Michigan State University

Displaying 1-40 of 105 results

  • White Papers // May 2014

    Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance

    This paper addresses the problem of identifying a very small subset of data points that belong to a significantly larger massive dataset (i.e., Big Data). The small number of selected data points must adequately represent and faithfully characterize the massive Big Data. Such identification process is known as representative selection....

    Provided By Michigan State University

  • White Papers // Feb 2014

    Beyond the MDS Bound in Distributed Cloud Storage

    Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, reed-solomon code based regenerating codes were developed. The RS code based Minimum Storage Regeneration code (RS-MSR) and the RS code based...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Fingerprint Classication Using Orientation Field Flow Curves

    Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. The authors propose an automatic approach of identifying the geometric characteristics of ridges based on curves generated by the orientation field called Orientation Field Flow Curves (OFFCs). The geometric characteristics of OFFCs...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Parallel Network RAM: Effectively Utilizing Global Cluster Memory for Large Data-Intensive Parallel Programs

    Large scientific parallel applications demand large amounts of memory space. Current parallel computing platforms schedule jobs without fully knowing their memory requirements. This paper leads to uneven memory allocation in which some nodes are overloaded. This, in turn, leads to disk paging, which is extremely expensive in the context of...

    Provided By Michigan State University

  • White Papers // Dec 2013

    3D Fingerprint Phantoms

    One of the critical factors prior to deployment of any large scale biometric system is to have a realistic estimate of its matching performance. In practice, evaluations are conducted on the operational data to set an appropriate threshold on match scores before the actual deployment. These performance estimates, though, are...

    Provided By Michigan State University

  • White Papers // Nov 2013

    Matching Website Password Requirements Strength with Rockyou Password Set

    Before there were computers there was security. One of the most important factors that have been used for identity authentication is a password. The authors have many fields that are very dependent on password use such as online financial services and system access such as user account and email access....

    Provided By Michigan State University

  • White Papers // Oct 2013

    Latent Fingerprint Indexing: Fusion of Level 1 and Level 2 Features

    Fingerprints have been widely used as a biometric trait for person recognition. Due to the wide acceptance and deployment of fingerprint matching systems, there is a steady increase in the size of fingerprint databases in law enforcement and national ID agencies. Thus, it is of great interest to develop methods...

    Provided By Michigan State University

  • White Papers // Sep 2013

    Open Source Biometric Recognition

    The biometrics community enjoys an active research field that has produced algorithms for several modalities suitable for real-world applications. Despite these developments, there exist few open source implementations of complete algorithms that are maintained by the community or deployed outside a laboratory environment. In this paper, the authors motivate the...

    Provided By Michigan State University

  • White Papers // Aug 2013

    Factorization of Unitarity and Black Hole Firewalls

    Unitary black hole evaporation necessarily involves a late-time superposition of decoherent states, including states describing distinct spacetimes (e.g., different center of mass trajectories of the black hole). Typical analyses of the black hole information problem, including the argument for the existence of firewalls, assume approximate unitarity (\"Factorization of unitarity\") on...

    Provided By Michigan State University

  • White Papers // Aug 2013

    LFIQ: Latent Fingerprint Image Quality

    Latent fingerprint images are typically obtained under non-ideal acquisition conditions, resulting in incomplete or distorted impression of a finger, and ridge structure corrupted by background noise. This necessitates involving latent experts in latent fingerprint examination, including assessing the value of a latent print as forensic evidence. However, it is now...

    Provided By Michigan State University

  • White Papers // Jun 2013

    Is There a Fingerprint Pattern in the Image?

