Reed Business Information

Displaying 1-40 of 329 results

  • White Papers // May 2014

    Adaptive Preshuffling in Hadoop Clusters

    MapReduce has become an important distributed processing model for large-scale data-intensive applications like data mining and web indexing. Hadoop - an open-source implementation of MapReduce is widely used for short jobs requiring low response time. In this paper, the authors proposed a new preshuffling strategy in Hadoop to reduce high...

    Provided By Reed Business Information

  • White Papers // Apr 2014

    Optimal Sequential Wireless Relay Placement on a Random Lattice Path

    The authors' paper is motivated by impromptu (or \"As-you-go\") deployment of wireless relay nodes along a path, a need that arises in many situations. In this paper, the path is modeled as starting at the origin (where there is the data sink, e.g., the control center), and evolving randomly over...

    Provided By Reed Business Information

  • White Papers // Feb 2014

    Terahertz Band: Next Frontier for Wireless Communications

    In this paper, the authors provide an in-depth view of Terahertz band (0.1 - 10THz) communication, which is envisioned as a key technology to satisfy the increasing demand for higher speed wireless communication. THz band communication will alleviate the spectrum scarcity and capacity limitations of current wireless systems, and enable...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    A Survey of Intrusion Detection in Wireless Network Applications

    Information systems are becoming more integrated into the people lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless means. In order to identify gaps and propose research directions in wireless network...

    Provided By Reed Business Information

  • White Papers // Jan 2014

    EnhancedBit: Unleashing the Potential of the Unchoking Policy in the BitTorrent Protocol

    In this paper, the authors propose a modification to the BitTorrent protocol related to its peer unchoking policy. In particular, they apply a novel optimistic unchoking approach that improves the quality of inter-connections amongst peers, i.e., increases the number of directly-connected and interested-in-cooperation peers without penalizing underutilized and/or idle peers....

    Provided By Reed Business Information

  • White Papers // Dec 2013

    Resilience Articulation Point (RAP): Cross-Layer Dependability Modeling for Nanometer System-on-Chip Resilience

    The Resilience Articulation Point (RAP) model aims at provisioning researchers and developers with a probabilistic fault abstraction and error propagation framework covering all hardware/software layers of a System-on-Chip (SoC). RAP assumes that physically induced faults at the technology or CMOS device layer will eventually manifest themselves as a single or...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Unified Reliability Estimation and Management of NoC Based Chip Multiprocessors

    The authors present a new architecture level unified reliability evaluation methodology for Chip Multi-Processors (CMPs). The proposed Reliability ESTimation (REST) is based on a Monte Carlo algorithm. What distinguishes REST from the previous work is that both the computational and communication components are considered in a unified manner to compute...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    LTE-Advanced and the Evolution to Beyond 4G (B4G) Systems

    Cellular networks have been undergoing an extraordinarily fast evolution in the past years. With commercial deployments of Release 8 (Rel-8) Long Term Evolution (LTE) already being carried out worldwide, a significant effort is being put forth by the research and standardization communities on the development and specification of LTE-advanced. The...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Tibidabo: Making the Case for an ARM-Based HPC System

    It is widely accepted that future HPC systems will be limited by their power consumption. Current HPC systems are built from commodity server processors, designed over years to achieve maximum performance, with energy efficiency being an after-thought. In this paper, the authors advocate a different approach: building HPC systems from...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    Design Configuration Selection for Hard-Error Reliable Processors Via Statistical Rules

    Lifetime reliability is becoming a first-order concern in processor manufacturing in addition to conventional design goals including performance, power consumption and thermal features since semiconductor technology enters the deep submicron era. This paper requires computer architects to carefully examine each design option and evaluate its reliability, in order to prolong...

