Rensselaer at Hartford

Displaying 1-18 of 18 results

  • White Papers // Sep 2013

    Content-Preserving Graphics

    Visualization is a common method used to communicate information about underlying data. It requires prudent editorializing and appropriate abstractions to produce a meaningful and compelling result. And, to be most effective, visual designers and analysts should understand the context in which their visual message will be observed, understood, and used....

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    Throughput Modelling and Fairness Issues in CSMA/CA Based Ad-Hoc Networks

    In this paper, the authors consider the throughput modelling and fairness provisioning in CSMA/CA based ad-hoc networks. The main contributions are: Firstly, a throughput model based on Markovian analysis is proposed for the CSMA/CA network with a general topology. Simulation investigations are presented to verify its performance. Secondly, fairness issues...

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    Distributed Authentication Mechanism for Mobile IP Route Optimization

    Mobile IP protocol provides a scalable indirection mechanism allowing the mobile hosts to maintain network layer connectivity across mobility. This leads to 'Triangle' or 'Indirect' routing towards the mobile host. To ameliorate this routing inefficiency, Route Optimization has been proposed. One of the open issues in Mobile IP Route Optimization...

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    A Secure Programming Paradigm for Network Virtualization

    The central paradigm of today's successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm limits network management and control capabilities, and creates opportunities for attacks such as worms, viruses, and spam, that often seriously disrupt and degrade Internet...

    Provided By Rensselaer at Hartford

  • White Papers // Nov 2012

    Collision Detection in IEEE 802.11 Networks by Error Vector Magnitude Analysis

    There are two causes of packet losses during a wireless transmission: losses caused by collisions and losses caused by poor channel conditions. The throughput and spatial reuse of IEEE 802.11 based wireless networks, as well as the effectiveness of the rate adaptation algorithms they use, is adversely affected by their...

    Provided By Rensselaer at Hartford

  • White Papers // Sep 2012

    Elastic Scalable Cloud Computing Using Application-Level Migration

    The authors present the Cloud Operating System (COS), a middleware framework to support autonomous workload elasticity and scalability based on application-level migration as a reconfiguration strategy. While other scalable frameworks (e.g., MapReduce or Google App Engine) force application developers to write programs following specific APIs, COS provides scalability in a...

    Provided By Rensselaer at Hartford

  • White Papers // May 2012

    Multi-Channel Data Communication Through Thick Metallic Barriers

    This paper explores the use of multiple communication channels to transmit data at high rates, without physical penetrations, through thick metallic barriers using ultrasound. Two parallel acoustic-electric channels are formed in close proximity utilizing two pairs of coaxially aligned piezoelectric transducers mounted on, and acoustically coupled to, opposing sides of...

    Provided By Rensselaer at Hartford

  • White Papers // Feb 2012

    Inter-Domain Traffic Engineering as Bi-Level Network Flow Optimization

    The existing routing architecture of the Internet follows a two-level model, which are commonly referred to as intra-domain and inter-domain routing. Routing at the intra-domain level often employs proactive approaches focusing on reliability and quality. In this paper, the authors study the inter-domain traffic engineering problem with the perspective of...

    Provided By Rensselaer at Hartford

  • White Papers // Sep 2011

    Impact of Cloud Computing Virtualization Strategies on Workloads' Performance

    Cloud computing brings significant benefits for service providers and users because of its characteristics: e.g., on demand, pay for use, scalable computing. Virtualization management is a critical task to accomplish effective sharing of physical resources and scalability. Existing research focuses on live Virtual Machine (VM) migration as a workload consolidation...

    Provided By Rensselaer at Hartford

  • White Papers // Jul 2011

    Strategic Pricing in Next-Hop Routing with Elastic Demands

    The authors consider a model of next-hop routing by self-interested agents. In this model, nodes in a graph (representing ISPs, Autonomous Systems, etc.) make pricing decisions of how much to charge for forwarding traffic from each of their upstream neighbors, and routing decisions of which downstream neighbors to forward traffic...

    Provided By Rensselaer at Hartford

  • White Papers // Mar 2011

    Dynamic Channel Assignment and Power Allocation in Multichannel Wireless Networks with Per-User Bandwidth Guarantees

    The authors address the joint channel assignment and power allocation question in a multichannel wireless (access point) network where channel states differ across channels as well as users, and vary with time. Their goal is to obtain channel assignment and power allocation solutions that can dynamically adapt to changing channel...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2010

    Capacity Allocation Games for Network-Coded Multicast Streaming

    In this paper, the authors formulate and study a capacity allocation game between a set of receivers (players) that are interested in receiving multicast data (video/multimedia) being streamed from a server through a multi-hop network. They consider fractional multicast streaming, where the multicast stream from the source (origin-server) to any...