    A fingerprint orientation field has distinct characteristics which can differentiate fingerprints from any other flow patterns: it has a specific number of singular points (cores and deltas), the configuration of singular points follows a certain spatial distribution, and its global shape is like an arch. In this paper, the authors...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // Jan 2013

    First Step Toward Cloud-Based Firewalling

    With the explosive growth of network-based services and attacks, the complexity and cost of firewall deployment and management have been increasing rapidly. Yet, each private network, no matter big or small, has to deploy and manage its own firewall, which is the critical first line of defense. To reduce the...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Nov 2012

    On Latent Fingerprint Image Quality

    Latent fingerprints which are lifted from surfaces of objects at crime scenes play a very important role in identifying suspects in the crime scene investigations. Due to poor quality of latent fingerprints, automatic processing of latents can be extremely challenging. For this reason, latent examiners need to be involved in...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Oct 2012

    Robust Ensemble Clustering by Matrix Completion

    Data clustering is an important task and has found applications in numerous real-world problems. Since no single clustering algorithm is able to identify all different types of cluster shapes and structures, ensemble clustering was proposed to combine different partitions of the same data generated by multiple clustering algorithms. The key...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Efficient Kernel Clustering Using Random Fourier Features

    Kernel clustering algorithms have the ability to capture the non-linear structure inherent in many real world data sets and thereby, achieve better clustering performance than Euclidean distance based clustering algorithms. However, their quadratic computational complexity renders them non-scalable to large data sets. In this paper, the authors employ random Fourier...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Nighttime Face Recognition at Long Distance: Cross-Distance and Cross-Spectral Matching

    Automatic face recognition capability in surveillance systems is important for security applications. However, few studies have ad-dressed the problem of outdoor face recognition at a long distance (over 100 meters) in both daytime and nighttime environments. In this paper, the authors first report on a system that they have designed...

    Provided By Michigan State University

  • White Papers // Sep 2012

    On Iris Camera Interoperability

    With the advancements in iris matching and growing number of system deployments, a wide variety of iris cameras are now being manufactured. These cameras differ in manufacturing technology, including image acquisition spectrum and illumination settings. For large scale applications (e.g. UID system in India) where cameras from several vendors are...

    Provided By Michigan State University

  • White Papers // Sep 2012

    Routinizing Change: Does Business Process Management Technology Have Unintended Firm-Level Consequences?

    Business process management systems have demonstrated benefits at the process level, but evidence of firm level effects is inconclusive. The authors argue that as BPMS utilization grows, its use could become more routinized. Routinization tends to minimize search and can lead to competency traps. Furthermore, as more processes are managed...

    Provided By Michigan State University

  • White Papers // Jul 2012

    Face Recognition: Impostor-Based Measures of Uniqueness and Quality

    The authors present a framework, called Uniqueness-based Non-match Estimates (UNE), which demonstrates the ability to improve face recognition performance of any face matcher. The first aspect of the framework is a novel metric for measuring the uniqueness of a given individual, called the Impostor-based Uniqueness Measure (IUM). The UNE the...

    Provided By Michigan State University

  • White Papers // Apr 2012

    A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles

    Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles can help in the development, deployment, and maintenance of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore,...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Dec 2011

    An Improved Coupled Spectral Regression for Heterogeneous Face Recognition

    Coupled Spectral Regression (CSR) is an effective framework for heterogeneous face recognition (e.g., VISual light (VIS) vs. Near InfraRed (NIR)). CSR aims to learn different projections for different face modalities respectively to find a common subspace where the samples of different modalities from the same class are as close as...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Face Recognition Across Time Lapse: On Learning Feature Subspaces

    There is a growing interest in understanding the impact of aging on face recognition performance, as well as designing recognition algorithms that are mostly invariant to temporal changes. While some success has been made on this front, a fundamental question has yet to be answered: do face recognition systems that...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Analysis of Facial Features in Identical Twins

    A study of the distinctiveness of different facial features (MLBP, SIFT, and facial marks) with respect to distinguishing identical twins is presented. The accuracy of distinguishing between identical twin pairs is measured using the entire face, as well as each facial component (eyes, eyebrows, nose, and mouth). The impact of...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Latent Fingerprint Enhancement Via Robust Orientation Field Estimation