    Provided By Reed Business Information

  • White Papers // Nov 2013

    A Two-Phase Design Space Exploration Strategy for System-Level Real-Time Application Mapping Onto MPSoC

    In this paper, the authors present a two-phase Design Space Exploration (DSE) approach to address the problem of real-time application mapping on a flexible MPSoC platform. Their approach is composed of two independent phases - analytical estimation/pruning and system simulation - communicating via a well-defined interface. The strength of the...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Demand-Based Schedulability Analysis for Real-Time Multi-Core Scheduling

    In real-time systems, schedulability analysis has been widely studied to provide offline guarantees on temporal correctness, producing many analysis methods. The demand-based schedulability analysis method has a great potential for high schedulability performance and broad applicability. However, such a potential is not yet fully realized for real-time multi-core scheduling mainly...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard

    A Radio Frequency IDentification (RFID) system is a contactless automatic identification system that uses small and low-cost tags. RFID systems communicate with the tags attached to the objects using radio frequency waves. The major problem with RFID systems is security problem because the communication between RFID components is wireless. In...

    Provided By Reed Business Information

  • White Papers // Oct 2013

    The COMPLEX Methodology for UML/MARTE Modeling and Design Space Exploration of Embedded Systems

    The design of embedded systems is in a highly competitive context. The translation of an efficient design into a successful product highly depends on becoming the first product in the market with new complex functionalities fulfilling tight performance constraints, and at an affordable price. In this paper, the task of...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Onion Routing Circuit Construction Via Latency Graphs

    The use of anonymity-based infrastructures and anonymisers is a plausible solution to mitigate privacy problems on the Internet. Tor (short for the onion router) is a popular low-latency anonymity system that can be installed as an end-user application on a wide range of operating systems to redirect the traffic through...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    DeSyRe: On-Demand System Reliability

    The DeSyRe project builds on-demand adaptive and reliable Systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for fault tolerance. To make matters worse, power density is becoming a significant limiting factor in SoC design, in general. In the face...

    Provided By Reed Business Information

  • White Papers // Sep 2013

    Multi-Objective Scheduling of Many Tasks in Cloud Platforms

    The scheduling of a many-task workflow in a distributed computing platform is a well known NP-hard problem. The problem is even more complex and challenging when the virtualized clusters are used to execute a large number of tasks in a cloud computing platform. The difficulty lies in satisfying multiple objectives...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A Survey on Vehicular Cloud Computing

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks

    To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an Authentication and Key Agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for Fourth-Generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    Online Scheduling and Placement of Hardware Tasks With Multiple Variants on Dynamically Reconfigurable Field-Programmable Gate Arrays

    Hardware task scheduling and placement at runtime plays a crucial role in achieving better system performance by exploring dynamically reconfigurable Field-Programmable Gate Arrays (FPGAs). Although a number of online algorithms have been proposed in the literature, no strategy has been engaged in efficient usage of reconfigurable resources by orchestrating multiple...

    Provided By Reed Business Information

  • White Papers // Aug 2013

    A System-Level Approach to Adaptivity and Fault-Tolerance in NoC-Based MPSoCs: The MADNESS Project

    Modern embedded systems increasingly require adaptive run-time management of available resources. One method for supporting adaptively is to implement run-time application mapping. The system may adapt the mapping of the applications in order to accommodate the current workload conditions, to balance the computing load for efficient resource utilization, to meet...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Analysis of the Impact of Spatial and Temporal Variations on the Stability of SRAM Arrays and the Mitigation Technique Using Independent-Gate Devices

    As planar MOSFET is approaching its physical scaling limits, FinFET becomes one of the most promising alternative structures to keep on the industry scaling-down trend for future technology generations of 22nm and beyond. In this paper, the authors investigate the influence of NBTI degradation induced variation and random process variations...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    A Unified Execution Model for Multiple Computation Models of Streaming Applications on a Composable MPSoC

    In this paper, the authors propose a unified model of execution that aims to fill the abstraction level gap between the primitives of models of computation and the ones of an MPSoC. This paper targets a composable MPSoC platform and supports the sequential, Kahn process networks, and dataflow models. Their...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Compiling Scilab to High Performance Embedded Multicore Systems

    Efficient, flexible, and high performance chips are needed. Many performance-critical applications (e.g. digital video processing, telecoms, and security applications) that need to process huge amounts of data in a short time would benefit from these attributes. The mapping process of high performance embedded applications to today's Multi-Processor System-on-Chip (MPSoC) devices...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Efficient Multi-Keyword Ranked Query Over Encrypted Data in Cloud Computing

