Pennsylvania State University

Displaying 1-40 of 84 results

  • White Papers // May 2012

    CloudPD: Problem Determination and Diagnosis in Shared Dynamic Clouds

    Cloud computing has emerged as a popular computing paradigm allowing workloads to automatically scale in response to changes in demand. Clouds use virtualization to enable elasticity by continually reconfiguring the allocation of physical and virtual resources to workloads. Continual changes in clouds may lead to unexpected performance anomalies and traditional...

    Provided By Pennsylvania State University

  • White Papers // May 2012

    MROrchestrator: A Fine-Grained Resource Orchestration Framework for MapReduce Clusters

    Efficient resource management in data centers and clouds running large distributed data processing frameworks like MapReduce is crucial for enhancing the performance of hosted applications and increasing resource utilization. However, existing resource scheduling schemes in Hadoop MapReduce allocate resources at the granularity of fixed-size, static portions of nodes, called slots....

    Provided By Pennsylvania State University

  • White Papers // Apr 2012

    CSMA Local Area Networking Under Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), they begin with a non-cooperative game framework and build a dynamic...

    Provided By Pennsylvania State University

  • White Papers // Jan 2012

    Structured Security Testing in the Smartgrid

    The Advanced Metering Infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "Smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of vendors are being introduced into grids with limited understanding of the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2011

    Scenario Analysis of Web Service Composition Based on Multi-Criteria Mathematical Goal Programming

    This paper addresses the web service composition problem considering multi-criteria regarding Quality of Services (QoS). Three different scenarios of multi-criteria mathematical programming models are explored under the framework of network based analysis in web service composition. This paper takes care of the issues pertaining to inputs and outputs matching of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2011

    Data Replication in Mobile Tactical Networks

    In tactical networks, nodes move according to tactical maneuvers and network partitions occur frequently. To mitigate this problem, data replication is commonly used to increase data availability and reduce data access delay. However, different tactical maneuvers lead to different node mobility models, which affect the performance of data replication schemes....

    Provided By Pennsylvania State University

  • White Papers // Jul 2011

    Operational Information Content Sum Capacity: Formulation and Examples

    This paper considers Quality-of-Information (QoI) aware rate allocation policies for multiple access channels. QoI is a recently introduced composite metric which is impacted by a number of attributes including accuracy and timeliness of delivery of information communicated from the source(s) to the destination(s), and as such differs from traditional quality-of-service...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Leveraging Strictly Causal State Information at the Encoders for Multiple Access Channels

    The state-dependent Multiple Access Channel (MAC) is considered where the state sequences are known strictly causally to the encoders. First, a two-user MAC with two independent states each known strictly causally to one encoder is revisited, and a new achievable scheme inspired by the recently proposed noisy network coding is...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    An Introduction to Web Systems Using UML, the Unified Modeling Language

    UML, the Unified Modeling Language, is designed to specify systems in a way such that clients and developers can communicate and agree on system-specifications. The complete UML is complex, but most of the utility for clients and developer are in the sequence and collaboration diagrams. This paper will introduce the...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Migration, Assignment, and Scheduling of Jobs in Virtualized Environment

    Migration is an interesting issue for managing resource utilization and performance in clusters. Recent advances in server virtualization have made migration a practical method to achieve these goals. Especially, the live migration of virtualized servers made their pausing times negligible. However, migration of a Virtual Machine (VM) can slow down...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    To Move or Not to Move: The Economics of Cloud Computing

    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'My' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    A Study of Android Application Security

    The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. The authors introduce the ded...

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks

    Smartphone is becoming a key element in providing greater user access to the mobile Internet. Many complex applications, which are used to be only on PCs have been developed and run on smartphones. These applications extend the functionalities of smartphones and make them more convenient for users to be connected....

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Supporting Cooperative Caching in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are characterized by the low node density, unpredictable node mobility and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work have been done on providing effective data access to mobile users. In this paper, the...

