Pennsylvania State University

Displaying 1-40 of 97 results

  • White Papers // May 2012

    CloudPD: Problem Determination and Diagnosis in Shared Dynamic Clouds

    Cloud computing has emerged as a popular computing paradigm allowing workloads to automatically scale in response to changes in demand. Clouds use virtualization to enable elasticity by continually reconfiguring the allocation of physical and virtual resources to workloads. Continual changes in clouds may lead to unexpected performance anomalies and traditional...

    Provided By Pennsylvania State University

  • White Papers // May 2012

    MROrchestrator: A Fine-Grained Resource Orchestration Framework for MapReduce Clusters

    Efficient resource management in data centers and clouds running large distributed data processing frameworks like MapReduce is crucial for enhancing the performance of hosted applications and increasing resource utilization. However, existing resource scheduling schemes in Hadoop MapReduce allocate resources at the granularity of fixed-size, static portions of nodes, called slots....

    Provided By Pennsylvania State University

  • White Papers // Apr 2012

    CSMA Local Area Networking Under Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), they begin with a non-cooperative game framework and build a dynamic...

    Provided By Pennsylvania State University

  • White Papers // Jan 2012

    Structured Security Testing in the Smartgrid

    The Advanced Metering Infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "Smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of vendors are being introduced into grids with limited understanding of the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2011

    Scenario Analysis of Web Service Composition Based on Multi-Criteria Mathematical Goal Programming

    This paper addresses the web service composition problem considering multi-criteria regarding Quality of Services (QoS). Three different scenarios of multi-criteria mathematical programming models are explored under the framework of network based analysis in web service composition. This paper takes care of the issues pertaining to inputs and outputs matching of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2011

    Data Replication in Mobile Tactical Networks

    In tactical networks, nodes move according to tactical maneuvers and network partitions occur frequently. To mitigate this problem, data replication is commonly used to increase data availability and reduce data access delay. However, different tactical maneuvers lead to different node mobility models, which affect the performance of data replication schemes....

    Provided By Pennsylvania State University

  • White Papers // Jul 2011

    Operational Information Content Sum Capacity: Formulation and Examples

    This paper considers Quality-of-Information (QoI) aware rate allocation policies for multiple access channels. QoI is a recently introduced composite metric which is impacted by a number of attributes including accuracy and timeliness of delivery of information communicated from the source(s) to the destination(s), and as such differs from traditional quality-of-service...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Leveraging Strictly Causal State Information at the Encoders for Multiple Access Channels

    The state-dependent Multiple Access Channel (MAC) is considered where the state sequences are known strictly causally to the encoders. First, a two-user MAC with two independent states each known strictly causally to one encoder is revisited, and a new achievable scheme inspired by the recently proposed noisy network coding is...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    An Introduction to Web Systems Using UML, the Unified Modeling Language

    UML, the Unified Modeling Language, is designed to specify systems in a way such that clients and developers can communicate and agree on system-specifications. The complete UML is complex, but most of the utility for clients and developer are in the sequence and collaboration diagrams. This paper will introduce the...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Migration, Assignment, and Scheduling of Jobs in Virtualized Environment

    Migration is an interesting issue for managing resource utilization and performance in clusters. Recent advances in server virtualization have made migration a practical method to achieve these goals. Especially, the live migration of virtualized servers made their pausing times negligible. However, migration of a Virtual Machine (VM) can slow down...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    To Move or Not to Move: The Economics of Cloud Computing

    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'My' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    A Study of Android Application Security

    The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. The authors introduce the ded...

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks

    Smartphone is becoming a key element in providing greater user access to the mobile Internet. Many complex applications, which are used to be only on PCs have been developed and run on smartphones. These applications extend the functionalities of smartphones and make them more convenient for users to be connected....

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Supporting Cooperative Caching in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are characterized by the low node density, unpredictable node mobility and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work have been done on providing effective data access to mobile users. In this paper, the...