    Cloud computing infrastructure is a promising new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy become major concerns when data owners outsource their private data onto public cloud servers that are not within their trusted management domains. To avoid information...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    An Integrated, Programming Model-Driven Framework for NoC-QoS Support in Cluster-Based Embedded Many-Cores

    Embedded SoC designs are embracing the many-core paradigm to deliver the required performance to run an ever-increasing number of applications in parallel. Networks-on-Chip (NoC) are considered as a convenient technology to implement many-core embedded platforms. The complex and non-uniform nature of the traffic flows generated when multiple parallel applications are...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    Privacy-Preserving Smart Metering with Multiple Data Consumers

    The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about the habits of the users can be inferred. This paper...

    Provided By Reed Business Information

  • White Papers // Jul 2013

    OpenMOLE, a Workflow Engine Specifically Tailored for the Distributed Exploration of Simulation Models

    Complex-systems describe multiple levels of collective structure and organization. In such systems, the emergence of global behavior from local interactions is generally studied through large scale experiments on numerical models. This analysis generates important computation loads which require the use of multi-core servers, clusters or grid computing. Dealing with such...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Thermal Aware Overall Energy Minimization Scheduling for Hardreal-Time Systems

    As the semiconductor technology proceeds into the deep sub-micron era, the leakage and its dependency with the temperature become critical in dealing with power/energy minimization problems. In this paper, the authors study the problem on how to schedule a hard real-time system to achieve the minimal overall energy, including both...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Efficient Multicast Schemes for 3-D Networks-on-Chip

    3-D Network-on-Chips (NoCs) have been proposed as a potent solution to address both the interconnection and design complexity problems facing future System-on-Chip (SoC) designs. In this paper, two topology-aware multicast routing algorithms, Multicasting XYZ (MXYZ) and ALternative XYZ (AL + XYZ) algorithms in supporting of 3-D NoC are proposed. In...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Controlling a Complete Hardware Synthesis Toolchain With LARA Aspects

    The synthesis and mapping of applications to configurable embedded systems is a notoriously complex process. Design-flows typically include tools that have a wide range of parameters which interact in very unpredictable ways, thus creating a large and complex design space. When exploring this space, designers must manage the interfaces between...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Exploiting Domain Knowledge in System-Level MPSoC Design Space Exploration

    System-level Design Space Exploration (DSE), which is performed early in the design process, is of eminent importance to the design of complex multi-processor embedded multimedia systems. During system-level DSE, system parameters like, e.g., the number and type of processors, and the mapping of application tasks to architectural resources, are considered....

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Limited Carry-In Technique for Real-Time Multi-Core Scheduling

    Schedulability analysis has been widely studied to provide offline timing guarantees for a set of real-time tasks. The so-called limited carry-in technique, which can be orthogonally incorporated into many different multi-core schedulability analysis methods, was originally introduced for Earliest Deadline First (EDF) scheduling to derive a tighter bound on the...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Energy-Aware Simulation with DVFS

    In recent years, research has been conducted in the area of large systems models, especially distributed systems, to analyze and understand their behavior. Simulators are now commonly used in this area and are becoming more complex. Most of them provide frameworks for simulating application scheduling in various grid infrastructures, others...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    Avoiding Request - Request Type Message-Dependent Deadlocks in Networks-on-Chips

    When an application is running on a Network-on-Chip (NoC)-based Multi-Processor System-on-Chip (MPSoC), two types of deadlocks may occur: the routing-dependent deadlocks and the message-dependent deadlocks. The former type of deadlocks can be avoided by removing any cyclic paths on the application's channel dependency graph. The message dependent deadlocks, caused by...

    Provided By Reed Business Information

  • White Papers // Jun 2013

    A Novel Batch-Based Group Key Management Protocol Applied to the Internet of Things

    Many applications for ad hoc networks are based on a point-to-multipoint (multicast) communication paradigm, where a single source sends common data to many receivers, or, inversely, on a multipoint-to-point communication paradigm, where multiple sources send data to a single receiver. In such scenarios, communication can be secured by adopting a...

