Oxford University Press

Displaying 1-31 of 31 results

  • White Papers // Sep 2013

    A Simplified Approach for Quality Management in Data Warehouse

    Data warehousing is continuously gaining importance as organizations are realizing the benefits of decision oriented data bases. However, the stumbling block to this rapid development is data quality issues at various stages of data warehousing. Quality can be defined as a measure of excellence or a state free from defects....

    Provided By Oxford University Press

  • White Papers // Apr 2013

    MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method

    With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion detection methods have been developed for protecting computers and networks using conventional statistical methods as well as data mining methods. Data mining methods for misuse and anomaly-based intrusion...

    Provided By Oxford University Press

  • White Papers // Apr 2013

    On Selecting the Nonce Length in Distance-Bounding Protocols

    Distance-bounding protocols form a family of challenge - response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. The authors provide a detailed security analysis of a family of...

    Provided By Oxford University Press

  • White Papers // Mar 2013

    ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols

    The authors introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an Intrusion Detection System (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive...

    Provided By Oxford University Press

  • White Papers // Feb 2013

    Application-Specific Heterogeneous Network-on-Chip Design

    As a result of increasing communication demands, application-specific and scalable Network-on-Chips (NoCs) have emerged to connect processing cores and subsystems in Multiprocessor System-on-Chips (SoCs). A challenge in application-specific NoC design is to find the right balance among different tradeoffs, such as communication latency, power consumption and chip area. The authors...

    Provided By Oxford University Press

  • White Papers // Apr 2012

    EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments

    A sensor network, unlike a traditional communication network, is deeply embedded in physical environments and its operation is mainly driven by the event activities in the environment. In long-term operations, the event activities usually show certain patterns that can be learned and exploited to optimize the network design. However, this...

    Provided By Oxford University Press

  • White Papers // Jan 2012

    SchedulingWorkflow Applications Based on Multi-Source Parallel Data Retrieval in Distributed Computing Networks

    Many scientific experiments are carried out in collaboration with researchers around the world to use existing infrastructures and conduct experiments at massive scale. Data produced by such experiments are thus replicated and cached at multiple geographic locations. This gives rise to new challenges when selecting distributed data and compute resources...

    Provided By Oxford University Press

  • White Papers // Dec 2011

    Cross-Network Opportunistic Collection of Urgent Data in Wireless Sensor Networks

    Ubiquitous smart environments equipped with low-cost and easily-deployable Wireless Sensor Networks (WSNs) and ever-increasing widespread MobileAd hoc NETworks (MANETs) are opening brand new opportunities in environmental monitoring. This paper proposes an original solution for WSN/MANET integration based on the primary design guideline of opportunistically exploiting MANET overlays impromptu formed over...

    Provided By Oxford University Press

  • White Papers // Oct 2011

    Facilitating Efficient Object Tracking in Large-Scale Traceability Networks

    With recent advances in technologies such as radio-frequency identification and new standards such as the electronic product code, large-scale traceability is emerging as a key differentiator in a wide range of enterprise applications (e.g. counterfeit prevention, product recalls and pilferage reduction). Such traceability applications often need to access data collected...

    Provided By Oxford University Press

  • White Papers // Aug 2011

    The Microcosmic Model of Worm Propagation

    Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help one to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation...

    Provided By Oxford University Press

  • White Papers // Aug 2011

    Secure Image Retrieval Based on Visual Content and Watermarking Protocol

    As an interesting application on cloud computing, Content-Based Image Retrieval (CBIR) has attracted a lot of attention, but the focus of previous research work was mainly on improving the retrieval performance rather than addressing security issues such as copyrights and user privacy. With an increase of security attacks in the...

    Provided By Oxford University Press

  • White Papers // Apr 2011

    Understanding Financial Derivatives During The South Sea Bubble: The Case Of The South Sea Subscription Shares

    In this paper, the authors demonstrate the existence of something whose existence has never been noted before. During the South Sea Bubble of 1720 there was not only a market for South Sea shares - a market that famously rose to dizzying heights before it came crashing down - there...

    Provided By Oxford University Press

  • White Papers // Mar 2011

    Adaptive Linear Filtering Compression on Realtime Sensor Networks

    The authors present a lightweight lossless compression algorithm for realtime sensor networks. Their proposed Adaptive Linear Filtering Compression (ALFC) algorithm performs predictive compression using adaptive linear filtering to predict sample values followed by entropy coding of prediction residuals, encoding a variable number of samples into fixed-length packets. Adaptive prediction eliminates...

