Michigan State University

Displaying 1-40 of 116 results

  • White Papers // Feb 2014

    Beyond the MDS Bound in Distributed Cloud Storage

    Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, reed-solomon code based regenerating codes were developed. The RS code based Minimum Storage Regeneration code (RS-MSR) and the RS code based...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Fingerprint Classication Using Orientation Field Flow Curves

    Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. The authors propose an automatic approach of identifying the geometric characteristics of ridges based on curves generated by the orientation field called Orientation Field Flow Curves (OFFCs). The geometric characteristics of OFFCs...

    Provided By Michigan State University

  • White Papers // Dec 2013

    3D Fingerprint Phantoms

    One of the critical factors prior to deployment of any large scale biometric system is to have a realistic estimate of its matching performance. In practice, evaluations are conducted on the operational data to set an appropriate threshold on match scores before the actual deployment. These performance estimates, though, are...

    Provided By Michigan State University

  • White Papers // Nov 2013

    Matching Website Password Requirements Strength with Rockyou Password Set

    Before there were computers there was security. One of the most important factors that have been used for identity authentication is a password. The authors have many fields that are very dependent on password use such as online financial services and system access such as user account and email access....

    Provided By Michigan State University

  • White Papers // Oct 2013

    Latent Fingerprint Indexing: Fusion of Level 1 and Level 2 Features

    Fingerprints have been widely used as a biometric trait for person recognition. Due to the wide acceptance and deployment of fingerprint matching systems, there is a steady increase in the size of fingerprint databases in law enforcement and national ID agencies. Thus, it is of great interest to develop methods...

    Provided By Michigan State University

  • White Papers // Sep 2013

    Open Source Biometric Recognition

    The biometrics community enjoys an active research field that has produced algorithms for several modalities suitable for real-world applications. Despite these developments, there exist few open source implementations of complete algorithms that are maintained by the community or deployed outside a laboratory environment. In this paper, the authors motivate the...

    Provided By Michigan State University

  • White Papers // Aug 2013

    Factorization of Unitarity and Black Hole Firewalls

    Unitary black hole evaporation necessarily involves a late-time superposition of decoherent states, including states describing distinct spacetimes (e.g., different center of mass trajectories of the black hole). Typical analyses of the black hole information problem, including the argument for the existence of firewalls, assume approximate unitarity (\"Factorization of unitarity\") on...

    Provided By Michigan State University

  • White Papers // Aug 2013

    LFIQ: Latent Fingerprint Image Quality

    Latent fingerprint images are typically obtained under non-ideal acquisition conditions, resulting in incomplete or distorted impression of a finger, and ridge structure corrupted by background noise. This necessitates involving latent experts in latent fingerprint examination, including assessing the value of a latent print as forensic evidence. However, it is now...

    Provided By Michigan State University

  • White Papers // Jun 2013

    Is There a Fingerprint Pattern in the Image?

    A fingerprint orientation field has distinct characteristics which can differentiate fingerprints from any other flow patterns: it has a specific number of singular points (cores and deltas), the configuration of singular points follows a certain spatial distribution, and its global shape is like an arch. In this paper, the authors...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // Jan 2013

    First Step Toward Cloud-Based Firewalling

    With the explosive growth of network-based services and attacks, the complexity and cost of firewall deployment and management have been increasing rapidly. Yet, each private network, no matter big or small, has to deploy and manage its own firewall, which is the critical first line of defense. To reduce the...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Nov 2012

    On Latent Fingerprint Image Quality

    Latent fingerprints which are lifted from surfaces of objects at crime scenes play a very important role in identifying suspects in the crime scene investigations. Due to poor quality of latent fingerprints, automatic processing of latents can be extremely challenging. For this reason, latent examiners need to be involved in...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Oct 2012

    Robust Ensemble Clustering by Matrix Completion

    Data clustering is an important task and has found applications in numerous real-world problems. Since no single clustering algorithm is able to identify all different types of cluster shapes and structures, ensemble clustering was proposed to combine different partitions of the same data generated by multiple clustering algorithms. The key...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Efficient Kernel Clustering Using Random Fourier Features

    Kernel clustering algorithms have the ability to capture the non-linear structure inherent in many real world data sets and thereby, achieve better clustering performance than Euclidean distance based clustering algorithms. However, their quadratic computational complexity renders them non-scalable to large data sets. In this paper, the authors employ random Fourier...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Nighttime Face Recognition at Long Distance: Cross-Distance and Cross-Spectral Matching

    Automatic face recognition capability in surveillance systems is important for security applications. However, few studies have ad-dressed the problem of outdoor face recognition at a long distance (over 100 meters) in both daytime and nighttime environments. In this paper, the authors first report on a system that they have designed...

