Pennsylvania State University

Displaying 1-40 of 77 results

  • White Papers // May 2012

    CloudPD: Problem Determination and Diagnosis in Shared Dynamic Clouds

    Cloud computing has emerged as a popular computing paradigm allowing workloads to automatically scale in response to changes in demand. Clouds use virtualization to enable elasticity by continually reconfiguring the allocation of physical and virtual resources to workloads. Continual changes in clouds may lead to unexpected performance anomalies and traditional...

    Provided By Pennsylvania State University

  • White Papers // May 2012

    MROrchestrator: A Fine-Grained Resource Orchestration Framework for MapReduce Clusters

    Efficient resource management in data centers and clouds running large distributed data processing frameworks like MapReduce is crucial for enhancing the performance of hosted applications and increasing resource utilization. However, existing resource scheduling schemes in Hadoop MapReduce allocate resources at the granularity of fixed-size, static portions of nodes, called slots....

    Provided By Pennsylvania State University

  • White Papers // Apr 2012

    CSMA Local Area Networking Under Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), they begin with a non-cooperative game framework and build a dynamic...

    Provided By Pennsylvania State University

  • White Papers // Jan 2012

    Structured Security Testing in the Smartgrid

    The Advanced Metering Infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "Smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of vendors are being introduced into grids with limited understanding of the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2011

    Scenario Analysis of Web Service Composition Based on Multi-Criteria Mathematical Goal Programming

    This paper addresses the web service composition problem considering multi-criteria regarding Quality of Services (QoS). Three different scenarios of multi-criteria mathematical programming models are explored under the framework of network based analysis in web service composition. This paper takes care of the issues pertaining to inputs and outputs matching of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2011

    Data Replication in Mobile Tactical Networks

    In tactical networks, nodes move according to tactical maneuvers and network partitions occur frequently. To mitigate this problem, data replication is commonly used to increase data availability and reduce data access delay. However, different tactical maneuvers lead to different node mobility models, which affect the performance of data replication schemes....

    Provided By Pennsylvania State University

  • White Papers // Jul 2011

    Operational Information Content Sum Capacity: Formulation and Examples

    This paper considers Quality-of-Information (QoI) aware rate allocation policies for multiple access channels. QoI is a recently introduced composite metric which is impacted by a number of attributes including accuracy and timeliness of delivery of information communicated from the source(s) to the destination(s), and as such differs from traditional quality-of-service...

    Provided By Pennsylvania State University

  • White Papers // Jun 2011

    New Design Methodologies for High-Speed Mixed-Mode CMOS Full Adder Circuits

    In this paper, the authors present the design of high-speed full adder circuits using a new CMOS mixed mode logic family. This paper is to present a new full adder design circuits combined with current mode circuit in one unit to implement a full adder cell. This paper also discusses...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Leveraging Strictly Causal State Information at the Encoders for Multiple Access Channels

    The state-dependent Multiple Access Channel (MAC) is considered where the state sequences are known strictly causally to the encoders. First, a two-user MAC with two independent states each known strictly causally to one encoder is revisited, and a new achievable scheme inspired by the recently proposed noisy network coding is...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    An Introduction to Web Systems Using UML, the Unified Modeling Language

    UML, the Unified Modeling Language, is designed to specify systems in a way such that clients and developers can communicate and agree on system-specifications. The complete UML is complex, but most of the utility for clients and developer are in the sequence and collaboration diagrams. This paper will introduce the...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Migration, Assignment, and Scheduling of Jobs in Virtualized Environment

    Migration is an interesting issue for managing resource utilization and performance in clusters. Recent advances in server virtualization have made migration a practical method to achieve these goals. Especially, the live migration of virtualized servers made their pausing times negligible. However, migration of a Virtual Machine (VM) can slow down...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    To Move or Not to Move: The Economics of Cloud Computing

    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'My' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    A Study of Android Application Security

    The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. The authors introduce the ded...

