Michigan State University

Displaying 1-40 of 107 results

  • White Papers // May 2014

    Representative Selection for Big Data via Sparse Graph and Geodesic Grassmann Manifold Distance

    This paper addresses the problem of identifying a very small subset of data points that belong to a significantly larger massive dataset (i.e., Big Data). The small number of selected data points must adequately represent and faithfully characterize the massive Big Data. Such identification process is known as representative selection....

    Provided By Michigan State University

  • White Papers // Feb 2014

    Beyond the MDS Bound in Distributed Cloud Storage

    Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, reed-solomon code based regenerating codes were developed. The RS code based Minimum Storage Regeneration code (RS-MSR) and the RS code based...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Fingerprint Classication Using Orientation Field Flow Curves

    Manual fingerprint classification proceeds by carefully inspecting the geometric characteristics of major ridge curves in a fingerprint image. The authors propose an automatic approach of identifying the geometric characteristics of ridges based on curves generated by the orientation field called Orientation Field Flow Curves (OFFCs). The geometric characteristics of OFFCs...

    Provided By Michigan State University

  • White Papers // Jan 2014

    Parallel Network RAM: Effectively Utilizing Global Cluster Memory for Large Data-Intensive Parallel Programs

    Large scientific parallel applications demand large amounts of memory space. Current parallel computing platforms schedule jobs without fully knowing their memory requirements. This paper leads to uneven memory allocation in which some nodes are overloaded. This, in turn, leads to disk paging, which is extremely expensive in the context of...

    Provided By Michigan State University

  • White Papers // Dec 2013

    3D Fingerprint Phantoms

    One of the critical factors prior to deployment of any large scale biometric system is to have a realistic estimate of its matching performance. In practice, evaluations are conducted on the operational data to set an appropriate threshold on match scores before the actual deployment. These performance estimates, though, are...

    Provided By Michigan State University

  • White Papers // Nov 2013

    Matching Website Password Requirements Strength with Rockyou Password Set

    Before there were computers there was security. One of the most important factors that have been used for identity authentication is a password. The authors have many fields that are very dependent on password use such as online financial services and system access such as user account and email access....

    Provided By Michigan State University

  • White Papers // Oct 2013

    Latent Fingerprint Indexing: Fusion of Level 1 and Level 2 Features

    Fingerprints have been widely used as a biometric trait for person recognition. Due to the wide acceptance and deployment of fingerprint matching systems, there is a steady increase in the size of fingerprint databases in law enforcement and national ID agencies. Thus, it is of great interest to develop methods...

    Provided By Michigan State University

  • White Papers // Sep 2013

    Open Source Biometric Recognition

    The biometrics community enjoys an active research field that has produced algorithms for several modalities suitable for real-world applications. Despite these developments, there exist few open source implementations of complete algorithms that are maintained by the community or deployed outside a laboratory environment. In this paper, the authors motivate the...

    Provided By Michigan State University

  • White Papers // Aug 2013

    Factorization of Unitarity and Black Hole Firewalls

    Unitary black hole evaporation necessarily involves a late-time superposition of decoherent states, including states describing distinct spacetimes (e.g., different center of mass trajectories of the black hole). Typical analyses of the black hole information problem, including the argument for the existence of firewalls, assume approximate unitarity (\"Factorization of unitarity\") on...

    Provided By Michigan State University

  • White Papers // Aug 2013

    LFIQ: Latent Fingerprint Image Quality

    Latent fingerprint images are typically obtained under non-ideal acquisition conditions, resulting in incomplete or distorted impression of a finger, and ridge structure corrupted by background noise. This necessitates involving latent experts in latent fingerprint examination, including assessing the value of a latent print as forensic evidence. However, it is now...

    Provided By Michigan State University

  • White Papers // Jun 2013

    Is There a Fingerprint Pattern in the Image?