    Provided By Michigan State University

  • White Papers // Sep 2012

    On Iris Camera Interoperability

    With the advancements in iris matching and growing number of system deployments, a wide variety of iris cameras are now being manufactured. These cameras differ in manufacturing technology, including image acquisition spectrum and illumination settings. For large scale applications (e.g. UID system in India) where cameras from several vendors are...

    Provided By Michigan State University

  • White Papers // Sep 2012

    Routinizing Change: Does Business Process Management Technology Have Unintended Firm-Level Consequences?

    Business process management systems have demonstrated benefits at the process level, but evidence of firm level effects is inconclusive. The authors argue that as BPMS utilization grows, its use could become more routinized. Routinization tends to minimize search and can lead to competency traps. Furthermore, as more processes are managed...

    Provided By Michigan State University

  • White Papers // Jul 2012

    Face Recognition: Impostor-Based Measures of Uniqueness and Quality

    The authors present a framework, called Uniqueness-based Non-match Estimates (UNE), which demonstrates the ability to improve face recognition performance of any face matcher. The first aspect of the framework is a novel metric for measuring the uniqueness of a given individual, called the Impostor-based Uniqueness Measure (IUM). The UNE the...

    Provided By Michigan State University

  • White Papers // Apr 2012

    A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles

    Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles can help in the development, deployment, and maintenance of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore,...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Dec 2011

    An Improved Coupled Spectral Regression for Heterogeneous Face Recognition

    Coupled Spectral Regression (CSR) is an effective framework for heterogeneous face recognition (e.g., VISual light (VIS) vs. Near InfraRed (NIR)). CSR aims to learn different projections for different face modalities respectively to find a common subspace where the samples of different modalities from the same class are as close as...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Latent Fingerprint Enhancement Via Robust Orientation Field Estimation

    Latent fingerprints, or simply latents, have been considered as cardinal evidence for identifying and convicting criminals. The amount of information available for identification from latents is often limited due to their poor quality, unclear ridge structure and occlusion with complex background or even other latent prints. The authors propose a...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Face Recognition Across Time Lapse: On Learning Feature Subspaces

    There is a growing interest in understanding the impact of aging on face recognition performance, as well as designing recognition algorithms that are mostly invariant to temporal changes. While some success has been made on this front, a fundamental question has yet to be answered: do face recognition systems that...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Analysis of Facial Features in Identical Twins

    A study of the distinctiveness of different facial features (MLBP, SIFT, and facial marks) with respect to distinguishing identical twins is presented. The accuracy of distinguishing between identical twin pairs is measured using the entire face, as well as each facial component (eyes, eyebrows, nose, and mouth). The impact of...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Towards Automated Caricature Recognition

    This paper addresses the problem of identifying a subject from a caricature. A caricature is a facial sketch of a subject's face that exaggerates identifiable facial features beyond realism, while still conveying his identity. To enable this task, the authors propose a set of qualitative facial features that encodes the...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

    Despite evidence that lack of interoperable information systems results in enormous costs, development, implementation, and effective use of Inter-Organizational information Systems (IOS) remains an elusive goal for many companies. Lack of interoperability across systems is especially problematic for manufacturers dependent on global supply chains. The authors develop propositions about the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Oct 2011

    On the Evidential Value of Fingerprints

    Fingerprint evidence is routinely used by forensics and law enforcement agencies worldwide to apprehend and convict criminals, a practice in use for over 100 years. The use of fingerprints has been accepted as an infallible proof of identity based on two premises: permanence or persistence, and uniqueness or individuality. However,...

    Provided By Michigan State University

  • White Papers // Oct 2011

    Partial Face Recognition: An Alignment Free Approach

    Many approaches have been developed for holistic face recognition with impressive performance. However, few studies have addressed the question of how to recognize an arbitrary image patch of a holistic face. In this paper, the authors address this problem of partial face recognition. Partial faces frequently appear in unconstrained image...

