Michigan State University

Displaying 1-40 of 100 results

  • White Papers // May 2014

    Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance

    This paper addresses the problem of identifying a very small subset of data points that belong to a significantly larger massive dataset (i.e., Big Data). The small number of selected data points must adequately represent and faithfully characterize the massive Big Data. Such identification process is known as representative selection....

    Provided By Michigan State University

  • White Papers // Feb 2014

    Beyond the MDS Bound in Distributed Cloud Storage

    Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, reed-solomon code based regenerating codes were developed. The RS code based Minimum Storage Regeneration code (RS-MSR) and the RS code based...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Parallel Network RAM: Effectively Utilizing Global Cluster Memory for Large Data-Intensive Parallel Programs

    Large scientific parallel applications demand large amounts of memory space. Current parallel computing platforms schedule jobs without fully knowing their memory requirements. This paper leads to uneven memory allocation in which some nodes are overloaded. This, in turn, leads to disk paging, which is extremely expensive in the context of...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Fingerprint Classication Using Orientation Field Flow Curves

    Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. The authors propose an automatic approach of identifying the geometric characteristics of ridges based on curves generated by the orientation field called Orientation Field Flow Curves (OFFCs). The geometric characteristics of OFFCs...

    Provided By Michigan State University

  • White Papers // Dec 2013

    3D Fingerprint Phantoms

    One of the critical factors prior to deployment of any large scale biometric system is to have a realistic estimate of its matching performance. In practice, evaluations are conducted on the operational data to set an appropriate threshold on match scores before the actual deployment. These performance estimates, though, are...

    Provided By Michigan State University

  • White Papers // Nov 2013

    Matching Website Password Requirements Strength with Rockyou Password Set

    Before there were computers there was security. One of the most important factors that have been used for identity authentication is a password. The authors have many fields that are very dependent on password use such as online financial services and system access such as user account and email access....

    Provided By Michigan State University

  • White Papers // Oct 2013

    Latent Fingerprint Indexing: Fusion of Level 1 and Level 2 Features

    Fingerprints have been widely used as a biometric trait for person recognition. Due to the wide acceptance and deployment of fingerprint matching systems, there is a steady increase in the size of fingerprint databases in law enforcement and national ID agencies. Thus, it is of great interest to develop methods...

    Provided By Michigan State University

  • White Papers // Sep 2013

    Open Source Biometric Recognition

    The biometrics community enjoys an active research field that has produced algorithms for several modalities suitable for real-world applications. Despite these developments, there exist few open source implementations of complete algorithms that are maintained by the community or deployed outside a laboratory environment. In this paper, the authors motivate the...

    Provided By Michigan State University

  • White Papers // Aug 2013

    Factorization of Unitarity and Black Hole Firewalls

    Unitary black hole evaporation necessarily involves a late-time superposition of decoherent states, including states describing distinct spacetimes (e.g., different center of mass trajectories of the black hole). Typical analyses of the black hole information problem, including the argument for the existence of firewalls, assume approximate unitarity (\"Factorization of unitarity\") on...

    Provided By Michigan State University

  • White Papers // Aug 2013

    LFIQ: Latent Fingerprint Image Quality

    Latent fingerprint images are typically obtained under non-ideal acquisition conditions, resulting in incomplete or distorted impression of a finger, and ridge structure corrupted by background noise. This necessitates involving latent experts in latent fingerprint examination, including assessing the value of a latent print as forensic evidence. However, it is now...

    Provided By Michigan State University

  • White Papers // Jun 2013

    Is There a Fingerprint Pattern in the Image?

    A fingerprint orientation field has distinct characteristics which can differentiate fingerprints from any other flow patterns: it has a specific number of singular points (cores and deltas), the configuration of singular points follows a certain spatial distribution, and its global shape is like an arch. In this paper, the authors...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // Jan 2013

    First Step Toward Cloud-Based Firewalling

    With the explosive growth of network-based services and attacks, the complexity and cost of firewall deployment and management have been increasing rapidly. Yet, each private network, no matter big or small, has to deploy and manage its own firewall, which is the critical first line of defense. To reduce the...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    On Latent Fingerprint Image Quality

    Latent fingerprints which are lifted from surfaces of objects at crime scenes play a very important role in identifying suspects in the crime scene investigations. Due to poor quality of latent fingerprints, automatic processing of latents can be extremely challenging. For this reason, latent examiners need to be involved in...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Oct 2012

