Rutgers CMD

Displaying 1-27 of 27 results

  • White Papers // May 2014

    Opportunities in a Federated Cloud Marketplace

    Recent measurement studies show that there are massively distributed hosting and computing infrastructures deployed in the Internet. Such infrastructures include large data centers and organizations' computing clusters. When idle, these resources can readily serve local users. Such users can be Smartphone or tablet users wishing to access services such as...

    Provided By Rutgers CMD

  • White Papers // May 2014

    Building Green Cloud Services at Low Cost

    Interest in powering datacenters at least partially using on-site renewable sources, e.g. solar or wind, has been growing. In fact, researchers have studied distributed services comprising networks of such \"Green\" datacenters, and load distribution approaches that \"Follow the renewables\" to maximize their use. However, prior works have not considered where...

    Provided By Rutgers CMD

  • White Papers // Apr 2014

    Cost-Oblivious Storage Reallocation

    Databases allocate and free blocks of storage on disk. Freed blocks introduce holes where no data is stored. Allocation systems attempt to reuse such de-allocated regions in order to minimize the footprint on disk. When previously allocated blocks cannot be moved, this problem is called the memory allocation problem. It...

    Provided By Rutgers CMD

  • White Papers // Feb 2014

    Designing and Managing Datacenters Powered by Renewable Energy

    Datacenters range from small numbers of servers in machine rooms to thousands of servers housed in warehouse-size installations. Estimates for 2010 indicate that collectively datacenters consume around 1.5% of the total electricity used world-wide. This translates into high carbon emissions as most of this electricity comes from fossil fuels. On-site...

    Provided By Rutgers CMD

  • White Papers // Apr 2013

    Quantifying and Improving I/O Predictability in Virtualized Systems

    Virtualization enables the consolidation of Virtual Machines (VMs) to increase the utilization of physical servers in Infrastructure-as-a-Service (IaaS) cloud providers. However, the authors' experience shows that storage I/O performance varies wildly in the face of consolidation. Since many users may desire consistent performance, they argue that IaaS providers should offer...

    Provided By Rutgers CMD

  • White Papers // Mar 2013

    Providing Green SLAs in High Performance Computing Clouds

    Demand for clean products and services is increasing as society is becoming increasingly aware of climate change. In response, many enterprises are setting explicit sustainability goals and implementing initiatives to reduce carbon emissions. Quantification and disclosure of such goals and initiatives have become important marketing tools. As enterprises and individuals...

    Provided By Rutgers CMD

  • White Papers // Dec 2012

    Content as a Network Primitive

    The current functionality supported by OpenFlowbased Software Defined Networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Nov 2012

    CoScale: Coordinating CPU and Memory System DVFS in Server Systems

    Recent work has introduced memory system Dynamic Voltage and Frequency Scaling (DVFS), and has suggested that balanced scaling of both CPU and the memory system is the most promising approach for conserving energy in server systems. In this paper, the authors first demonstrate that CPU and memory system DVFS often...

    Provided By Rutgers CMD

  • White Papers // Oct 2012

    Cooperative Scalable Moving Continuous Query Processing

    A range of applications call for a mobile client to continuously monitor others in close proximity. Past research on such problems has covered two extremes: It has offered totally centralized solutions, where a server takes care of all queries, and totally distributed solutions, in which there is no central authority...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    In-situ Feature-based Objects Tracking for Large-Scale Scientific Simulations

    Emerging scientific simulations on leadership class systems are generating huge amounts of data. However, the increasing gap between computation and disk IO speeds makes traditional data analytics pipelines based on post-processing cost prohibitive and often infeasible. In this paper, the authors investigate an alternate approach that aims to bring the...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Low Complexity Differentiating Adaptive Erasure Codes in Multimedia Wireless Broadcast

    Based on the erasure channel FEC model as defined in multimedia wireless broadcast standards, the authors illustrate how doping mechanisms included in the design of erasure coding and decoding may improve the scalability of the packet throughput, decrease overall latency and potentially differentiate among classes of multimedia subscribers regardless of...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Mojave: A Recommendation System for Software Upgrades

    Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. The authors argue that many of these failures can be avoided for new users of each upgrade by exploiting the characteristics of the upgrade and feedback from the users that have already installed it. To demonstrate that...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Exploiting Phase-Change Memory in Cooperative Caches