    Provided By Oxford University Press

  • White Papers // Nov 2010

    Anatomy of a Hash-based Long Read Sequence Mapping Algorithm for Next Generation DNA Sequencing

    Recently a number of programs have been proposed for mapping short reads to a reference genome. Many of them are heavily optimized for short-read mapping and hence are very efficient for shorter queries, but that makes them inefficient or not applicable for reads longer than 200bp. However, many sequencers are...

    Provided By Oxford University Press

  • White Papers // Nov 2010

    Subspace Clustering of Gene Expression Data: Challenges and Issues

    In a proxy signature scheme, the proxy signer generates a signature on a message. By the combination of a blind signature with a proxy signature, a proxy blind signature permits the proxy signer produce a blind signature on a message. In this paper, a proxy blind signature scheme based on...

    Provided By Oxford University Press

  • White Papers // Aug 2010

    CEO Replacement Under Private Information

    This paper examines the optimal CEO compensation and replacement policy when the CEO is privately informed about the firm's continuation value under his leadership. Ex ante moral hazard implies that the CEO must receive ex post quasi rents, which endogenously biases him toward continuation. The authors' model shows that to...

    Provided By Oxford University Press

  • White Papers // Mar 2010

    The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing InWireless Ad Hoc and Sensor Networks

    In grid routing, the plane is tessellated into equal-sized square cells. Two cells are called neighbor cells if they share a common edge, and two nodes are called routing neighbors if they are in neighbor cells and within each other's transmission range. If communication parties are in the same cell,...

    Provided By Oxford University Press

  • White Papers // Mar 2010

    Endogenous Growth: A Kaldorian Approach

    This paper explores the Kaldorian approach to endogenous growth theory. The central principles of this approach are explored, including the claims that growth is: demand-led, with trade playing a central role in aggregate demand formation; and path-dependent. It is shown that both the actual and natural rates of growth are...

    Provided By Oxford University Press

  • White Papers // Feb 2010

    Born Innovators

    These days, innovation and creativity are in high demand in the work world, making them something that a lot of people would like to have. The reality is that some people are more creative and innovative than others, which begs the question: why? As the voluminous list of books and...

    Provided By Oxford University Press

  • White Papers // Jan 2010

    Writing, Literacy and Word-Processing: Changes in the Concept of Literature in the Framework of New Media

    Since electronic text systems tend to replace print media, there is no doubt about their impact on the social system of literary communication in the long run. The main hypothesis of this paper is, that in the end books will not be replaced in a strict sense, but transformed into...

    Provided By Oxford University Press

  • White Papers // Jan 2010

    Controlled Multi-Path Routing in Sensor Networks Using Bezier Curves

    The authors address the problem of extending the lifetime of wireless sensor networks using multi-path routing based on a family of flexible routes with soft quality of service guarantees in terms of the packets' delivery latency. They introduce a methodology based on Bezier curves as guiding trajectories in the routing...

    Provided By Oxford University Press

  • White Papers // Aug 2009

    Energy-Efficient Cloud Computing

    Energy efficiency is increasingly important for future Information and Communication Technologies (ICT), because the increased usage of ICT, together with increasing energy costs and the need to reduce green house gas emissions call for energy-efficient technologies that decrease the overall energy consumption of computation, storage and communications. Cloud computing has...

    Provided By Oxford University Press

  • White Papers // May 2009

    Management of Server Farms for Performance and Profit

    The business model whereby a company makes money by selling computing services which are delivered through large server farms, or data centers, is becoming increasingly important. Variously referred to as Cloud Computing, or Utility Computing, or Service Provisioning, that model has been adopted by major organizations such as Amazon, Google,...

    Provided By Oxford University Press

  • White Papers // Apr 2009

    Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function Using HOL

    Deep datapath and algorithm complexity have made the verification of floating-point units a very hard task. Most simulation and reachability analysis verification tools fail to verify a circuit with a deep datapath like most industrial floating-point units. Theorem proving, however, offers a better solution to handle such verification. In this...

    Provided By Oxford University Press

  • White Papers // Nov 2008

    Rule Systems for Run-Time Monitoring: From EAGLE to RULER

    In Barringer et al., EAGLE was introduced as a general purpose rule-based temporal logic for specifying run-time monitors. A novel interpretative trace-checking scheme via stepwise transformation of an EAGLE monitoring formula was defined and implemented. However, even though EAGLE presents an elegant formalism for the expression of complex trace properties,...

