address the issue of large computation overhead caused by the safety message authentication. A Cooperative Message Authentication Protocol...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2012

    Routing Metrics for Minimizing End-to-End Delay in Multi-Radio Multi-Channel Wireless Networks

    This paper studies how to select a path with the minimum expected End-to-End Delay (EED) in a Multi-Radio Multi-Channel (MRMC) wireless mesh network. While the existing studies mainly focus on the packet transmission delay due to Medium Access Control (MAC), their new EED metric further takes into account the queuing...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2012

    On-line Scheduling of Real-time Services for Cloud Computing

    In this paper, the authors introduce a novel utility accrual scheduling algorithm for real-time cloud computing services. The real-time tasks are scheduled non-preemptively with the objective to maximize the total utility. The most unique characteristic of their approach is that, different from the traditional utility accrual approach that works under...

    Provided By Illinois Institute of Technology

  • White Papers // Oct 2012

    Real-Time Misbehavior Detection in IEEE 802.11 Based Wireless Networks: An Analytical Approach

    The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 Distributed Coordinated Function (DCF), allows malicious nodes to deliberately manipulate their back-off parameters and thus unfairly gain a large share of the network throughput. In this paper, the authors first design a real-time back-off misbehavior detector, termed...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Efficient and Secure Key Extraction Using CSI Without Chasing Down Errors

    Generating keys and keeping them secret is critical in secure communications. Due to the "Open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Link Scheduling for Throughput Maximization in Multihop Wireless Networks Under Physical Interference

    The authors consider the problem of link scheduling for throughput maximization in multi-hop wireless networks. Majority of previous methods for this problem are still restricted to graph-based interference models. In this paper, they study the link scheduling problem using a more realistic physical interference model. Through some key observations about...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Rejecting the Attack: Source Authentication for Wi-Fi Management Frames Using CSI Information

    Comparing to well protected data frames, Wi-Fi Management Frames (MFs) are extremely vulnerable to various attacks. Since MFs are transmitted without encryption, attackers can forge them easily. Such attacks can be detected in cooperative environment such as Wireless Intrusion Detection System (WIDS). However, in non-cooperative environment it is difficult for...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    Data Aggregation Without Secure Channel: How to Evaluate a Multivariate Polynomial Securely

    Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity....

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2012

    AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption

    Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control....

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2012

    Network Agile Preference-Based Prefetching for Mobile Devices

    For mobile devices, communication via cellular networks consumes more energy, and has a lower data rate than Wi-Fi networks, and suffers an expensive limited data plan. However the Wi-Fi network coverage range and density are smaller than those of the cellular networks. In this paper, the authors present a behavior-aware...

    Provided By Illinois Institute of Technology

  • White Papers // May 2012

    Capacity Enhancement of Cognitive Wireless Networks With Distance Spectrum Usage Policy

    How much information can one transmit over a randomly distributed ad hoc network of n secondary devices, overlaid with m primary devices? Such a network model is referred to as Cognitive Wireless Network (CWN) and the authors' paper addresses the above question by characterizing its throughput capacity. Although a handful...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2012

    Performance Modelling of Opportunistic Forwarding With Imprecise Knowledge

    Mobility-assisted networking is becoming very popular as a mean of delivering messages in disconnected or very dynamic networks, such as opportunistic networks. Despite the rapid growth in the number of proposals for routing protocols that exploit the mobility of nodes, there is a lack of general theoretical frameworks to be...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2012

    ADAPT: Availability-Aware MapReduce Data Placement for Non-Dedicated Distributed Computing

    The MapReduce programming paradigm is gaining more and more popularity recently due to its merits of ease of programming, data distribution and fault tolerance. The low barrier of adoption of MapReduce makes it a promising framework for non-dedicated distributed computing environments. However, the variability of hosts resources and availability could...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2012

    Security Policy Management Process within Six Sigma Framework

    In this paper, the authors present a management process for creating adaptive, real-time security policies within the Six Sigma framework. A key challenge for the creation of a management process is the integration with models of known Industrial processes. One of the most used industrial process models is Six Sigma...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2011

    Exploring Distributed Hash Tables in High-End Computing

    Over the last decade, storage systems have experienced a 10- fold increase between their capacity and bandwidth. This gap is predicted to grow faster with exponentially growing concurrency levels, with future exascales delivering millions of nodes and billions of threads of execution. A critical component of future file systems for...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2011

    Pattern-Aware File Reorganization in MPI-IO

    Scientific computing is becoming more data-intensive; however I/O throughput is not growing at the same rate. MPI-IO and parallel file systems are expected to help bridge the gap by increasing data access parallelism. Compared to traditional I/O systems, some factors are more important in parallel I/O system in order to...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    A Generic Framework for Throughput-Optimal Control in MR-MC Wireless Networks

    In this paper, the authors study the throughput-optimal control in Multi-Radio Multi-Channel (MR-MC) wireless networks, which is an open challenging research issue due to the coupled link scheduling and channel/radio assignment issues. There are three main contributions in this report: they develop a new model by transforming a network node...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    Opportunities and Challenges in Running Scientific Workflows on the Cloud

    Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. The authors...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2011

    Opportunities and Challenges for Running Scientific Workflows on the Cloud

    Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. The authors...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2009

    Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks

    Sleep scheduling is a widely used mechanism in Wireless Sensor Networks (WSNs) to reduce the energy consumption since it can save the energy wastage caused by the idle listening state. In a traditional sleep scheduling, however, sensors have to start up numerous times in a period, and thus consume extra...