    A fingerprint orientation field has distinct characteristics which can differentiate fingerprints from any other flow patterns: it has a specific number of singular points (cores and deltas), the configuration of singular points follows a certain spatial distribution, and its global shape is like an arch. In this paper, the authors...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // Jan 2013

    First Step Toward Cloud-Based Firewalling

    With the explosive growth of network-based services and attacks, the complexity and cost of firewall deployment and management have been increasing rapidly. Yet, each private network, no matter big or small, has to deploy and manage its own firewall, which is the critical first line of defense. To reduce the...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Nov 2012

    On Latent Fingerprint Image Quality

    Latent fingerprints which are lifted from surfaces of objects at crime scenes play a very important role in identifying suspects in the crime scene investigations. Due to poor quality of latent fingerprints, automatic processing of latents can be extremely challenging. For this reason, latent examiners need to be involved in...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Oct 2012

    Robust Ensemble Clustering by Matrix Completion

    Data clustering is an important task and has found applications in numerous real-world problems. Since no single clustering algorithm is able to identify all different types of cluster shapes and structures, ensemble clustering was proposed to combine different partitions of the same data generated by multiple clustering algorithms. The key...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Efficient Kernel Clustering Using Random Fourier Features

    Kernel clustering algorithms have the ability to capture the non-linear structure inherent in many real world data sets and thereby, achieve better clustering performance than Euclidean distance based clustering algorithms. However, their quadratic computational complexity renders them non-scalable to large data sets. In this paper, the authors employ random Fourier...

    Provided By Michigan State University

  • White Papers // Oct 2012

    Nighttime Face Recognition at Long Distance: Cross-Distance and Cross-Spectral Matching

    Automatic face recognition capability in surveillance systems is important for security applications. However, few studies have ad-dressed the problem of outdoor face recognition at a long distance (over 100 meters) in both daytime and nighttime environments. In this paper, the authors first report on a system that they have designed...

    Provided By Michigan State University

  • White Papers // Sep 2012

    On Iris Camera Interoperability

    With the advancements in iris matching and growing number of system deployments, a wide variety of iris cameras are now being manufactured. These cameras differ in manufacturing technology, including image acquisition spectrum and illumination settings. For large scale applications (e.g. UID system in India) where cameras from several vendors are...

    Provided By Michigan State University

  • White Papers // Sep 2012

    Routinizing Change: Does Business Process Management Technology Have Unintended Firm-Level Consequences?

    Business process management systems have demonstrated benefits at the process level, but evidence of firm level effects is inconclusive. The authors argue that as BPMS utilization grows, its use could become more routinized. Routinization tends to minimize search and can lead to competency traps. Furthermore, as more processes are managed...

    Provided By Michigan State University

  • White Papers // Jul 2012

    Face Recognition: Impostor-Based Measures of Uniqueness and Quality

    The authors present a framework, called Uniqueness-based Non-match Estimates (UNE), which demonstrates the ability to improve face recognition performance of any face matcher. The first aspect of the framework is a novel metric for measuring the uniqueness of a given individual, called the Impostor-based Uniqueness Measure (IUM). The UNE the...

    Provided By Michigan State University

  • White Papers // Apr 2012

    A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles

    Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles can help in the development, deployment, and maintenance of software systems. It can also help in designing future security policies and conducting audits of past incidents. Furthermore,...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Dec 2011

    An Improved Coupled Spectral Regression for Heterogeneous Face Recognition

    Coupled Spectral Regression (CSR) is an effective framework for heterogeneous face recognition (e.g., VISual light (VIS) vs. Near InfraRed (NIR)). CSR aims to learn different projections for different face modalities respectively to find a common subspace where the samples of different modalities from the same class are as close as...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Face Recognition Across Time Lapse: On Learning Feature Subspaces

    There is a growing interest in understanding the impact of aging on face recognition performance, as well as designing recognition algorithms that are mostly invariant to temporal changes. While some success has been made on this front, a fundamental question has yet to be answered: do face recognition systems that...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Analysis of Facial Features in Identical Twins

