Northeastern University

Displaying 1-40 of 104 results

  • White Papers // May 2014

    Toward Robust Hidden Volumes using Write-Only Oblivious RAM

    With sensitive data being increasingly stored on mobile devices and laptops, hard disk encryption is more important than ever. In particular, being able to plausibly deny that a hard disk contains certain information is a very useful and interesting research goal. However, it has been known for some time that...

    Provided By Northeastern University

  • White Papers // Feb 2014

    Cost Effective Test Methodology Using PMU for Automated Test Equipment Systems

    In this paper, test methodology using parametric measurement unit is proposed for Automated Test Equipment (ATE) systems using 600MHz Driver, Comparator, and active Load (DCL). ATE systems are a very important means to reduce the device test cost, and the systems should be able to test several modes to check...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Algorithm and Architecture Co-Design of Mixture of Gaussian (MoG) Background Subtraction for Embedded Vision

    Embedded vision is a rapidly growing and challenging market that demands high computation with low power consumption. Carefully crafted heterogeneous platforms have the possibility to deliver the required computation within the power budget. However, to achieve efficient realizations, vision algorithms and architectures have to be developed and tuned in conjunction....

    Provided By Northeastern University

  • White Papers // Nov 2013

    Flexible Function-Level Acceleration of Embedded Vision Applications Using the Pipelined Vision Processor

    The emerging massive embedded vision market is driving demanding and ever-increasing computationally complex high-performance and low-power MPSoC requirements. To satisfy these requirements innovative solutions are required to deliver high performance pixel processing combined with low energy per pixel execution. These solutions must combine the power efficiency of ASIC style IP...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Modeling Fuzzy Data With Fuzzy Data Types in Fuzzy Database and XML Models

    Various fuzzy data models such as fuzzy relational databases, fuzzy object-oriented databases, fuzzy object relational databases and fuzzy XML have been proposed in the literature in order to represent and process fuzzy information in databases and XML. But little work has been done in modeling fuzzy data types. Actually in...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists

    The authors present RASP, a new protocol for privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. The contribution of RASP over related work is twofold: first, RASP improves privacy guarantees by ensuring that after a query for range [a;b] any new...

    Provided By Northeastern University

  • White Papers // May 2013

    A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks

    Establishing secure access and communications in a Hierarchical Mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on Public Key Infrastructure (PKI) or Identity-Based Cryptography (IBC). However, these solutions...

    Provided By Northeastern University

  • White Papers // Apr 2013

    Securing Legacy Firefox Extensions With SENTINEL

    A poorly designed web browser extension with security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "Benign-but-buggy" extensions, as well as extensions that have been written with malicious intents pose significant security threats to a system running such components. Recent studies have in-deed shown that...

    Provided By Northeastern University

  • White Papers // Mar 2013

    PRIVEXEC: Private Execution as an Operating System Service

    Privacy has become an issue of paramount importance for many users. As a result, encryption tools such as TrueCrypt, OS-based full-disk encryption such as FileVault, and privacy modes in all modern browsers have become popular. However, although such tools are useful, they are not perfect. For example, prior work has...

    Provided By Northeastern University

  • White Papers // Jan 2013

    DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis

    Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of research has focused on methods for detecting and mitigating the effects of botnets. Two of the primary factors preventing the development of effective large-scale, wide-area botnet detection systems are seemingly contradictory. On the one hand,...

    Provided By Northeastern University

  • White Papers // Dec 2012

    FReD: Automated Debugging Via Binary Search Through a Process Lifetime

    Reversible debuggers have been developed at least since 1970. Such a feature is useful when the cause of a bug is close in time to the bug manifestation. When the cause is far back in time, one resort to setting appropriate breakpoints in the debugger and beginning a new debugging...

    Provided By Northeastern University

  • White Papers // Dec 2012

    Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting

    Piracy is a mass phenomenon on the Internet today. Various file sharing platforms offer free access to unauthorised copies of copyrighted works such as media content and software. Copyright holders are using a range of legal and technical methods to protect their rights, and they are lobbying for legislation that...