    Provided By Pennsylvania State University

  • White Papers // Feb 2011

    APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-Based Services

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis. To...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    DRPM: Dynamic Speed Control for Power Management in Server Class Disks

    A large portion of the power budget in server environments goes into the I/O subsystem the disk array in particular. Traditional approaches to disk power management involve completely stopping the disk rotation, which can take a considerable amount of time, making them less useful in cases where idle times between...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    Protocol Design for Wireless Ad Hoc Networks: The Cross-Layer Paradigm

    The wireless ad hoc networks are still in their infancy. The future of these networks would depend on the range of applications that they can efficiently support, which in turn would depend upon the underlying networking protocols. Since the wireless medium is fundamentally different from the wired medium, therefore the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    User-Centric Data Dissemination in Disruption Tolerant Networks

    Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user interests. In this paper, the authors propose a novel approach for user-centric data dissemination in DTNs, which considers satisfying user interests and maximizes the cost-effectiveness of data dissemination. The...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Minimizing Service Delay in Directional Sensor Networks

    In directional sensor networks, sensors can steer around to serve multiple target points. Most previous works assume there are always enough deployed sensors so that all target points can be served simultaneously. However, this assumption may not hold when the mission requirement changes or when more target points need to...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    MorphCache: A Reconfigurable Adaptive Multi-Level Cache Hierarchy

    Given the diverse range of application characteristics that Chip MultiProcessors (CMPs) need to cater to, a "One-cache-topology-fits-all" design philosophy will clearly be inadequate. In this paper, the authors propose MorphCache, a Reconfigurable Adaptive Multi-level Cache hierarchy. MorphCache dynamically tunes a multi-level cache topology in a CMP to allow significantly different...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Inside Debt And The Design Of Corporate Debt Contracts

    Agency theory posits that debt-like compensation (such as defined-benefit pensions and other deferred compensation) aligns managerial interests more closely with those of debtholders and reduces the agency cost of debt. Consistent with theory, the authors find that a higher CEO relative leverage, defined as the ratio of the CEO's inside...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

    Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. The authors address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

    With the deployment and use of Radio Frequency IDentification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-?-vis the requirements of the healthcare regulations. This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Synergistic TLBs for High Performance Address Translation in Chip Multiprocessors

    Translation Look-aside Buffers (TLBs) are vital hardware support for virtual memory management in high performance computer systems and have a momentous influence on overall system performance. Numerous techniques to reduce TLB miss latencies including the impact of TLB size, associativity, multilevel hierarchies, super pages, and prefetching have been well studied...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Utility-Driven, Energy-Aware In-Network Processing for Mission-Oriented Wireless Sensor Networks

    This paper demonstrates the feasibility and attractiveness of NUM-INP, an extension of the Network Utility Maximization (NUM) framework that considers the integration of In-Network Processing. The NUM-INP protocol provides for distributed convergence of source transmission rate and compression ratio to near-optimal values, while respecting user-defined prioritization through the use of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Social-Aware Data Diffusion in Delay Tolerant MANETs

    Most existing mobility-assisted data access techniques in Delay Tolerant Mobile Ad hoc NETworks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, the authors study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

    Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    System Architectures for Multi-Sensor Task Allocation

    Heterogeneous sensor networks are increasingly being deployed to support users on the field who require many different kinds of sensing tasks, such as detecting people who may need help or monitoring collapsing buildings. Sensors may be scarce and in high demand. Sensing tasks might compete for the exclusive usage of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Optimal Resource Allocation for Battery Limited Wireless Sensor Networks

    In this paper, the authors study the application of the Network Utility Maximization (NUM) framework for joint resource allocation in multi-hop single-radio wireless sensor networks with explicit consideration of sensors' energy constraint. Traditional NUM frameworks allocate network resources aiming at maximizing the network utility as a monotonically increasing function of...

    Provided By Pennsylvania State University

  • White Papers // Jul 2010

    Cloud Computing: A Digital Libraries Perspective

    Provisioning and maintenance of infrastructure for Web based digital library search engines such as CiteSeer present several challenges. CiteSeer provides autonomous citation indexing, full text indexing, and extensive document metadata from documents crawled from the web across computer and information sciences and related fields. Infrastructure virtualization and cloud computing are...