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks

    Smartphone is becoming a key element in providing greater user access to the mobile Internet. Many complex applications, which are used to be only on PCs have been developed and run on smartphones. These applications extend the functionalities of smartphones and make them more convenient for users to be connected....

    Provided By Pennsylvania State University

  • White Papers // Mar 2011

    Supporting Cooperative Caching in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are characterized by the low node density, unpredictable node mobility and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work have been done on providing effective data access to mobile users. In this paper, the...

    Provided By Pennsylvania State University

  • White Papers // Feb 2011

    APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-Based Services

    Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. This approach allows the user to cheat by having his device transmit a fake location, which might enable the user to access a restricted resource erroneously or provide bogus alibis. To...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    DRPM: Dynamic Speed Control for Power Management in Server Class Disks

    A large portion of the power budget in server environments goes into the I/O subsystem the disk array in particular. Traditional approaches to disk power management involve completely stopping the disk rotation, which can take a considerable amount of time, making them less useful in cases where idle times between...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    Protocol Design for Wireless Ad Hoc Networks: The Cross-Layer Paradigm

    The wireless ad hoc networks are still in their infancy. The future of these networks would depend on the range of applications that they can efficiently support, which in turn would depend upon the underlying networking protocols. Since the wireless medium is fundamentally different from the wired medium, therefore the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    User-Centric Data Dissemination in Disruption Tolerant Networks

    Data dissemination is useful for many applications of Disruption Tolerant Networks (DTNs). Current data dissemination schemes are generally network-centric ignoring user interests. In this paper, the authors propose a novel approach for user-centric data dissemination in DTNs, which considers satisfying user interests and maximizes the cost-effectiveness of data dissemination. The...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Minimizing Service Delay in Directional Sensor Networks

    In directional sensor networks, sensors can steer around to serve multiple target points. Most previous works assume there are always enough deployed sensors so that all target points can be served simultaneously. However, this assumption may not hold when the mission requirement changes or when more target points need to...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    MorphCache: A Reconfigurable Adaptive Multi-Level Cache Hierarchy

    Given the diverse range of application characteristics that Chip MultiProcessors (CMPs) need to cater to, a "One-cache-topology-fits-all" design philosophy will clearly be inadequate. In this paper, the authors propose MorphCache, a Reconfigurable Adaptive Multi-level Cache hierarchy. MorphCache dynamically tunes a multi-level cache topology in a CMP to allow significantly different...

    Provided By Pennsylvania State University

  • White Papers // Dec 2010

    Inside Debt And The Design Of Corporate Debt Contracts

    Agency theory posits that debt-like compensation (such as defined-benefit pensions and other deferred compensation) aligns managerial interests more closely with those of debtholders and reduces the agency cost of debt. Consistent with theory, the authors find that a higher CEO relative leverage, defined as the ratio of the CEO's inside...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

    Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. The authors address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

    With the deployment and use of Radio Frequency IDentification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-?-vis the requirements of the healthcare regulations. This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Synergistic TLBs for High Performance Address Translation in Chip Multiprocessors

    Translation Look-aside Buffers (TLBs) are vital hardware support for virtual memory management in high performance computer systems and have a momentous influence on overall system performance. Numerous techniques to reduce TLB miss latencies including the impact of TLB size, associativity, multilevel hierarchies, super pages, and prefetching have been well studied...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    Utility-Driven, Energy-Aware In-Network Processing for Mission-Oriented Wireless Sensor Networks

    This paper demonstrates the feasibility and attractiveness of NUM-INP, an extension of the Network Utility Maximization (NUM) framework that considers the integration of In-Network Processing. The NUM-INP protocol provides for distributed convergence of source transmission rate and compression ratio to near-optimal values, while respecting user-defined prioritization through the use of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Social-Aware Data Diffusion in Delay Tolerant MANETs

    Most existing mobility-assisted data access techniques in Delay Tolerant Mobile Ad hoc NETworks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, the authors study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

    Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best cumulative capability of contacting others as relays to carry and...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    System Architectures for Multi-Sensor Task Allocation