    Provided By Oxford University Press

  • White Papers // Oct 2008

    Analyzing Team Decision-Making in Tactical Scenarios

    Team decision making is a bundle of interdependent activities that involve gathering, interpreting and exchanging information; creating and identifying alternative courses of action; choosing among alternatives by integrating the often different perspectives of team members; implementing a choice and monitoring its consequences. To accomplish joint tasks, human team members often...

    Provided By Oxford University Press

  • White Papers // Oct 2008

    New Methods For Forecasting Inflation And Its Sub-Components: Application To The USA

    Forecasts are presented for the 12-month ahead US rate of inflation measured by the chain weighted personal consumer expenditure deflator, PC, and its three main components: non-durable goods, durable goods and services. Monthly models are estimated for 1974 to 1999, and pseudo out-of-sample forecasting performance is examined for 2000-2007. Alternative...

    Provided By Oxford University Press

  • White Papers // Sep 2008

    Meaning and Mining: The Impact of Implicit Assumptions in Data Mining for the Humanities

    As the use of data mining and machine learning methods in the humanities becomes more common, it will be increasingly important to examine implicit biases, assumptions, and limitations these methods bring with them. This paper makes explicit some of the foundational assumptions of machine learning methods, and presents a series...

    Provided By Oxford University Press

  • White Papers // Sep 2007

    A Denial of Service Detector Based on Maximum Likelihood Detection and the Random Neural Network

    Due to the simplicity of the concept and the availability of attack tools, launching a DoS attack is relatively easy, while defending a network resource against it is disproportionately difficult. The first step of a protection scheme against DoS must be the detection of its existence, ideally before the destructive...

    Provided By Oxford University Press

  • White Papers // May 2006

    An Abstract Interface for System Software on Large-Scale Clusters

    Scalable management of distributed resources is one of the major challenges when building large-scale clusters for high-performance computing. This task includes transparent fault tolerance, efficient deployment of resources and support for all the needs of parallel applications: parallel I/O, deterministic behavior and responsiveness. These challenges may seem daunting with commodity...

    Provided By Oxford University Press

  • White Papers // Feb 2006

    An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

    Distributed denial-of-service attack is one of the most pressing security problems that the Internet community needs to address. Two major requirements for effective traceback are to quickly and accurately locate potential attackers and to filter attack packets so that a host can resume the normal service to legitimate clients. Most...

    Provided By Oxford University Press

  • White Papers // Sep 2008

    Meaning and Mining: The Impact of Implicit Assumptions in Data Mining for the Humanities

    As the use of data mining and machine learning methods in the humanities becomes more common, it will be increasingly important to examine implicit biases, assumptions, and limitations these methods bring with them. This paper makes explicit some of the foundational assumptions of machine learning methods, and presents a series...

    Provided By Oxford University Press

  • White Papers // Oct 2008

    New Methods For Forecasting Inflation And Its Sub-Components: Application To The USA

    Forecasts are presented for the 12-month ahead US rate of inflation measured by the chain weighted personal consumer expenditure deflator, PC, and its three main components: non-durable goods, durable goods and services. Monthly models are estimated for 1974 to 1999, and pseudo out-of-sample forecasting performance is examined for 2000-2007. Alternative...

    Provided By Oxford University Press

  • White Papers // Mar 2010

    Endogenous Growth: A Kaldorian Approach

    This paper explores the Kaldorian approach to endogenous growth theory. The central principles of this approach are explored, including the claims that growth is: demand-led, with trade playing a central role in aggregate demand formation; and path-dependent. It is shown that both the actual and natural rates of growth are...

    Provided By Oxford University Press

  • White Papers // Aug 2010

    CEO Replacement Under Private Information

    This paper examines the optimal CEO compensation and replacement policy when the CEO is privately informed about the firm's continuation value under his leadership. Ex ante moral hazard implies that the CEO must receive ex post quasi rents, which endogenously biases him toward continuation. The authors' model shows that to...

    Provided By Oxford University Press

  • White Papers // Apr 2011

    Understanding Financial Derivatives During The South Sea Bubble: The Case Of The South Sea Subscription Shares

    In this paper, the authors demonstrate the existence of something whose existence has never been noted before. During the South Sea Bubble of 1720 there was not only a market for South Sea shares - a market that famously rose to dizzying heights before it came crashing down - there...

    Provided By Oxford University Press

  • White Papers // Jan 2010

    Controlled Multi-Path Routing in Sensor Networks Using Bezier Curves

    The authors address the problem of extending the lifetime of wireless sensor networks using multi-path routing based on a family of flexible routes with soft quality of service guarantees in terms of the packets' delivery latency. They introduce a methodology based on Bezier curves as guiding trajectories in the routing...