    Provided By Pennsylvania State University

  • White Papers // Jun 2010

    Analysis of the Issues of Effective Broadband Media Services Deployment in the Computer Communication

    Fast Internet access barely scratches the surface of the powers of broadband, DSL, and IP technology, which, combined in broadband media services, will connect people and businesses around the world like never before. Broadband media services will put the consumer in total control by enabling personal, custom, on-demand viewing of...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    CiteSeerx: A Cloud Perspective

    Information retrieval applications are good candidates for hosting in a cloud infrastructure. CiteSeerx a digital library and search engine was built with the goal of efficiently disseminating scientific information and literature over the web. The framework for CiteSeerx as an application of the SeerSuite software is a design built with...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    The Gaussian Many-to-One Interference Channel With Confidential Messages

    The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, the authors introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Uncertainty in Wireless Sensor Networks

    Advances in sensor technology, wireless networking and in mobile devices are revolutionizing the ways that information from the physical world is collected and used. Wireless sensor networks deploying these technologies have had significant impacts on applications in a wide variety of fields including the military, science, industry, commerce, transportation and...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Don't Follow Me: Spam Detection in Twitter

    The rapidly growing social network Twitter has been infiltrated by large amount of spam. In this paper, a spam detection prototype system is proposed to identify suspicious users on Twitter. A directed social graph model is proposed to explore the "Follower" and "Friend" relationships among Twitter. Based on Twitter's spam...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Evaluating Survivability and Costs of Three Virtual Machine Based Server Architectures

    Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

    As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of spam bots detection in online social networking sites. A machine learning approach is proposed to distinguish the...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

    The authors consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals....

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Roadcast: A Popularity Aware Content Sharing Scheme in VANETs

    Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration time and the unreliable wireless connection, a vehicle can only get the useful data when it meets the vehicle which has the exactly matching data. However, the probability...

    Provided By Pennsylvania State University

  • White Papers // Feb 2009

    Evolution of the Investigator Satisfaction Ranking Report: The Advantage of Using the "PROC REPORT Procedure/ODS Excel" Versus a "CROSSTAB Output" or "CROSSTAB/ODS Excel"

    This paper describes the evolution of the SAS programming of a report used in employee evaluations by a government agency. The data is taken from a survey seeking customers' opinion of the service they received from the agency. The author entered the data into a SAS dataset and developed a...

    Provided By Pennsylvania State University

  • White Papers // Jan 2009

    A Multi-Poller Based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

    For sensor networks deployed in unattended, harsh environments, the knowledge of sensor statuses such as liveness, node density and residue energy, is critical for maintaining the normal operation of the network. In this paper, the authors propose a poller-pollee based architecture to monitor the sensor status, focusing on two important...

    Provided By Pennsylvania State University

  • White Papers // Apr 2009

    Spatial-Temporal Coverage Optimization in Wireless Sensor Networks

    Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the lifetime constraint at the same time. Sometimes coverage has to be traded for network lifetime. In this paper, the authors study how to...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Social-Aware Data Diffusion in Delay Tolerant MANETs

    Most existing mobility-assisted data access techniques in Delay Tolerant Mobile Ad hoc NETworks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, the authors study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Roadcast: A Popularity Aware Content Sharing Scheme in VANETs

    Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration time and the unreliable wireless connection, a vehicle can only get the useful data when it meets the vehicle which has the exactly matching data. However, the probability...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Cross-Layer Enhanced Source Location Privacy in Sensor Networks

    Source location privacy is an important issue in sensor network monitoring applications. It is difficult to be addressed by traditional security mechanisms, because an external attacker may perform simple traffic analysis to trace back to the event source. Solutions such as flooding or using dummy messages have the drawback of...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc Networks

    Exploiting the multirate capability in Mobile Ad hoc NETworks (MANETs) is more complex than in single-hop WLANs because of the rate-distance and rate-hop count tradeoffs. This paper proposes Path-centric on-demand Rate Adaptation for MANETs (PRAM) protocol. A unique feature that sets PRAM apart from most of previous studies is its...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

    With the deployment and use of Radio Frequency IDentification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-?-vis the requirements of the healthcare regulations. This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the...

    Provided By Pennsylvania State University

  • White Papers // Mar 2009

    Balancing User Privacy Concerns in the Adoption of Location-Based Services: An Empirical Analysis Across Pull-Based and Push-Based Applications

    Location-Based Services (LBS) bring unprecedented mobility and personalization value to nomadic individuals and hence carry great commercial potential. However, the commercial potential of LBS is obscured by the user's concerns for privacy whereby the LBS provider can misuse the confidential personal information of users and in extreme circumstances place an...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    DRPM: Dynamic Speed Control for Power Management in Server Class Disks