    Heterogeneous sensor networks are increasingly being deployed to support users on the field who require many different kinds of sensing tasks, such as detecting people who may need help or monitoring collapsing buildings. Sensors may be scarce and in high demand. Sensing tasks might compete for the exclusive usage of...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Optimal Resource Allocation for Battery Limited Wireless Sensor Networks

    In this paper, the authors study the application of the Network Utility Maximization (NUM) framework for joint resource allocation in multi-hop single-radio wireless sensor networks with explicit consideration of sensors' energy constraint. Traditional NUM frameworks allocate network resources aiming at maximizing the network utility as a monotonically increasing function of...

    Provided By Pennsylvania State University

  • White Papers // Jul 2010

    Cloud Computing: A Digital Libraries Perspective

    Provisioning and maintenance of infrastructure for Web based digital library search engines such as CiteSeer present several challenges. CiteSeer provides autonomous citation indexing, full text indexing, and extensive document metadata from documents crawled from the web across computer and information sciences and related fields. Infrastructure virtualization and cloud computing are...

    Provided By Pennsylvania State University

  • White Papers // Jun 2010

    Analysis of the Issues of Effective Broadband Media Services Deployment in the Computer Communication

    Fast Internet access barely scratches the surface of the powers of broadband, DSL, and IP technology, which, combined in broadband media services, will connect people and businesses around the world like never before. Broadband media services will put the consumer in total control by enabling personal, custom, on-demand viewing of...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    CiteSeerx: A Cloud Perspective

    Information retrieval applications are good candidates for hosting in a cloud infrastructure. CiteSeerx a digital library and search engine was built with the goal of efficiently disseminating scientific information and literature over the web. The framework for CiteSeerx as an application of the SeerSuite software is a design built with...

    Provided By Pennsylvania State University

  • White Papers // May 2010

    The Gaussian Many-to-One Interference Channel With Confidential Messages

    The many-to-one interference channel has received interest by virtue of embodying the essence of an interference network while being more tractable than the general K-user interference channel. In this paper, the authors introduce information theoretic secrecy to this model and consider the many-to-one interference channel with confidential messages, in which...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Uncertainty in Wireless Sensor Networks

    Advances in sensor technology, wireless networking and in mobile devices are revolutionizing the ways that information from the physical world is collected and used. Wireless sensor networks deploying these technologies have had significant impacts on applications in a wide variety of fields including the military, science, industry, commerce, transportation and...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Don't Follow Me: Spam Detection in Twitter

    The rapidly growing social network Twitter has been infiltrated by large amount of spam. In this paper, a spam detection prototype system is proposed to identify suspicious users on Twitter. A directed social graph model is proposed to explore the "Follower" and "Friend" relationships among Twitter. Based on Twitter's spam...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Evaluating Survivability and Costs of Three Virtual Machine Based Server Architectures

    Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

    As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of spam bots detection in online social networking sites. A machine learning approach is proposed to distinguish the...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay

    The authors consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the source and the destination nodes are allowed to transmit, and the relay receives a superposition of their transmitted signals....

    Provided By Pennsylvania State University

  • White Papers // Apr 2012

    CSMA Local Area Networking Under Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), they begin with a non-cooperative game framework and build a dynamic...

    Provided By Pennsylvania State University

  • White Papers // Jan 2012

    Structured Security Testing in the Smartgrid

    The Advanced Metering Infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "Smart meters" report real time usage data that enables efficient energy generation and use. However, aggressive deployments often outpace security efforts: new devices from a dizzying array of vendors are being introduced into grids with limited understanding of the...

