Lehigh University

Displaying 1-40 of 53 results

  • White Papers // Feb 2014

    Two-Layer Locally Repairable Codes for Distributed Storage Systems

    In this paper, the authors propose Locally Repairable Codes (LRCs) with optimal minimum distance for Distributed Storage Systems (DSS). A two-layer encoding structure is employed to ensure data reconstruction and the designated repair locality. The data is first encoded in the first layer by any existing Maximum Distance Separable (MDS)...

    Provided By Lehigh University

  • White Papers // Sep 2013

    Exploring Linked Open Data with Tag Clouds

    In this paper, the authors present the contextual tag cloud system: a novel application that helps users explore a large scale RDF dataset. Unlike folksonomy tags used in most traditional tag clouds, the tags in their system are ontological terms (classes and properties), and a user can construct a context...

    Provided By Lehigh University

  • White Papers // Jan 2013

    Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets

    In this paper, the authors present a Smartphone dual defense protection framework that allows official and alternative android markets to detect malicious applications among those new applications that are submitted for public release. Their framework consists of servers running on clouds where developers who wish to release their new applications...

    Provided By Lehigh University

  • White Papers // Jan 2013

    Performance Evaluation of Distributed PacketScore Scheme

    Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Recently, the authors proposed the PacketScore scheme, a DDoS defense architecture that supports automated attack detection, online attack characterization and attack blocking. Its key idea is to use a statistics-based packet scoring mechanism to distinguish between legitimate...

    Provided By Lehigh University

  • White Papers // Nov 2012

    Incentive Driven Information Sharing in Delay Tolerant Mobile Networks

    Mobile wireless devices (e.g., Smartphones, PDAs, and notebooks) play important roles in the people daily life, e.g., users often use such devices for bank transactions, keep in touch with friends. Users can also store such information and share with one another via opportunistic peer to peer links. However, peer to...

    Provided By Lehigh University

  • White Papers // Sep 2012

    Error Correction for Cooperative Data Exchange

    This paper considers the problem of error correction for a Co-operative Data Exchange (CDE) system, where some clients are compromised or failed and send false messages. Assuming each client possesses a subset of the total messages, they analyze the error correction capability when every client is allowed to broadcast only...

    Provided By Lehigh University

  • White Papers // Aug 2012

    Non-Homogeneous Distributed Storage Systems

    Distributed Storage Systems (DSS) are widely used today for storing data reliably over long periods of time using a distributed collection of storage nodes, which may be individually unreliable. Application scenarios include large data centers such as Total Recall, OceanStore and peer-to-peer storage systems such as Wuala, that use nodes...

    Provided By Lehigh University

  • White Papers // May 2012

    Source Anonymity in Fair Scheduling: A Case for the Proportional Method

    Fairness amongst multiple users sharing a common resource has been an important criterion in the evaluation of scheduling algorithms in networks. Anonymous networking, where sources of transmitted packets are undecipherable to an eavesdropper, requires that packets from multiple sources are randomly reordered prior to transmission which works against the notion...

    Provided By Lehigh University

  • White Papers // Apr 2012

    Detecting Blackhole Attacks in Disruption-Tolerant Networks Through Packet Exchange Recording

    The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch black-hole attacks by dropping packets in the networks. The traditional...

    Provided By Lehigh University

  • White Papers // Mar 2012

    Unidentifiable Attacks in Electric Power Systems

    The electric power grid is a crucial infrastructure in the society and is always a target of malicious users and attackers. In this paper, the authors first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack even though it detects its presence. Thus, the...