    Robust Ensemble Clustering by Matrix Completion

    Data clustering is an important task and has found applications in numerous real-world problems. Since no single clustering algorithm is able to identify all different types of cluster shapes and structures, ensemble clustering was proposed to combine different partitions of the same data generated by multiple clustering algorithms. The key...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Efficient Kernel Clustering Using Random Fourier Features

    Kernel clustering algorithms have the ability to capture the non-linear structure inherent in many real world data sets and thereby, achieve better clustering performance than Euclidean distance based clustering algorithms. However, their quadratic computational complexity renders them non-scalable to large data sets. In this paper, the authors employ random Fourier...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Nighttime Face Recognition at Long Distance: Cross-Distance and Cross-Spectral Matching

    Automatic face recognition capability in surveillance systems is important for security applications. However, few studies have ad-dressed the problem of outdoor face recognition at a long distance (over 100 meters) in both daytime and nighttime environments. In this paper, the authors first report on a system that they have designed...

    Provided By Michigan State University

  • White Papers // Sep 2012

    On Iris Camera Interoperability

    With the advancements in iris matching and growing number of system deployments, a wide variety of iris cameras are now being manufactured. These cameras differ in manufacturing technology, including image acquisition spectrum and illumination settings. For large scale applications (e.g. UID system in India) where cameras from several vendors are...

    Provided By Michigan State University

  • White Papers // Sep 2012

    Routinizing Change: Does Business Process Management Technology Have Unintended Firm-Level Consequences?

    Business process management systems have demonstrated benefits at the process level, but evidence of firm level effects is inconclusive. The authors argue that as BPMS utilization grows, its use could become more routinized. Routinization tends to minimize search and can lead to competency traps. Furthermore, as more processes are managed...

    Provided By Michigan State University

  • White Papers // Jul 2012

    Face Recognition: Impostor-Based Measures of Uniqueness and Quality

    The authors present a framework, called Uniqueness-based Non-match Estimates (UNE), which demonstrates the ability to improve face recognition performance of any face matcher. The first aspect of the framework is a novel metric for measuring the uniqueness of a given individual, called the Impostor-based Uniqueness Measure (IUM). The UNE the...

    Provided By Michigan State University

  • White Papers // Apr 2012

    A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles

    Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles can help in the development, deployment, and maintenance of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore,...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Dec 2011

    An Improved Coupled Spectral Regression for Heterogeneous Face Recognition

    Coupled Spectral Regression (CSR) is an effective framework for heterogeneous face recognition (e.g., VISual light (VIS) vs. Near InfraRed (NIR)). CSR aims to learn different projections for different face modalities respectively to find a common subspace where the samples of different modalities from the same class are as close as...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Face Recognition Across Time Lapse: On Learning Feature Subspaces

    There is a growing interest in understanding the impact of aging on face recognition performance, as well as designing recognition algorithms that are mostly invariant to temporal changes. While some success has been made on this front, a fundamental question has yet to be answered: do face recognition systems that...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Analysis of Facial Features in Identical Twins

    A study of the distinctiveness of different facial features (MLBP, SIFT, and facial marks) with respect to distinguishing identical twins is presented. The accuracy of distinguishing between identical twin pairs is measured using the entire face, as well as each facial component (eyes, eyebrows, nose, and mouth). The impact of...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Latent Fingerprint Enhancement Via Robust Orientation Field Estimation

    Latent fingerprints, or simply latents, have been considered as cardinal evidence for identifying and convicting criminals. The amount of information available for identification from latents is often limited due to their poor quality, unclear ridge structure and occlusion with complex background or even other latent prints. The authors propose a...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Towards Automated Caricature Recognition

    This paper addresses the problem of identifying a subject from a caricature. A caricature is a facial sketch of a subject's face that exaggerates identifiable facial features beyond realism, while still conveying his identity. To enable this task, the authors propose a set of qualitative facial features that encodes the...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

    Despite evidence that lack of interoperable information systems results in enormous costs, development, implementation, and effective use of Inter-Organizational information Systems (IOS) remains an elusive goal for many companies. Lack of interoperability across systems is especially problematic for manufacturers dependent on global supply chains. The authors develop propositions about the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Oct 2011

    Partial Face Recognition: An Alignment Free Approach

    Many approaches have been developed for holistic face recognition with impressive performance. However, few studies have addressed the question of how to recognize an arbitrary image patch of a holistic face. In this paper, the authors address this problem of partial face recognition. Partial faces frequently appear in unconstrained image...

