Purdue Federal Credit Union

Displaying 1-40 of 102 results

  • White Papers // Jan 2015

    The Strategic Formation of Multi-Layer Networks

    The authors study the strategic formation of multi-layer networks, where each layer represents a different type of relationship between the nodes in the network and is designed to maximize some utility that depends on the topology of that layer and those of the other layers. They start by generalizing distance-based...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Effective Management of DRAM Bandwidth in Multicore Processors

    The two technology trends of increasing transistors per die and limited power budgets have driven every major processor vendor to multicore architectures. Technology trends are leading to increasing number of cores on chip. All these cores inherently share the DRAM bandwidth. The on-chip cache resources are limited and in many...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core

    In a Virtual Machine (VM) consolidation environment, it has been observed that CPU sharing among multiple VMs will lead to I/O processing latency because of the CPU access latency experienced by each VM. In this paper, the authors present vTurbo, a system that accelerates I/O processing for VMs by offloading...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2013

    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids

    A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in real time. In this paper, the authors optimize operator profits for the different cases of load curtailment,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

    Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Secure Information Sharing in Digital Supply Chains

    Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each partner in a supply chain uses data, generates data and shares data with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

    Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Outsourcing Privacy-Preserving Social Networks to a Cloud

    In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, the authors identify a novel type of privacy attack, termed 1-neighborhood attack. They assume that...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking

    Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solved by combining the modalities of sensor and cyber networks. The sensor network provides information about physical space activities, such as the locations...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation

    In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the players that maximize their respective minimum payoffs with a time-decayed metric. They also show how the defender can use deception as...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    High Accuracy Attack Provenance Via Binary-Based Execution Partition

    An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by analyzing audit log. However, the presence of long running programs makes a live process receiving a large volume of...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks

    Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly designed for stable networks fall short in providing optimal performance in these kinds of networks due to the highly dynamic and unstable nature of Mobile...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2012

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection

    In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states can be pruned. They present a pruning algorithm in which a threshold parameter is used...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2010

    A Dynamic Data Middleware Cache for Rapidly-Growing Scientific Repositories

    Modern scientific repositories are growing rapidly in size. Scientists are increasingly interested in viewing the latest data as part of query results. Current scientific middleware cache systems, however, assume repositories are static. Thus, they cannot answer scientific queries with the latest data. The queries, instead, are routed to the repository...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Programming Model Support for Dependable, Elastic Cloud Applications

    An attractive approach to leveraging the ability of cloud-computing platforms to provide resources on demand is to build elastic applications, which can scale up or down based on resource requirements. To ease the development of elastic applications, it is useful for programmers to write applications with simple, inelastic semantics and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    ABHRANTA: Locating Bugs that Manifest at Large System Scales

    A key challenge in developing large scale applications (both in system size and in input size) is finding bugs that are latent at the small scales of testing, only manifesting when a program is deployed at large scales. Traditional statistical techniques fail because no error-free run is available at deployment...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Exercises for Graduate Students Using GENI

    GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. The authors propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, they focus on an exercise to study congestion control and reliability...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Optimal Node Placement in Underwater Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2009

    Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation

    Reputation systems represent a key technology for securing distributed applications from misuse by dishonest entities. A reputation system computes reputation scores of the entities in the system, which helps single out those that are exhibiting less than desirable behavior. Examples of reputation systems may be found in several application domains:...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2010

    Spatio-Temporal Access Methods: Part 2 (2003 - 2010)

    In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving objects, many spatio-temporal access methods are developed to process user queries efficiently. Spatio-temporal access methods are classified into four categories: Indexing the past...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2012

    Inter-Session Network Coding Schemes for Two Unicast Sessions With Sequential Hard Deadline Constraints

    The emerging wireless media delivery services have placed greater demands for wireless networks to support high-throughput applications while minimizing the delay of individual packets. In this paper, the authors investigate using inter-session network coding to send packets wirelessly for two deadline-constrained unicast sessions. Specifically, each unicast session aims to transmit...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Exploring the Synergy Between Link Correlation and Network Coding for Energy-Efficient Flooding in Wsns

    Flooding of messages is a fundamental operation in wireless sensor networks which requires special attention to achieve communication efficiency and reliability. The existing works are dominated by ACK/NACK based approaches which demonstrates their effectiveness in achieving efficiency and reliability. A recent work shows that the performance can be further improved...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    The TCP Outcast Problem: Exposing Unfairness in Data Center Networks

    In this paper, the authors observe that bandwidth sharing via TCP in commodity data center networks organized in multi-rooted tree topologies can lead to severe unfairness, which they term as the TCP Outcast problem, under many common traffic patterns. When many flows and a few flows arrive at two ports...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2010

    Capacity of 1-to-K Broadcast Packet Erasure Channels With Channel Output Feedback