    A study of the distinctiveness of different facial features (MLBP, SIFT, and facial marks) with respect to distinguishing identical twins is presented. The accuracy of distinguishing between identical twin pairs is measured using the entire face, as well as each facial component (eyes, eyebrows, nose, and mouth). The impact of...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Latent Fingerprint Enhancement Via Robust Orientation Field Estimation

    Latent fingerprints, or simply latents, have been considered as cardinal evidence for identifying and convicting criminals. The amount of information available for identification from latents is often limited due to their poor quality, unclear ridge structure and occlusion with complex background or even other latent prints. The authors propose a...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Towards Automated Caricature Recognition

    This paper addresses the problem of identifying a subject from a caricature. A caricature is a facial sketch of a subject's face that exaggerates identifiable facial features beyond realism, while still conveying his identity. To enable this task, the authors propose a set of qualitative facial features that encodes the...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Through a Glass Clearly: Standards, Architecture, and Process Transparency in Global Supply Chains

    Despite evidence that lack of interoperable information systems results in enormous costs, development, implementation, and effective use of Inter-Organizational information Systems (IOS) remains an elusive goal for many companies. Lack of interoperability across systems is especially problematic for manufacturers dependent on global supply chains. The authors develop propositions about the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Oct 2011

    Partial Face Recognition: An Alignment Free Approach

    Many approaches have been developed for holistic face recognition with impressive performance. However, few studies have addressed the question of how to recognize an arbitrary image patch of a holistic face. In this paper, the authors address this problem of partial face recognition. Partial faces frequently appear in unconstrained image...

    Provided By Michigan State University

  • White Papers // Oct 2011

    NFRAD: Near-Infrared Face Recognition at a Distance

    Face recognition at a distance is gaining wide attention in order to augment the surveillance systems with face recognition capability. However, face recognition at a distance in nighttime has not yet received adequate attention considering the increased security threats at nighttime. The authors introduce a new face image database, called...

    Provided By Michigan State University

  • White Papers // Oct 2011

    On the Evidential Value of Fingerprints

    Fingerprint evidence is routinely used by forensics and law enforcement agencies worldwide to apprehend and convict criminals, a practice in use for over 100 years. The use of fingerprints has been accepted as an infallible proof of identity based on two premises: permanence or persistence, and uniqueness or individuality. However,...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Nov 2012

    HopCaster: A Network Coding-Based Hop-by-Hop Reliable Multicast Protocol

    Intra-flow Network Coding (NC) is an innovative technique that has potential to improve multicast performance in Wireless Mesh Networks (WMNs) by allowing intermediate Forwarding Nodes (FNs) to use coding and overhearing to reduce the number of required transmissions. However the benefits of the NC technology are limited unless there are...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Reliable OFDM System Design Under Hostile Multi-Tone Jamming

    Along with the advent of reconfigurable radios, hostile jamming is no longer limited to military applications, but has become a serious threat for civilian wireless communications, where OFDM has been identified as one of the most efficient transmission technologies. In this paper, the authors consider reliable transmission of OFDM systems...

    Provided By Michigan State University

  • White Papers // Jan 2012

    FlowSifter: A Counting Automata Approach to Layer 7 Field Extraction for Deep Flow Inspection

    In this paper, the authors introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regular Grammars (CRG) and a corresponding automata model Counting Automata (CA). The CRG and CA models add counters with update functions and transition guards to regular grammars...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

    Network Intrusion Detection and Prevention Systems commonly use Regular Expression (RE) signatures to represent individual security threats. While the corresponding DFA for any one RE is typically small, the DFA that corresponds to the entire set of REs is usually too large to be constructed or deployed. To address this...

    Provided By Michigan State University

  • White Papers // Mar 2010

    Quantifying and Querying Network Reachability

    Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenance, and design. Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown. In this paper, the authors propose...

    Provided By Michigan State University

  • White Papers // Mar 2013

    Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in Wireless Sensor Networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high...

