Rochester Institute of Technology

Displaying 1-16 of 16 results

  • White Papers // Aug 2011

    A Modern Study of Bluetooth Wireless Technology

    A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. This paper, the research contributions in this arena are brought together, to give an overview of the state-of-the-art. Simply stated,...

    Provided By Rochester Institute of Technology

  • White Papers // Dec 2010

    A Distributed Scheduler for Airborne Backbone Networks With Directional Antennas

    Airborne backbone networks are useful in tactical applications to interconnect sub-networks. A major challenge in such networks, normally comprising large numbers of highly mobile nodes, is the design of the Medium Access Control (MAC) and routing protocols. The authors propose integration of MAC and routing functions, which use the attributes...

    Provided By Rochester Institute of Technology

  • White Papers // Oct 2010

    FPGA-Based, Multi-Processor HW-SW System for Single-Chip Crypto Applications

    This paper discusses design and analysis of an FPGA-based system containing two isolated, Altera Nios II softcore processors that share data through two custom cryptoengines. FPGA-based Single-Chip Cryptographic (SCC) techniques were employed to ensure full red/black separation. Each crypto-engine is a hardware implementation of the Advanced Encryption Standard (AES), operating...

    Provided By Rochester Institute of Technology

  • White Papers // Sep 2010

    Reeling In Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management

    One of today's most important developing wireless technologies is Cognitive Radio (CR). In the authors' current fixed-assignment spectrum management policy, much of the available frequencies go unused. CR aims to make use of this unutilized space to provide wireless broadband services. This paper aims to give a background to CR...

    Provided By Rochester Institute of Technology

  • White Papers // Aug 2010

    Single Block Attacks and Statistical Tests on CubeHash

    The authors have reported an attack on the CubeHash one-way hash function that finds a second pre-image consisting of a single message block. The attack requires minimal memory and was implemented as a massively parallel Java program running on a hybrid parallel computer. The attack requires less time than brute...

    Provided By Rochester Institute of Technology

  • White Papers // Jun 2010

    Stationary and Mobile Target Detection Using Mobile Wireless Sensor Networks

    In this paper, the authors study the target detection and tracking problem in mobile sensor networks, where the performance metrics of interest are probability of detection and tracking coverage, when the target can be stationary or mobile and its duration is finite. They propose a physical coverage-based mobility model, where...

    Provided By Rochester Institute of Technology

  • White Papers // May 2010

    Cube Test Analysis of the Statistical Behavior of CubeHash and Skein

    This paper analyzes the statistical properties of the SHA-3 candidate cryptographic hash algorithms CubeHash and Skein to try to find nonrandom behavior. Cube tests were used to probe each algorithm's internal polynomial structure for a large number of choices of the polynomial input variables. The cube test data were calculated...

    Provided By Rochester Institute of Technology

  • White Papers // Apr 2010

    Distributed Tries for Load Balancing in Peer-to-Peer Systems

    In structured peer-to-peer (p2p) systems, Distributed Hash Tables (DHTs) often partition the ID space into disjoint intervals with each interval assigned to the corresponding node. While nodes join and leave dynamically, one of the hard challenges posed by DHTs is load balancing across the ID space. Tries are known to...

    Provided By Rochester Institute of Technology

  • White Papers // Mar 2010

    More Than Models: The Data Mining Team

    Gathering data from various sources, preparing it for modeling, imputing, partitioning, testing various models, choosing the best, presenting it to one's boss, then failure? Data mining is about more than just variables and models. Developing an understanding of each variable may take more than just running some summary statistics and...

    Provided By Rochester Institute of Technology

  • White Papers // Feb 2010

    Real-Time Fusion and Projection of Network Intrusion Activity

    Intrusion Detection Systems (IDS) warn of suspicious or malicious network activity and are a fundamental, yet passive, defense-in-depth layer for modern networks. Prior research has applied information fusion techniques to correlate the alerts of multiple IDSs and group those belonging to the same multi-stage attack into attack tracks. Projecting the...

    Provided By Rochester Institute of Technology

  • White Papers // Feb 2010

    Bridging Practice and Research: Secure Data Management in the Classroom

    In recent years, information security and assurance has received considerable attention from the computing community, with universities revamping course offerings in areas such as cryptography, network security, enterprise systems security, secure coding, and digital forensics. Although secure data management is a major aspect of overall information systems security, it has...

