Purdue Federal Credit Union

Displaying 1-40 of 98 results

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2013

    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids

    A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in real time. In this paper, the authors optimize operator profits for the different cases of load curtailment,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

    Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Secure Information Sharing in Digital Supply Chains

    Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each partner in a supply chain uses data, generates data and shares data with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

    Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Outsourcing Privacy-Preserving Social Networks to a Cloud

    In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, the authors identify a novel type of privacy attack, termed 1-neighborhood attack. They assume that...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking

    Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solved by combining the modalities of sensor and cyber networks. The sensor network provides information about physical space activities, such as the locations...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation

    In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the players that maximize their respective minimum payoffs with a time-decayed metric. They also show how the defender can use deception as...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    High Accuracy Attack Provenance Via Binary-Based Execution Partition

    An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by analyzing audit log. However, the presence of long running programs makes a live process receiving a large volume of...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks

    Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly designed for stable networks fall short in providing optimal performance in these kinds of networks due to the highly dynamic and unstable nature of Mobile...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2012

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection

    In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states can be pruned. They present a pruning algorithm in which a threshold parameter is used...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Optimal Node Placement in Underwater Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Programming Model Support for Dependable, Elastic Cloud Applications

    An attractive approach to leveraging the ability of cloud-computing platforms to provide resources on demand is to build elastic applications, which can scale up or down based on resource requirements. To ease the development of elastic applications, it is useful for programmers to write applications with simple, inelastic semantics and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    ABHRANTA: Locating Bugs that Manifest at Large System Scales

    A key challenge in developing large scale applications (both in system size and in input size) is finding bugs that are latent at the small scales of testing, only manifesting when a program is deployed at large scales. Traditional statistical techniques fail because no error-free run is available at deployment...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2011

    Key Agreement for Wireless Networks in the Presence of Active Adversaries

    In this paper, the authors consider key agreement in a distributed wireless network in which adversarial nodes may exist in the network. Two practical scenarios are studied, i.e., path-key establishment and key pool bootstrapping. For both scenarios, previous work mainly focuses on preventing adversarial eavesdropping attacks. When the adversarial nodes...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2012

    On the Error-Prone Substructures for the Binary-Input Ternary-Output Channel and Its Corresponding Exhaustive Search Algorithm

    The error floor performance of a Low-Density ParityCheck (LDPC) code is highly related to the presence of ErrorProne Substructures (EPSs). In general, existing characterizations of the EPSs are inspired by the LDPC decoding behavior under simple binary erasure channel (BEC) and Binary Symmetric Channel (BSC) models. In this paper, the...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Joint Optimization of Relay Selection and Power Allocation in Cooperative OFDM Networks With Imperfect Channel Estimation

    The authors consider the wireless relay network in which a base station communicates with multiple subscribers, each of which has the ability to act as a relay to forward information to a base station. Here, they propose an algorithm for joint optimization of power allocation, time scheduling, and relay selection...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2010

    A Dynamic Data Middleware Cache for Rapidly-Growing Scientific Repositories

    Modern scientific repositories are growing rapidly in size. Scientists are increasingly interested in viewing the latest data as part of query results. Current scientific middleware cache systems, however, assume repositories are static. Thus, they cannot answer scientific queries with the latest data. The queries, instead, are routed to the repository...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2009

    VNsnap: Taking Snapshots of Virtual Networked Environments With Minimal Downtime

    A Virtual Networked Environment (VNE) consists of Virtual Machines (VMs) connected by a virtual network. It has been adopted to create "Virtual infrastructures" for individual users on a shared cloud computing infrastructure. The ability to take snapshots of an entire VNE - including images of the VMs with their execution,...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2010

    Capacity of 1-to-K Broadcast Packet Erasure Channels With Channel Output Feedback

    In the last decade, the new network coding concept has emerged, which focuses on achieving the capacity of a communication network. More explicitly, the network-coding-based approaches generally model each hop of a packet-based communication network by a Packet Erasure Channel (PEC) instead of the classic Gaussian channel. Such simple abstraction...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2009

    A Framework for Efficient Class-Based Sampling

    With an increasing requirement for network monitoring tools to classify traffic and track security threats, newer and efficient ways are needed for collecting traffic statistics and monitoring of network flows. However, traditional solutions based on random packet sampling treat all flows as equal and therefore, do not provide the flexibility...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Exploring the Synergy Between Link Correlation and Network Coding for Energy-Efficient Flooding in Wsns