    Provided By Pennsylvania State University

  • White Papers // Dec 2011

    Scenario Analysis of Web Service Composition Based on Multi-Criteria Mathematical Goal Programming

    This paper addresses the web service composition problem considering multi-criteria regarding Quality of Services (QoS). Three different scenarios of multi-criteria mathematical programming models are explored under the framework of network based analysis in web service composition. This paper takes care of the issues pertaining to inputs and outputs matching of...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    An Introduction to Web Systems Using UML, the Unified Modeling Language

    UML, the Unified Modeling Language, is designed to specify systems in a way such that clients and developers can communicate and agree on system-specifications. The complete UML is complex, but most of the utility for clients and developer are in the sequence and collaboration diagrams. This paper will introduce the...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Evaluating Survivability and Costs of Three Virtual Machine Based Server Architectures

    Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

    As online social networking sites become more and more popular, they have also attracted the attentions of the spammers. In this paper, Twitter, a popular micro-blogging service, is studied as an example of spam bots detection in online social networking sites. A machine learning approach is proposed to distinguish the...

    Provided By Pennsylvania State University

  • White Papers // May 2012

    CloudPD: Problem Determination and Diagnosis in Shared Dynamic Clouds

    Cloud computing has emerged as a popular computing paradigm allowing workloads to automatically scale in response to changes in demand. Clouds use virtualization to enable elasticity by continually reconfiguring the allocation of physical and virtual resources to workloads. Continual changes in clouds may lead to unexpected performance anomalies and traditional...

    Provided By Pennsylvania State University

  • White Papers // May 2012

    MROrchestrator: A Fine-Grained Resource Orchestration Framework for MapReduce Clusters

    Efficient resource management in data centers and clouds running large distributed data processing frameworks like MapReduce is crucial for enhancing the performance of hosted applications and increasing resource utilization. However, existing resource scheduling schemes in Hadoop MapReduce allocate resources at the granularity of fixed-size, static portions of nodes, called slots....

    Provided By Pennsylvania State University

  • White Papers // Dec 2009

    Applications of Data Mining in the Management of Performance and Power in Data Centers

    Performance and power issues are becoming increasingly important in the design of large data centers for supporting a multitude of services. There are many perspectives of addressing these issues using various computer science principles. In this paper, the author will discuss the applications of data mining techniques to manage power...

    Provided By Pennsylvania State University

  • White Papers // Jul 2010

    Cloud Computing: A Digital Libraries Perspective

    Provisioning and maintenance of infrastructure for Web based digital library search engines such as CiteSeer present several challenges. CiteSeer provides autonomous citation indexing, full text indexing, and extensive document metadata from documents crawled from the web across computer and information sciences and related fields. Infrastructure virtualization and cloud computing are...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    VPath: Precise Discovery of Request Processing Paths From Black-Box Observations of Thread and Network Activities

    Discovering end-to-end request-processing paths is crucial in many modern IT environments for reasons varying from debugging and bottleneck analysis to billing and auditing. Existing solutions for this problem fall into two broad categories: statistical inference and intrusive instrumentation. The statistical approaches infer request-processing paths in a "Most likely" way and...

    Provided By Pennsylvania State University

  • White Papers // Jul 2011

    Operational Information Content Sum Capacity: Formulation and Examples

    This paper considers Quality-of-Information (QoI) aware rate allocation policies for multiple access channels. QoI is a recently introduced composite metric which is impacted by a number of attributes including accuracy and timeliness of delivery of information communicated from the source(s) to the destination(s), and as such differs from traditional quality-of-service...

    Provided By Pennsylvania State University

  • White Papers // Feb 2010

    Cost Constrained Spectrum Sensing in Cognitive Radio Networks

    This paper addresses optimal spectrum sensing in cognitive radio networks considering its system level cost that accounts for the local processing cost of sensing (sample collection and energy calculation at each secondary user) as well as the transmission cost (forwarding energy statistic from secondary users to fusion center). The optimization...

    Provided By Pennsylvania State University

  • White Papers // Feb 2010

    On Performance Evaluation of Cooperative Spectrum Sensing in Cognitive Radio Networks

    This paper presents the system level performance evaluation for energy-detection based cooperative spectrum sensing in cognitive radio networks. Three performance criteria are quantitively analyzed for cooperative spectrum sensing. First, the average error probability is determined given fixed amplifier gains for a fixed number of secondary users by considering all possible...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Defending Against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

    Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and se-cure information sharing....