    Provided By Reed Business Information

  • White Papers // May 2013

    ARTE: An Application-Specific Run-Time ManagEment Framework for Multi-Cores Based on Queuing Models

    In this paper, the authors present an Application-specific Run-Time managEment (ARTE) framework to tackle the problem of managing computational resources in an application specific multi-core system. The ARTE framework run-time goal is to minimize applications' response times while meeting the applications' computational demands and fitting within the available power budget....

    Provided By Reed Business Information

  • White Papers // May 2013

    Two-Level Caches Tuning Technique for Energy Consumption in Reconfigurable Embedded MPSoC

    In order to meet the ever-increasing computing requirement in the embedded market, multiprocessor chips were proposed as the best way out. In this paper, the authors investigate the energy consumption in these embedded MPSoC systems. One of the efficient solutions to reduce the energy consumption is to reconfigure the cache...

    Provided By Reed Business Information

  • White Papers // May 2013

    Optimizing Two-Dimensional DMA Transfers for Scratchpad Based MPSoCs Platforms

    Reducing the effects of off-chip memory access latency is a key factor in exploiting efficiently embedded multi-core platforms. The authors consider architectures that admit a multi-core computation fabric, having its own fast and small memory to which the data blocks to be processed are fetched from external memory using a...

    Provided By Reed Business Information

  • White Papers // May 2013

    DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability

    Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...

    Provided By Reed Business Information

  • White Papers // Nov 2004

    New Shade of Federalism

    In recent years, sustainable design has become a primary component of design excellence in GSA projects. Since 2003, the GSA has required all its buildings to receive certification (or, better still, a Silver rating) through the U.S. Green Building Council's LEED green-building rating program. This article describes how the Federal...

    Provided By Reed Business Information

  • White Papers // Apr 2004

    Drugs And Alcohol: Testing Issues

    There was also a pre-existing policy of having a drug and alcohol-free workplace. John Dawes, project manager health standards for RailCorp says the recent regulation and legislation had been long anticipated. "The legislation means employees can now be tested after they have started work as well, and one can also...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Managing Is Knowing Your People

    Conaty ran HR for GE under Jack Welch. He says Welch knew the top 600 people intimately. He knew their families, their hobbies, their preferences, their strengths and their weaknesses. That is an incredibly high number; but Conaty assures it is accurate and it is that incredible dedication to knowing...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Sustaining Through Succession

    Management-succession planning requires contemplation of one's own mortality which is unpleasant, leading to many business owners choosing to do very little formal planning when it actually comes to selecting and grooming successors, says Deloitte tax partner, Craig Holland. Executing an effective succession strategy can take, on average, between three and...

    Provided By Reed Business Information

  • White Papers // Jun 2010

    The Returns On Engagement

    Talent management describes a wide range of activities, and not all positive. Most employers have already frozen or restrained hiring and many have downsized their workforce. While both are at times necessary, it is the contention that the largest opportunity for corporate performance improvement lies in engaging the workforce to...

    Provided By Reed Business Information

  • White Papers // Sep 2008

    Secrets Of Senior Management Buy-In

    When considering the implementation of a HR management system, the topic of senior management buy-in often raises its head. This is common not only in situations where a company is changing a software system but also where any fundamental change in company practice is involved. As such, the theories and...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Channel Model and Analysis for Wireless Underground Sensor Networks in Soil Medium

    Wireless Underground Sensor Networks (WUSNs) constitute one of the promising application areas of the recently developed wireless sensor networking techniques. The main difference between WUSNs and the terrestrial wireless sensor networks is the communication medium. The propagation characteristics of ElectroMagnetic (EM) waves in soil and the significant differences between propagation...

    Provided By Reed Business Information

  • White Papers // Feb 2010

    How Secure Is the Next Generation of IP-Based Emergency Services Architecture?

    For some location based applications, such as emergency calling or roadside assistance, it appears that the identity of the requester is less important than accurate and trustworthy location information for accomplishing the main function. Accurate and genuine location is important for these applications to avoid misuse. In this paper, the...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    A Robust Optimisation Model and Cutting Planes for the Planning of Energy-Efficient Wireless Networks

    In this paper, the authors present an optimization model for the energy-efficient planning of future wireless networks. By applying robust optimisation, they extend this model to a robust formulation which considers demand uncertainties. The computability of the resulting model is moderate. Hence, they apply three different cutting plane approaches for...