    Provided By Michigan State University

  • White Papers // May 2011

    A Probabilistic Model To Support Web Crawling For Social Media Based Sites

    Web crawling is a popular technique for data collection among researchers, practitioners and scholars. One of the major challenges web crawling techniques often face is the inefficient utilization of bandwidth, which results in unbalanced crawl between different sites. In this paper, the authors described a probabilistic model to improve the...

    Provided By Michigan State University

  • White Papers // Nov 2011

    Fixed Bandwidth Asymptotics for Regression Discontinuity Designs

    In this paper, the authors analyze the asymptotic distribution of local polynomial estimators in the context of regression discontinuity designs. The standard "Small-h" approach in the literature (Hahn Todd and van der Klaauw 2001, Porter 2003, Imbens and Lemieux 2008 and Lee and Lemieux 2009) is to assume the bandwidth,...

    Provided By Michigan State University

  • White Papers // Jul 2009

    Sparse Decoding of Low Density Parity Check Codes Using Margin Propagation

    One of the key factors underlying the popularity of Low-Density Parity-Check (LDPC) code is its iterative decoding algorithm that is amenable to efficient hardware implementation. Even though different variants of LDPC iterative decoding algorithms have been studied for its error-correcting properties, an analytical basis for evaluating energy efficiency of LDPC...

    Provided By Michigan State University

  • White Papers // Nov 2012

    Lessons Learned When Building a Greenfield High Performance Computing Ecosystem

    Faced with a fragmented research computing environment and growing needs for high performance computing resources, Michigan State University established the High Performance Computing Center in 2005 to serve as a central high performance computing resource for MSU's research community. Like greenfield industrial development, the center was unconstrained by existing infrastructure....

    Provided By Michigan State University

  • White Papers // Mar 2012

    On Matching Altered Fingerprints

    Fingerprint alteration refers to changes made in a person's finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Fingerprint alteration is a serious attack on Automated Fingerprint Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due...

    Provided By Michigan State University

  • White Papers // Dec 2009

    On Latent Fingerprint Enhancement

    Automatic feature extraction in latent fingerprints is a challenging problem due to poor quality of most latents, such as unclear ridge structures, overlapped lines and letters, and overlapped fingerprints. The authors proposed a latent fingerprint enhancement algorithm which requires manually marked Region Of Interest (ROI) and singular points. The core...

    Provided By Michigan State University

  • White Papers // Apr 2010

    On the Utility of Extended Fingerprint Features: A Study on Pores

    Extended fingerprint features are routinely used by latent examiners in forensic applications. They are now being considered for inclusion in Automatic Fingerprint Identification Systems (AFIS), particularly with the adoption of 1000ppi resolution in the Next Generation Identification (NGI) system. Earlier studies on this topic suffered from two limitations: experiments were...

    Provided By Michigan State University

  • White Papers // Aug 2011

    Biometric Recognition of Newborns: Identification Using Palmprints

    The authors present some results on newborn identification through high-resolution images of palmar surfaces. To their knowledge, there is no biometric system currently available that can be effectively used for newborn identification. The manual procedure of capturing inked footprints in practice for this purpose is limited for use inside hospitals...

    Provided By Michigan State University

  • White Papers // Mar 2012

    Private Entity Authentication for Pervasive Computing Environments

    Entity authentication becomes ubiquitously necessary in pervasive computing environments. The authors provide taxonomy of entity authentication between keys and locks. Based on the discussion, they propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for...

    Provided By Michigan State University

  • White Papers // Jul 2011

    Characterizing Geospatial Dynamics of Application Usage in a 3G Cellular Data Network

    Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in cellular network usage. Such geospatial correlation patterns provide local optimization opportunities to cellular network operators for handling the explosive growth in the traffic volume observed in...

    Provided By Michigan State University

  • White Papers // May 2011

    STARS: Static Relays for Multi-Robot Real-Time Search and Monitoring

    The authors first present a problem called Precedence Constrained Two Traveling Salesman (PC2TSP). They propose a near-optimal heuristic to PC2TSP to generate tours by clustering points, generating optimal single-traveler tours, and tour pruning and balance. Second, they show an application of PC2TSP and how their solution to PC2TSP can be...