    Provided By Rochester Institute of Technology

  • White Papers // Jan 2010

    Power-Aware Scheduling of Virtual Machines in DVFS-Enabled Clusters

    Modern high-end computing can provide high performance computing solutions for scientific and engineering applications. However, today's high performance computers consume tremendous amounts of energy. For example, a 360-Tflops supercomputer (such as IBM Blue Gene/L) with conventional processors requires 20 MW to operate, which is approximately equal to the sum of...

    Provided By Rochester Institute of Technology

  • White Papers // Nov 2009

    Cyberaide Virtual Appliance: On-Demand Deploying Middleware for Cyberinfrastructure

    Cyberinfrastructure offers a vision of advanced knowledge infrastructure for research and education. It integrates diverse resources across geographically distributed resources and human communities. Cyberaide is a service oriented architecture and abstraction framework that integrates a large number of available commodity libraries and allows users to access cyberinfrastructure through Web 2.0...

    Provided By Rochester Institute of Technology

  • White Papers // Oct 2009

    Towards Thermal Aware Workload Scheduling in a Data Center

    High density blade servers are a popular technology for data centers, however, the heat dissipation density of data centers increases exponentially. There is strong evidence to support that high temperature of such data centers will lead to higher hardware failure rates and thus an increase in maintenance costs. Improperly designed...

    Provided By Rochester Institute of Technology

  • White Papers // Sep 2009

    3G Migration in Pakistan

    The telecommunication industry in Pakistan has come a long way since the country's independence in 1947. The initial era could be fairly termed as the PTCL (Pakistan Telecommunication Company Limited) monopoly, for it was the sole provider of all telecommunication services across the country. It was not until four decades...

    Provided By Rochester Institute of Technology

  • White Papers // Jul 2009

    Cyberaide Creative: On-Demand Cyberinfrastructure Provision in Clouds

    As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to these resources also increases. Until recently the use of computing resources was limited to those with exceptional knowledge of the system design and configuration. With the advent of grid middleware projects...

    Provided By Rochester Institute of Technology

  • White Papers // Jul 2009

    Cyberaide Creative: On-Demand Cyberinfrastructure Provision in Clouds

    As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to these resources also increases. Until recently the use of computing resources was limited to those with exceptional knowledge of the system design and configuration. With the advent of grid middleware projects...

    Provided By Rochester Institute of Technology

  • White Papers // Sep 2009

    3G Migration in Pakistan

    The telecommunication industry in Pakistan has come a long way since the country's independence in 1947. The initial era could be fairly termed as the PTCL (Pakistan Telecommunication Company Limited) monopoly, for it was the sole provider of all telecommunication services across the country. It was not until four decades...

    Provided By Rochester Institute of Technology

  • White Papers // Feb 2010

    Real-Time Fusion and Projection of Network Intrusion Activity

    Intrusion Detection Systems (IDS) warn of suspicious or malicious network activity and are a fundamental, yet passive, defense-in-depth layer for modern networks. Prior research has applied information fusion techniques to correlate the alerts of multiple IDSs and group those belonging to the same multi-stage attack into attack tracks. Projecting the...

    Provided By Rochester Institute of Technology

  • White Papers // Mar 2010

    More Than Models: The Data Mining Team

    Gathering data from various sources, preparing it for modeling, imputing, partitioning, testing various models, choosing the best, presenting it to one's boss, then failure? Data mining is about more than just variables and models. Developing an understanding of each variable may take more than just running some summary statistics and...

    Provided By Rochester Institute of Technology

  • White Papers // Nov 2009

    Cyberaide Virtual Appliance: On-Demand Deploying Middleware for Cyberinfrastructure

    Cyberinfrastructure offers a vision of advanced knowledge infrastructure for research and education. It integrates diverse resources across geographically distributed resources and human communities. Cyberaide is a service oriented architecture and abstraction framework that integrates a large number of available commodity libraries and allows users to access cyberinfrastructure through Web 2.0...

    Provided By Rochester Institute of Technology

  • White Papers // Oct 2009

    Towards Thermal Aware Workload Scheduling in a Data Center

    High density blade servers are a popular technology for data centers, however, the heat dissipation density of data centers increases exponentially. There is strong evidence to support that high temperature of such data centers will lead to higher hardware failure rates and thus an increase in maintenance costs. Improperly designed...