    Provided By Reed Business Information

  • White Papers // May 2012

    Physical-Layer Network Coding: Tutorial, Survey, and Beyond

    The concept of Physical-layer Network Coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of network coding with wide implications. The basic idea of PNC is to exploit the mixing of signals that occurs naturally when ElectroMagnetic (EM) waves are...

    Provided By Reed Business Information

  • White Papers // Nov 2009

    Common Control Channel Design for Cognitive Radio Wireless Ad Hoc Networks Using Adaptive Frequency Hopping

    Cognitive Radio (CR) technology enables the opportunistic use of the portions of the licensed spectrum by the CR users, while ensuring low interference to the Primary User (PU) activity in the licensed bands. The spectrum is sensed locally by the CR users, and a specific channel that is acceptable to...

    Provided By Reed Business Information

  • White Papers // Oct 2010

    Analytical Modeling of TCP Flow in Wireless LANs

    TCP (Transmission Control Protocol) is one of the protocols which are widely used in Internet environments. This paper presents an analytical model developed using the Stochastic Reward Net (SRN) modeling technique for the TCP flow behavior in WLANs. The purpose of developing an analytical model is the evaluation of stationary...

    Provided By Reed Business Information

  • White Papers // Aug 2010

    A Fluid Queue Modulated by Two Independent Birth - Death Processes

    The authors present a fluid queue model driven by two independent finite state birth - death processes with the objective to study the buffer occupancy distribution in any intermediate node in a communication network. In a communication network, at any node, the arrival and service of the packets are with...

    Provided By Reed Business Information

  • White Papers // Nov 2010

    Data Obfuscation With Network Coding

    Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this paper, the authors investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared...

    Provided By Reed Business Information

  • White Papers // Sep 2011

    An Efficient IP Address Lookup Algorithm Based on a Small Balanced Tree Using Entry Reduction

    Due to a tremendous increase in internet traffic, backbone routers must have the capability to forward massive incoming packets at several gigabits per second. IP address lookup is one of the most challenging tasks for high-speed packet forwarding. Some high-end routers have been implemented with hardware parallelism using Ternary Content...

    Provided By Reed Business Information

  • White Papers // Apr 2010

    A Content-Guided Publish/subscribe Mechanism for Sensor Networks Without Location Information

    The publish/subscribe paradigm represents a large class of applications in sensor networks as sensors are designed mainly to detect and notify upon events of interests. Thus, it is important to design a publish/subscribe mechanism to enable such applications. Many existing solutions require that the sensor node locations be known, which...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Generating Trusted Graphs for Trust Evaluation in Online Social Networks

    The authors propose a novel trust framework to address the issue of ''Can Alice trust Bob on a service?'' in large Online Social Networks (OSNs). Many models have been proposed for constructing and calculating trust. However, two common shortcomings make them less practical, especially in large OSNs: the information used...

    Provided By Reed Business Information

  • White Papers // Feb 2012

    Fine Grained Load Balancing in Multi-Hop Wireless Networks

    In this paper, the authors address the problem of local balancing in multi-hop wireless networks. They introduce the notion of proactive routing: after a short pre-processing phase in which nodes build their routing tables by exchanging messages with neighbors, they require that nodes decide the relay of each message without...

    Provided By Reed Business Information

  • White Papers // Jan 2011

    Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs) contextual information such as the information regarding whether, when, and where the data is collected cannot be protected using only traditional measures (e.g., encryption). Contextual information can be protected against global eavesdroppers by periodic packet transmission combined with dummy traffic filtering at proxy nodes. In...