    Modern servers require large main memories, which so far have been enabled by improvements in DRAM density. However, the scalability of DRAM is approaching its limit, so Phase-Change Memory (PCM) is being considered as an alternative technology. PCM is denser, more scalable, and consumes lower idle power than DRAM, while...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    VMAP: Proactive Thermal-Aware Virtual Machine Allocation in HPC Cloud Datacenters

    Clouds provide the abstraction of nearly-unlimited computing resources through the elastic use of federated resource pools (virtualized datacenters). They are being increasingly considered for HPC applications, which have traditionally targeted grids and supercomputing clusters. However, maximizing energy efficiency and utilization of cloud datacenter resources, avoiding undesired thermal hotspots (due to...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    Network Coding as a WiMAX Link Reliability Mechanism

    The authors design and implement network-coding-enabled reliability architecture for next generation wireless networks. Their Network Coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the IP layer, to ensure the fast and reliable transfer...

    Provided By Rutgers CMD

  • White Papers // May 2012

    Experiences in Mapping the Business Intelligence Model to Description Logics, and the Case for Parametric Concepts

    BIM is a new language for capturing business models containing information relevant for strategic analysis of business operations. It has been used in several large case studies and is being pursued in industry. The paper introduces the key notions of BIM, including goals, evidence, and influence. It also outlines their...

    Provided By Rutgers CMD

  • White Papers // Mar 2012

    Wireless Access Considerations for the MobilityFirst Future Internet Architecture

    In this paper, the authors present an overview of wireless access considerations behind the design of the MobilityFirst clean-slate future Internet architecture. The MobilityFirst architecture is motivated by a historic shift of the Internet from the fixed host-server model to one in which access from mobile platforms becomes the norm....

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming

    A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equipped with two antennas, which implement cooperative jamming, i.e., transmitting noise to confound Eve. The optimal structure of...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    A TLV-Structured Data Naming Scheme for Content-Oriented Networking

    Content-Oriented Networking (CON) addresses the inefficiency of IP networks in supporting content distribution, by decoupling location from identity at the network level, and retrieving a content object through its name or identifier, instead of its storage location or host IP address. A naming scheme is critical in CON designs because...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Network Coding Aware Resource Allocation to Improve Throughput

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, the understanding of resource allocation for Random Network Coding (RNC) and its impact on network throughput has been limited. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Jan 2012

    Network Coding Aware Power Control in Wireless Networks

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understanding the impact of lower layers on coding of packets at network layer to improve the...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Non-interactive Localization of Cognitive Radios Based on Dynamic Signal Strength Mapping

    The openness of the lower-layer protocol stacks in cognitive radios increases the flexibility of dynamic spectrum access and promotes spectrally-efficient communications. To ensure the effectiveness of spectrum sharing, it is desirable to locate primary users, secondary users, and unauthorized users in a non-interactive fashion based on limited measurement data at...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Comparing Alternative Approaches for Networking of Named Objects in the Future Internet

    In this paper, the authors describe and compare the alternative architectures for achieving the functional goals of name oriented networking. The CCN (Content-Centric Network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a...

    Provided By Rutgers CMD

  • White Papers // Oct 2011

    Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries

    Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, the authors consider the effects...

    Provided By Rutgers CMD

  • White Papers // Feb 2010

    Experimental Evaluation Of OpenVZ From A Testbed Deployment Perspective

    A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means of sharing testbed resources among experimenters. The degree of programmability and isolation achieved with such a setup is largely dependent on the type of technology used for virtualization....

    Provided By Rutgers CMD

  • White Papers // May 2009

    Detecting Spoofing Attacks in Mobile Wireless Environments

    The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based spoofing attacks are serious network threats as they can facilitate a variety of advanced attacks to undermine the normal operation of networks. However, the existing mechanisms can only detect spoofing attacks when the...

    Provided By Rutgers CMD

  • White Papers // Jul 2006

    Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Siemens

    In this paper, the authors report on the approach they have developed and the lessons they have learned in an implementation of the monitoring and control layer for Continuous Monitoring of Business Process Controls (CMBPC) in the US internal IT audit department of Siemens Corporation. The architecture developed by the...