    Provided By Pennsylvania State University

  • White Papers // Feb 2011

    APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-Based Services

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis. To...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    Protocol Design for Wireless Ad Hoc Networks: The Cross-Layer Paradigm

    The wireless ad hoc networks are still in their infancy. The future of these networks would depend on the range of applications that they can efficiently support, which in turn would depend upon the underlying networking protocols. Since the wireless medium is fundamentally different from the wired medium, therefore the...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    DRPM: Dynamic Speed Control for Power Management in Server Class Disks

    A large portion of the power budget in server environments goes into the I/O subsystem the disk array in particular. Traditional approaches to disk power management involve completely stopping the disk rotation, which can take a considerable amount of time, making them less useful in cases where idle times between...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    User-Centric Data Dissemination in Disruption Tolerant Networks

    Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user interests. In this paper, the authors propose a novel approach for user-centric data dissemination in DTNs, which considers satisfying user interests and maximizes the cost-effectiveness of data dissemination. The...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Minimizing Service Delay in Directional Sensor Networks

    In directional sensor networks, sensors can steer around to serve multiple target points. Most previous works assume there are always enough deployed sensors so that all target points can be served simultaneously. However, this assumption may not hold when the mission requirement changes or when more target points need to...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    MorphCache: A Reconfigurable Adaptive Multi-Level Cache Hierarchy

    Given the diverse range of application characteristics that Chip MultiProcessors (CMPs) need to cater to, a "One-cache-topology-fits-all" design philosophy will clearly be inadequate. In this paper, the authors propose MorphCache, a Reconfigurable Adaptive Multi-level Cache hierarchy. MorphCache dynamically tunes a multi-level cache topology in a CMP to allow significantly different...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Inside Debt And The Design Of Corporate Debt Contracts

    Agency theory posits that debt-like compensation (such as defined-benefit pensions and other deferred compensation) aligns managerial interests more closely with those of debtholders and reduces the agency cost of debt. Consistent with theory, the authors find that a higher CEO relative leverage, defined as the ratio of the CEO's inside...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

    Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. The authors address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

    With the deployment and use of Radio Frequency IDentification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-?-vis the requirements of the healthcare regulations. This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Synergistic TLBs for High Performance Address Translation in Chip Multiprocessors

    Translation Look-aside Buffers (TLBs) are vital hardware support for virtual memory management in high performance computer systems and have a momentous influence on overall system performance. Numerous techniques to reduce TLB miss latencies including the impact of TLB size, associativity, multilevel hierarchies, super pages, and prefetching have been well studied...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Utility-Driven, Energy-Aware In-Network Processing for Mission-Oriented Wireless Sensor Networks

    This paper demonstrates the feasibility and attractiveness of NUM-INP, an extension of the Network Utility Maximization (NUM) framework that considers the integration of In-Network Processing. The NUM-INP protocol provides for distributed convergence of source transmission rate and compression ratio to near-optimal values, while respecting user-defined prioritization through the use of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Social-Aware Data Diffusion in Delay Tolerant MANETs

    Most existing mobility-assisted data access techniques in Delay Tolerant Mobile Ad hoc NETworks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, the authors study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

    Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    System Architectures for Multi-Sensor Task Allocation

    Heterogeneous sensor networks are increasingly being deployed to support users on the field who require many different kinds of sensing tasks, such as detecting people who may need help or monitoring collapsing buildings. Sensors may be scarce and in high demand. Sensing tasks might compete for the exclusive usage of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Optimal Resource Allocation for Battery Limited Wireless Sensor Networks

    In this paper, the authors study the application of the Network Utility Maximization (NUM) framework for joint resource allocation in multi-hop single-radio wireless sensor networks with explicit consideration of sensors' energy constraint. Traditional NUM frameworks allocate network resources aiming at maximizing the network utility as a monotonically increasing function of...

    Provided By Pennsylvania State University

  • White Papers // Jul 2010

    Cloud Computing: A Digital Libraries Perspective

    Provisioning and maintenance of infrastructure for Web based digital library search engines such as CiteSeer present several challenges. CiteSeer provides autonomous citation indexing, full text indexing, and extensive document metadata from documents crawled from the web across computer and information sciences and related fields. Infrastructure virtualization and cloud computing are...

    Provided By Pennsylvania State University

  • White Papers // Jun 2010

    Analysis of the Issues of Effective Broadband Media Services Deployment in the Computer Communication

    Fast Internet access barely scratches the surface of the powers of broadband, DSL, and IP technology, which, combined in broadband media services, will connect people and businesses around the world like never before. Broadband media services will put the consumer in total control by enabling personal, custom, on-demand viewing of...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    CiteSeerx: A Cloud Perspective

    Information retrieval applications are good candidates for hosting in a cloud infrastructure. CiteSeerx a digital library and search engine was built with the goal of efficiently disseminating scientific information and literature over the web. The framework for CiteSeerx as an application of the SeerSuite software is a design built with...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    The Gaussian Many-to-One Interference Channel With Confidential Messages