    Provided By Lehigh University

  • White Papers // Mar 2012

    Exact-MSR Codes for Distributed Storage With Low Repair Complexity

    Distributed storage nodes connected in a network can improve the system reliability against node failures, when redundancy is introduced to ensure data recovery. Two types of data recovery are of interest: one is the data recovery of the entire message file, called data reconstruction, and the other is how to...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Evaluations of Various Message Ferry Scheduling Schemes With Two Traffic Classes

    Routing in partitioned ad-hoc networks is a challenging problem since end-to-end connectivity may not exist. A Message Ferrying (MF) scheme has been proposed recently for non-real-time applications where certain mobile nodes act as message ferries to collect and deliver packets. An Elliptical Zone Forwarding (EZF) scheme has also been designed...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Comparison of Unicast Routing Schemes in DTNs

    Delay and Disruption Tolerant Network (DTN)s have been proposed to address data communication challenges in network scenarios where an instantaneous end-to-end path between a source and destination may not exist, and the links between nodes may be opportunistic, predictably connectable, or periodically-(dis)connected. In this paper, the authors focus on comparing...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Study of Robust Data Transfer Protocol for VANETs

    Vehicular Ad-hoc NETworks (VANETs) have emerged as a new network environment for intelligent transportation systems. In this paper, the authors focus on Traffic Monitoring (TM) and Roadside Message Transfer (RMT) applications. The TM Application (TMA) allows drivers to query traffic conditions at some distance ahead of themselves so that they...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks

    Several approaches have been proposed for intrusion detection in mobile ad hoc networks. Most of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected ad hoc network, nodes usually have...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Integrated Buffer and Route Management in a DTN With Message Ferry

    Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivity in Disruption Tolerant Network (DTN)s, where a set of nodes called ferries are responsible for carrying messages for all nodes in the...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Comparison of Four Unicast Routing Schemes in DTNs

    Disruption Tolerant Network (DTN)s has been proposed to provide data communications in challenging network scenarios where an instantaneous end-to-end path between a source and destination may not exist. In this paper, the authors focus on comparing the performance of four recently proposed unicast routing schemes, namely Multi-hop Routing with Custody...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Store-and-Forward Performance in a DTN

    Delay and disruption tolerant networks have been proposed to address data communication challenges in network scenarios where an instantaneous end-to-end path between a source and destination may not exist, and the links between nodes may be opportunistic, predictably connectable, or periodically- (dis)connected. In this paper, the authors describe the store-and-forward...

    Provided By Lehigh University

  • White Papers // Sep 2011

    Secure Broadcasting with Side-Information

    In this paper, the authors derive information-theoretic performance limits for secure and reliable communications over the general two-user discrete memoryless broadcast channel with side-information at the transmitter. The sender wishes to broadcast two independent messages to two receivers, under the constraint that each message should be kept confidential from the...

    Provided By Lehigh University

  • White Papers // Sep 2011

    Using Tag Clouds to Quickly Discover Patterns in Linked Data Sets

    Casual users usually have knowledge gaps that prevent them from using a Knowledge Base (KB) effectively. This paper is exacerbated by KBs for linked data sets because they cover ontologies with diverse domains and the data is often incomplete with regard to the ontologies. The authors believe providing visual summaries...

    Provided By Lehigh University

  • White Papers // Aug 2011

    JET: Exception Checking in the Java Native Interface

    Java's type system enforces exception-checking rules that stipulate a checked exception thrown by a method must be declared in the throws clause of the method. Software written in Java often invokes native methods through the use of the Java Native Interface (JNI). Java's type system, however, cannot enforce the same...

    Provided By Lehigh University

  • White Papers // Aug 2011

    Secure Content Centric Mobile Network

    Rapid advancements of wireless technologies allow users to access real-time data, and stay connected with friends and business while they are on the move. However, most emerging mobile applications assume users have cellular data services, and hence not everyone can enjoy new mobile applications. In addition, some emerging mobile applications...

    Provided By Lehigh University

  • White Papers // Jul 2011

    Detection and Classification of Different Botnet C&C Channels

    Unlike other types of malware, botnets are characterized by their Command and Control (C&C) channels, through which a central authority, the botmaster, may use the infected computer to carry out malicious activities. Given the damage botnets are capable of causing, detection and mitigation of botnet threats are imperative. In this...