    Provided By Northeastern University

  • White Papers // Dec 2012

    A Generic Checkpoint-Restart Mechanism for Virtual Machines

    It is common today to deploy complex software inside a Virtual Machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host). Yet, for each virtual machine, the code for snapshots is laboriously developed on a per-VM basis. This paper...

    Provided By Northeastern University

  • White Papers // Dec 2012

    A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication

    Wireless networking technologies have fundamentally changed the way the people compute, allowing ubiquitous, anytime and any-where access to information. At the same time, wireless technologies come with the security cost that adversaries may receive signals and engage in unauthorized communication even when not physically close to a network. Because of...

    Provided By Northeastern University

  • White Papers // Sep 2012

    Impact of Mobile Transmitter Sources on Radio Frequency Wireless Energy Harvesting

    Wireless energy harvesting sensor networks constitute a new paradigm, where the motes deployed in the field are no longer constrained by the limited battery resource, but are able to re-charge themselves through directed electromagnetic energy transfer. The energy sources, which the people call actors, are mobile and move along pre-decided...

    Provided By Northeastern University

  • White Papers // Sep 2012

    Privacy Risks in Named Data Networking: What is the Cost of Performance?

    Named data networking architectures have been proposed to improve various shortcomings of the current Internet architecture. A key part of these proposals is the capability of caching arbitrary content in arbitrary network locations. While caching has the potential to improve network performance, the data stored in caches can be seen...

    Provided By Northeastern University

  • White Papers // Aug 2012

    Symbol Error Rate Analysis for M-QAM Modulated Physical-Layer Network Coding with Phase Errors

    Recent theoretical studies of Physical-layer Network Coding (PNC) show much interest on high-level modulation, such as M-ary Quadrature Amplitude Modulation (M-QAM), and most related works are based on the assumption of phase synchrony. The possible presence of synchronization error and channel estimation error highlight the demand of analyzing the Symbol...

    Provided By Northeastern University

  • White Papers // Aug 2012

    Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures

    Content is at the heart of next-generation Internet architectures such as Content-Centric Networking (CCN): Instead of routing location-based messages to end hosts, the network transmits location-independent, named content objects. Such data objects can (and are envisioned to) be cached in arbitrary network nodes. In this paper, the authors discuss several...

    Provided By Northeastern University

  • White Papers // Jul 2012

    An Analysis of Complex Adaptive Computer Manufacturing Supply Network Evolution in Competitive Markets

    Unlike in the past, global markets, suppliers, and consumers are more connected today than ever, creating a rapidly changing ecosystem. While this is good for all, it makes markets more competitive and forces businesses to adapt to market trends to survive. This paper focuses on highly dynamic complex adaptive Computer...

    Provided By Northeastern University

  • White Papers // Jun 2012

    Paying for Piracy? an Analysis of One-Click Hosters' Controversial Reward Schemes

    One-Click Hosters (OCHs) such as Rapid share and now defunct Mega upload are popular services where users can upload and store large files. Up loaders can then share the files with friends or make them publicly available by publishing the download links in separate directories, so-called direct download or streaming...

    Provided By Northeastern University

  • White Papers // Jun 2012

    Data Security and Privacy Protection Issues in Cloud Computing

    It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn't move them to cloud. The market size the cloud computing shared is still far behind...

    Provided By Northeastern University

  • White Papers // May 2012

    ADUS: Adaptive Resource Allocation in Cluster Systems Under Heavy-Tailed and Bursty Workloads

    A large-scaled cluster system has been employed in various areas by offering pools of fundamental resources. How to effectively allocate the shared resources in a cluster system is a critical but challenging issue, which has been extensively studied in the past few years. Despite the fact that classic load balancing...

    Provided By Northeastern University

  • White Papers // Apr 2012

    Preventing Input Validation Vulnerabilities in Web Applications Through Automated Type Analysis

    Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and critical vulnerabilities such as XSS and SQL injection are still common. As a consequence, much effort in the past decade has been spent on mitigating...