    The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, the authors introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Uncertainty in Wireless Sensor Networks

    Advances in sensor technology, wireless networking and in mobile devices are revolutionizing the ways that information from the physical world is collected and used. Wireless sensor networks deploying these technologies have had significant impacts on applications in a wide variety of fields including the military, science, industry, commerce, transportation and...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Don't Follow Me: Spam Detection in Twitter

    The rapidly growing social network Twitter has been infiltrated by large amount of spam. In this paper, a spam detection prototype system is proposed to identify suspicious users on Twitter. A directed social graph model is proposed to explore the "Follower" and "Friend" relationships among Twitter. Based on Twitter's spam...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Evaluating Survivability and Costs of Three Virtual Machine Based Server Architectures

    Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

    As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of spam bots detection in online social networking sites. A machine learning approach is proposed to distinguish the...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

    The authors consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals....

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Roadcast: A Popularity Aware Content Sharing Scheme in VANETs

    Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration time and the unreliable wireless connection, a vehicle can only get the useful data when it meets the vehicle which has the exactly matching data. However, the probability...

    Provided By Pennsylvania State University

  • White Papers // Feb 2009

    Statistical Profiling-based Techniques for Effective Power Provisioning in Data Centers

    This paper presents MiniFlash Crowds (MFC), which is a light-weight profiling service that reveals resource bottlenecks in a Web server infrastructure. MFC uses a set of controlled probes where an increasing number of distributed clients make synchronized requests that exercise specific resources or portions of a remote Web server. In...

    Provided By Pennsylvania State University

  • White Papers // Aug 2008

    Deliverable D1.4 - Case Studies on Platform Migration and Refactoring

    This paper reports all case studies that have been done in the context of Task 1.3 Refactoring Evolving Systems of the SERIOUS Project. The goal was to put to practice the techniques developed during the project for supporting effective technical evolution of software systems and preventing software decay. The reported...

    Provided By Pennsylvania State University

  • White Papers // Dec 2009

    Routing in Socially Selfish Delay Tolerant Networks

    Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with which they have social ties but not others, and such willingness varies...

    Provided By Pennsylvania State University

  • White Papers // Jul 2009

    MDCSim: A Multi-Tier Data Center Simulation Platform

    Performance and power issues are becoming increasingly important in the design of large cluster based multitier data centers for supporting a multitude of services. Design and analysis of such large/complex distributed system often suffers from the lack of availability of an adequate physical infrastructure and the cost constraints especially in...

    Provided By Pennsylvania State University

  • White Papers // Mar 2010

    Challenges in Improving the Survivability of Data Centers

    The survivability of data centers is critical to the survivability of the whole enterprise computing system. Building a truly survivable data center faces several daunting challenges, and existing techniques are still quite limited in handling them. This paper would briefly discusses a particular set of challenges the authors view as...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Semantically Rich Application-Centric Security in Android

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, authors consider the security requirements of smartphone applications and augment...

    Provided By Pennsylvania State University

  • White Papers // Jan 2010

    An Incentivized Relay System for a Wireless Mesh Network for Internet Access

    A relay system for a Wireless Mesh Network (WMN) for residential broadband Internet access is studied in which a specific pivot Mesh Router (MR) controls the amount of traffic delivered to its fixed Mesh Clients (MCs) and corresponding Mobile Mesh Clients (MMCs) which are out of MR's communication range. Each...

    Provided By Pennsylvania State University

  • White Papers // Dec 2009

    Distributed Monitoring and Aggregation in Wireless Sensor Networks

    Self-monitoring the sensor statuses such as liveness, node density and residue energy is critical for maintaining the normal operation of the sensor network. When building the monitoring architecture, most existing work focuses on minimizing the number of monitoring nodes. However, with less monitoring points, the false alarm rate may increase...

    Provided By Pennsylvania State University

  • White Papers // Jan 2009

    A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses

    The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of IMS networks has not been fully examined. This paper presents a novel DoS attack against IMS. By congesting the presence service, a core service...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

    Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. The authors address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    CiteSeerx: A Cloud Perspective

    Information retrieval applications are good candidates for hosting in a cloud infrastructure. CiteSeerx a digital library and search engine was built with the goal of efficiently disseminating scientific information and literature over the web. The framework for CiteSeerx as an application of the SeerSuite software is a design built with...