    Provided By Lehigh University

  • White Papers // May 2011

    Biometric Template Protection for Dynamic Time Warping-based User Authentication

    A DTW-based biometric user authentication system needs a DTW template to set up a warping function for a query biometric. In addition, a matching template is required to examine similarity. In this paper, the authors present a hardened template to protect the DTW template. For the matching template, it is...

    Provided By Lehigh University

  • White Papers // May 2011

    Attacks on Speech Biometric Authentication

    The authors investigate the security of DTW, VQ and GMM methods that have been used in speaker authentication systems. They present attack models based on adversary knowledge. They start with naive adversaries without knowledge of an authentic speaker and develop them into highly knowledgeable adversaries who know the speaker's information,...

    Provided By Lehigh University

  • White Papers // Mar 2011

    Privacy-Aware BedTree Based Solution for Fuzzy Multi-Keyword Search Over Encrypted Data

    As Cloud Computing technology becomes more mature, many organizations and individuals are interested in storing more sensitive data e.g. personal health records, customer's related information in the cloud. Such sensitive data needs to be encrypted before it is outsourced to the cloud. Typically, the cloud servers also need to support...

    Provided By Lehigh University

  • White Papers // Jan 2011

    Rank Metric Decoder Architectures for Random Linear Network Coding With Error Control

    While random linear network coding is a powerful tool for disseminating information in communication networks, it is highly susceptible to errors caused by various sources. Due to error propagation, errors greatly deteriorate the throughput of network coding and seriously undermine both reliability and security of data. Hence error control for...

    Provided By Lehigh University

  • White Papers // Jan 2011

    OS-Multicast: On-Demand Situation-Aware Multicasting in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. In this paper, the authors study how to provide high-performance multicasting service in DTNs. They develop a multicasting mechanism based on on-demand path discovery and overall situation awareness of link availability (OS-multicast)...

    Provided By Lehigh University

  • White Papers // Aug 2010

    JNI Light: An Operational Model for the Core JNI

    Through Foreign Function Interfaces (FFIs), software components in different programming languages interact with each other in the same address space. Recent years have witnessed a number of systems that analyze FFIs for safety and reliability. However, lack of formal specifications of FFIs hampers the progress in this endeavor. The authors...

    Provided By Lehigh University

  • White Papers // Jun 2010

    Detecting Wormhole Attacks in Delay Tolerant Networks

    The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the...

    Provided By Lehigh University

  • White Papers // Feb 2010

    Generalized Adaptive Network Coded Cooperation (GANCC): A Unified Framework for Network Coding and Channel Coding

    In this paper, the authors consider distributed coding for multi-source single-sink data collection wireless networks. A unified framework for network coding and channel coding, termed Generalized Adaptive Network Coded Cooperation (GANCC), is proposed. Key ingredients of GANCC include: matching code graphs with the dynamic network graphs on-the-fly, and integrating channel...

    Provided By Lehigh University

  • White Papers // Feb 2010

    Research on SaaS-Based Accounting Information System

    With the continuous development of internet technology and the globalization of economy, SMEs are facing great opportunities as well as challenges. On the one hand, SMEs urgently need the introduction of IT systems and services, including accounting information system, to improve efficiency, reduce operational costs and enhance competitiveness. On the...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Achievable Information Rate for Outdoor Free Space Optical Communication with Intensity Modulation and Direct Detection

    This work investigates the achievable information rate with the state-of-the-art turbo coding and intensity modulation / direct detection for outdoor long-distance Free-Space Optic (FSO) communications. The channel under weak atmospheric turbulence is modeled as a log-normal intensity fading channel where on-off keying makes it look asymmetric. While no effort is...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Node Density-Based Adaptive Routing Scheme for Disruption Tolerant Networks

    Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can withstand disruptions need to be designed. A store-and-forward approach has been proposed for disruption tolerant networks. Recently, several approaches have been proposed for unicast...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Context-Aware Multicast Routing Scheme for Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. Several schemes have been proposed for multicast routing in DTNs assuming the availability of different amount of knowledge about network topology etc. In this paper, authors propose a node-density based adaptive multicast...