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2009

    Privacy-Aware Attribute-Based Encryption With User Accountability

    As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2008

    Spreadsheet Techniques in Physics Calculations

    The spreadsheet is a general purpose calculation tool and has many uses in physics. In particular, it is very good for one-time data manipulation and for developing calculations which then can be made into programs if one needs to do the calculations repetitively. Modern spreadsheets also will permit one to...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2010

    Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

    Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the...

    Provided By Illinois Institute of Technology

  • White Papers // Jul 2010

    Secure and Practical Outsourcing of Linear Programming in Cloud Computing

    Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Capacity Region of a Wireless Mesh Backhaul Network Over the CSMA/CA MAC

    This paper studies the maximum throughput that can be supported by a given wireless mesh backhaul network, over a practical CSMA/CA Medium Access Control (MAC) protocol. This paper resorts to the Multi-Commodity Flow (MCF) formulation, augmented with the conflict-graph constraints, to jointly compute the maximum throughput and the associated optimal...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2010

    Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings

    Online Personal Health Record (PHR) enables patients to manage their own medical records in a centralized way, which greatly facilitates the storage, access and sharing of personal health data. With the emergence of cloud computing, it is attractive for the PHR service providers to shift their PHR applications and storage...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2009

    Running Head: Global Vs Primary Sales

    Industrial psychologists continue to debate the bandwidth-fidelity dilemma in personality assessment. Do longer, broad scales predict better than shorter, more specific scales? In this study, the job relatedness (cross-validated prediction of sales volume) of the global scales of the 16PF Questionnaire were compared to the more specific, primary scales. It...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2011

    Pattern-Aware File Reorganization in MPI-IO

    Scientific computing is becoming more data-intensive; however I/O throughput is not growing at the same rate. MPI-IO and parallel file systems are expected to help bridge the gap by increasing data access parallelism. Compared to traditional I/O systems, some factors are more important in parallel I/O system in order to...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2012

    Routing Metrics for Minimizing End-to-End Delay in Multi-Radio Multi-Channel Wireless Networks

    This paper studies how to select a path with the minimum expected End-to-End Delay (EED) in a Multi-Radio Multi-Channel (MRMC) wireless mesh network. While the existing studies mainly focus on the packet transmission delay due to Medium Access Control (MAC), their new EED metric further takes into account the queuing...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers,...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Enabling Efficient Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2009

    Severity Prediction of Drought in a Large Geographical Area Using Distributed Wireless Sensor Networks

    In this paper, the severity prediction of drought through the implementation of modern sensor networks is discussed. The authors describe how to design a drought prediction system using wireless sensor networks. This paper will describe a terrestrial interconnected wireless sensor network paradigm for the prediction of severity of drought over...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2009

    Enhancing Attribute-Based Encryption With Attribute Hierarchy

    Attribute-Based Encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, the authors focus on improving the efficiency of ABE by leveraging a...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2009

    A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control

    As a recently proposed public key primitive, Attribute-Based Encryption (ABE) (including Ciphertext-Policy ABE (CP-ABE) and Key-Policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2010

    Secure Ranked Keyword Search Over Encrypted Cloud Data

    As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow users to securely search over encrypted data...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

    Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers' confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable Linear Programming (LP) computations. The mechanism...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks

    Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely associate a group of sensor nodes to a patient, and generate necessary secret keys to protect the subsequent wireless communications. Due...

    Provided By Illinois Institute of Technology

  • White Papers // Sep 2010

    Toward an Architecture of a Component-Based System Supporting Separation of Non-Functional Concerns

    The promises of component-based technology can only be fully realized when the system contains in its design a necessary level of separation of concerns. The authors propose to focus on the concerns that emerge throughout the lifecycle of the system and use them as an architectural foundation for the design...

    Provided By Illinois Institute of Technology

  • White Papers // May 2011

    Dynamic Coherent Acceptability Indices And Their Applications To Finance

    In this paper, the authors present a theoretical framework for studying coherent acceptability indices in a dynamic setup. They study dynamic coherent acceptability indices and dynamic coherent risk measures, and they establish a duality between them. They derive a representation theorem for dynamic coherent risk measures in terms of so...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Counterparty Risk And The Impact Of Collateralization In CDS Contracts

    The authors analyze the counterparty risk embedded in CDS contracts, in presence of a bilateral margin agreement. First, they investigate the pricing of collateralized counterparty risk and they derive the bilateral Credit Valuation Adjustment (CVA), Unilateral Credit Valuation Adjustment (UCVA) and Debt Valuation Adjustment (DVA). They propose a model for...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2011

    Flash-Based Audio and Video Communication in the Cloud

    Internet telephony and multimedia communication protocols have matured over the last fifteen years. Recently, the web is evolving as a popular platform for everything the authors do on the Internet including email, text chat, voice calls, discussions, enterprise apps and multi-party collaboration. Unfortunately, there is a disconnect between web and...