    Provided By Rensselaer at Hartford

  • White Papers // Oct 2010

    Support for Virtual Machine Malleability in Cloud Computing Using Migratable Components

    Cloud computing is an emerging distributed computing paradigm that promises to offer cost-effective scalable on-demand services to users, without the need for large up-front infrastructure investments. A key enabling technology for cloud computing is virtualization. With virtualization, service providers can ensure isolation of multiple user workloads, provision resources in a...

    Provided By Rensselaer at Hartford

  • White Papers // Nov 2009

    Multiple Description Coding and Practical Network Coding for Video Multicast

    Multiple description codes have been shown to facilitate heterogeneous multicast using routing with replication. The authors develop the concept of combining practical network coding and multiple description coding, as introduced by Chou et al., for video multicast in lossless networks where users get video according to their available resources. They...

    Provided By Rensselaer at Hartford

  • White Papers // Oct 2009

    Scalable Peer-to-Peer Video Streaming in WiMAX Networks

    The increasing popularity and success of web-based Peer-To-Peer (P2P) systems for streaming video applications make them likely candidates for injecting large volumes of traffic in the emerging WiMAX networks. This paper develops a lightweight mechanism for P2P streaming in WiMAX networks that significantly reduces the load on the network and...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Use of Parity Checks Inherent in LDPC Codes for Dominant Error Events Detection and K-Constraint Enforcement

    In this paper, the authors propose to leverage the simple and explicit parity checks inherent in Low-Density Parity-Check (LDPC) codes to realize dominant error events detection without code rate penalty. This is enabled by enforcing a very weak constraint on LDPC code parity check matrix structure. Such a constraint can...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Area-Efficient Min-Sum Decoder Design for High-Rate QC-LDPC Codes in Magnetic Recording

    This paper presents a silicon area efficient QuasiCyclic (QC) Low-Density Parity-Check (LDPC) code decoder design solution, which is geared to magnetic recording that demands high code rate and very high decoding throughput under stringent silicon cost constraint. The key of this proposed design solution is to transform the conventional formulation...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Video Multicast using Network Coding

    The authors investigate the problem of video multicast in lossy networks using network coding and multiple description codes. The rate allocation for multiple descriptions can be optimized at the source to generate a scalable video bit-stream such that the expected PSNR of the video at the receivers is maximized. They...

    Provided By Rensselaer at Hartford

  • White Papers // Sep 2012

    Elastic Scalable Cloud Computing Using Application-Level Migration

    The authors present the Cloud Operating System (COS), a middleware framework to support autonomous workload elasticity and scalability based on application-level migration as a reconfiguration strategy. While other scalable frameworks (e.g., MapReduce or Google App Engine) force application developers to write programs following specific APIs, COS provides scalability in a...

    Provided By Rensselaer at Hartford

  • White Papers // Nov 2012

    Collision Detection in IEEE 802.11 Networks by Error Vector Magnitude Analysis

    There are two causes of packet losses during a wireless transmission: losses caused by collisions and losses caused by poor channel conditions. The throughput and spatial reuse of IEEE 802.11 based wireless networks, as well as the effectiveness of the rate adaptation algorithms they use, is adversely affected by their...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Use of Parity Checks Inherent in LDPC Codes for Dominant Error Events Detection and K-Constraint Enforcement

    In this paper, the authors propose to leverage the simple and explicit parity checks inherent in Low-Density Parity-Check (LDPC) codes to realize dominant error events detection without code rate penalty. This is enabled by enforcing a very weak constraint on LDPC code parity check matrix structure. Such a constraint can...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Area-Efficient Min-Sum Decoder Design for High-Rate QC-LDPC Codes in Magnetic Recording

    This paper presents a silicon area efficient QuasiCyclic (QC) Low-Density Parity-Check (LDPC) code decoder design solution, which is geared to magnetic recording that demands high code rate and very high decoding throughput under stringent silicon cost constraint. The key of this proposed design solution is to transform the conventional formulation...

    Provided By Rensselaer at Hartford

  • White Papers // Jul 2011

    Strategic Pricing in Next-Hop Routing with Elastic Demands

    The authors consider a model of next-hop routing by self-interested agents. In this model, nodes in a graph (representing ISPs, Autonomous Systems, etc.) make pricing decisions of how much to charge for forwarding traffic from each of their upstream neighbors, and routing decisions of which downstream neighbors to forward traffic...

    Provided By Rensselaer at Hartford

  • White Papers // Feb 2012

    Inter-Domain Traffic Engineering as Bi-Level Network Flow Optimization

    The existing routing architecture of the Internet follows a two-level model, which are commonly referred to as intra-domain and inter-domain routing. Routing at the intra-domain level often employs proactive approaches focusing on reliability and quality. In this paper, the authors study the inter-domain traffic engineering problem with the perspective of...