    Provided By Lehigh University

  • White Papers // Dec 2009

    MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks

    The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks...

    Provided By Lehigh University

  • White Papers // Oct 2009

    Efficient and Reliable Power Line Communications Through Coding and Diversity Techniques

    Recognizing the resemblance of Power Line Communication (PLC) channels and the frequency-selective radio-frequency (RF) fading channels, this paper considers efficient and reliable PLC through the joint exploitation of coding and diversity techniques. A serial concatenation is constructed which comprises a non-binary Low-Density Parity-Check (LDPC) code, one of the best-performing error...

    Provided By Lehigh University

  • White Papers // Aug 2009

    Auditor Process Accountability And Epistemic Motivation: Principles Versus Rules-Based Accounting Standards

    The author examines how the nature of accounting standards - principles- versus rules-based - influences auditors' perceptions of process accountability and their epistemic motivation. Using a between-subjects experiment with 104 auditors from a Big?]4 audit firm, they find that principles-based accounting standards significantly increase auditors' perceptions of process accountability when...

    Provided By Lehigh University

  • White Papers // Aug 2009

    The Impact Of Government Intervention On Corporate Governance: Evidence From The EU

    This paper examines the effect of government intervention on corporate governance quality in the European Union. Using the Corporate Governance Quotient (CGQ) issued by Institutional Shareholder Services (ISS) to measure corporate governance quality, I find that aggregate government intervention leads to better corporate governance. After disaggregating different types of government...

    Provided By Lehigh University

  • White Papers // Aug 2009

    Design and Analysis of Network Coding Schemes for Disruption Tolerant Networks

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Recently, network coding schemes for DTN has been proposed. However, these schemes...

    Provided By Lehigh University

  • White Papers // May 2009

    Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme

    Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. A store-and-forward network architecture known as the Disruption Tolerant Network (DTN) has been designed for such challenging network environments. To further improve the delivery performance, some researchers have proposed some network coding schemes for DTNs. However, not...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Evaluations of Various Message Ferry Scheduling Schemes With Two Traffic Classes

    Routing in partitioned ad-hoc networks is a challenging problem since end-to-end connectivity may not exist. A Message Ferrying (MF) scheme has been proposed recently for non-real-time applications where certain mobile nodes act as message ferries to collect and deliver packets. An Elliptical Zone Forwarding (EZF) scheme has also been designed...

    Provided By Lehigh University

  • White Papers // Apr 2012

    Detecting Blackhole Attacks in Disruption-Tolerant Networks Through Packet Exchange Recording

    The Disruption Tolerant Networks (DTNs) are especially useful in providing mission critical services such as in emergency networks or battlefield scenarios. However, DTNs are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary nodes launch black-hole attacks by dropping packets in the networks. The traditional...

    Provided By Lehigh University

  • White Papers // Jul 2009

    Secure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption (CP-ABE) System for the DTNs

    Mobile Nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Several application scenarios require a security design that provides fine grain access...

    Provided By Lehigh University

  • White Papers // Jun 2010

    Detecting Wormhole Attacks in Delay Tolerant Networks

    The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the...

    Provided By Lehigh University

  • White Papers // Jul 2011

    Detection and Classification of Different Botnet C&C Channels

    Unlike other types of malware, botnets are characterized by their Command and Control (C&C) channels, through which a central authority, the botmaster, may use the infected computer to carry out malicious activities. Given the damage botnets are capable of causing, detection and mitigation of botnet threats are imperative. In this...

    Provided By Lehigh University

  • White Papers // Mar 2012

    Unidentifiable Attacks in Electric Power Systems

    The electric power grid is a crucial infrastructure in the society and is always a target of malicious users and attackers. In this paper, the authors first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack even though it detects its presence. Thus, the...