    Latent fingerprints, or simply latents, have been considered as cardinal evidence for identifying and convicting criminals. The amount of information available for identification from latents is often limited due to their poor quality, unclear ridge structure and occlusion with complex background or even other latent prints. The authors propose a...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Towards Automated Caricature Recognition

    This paper addresses the problem of identifying a subject from a caricature. A caricature is a facial sketch of a subject's face that exaggerates identifiable facial features beyond realism, while still conveying his identity. To enable this task, the authors propose a set of qualitative facial features that encodes the...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

    Despite evidence that lack of interoperable information systems results in enormous costs, development, implementation, and effective use of Inter-Organizational information Systems (IOS) remains an elusive goal for many companies. Lack of interoperability across systems is especially problematic for manufacturers dependent on global supply chains. The authors develop propositions about the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Oct 2011

    Partial Face Recognition: An Alignment Free Approach

    Many approaches have been developed for holistic face recognition with impressive performance. However, few studies have addressed the question of how to recognize an arbitrary image patch of a holistic face. In this paper, the authors address this problem of partial face recognition. Partial faces frequently appear in unconstrained image...

    Provided By Michigan State University

  • White Papers // Oct 2011

    NFRAD: Near-Infrared Face Recognition at a Distance

    Face recognition at a distance is gaining wide attention in order to augment the surveillance systems with face recognition capability. However, face recognition at a distance in nighttime has not yet received adequate attention considering the increased security threats at nighttime. The authors introduce a new face image database, called...

    Provided By Michigan State University

  • White Papers // Oct 2011

    On the Evidential Value of Fingerprints

    Fingerprint evidence is routinely used by forensics and law enforcement agencies worldwide to apprehend and convict criminals, a practice in use for over 100 years. The use of fingerprints has been accepted as an infallible proof of identity based on two premises: permanence or persistence, and uniqueness or individuality. However,...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Mar 2010

    Quantifying and Querying Network Reachability

    Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenance, and design. Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown. In this paper, the authors propose...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // May 2011

    A Probabilistic Model To Support Web Crawling For Social Media Based Sites

    Web crawling is a popular technique for data collection among researchers, practitioners and scholars. One of the major challenges web crawling techniques often face is the inefficient utilization of bandwidth, which results in unbalanced crawl between different sites. In this paper, the authors described a probabilistic model to improve the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Jul 2009

    Sparse Decoding of Low Density Parity Check Codes Using Margin Propagation

    One of the key factors underlying the popularity of Low-Density Parity-Check (LDPC) code is its iterative decoding algorithm that is amenable to efficient hardware implementation. Even though different variants of LDPC iterative decoding algorithms have been studied for its error-correcting properties, an analytical basis for evaluating energy efficiency of LDPC...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Aug 2003

    Destination Branding: Concept and Measurement

    Destination branding is about how consumers perceive the destination in their minds. Branding a destination is not just about creating a logo or a slogan. It is about capturing the distinct elements of the destination in the brand and communicating these elements through the brand's components: identity, essence, personality, image,...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Dec 2009

    On Latent Fingerprint Enhancement

    Automatic feature extraction in latent fingerprints is a challenging problem due to poor quality of most latents, such as unclear ridge structures, overlapped lines and letters, and overlapped fingerprints. The authors proposed a latent fingerprint enhancement algorithm which requires manually marked Region Of Interest (ROI) and singular points. The core...

    Provided By Michigan State University

  • White Papers // Apr 2010

    On the Utility of Extended Fingerprint Features: A Study on Pores

    Extended fingerprint features are routinely used by latent examiners in forensic applications. They are now being considered for inclusion in Automatic Fingerprint Identification Systems (AFIS), particularly with the adoption of 1000ppi resolution in the Next Generation Identification (NGI) system. Earlier studies on this topic suffered from two limitations: experiments were...