    Provided By Reed Business Information

  • White Papers // Dec 2009

    Prolonging Network Lifetime With Multi-Domain Cooperation Strategies in Wireless Sensor Networks

    In wireless sensor networks nodes forward the data they acquire from the environment towards the base station by relaying through multiple intermediate sensor nodes used as relays. If multiple sensor networks are deployed in close proximity then they can help each others' data forwarding so that all parties involved in...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    Interference Mitigation for Cognitive Radio MIMO Systems Based on Practical Precoding

    In this paper, the authors propose two subspace-projection-based precoding schemes, namely, Full-Projection (FP)- and Partial-Projection (PP)-based precoding, for a Cognitive Radio Multiple-Input Multiple-Output (CR-MIMO) network to mitigate its interference to a primary Time-Division-Duplexing (TDD) system. The proposed precoding schemes are capable of estimating interference channels between CR and primary networks,...

    Provided By Reed Business Information

  • White Papers // Sep 2009

    Analysis of Network Processing Workloads

    Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality in the data path. Modern routers not only forward packets, but also process headers and payloads to implement a variety of functions related to security, performance, and customization. It is important...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    On the Need for a Reputation System in Mobile Phone Based Sensing

    The continual advancement in semiconductor technology has enabled vendors to integrate an increasing number of sensors, e.g., accelerometer, gyroscope, digital compass, high resolution cameras and others, in modern mobile phones. Combining with the ever expanding market penetration of mobile phones, the onboard sensors are driving the sensing community towards a...

    Provided By Reed Business Information

  • White Papers // Oct 2011

    Analysis of the Information Storage Capability of VANET for Highway and City Traffic

    Vehicles in VANET can form wireless ad hoc mesh networks (VMeshes) that are mobile, constantly changing both in size and the geographic area they cover. The authors focus on how the VMeshes can be used to capture and retain certain transient information on the road within a given region of...

    Provided By Reed Business Information

  • White Papers // Feb 2010

    A Low-Cost Memory Remapping Scheme for Address Bus Protection

    The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to leakage of proprietary algorithms or critical information such as encryption keys. Addresses can be observed by side-channel attacks mounted on remote servers that run sensitive programs but are...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Bottlenecks and Stability in Networks With Contending Nodes

    This paper considers a class of queueing network models where nodes have to contend with each other to serve their customers. In each time slot, a node with a non-empty queue either serves a customer or is blocked by a node in its vicinity. The focus of the authors' study...

    Provided By Reed Business Information

  • White Papers // Jun 2010

    Accelerating the Reduction to Upper Hessenberg, Tridiagonal, and Bidiagonal Forms Through Hybrid GPU-Based Computing

    The authors present a Hessenberg Reduction (HR) algorithm for hybrid systems of homogeneous multicore with GPU accelerators that can exceed 25 the performance of the corresponding LAPACK algorithm running on current homogeneous multicores. This enormous acceleration is due to proper matching of algorithmic requirements to architectural strengths of the system's...

    Provided By Reed Business Information

  • White Papers // Feb 2012

    XBRL and open data for global financial ecosystems: A linked data approach

    Information professionals performing business activity related investigative analysis must routinely associate data from a diverse range of Web based general-interest business and financial information sources. XBRL has become an integral part of the financial data landscape. At the same time, Open Data initiatives have contributed relevant financial, economic, and business...

    Provided By Reed Business Information

  • White Papers // Mar 2012

    Analysis of Power Saving With Continuous Connectivity

    Always-on mobile users need high bandwidth channels with negligible access delay and limited power consumption. Such a continuous connectivity mode requires the management of high-speed channels, which can turn into substantial operational costs (i.e., power consumption rate) even in presence of low traffic, unless a power saving mechanism is enforced....

    Provided By Reed Business Information

  • White Papers // Apr 2012

    Analysis of Power Saving and Its Impact on Web Traffic in Cellular Networks With Continuous Connectivity

    In this paper, the authors analyze the power saving and its impact on web traffic performance when customers adopt the continuous connectivity paradigm. To this end, they provide a model for packet transmission and cost. They model each mobile user's traffic with a realistic web traffic profile, and study the...

    Provided By Reed Business Information

  • White Papers // May 2010

    A Co-Commitment Based Secure Data Collection Scheme for Tiered Wireless Sensor Networks

    Tiered Wireless Sensor Networks (WSNs) have many advantages over traditional WSNs. However, they are vulnerable to security attacks, especially the attacks to the storage nodes that buffer and process the data readings from sensors. In this paper, the authors propose a secure data collection protocol SDC to support time-based queries...