    Provided By Lehigh University

  • White Papers // Aug 2012

    Non-Homogeneous Distributed Storage Systems

    Distributed Storage Systems (DSS) are widely used today for storing data reliably over long periods of time using a distributed collection of storage nodes, which may be individually unreliable. Application scenarios include large data centers such as Total Recall, OceanStore and peer-to-peer storage systems such as Wuala, that use nodes...

    Provided By Lehigh University

  • White Papers // May 2012

    Source Anonymity in Fair Scheduling: A Case for the Proportional Method

    Fairness amongst multiple users sharing a common resource has been an important criterion in the evaluation of scheduling algorithms in networks. Anonymous networking, where sources of transmitted packets are undecipherable to an eavesdropper, requires that packets from multiple sources are randomly reordered prior to transmission which works against the notion...

    Provided By Lehigh University

  • White Papers // Sep 2011

    Secure Broadcasting with Side-Information

    In this paper, the authors derive information-theoretic performance limits for secure and reliable communications over the general two-user discrete memoryless broadcast channel with side-information at the transmitter. The sender wishes to broadcast two independent messages to two receivers, under the constraint that each message should be kept confidential from the...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Comparison of Unicast Routing Schemes in DTNs

    Delay and Disruption Tolerant Network (DTN)s have been proposed to address data communication challenges in network scenarios where an instantaneous end-to-end path between a source and destination may not exist, and the links between nodes may be opportunistic, predictably connectable, or periodically-(dis)connected. In this paper, the authors focus on comparing...

    Provided By Lehigh University

  • White Papers // Jun 2008

    Secure Opportunistic Data Retrievals in Challenged Environments

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g., battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Several DTN routing schemes have been proposed. However, very little work has...

    Provided By Lehigh University

  • White Papers // Aug 2011

    Secure Content Centric Mobile Network

    Rapid advancements of wireless technologies allow users to access real-time data, and stay connected with friends and business while they are on the move. However, most emerging mobile applications assume users have cellular data services, and hence not everyone can enjoy new mobile applications. In addition, some emerging mobile applications...

    Provided By Lehigh University

  • White Papers // Aug 2009

    Design and Analysis of Network Coding Schemes for Disruption Tolerant Networks

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Recently, network coding schemes for DTN has been proposed. However, these schemes...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Performance Study of Robust Data Transfer Protocol for VANETs

    Vehicular Ad-hoc NETworks (VANETs) have emerged as a new network environment for intelligent transportation systems. In this paper, the authors focus on Traffic Monitoring (TM) and Roadside Message Transfer (RMT) applications. The TM Application (TMA) allows drivers to query traffic conditions at some distance ahead of themselves so that they...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks

    Several approaches have been proposed for intrusion detection in mobile ad hoc networks. Most of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected ad hoc network, nodes usually have...

    Provided By Lehigh University

  • White Papers // Jan 2012

    Integrated Buffer and Route Management in a DTN With Message Ferry

    Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivity in Disruption Tolerant Network (DTN)s, where a set of nodes called ferries are responsible for carrying messages for all nodes in the...

    Provided By Lehigh University

  • White Papers // Sep 2008

    Secure Data Retrieval System (SEDAR) for DTNs

    Disruption Tolerant Networking (DTN) technology is designed to deal with the intermittent connectivity among mobile nodes due to mobility, short range radios or terrain obstacles. The authors have recently evaluated the performance of two information retrieval schemes that are designed to work in the DTN environments. Their schemes utilize both...

    Provided By Lehigh University

  • White Papers // Aug 2008

    Performance Evaluation of Information Retrieval Schemes for Multi-Attribute Queries in DTNs

    In this paper, the authors have presented three information retrieval schemes and compare their performances using queries with two attributes. Their results indicate that when the network is sparse, index duplication is not sufficient to achieve high query success rate. Data duplication needs to be used instead. Their result show...

    Provided By Lehigh University

  • White Papers // Sep 2008

    Efficient Interdomain Multicast Delivery in Disruption Tolerant Networks

    Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g., battlefield and disaster recovery scenarios. Disruption Tolerant Network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. In the past, the authors have proposed two intra-domain multicast routing schemes,...