    Provided By Michigan State University

  • White Papers // Aug 2011

    Biometric Recognition of Newborns: Identification Using Palmprints

    The authors present some results on newborn identification through high-resolution images of palmar surfaces. To their knowledge, there is no biometric system currently available that can be effectively used for newborn identification. The manual procedure of capturing inked footprints in practice for this purpose is limited for use inside hospitals...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jul 2011

    Characterizing Geospatial Dynamics of Application Usage in a 3G Cellular Data Network

    Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in cellular network usage. Such geospatial correlation patterns provide local optimization opportunities to cellular network operators for handling the explosive growth in the traffic volume observed in...

    Provided By Michigan State University

  • White Papers // May 2011

    STARS: Static Relays for Multi-Robot Real-Time Search and Monitoring

    The authors first present a problem called Precedence Constrained Two Traveling Salesman (PC2TSP). They propose a near-optimal heuristic to PC2TSP to generate tours by clustering points, generating optimal single-traveler tours, and tour pruning and balance. Second, they show an application of PC2TSP and how their solution to PC2TSP can be...

    Provided By Michigan State University

  • White Papers // Apr 2009

    TCAM SPliT: Optimizing Space, Power, and Throughput for TCAM-Based Packet Classification Systems

    Packet classification is the core mechanism that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry because TCAMs can facilitate constant time classification by comparing a packet with all...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Sep 2012

    Routinizing Change: Does Business Process Management Technology Have Unintended Firm-Level Consequences?

    Business process management systems have demonstrated benefits at the process level, but evidence of firm level effects is inconclusive. The authors argue that as BPMS utilization grows, its use could become more routinized. Routinization tends to minimize search and can lead to competency traps. Furthermore, as more processes are managed...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

    Despite evidence that lack of interoperable information systems results in enormous costs, development, implementation, and effective use of Inter-Organizational information Systems (IOS) remains an elusive goal for many companies. Lack of interoperability across systems is especially problematic for manufacturers dependent on global supply chains. The authors develop propositions about the...

    Provided By Michigan State University

  • White Papers // May 2009

    Sidewinder: A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks

    In-situ data collection for mobile wireless sensor network deployments has received little study, such as in the case of floating sensor networks for storm surge and innundation monitoring. The paper demonstrates through quantitative study that traditional approaches to routing in mobile environments do not work well due to volatile topology...

    Provided By Michigan State University

  • White Papers // Mar 2010

    Survival Analysis: Overview of Parametric, Nonparametric and Semiparametric Approaches and New Developments

    Time to event data arise in several fields including biostatistics, demography, economics, engineering and sociology. The terms duration analysis, event-history analysis, failure-time analysis, reliability analysis, and transition analysis refer essentially to the same group of techniques although the emphases in certain modeling aspects could differ across disciplines. SAS procedures LIFETEST,...

    Provided By Michigan State University

  • White Papers // Nov 2009

    What Is The Impact Of Eliminating The Reconciliation Between IFRS And US GAAP? Early Evidence

    This paper investigate the impact of the SEC's decision to allow foreign private issuers who use IFRS (International Financial Reporting Standards) (IFRS filers) to stop providing reconciliation from IFRS to US GAAP (General Agreement on Tariffs and Trade). Using a difference-in-difference research design, the author examines both cost savings and...

    Provided By Michigan State University

  • White Papers // Sep 2009

    An Interorganizational Social Network Analysis of the Michigan Diabetes Outreach Networks

    Public health has always relied on partnerships to conduct organized community efforts for the purpose of improving community health. Traditional methods for measuring partnerships collect information about the characteristics of different partners to draw comparisons and conclusions about a social linkage. However, in social network analysis, the primary data collected...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Recruiting Trends 2009-2010

    When hiring begins to pick up again the authors expect some turbulence, even chaos, in recruiting as understaffed HR units gear up and eager workers of all stripes will flood the market, looking to improve their situation. The level of chaos may depend on the ability of companies to invoke...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Current Research Trends in Internet Servers

    The paper "Scalable Internet Servers: Issues and Challenges" published in PAWS-2000 proceedings identified eleven different areas in Internet Servers that require significant research efforts. The main motivation was to spur more interest and research into the Internet server. In this paper the authors add to this list by mentioning a...

