Ohio State University

Displaying 1-40 of 159 results

  • White Papers // Dec 2003

    Organic Food Labels: A Customer Intercept Survey of Central Ohio Food Shoppers

    This document provides a summary of a customer intercept survey of customers in six central Ohio grocery stores- two suburban, two inner city and two rural. The survey addressed customer awareness of the USDA National Organic Program (NOP), particularly for processed foods. Also studied were customer willingness to pay for...

    Provided By Ohio State University

  • White Papers // Mar 2010

    Visualizing Data in Criminal Justice

    For the most part, the methods were developed early in the last century, when collecting data was an expensive proposition. For this reason, to reduce the cost of data collection many of the methods were predicated on taking random samples. Moreover, analyzing data could take hours or days, even with...

    Provided By Ohio State University

  • White Papers // Jan 2010

    QoS-Based Multicast Routing for Distributing Layered Video to Heterogeneous Receivers in Rate-Based Networks

    This paper design an effective multicast routing algorithm for distributing layered multicast video to heterogeneous receivers in networks with rate-based link schedulers. The multicast tree constructed by the algorithm fulfills the QoS requirements imposed by heterogeneous receivers both in terms of bandwidth and delay, and at the same time, consumes...

    Provided By Ohio State University

  • White Papers // Jan 2010

    Dynamic Reconfigurability Support for Providing Soft QoS Guarantees in Cluster-Based Multi-Tier Data-Centers Over InfiniBand

    Current cluster-based data-centers are configured as multiple tiers, each with specific functionalities and containing multiple nodes. Over-provisioning of nodes in these data-center tiers is an accepted approach to provide Quality of Service (QoS) guarantees due to the unpredictability of incoming requests. However, this approach is not cost-effective due to the...

    Provided By Ohio State University

  • White Papers // Jan 2010

    Towards Provision of Quality of Service Guarantees in Job Scheduling

    Considerable research has focused on the problem of scheduling dynamically arriving independent parallel jobs on a given set of resources. There has also been some recent work in the direction of providing differentiated service to different classes of jobs using statically or dynamically calculated priorities assigned to the jobs. However,...

    Provided By Ohio State University

  • White Papers // Aug 2009

    RDMA Over Ethernet - A Preliminary Study

    Though convergence has been a buzzword in the net-working industry for sometime now, no vendor has successfully brought out a solution which combines the ubiquitous nature of Ethernet with the low latency and high performance capabilities that InfiniBand offers. Most of the overlay protocols introduced in the past have had...

    Provided By Ohio State University

  • White Papers // Jan 2010

    Approximate Medial Axis for CAD Models

    Several researches have pointed out the potential use of the medical axis in various geometric modeling applications. The computation of the medial axis for a three dimensional shape often becomes the major bottleneck in these applications. Towards this end, in a recent work, the authors suggested an efficient algorithm that...

    Provided By Ohio State University

  • White Papers // Jan 2010

    A Decomposition-Based Probabilistic Framework for Estimating the Selectivity of XML Twig Queries

    In this paper the authors present a novel approach for estimating the selectivity of XML twig queries. Such a technique is useful for approximate query answering as well as for determining an optimal query plan, based on said estimates, for complex queries. The approach relies on summary structure that contains...

    Provided By Ohio State University

  • White Papers // Aug 2009

    Design of an Intelligent Object-Based Storage Device

    Intelligent storage systems were an active area of research in later half of last decade. The idea was to improve the throughput of data intensive applications from database and image processing domains by offloading computation onto the active storage elements and hopefully reducing unnecessary data traffic between data sources and...

    Provided By Ohio State University

  • White Papers // Apr 2010

    Elastic Cloud Caches for Accelerating Service-Oriented Computations

    Computing as a utility, that is, on-demand access to computing and storage infrastructure has emerged in the form of the Cloud. In this model of computing, elastic resource allocation, i.e., the ability to scale resource allocation for specific applications should be optimized to manage cost versus performance. Meanwhile, the wake...