    Provided By Pennsylvania State University

  • White Papers // Apr 2009

    Micro-Blogging As Online Word Of Mouth Branding

    In this paper, the authors report research results investigating micro-blogging as a form of online word of mouth branding. The authors analyzed 149,472 micro-blog postings containing branding comments, sentiments, and opinions. The authors investigated the overall structure of these micro-blog postings, types of expressions, and sentiment fluctuations. Of the branding...

    Provided By Pennsylvania State University

  • White Papers // May 2008

    XML Access Control

    XML access control refers to the practice of limiting access to (Parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered on two key problems: the development of formal models for the specification of access control...

    Provided By Pennsylvania State University

  • White Papers // Apr 2009

    Efficient Abstraction and Refinement for Behavioral Description Based Web Service Composition

    The Web Service Composition (WSC) problem with respect to behavioral descriptions deals with the automatic synthesis of a coordinator web service, c that controls a set of web services to reach a goal state. Despite its importance, however, solving the WSC problem for a general case (When c has only...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Defending Against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

    Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and se-cure information sharing....

    Provided By Pennsylvania State University

  • White Papers // Aug 2008

    Computational Complexity of Web Service Composition Based on Behavioral Descriptions

    The Web Service Composition (WSC) problem on behavioral descriptions deals with the automatic construction of a coordinator web service to control a set of web services to reach the goal states. As such, WSC is one of the fundamental techniques to enable the Service Oriented Architecture on the Web. Despite...

    Provided By Pennsylvania State University

  • White Papers // May 2008

    Type-Aware Web Service Composition Using Boolean Satisfiability Solver

    The goal of the Web Service Composition (WSC) problem is to find an optimal "Composition" of web services to satisfy a given request using their syntactic and/or semantic features, when no single service satisfies it. In this paper, in particular, the authors study the WSC problem from semantic aspects, exploiting...

    Provided By Pennsylvania State University

  • White Papers // Jun 2008

    A Web Service Composition Framework Using Integer Programming With Non-Functional Objectives and Constraints

    This paper proposes a Web service composition framework that uses Integer Linear Programming with non-functional objectives and constraints, in addition to the syntactic matching of Web services features. The authors envision that when Web services are fully deployed and commercialized in the near future, the criteria of Web service composition...

    Provided By Pennsylvania State University

  • White Papers // Jun 2008

    Adapting BitTorrent to Wireless Ad Hoc Networks

    BitTorrent is one of the Internet's most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance is almost guaranteed. However, in wireless ad hoc networks, many constraints appear as the scarcity of resources and their shared nature, which make running BitTorrent...

    Provided By Pennsylvania State University

  • White Papers // Feb 2010

    Resource Allocation for the Multiband Relay Channel: A Building Block for Hybrid Wireless Networks

    The authors investigate optimal resource allocation for the multiband relay channel. They find the optimal power and bandwidth allocation strategies that maximize the bounds on the capacity, by solving the corresponding max-min optimization problem. They provide sufficient conditions under which the associated max-min problem is equivalent to a supporting plane...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    The Gaussian Many-to-One Interference Channel With Confidential Messages

    The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, the authors introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

    The authors consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals....

    Provided By Pennsylvania State University

  • White Papers // Feb 2010

    Towards Characterizing Cloud Backend Workloads: Insights From Google Compute Clusters

    The advent of cloud computing promises highly available, efficient, and flexible computing services for applications such as web search, email, voice over IP, and web search alerts. One experience at Google is that realizing the promises of cloud computing requires an extremely scalable backend consisting of many large compute clusters...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    Protocol Design for Wireless Ad Hoc Networks: The Cross-Layer Paradigm

    The wireless ad hoc networks are still in their infancy. The future of these networks would depend on the range of applications that they can efficiently support, which in turn would depend upon the underlying networking protocols. Since the wireless medium is fundamentally different from the wired medium, therefore the...

    Provided By Pennsylvania State University

  • White Papers // Mar 2009

    Adaptive Prefetching for Shared Cache Based Chip Multiprocessors

    Chip Multi-Processors (CMPs) present a unique scenario for software data prefetching with subtle trade-offs between memory bandwidth and performance. In a shared L2 based CMP, multiple cores compete for the shared on-chip cache space and limited off-chip pin bandwidth. Purely software based prefetching techniques tend to increase this contention, leading...