    Provided By Rochester Institute of Technology

  • White Papers // Feb 2010

    Bridging Practice and Research: Secure Data Management in the Classroom

    In recent years, information security and assurance has received considerable attention from the computing community, with universities revamping course offerings in areas such as cryptography, network security, enterprise systems security, secure coding, and digital forensics. Although secure data management is a major aspect of overall information systems security, it has...

    Provided By Rochester Institute of Technology

  • White Papers // Sep 2010

    Reeling In Cognitive Radio: The Issues of Regulations and Policies Affecting Spectrum Management

    One of today's most important developing wireless technologies is Cognitive Radio (CR). In the authors' current fixed-assignment spectrum management policy, much of the available frequencies go unused. CR aims to make use of this unutilized space to provide wireless broadband services. This paper aims to give a background to CR...

    Provided By Rochester Institute of Technology

  • White Papers // May 2010

    Cube Test Analysis of the Statistical Behavior of CubeHash and Skein

    This paper analyzes the statistical properties of the SHA-3 candidate cryptographic hash algorithms CubeHash and Skein to try to find nonrandom behavior. Cube tests were used to probe each algorithm's internal polynomial structure for a large number of choices of the polynomial input variables. The cube test data were calculated...

    Provided By Rochester Institute of Technology

  • White Papers // Aug 2010

    Single Block Attacks and Statistical Tests on CubeHash

    The authors have reported an attack on the CubeHash one-way hash function that finds a second pre-image consisting of a single message block. The attack requires minimal memory and was implemented as a massively parallel Java program running on a hybrid parallel computer. The attack requires less time than brute...

    Provided By Rochester Institute of Technology

  • White Papers // Oct 2010

    FPGA-Based, Multi-Processor HW-SW System for Single-Chip Crypto Applications

    This paper discusses design and analysis of an FPGA-based system containing two isolated, Altera Nios II softcore processors that share data through two custom cryptoengines. FPGA-based Single-Chip Cryptographic (SCC) techniques were employed to ensure full red/black separation. Each crypto-engine is a hardware implementation of the Advanced Encryption Standard (AES), operating...

    Provided By Rochester Institute of Technology

  • White Papers // Jan 2010

    Power-Aware Scheduling of Virtual Machines in DVFS-Enabled Clusters

    Modern high-end computing can provide high performance computing solutions for scientific and engineering applications. However, today's high performance computers consume tremendous amounts of energy. For example, a 360-Tflops supercomputer (such as IBM Blue Gene/L) with conventional processors requires 20 MW to operate, which is approximately equal to the sum of...

    Provided By Rochester Institute of Technology

  • White Papers // Aug 2011

    A Modern Study of Bluetooth Wireless Technology

    A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. This paper, the research contributions in this arena are brought together, to give an overview of the state-of-the-art. Simply stated,...

    Provided By Rochester Institute of Technology

  • White Papers // Dec 2010

    A Distributed Scheduler for Airborne Backbone Networks With Directional Antennas

    Airborne backbone networks are useful in tactical applications to interconnect sub-networks. A major challenge in such networks, normally comprising large numbers of highly mobile nodes, is the design of the Medium Access Control (MAC) and routing protocols. The authors propose integration of MAC and routing functions, which use the attributes...

    Provided By Rochester Institute of Technology

  • White Papers // Apr 2010

    Distributed Tries for Load Balancing in Peer-to-Peer Systems

    In structured peer-to-peer (p2p) systems, Distributed Hash Tables (DHTs) often partition the ID space into disjoint intervals with each interval assigned to the corresponding node. While nodes join and leave dynamically, one of the hard challenges posed by DHTs is load balancing across the ID space. Tries are known to...

    Provided By Rochester Institute of Technology

  • White Papers // Jun 2010

    Stationary and Mobile Target Detection Using Mobile Wireless Sensor Networks

    In this paper, the authors study the target detection and tracking problem in mobile sensor networks, where the performance metrics of interest are probability of detection and tracking coverage, when the target can be stationary or mobile and its duration is finite. They propose a physical coverage-based mobility model, where...

    Provided By Rochester Institute of Technology