    A large portion of the power budget in server environments goes into the I/O subsystem the disk array in particular. Traditional approaches to disk power management involve completely stopping the disk rotation, which can take a considerable amount of time, making them less useful in cases where idle times between...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Don't Follow Me: Spam Detection in Twitter

    The rapidly growing social network Twitter has been infiltrated by large amount of spam. In this paper, a spam detection prototype system is proposed to identify suspicious users on Twitter. A directed social graph model is proposed to explore the "Follower" and "Friend" relationships among Twitter. Based on Twitter's spam...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Secure Degrees of Freedom for Gaussian Channels With Interference: Structured Codes Outperform Gaussian Signaling

    In this work, the authors prove that a positive secure degree of freedom is achievable for a large class of Gaussian channels as long as the channel is not degraded and the channel is fully connected. This class includes the MAC wire-tap channel, the 2- user interference channel with confidential...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    K-User Interference Channels: Achievable Secrecy Rate and Degrees of Freedom

    In a wireless environment, interference is always present. Traditionally, interference is viewed as a harmful physical phenomenon that should be avoided. Yet, from the secrecy perspective, if interference is more harmful to an eavesdropper, it can be a resource to protect confidential messages. To fully appreciate and evaluate the potential...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Providing Secrecy With Lattice Codes

    Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, the authors provide a tool...

    Provided By Pennsylvania State University

  • White Papers // Jul 2009

    Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels

    Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, the authors advocate that structured codes are useful...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Synergistic TLBs for High Performance Address Translation in Chip Multiprocessors

    Translation Look-aside Buffers (TLBs) are vital hardware support for virtual memory management in high performance computer systems and have a momentous influence on overall system performance. Numerous techniques to reduce TLB miss latencies including the impact of TLB size, associativity, multilevel hierarchies, super pages, and prefetching have been well studied...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    MorphCache: A Reconfigurable Adaptive Multi-Level Cache Hierarchy

    Given the diverse range of application characteristics that Chip MultiProcessors (CMPs) need to cater to, a "One-cache-topology-fits-all" design philosophy will clearly be inadequate. In this paper, the authors propose MorphCache, a Reconfigurable Adaptive Multi-level Cache hierarchy. MorphCache dynamically tunes a multi-level cache topology in a CMP to allow significantly different...

    Provided By Pennsylvania State University

  • White Papers // Nov 2009

    The Role of Feedback in Two-Way Secure Communications

    Most practical communication links are bi-directional. In these models, since the source node also receives signals, its encoder has the option of computing its output based on the signals it received in the past. On the other hand, from a practical point of view, it would also be desirable to...

    Provided By Pennsylvania State University

  • White Papers // Jun 2009

    Extracting Route Directions From Web Pages

    Linguists and geographers are more and more interested in route direction documents because they contain interesting motion descriptions and language patterns. A large number of such documents can be easily found on the Internet. A challenging task is to automatically extract meaningful route parts, i.e. destinations, origins and instructions, from...

    Provided By Pennsylvania State University

  • White Papers // Oct 2009

    The Topological and Electrical Structure of Power Grids

    Numerous recent papers have found important relationships between network structure and risks within networks. These results indicate that network structure can dramatically affect the relative effectiveness of risk identification and mitigation methods. With this in mind this paper provides a comparative analysis of the topological and electrical structure of the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    User-Centric Data Dissemination in Disruption Tolerant Networks

    Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user interests. In this paper, the authors propose a novel approach for user-centric data dissemination in DTNs, which considers satisfying user interests and maximizes the cost-effectiveness of data dissemination. The...

    Provided By Pennsylvania State University

  • White Papers // Feb 2011

    APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-Based Services

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis. To...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Minimizing Service Delay in Directional Sensor Networks

    In directional sensor networks, sensors can steer around to serve multiple target points. Most previous works assume there are always enough deployed sensors so that all target points can be served simultaneously. However, this assumption may not hold when the mission requirement changes or when more target points need to...

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks

    Smartphone is becoming a key element in providing greater user access to the mobile Internet. Many complex applications, which are used to be only on PCs have been developed and run on smartphones. These applications extend the functionalities of smartphones and make them more convenient for users to be connected....

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Supporting Cooperative Caching in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are characterized by the low node density, unpredictable node mobility and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work have been done on providing effective data access to mobile users. In this paper, the...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

    Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and...