    Provided By Oxford University Press

  • White Papers // Mar 2010

    The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing InWireless Ad Hoc and Sensor Networks

    In grid routing, the plane is tessellated into equal-sized square cells. Two cells are called neighbor cells if they share a common edge, and two nodes are called routing neighbors if they are in neighbor cells and within each other's transmission range. If communication parties are in the same cell,...

    Provided By Oxford University Press

  • White Papers // Dec 2011

    Cross-Network Opportunistic Collection of Urgent Data in Wireless Sensor Networks

    Ubiquitous smart environments equipped with low-cost and easily-deployable Wireless Sensor Networks (WSNs) and ever-increasing widespread MobileAd hoc NETworks (MANETs) are opening brand new opportunities in environmental monitoring. This paper proposes an original solution for WSN/MANET integration based on the primary design guideline of opportunistically exploiting MANET overlays impromptu formed over...

    Provided By Oxford University Press

  • White Papers // May 2009

    Management of Server Farms for Performance and Profit

    The business model whereby a company makes money by selling computing services which are delivered through large server farms, or data centers, is becoming increasingly important. Variously referred to as Cloud Computing, or Utility Computing, or Service Provisioning, that model has been adopted by major organizations such as Amazon, Google,...

    Provided By Oxford University Press

  • White Papers // Mar 2011

    Adaptive Linear Filtering Compression on Realtime Sensor Networks

    The authors present a lightweight lossless compression algorithm for realtime sensor networks. Their proposed Adaptive Linear Filtering Compression (ALFC) algorithm performs predictive compression using adaptive linear filtering to predict sample values followed by entropy coding of prediction residuals, encoding a variable number of samples into fixed-length packets. Adaptive prediction eliminates...

    Provided By Oxford University Press

  • White Papers // Nov 2008

    Rule Systems for Run-Time Monitoring: From EAGLE to RULER

    In Barringer et al., EAGLE was introduced as a general purpose rule-based temporal logic for specifying run-time monitors. A novel interpretative trace-checking scheme via stepwise transformation of an EAGLE monitoring formula was defined and implemented. However, even though EAGLE presents an elegant formalism for the expression of complex trace properties,...

    Provided By Oxford University Press

  • White Papers // Oct 2011

    Facilitating Efficient Object Tracking in Large-Scale Traceability Networks

    With recent advances in technologies such as radio-frequency identification and new standards such as the electronic product code, large-scale traceability is emerging as a key differentiator in a wide range of enterprise applications (e.g. counterfeit prevention, product recalls and pilferage reduction). Such traceability applications often need to access data collected...

    Provided By Oxford University Press

  • White Papers // Oct 2008

    Analyzing Team Decision-Making in Tactical Scenarios

    Team decision making is a bundle of interdependent activities that involve gathering, interpreting and exchanging information; creating and identifying alternative courses of action; choosing among alternatives by integrating the often different perspectives of team members; implementing a choice and monitoring its consequences. To accomplish joint tasks, human team members often...

    Provided By Oxford University Press

  • White Papers // Apr 2012

    EAR: An Energy and Activity-Aware Routing Protocol for Wireless Sensor Networks in Smart Environments

    A sensor network, unlike a traditional communication network, is deeply embedded in physical environments and its operation is mainly driven by the event activities in the environment. In long-term operations, the event activities usually show certain patterns that can be learned and exploited to optimize the network design. However, this...

    Provided By Oxford University Press

  • White Papers // Aug 2011

    Secure Image Retrieval Based on Visual Content and Watermarking Protocol

    As an interesting application on cloud computing, Content-Based Image Retrieval (CBIR) has attracted a lot of attention, but the focus of previous research work was mainly on improving the retrieval performance rather than addressing security issues such as copyrights and user privacy. With an increase of security attacks in the...

    Provided By Oxford University Press

  • White Papers // Aug 2011

    The Microcosmic Model of Worm Propagation

    Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help one to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation...

    Provided By Oxford University Press

  • White Papers // Jan 2012

    SchedulingWorkflow Applications Based on Multi-Source Parallel Data Retrieval in Distributed Computing Networks

    Many scientific experiments are carried out in collaboration with researchers around the world to use existing infrastructures and conduct experiments at massive scale. Data produced by such experiments are thus replicated and cached at multiple geographic locations. This gives rise to new challenges when selecting distributed data and compute resources...