    Provided By Michigan State University

  • White Papers // Oct 2011

    NFRAD: Near-Infrared Face Recognition at a Distance

    Face recognition at a distance is gaining wide attention in order to augment the surveillance systems with face recognition capability. However, face recognition at a distance in nighttime has not yet received adequate attention considering the increased security threats at nighttime. The authors introduce a new face image database, called...

    Provided By Michigan State University

  • White Papers // Oct 2011

    On the Evidential Value of Fingerprints

    Fingerprint evidence is routinely used by forensics and law enforcement agencies worldwide to apprehend and convict criminals, a practice in use for over 100 years. The use of fingerprints has been accepted as an infallible proof of identity based on two premises: permanence or persistence, and uniqueness or individuality. However,...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Aug 2003

    Destination Branding: Concept and Measurement

    Destination branding is about how consumers perceive the destination in their minds. Branding a destination is not just about creating a logo or a slogan. It is about capturing the distinct elements of the destination in the brand and communicating these elements through the brand's components: identity, essence, personality, image,...

    Provided By Michigan State University

  • White Papers // Nov 2009

    What Is The Impact Of Eliminating The Reconciliation Between IFRS And US GAAP? Early Evidence

    This paper investigate the impact of the SEC's decision to allow foreign private issuers who use IFRS (International Financial Reporting Standards) (IFRS filers) to stop providing reconciliation from IFRS to US GAAP (General Agreement on Tariffs and Trade). Using a difference-in-difference research design, the author examines both cost savings and...

    Provided By Michigan State University

  • White Papers // Sep 2009

    An Interorganizational Social Network Analysis of the Michigan Diabetes Outreach Networks

    Public health has always relied on partnerships to conduct organized community efforts for the purpose of improving community health. Traditional methods for measuring partnerships collect information about the characteristics of different partners to draw comparisons and conclusions about a social linkage. However, in social network analysis, the primary data collected...

    Provided By Michigan State University

  • White Papers // Jun 2010

    Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks

    QoS provisioning is a complex and challenging issue in mobile ad hoc networks, especially when there are multiple QoS constraints. In this paper, authors propose an adaptive QoS routing scheme supported by cross-layer cooperation in ad hoc networks. The cross-layer mechanism provides up-to-date local QoS information for the adaptive routing...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Current Research Trends in Internet Servers

    The paper "Scalable Internet Servers: Issues and Challenges" published in PAWS-2000 proceedings identified eleven different areas in Internet Servers that require significant research efforts. The main motivation was to spur more interest and research into the Internet server. In this paper the authors add to this list by mentioning a...

    Provided By Michigan State University

  • White Papers // Mar 2010

    Survival Analysis: Overview of Parametric, Nonparametric and Semiparametric Approaches and New Developments

    Time to event data arise in several fields including biostatistics, demography, economics, engineering and sociology. The terms duration analysis, event-history analysis, failure-time analysis, reliability analysis, and transition analysis refer essentially to the same group of techniques although the emphases in certain modeling aspects could differ across disciplines. SAS procedures LIFETEST,...

    Provided By Michigan State University

  • White Papers // Jan 2010

    A Survey of Adaptive Middleware

    Developing distributed applications is a difficult task due to three major problems: the complexities of programming inter process communication, the need to support ser-vices across heterogeneous platforms, and the need to adapt to changing conditions. Traditional middleware such as CORBA, DCOM, and Java RMI addresses the first two problems to...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Middleware Reliability Implementations and Connector Wrappers

    Recently, Spitznagel and Garlan introduced connector wrappers, which cleanly specify reliability policies in a form that can be incorporated into existing architectural specifications. The authors recently implemented a middleware framework, called Theseus that supports asynchronous communication among distributed objects under a variety of different reliability policies. Both connector wrappers and...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Power Management for Power Over Ethernet Devices/implementation

    Power over Ethernet (PoE) is a widely adopted technology used to transfer both data and electrical power over an RJ-45 cable. PoE has many applications ranging from commercial to industrial. The need to have a standard for getting power down the cable became widely debated issue in PoE solutions. There...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Recruiting Trends 2009-2010

    When hiring begins to pick up again the authors expect some turbulence, even chaos, in recruiting as understaffed HR units gear up and eager workers of all stripes will flood the market, looking to improve their situation. The level of chaos may depend on the ability of companies to invoke...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks

    To ensure uninterrupted communication in a mobile ad-hoc network, efficient route discovery is crucial when nodes move and/or fail. Hence, protocols such as Dynamic Source Routing (DSR) precompute alternate routes before a node moves and/or fails. In this paper, the authors modify the way these alternate routes are maintained and...