    Provided By Pennsylvania State University

  • White Papers // Apr 2009

    Spatial-Temporal Coverage Optimization in Wireless Sensor Networks

    Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the lifetime constraint at the same time. Sometimes coverage has to be traded for network lifetime. In this paper, the authors study how to...

    Provided By Pennsylvania State University

  • White Papers // Aug 2010

    Social-Aware Data Diffusion in Delay Tolerant MANETs

    Most existing mobility-assisted data access techniques in Delay Tolerant Mobile Ad hoc NETworks (DT-MANETs) are designed to disseminate data to one or several particular destinations. Different from these works, the authors study the data diffusion problem which diffuses data among all moving nodes so that the nodes that are interested...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Roadcast: A Popularity Aware Content Sharing Scheme in VANETs

    Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration time and the unreliable wireless connection, a vehicle can only get the useful data when it meets the vehicle which has the exactly matching data. However, the probability...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Cross-Layer Enhanced Source Location Privacy in Sensor Networks

    Source location privacy is an important issue in sensor network monitoring applications. It is difficult to be addressed by traditional security mechanisms, because an external attacker may perform simple traffic analysis to trace back to the event source. Solutions such as flooding or using dummy messages have the drawback of...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc Networks

    Exploiting the multirate capability in Mobile Ad hoc NETworks (MANETs) is more complex than in single-hop WLANs because of the rate-distance and rate-hop count tradeoffs. This paper proposes Path-centric on-demand Rate Adaptation for MANETs (PRAM) protocol. A unique feature that sets PRAM apart from most of previous studies is its...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By Pennsylvania State University

  • White Papers // Sep 2010

    RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

    With the deployment and use of Radio Frequency IDentification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-?-vis the requirements of the healthcare regulations. This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the...

    Provided By Pennsylvania State University

  • White Papers // Mar 2009

    Balancing User Privacy Concerns in the Adoption of Location-Based Services: An Empirical Analysis Across Pull-Based and Push-Based Applications

    Location-Based Services (LBS) bring unprecedented mobility and personalization value to nomadic individuals and hence carry great commercial potential. However, the commercial potential of LBS is obscured by the user's concerns for privacy whereby the LBS provider can misuse the confidential personal information of users and in extreme circumstances place an...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    DRPM: Dynamic Speed Control for Power Management in Server Class Disks

    A large portion of the power budget in server environments goes into the I/O subsystem the disk array in particular. Traditional approaches to disk power management involve completely stopping the disk rotation, which can take a considerable amount of time, making them less useful in cases where idle times between...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Don't Follow Me: Spam Detection in Twitter

    The rapidly growing social network Twitter has been infiltrated by large amount of spam. In this paper, a spam detection prototype system is proposed to identify suspicious users on Twitter. A directed social graph model is proposed to explore the "Follower" and "Friend" relationships among Twitter. Based on Twitter's spam...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Secure Degrees of Freedom for Gaussian Channels With Interference: Structured Codes Outperform Gaussian Signaling

    In this work, the authors prove that a positive secure degree of freedom is achievable for a large class of Gaussian channels as long as the channel is not degraded and the channel is fully connected. This class includes the MAC wire-tap channel, the 2- user interference channel with confidential...

    Provided By Pennsylvania State University

  • White Papers // Feb 2010

    Towards Characterizing Cloud Backend Workloads: Insights From Google Compute Clusters

    The advent of cloud computing promises highly available, efficient, and flexible computing services for applications such as web search, email, voice over IP, and web search alerts. One experience at Google is that realizing the promises of cloud computing requires an extremely scalable backend consisting of many large compute clusters...

    Provided By Pennsylvania State University

  • White Papers // Jan 2011

    Protocol Design for Wireless Ad Hoc Networks: The Cross-Layer Paradigm

    The wireless ad hoc networks are still in their infancy. The future of these networks would depend on the range of applications that they can efficiently support, which in turn would depend upon the underlying networking protocols. Since the wireless medium is fundamentally different from the wired medium, therefore the...