    Provided By Michigan State University

  • White Papers // Dec 2008

    All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs

    Packet classification is the core mechanism that enables many networking services on the Internet such as firewall packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry. TCAMs classify packets in constant time by comparing a...

    Provided By Michigan State University

  • White Papers // Apr 2009

    TCAM SPliT: Optimizing Space, Power, and Throughput for TCAM-Based Packet Classification Systems

    Packet classification is the core mechanism that enables many networking services such as packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry because TCAMs can facilitate constant time classification by comparing a packet with all...

    Provided By Michigan State University

  • White Papers // Apr 2012

    Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks

    SEAR is a novel secure and energy aware routing protocol proposed to address the energy balance and routing security through a balanced energy consumption and probabilistic random walking. Recently, a quantitative security measurement scheme for source-location privacy based on Source-location Disclosure Index (SDI) and Source-location Space Index (SSI) has been...

    Provided By Michigan State University

  • White Papers // Sep 2011

    WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks

    Time synchronization is a fundamental service for Wireless Sensor Networks (WSNs). This paper proposes a novel WSN time synchronization approach by exploiting the existing Wi-Fi infrastructure. The authors' approach leverages the fact that ZigBee sensors and Wi-Fi nodes often occupy the same or overlapping radio frequency bands in the 2.4...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Service Clouds: Distributed Infrastructure for Adaptive Communication Services

    This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive middleware functionality with an overlay network substrate in order to support dynamic instantiation and reconfiguration of services. The Service Clouds architecture includes...

    Provided By Michigan State University

  • White Papers // Mar 2011

    Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly available for mission-critical applications such as emergency management and health care. To meet the stringent requirements on communication performance, it is crucial to understand the complex wireless interference among sensor nodes. Recent empirical studies suggest that the packet-level interference model, also referred to as...

    Provided By Michigan State University

  • White Papers // Jan 2011

    QoS Aware Wireless Bandwidth Aggregation (QAWBA) by Integrating Cellular and Ad-Hoc Networks

    Some mobile devices are beginning to support both cellular and IEEE 802.11 based network interfaces. Although rates are increasing, current cellular networks provide relatively low bandwidth that do not meet the QoS requirements of many high-demanding multimedia applications. In this paper, the authors propose an integrated network architecture that utilizes...

    Provided By Michigan State University

  • White Papers // Sep 2009

    SPM: Source Privacy For Mobile Ad Hoc Networks

    Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for Mobile Ad hoc NETworks (MANETs) due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted...

    Provided By Michigan State University

  • White Papers // Nov 2009

    Efficient Multicast for Link-Heterogeneous Wireless Mesh Networks

    Wireless Mesh Networks (WMN) has emerged as an economical means for delivering last-mile Internet access. Multicast is a fundamental service in WMNs because it efficiently distributes data among a group of nodes. Multicast algorithms in WMNs are designed to maximize system throughput and minimize delay. Previous work has unrealistically assumed...

    Provided By Michigan State University

  • White Papers // Dec 2009

    An Efficient Bandwidth Management Scheme for Real-Time Internet Applications

    Differentiated Services (DiffServ) has been proposed as a scalable solution for the Internet QoS. Within the DiffServ architecture, premium services is a service class which is proposed for interactive real-time applications such as real-time voice and video over the Internet. In order to ensure the service quality of premium services,...

    Provided By Michigan State University

  • White Papers // Dec 2010

    Exploiting Sensing Diversity for Confident Sensing in Wireless Sensor Networks

    Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting or classifying events while maximizing system lifetime. The authors define meeting such user accuracy requirements as confident sensing. To perform confident sensing and reduce energy, they must address sensing diversity: sensing...