    Provided By Ohio State University

  • White Papers // Feb 2010

    Efficient Multi-Path Protocol for Wireless Sensor Network

    Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment....

    Provided By Ohio State University

  • White Papers // Jan 2010

    HIMAC: High Throughput MAC Layer Multicasting in Wireless Networks

    Efficient, scalable and robust multicasting support from the MAC layer is needed for meeting the demands of multicast based applications over WiFi and mesh networks. However, the IEEE 802.11 protocol has no specific mechanism for multicasting. It implements multicasting using broadcasting at the base transmission rate. This paper identifies two...

    Provided By Ohio State University

  • White Papers // Jan 2011

    Secret Instantiation in Ad-Hoc Networks

    Security is typically an important issue in wireless ad-hoc networks, including sensor networks, where the communication medium is broadcast in nature and, hence, an adversary can overhear all messages sent by any user. For this reason, a sender must authenticate the receiver and encrypt any messages it sends. One way...

    Provided By Ohio State University

  • White Papers // Jan 2011

    Advanced RDMA-Based Admission Control for Modern Data-Centers

    Current data-centers employ admission control mechanism to maintain low response time and high throughput under overloaded scenarios. Existing mechanisms use internal (On the overloaded server) or external (On the frontend proxies) admission control approaches. The external admission control is preferred since it can be performed transparently without any modifications to...

    Provided By Ohio State University

  • White Papers // Jul 2009

    An Efficient Hardware-Software Approach to Network Fault Tolerance With InfiniBand

    In the last decade or so, clusters have observed a tremendous rise in popularity due to excellent price to performance ratio. A variety of Interconnects have been proposed during this period, with InfiniBand leading the way due to its high performance and open standard. Increasing size of the InfiniBand clusters...

    Provided By Ohio State University

  • White Papers // Jan 2011

    A Software Based Approach for Providing Network Fault Tolerance in Clusters With UDAPL Interface: MPI Level Design and Performance Evaluation

    In the arena of cluster computing, MPI has emerged as the de facto standard for writing parallel applications. At the same time, introduction of high speed RDMA-enabled interconnects like InfiniBand, Myrinet, Quadrics, RDMA-enabled Ethernet has escalated the trends in cluster computing. Network APIs like uDAPL (user Direct Access Provider Library)...

    Provided By Ohio State University

  • White Papers // Jan 2011

    DDSS: A Low-Overhead Distributed Data Sharing Substrate for Cluster-Based Data-Centers Over Modern Interconnects

    Information-sharing is a key aspect of distributed applications such as database servers and web servers. Information-sharing also assists services such as caching, reconfiguration, etc. In the past, information-sharing has been implemented using ad-hoc messaging protocols which often incur high overheads and are not very scalable. This paper presents a new...

    Provided By Ohio State University

  • White Papers // Aug 2010

    In-Flight Camera Platform Geometric Calibration of the Aerial Multi-Head Camera System

    This paper describes an in-flight camera platform geometric calibration method for aerial multi-head camera systems. The platform calibration parameters express the geometric relationship between camera heads and are estimated by means of a temporal geometric constraint in consecutive frames. The constraint used here is the relative geometry between camera heads...

    Provided By Ohio State University

  • White Papers // May 2010

    3D Reconstruction Using Photo Consistency From Uncalibrated Multiple Views

    This paper presents a new 3D object shape reconstruction approach, which exploits the homography transform and photo consistency between multiple images. The proposed method eliminates the requirement for dense feature correspondences, camera calibration, and pose estimation. Using planar homography, the authors generate a set of planes slicing the object to...

    Provided By Ohio State University

  • White Papers // Dec 2009

    Leveraged Buyouts Of Private Companies

    Over the last two decades, the number (Enterprise value) of leveraged buyout transactions involving privately held targets totals 10,013 ($855 billion), accounting for 46% (21%) of the worldwide leveraged buyout market. Yet the vast majority of academic studies focus on the buyouts of publicly held targets. This paper investigates the...

