Purdue Federal Credit Union

Displaying 1-40 of 104 results

  • White Papers // Jan 2015

    The Strategic Formation of Multi-Layer Networks

    The authors study the strategic formation of multi-layer networks, where each layer represents a different type of relationship between the nodes in the network and is designed to maximize some utility that depends on the topology of that layer and those of the other layers. They start by generalizing distance-based...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Effective Management of DRAM Bandwidth in Multicore Processors

    The two technology trends of increasing transistors per die and limited power budgets have driven every major processor vendor to multicore architectures. Technology trends are leading to increasing number of cores on chip. All these cores inherently share the DRAM bandwidth. The on-chip cache resources are limited and in many...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core

    In a Virtual Machine (VM) consolidation environment, it has been observed that CPU sharing among multiple VMs will lead to I/O processing latency because of the CPU access latency experienced by each VM. In this paper, the authors present vTurbo, a system that accelerates I/O processing for VMs by offloading...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2013

    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids

    A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in real time. In this paper, the authors optimize operator profits for the different cases of load curtailment,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

    Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Secure Information Sharing in Digital Supply Chains

    Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each partner in a supply chain uses data, generates data and shares data with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

    Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Outsourcing Privacy-Preserving Social Networks to a Cloud

    In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, the authors identify a novel type of privacy attack, termed 1-neighborhood attack. They assume that...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking

    Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solved by combining the modalities of sensor and cyber networks. The sensor network provides information about physical space activities, such as the locations...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation

    In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the players that maximize their respective minimum payoffs with a time-decayed metric. They also show how the defender can use deception as...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    High Accuracy Attack Provenance Via Binary-Based Execution Partition

    An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by analyzing audit log. However, the presence of long running programs makes a live process receiving a large volume of...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks

    Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly designed for stable networks fall short in providing optimal performance in these kinds of networks due to the highly dynamic and unstable nature of Mobile...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2012

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection

    In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states can be pruned. They present a pruning algorithm in which a threshold parameter is used...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2009

    Polymorphing Software by Randomizing Data Structure Layout

    In this paper the authors introduce a new software polymorphism technique that randomizes program data structure layout. This technique will generate different data structure layouts for a program and thus diversify the binary code compiled from the same program source code. This technique can mitigate attacks (e.g., kernel rootkit attacks)...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core

    In a Virtual Machine (VM) consolidation environment, it has been observed that CPU sharing among multiple VMs will lead to I/O processing latency because of the CPU access latency experienced by each VM. In this paper, the authors present vTurbo, a system that accelerates I/O processing for VMs by offloading...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2007

    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies

    In this paper, the authors develop a language and a reference architecture supporting the management and enforcement of authentication policies. Such language directly supports multi-factor authentication and the high level specification of authentication factors, in terms of conditions against the features of the various authentication mechanisms and modules. In addition...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2007

    Improving Password Security and Memorability to Protect Personal and Organizational Information

    Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method for authenticating users to determine access to such information is through the use of username password combinations. However, this is a weak method of authentication...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    An Access-Control Framework for WS-BPEL

    Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been proposed for specifying and orchestrating business processes, resulting in the WS-BPEL language. Even if WS-BPEL has been developed to specify automated business processes that orchestrate activities of multiple...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2011

    Tensioned Metastable Fluid Detectors in Nuclear Security for Passively Monitoring of Special Nuclear Materials-Part A

    In this paper, the authors describe the transformational Tensioned Metastable Fluid Detector (TMFD) based method for \"Passive\" detection of Special Nuclear Materials (SNMs) as related to nuclear security. Purdue University is developing novel, multi-purpose tension metastable fluid nuclear particle detectors by which multiple types of nuclear particles can be detected...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2011

    Tensioned Metastable Fluid Detectors in Nuclear Security for Active Interrogation of Special Nuclear Materials-Part B

    In this paper, the authors addresses active interrogation for detecting Special Nuclear Materials (SN- Ms) and includes description of the transformational Tensioned Metastable Fluid Detector (TMFD) based method for optimal monitoring. One of the greatest difficulties in detection of SNMs by active interrogation is the task of distinguishing between the...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2010

    Providing Scalable Data Services in Ubiquitous Networks

    Topology is a fundamental part of a network that governs connectivity between nodes, the amount of data flow and the efficiency of data flow between nodes. In traditional networks, due to physical limitations, topology remains static for the course of the network operation. Ubiquitous Data Networks (UDNs), alternatively, are more...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2012