    Provided By Rutgers CMD

  • White Papers // Feb 2010

    Experimental Evaluation Of OpenVZ From A Testbed Deployment Perspective

    A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means of sharing testbed resources among experimenters. The degree of programmability and isolation achieved with such a setup is largely dependent on the type of technology used for virtualization....

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    VMAP: Proactive Thermal-Aware Virtual Machine Allocation in HPC Cloud Datacenters

    Clouds provide the abstraction of nearly-unlimited computing resources through the elastic use of federated resource pools (virtualized datacenters). They are being increasingly considered for HPC applications, which have traditionally targeted grids and supercomputing clusters. However, maximizing energy efficiency and utilization of cloud datacenter resources, avoiding undesired thermal hotspots (due to...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming

    A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equipped with two antennas, which implement cooperative jamming, i.e., transmitting noise to confound Eve. The optimal structure of...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Low Complexity Differentiating Adaptive Erasure Codes in Multimedia Wireless Broadcast

    Based on the erasure channel FEC model as defined in multimedia wireless broadcast standards, the authors illustrate how doping mechanisms included in the design of erasure coding and decoding may improve the scalability of the packet throughput, decrease overall latency and potentially differentiate among classes of multimedia subscribers regardless of...

    Provided By Rutgers CMD

  • White Papers // Dec 2012

    Content as a Network Primitive

    The current functionality supported by OpenFlowbased Software Defined Networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    Network Coding as a WiMAX Link Reliability Mechanism

    The authors design and implement network-coding-enabled reliability architecture for next generation wireless networks. Their Network Coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the IP layer, to ensure the fast and reliable transfer...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Mojave: A Recommendation System for Software Upgrades

    Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. The authors argue that many of these failures can be avoided for new users of each upgrade by exploiting the characteristics of the upgrade and feedback from the users that have already installed it. To demonstrate that...

    Provided By Rutgers CMD

  • White Papers // May 2009

    Detecting Spoofing Attacks in Mobile Wireless Environments

    The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based spoofing attacks are serious network threats as they can facilitate a variety of advanced attacks to undermine the normal operation of networks. However, the existing mechanisms can only detect spoofing attacks when the...

    Provided By Rutgers CMD

  • White Papers // Mar 2012

    Wireless Access Considerations for the MobilityFirst Future Internet Architecture

    In this paper, the authors present an overview of wireless access considerations behind the design of the MobilityFirst clean-slate future Internet architecture. The MobilityFirst architecture is motivated by a historic shift of the Internet from the fixed host-server model to one in which access from mobile platforms becomes the norm....

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Comparing Alternative Approaches for Networking of Named Objects in the Future Internet

    In this paper, the authors describe and compare the alternative architectures for achieving the functional goals of name oriented networking. The CCN (Content-Centric Network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Network Coding Aware Resource Allocation to Improve Throughput

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, the understanding of resource allocation for Random Network Coding (RNC) and its impact on network throughput has been limited. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    A TLV-Structured Data Naming Scheme for Content-Oriented Networking

    Content-Oriented Networking (CON) addresses the inefficiency of IP networks in supporting content distribution, by decoupling location from identity at the network level, and retrieving a content object through its name or identifier, instead of its storage location or host IP address. A naming scheme is critical in CON designs because...

    Provided By Rutgers CMD

  • White Papers // Jan 2012

    Network Coding Aware Power Control in Wireless Networks

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understanding the impact of lower layers on coding of packets at network layer to improve the...

    Provided By Rutgers CMD

  • White Papers // Mar 2013

    Providing Green SLAs in High Performance Computing Clouds

    Demand for clean products and services is increasing as society is becoming increasingly aware of climate change. In response, many enterprises are setting explicit sustainability goals and implementing initiatives to reduce carbon emissions. Quantification and disclosure of such goals and initiatives have become important marketing tools. As enterprises and individuals...

    Provided By Rutgers CMD

  • White Papers // Oct 2012

    Cooperative Scalable Moving Continuous Query Processing

    A range of applications call for a mobile client to continuously monitor others in close proximity. Past research on such problems has covered two extremes: It has offered totally centralized solutions, where a server takes care of all queries, and totally distributed solutions, in which there is no central authority...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    In-situ Feature-based Objects Tracking for Large-Scale Scientific Simulations

    Emerging scientific simulations on leadership class systems are generating huge amounts of data. However, the increasing gap between computation and disk IO speeds makes traditional data analytics pipelines based on post-processing cost prohibitive and often infeasible. In this paper, the authors investigate an alternate approach that aims to bring the...