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    Throughput Modelling and Fairness Issues in CSMA/CA Based Ad-Hoc Networks

    In this paper, the authors consider the throughput modelling and fairness provisioning in CSMA/CA based ad-hoc networks. The main contributions are: Firstly, a throughput model based on Markovian analysis is proposed for the CSMA/CA network with a general topology. Simulation investigations are presented to verify its performance. Secondly, fairness issues...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2010

    Capacity Allocation Games for Network-Coded Multicast Streaming

    In this paper, the authors formulate and study a capacity allocation game between a set of receivers (players) that are interested in receiving multicast data (video/multimedia) being streamed from a server through a multi-hop network. They consider fractional multicast streaming, where the multicast stream from the source (origin-server) to any...

    Provided By Rensselaer at Hartford

  • White Papers // Mar 2011

    Dynamic Channel Assignment and Power Allocation in Multichannel Wireless Networks with Per-User Bandwidth Guarantees

    The authors address the joint channel assignment and power allocation question in a multichannel wireless (access point) network where channel states differ across channels as well as users, and vary with time. Their goal is to obtain channel assignment and power allocation solutions that can dynamically adapt to changing channel...

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    Distributed Authentication Mechanism for Mobile IP Route Optimization

    Mobile IP protocol provides a scalable indirection mechanism allowing the mobile hosts to maintain network layer connectivity across mobility. This leads to 'Triangle' or 'Indirect' routing towards the mobile host. To ameliorate this routing inefficiency, Route Optimization has been proposed. One of the open issues in Mobile IP Route Optimization...

    Provided By Rensselaer at Hartford

  • White Papers // Oct 2009

    Scalable Peer-to-Peer Video Streaming in WiMAX Networks

    The increasing popularity and success of web-based Peer-To-Peer (P2P) systems for streaming video applications make them likely candidates for injecting large volumes of traffic in the emerging WiMAX networks. This paper develops a lightweight mechanism for P2P streaming in WiMAX networks that significantly reduces the load on the network and...

    Provided By Rensselaer at Hartford

  • White Papers // Dec 2008

    Video Multicast using Network Coding

    The authors investigate the problem of video multicast in lossy networks using network coding and multiple description codes. The rate allocation for multiple descriptions can be optimized at the source to generate a scalable video bit-stream such that the expected PSNR of the video at the receivers is maximized. They...

    Provided By Rensselaer at Hartford

  • White Papers // Nov 2009

    Multiple Description Coding and Practical Network Coding for Video Multicast

    Multiple description codes have been shown to facilitate heterogeneous multicast using routing with replication. The authors develop the concept of combining practical network coding and multiple description coding, as introduced by Chou et al., for video multicast in lossless networks where users get video according to their available resources. They...

    Provided By Rensselaer at Hartford

  • White Papers // Sep 2011

    Impact of Cloud Computing Virtualization Strategies on Workloads' Performance

    Cloud computing brings significant benefits for service providers and users because of its characteristics: e.g., on demand, pay for use, scalable computing. Virtualization management is a critical task to accomplish effective sharing of physical resources and scalability. Existing research focuses on live Virtual Machine (VM) migration as a workload consolidation...

    Provided By Rensselaer at Hartford

  • White Papers // Jan 2013

    A Secure Programming Paradigm for Network Virtualization

    The central paradigm of today's successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm limits network management and control capabilities, and creates opportunities for attacks such as worms, viruses, and spam, that often seriously disrupt and degrade Internet...

    Provided By Rensselaer at Hartford

  • White Papers // Oct 2010

    Support for Virtual Machine Malleability in Cloud Computing Using Migratable Components

    Cloud computing is an emerging distributed computing paradigm that promises to offer cost-effective scalable on-demand services to users, without the need for large up-front infrastructure investments. A key enabling technology for cloud computing is virtualization. With virtualization, service providers can ensure isolation of multiple user workloads, provision resources in a...

    Provided By Rensselaer at Hartford

  • White Papers // Sep 2013

    Content-Preserving Graphics

    Visualization is a common method used to communicate information about underlying data. It requires prudent editorializing and appropriate abstractions to produce a meaningful and compelling result. And, to be most effective, visual designers and analysts should understand the context in which their visual message will be observed, understood, and used....

    Provided By Rensselaer at Hartford

  • White Papers // May 2012

    Multi-Channel Data Communication Through Thick Metallic Barriers

    This paper explores the use of multiple communication channels to transmit data at high rates, without physical penetrations, through thick metallic barriers using ultrasound. Two parallel acoustic-electric channels are formed in close proximity utilizing two pairs of coaxially aligned piezoelectric transducers mounted on, and acoustically coupled to, opposing sides of...

    Provided By Rensselaer at Hartford