NC State University

Displaying 1-9 of 9 results

  • White Papers // Apr 2013

    Mining Succinct and High-Coverage API Usage Patterns from Source Code

    During software development, a developer often needs to discover specific usage patterns of Application Programming Interface (API) methods. However, these usage patterns are often not well documented. To help developers to get such usage patterns, there are approaches proposed to mine client code of the API methods. However, they lack...

    Provided By NC State University

  • White Papers // Apr 2011

    Taming Information-Stealing Smartphone Applications (on Android)

    Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal in-formation. However, recent studies also reveal the disturbing fact that users' personal information is put at risk by (rogue) smartphone applications. Existing solutions exhibit limitations in their capabilities in taming these privacy-violating...

    Provided By NC State University

  • White Papers // Jan 2011

    Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach

    Cross-organizational business processes are the norm in today's economy. Of necessity, enterprises conduct their business in cooperation to create products and services for the marketplace. Thus business processes inherently involve autonomous partners with heterogeneous software designs and implementations. Therefore, it would be natural to model such processes via high-level abstractions...

    Provided By NC State University

  • White Papers // Jan 2011

    Mining Business Contracts for Service Exceptions

    A contract is a legally binding agreement between real-world business entities that the authors treat as providing services to one another. They focus on business rather than technical services. They think of a business contract as specifying the functional and nonfunctional behaviors of and interactions among the services. In current...

    Provided By NC State University

  • White Papers // Sep 2010

    QoS-Based Multi-Domain Routing Under Multiple QoS Metrics

    Applications such as voice and video require network paths that satisfy several different quality of service QoS metrics, such as delay, jitter, packet loss rate, and availability. The calculation of paths under multiple QoS metrics, such as the above four metrics, is a difficult problem since these metrics are in...

    Provided By NC State University

  • White Papers // Feb 2010

    On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks

    In this paper, the authors address the problem of quantifying the impact of backoff misbehaving nodes in IEEE 802.11 networks. They propose two performance metrics, throughput gain ratio and throughput degradation ratio to quantify the performance gain of misbehaving nodes over legitimate nodes and the performance loss of legitimate nodes...

    Provided By NC State University

  • White Papers // May 2009

    Systematic Exploration of Efficient Query Plans For Automated Database Restructuring

    The authors consider the problem of selecting views and indexes that minimize the evaluation costs of the important queries under an upper bound on the disk space available for storing the views/indexes selected to be materialized. They propose a novel end-to-end approach that focuses on systematic exploration of plans for...

    Provided By NC State University

  • White Papers // Mar 2009

    Location-Aided Fast Distributed Consensus in Wireless Networks

    Existing works on distributed consensus explore linear iterations based on reversible Markov chains, which contribute to the slow convergence of the algorithms. It has been observed that by overcoming the diffusive behavior of reversible chains, certain nonreversible chains lifted from reversible ones mix substantially faster than the original chains. In...

    Provided By NC State University

  • White Papers // Oct 2008

    Meeting Service Traffic Requirements in SOA

    Enterprise networks may host multiple services, located in (Potentially physically distinct) servers; an example would be Web server farms using Web 2.0 and/or SOA-based technologies. A service is governed by a Client Service Contract (CSC) that specifies, among other requirements, the rate at which the service may be accessed so...

    Provided By NC State University

  • White Papers // Jan 2011

    Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach

    Cross-organizational business processes are the norm in today's economy. Of necessity, enterprises conduct their business in cooperation to create products and services for the marketplace. Thus business processes inherently involve autonomous partners with heterogeneous software designs and implementations. Therefore, it would be natural to model such processes via high-level abstractions...

    Provided By NC State University

  • White Papers // Jan 2011

    Mining Business Contracts for Service Exceptions

    A contract is a legally binding agreement between real-world business entities that the authors treat as providing services to one another. They focus on business rather than technical services. They think of a business contract as specifying the functional and nonfunctional behaviors of and interactions among the services. In current...

    Provided By NC State University

  • White Papers // Apr 2013

    Mining Succinct and High-Coverage API Usage Patterns from Source Code

    During software development, a developer often needs to discover specific usage patterns of Application Programming Interface (API) methods. However, these usage patterns are often not well documented. To help developers to get such usage patterns, there are approaches proposed to mine client code of the API methods. However, they lack...

    Provided By NC State University

  • White Papers // Sep 2010

    QoS-Based Multi-Domain Routing Under Multiple QoS Metrics

    Applications such as voice and video require network paths that satisfy several different quality of service QoS metrics, such as delay, jitter, packet loss rate, and availability. The calculation of paths under multiple QoS metrics, such as the above four metrics, is a difficult problem since these metrics are in...

    Provided By NC State University

  • White Papers // Oct 2008

    Meeting Service Traffic Requirements in SOA

    Enterprise networks may host multiple services, located in (Potentially physically distinct) servers; an example would be Web server farms using Web 2.0 and/or SOA-based technologies. A service is governed by a Client Service Contract (CSC) that specifies, among other requirements, the rate at which the service may be accessed so...

    Provided By NC State University

  • White Papers // Mar 2009

    Location-Aided Fast Distributed Consensus in Wireless Networks

    Existing works on distributed consensus explore linear iterations based on reversible Markov chains, which contribute to the slow convergence of the algorithms. It has been observed that by overcoming the diffusive behavior of reversible chains, certain nonreversible chains lifted from reversible ones mix substantially faster than the original chains. In...

    Provided By NC State University

  • White Papers // Apr 2011

    Taming Information-Stealing Smartphone Applications (on Android)

    Smartphones have been becoming ubiquitous and mobile users are increasingly relying on them to store and handle personal in-formation. However, recent studies also reveal the disturbing fact that users' personal information is put at risk by (rogue) smartphone applications. Existing solutions exhibit limitations in their capabilities in taming these privacy-violating...

    Provided By NC State University

  • White Papers // Feb 2010

    On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks

    In this paper, the authors address the problem of quantifying the impact of backoff misbehaving nodes in IEEE 802.11 networks. They propose two performance metrics, throughput gain ratio and throughput degradation ratio to quantify the performance gain of misbehaving nodes over legitimate nodes and the performance loss of legitimate nodes...

    Provided By NC State University

  • White Papers // May 2009

    Systematic Exploration of Efficient Query Plans For Automated Database Restructuring

    The authors consider the problem of selecting views and indexes that minimize the evaluation costs of the important queries under an upper bound on the disk space available for storing the views/indexes selected to be materialized. They propose a novel end-to-end approach that focuses on systematic exploration of plans for...

    Provided By NC State University