    Provided By Michigan State University

  • White Papers // Jun 2010

    Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks

    QoS provisioning is a complex and challenging issue in mobile ad hoc networks, especially when there are multiple QoS constraints. In this paper, authors propose an adaptive QoS routing scheme supported by cross-layer cooperation in ad hoc networks. The cross-layer mechanism provides up-to-date local QoS information for the adaptive routing...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Power Management for Power Over Ethernet Devices/implementation

    Power over Ethernet (PoE) is a widely adopted technology used to transfer both data and electrical power over an RJ-45 cable. PoE has many applications ranging from commercial to industrial. The need to have a standard for getting power down the cable became widely debated issue in PoE solutions. There...

    Provided By Michigan State University

  • White Papers // Jan 2010

    A Survey of Adaptive Middleware

    Developing distributed applications is a difficult task due to three major problems: the complexities of programming inter process communication, the need to support ser-vices across heterogeneous platforms, and the need to adapt to changing conditions. Traditional middleware such as CORBA, DCOM, and Java RMI addresses the first two problems to...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Middleware Reliability Implementations and Connector Wrappers

    Recently, Spitznagel and Garlan introduced connector wrappers, which cleanly specify reliability policies in a form that can be incorporated into existing architectural specifications. The authors recently implemented a middleware framework, called Theseus that supports asynchronous communication among distributed objects under a variety of different reliability policies. Both connector wrappers and...

    Provided By Michigan State University

  • White Papers // May 2009

    Hybrid Multi-Channel Multi-Radio Wireless Mesh Networks

    Many efforts have been devoted to maximizing network throughput in a multi-channel multi-radio wireless mesh network. Current solutions are based on either pure static or pure dynamic channel allocation approaches. In this paper, the authors propose a hybrid multi-channel multi-radio wireless mesh networking architecture, where each mesh node has both...

    Provided By Michigan State University

  • White Papers // Sep 2009

    Periocular Biometrics in the Visible Spectrum: A Feasibility Study

    Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close capture distance unlike other ocular biometrics (e.g., Iris, retina, and sclera). The authors study the feasibility of using periocular images of an individual...

    Provided By Michigan State University

  • White Papers // Jan 2011

    TDMA Service for Sensor Networks

    Sensors networks are often constrained by limited power and limited communication range. If a sensor receives two messages simultaneously then they collide and both messages become incomprehensible. This paper presents a simple Time Division Multiple Access (TDMA) algorithm for assigning time slots to sensors and show that it provides a...

    Provided By Michigan State University

  • White Papers // Jan 2011

    SS-TDMA: A Self-Stabilizing MAC for Sensor Networks

    This paper focuses on the problem of designing a TDMA service for a grid-based sensor network. Such networks are readily found in many applications in the area of monitoring, hazard detection, and so on. The authors consider three communication patterns, broadcast, convergecast and local gossip that occur frequently in these...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Self-Stabilizing Deterministic Time Division Multiple Access for Sensor Networks

    An algorithm for Time Division Multiple Access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-stabilizing so that in the event of corruption of assigned slots and clock drift, it recovers...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks

    To ensure uninterrupted communication in a mobile ad-hoc network, efficient route discovery is crucial when nodes move and/or fail. Hence, protocols such as Dynamic Source Routing (DSR) precompute alternate routes before a node moves and/or fails. In this paper, the authors modify the way these alternate routes are maintained and...

    Provided By Michigan State University

  • White Papers // Jul 2010

    Slow Is Fast for Wireless Sensor Networks in the Presence of Message Losses

    Transformations from shared memory model to Wireless Sensor Networks (WSNs) quickly become inefficient in the presence of prevalent message losses in WSNs, and this prohibits their wider adoption. To address this problem, the authors propose a variation of the shared memory model, the SF shared memory model, where the actions...

    Provided By Michigan State University