    Provided By Northeastern University

  • White Papers // Apr 2012

    On the Capacity of Rate-Adaptive Packetized Wireless Communication Links Under Jamming

    Over the last decades, wireless communication proved to be an enabling technology to an increasingly large number of applications. The convenience of wireless and its support of mobility has revolutionized the way the authors access data, information services, and interact with the physical world. Beyond enabling mobile devices to access...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Superficially Substructural Types

    Many sub-structural type systems have been proposed for controlling access to shared state in higher-order languages. Central to these systems is the notion of a resource, which may be split into disjoint pieces that different parts of a program can manipulate independently without worrying about interfering with one another. Some...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Active Flash: Out-of-Core Data Analytics on Flash Storage

    Next generation science will increasingly come to rely on the ability to perform efficient, on-the-fly analytics of data generated by High-Performance Computing (HPC) simulations, modeling complex physical phenomena. Scientific computing workflows are stymied by the traditional chaining of simulation and data analysis, creating multiple rounds of redundant reads and writes...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Discovery Through Gossip

    The authors study randomized gossip-based processes in dynamic networks that are motivated by discovery processes in large-scale distributed networks like peer-to-peer or social networks. A well-studied problem in peer-to-peer networks is the resource discovery problem. There, the goal for nodes (hosts with IP addresses) is to discover the IP addresses...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Novel Blind CFO Estimator for Uplink Interleaved OFDMA Systems

    In Orthogonal Frequency-Division Multiple Access (OFDMA) systems, closely spaced and overlapped sub-carriers are divided into groups and assigned to multiple users for simultaneous transmission. However, Carrier Frequency Offsets (CFOs) between the transmitter and the receiver destroy the orthogonality and introduce Inter-Carrier Interference (ICI), resulting in Multiple-Access Interference (MAI). By the...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Distributed Lifetime Maximization Routing With Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of low-power and energy-constrained sensor nodes, and a fundamental challenge in the design of WSNs is to maximize the network lifetime. In WSNs, data collected by adjacent sensor nodes usually have spatial-temporal correlations, and data aggregation technique is often used as an effective approach to...

    Provided By Northeastern University

  • White Papers // Feb 2012

    ERP Implementation for Corporate Growth and Sustainability

    This paper discusses the problems a growing high-tech company faces and how it responds by selecting new Enterprise Resource Planning (ERP) software. It describes the process they used in selecting a 'Best fit' ERP vendor, how they developed a time frame to train employees and implement the new ERP system,...

    Provided By Northeastern University

  • White Papers // Dec 2011

    CEIP Maps: Context-embedded Information Product Maps

    In this paper, the authors present a second-generation coding and visualization technique for IP Maps to improve usability and analyzability. They expand the details of IP mapping to convey contextual elements of the data production process. They ground their modifications in theories on information quality, context theory and argumentation theory....

    Provided By Northeastern University

  • White Papers // Dec 2011

    Exploring the Design Space of Social Network-Based Sybil Defenses

    Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glance, existing social network-based Sybil defense schemes can be divided into two categories: Sybil detection and Sybil tolerance. These two categories of systems both...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Active Flash: Performance-Energy Tradeoffs for Out-of-Core Processing on Non-Volatile Memory Devices

    In this paper, the authors study the performance and energy tradeoffs involved in migrating data analysis into the flash device, a process they refer to as Active Flash. The Active Flash paradigm is similar to "Active disks", which has received considerable attention. Active Flash allows one to move processing closer...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Quantized Feedback Control for Networked Control Systems Under Communication Constraints

    This paper investigates the feedback stabilization problem for Networked Control Systems (NCSs) with unbound process noise, where sensors and controllers are connected via noiseless digital channels carrying a finite number of bits per unit time. A sufficient condition for stabilization of NCSs, which relies on a variable-rate digital link used...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Insights Into User Behavior in Dealing With Internet Attacks

    The Internet is a lucrative medium for criminals targeting Internet users. Most common Internet attacks require some form of user interaction such as clicking on an exploit link. Hence, the problem at hand is not only a technical one, but it also has a strong human aspect. Although the security...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Typing the Numeric Tower

    In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically typed relatives support the straightforward expression via a rich numeric tower, existing statically typed languages force programmers to pollute textbook formulas with...