    Provided By Illinois Institute of Technology

  • White Papers // Feb 2009

    Effective Multi-User Broadcast Authentication in Wireless Sensor Networks

    Broadcast authentication is a critical security service in Wireless Sensor Networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. Previous solutions on broadcast authentication are mostly symmetric-key-based solutions such as ?TESLA and multilevel ?TESLA. These schemes are usually...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks

    Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several interesting approaches have been developed and demonstrated for their feasibility. The state-of-the-art, however, still has much room for improving their practicality. This is because the key...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2010

    TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks

    The spectrum usage by a secondary user often happens in a certain geographical region and in a certain time interval, and the requests often come in an online fashion. Considering the selfish behaviors of primary users and secondary users, it is imperative to design online double spectrum auction methods. The...

    Provided By Illinois Institute of Technology

  • White Papers // Jun 2010

    Multi-Commodity Network Flows Over Multipaths With Bounded Buffers

    In this paper, the authors address the issue of designing multipath routing algorithms. Multi-path routing has the potential of improving the throughput but requires buffers at the destination. Their model assumes a network with capacitated edges and a delay function associated with the network links (edges). They consider the problem...

    Provided By Illinois Institute of Technology

  • White Papers // May 2010

    Multipath Network Flows: Bounded Buffers and Jitter

    In this paper, the authors address the issue of designing multipath routing algorithms. Multi-path routing has the potential of improving the throughput but requires buffers at the destination. Their model assumes a network with capacitated edges and a delay function associated with the network links (edges). They consider the problem...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2010

    Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks

    Gray hole attacks (a.k.a selective forwarding attacks) are a special case of Denial of Service (DoS) attack, where a misbehaving mesh router just forwards a subset of the packets it receives but drops the others. In wireless networks, it is particularly hard to detect the presence of such attackers because...

    Provided By Illinois Institute of Technology

  • White Papers // Apr 2011

    Achieving Distributed Buffering in Multi-Path Routing Using Fair Allocation

    Traditional network routing algorithms send data from the source to destination along a single path. The selected path may experience congestion due to other traffic, thereby reducing throughput. Multi-path routing divides the data along multiple paths, with the aim of increasing overall throughput. Due to the different latencies of using...

    Provided By Illinois Institute of Technology

  • White Papers // Mar 2010

    Extracting More Capacity From Multi-Channel Multi-Radio Wireless Networks by Exploiting Power

    Transmission power plays a crucial role in the design and performance of wireless networks. The issue is therefore complex since an increase in transmission power implies that a high quality signal is received at the receiver and hence an increase in channel capacity. Conversely, due to the shared nature of...

    Provided By Illinois Institute of Technology

  • White Papers // May 2009

    Minimum-Latency Schedulings for Group Communications in Multi-Channel Multihop Wireless Networks

    This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. The authors focus on how to utilize the multiple channels to speed up four group communications including broadcast, aggregation, gathering, and gossiping in wireless networks under protocol...

    Provided By Illinois Institute of Technology

  • White Papers // Aug 2010

    TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks

    In wireless networks, the authors need to allocate spectrum efficiently. One challenge is that the spectrum usage requests often come in an online fashion. The second challenge is that the secondary users in a cognitive radio network are often selfish and prefer to maximize their own benefits. In this paper,...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    General Capacity Scaling of Wireless Networks

    The authors focus on the issue of capacity scaling laws for wireless networks that is initiated by Gupta and Kumar. Most of the existing results differ from each other because of the diversity of analytical models and assumptions to be used. In terms of scaling patterns, there are two typical...

    Provided By Illinois Institute of Technology

  • White Papers // Jan 2011

    Delay-Bounded Adaptive UFH-Based Anti-Jamming Wireless Communication

    Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of Uncoordinated Frequency Hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strategies, lacking of theoretical foundations for scheme design and performance evaluation. To...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2010

    iLight: Indoor Device-Free Passive Tracking Using Wireless Sensor Networks

    Target tracking is a main application of Wireless Sensor Networks (WSNs), and has been studied widely. In this paper, the authors study indoor passive tracking problem using WSNs, in which they assume no equipment is carried by the target and the tracking procedure is passive. They propose to use light...

    Provided By Illinois Institute of Technology

  • White Papers // Dec 2009

    Approximate Capacity Subregions of Uniform Multihop Wireless Networks

    The capacity region of multihop wireless network is involved in many capacity optimization problems. However, the membership of the capacity region is NP-complete in general, and hence the direct application of capacity region is quite limited. As a compromise, the authors often substitute the capacity region with a polynomial approximate...

    Provided By Illinois Institute of Technology

  • White Papers // Nov 2009

    Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks

    Optimal capacity analysis in multi-radio multichannel wireless networks by nature incurs the formulation of a mixed integer programming, which is NP-hard in general. The current state of the art mainly resorts to heuristic algorithms to obtain an approximate solution. In this paper, the authors propose a novel concept of Multi-Dimensional...

    Provided By Illinois Institute of Technology