    Provided By Michigan State University

  • White Papers // Oct 2011

    NFRAD: Near-Infrared Face Recognition at a Distance

    Face recognition at a distance is gaining wide attention in order to augment the surveillance systems with face recognition capability. However, face recognition at a distance in nighttime has not yet received adequate attention considering the increased security threats at nighttime. The authors introduce a new face image database, called...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Aug 2011

    Face Finder: Filtering a Large Face Database Using Scars, Marks and Tattoos

    Facial marks (e.g. moles, freckles, and scars) are soft biometric traits that have limited utility in uniquely identifying individuals. However, facial marks can still play a crucial role both in filtering a large face gallery, as well as in distinguishing between ambiguous face comparisons such as identical twins. This paper...

    Provided By Michigan State University

  • White Papers // Aug 2011

    Biometric Recognition of Newborns: Identification Using Palmprints

    The authors present some results on newborn identification through high-resolution images of palmar surfaces. To their knowledge, there is no biometric system currently available that can be effectively used for newborn identification. The manual procedure of capturing inked footprints in practice for this purpose is limited for use inside hospitals...

    Provided By Michigan State University

  • White Papers // Feb 2014

    Beyond the MDS Bound in Distributed Cloud Storage

    Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, reed-solomon code based regenerating codes were developed. The RS code based Minimum Storage Regeneration code (RS-MSR) and the RS code based...

    Provided By Michigan State University

  • White Papers // Oct 2011

    On the Evidential Value of Fingerprints

    Fingerprint evidence is routinely used by forensics and law enforcement agencies worldwide to apprehend and convict criminals, a practice in use for over 100 years. The use of fingerprints has been accepted as an infallible proof of identity based on two premises: permanence or persistence, and uniqueness or individuality. However,...

    Provided By Michigan State University

  • White Papers // Dec 2009

    Fingerprint Alteration

    The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the security afforded by these systems is not compromised. While several issues related to fingerprint system security have been investigated in the past, including the use of...

    Provided By Michigan State University

  • White Papers // Jan 2009

    FM Model Based Fingerprint Reconstruction From Minutiae Template

    Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae template does not contain sufficient information to allow the reconstruction of the original fingerprint image. This belief has now been shown to be false; several algorithms have been...

    Provided By Michigan State University

  • White Papers // Dec 2008

    Filtering Large Fingerprint Database for Latent Matching

    Latent fingerprint identification is of critical importance to law enforcement agencies in apprehending criminals. Considering the huge size of fingerprint databases maintained by law enforcement agencies, exhaustive one-to-one matching is impractical and a database filtering technique is necessary to reduce the search space. Due to low image quality and small...

    Provided By Michigan State University

  • White Papers // Jun 2008

    On Matching Latent Fingerprints

    Latent fingerprint identification is of critical importance to law enforcement agencies in forensics application. While tremendous progress has been made in the field of automatic fingerprint matching, latent fingerprint matching continues to be a difficult problem because the challenges involved in latent print matching are quite different from plain or...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Latent Fingerprint Enhancement Via Robust Orientation Field Estimation

    Latent fingerprints, or simply latents, have been considered as cardinal evidence for identifying and convicting criminals. The amount of information available for identification from latents is often limited due to their poor quality, unclear ridge structure and occlusion with complex background or even other latent prints. The authors propose a...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Dec 2009

    On Latent Fingerprint Enhancement

    Automatic feature extraction in latent fingerprints is a challenging problem due to poor quality of most latents, such as unclear ridge structures, overlapped lines and letters, and overlapped fingerprints. The authors proposed a latent fingerprint enhancement algorithm which requires manually marked Region Of Interest (ROI) and singular points. The core...

    Provided By Michigan State University

  • White Papers // Apr 2010

    On the Utility of Extended Fingerprint Features: A Study on Pores

    Extended fingerprint features are routinely used by latent examiners in forensic applications. They are now being considered for inclusion in Automatic Fingerprint Identification Systems (AFIS), particularly with the adoption of 1000ppi resolution in the Next Generation Identification (NGI) system. Earlier studies on this topic suffered from two limitations: experiments were...

    Provided By Michigan State University

  • White Papers // Aug 2011

    Biometric Recognition of Newborns: Identification Using Palmprints

    The authors present some results on newborn identification through high-resolution images of palmar surfaces. To their knowledge, there is no biometric system currently available that can be effectively used for newborn identification. The manual procedure of capturing inked footprints in practice for this purpose is limited for use inside hospitals...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jul 2011

    Characterizing Geospatial Dynamics of Application Usage in a 3G Cellular Data Network

    Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in cellular network usage. Such geospatial correlation patterns provide local optimization opportunities to cellular network operators for handling the explosive growth in the traffic volume observed in...