    Provided By Ohio State University

  • White Papers // Jan 2010

    Secure Communications Over Wireless Channels

    This paper presents new techniques that leverage the wireless medium in facilitating secure communications in the presence of eavesdroppers. First, this paper considers the secure transmission of information over an ergodic fading channel with long coherence intervals. The secrecy capacity of such a system is characterized under different assumptions on...

    Provided By Ohio State University

  • White Papers // Oct 2010

    Competitive Nonlinear Pricing And Contract Variety

    The authors analyze markets with both horizontally and vertically differentiated products under both monopoly and duopoly. In the base model with two consumer types, the authors identify conditions under which entry prompts an incumbent to expand or contract its product line. The analysis offers a novel explanation for the widespread...

    Provided By Ohio State University

  • White Papers // Jan 2011

    Applying MPI Derived Datatypes to the NAS Benchmarks: A Case Study

    MPI derived datatypes are a powerful method to define arbitrary collections of non-contiguous data in memory and to enable non-contiguous data communication in a single MPI function call. In this paper, the authors employs MPI datatypes in four NAS benchmarks (MG, LU, BT, and SP) to transfer non-contiguous data. Comprehensive...

    Provided By Ohio State University

  • White Papers // Aug 2009

    A Wireless Security Framework Without Shared Secrets

    This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non-repudiation and anonymity. The framework is based on two physical primitives: collaborative jamming and spatial signature enforcement. Notably, it eschews the use of shared secrets, while providing a cryptosystem that is...

    Provided By Ohio State University

  • White Papers // Aug 2010

    Power-Aware Consolidation of Scientific Workflows in Virtualized Environments

    Use of virtualization technologies is becoming prevalent, including, but not limited to, the current commercial cloud environments. At the same time, besides resources costs and application performance, energy efficiency is becoming a dominant consideration while designing systems and executing applications on them. The premise of the work is that consolidation...

    Provided By Ohio State University

  • White Papers // Aug 2009

    Distributed Cross-Layer Algorithms for the Optimal Control of Multi-hop Wireless Networks

    In this paper, the authors provide and study a general framework that facilitates the development of distributed mechanisms to achieve full utilization of multi-hop wireless networks. In particular, they describe a generic randomized routing, scheduling and flow control scheme that allows for a set of imperfections in the operation of...

    Provided By Ohio State University

  • White Papers // Jan 2011

    Performance Limits of Greedy Maximal Matching in Multi-Hop Wireless Networks

    In this paper, the authors characterize the performance limits of an important class of scheduling schemes, called Greedy Maximal Matching (GMM), for multi-hop wireless networks. For simplicity, they focus on the well-established node-exclusive interference model, although many of the stated results can be readily extended to more general interference models....

    Provided By Ohio State University

  • White Papers // Jan 2011

    Rate Quantization and the Speedup Required to Achieve 100% Throughput for Multicast Over Crossbar Switches

    The problem of providing quality of service guarantees for multicast traffic over crossbar switches has received a limited attention, despite the popularity of its counterpart for unicast traffic. Providing a 100% throughput to all admissible multicast traffic has been shown to be very difficult task and it requires a very...

    Provided By Ohio State University

  • White Papers // Feb 2010

    Energy Optimal Transmission Scheduling in Wireless Sensor Networks

    One of the main issues in the design of sensor networks is energy efficient communication of time-critical data. Energy wastage can be caused by failed packet transmission attempts at each node due to channel dynamics and interference. Therefore transmission control techniques that are unaware of the channel dynamics can lead...

    Provided By Ohio State University

  • White Papers // Dec 2009

    A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple Access and Broadcast Channels

    Information theoretic Broadcast Channels (BC) and Multiple Access Channels (MAC) enable a single node to transmit data simultaneously to multiple nodes, and multiple nodes to transmit data simultaneously to a single node respectively. In this paper, the authors address the problem of link scheduling in multihop wireless networks containing nodes...