    Provided By Northeastern University

  • White Papers // Oct 2011

    WCET Analysis with MRU Caches: Challenging LRU for Predictability

    Most previous paper in cache analysis for WCET estimation assumes a particular replacement policy called LRU. In contrast, much less work has been done for non-LRU policies, since they are generally considered to be very \"Unpredictable\". However, most commercial processors are actually equipped with these non-LRU policies, since they are...

    Provided By Northeastern University

  • White Papers // Oct 2011

    An Enhanced EM/SAGE-Based H-Infinity Channel Estimator for MIMO-OFDM Systems

    This paper proposes a low-complexity and robust H-infinity channel estimator for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. To lessen the complexity, the Expectation Maximization (EM) and Space-Alternating Generalized EM (SAGE) algorithms are adopted respectively. To treat with the effect of Non-Gaussian Noise (NGN) channels, an Equivalent Signal...

    Provided By Northeastern University

  • White Papers // Sep 2011

    Fingerprint Core Point Detection Based on SVM and Complex Filter

    Core point is an essential feature of a fingerprint. Fingerprint core point detection is an important step for fingerprint matching and classification. This paper presents a two stages algorithm for fingerprint core point detection. First, local fingerprint style is used as the basis for constructing feature data, then SVM is...

    Provided By Northeastern University

  • White Papers // Jun 2011

    The Design and Implementation of Typed Scheme: From Scripts to Programs

    When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of explicit type annotations in typical scripting language forces programmers to must (re) discover critical pieces of design information every time they wish to change a program. This analysis step both slows down the maintenance...

    Provided By Northeastern University

  • White Papers // Mar 2009

    Random Linear Network Coding for Time-Division Duplexing: Field Size Considerations

    The authors study the effect of the field size on the performance of random linear network coding for time division duplexing channels is proposed. In particular, they study the case of node broadcasting to several receivers. They show that the effect of the field size can be included in the...

    Provided By Northeastern University

  • White Papers // Nov 2008

    Capacity Scaling Laws for Underwater Networks

    This paper presents upper bounds on the transport capacity of underwater acoustic networks with nodes deployed arbitrarily in a unit area disk. The authors study three cases of interest: an arbitrarily chosen narrow transmission band; the case of power limited nodes which transmit in disjoint narrow bands; and the case...

    Provided By Northeastern University

  • White Papers // Aug 2010

    A Method for Differentially Coherent Detection of OFDM Signals on Doppler-Distorted Channels

    Doppler distortion causes inter-carrier interference which prevents the use of differentially coherent detection in OFDM systems. To recover this efficient detection method, the authors propose to use several FFT demodulators operating in parallel over non-overlapping time segments, and to combine their outputs prior to detection. This technique aims for efficient...

    Provided By Northeastern University

  • White Papers // Feb 2009

    On Coding for Delay - New Approaches Based on Network Coding in Networks With Large Latency

    In networks with large latency, feedback about received packets may lag considerably the transmission of the original packets, limiting the feedback's usefulness. Moreover, time duplex constraints may entail that receiving feedback may be costly. In this paper, the authors consider tailoring feedback and coding jointly in such settings to reduce...

    Provided By Northeastern University

  • White Papers // Oct 2011

    An Enhanced EM/SAGE-Based H-Infinity Channel Estimator for MIMO-OFDM Systems

    This paper proposes a low-complexity and robust H-infinity channel estimator for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. To lessen the complexity, the Expectation Maximization (EM) and Space-Alternating Generalized EM (SAGE) algorithms are adopted respectively. To treat with the effect of Non-Gaussian Noise (NGN) channels, an Equivalent Signal...

    Provided By Northeastern University

  • White Papers // Jan 2011

    WiZi-Cloud: Application-Transparent Dual ZigBee-WiFi Radios for Low Power Internet Access

    The high density ofWiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network's limitations. However, maintaining connectivity through WiFi results in depleting the mobile phone's battery in a very short time. The authors propose WiZi-Cloud, a system that utilizes a...