    Composable Reliability for Asynchronous Systems

    Distributed systems designs often employ replication to solve two different kinds of availability problems. First, to prevent the loss of data through the permanent destruction or disconnection of a distributed node, and second, to allow prompt retrieval of data when some distributed nodes respond slowly. For simplicity, many systems further...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2011

    Relational Active Learning for Joint Collective Classification Models

    In many network domains, labeled data may be costly to acquire - indicating a need for relational active learning methods. Recent paper has demonstrated that relational model performance can be improved by taking network structure into account when choosing instances to label. However, in collective inference settings, both model estimation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2012

    Towards A Practical and Effective BGP Defense System

    At the center of the Internet, major ISPs use the Border Gateway Protocol (BGP) to propagate information about Internet destinations and how to reach them. Despite decades of research, BGP problems still exist. In particular, the Internet has a long history of hijacking incidents in which an ISP uses BGP...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    Network Sampling Designs for Relational Classification

    Relational classification has been extensively studied recently due to its applications in social, biological, technological, and information networks. Much of the work in relational learning has focused on analyzing input data that comprise a single network. Although machine learning researchers have considered the issue of how to sample training and...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2012

    The Impact of Communication Structure and Interpersonal Dependencies on Distributed Teams

    In the past decade, the authors have witnessed an explosive growth of the Web, online communities, and social media. This has led to a substantial increase in the range and scope of electronic communication and distributed collaboration. In distributed teams, social communication is thought to be critical for creating and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2007

    A Survey of Malware Detection Techniques

    Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting worse. Malware detectors are the primary tools in defense against malware. The quality of such a detector is determined by the techniques it uses. It is therefore imperative that the authors paper malware detection techniques and...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2011

    Memory Energy Management for an Enterprise Decision Support System

    Energy efficiency is an important factor in designing and configuring enterprise servers. In these servers, memory may consume 40% of the total system power. Different memory configurations (sizes, numbers of ranks, speeds, etc.) can have significant impacts on the performance and energy consumption of enterprise workloads. Many of these workloads,...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2008

    Analyzing the Effectiveness of Multicore Scheduling Using Performance Counters

    In this paper, the authors analyze the impact of scheduling decisions on dynamic task performance. Performance behavior is analyzed utilizing support workloads from SPECWeb 2005 on a multicore hardware platform with an Apache web server. Hardware performance counter data is collected via extending the Linux scheduler and analysis is then...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2009

    The Salvage Cache: A Fault-Tolerant Cache Architecture for Next-Generation Memory Technologies

    There has been much work on the next generation of memory technologies such as MRAM, RRAM and PRAM. Most of these are non-volatile in nature, and compared to SRAM, they are often denser, just as fast, and have much lower energy consumption. Using 3-D stacking technology, it has been proposed...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Effective Management of DRAM Bandwidth in Multicore Processors

    The two technology trends of increasing transistors per die and limited power budgets have driven every major processor vendor to multicore architectures. Technology trends are leading to increasing number of cores on chip. All these cores inherently share the DRAM bandwidth. The on-chip cache resources are limited and in many...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2015

    The Strategic Formation of Multi-Layer Networks

    The authors study the strategic formation of multi-layer networks, where each layer represents a different type of relationship between the nodes in the network and is designed to maximize some utility that depends on the topology of that layer and those of the other layers. They start by generalizing distance-based...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Programming Model Support for Dependable, Elastic Cloud Applications

    An attractive approach to leveraging the ability of cloud-computing platforms to provide resources on demand is to build elastic applications, which can scale up or down based on resource requirements. To ease the development of elastic applications, it is useful for programmers to write applications with simple, inelastic semantics and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    ABHRANTA: Locating Bugs that Manifest at Large System Scales

    A key challenge in developing large scale applications (both in system size and in input size) is finding bugs that are latent at the small scales of testing, only manifesting when a program is deployed at large scales. Traditional statistical techniques fail because no error-free run is available at deployment...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Optimal Node Placement in Underwater Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2009

    Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation

    Reputation systems represent a key technology for securing distributed applications from misuse by dishonest entities. A reputation system computes reputation scores of the entities in the system, which helps single out those that are exhibiting less than desirable behavior. Examples of reputation systems may be found in several application domains:...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    On Hashing Graphs

    Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-systems. Use of graph-structured data models are on the rise - in graph databases, representation of biological and healthcare data as well as in modeling systems for representing system topologies. Therefore, the problem of hashing graphs with...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Exercises for Graduate Students Using GENI

    GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. The authors propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, they focus on an exercise to study congestion control and reliability...

    Provided By Purdue Federal Credit Union