    Provided By Lehigh University

  • White Papers // Nov 2012

    Incentive Driven Information Sharing in Delay Tolerant Mobile Networks

    Mobile wireless devices (e.g., Smartphones, PDAs, and notebooks) play important roles in the people daily life, e.g., users often use such devices for bank transactions, keep in touch with friends. Users can also store such information and share with one another via opportunistic peer to peer links. However, peer to...

    Provided By Lehigh University

  • White Papers // May 2011

    Biometric Template Protection for Dynamic Time Warping-based User Authentication

    A DTW-based biometric user authentication system needs a DTW template to set up a warping function for a query biometric. In addition, a matching template is required to examine similarity. In this paper, the authors present a hardened template to protect the DTW template. For the matching template, it is...

    Provided By Lehigh University

  • White Papers // May 2011

    Attacks on Speech Biometric Authentication

    The authors investigate the security of DTW, VQ and GMM methods that have been used in speaker authentication systems. They present attack models based on adversary knowledge. They start with naive adversaries without knowledge of an authentic speaker and develop them into highly knowledgeable adversaries who know the speaker's information,...

    Provided By Lehigh University

  • White Papers // Feb 2010

    Generalized Adaptive Network Coded Cooperation (GANCC): A Unified Framework for Network Coding and Channel Coding

    In this paper, the authors consider distributed coding for multi-source single-sink data collection wireless networks. A unified framework for network coding and channel coding, termed Generalized Adaptive Network Coded Cooperation (GANCC), is proposed. Key ingredients of GANCC include: matching code graphs with the dynamic network graphs on-the-fly, and integrating channel...

    Provided By Lehigh University

  • White Papers // Sep 2012

    Error Correction for Cooperative Data Exchange

    This paper considers the problem of error correction for a Co-operative Data Exchange (CDE) system, where some clients are compromised or failed and send false messages. Assuming each client possesses a subset of the total messages, they analyze the error correction capability when every client is allowed to broadcast only...

    Provided By Lehigh University

  • White Papers // Feb 2010

    Research on SaaS-Based Accounting Information System

    With the continuous development of internet technology and the globalization of economy, SMEs are facing great opportunities as well as challenges. On the one hand, SMEs urgently need the introduction of IT systems and services, including accounting information system, to improve efficiency, reduce operational costs and enhance competitiveness. On the...

    Provided By Lehigh University

  • White Papers // Jan 2013

    Performance Evaluation of Distributed PacketScore Scheme

    Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Recently, the authors proposed the PacketScore scheme, a DDoS defense architecture that supports automated attack detection, online attack characterization and attack blocking. Its key idea is to use a statistics-based packet scoring mechanism to distinguish between legitimate...

    Provided By Lehigh University

  • White Papers // Jan 2013

    Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets

    In this paper, the authors present a Smartphone dual defense protection framework that allows official and alternative android markets to detect malicious applications among those new applications that are submitted for public release. Their framework consists of servers running on clouds where developers who wish to release their new applications...

    Provided By Lehigh University

  • White Papers // Sep 2013

    Exploring Linked Open Data with Tag Clouds

    In this paper, the authors present the contextual tag cloud system: a novel application that helps users explore a large scale RDF dataset. Unlike folksonomy tags used in most traditional tag clouds, the tags in their system are ontological terms (classes and properties), and a user can construct a context...

    Provided By Lehigh University

  • White Papers // Sep 2011

    Using Tag Clouds to Quickly Discover Patterns in Linked Data Sets

    Casual users usually have knowledge gaps that prevent them from using a Knowledge Base (KB) effectively. This paper is exacerbated by KBs for linked data sets because they cover ontologies with diverse domains and the data is often incomplete with regard to the ontologies. The authors believe providing visual summaries...