    Provided By Michigan State University

  • White Papers // May 2011

    STARS: Static Relays for Multi-Robot Real-Time Search and Monitoring

    The authors first present a problem called Precedence Constrained Two Traveling Salesman (PC2TSP). They propose a near-optimal heuristic to PC2TSP to generate tours by clustering points, generating optimal single-traveler tours, and tour pruning and balance. Second, they show an application of PC2TSP and how their solution to PC2TSP can be...

    Provided By Michigan State University

  • White Papers // Dec 2008

    All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs

    Packet classification is the core mechanism that enables many networking services on the Internet such as firewall packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry. TCAMs classify packets in constant time by comparing a...

    Provided By Michigan State University

  • White Papers // Apr 2009

    TCAM SPliT: Optimizing Space, Power, and Throughput for TCAM-Based Packet Classification Systems

    Packet classification is the core mechanism that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry because TCAMs can facilitate constant time classification by comparing a packet with all...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Oct 2008

    Fast Sensor Placement Algorithms for Fusion-Based Target Detection

    Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fusion has been shown as an effective technique for improving system detection performance by enabling efficient collaboration among sensors with limited sensing capability. Due to the high cost...

    Provided By Michigan State University

  • White Papers // Jun 2010

    Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks

    QoS provisioning is a complex and challenging issue in mobile ad hoc networks, especially when there are multiple QoS constraints. In this paper, authors propose an adaptive QoS routing scheme supported by cross-layer cooperation in ad hoc networks. The cross-layer mechanism provides up-to-date local QoS information for the adaptive routing...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Power Management for Power Over Ethernet Devices/implementation

    Power over Ethernet (PoE) is a widely adopted technology used to transfer both data and electrical power over an RJ-45 cable. PoE has many applications ranging from commercial to industrial. The need to have a standard for getting power down the cable became widely debated issue in PoE solutions. There...

    Provided By Michigan State University

  • White Papers // Jan 2010

    A Survey of Adaptive Middleware

    Developing distributed applications is a difficult task due to three major problems: the complexities of programming inter process communication, the need to support ser-vices across heterogeneous platforms, and the need to adapt to changing conditions. Traditional middleware such as CORBA, DCOM, and Java RMI addresses the first two problems to...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Middleware Reliability Implementations and Connector Wrappers

    Recently, Spitznagel and Garlan introduced connector wrappers, which cleanly specify reliability policies in a form that can be incorporated into existing architectural specifications. The authors recently implemented a middleware framework, called Theseus that supports asynchronous communication among distributed objects under a variety of different reliability policies. Both connector wrappers and...

    Provided By Michigan State University

  • White Papers // Jun 2008

    Mobile Technology And The Value Chain: Participants, Activities And Value Creation

    Technology has evolved significantly and it is increasingly being used by businesses and consumers alike. Technologies such as those supporting electronic business (e-Business) and mobile business (m-Business) are being used across organizations extensively in an attempt to improve operations and subsequently translate in either financial gains or strategic advantages. Opportunities...

    Provided By Michigan State University

  • White Papers // May 2009

    Hybrid Multi-Channel Multi-Radio Wireless Mesh Networks

    Many efforts have been devoted to maximizing network throughput in a multi-channel multi-radio wireless mesh network. Current solutions are based on either pure static or pure dynamic channel allocation approaches. In this paper, the authors propose a hybrid multi-channel multi-radio wireless mesh networking architecture, where each mesh node has both...

    Provided By Michigan State University

  • White Papers // Sep 2009

    Periocular Biometrics in the Visible Spectrum: A Feasibility Study

    Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close capture distance unlike other ocular biometrics (e.g., Iris, retina, and sclera). The authors study the feasibility of using periocular images of an individual...

    Provided By Michigan State University

  • White Papers // Apr 2008

    CDMA and TDMA Cellular Communication

    The objective of this paper is to investigate how the cellular technologies of Time-Division Multiple Access and Code-Division Multiple Access allow users to communicate, investigate how a man named Shannon discovered it was possible to achieve reliable transmissions over a channel, and how different coding schemes and techniques such as...