    Provided By Ohio State University

  • White Papers // Jan 2011

    MAGNET: A Tool for Debugging, Analyzing and Adapting Computing Systems

    As computing systems grow in complexity, the cluster and grid communities require more sophisticated tools to diagnose, debug and analyze such systems. The authors have developed a toolkit called MAGNET (Monitoring Apparatus for General kerNel-Event Tracing) that provides a detailed look at operating-system kernel events with very low overhead. Using...

    Provided By Ohio State University

  • White Papers // Jan 2011

    Monitoring Protocol Traffic With a MAGNeT

    Network researchers have traditionally focused on monitoring, measuring, and characterizing traffic in the network to gain insight into building critical network components (e.g., protocol stacks, routers, switches, and network interface cards). Recent research suggests that additional insight can be obtained by monitoring traffic at the application level (i.e., before traffic...

    Provided By Ohio State University

  • White Papers // May 2010

    Evaluating Caching and Storage Options on the Amazon Web Services Cloud

    With the availability of on-demand compute and storage infrastructures, many users are deploying data-intensive scientific applications onto Clouds. To accelerate these applications, the prospect of caching intermediate data using the Cloud's elastic compute and storage framework has been promising. To this end, the authors believe that an in-depth study of...

    Provided By Ohio State University

  • White Papers // Apr 2011

    Non-Bayesian Rate-Adaptive Wireless Communication Using ACK/NAK-Feedback

    To combat the detrimental effects of the variability in wireless channels, the authors consider cross-layer rate adaptation based on limited feedback. In particular, based on limited feedback in the form of link-layer ACKnowledgements (ACK) and Negative AcKnowledgements (NAK), they maximize the physical-layer transmission rate subject to an upper bound on...

    Provided By Ohio State University

  • White Papers // Nov 2010

    Improving QoS-Based Routing by Limiting Interference in Lossy Wireless Sensor Networks

    Many new routing protocols have been proposed for wireless sensor networks to maximize throughput, minimize delay or improve other QoS metrics in order to solve the problems of resource-constrained sensor nodes in large networks. However, many of them are based on flooding or its variants. Many routing messages are propagated...

    Provided By Ohio State University

  • White Papers // May 2011

    Concentrating Renewable Energy in Grid-Tied Datacenters

    Datacenters, the large server farms that host widely used Internet services, account for a larger fraction of worldwide carbon emissions each year. Increasingly, datacenters are reducing their emissions by using clean, renewable energy from rooftop solar panels to partially power their servers. While some customers value renewable-powered servers, many others...

    Provided By Ohio State University

  • White Papers // Sep 2010

    Renewable Energy for Datacenters: Energy Flow in Datacenters

    While envisaging datacenters going green (100% dependent on clean renewable energy sources), there is a need to analyze the required energy consumption in datacenters: The amount of energy flowing at different levels in the datacenter and the type of systems using this energy. The experiment carried out involved doing an...

    Provided By Ohio State University

  • White Papers // Nov 2010

    Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks

    Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It is well known that scheduling schemes that give a higher priority to the link with larger queue length can achieve high throughput performance. However, this queue-length-based approach could potentially suffer from large (even infinite) packet delays...

    Provided By Ohio State University

  • White Papers // Oct 2010

    ARQ Security in Wi-Fi and RFID Networks

    In this paper, the authors present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. The proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting the statistical independence between the multipath fading experienced by the legitimate nodes...

    Provided By Ohio State University

  • White Papers // Feb 2011

    Do Hedge Funds Manipulate Stock Prices?

    The authors find evidence of significant price manipulation at the stock level by hedge funds on critical reporting dates. Stocks in the top quartile by hedge fund holdings exhibit abnormal returns of 30 basis points in the last day of the month and a reversal of 25 basis points in...

    Provided By Ohio State University