    Provided By Lehigh University

  • White Papers // Feb 2014

    Two-Layer Locally Repairable Codes for Distributed Storage Systems

    In this paper, the authors propose Locally Repairable Codes (LRCs) with optimal minimum distance for Distributed Storage Systems (DSS). A two-layer encoding structure is employed to ensure data reconstruction and the designated repair locality. The data is first encoded in the first layer by any existing Maximum Distance Separable (MDS)...

    Provided By Lehigh University

  • White Papers // Aug 2008

    Generating and Evaluating Object-Oriented Designs for Instructors and Novice Students

    Creating object-oriented designs for even simple problems of the type assigned to beginning students is a challenging task. While rules can be applied to identify key design components, multiple acceptable solutions often exist, and instructors may have different preferences for which variation(s) are best. The paper describes a tool one...

    Provided By Lehigh University

  • White Papers // Jan 2009

    Propagating Trust and Distrust to Demote Web Spam

    Web spamming describes behavior that attempts to deceive search engine's ranking algorithms. TrustRank is a recent algorithm that can combat web spam by propagating trust among web pages. However, TrustRank propagates trust among web pages based on the number of outgoing links, which is also how PageRank propagates authority scores...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Achievable Information Rate for Outdoor Free Space Optical Communication with Intensity Modulation and Direct Detection

    This work investigates the achievable information rate with the state-of-the-art turbo coding and intensity modulation / direct detection for outdoor long-distance Free-Space Optic (FSO) communications. The channel under weak atmospheric turbulence is modeled as a log-normal intensity fading channel where on-off keying makes it look asymmetric. While no effort is...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Node Density-Based Adaptive Routing Scheme for Disruption Tolerant Networks

    Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can withstand disruptions need to be designed. A store-and-forward approach has been proposed for disruption tolerant networks. Recently, several approaches have been proposed for unicast...

    Provided By Lehigh University

  • White Papers // Jan 2010

    Context-Aware Multicast Routing Scheme for Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are emerging solutions to networks that experience frequent network partitions and large end-to-end delays. Several schemes have been proposed for multicast routing in DTNs assuming the availability of different amount of knowledge about network topology etc. In this paper, authors propose a node-density based adaptive multicast...

    Provided By Lehigh University

  • White Papers // Mar 2009

    A Context-Aware Reflective Middleware Framework for Adaptive Real-Time Vehicle Applications

    Software has become crucial to develop vehicle systems. Future unmanned intelligent vehicle safety systems will increasingly rely on situational contexts collected at runtime through temporally built ad-hoc and dynamic networks for vehicle-to-vehicle and vehicle-to-roadside communications and dynamic adaptation to the contexts to improve vehicle safety and reduce traffic congestion. Context-aware...

    Provided By Lehigh University

  • White Papers // Aug 2009

    The Impact Of Government Intervention On Corporate Governance: Evidence From The EU

    This paper examines the effect of government intervention on corporate governance quality in the European Union. Using the Corporate Governance Quotient (CGQ) issued by Institutional Shareholder Services (ISS) to measure corporate governance quality, I find that aggregate government intervention leads to better corporate governance. After disaggregating different types of government...

    Provided By Lehigh University

  • White Papers // Aug 2009

    Auditor Process Accountability And Epistemic Motivation: Principles Versus Rules-Based Accounting Standards

    The author examines how the nature of accounting standards - principles- versus rules-based - influences auditors' perceptions of process accountability and their epistemic motivation. Using a between-subjects experiment with 104 auditors from a Big?]4 audit firm, they find that principles-based accounting standards significantly increase auditors' perceptions of process accountability when...

    Provided By Lehigh University

  • White Papers // Aug 2010

    JNI Light: An Operational Model for the Core JNI

    Through Foreign Function Interfaces (FFIs), software components in different programming languages interact with each other in the same address space. Recent years have witnessed a number of systems that analyze FFIs for safety and reliability. However, lack of formal specifications of FFIs hampers the progress in this endeavor. The authors...

    Provided By Lehigh University