    Provided By Rutgers CMD

  • White Papers // Oct 2011

    Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries

    Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, the authors consider the effects...

    Provided By Rutgers CMD

  • White Papers // May 2014

    Opportunities in a Federated Cloud Marketplace

    Recent measurement studies show that there are massively distributed hosting and computing infrastructures deployed in the Internet. Such infrastructures include large data centers and organizations' computing clusters. When idle, these resources can readily serve local users. Such users can be Smartphone or tablet users wishing to access services such as...

    Provided By Rutgers CMD

  • White Papers // Apr 2014

    Cost-Oblivious Storage Reallocation

    Databases allocate and free blocks of storage on disk. Freed blocks introduce holes where no data is stored. Allocation systems attempt to reuse such de-allocated regions in order to minimize the footprint on disk. When previously allocated blocks cannot be moved, this problem is called the memory allocation problem. It...

    Provided By Rutgers CMD

  • White Papers // May 2012

    Experiences in Mapping the Business Intelligence Model to Description Logics, and the Case for Parametric Concepts

    BIM is a new language for capturing business models containing information relevant for strategic analysis of business operations. It has been used in several large case studies and is being pursued in industry. The paper introduces the key notions of BIM, including goals, evidence, and influence. It also outlines their...

    Provided By Rutgers CMD

  • White Papers // Jul 2006

    Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Siemens

    In this paper, the authors report on the approach they have developed and the lessons they have learned in an implementation of the monitoring and control layer for Continuous Monitoring of Business Process Controls (CMBPC) in the US internal IT audit department of Siemens Corporation. The architecture developed by the...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Exploiting Phase-Change Memory in Cooperative Caches

    Modern servers require large main memories, which so far have been enabled by improvements in DRAM density. However, the scalability of DRAM is approaching its limit, so Phase-Change Memory (PCM) is being considered as an alternative technology. PCM is denser, more scalable, and consumes lower idle power than DRAM, while...

    Provided By Rutgers CMD

  • White Papers // Nov 2012

    CoScale: Coordinating CPU and Memory System DVFS in Server Systems

    Recent work has introduced memory system Dynamic Voltage and Frequency Scaling (DVFS), and has suggested that balanced scaling of both CPU and the memory system is the most promising approach for conserving energy in server systems. In this paper, the authors first demonstrate that CPU and memory system DVFS often...

    Provided By Rutgers CMD

  • White Papers // May 2014

    Building Green Cloud Services at Low Cost

    Interest in powering datacenters at least partially using on-site renewable sources, e.g. solar or wind, has been growing. In fact, researchers have studied distributed services comprising networks of such \"Green\" datacenters, and load distribution approaches that \"Follow the renewables\" to maximize their use. However, prior works have not considered where...

    Provided By Rutgers CMD

  • White Papers // Apr 2013

    Quantifying and Improving I/O Predictability in Virtualized Systems

    Virtualization enables the consolidation of Virtual Machines (VMs) to increase the utilization of physical servers in Infrastructure-as-a-Service (IaaS) cloud providers. However, the authors' experience shows that storage I/O performance varies wildly in the face of consolidation. Since many users may desire consistent performance, they argue that IaaS providers should offer...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Non-interactive Localization of Cognitive Radios Based on Dynamic Signal Strength Mapping

    The openness of the lower-layer protocol stacks in cognitive radios increases the flexibility of dynamic spectrum access and promotes spectrally-efficient communications. To ensure the effectiveness of spectrum sharing, it is desirable to locate primary users, secondary users, and unauthorized users in a non-interactive fashion based on limited measurement data at...

    Provided By Rutgers CMD

  • White Papers // Feb 2014

    Designing and Managing Datacenters Powered by Renewable Energy

    Datacenters range from small numbers of servers in machine rooms to thousands of servers housed in warehouse-size installations. Estimates for 2010 indicate that collectively datacenters consume around 1.5% of the total electricity used world-wide. This translates into high carbon emissions as most of this electricity comes from fossil fuels. On-site...

    Provided By Rutgers CMD