    Provided By Northeastern University

  • White Papers // Apr 2010

    iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones

    The authors introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does not need any battery but harvests energy from the phone WiFi transmissions. The iPoint delivers information to the mobile phone...

    Provided By Northeastern University

  • White Papers // Jan 2011

    Control Channel Jamming: Resilience and Identification of Traitors

    Signaling and control channels are essential to the operation of wireless communication networks. Such networks are constrained by the limited radio-frequency bandwidth and energy available to the mobile devices. Therefore, wireless networks implement various control mechanisms to conserve the limited resources. Many networks employ shared control channels for sending system...

    Provided By Northeastern University

  • White Papers // Jan 2011

    Steganographic Communication in Ordered Channels

    In this paper, the authors focus on estimating the amount of information that can be embedded in the sequencing of packets in ordered channels. Ordered channels, e.g. TCP, rely on sequence numbers to recover from packet loss and packet reordering. They propose a formal model for transmitting information by packet-reordering....

    Provided By Northeastern University

  • White Papers // Mar 2009

    Heuristics for Lifetime Maximization in Wireless Sensor Networks With Multiple Mobile Sinks

    This paper investigates heuristics to control and coordinate the concurrent movement of multiple sinks for lifetime maximization in a Wireless Sensor Network (WSN). The authors have developed a centralized heuristic that runs in polynomial time given the solution to the linear program from which provides a provable upper bound to...

    Provided By Northeastern University

  • White Papers // Sep 2011

    Fingerprint Core Point Detection Based on SVM and Complex Filter

    Core point is an essential feature of a fingerprint. Fingerprint core point detection is an important step for fingerprint matching and classification. This paper presents a two stages algorithm for fingerprint core point detection. First, local fingerprint style is used as the basis for constructing feature data, then SVM is...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Typing the Numeric Tower

    In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically typed relatives support the straightforward expression via a rich numeric tower, existing statically typed languages force programmers to pollute textbook formulas with...

    Provided By Northeastern University

  • White Papers // Jun 2011

    The Design and Implementation of Typed Scheme: From Scripts to Programs

    When scripts in untyped languages grow into large programs, maintaining them becomes difficult. A lack of explicit type annotations in typical scripting language forces programmers to must (re) discover critical pieces of design information every time they wish to change a program. This analysis step both slows down the maintenance...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Novel Blind CFO Estimator for Uplink Interleaved OFDMA Systems

    In Orthogonal Frequency-Division Multiple Access (OFDMA) systems, closely spaced and overlapped sub-carriers are divided into groups and assigned to multiple users for simultaneous transmission. However, Carrier Frequency Offsets (CFOs) between the transmitter and the receiver destroy the orthogonality and introduce Inter-Carrier Interference (ICI), resulting in Multiple-Access Interference (MAI). By the...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Distributed Lifetime Maximization Routing With Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of low-power and energy-constrained sensor nodes, and a fundamental challenge in the design of WSNs is to maximize the network lifetime. In WSNs, data collected by adjacent sensor nodes usually have spatial-temporal correlations, and data aggregation technique is often used as an effective approach to...

    Provided By Northeastern University

  • White Papers // Oct 2010

    HARD-DNS: Highly-Available Redundantly-Distributed DNS

    The DNS or Domain Name System is a critical piece of the Internet infrastructure. In recent times there have been numerous attacks on DNS, the Kaminsky attack being one of the more insidious ones. Current solutions to the problem involve patching the DNS software (Bind) and/or using DNSSEC. Unfortunately, these...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Active Flash: Out-of-Core Data Analytics on Flash Storage

    Next generation science will increasingly come to rely on the ability to perform efficient, on-the-fly analytics of data generated by High-Performance Computing (HPC) simulations, modeling complex physical phenomena. Scientific computing workflows are stymied by the traditional chaining of simulation and data analysis, creating multiple rounds of redundant reads and writes...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Active Flash: Performance-Energy Tradeoffs for Out-of-Core Processing on Non-Volatile Memory Devices

    In this paper, the authors study the performance and energy tradeoffs involved in migrating data analysis into the flash device, a process they refer to as Active Flash. The Active Flash paradigm is similar to "Active disks", which has received considerable attention. Active Flash allows one to move processing closer...