    Provided By Pennsylvania State University

  • White Papers // Jun 2010

    Analysis of the Issues of Effective Broadband Media Services Deployment in the Computer Communication

    Fast Internet access barely scratches the surface of the powers of broadband, DSL, and IP technology, which, combined in broadband media services, will connect people and businesses around the world like never before. Broadband media services will put the consumer in total control by enabling personal, custom, on-demand viewing of...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Leveraging Strictly Causal State Information at the Encoders for Multiple Access Channels

    The state-dependent Multiple Access Channel (MAC) is considered where the state sequences are known strictly causally to the encoders. First, a two-user MAC with two independent states each known strictly causally to one encoder is revisited, and a new achievable scheme inspired by the recently proposed noisy network coding is...

    Provided By Pennsylvania State University

  • White Papers // Mar 2009

    The Cognitive Multiple Access Wire-Tap Channel

    A cognitive Multiple Access Channel with a WireTapper (cMAC-WT) is studied, where one of the two encoders is cognitive, in the sense that it knows a priori the message of the other encoder. Both the discrete and Gaussian models are considered. General achievable rates and outer bounds to the secrecy...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    To Move or Not to Move: The Economics of Cloud Computing

    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'My' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Migration, Assignment, and Scheduling of Jobs in Virtualized Environment

    Migration is an interesting issue for managing resource utilization and performance in clusters. Recent advances in server virtualization have made migration a practical method to achieve these goals. Especially, the live migration of virtualized servers made their pausing times negligible. However, migration of a Virtual Machine (VM) can slow down...

    Provided By Pennsylvania State University

  • White Papers // Jan 2010

    An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation

    As the technology of Mobile Ad hoc NETworks (MANETs) develops, many new kinds of applications in this field emerge. The group-oriented services which take advantage of the broadcasting nature of wireless networks are of much importance. Therefore, broadcasting/multicasting protocols in MANETs are receiving increased attention. Energy efficiency is a critical...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Uncertainty in Wireless Sensor Networks

    Advances in sensor technology, wireless networking and in mobile devices are revolutionizing the ways that information from the physical world is collected and used. Wireless sensor networks deploying these technologies have had significant impacts on applications in a wide variety of fields including the military, science, industry, commerce, transportation and...

    Provided By Pennsylvania State University

  • White Papers // Aug 2011

    Data Replication in Mobile Tactical Networks

    In tactical networks, nodes move according to tactical maneuvers and network partitions occur frequently. To mitigate this problem, data replication is commonly used to increase data availability and reduce data access delay. However, different tactical maneuvers lead to different node mobility models, which affect the performance of data replication schemes....

    Provided By Pennsylvania State University

  • White Papers // Oct 2008

    SET: Detecting Node Clones in Sensor Networks

    Sensor nodes that are deployed in hostile environments are vulnerable to capture and compromise. An adversary may obtain private information from these sensors, clone and intelligently deploy them in the network to launch a variety of insider attacks. This attack process is broadly termed as a clone attack. Currently, the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2008

    Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming

    The authors consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation from the relay node is essential, they investigate whether achieving non-zero secrecy rate is possible. Specifically, they treat the relay node as an eavesdropper from whom...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    A Study of Android Application Security

    The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. The authors introduce the ded...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Scalable Web Content Attestation

    The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that information was generated other than the specific server from whence it came (and even that information can be unreliable). In this paper,...

    Provided By Pennsylvania State University

  • White Papers // Dec 2011

    Scenario Analysis of Web Service Composition Based on Multi-Criteria Mathematical Goal Programming

    This paper addresses the web service composition problem considering multi-criteria regarding Quality of Services (QoS). Three different scenarios of multi-criteria mathematical programming models are explored under the framework of network based analysis in web service composition. This paper takes care of the issues pertaining to inputs and outputs matching of...

    Provided By Pennsylvania State University

  • White Papers // Dec 2008

    Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks

    Network Utility Maximization (NUM) techniques, which cast resource sharing problems as one of distributed utility maximization, have been investigated for a variety of optimization problems in wireless and wired networks. The authors' recent work has extended the NUM framework to consider the case of resource sharing by multiple competing missions...

    Provided By Pennsylvania State University

  • White Papers // Feb 2009

    Evolution of the Investigator Satisfaction Ranking Report: The Advantage of Using the "PROC REPORT Procedure/ODS Excel" Versus a "CROSSTAB Output" or "CROSSTAB/ODS Excel"

    This paper describes the evolution of the SAS programming of a report used in employee evaluations by a government agency. The data is taken from a survey seeking customers' opinion of the service they received from the agency. The author entered the data into a SAS dataset and developed a...

    Provided By Pennsylvania State University