    Provided By Michigan State University

  • White Papers // Jul 2010

    Slow Is Fast for Wireless Sensor Networks in the Presence of Message Losses

    Transformations from shared memory model to Wireless Sensor Networks (WSNs) quickly become inefficient in the presence of prevalent message losses in WSNs, and this prohibits their wider adoption. To address this problem, the authors propose a variation of the shared memory model, the SF shared memory model, where the actions...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries

    Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to achieve authentication: public key based and symmetric key based. Although previous work has shown that public...

    Provided By Michigan State University

  • White Papers // Jan 2011

    A Case Study on Prototyping Power Management Protocols for Sensor Networks

    Power management is an important problem in battery powered sensor networks as the sensors are required to operate for a long time (Usually, several weeks to several months). One of the challenges in developing power management protocols for sensor networks is prototyping. Specifically, existing programming platforms for sensor networks (e.g.,...

    Provided By Michigan State University

  • White Papers // Jan 2011

    TDMA Service for Sensor Networks

    Sensors networks are often constrained by limited power and limited communication range. If a sensor receives two messages simultaneously then they collide and both messages become incomprehensible. This paper presents a simple Time Division Multiple Access (TDMA) algorithm for assigning time slots to sensors and show that it provides a...

    Provided By Michigan State University

  • White Papers // Jan 2011

    SS-TDMA: A Self-Stabilizing MAC for Sensor Networks

    This paper focuses on the problem of designing a TDMA service for a grid-based sensor network. Such networks are readily found in many applications in the area of monitoring, hazard detection, and so on. The authors consider three communication patterns, broadcast, convergecast and local gossip that occur frequently in these...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Self-Stabilizing Deterministic Time Division Multiple Access for Sensor Networks

    An algorithm for Time Division Multiple Access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-stabilizing so that in the event of corruption of assigned slots and clock drift, it recovers...

    Provided By Michigan State University

  • White Papers // Dec 2009

    Exploring the Future of Bioinformatics Data Sharing and Mining With Pygr and Worldbase

    One of the most important challenges in bioinformatics is a pure Computer Science problem: making it easy for different research groups to access, mine and integrate each other's datasets, in ways that go beyond simple web browsing. The problems of bioinformatics data sharing have grown enormously as the scale and...

    Provided By Michigan State University

  • White Papers // Sep 2009

    Periocular Biometrics in the Visible Spectrum: A Feasibility Study

    Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close capture distance unlike other ocular biometrics (e.g., Iris, retina, and sclera). The authors study the feasibility of using periocular images of an individual...

    Provided By Michigan State University

  • White Papers // Jun 2010

    Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks

    Multi-channel design has received significant attention for Low-power Wireless Networks (LWNs), such as 802.15.4-based wireless sensor networks, due to its potential of mitigating interference and improving network capacity. However, recent studies reveal that the number of orthogonal channels available on commodity wireless platforms is small, which significantly hinders the performance...

    Provided By Michigan State University

  • White Papers // Aug 2010

    Routing and Spectrum Allocation for Video On-Demand Streaming in Cognitive Wireless Mesh Networks

    Cognitive radio, which enables dynamic access of under-utilized licensed spectrums, is a promising technology for more efficient spectrum utilization. Since cognitive radio enables the access of larger amount of spectrum, it can be used to build wireless mesh networks with higher network capacity, and thus provide better quality of services...

    Provided By Michigan State University

  • White Papers // Sep 2009

    On the Security of Non-Invertible Fingerprint Template Transforms

    Many transformation functions have been proposed for generating revocable or non-invertible biometric templates. However, their security analysis either ignores the distribution of biometric features or uses inefficient feature matching. This usually leads to unrealistic estimates of security. In this paper the authors introduce a new measure of non-invertibility, called the...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Biometric Template Transformation: A Security Analysis

    One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not...

    Provided By Michigan State University

  • White Papers // Jun 2010

    Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems

    Regular Expression (RE) matching is a core component of deep packet inspection in modern networking and security devices. This paper proposes the first hardware-based RE matching approaches that uses Ternary Content Addressable Memories (TCAMs), which are off-the-shelf chips and have been widely deployed in modern networking devices for packet classification....