    Provided By Northeastern University

  • White Papers // Apr 2012

    On the Capacity of Rate-Adaptive Packetized Wireless Communication Links Under Jamming

    Over the last decades, wireless communication proved to be an enabling technology to an increasingly large number of applications. The convenience of wireless and its support of mobility has revolutionized the way the authors access data, information services, and interact with the physical world. Beyond enabling mobile devices to access...

    Provided By Northeastern University

  • White Papers // Jul 2010

    A Separation Logic for Refining Concurrent Objects

    Fine-grained concurrent data structures are crucial for gaining performance from multiprocessing, but their design is a subtle art. Recent literature has made large strides in verifying these data structures, using either atomicity refinement or separation logic with rely-guarantee reasoning. In this paper, the authors show how the ownership discipline of...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Superficially Substructural Types

    Many sub-structural type systems have been proposed for controlling access to shared state in higher-order languages. Central to these systems is the notion of a resource, which may be split into disjoint pieces that different parts of a program can manipulate independently without worrying about interfering with one another. Some...

    Provided By Northeastern University

  • White Papers // Jan 2009

    All-Termination(T)

    The authors introduce the All-Termination(T) problem: given a termination solver T and a collection of functions F, find every sub-set of the formal parameters to F whose consideration is sufficient to show, using T that F terminates. An important and motivating application is enhancing theorem proving systems by constructing the...

    Provided By Northeastern University

  • White Papers // Apr 2012

    Preventing Input Validation Vulnerabilities in Web Applications Through Automated Type Analysis

    Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and critical vulnerabilities such as XSS and SQL injection are still common. As a consequence, much effort in the past decade has been spent on mitigating...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Insights Into User Behavior in Dealing With Internet Attacks

    The Internet is a lucrative medium for criminals targeting Internet users. Most common Internet attacks require some form of user interaction such as clicking on an exploit link. Hence, the problem at hand is not only a technical one, but it also has a strong human aspect. Although the security...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Quantized Feedback Control for Networked Control Systems Under Communication Constraints

    This paper investigates the feedback stabilization problem for Networked Control Systems (NCSs) with unbound process noise, where sensors and controllers are connected via noiseless digital channels carrying a finite number of bits per unit time. A sufficient condition for stabilization of NCSs, which relies on a variable-rate digital link used...

    Provided By Northeastern University

  • White Papers // May 2012

    ADUS: Adaptive Resource Allocation in Cluster Systems Under Heavy-Tailed and Bursty Workloads

    A large-scaled cluster system has been employed in various areas by offering pools of fundamental resources. How to effectively allocate the shared resources in a cluster system is a critical but challenging issue, which has been extensively studied in the past few years. Despite the fact that classic load balancing...

    Provided By Northeastern University

  • White Papers // Dec 2012

    A Generic Checkpoint-Restart Mechanism for Virtual Machines

    It is common today to deploy complex software inside a Virtual Machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host). Yet, for each virtual machine, the code for snapshots is laboriously developed on a per-VM basis. This paper...

    Provided By Northeastern University

  • White Papers // Dec 2012

    FReD: Automated Debugging Via Binary Search Through a Process Lifetime

    Reversible debuggers have been developed at least since 1970. Such a feature is useful when the cause of a bug is close in time to the bug manifestation. When the cause is far back in time, one resort to setting appropriate breakpoints in the debugger and beginning a new debugging...

    Provided By Northeastern University

  • White Papers // Dec 2002

    Information Systems Risk Factors, Risk Assessments, and Audit Planning Decisions

    This paper examines systems risk factors identified by external auditors for a sample of their actual audit clients. Specifically, the paper studies two important areas of information systems risk: the risk of breaches in system security and the risk that the information provided by the system is inadequate. To perform...