    Provided By Michigan State University

  • White Papers // Jan 2010

    Watchdog: Confident Event Detection in Heterogeneous Sensor Networks

    Many mission-critical applications such as military surveillance, human health monitoring, and obstacle detection in autonomous vehicles impose stringent requirements for event detection accuracy and also demand long system lifetimes. The authors show through quantitative study that traditional approaches to event detection have difficulty meeting such requirements. They cannot explore the...

    Provided By Michigan State University

  • White Papers // Aug 2010

    Beyond Co-Existence: Exploiting Wifi White Space for Zigbee Performance Assurance

    Recent years have witnessed the increasing adoption of ZigBee technology for performance-sensitive applications such as wireless patient monitoring in hospitals. However, operating in unlicensed ISM bands, ZigBee devices often yield unpredictable throughput and packet delivery ratio due to the interference from ever increasing WiFi hotspots in 2.4 GHz band. The...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services

    This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication performance, robustness, and security. The infrastructure combines adaptive middleware functionality with an overlay network substrate in order to support dynamic instantiation and reconfiguration of services. The Service Clouds architecture includes...

    Provided By Michigan State University

  • White Papers // Jul 2010

    Folk Models of Home Computer Security

    Home computer systems are insecure because they are administered by untrained users. The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a large security industry that provides software and advice, home computer users remain vulnerable....

    Provided By Michigan State University

  • White Papers // May 2010

    Heterogeneous Face Recognition: Matching NIR to Visible Light Images

    Matching Near-InfraRed (NIR) face images to VISible light (VIS) face images offers a robust approach to face recognition with unconstrained illumination. In this paper, the authors propose a novel method of heterogeneous face recognition that uses a common feature-based representation for both NIR images as well as VIS images. Linear...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Face Recognition Across Time Lapse: On Learning Feature Subspaces

    There is a growing interest in understanding the impact of aging on face recognition performance, as well as designing recognition algorithms that are mostly invariant to temporal changes. While some success has been made on this front, a fundamental question has yet to be answered: do face recognition systems that...

    Provided By Michigan State University

  • White Papers // Mar 2011

    Face Recognition: Some Challenges in Forensics

    Face recognition has become a valuable and routine forensic tool used by criminal investigators. Compared to automated face recognition, forensic face recognition is more demanding because it must be able to handle facial images captured under non-ideal conditions and it has high liability for following legal procedures. This paper discusses...

    Provided By Michigan State University

  • White Papers // Feb 2010

    Facial Marks: Soft Biometric for Face Recognition

    The authors propose to utilize micro features, namely facial marks (e.g., freckles, moles, and scars) to improve face recognition and retrieval performance. Facial marks can be used in three ways: to supplement the features in an existing face matcher, to enable fast retrieval from a large database using facial mark...

    Provided By Michigan State University

  • White Papers // Feb 2010

    Biometrics of Next Generation: An Overview

    Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications such as national ID cards, border crossings, government benefits, and access control. As a result, biometric recognition, or simply biometrics, which is based on physiological...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Analysis of Facial Features in Identical Twins

    A study of the distinctiveness of different facial features (MLBP, SIFT, and facial marks) with respect to distinguishing identical twins is presented. The accuracy of distinguishing between identical twin pairs is measured using the entire face, as well as each facial component (eyes, eyebrows, nose, and mouth). The impact of...

    Provided By Michigan State University

  • White Papers // Jan 2011

    Face Recognition in the Virtual World: Recognizing Avatar Faces

    Criminal activity in virtual worlds is becoming a major problem for law enforcement agencies. Forensic investigators are becoming interested in being able to accurately and automatically track people in virtual communities. In this paper a set of algorithms capable of verification and recognition of avatar faces with high degree of...

    Provided By Michigan State University

  • White Papers // Dec 2011

    Towards Automated Caricature Recognition

    This paper addresses the problem of identifying a subject from a caricature. A caricature is a facial sketch of a subject's face that exaggerates identifiable facial features beyond realism, while still conveying his identity. To enable this task, the authors propose a set of qualitative facial features that encodes the...

    Provided By Michigan State University