    Flooding of messages is a fundamental operation in wireless sensor networks which requires special attention to achieve communication efficiency and reliability. The existing works are dominated by ACK/NACK based approaches which demonstrates their effectiveness in achieving efficiency and reliability. A recent work shows that the performance can be further improved...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    The TCP Outcast Problem: Exposing Unfairness in Data Center Networks

    In this paper, the authors observe that bandwidth sharing via TCP in commodity data center networks organized in multi-rooted tree topologies can lead to severe unfairness, which they term as the TCP Outcast problem, under many common traffic patterns. When many flows and a few flows arrive at two ports...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2012

    Inter-Session Network Coding Schemes for Two Unicast Sessions With Sequential Hard Deadline Constraints

    The emerging wireless media delivery services have placed greater demands for wireless networks to support high-throughput applications while minimizing the delay of individual packets. In this paper, the authors investigate using inter-session network coding to send packets wirelessly for two deadline-constrained unicast sessions. Specifically, each unicast session aims to transmit...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2010

    Spatio-Temporal Access Methods: Part 2 (2003 - 2010)

    In spatio-temporal applications, moving objects detect their locations via location-aware devices and update their locations continuously to the server. With the ubiquity and massive numbers of moving objects, many spatio-temporal access methods are developed to process user queries efficiently. Spatio-temporal access methods are classified into four categories: Indexing the past...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Placement of Applications in Computing Clouds Using Voronoi Diagrams

    The vision of millions of users launching tens of millions of applications running on millions of globally scattered servers presents a new challenge for Cloud Providers: how to assign so many virtual applications to physical servers, while meeting latency needs, improving network utilization, and satisfying availability constraints. Today's application placement...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2008

    A Framework for the Integration of Environmental and Business Aspects Toward Sustainable Product Development

    Growing environmental concerns, coupled with public pressure and stricter regulations, are fundamentally impacting the way companies design and launch new products across the world. Companies are recognizing that implementing Design for Environment (DfE) in their product development process provides opportunities both for improving environmental aspects of a product and for...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    An Access-Control Framework for WS-BPEL

    Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the WS-BPEL language. Even if WS-BPEL has been developed to specify automated business processes that orchestrate activities of multiple...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    Network Sampling Designs for Relational Classification

    Relational classification has been extensively studied recently due to its applications in social, biological, technological, and information networks. Much of the work in relational learning has focused on analyzing input data that comprise a single network. Although machine learning researchers have considered the issue of how to sample training and...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2012

    The Impact of Communication Structure and Interpersonal Dependencies on Distributed Teams

    In the past decade, the authors have witnessed an explosive growth of the Web, online communities, and social media. This has led to a substantial increase in the range and scope of electronic communication and distributed collaboration. In distributed teams, social communication is thought to be critical for creating and...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2011

    Relational Active Learning for Joint Collective Classification Models

    In many network domains, labeled data may be costly to acquire - indicating a need for relational active learning methods. Recent paper has demonstrated that relational model performance can be improved by taking network structure into account when choosing instances to label. However, in collective inference settings, both model estimation...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2007

    Improving Password Security and Memorability to Protect Personal and Organizational Information

    Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users to determine access to such information is through the use of username password combinations. However, this is a weak method of authentication...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2007

    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies

    In this paper, the authors develop a language and a reference architecture supporting the management and enforcement of authentication policies. Such language directly supports multi-factor authentication and the high level specification of authentication factors, in terms of conditions against the features of the various authentication mechanisms and modules. In addition...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2010

    Cyber-Physical Trade-Offs in Distributed Detection Networks

    The authors consider a network of sensors that measure the scalar intensity due to the background or a source combined with background, inside a two-dimensional monitoring area. The sensor measurements may be random due to the underlying nature of the source and background or due to sensor errors or both....

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Cloud Computing Infrastructure Robustness: A Game Theory Approach

    A cloud computing infrastructure typically consists of a number of sites that house servers and are connected to the Internet. Its operation critically depends both on cyber components, including servers and routers, and physical components, including fiber and power routes. Both types of components are subject to attacks of different...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2011

    Network Security for Virtual Machine in Cloud Computing

    Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on-demand resources and services over the Internet. Undoubtedly, one of the significant concerns in cloud computing is security. Virtualization is a key feature of cloud computing. In this paper, the authors focus...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Process Implanting: A New Active Introspection Framework for Virtualization

    Previous research on virtual machine introspection proposed "Out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "In-the-box" approach, it remains a challenge to obtain a complete semantic view due to the semantic gap between the guest VM and the hypervisor. In this...

    Provided By Purdue Federal Credit Union