    Provided By Northeastern University

  • White Papers // Jan 2009

    Characterizing the SPEC JVM98 Benchmarks on the Java Virtual Machine

    This paper presents the results of a characterization analysis performed on the Java Virtual Machine (JVM) using the SPEC JVM98 benchmarks. An instrument is developed that runs inside the JVM that provides profiles of a variety of different workload characteristics. The data from these profiles are examined to better understand...

    Provided By Northeastern University

  • White Papers // Sep 2008

    NEUStore (Version 1.4): A Simple Java Package for the Construction of Disk-Based, Paginated, and Buffered Indices

    This paper describes NEUStore, a Java package that aims to support the development of disk-based, paginated, and buffered index structures. It starts with an overview figure with 16 classes. Three core classes are discussed in-depth. As case studies the naive heap file and the heap file are presented. The discussions...

    Provided By Northeastern University

  • White Papers // Feb 2009

    Preprocessing DNS Log Data for Effective Data Mining

    The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively mine DNS log data for statistical patterns. Processing DNS log data can be classified as a data-intensive problem, and as such presents challenges unique...

    Provided By Northeastern University

  • White Papers // Jun 2009

    The Ff - Family of Protocols for RFID-Privacy and Authentication

    Ff is a family of lightweight and privacy-preserving authentication protocols for RFID-systems. Contrary to related work, Ff offers user-adjustable authentication and privacy without requiring a complex cryptographic hash function or non-volatile state on the tag. At the core of Ff is a lightweight keyed hash function that allows the reader...

    Provided By Northeastern University

  • White Papers // Jan 2009

    Efficient RFID Data Imputation by Analyzing the Correlations of Monitored Objects

    As a promising technology for tracing the product and human flows, Radio Frequency Identification (RFID) has received much attention within database community. However, the problem of missing readings restricts the application of RFID. Some RFID data cleaning algorithms have therefore been proposed to address this problem. Nevertheless, most of them...

    Provided By Northeastern University

  • White Papers // May 2007

    Best Practices of Spyware and Virus Removal

    This is the most streamlined document I can recommend to anyone who wants to improve their skills in cleaning an infected machine of spyware and viruses. I wrote it for junior technicians working at Northeastern Universities' Residential Network Resource Center thought the material could be used for the greater good....

    Provided By Northeastern University

  • White Papers // Jan 2010

    Energy-Efficient Data Management for Sensor Networks: A Work-in-Progress Report

    The paper gives a status update of the Cougar Project, in which the authors' investigate a database approach to sensor networks: Clients "Program" the sensors through queries in a high-level declarative language (such as a variant of SQL). This paper overviews the activities on energy-efficient data dissemination and query processing....

    Provided By Northeastern University

  • White Papers // Jan 2010

    Quantifying Load Imbalance on Virtualized Enterprise Servers

    Virtualization has been shown to be an attractive path to increase overall system resource utilization. The use of live Virtual Machine (VM) migration has enabled more effective sharing of system resources across multiple physical servers, resulting in an increase in overall performance. Live VM migration can be used to load...

    Provided By Northeastern University

  • White Papers // May 2009

    Adapting the USRP as an Underwater Acoustic Modem

    This paper describes how the Universal Software Radio Peripheral (USRP) coupled with GNU Radio can be adapted for use as a configurable UnderWater Acoustic (UWA) modem. The USRP contains an Altera Cyclone EP1C12 FPGA and typically acts as the baseband and IF section of a radio communication system. The work...

    Provided By Northeastern University

  • White Papers // Oct 2010

    Transport Layer - Congestion Control and QoS

    The resources being shared in the network include the bandwidth of the links, and the buffers on the routers or switches where packets are queued waiting to be transmitted over these links. Packets contend at a router for the use of a link, with each contending packet placed in a...

    Provided By Northeastern University

  • White Papers // Jan 2010

    QDMR: An Efficient QoS Dependent Multicast Routing Algorithm

    Many real-time applications, such as video conferencing, require the transmission of messages from a sender to multiple receivers subject to Quality-of-Service (QoS) delivery constraints (e.g. Bounded Delay). This requires the underlying multicast protocol to find a QoS-constrained minimum-cost communication path (Tree). However, finding such a tree is known to be...

    Provided By Northeastern University