    In the last decade, the new network coding concept has emerged, which focuses on achieving the capacity of a communication network. More explicitly, the network-coding-based approaches generally model each hop of a packet-based communication network by a Packet Erasure Channel (PEC) instead of the classic Gaussian channel. Such simple abstraction...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Outsourcing Privacy-Preserving Social Networks to a Cloud

    In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, the authors identify a novel type of privacy attack, termed 1-neighborhood attack. They assume that...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Placement of Applications in Computing Clouds Using Voronoi Diagrams

    The vision of millions of users launching tens of millions of applications running on millions of globally scattered servers presents a new challenge for Cloud Providers: how to assign so many virtual applications to physical servers, while meeting latency needs, improving network utilization, and satisfying availability constraints. Today's application placement...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2012

    On the Error-Prone Substructures for the Binary-Input Ternary-Output Channel and Its Corresponding Exhaustive Search Algorithm

    The error floor performance of a Low-Density ParityCheck (LDPC) code is highly related to the presence of ErrorProne Substructures (EPSs). In general, existing characterizations of the EPSs are inspired by the LDPC decoding behavior under simple binary erasure channel (BEC) and Binary Symmetric Channel (BSC) models. In this paper, the...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Securing Virtual Coordinates by Enforcing Physical Laws

    Virtual Coordinate Systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying on node cooperation. While these systems have good accuracy under benign settings, they suffer a severe decrease of their effectiveness when under attack by compromised...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2011

    Key Agreement for Wireless Networks in the Presence of Active Adversaries

    In this paper, the authors consider key agreement in a distributed wireless network in which adversarial nodes may exist in the network. Two practical scenarios are studied, i.e., path-key establishment and key pool bootstrapping. For both scenarios, previous work mainly focuses on preventing adversarial eavesdropping attacks. When the adversarial nodes...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2012

    Split Null Keys: A Null Space Based Defense for Pollution Attacks in Wireless Network Coding

    Recent work in defending against pollution attacks for intra-flow network coding systems proposed a null spaces based algebraic approach which has a smaller computation cost than previous pollution defenses. The approach requires the source to distribute keys periodically, but in order to scale involves forwarder nodes in the creation of...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2011

    Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

    Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coordinate systems allow nodes in a peer-to-peer network to accurately predict latency between arbitrary nodes without the need of performing extensive measurements. However, systems that leverage virtual coordinates...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Infection Quarantining for Wireless Networks Using Power Control

    In recent years, malware has proliferated into wireless LANs as these networks have grown in popularity and prevalence. While the actual effects of malware-related network traffic has been studied extensively in wired networks, analysis has been limited in wireless networks. In this paper, the authors investigate a defense strategy based...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2011

    Exploiting Overlays for Practical and Profitable Traffic Attraction

    The Internet is heading towards efficiency with the continued deployment of technologies such as Content Distribution Networks (CDN) and with the introduction of Peer-To-Peer (P2P) localization. These technologies reduce the amount of costly traffic that Internet Service Providers (ISPs) must send to other ISPs. While these advances will undoubtedly cause...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2011

    Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems

    Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by a subset of participating nodes. Unfortunately, the accuracy of the service can be severely impacted by compromised nodes providing misleading information. The authors define...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    The Internet-Wide Impact of P2P Traffic Localization on ISP Profitability

    The authors conduct a detailed simulation study to examine how localizing P2P traffic within network boundaries impacts the profitability of an ISP. A distinguishing aspect of their work is the focus on Internet-wide implications, i.e., how adoption of localization within an ISP affects both itself and other ISPs. Their simulations...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays

    The proliferation of peer-to-peer systems has led to the increasing deployment of dynamic, adaptive overlay networks that are designed to preserve application performance goals. While such networks provide increased performance and resiliency to benign faults, they are susceptible to attacks conducted by compromised overlay nodes, especially those targeting the adaptation...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Joint Optimization of Relay Selection and Power Allocation in Cooperative OFDM Networks With Imperfect Channel Estimation

    The authors consider the wireless relay network in which a base station communicates with multiple subscribers, each of which has the ability to act as a relay to forward information to a base station. Here, they propose an algorithm for joint optimization of power allocation, time scheduling, and relay selection...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    On Hashing Graphs

    Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-systems. Use of graph-structured data models are on the rise - in graph databases, representation of biological and healthcare data as well as in modeling systems for representing system topologies. Therefore, the problem of hashing graphs with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Process Implanting: A New Active Introspection Framework for Virtualization

    Previous research on virtual machine introspection proposed "Out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "In-the-box" approach, it remains a challenge to obtain a complete semantic view due to the semantic gap between the guest VM and the hypervisor. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Precise, Scalable, and Online Request Tracing for Multi-Tier Services of Black Boxes

    As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administrators need a request tracing tool to exactly know how a user request of interest travels through services of black boxes and obtain macro-level user request behaviors of...

    Provided By Purdue Federal Credit Union