    Provided By Reed Business Information

  • White Papers // Jun 2012

    Early Cloud Experiences With the Kepler Scientific Workflow System

    With the increasing popularity of the Cloud computing, there are more and more requirements for scientific workflows to utilize Cloud resources. In this paper, the authors present their preliminary work and experiences on enabling the interaction between the Kepler scientific workflow system and the Amazon Elastic Compute Cloud (EC2). A...

    Provided By Reed Business Information

  • White Papers // Dec 2011

    Regression-Based Resource Provisioning for Session Slowdown Guarantee in Multi-Tier Internet Servers

    Autonomous management of a multi-tier Internet service involves two critical and challenging tasks, one understanding its dynamic behaviors when subjected to dynamic workloads and second adaptive management of its resources to achieve performance guarantees. The authors propose a statistical machine learning based approach to achieve session slowdown guarantees of a...

    Provided By Reed Business Information

  • White Papers // Sep 2012

    VMPlanner: Optimizing Virtual Machine Placement and Traffic Flow Routing to Reduce Network Power Costs in Cloud Data Centers

    In recent years, the power costs of cloud data centers have become a practical concern and have attracted significant attention from both industry and academia. Most of the early works on data center energy efficiency have focused on the biggest power consumers (i.e., computer servers and cooling systems), yet without...

    Provided By Reed Business Information

  • White Papers // Apr 2012

    An Integrated System Based on Wireless Sensor Networks for Patient Monitoring, Localization and Tracking

    This paper describes the system LAURA which provides patient localization, tracking and monitoring services within nursing institutes through a wireless sensor network. The system is composed of three functional blocks: a localization and tracking engine which performs localization out of samples of the received signal strength and tracking through a...

    Provided By Reed Business Information

  • White Papers // Sep 2011

    An Integrated Sparsity and Model-Based Probabilistic Framework for Estimating the Spatial Variations of Communication Channels

    In the past few years, the sensor network revolution has created the possibility of exploring and controlling the environment in ways not possible before. The vision of a multi-agent robotic network cooperatively learning and adapting in harsh unknown environments to achieve a common goal is closer than ever. A mobile...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    Delay-Sensitive and Multimedia Communication in Cognitive Radio Sensor Networks

    Multimedia and delay-sensitive data applications in Cognitive Radio Sensor Networks (CRSN) require efficient real-time communication and Dynamic Spectrum Access (DSA) capabilities. This requirement poses emerging problems to be addressed in inherently resource-constrained sensor networks, and needs investigation of CRSN challenges with real-time communication requirements. In this paper, the main design...

    Provided By Reed Business Information

  • White Papers // Feb 2011

    On Coverage Issues in Directional Sensor Networks: A Survey

    The coverage optimization problem has been examined thoroughly for omni-directional sensor networks in the past decades. However, the coverage problem in Directional Sensor Networks (DSN) has newly taken attraction, especially with the increasing number of Wireless Multimedia Sensor Network (WMSN) applications. Directional sensor nodes equipped with ultrasound, infrared, and video...

    Provided By Reed Business Information

  • White Papers // Oct 2012

    Energy Monitoring in Residential Spaces With Audio Sensor Nodes: TinyEARS

    Awareness on how and where energy is consumed is being increasingly recognized as the key to prevent waste in next-generation smart buildings. However, while several solutions exist to monitor energy consumption patterns for commercial and industrial users, energy reporting systems currently available to residential users require time-consuming and intrusive installation...

    Provided By Reed Business Information

  • White Papers // Apr 2010

    Optimal Physical Carrier Sense in Wireless Networks

    The authors investigate the problem of maximizing Medium Access Control (MAC) throughput in Carrier Sense Multiple Access (CSMA) wireless networks. By explicitly incorporating the carrier sense threshold and the transmit power into their analysis, they derive an analytical relation between MAC throughput and system parameters. In homogeneous networks, they derive...

    Provided By Reed Business Information