    Provided By Michigan State University

  • White Papers // Aug 2010

    Weakest Invariant Generation for Automated Addition of Fault-Tolerance

    One of the important tasks in evolving a fault-intolerant program into a fault-tolerant one is to identify the legitimate states (Its invariant) from where the original program satisfies its specification. This allows one to ensure that the fault-tolerant program recovers to these legitimate states from where it satisfies its specification....

    Provided By Michigan State University

  • White Papers // Dec 2009

    Assessing Fingerprint Individuality in Presence of Noisy Minutiae

    Fingerprint image quality is an important source of intra-class variability. When the underlying image quality is poor, human experts as well as automatic systems are more likely to make errors in minutiae detection and matching by either missing true features or detecting spurious ones. As a consequence, fingerprint individuality estimates...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Comparisons of Error Control Techniques for Wireless Video Multicasting

    Packet loss rates in Wireless Local Area Networks (WLANs) are highly dynamic and location dependent. Therefore, multicasting of compressed video streams over such networks require significantly different error control approaches from those used over wired networks. This paper explores three different methods employed separately and in combination, to improve the...

    Provided By Michigan State University

  • White Papers // Mar 2011

    Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly available for mission-critical applications such as emergency management and health care. To meet the stringent requirements on communication performance, it is crucial to understand the complex wireless interference among sensor nodes. Recent empirical studies suggest that the packet-level interference model, also referred to as...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Service Clouds: Distributed Infrastructure for Adaptive Communication Services

    This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive middleware functionality with an overlay network substrate in order to support dynamic instantiation and reconfiguration of services. The Service Clouds architecture includes...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Attacks on Biometric Systems: A Case Study in Fingerprints

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, the authors analyze these attacks in the realm of a fingerprint biometric system. They propose an attack...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Fuzzy Fingerprint Vault

    In traditional cryptography, one or more keys are used to convert the plain text (data to be encrypted) to cipher text (encrypted data): The encrypting key(s) maps the plain text to essentially a sequence of random bits, that can be mapped back to the plain text using the decrypting key(s)....

    Provided By Michigan State University

  • White Papers // Jan 2011

    Fuzzy Vault for Fingerprints

    Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications, such as secure cellular phone access. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. In...

    Provided By Michigan State University

  • White Papers // Dec 2009

    An Efficient Bandwidth Management Scheme for Real-Time Internet Applications

    Differentiated Services (DiffServ) has been proposed as a scalable solution for the Internet QoS. Within the DiffServ architecture, premium services is a service class which is proposed for interactive real-time applications such as real-time voice and video over the Internet. In order to ensure the service quality of premium services,...

    Provided By Michigan State University

  • White Papers // Dec 2010

    Exploiting Sensing Diversity for Confident Sensing in Wireless Sensor Networks

    Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting or classifying events while maximizing system lifetime. The authors define meeting such user accuracy requirements as confident sensing. To perform confident sensing and reduce energy, they must address sensing diversity: sensing...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Watchdog: Confident Event Detection in Heterogeneous Sensor Networks

    Many mission-critical applications such as military surveillance, human health monitoring, and obstacle detection in autonomous vehicles impose stringent requirements for event detection accuracy and also demand long system lifetimes. The authors show through quantitative study that traditional approaches to event detection have difficulty meeting such requirements. They cannot explore the...

    Provided By Michigan State University

  • White Papers // Aug 2010

    Beyond Co-Existence: Exploiting Wifi White Space for Zigbee Performance Assurance

    Recent years have witnessed the increasing adoption of ZigBee technology for performance-sensitive applications such as wireless patient monitoring in hospitals. However, operating in unlicensed ISM bands, ZigBee devices often yield unpredictable throughput and packet delivery ratio due to the interference from ever increasing WiFi hotspots in 2.4 GHz band. The...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services

    This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive middleware functionality with an overlay network substrate in order to support dynamic instantiation and reconfiguration of services. The Service Clouds architecture includes...

    Provided By Michigan State University

  • White Papers // Jul 2010

    Folk Models of Home Computer Security

    Home computer systems are insecure because they are administered by untrained users. The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a large security industry that provides software and advice, home computer users remain vulnerable....

    Provided By Michigan State University

  • White Papers // May 2010

    Heterogeneous Face Recognition: Matching NIR to Visible Light Images

    Matching Near-InfraRed (NIR) face images to VISible light (VIS) face images offers a robust approach to face recognition with unconstrained illumination. In this paper, the authors propose a novel method of heterogeneous face recognition that uses a common feature-based representation for both NIR images as well as VIS images. Linear...

    Provided By Michigan State University