    Provided By Pennsylvania State University

  • White Papers // Mar 2010

    Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring

    Continuously monitoring the link performance is important to network diagnosis. Recently, active probes sent between end systems are widely used to monitor the link performance. In this paper, the authors address the problem of minimizing the probing cost and achieving identifiability in link monitoring. Given a set of links to...

    Provided By Pennsylvania State University

  • White Papers // Jul 2009

    Designing System-Level Defenses Against Cellphone Malware

    Cellphones are increasingly becoming attractive targets of various malware, which not only cause privacy leakage, extra charges, and depletion of battery power, but also introduce malicious traffic into networks. In this paper, the authors seek system-level solutions to handle these security threats. Specifically, they propose a mandatory access control -...

    Provided By Pennsylvania State University

  • White Papers // Apr 2009

    An Exploratory Study of RFID Adoption in Retail Sector

    While several large retailers have mandated RFID deployment across their value chain, the case for RFID adoption among several other retailers still remains more uncertain. This paper uses an exploratory methodology, content analysis, to quantitatively analyze benefits, RFID applicable value chain activities, and business processes. The paper found that the...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems

    Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. However, this assumption does not hold in many real cases. To address this problem, this paper proposes a novel semi-Markov survivability evaluation model, which allows the transitions between states...

    Provided By Pennsylvania State University

  • White Papers // Sep 2008

    Tablet PC Use and Impact on Learning in Technology and Engineering Classrooms: A Preliminary Study

    This paper report the preliminary findings on the evaluation of Tablet PC technology use and its impact on learning across a variety of undergraduate and graduate classes from four technology and engineering disciplines at The Pennsylvania State University. This assessment model is grounded in both task - technology fit and...

    Provided By Pennsylvania State University

  • Case Studies // Aug 2009

    A Critical Analysis of PSP Data Quality: Results From a Case Study

    This case study is a critical analysis of Personal Software Process (PSP) that is used by various software engineers to collect and analyze data about their work. There have been a range of published studies that make use of data collected by PSP in order to draw quantitative conclusions about...

    Provided By Pennsylvania State University

  • White Papers // Feb 2009

    Statistical Profiling-based Techniques for Effective Power Provisioning in Data Centers

    This paper presents MiniFlash Crowds (MFC), which is a light-weight profiling service that reveals resource bottlenecks in a Web server infrastructure. MFC uses a set of controlled probes where an increasing number of distributed clients make synchronized requests that exercise specific resources or portions of a remote Web server. In...

    Provided By Pennsylvania State University

  • White Papers // Dec 2009

    Routing in Socially Selfish Delay Tolerant Networks

    Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with which they have social ties but not others, and such willingness varies...

    Provided By Pennsylvania State University

  • White Papers // Jul 2009

    MDCSim: A Multi-Tier Data Center Simulation Platform

    Performance and power issues are becoming increasingly important in the design of large cluster based multitier data centers for supporting a multitude of services. Design and analysis of such large/complex distributed system often suffers from the lack of availability of an adequate physical infrastructure and the cost constraints especially in...

    Provided By Pennsylvania State University

  • White Papers // Mar 2010

    Challenges in Improving the Survivability of Data Centers

    The survivability of data centers is critical to the survivability of the whole enterprise computing system. Building a truly survivable data center faces several daunting challenges, and existing techniques are still quite limited in handling them. This paper would briefly discusses a particular set of challenges the authors view as...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Semantically Rich Application-Centric Security in Android

    Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, authors consider the security requirements of smartphone applications and augment...

    Provided By Pennsylvania State University

  • White Papers // Jan 2010

    An Incentivized Relay System for a Wireless Mesh Network for Internet Access

    A relay system for a Wireless Mesh Network (WMN) for residential broadband Internet access is studied in which a specific pivot Mesh Router (MR) controls the amount of traffic delivered to its fixed Mesh Clients (MCs) and corresponding Mobile Mesh Clients (MMCs) which are out of MR's communication range. Each...

    Provided By Pennsylvania State University

  • White Papers // Dec 2009

    Distributed Monitoring and Aggregation in Wireless Sensor Networks

    Self-monitoring the sensor statuses such as liveness, node density and residue energy is critical for maintaining the normal operation of the sensor network. When building the monitoring architecture, most existing work focuses on minimizing the number of monitoring nodes. However, with less monitoring points, the false alarm rate may increase...

    Provided By Pennsylvania State University