    Provided By Pennsylvania State University

  • White Papers // Mar 2009

    Adaptive Prefetching for Shared Cache Based Chip Multiprocessors

    Chip Multi-Processors (CMPs) present a unique scenario for software data prefetching with subtle trade-offs between memory bandwidth and performance. In a shared L2 based CMP, multiple cores compete for the shared on-chip cache space and limited off-chip pin bandwidth. Purely software based prefetching techniques tend to increase this contention, leading...

    Provided By Pennsylvania State University

  • White Papers // Jun 2010

    Analysis of the Issues of Effective Broadband Media Services Deployment in the Computer Communication

    Fast Internet access barely scratches the surface of the powers of broadband, DSL, and IP technology, which, combined in broadband media services, will connect people and businesses around the world like never before. Broadband media services will put the consumer in total control by enabling personal, custom, on-demand viewing of...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Leveraging Strictly Causal State Information at the Encoders for Multiple Access Channels

    The state-dependent Multiple Access Channel (MAC) is considered where the state sequences are known strictly causally to the encoders. First, a two-user MAC with two independent states each known strictly causally to one encoder is revisited, and a new achievable scheme inspired by the recently proposed noisy network coding is...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    To Move or Not to Move: The Economics of Cloud Computing

    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'My' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating...

    Provided By Pennsylvania State University

  • White Papers // May 2011

    Migration, Assignment, and Scheduling of Jobs in Virtualized Environment

    Migration is an interesting issue for managing resource utilization and performance in clusters. Recent advances in server virtualization have made migration a practical method to achieve these goals. Especially, the live migration of virtualized servers made their pausing times negligible. However, migration of a Virtual Machine (VM) can slow down...

    Provided By Pennsylvania State University

  • White Papers // Jan 2010

    An Energy-Efficient Broadcast Protocol in MANETs: Design and Evaluation

    As the technology of Mobile Ad hoc NETworks (MANETs) develops, many new kinds of applications in this field emerge. The group-oriented services which take advantage of the broadcasting nature of wireless networks are of much importance. Therefore, broadcasting/multicasting protocols in MANETs are receiving increased attention. Energy efficiency is a critical...

    Provided By Pennsylvania State University

  • White Papers // Apr 2010

    Uncertainty in Wireless Sensor Networks

    Advances in sensor technology, wireless networking and in mobile devices are revolutionizing the ways that information from the physical world is collected and used. Wireless sensor networks deploying these technologies have had significant impacts on applications in a wide variety of fields including the military, science, industry, commerce, transportation and...

    Provided By Pennsylvania State University

  • White Papers // Aug 2011

    Data Replication in Mobile Tactical Networks

    In tactical networks, nodes move according to tactical maneuvers and network partitions occur frequently. To mitigate this problem, data replication is commonly used to increase data availability and reduce data access delay. However, different tactical maneuvers lead to different node mobility models, which affect the performance of data replication schemes....

    Provided By Pennsylvania State University

  • White Papers // May 2011

    A Study of Android Application Security

    The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone application security by studying 1,100 popular free Android applications. The authors introduce the ded...

    Provided By Pennsylvania State University

  • White Papers // Sep 2009

    Scalable Web Content Attestation

    The web is a primary means of information sharing for most organizations and people. Currently, a recipient of web content knows nothing about the environment in which that information was generated other than the specific server from whence it came (and even that information can be unreliable). In this paper,...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    K-User Interference Channels: Achievable Secrecy Rate and Degrees of Freedom

    In a wireless environment, interference is always present. Traditionally, interference is viewed as a harmful physical phenomenon that should be avoided. Yet, from the secrecy perspective, if interference is more harmful to an eavesdropper, it can be a resource to protect confidential messages. To fully appreciate and evaluate the potential...

    Provided By Pennsylvania State University

  • White Papers // May 2009

    Providing Secrecy With Lattice Codes

    Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, the authors provide a tool...

    Provided By Pennsylvania State University