    Provided By Michigan State University

  • White Papers // Jan 2011

    TDMA Service for Sensor Networks

    Sensors networks are often constrained by limited power and limited communication range. If a sensor receives two messages simultaneously then they collide and both messages become incomprehensible. This paper presents a simple Time Division Multiple Access (TDMA) algorithm for assigning time slots to sensors and show that it provides a...

    Provided By Michigan State University

  • White Papers // Jan 2011

    SS-TDMA: A Self-Stabilizing MAC for Sensor Networks

    This paper focuses on the problem of designing a TDMA service for a grid-based sensor network. Such networks are readily found in many applications in the area of monitoring, hazard detection, and so on. The authors consider three communication patterns, broadcast, convergecast and local gossip that occur frequently in these...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Self-Stabilizing Deterministic Time Division Multiple Access for Sensor Networks

    An algorithm for Time Division Multiple Access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-stabilizing so that in the event of corruption of assigned slots and clock drift, it recovers...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks

    To ensure uninterrupted communication in a mobile ad-hoc network, efficient route discovery is crucial when nodes move and/or fail. Hence, protocols such as Dynamic Source Routing (DSR) precompute alternate routes before a node moves and/or fails. In this paper, the authors modify the way these alternate routes are maintained and...

    Provided By Michigan State University

  • White Papers // Jul 2010

    Slow Is Fast for Wireless Sensor Networks in the Presence of Message Losses

    Transformations from shared memory model to Wireless Sensor Networks (WSNs) quickly become inefficient in the presence of prevalent message losses in WSNs, and this prohibits their wider adoption. To address this problem, the authors propose a variation of the shared memory model, the SF shared memory model, where the actions...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries

    Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to achieve authentication: public key based and symmetric key based. Although previous work has shown that public...

    Provided By Michigan State University

  • White Papers // Jan 2011

    A Case Study on Prototyping Power Management Protocols for Sensor Networks

    Power management is an important problem in battery powered sensor networks as the sensors are required to operate for a long time (Usually, several weeks to several months). One of the challenges in developing power management protocols for sensor networks is prototyping. Specifically, existing programming platforms for sensor networks (e.g.,...

    Provided By Michigan State University

  • White Papers // Dec 2009

    Exploring the Future of Bioinformatics Data Sharing and Mining With Pygr and Worldbase

    One of the most important challenges in bioinformatics is a pure Computer Science problem: making it easy for different research groups to access, mine and integrate each other's datasets, in ways that go beyond simple web browsing. The problems of bioinformatics data sharing have grown enormously as the scale and...

    Provided By Michigan State University

  • White Papers // Aug 2010

    Routing and Spectrum Allocation for Video On-Demand Streaming in Cognitive Wireless Mesh Networks

    Cognitive radio, which enables dynamic access of under-utilized licensed spectrums, is a promising technology for more efficient spectrum utilization. Since cognitive radio enables the access of larger amount of spectrum, it can be used to build wireless mesh networks with higher network capacity, and thus provide better quality of services...

    Provided By Michigan State University

  • White Papers // Sep 2009

    On the Security of Non-Invertible Fingerprint Template Transforms

    Many transformation functions have been proposed for generating revocable or non-invertible biometric templates. However, their security analysis either ignores the distribution of biometric features or uses inefficient feature matching. This usually leads to unrealistic estimates of security. In this paper the authors introduce a new measure of non-invertibility, called the...

    Provided By Michigan State University

  • White Papers // May 2009

    Sidewinder: A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks

    In-situ data collection for mobile wireless sensor network deployments has received little study, such as in the case of floating sensor networks for storm surge and innundation monitoring. The paper demonstrates through quantitative study that traditional approaches to routing in mobile environments do not work well due to volatile topology...

    Provided By Michigan State University

  • White Papers // Jan 2009

    Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks

    Reliable dissemination of bulk data is one of the important problems in sensor networks. For example, programming or upgrading the software in sensors at run-time requires reliable dissemination of a new program across the network. This paper presents Infuse, a Time Division Multiple Access (TDMA) based reliable data dissemination protocol....

    Provided By Michigan State University

  • White Papers // Jul 2008

    Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough

    The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects Autonomous Systems (ASes). De-spite its importance for the Internet infrastructure, BGP is vulnerable to a variety of attacks due to lack of security mechanisms in place. Many BGP security mechanisms have been proposed, however, none of...

    Provided By Michigan State University