    Provided By Oxford University Press

  • White Papers // Nov 2010

    Anatomy of a Hash-based Long Read Sequence Mapping Algorithm for Next Generation DNA Sequencing

    Recently a number of programs have been proposed for mapping short reads to a reference genome. Many of them are heavily optimized for short-read mapping and hence are very efficient for shorter queries, but that makes them inefficient or not applicable for reads longer than 200bp. However, many sequencers are...

    Provided By Oxford University Press

  • White Papers // Mar 2013

    ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols

    The authors introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an Intrusion Detection System (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive...

    Provided By Oxford University Press

  • White Papers // Feb 2010

    Born Innovators

    These days, innovation and creativity are in high demand in the work world, making them something that a lot of people would like to have. The reality is that some people are more creative and innovative than others, which begs the question: why? As the voluminous list of books and...

    Provided By Oxford University Press

  • White Papers // Aug 2009

    Energy-Efficient Cloud Computing

    Energy efficiency is increasingly important for future Information and Communication Technologies (ICT), because the increased usage of ICT, together with increasing energy costs and the need to reduce green house gas emissions call for energy-efficient technologies that decrease the overall energy consumption of computation, storage and communications. Cloud computing has...

    Provided By Oxford University Press

  • White Papers // Jan 2010

    Writing, Literacy and Word-Processing: Changes in the Concept of Literature in the Framework of New Media

    Since electronic text systems tend to replace print media, there is no doubt about their impact on the social system of literary communication in the long run. The main hypothesis of this paper is, that in the end books will not be replaced in a strict sense, but transformed into...

    Provided By Oxford University Press

  • White Papers // Feb 2013

    Application-Specific Heterogeneous Network-on-Chip Design

    As a result of increasing communication demands, application-specific and scalable Network-on-Chips (NoCs) have emerged to connect processing cores and subsystems in Multiprocessor System-on-Chips (SoCs). A challenge in application-specific NoC design is to find the right balance among different tradeoffs, such as communication latency, power consumption and chip area. The authors...

    Provided By Oxford University Press

  • White Papers // Sep 2007

    A Denial of Service Detector Based on Maximum Likelihood Detection and the Random Neural Network

    Due to the simplicity of the concept and the availability of attack tools, launching a DoS attack is relatively easy, while defending a network resource against it is disproportionately difficult. The first step of a protection scheme against DoS must be the detection of its existence, ideally before the destructive...

    Provided By Oxford University Press

  • White Papers // Feb 2006

    An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

    Distributed denial-of-service attack is one of the most pressing security problems that the Internet community needs to address. Two major requirements for effective traceback are to quickly and accurately locate potential attackers and to filter attack packets so that a host can resume the normal service to legitimate clients. Most...

    Provided By Oxford University Press

  • White Papers // Apr 2009

    Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function Using HOL

    Deep datapath and algorithm complexity have made the verification of floating-point units a very hard task. Most simulation and reachability analysis verification tools fail to verify a circuit with a deep datapath like most industrial floating-point units. Theorem proving, however, offers a better solution to handle such verification. In this...

    Provided By Oxford University Press

  • White Papers // Apr 2013

    MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method

    With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion detection methods have been developed for protecting computers and networks using conventional statistical methods as well as data mining methods. Data mining methods for misuse and anomaly-based intrusion...

    Provided By Oxford University Press

  • White Papers // Nov 2010

    Subspace Clustering of Gene Expression Data: Challenges and Issues

    In a proxy signature scheme, the proxy signer generates a signature on a message. By the combination of a blind signature with a proxy signature, a proxy blind signature permits the proxy signer produce a blind signature on a message. In this paper, a proxy blind signature scheme based on...

    Provided By Oxford University Press

  • White Papers // Apr 2013

    On Selecting the Nonce Length in Distance-Bounding Protocols

    Distance-bounding protocols form a family of challenge - response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. The authors provide a detailed security analysis of a family of...

    Provided By Oxford University Press

  • White Papers // Sep 2013

    A Simplified Approach for Quality Management in Data Warehouse

    Data warehousing is continuously gaining importance as organizations are realizing the benefits of decision oriented data bases. However, the stumbling block to this rapid development is data quality issues at various stages of data warehousing. Quality can be defined as a measure of excellence or a state free from defects....

    Provided By Oxford University Press

  • White Papers // May 2006

    An Abstract Interface for System Software on Large-Scale Clusters

    Scalable management of distributed resources is one of the major challenges when building large-scale clusters for high-performance computing. This task includes transparent fault tolerance, efficient deployment of resources and support for all the needs of parallel applications: parallel I/O, deterministic behavior and responsiveness. These challenges may seem daunting with commodity...

    Provided By Oxford University Press