Rutgers CMD

Displaying 1-19 of 19 results

  • White Papers // Mar 2013

    Providing Green SLAs in High Performance Computing Clouds

    Demand for clean products and services is increasing as society is becoming increasingly aware of climate change. In response, many enterprises are setting explicit sustainability goals and implementing initiatives to reduce carbon emissions. Quantification and disclosure of such goals and initiatives have become important marketing tools. As enterprises and individuals...

    Provided By Rutgers CMD

  • White Papers // Dec 2012

    Content as a Network Primitive

    The current functionality supported by OpenFlowbased Software Defined Networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Oct 2012

    Cooperative Scalable Moving Continuous Query Processing

    A range of applications call for a mobile client to continuously monitor others in close proximity. Past research on such problems has covered two extremes: It has offered totally centralized solutions, where a server takes care of all queries, and totally distributed solutions, in which there is no central authority...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Low Complexity Differentiating Adaptive Erasure Codes in Multimedia Wireless Broadcast

    Based on the erasure channel FEC model as defined in multimedia wireless broadcast standards, the authors illustrate how doping mechanisms included in the design of erasure coding and decoding may improve the scalability of the packet throughput, decrease overall latency and potentially differentiate among classes of multimedia subscribers regardless of...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Mojave: A Recommendation System for Software Upgrades

    Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. The authors argue that many of these failures can be avoided for new users of each upgrade by exploiting the characteristics of the upgrade and feedback from the users that have already installed it. To demonstrate that...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    VMAP: Proactive Thermal-Aware Virtual Machine Allocation in HPC Cloud Datacenters

    Clouds provide the abstraction of nearly-unlimited computing resources through the elastic use of federated resource pools (virtualized datacenters). They are being increasingly considered for HPC applications, which have traditionally targeted grids and supercomputing clusters. However, maximizing energy efficiency and utilization of cloud datacenter resources, avoiding undesired thermal hotspots (due to...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    Network Coding as a WiMAX Link Reliability Mechanism

    The authors design and implement network-coding-enabled reliability architecture for next generation wireless networks. Their Network Coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the IP layer, to ensure the fast and reliable transfer...

    Provided By Rutgers CMD

  • White Papers // May 2012

    Experiences in Mapping the Business Intelligence Model to Description Logics, and the Case for Parametric Concepts

    BIM is a new language for capturing business models containing information relevant for strategic analysis of business operations. It has been used in several large case studies and is being pursued in industry. The paper introduces the key notions of BIM, including goals, evidence, and influence. It also outlines their...

    Provided By Rutgers CMD

  • White Papers // Mar 2012

    Wireless Access Considerations for the MobilityFirst Future Internet Architecture

    In this paper, the authors present an overview of wireless access considerations behind the design of the MobilityFirst clean-slate future Internet architecture. The MobilityFirst architecture is motivated by a historic shift of the Internet from the fixed host-server model to one in which access from mobile platforms becomes the norm....

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming

    A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equipped with two antennas, which implement cooperative jamming, i.e., transmitting noise to confound Eve. The optimal structure of...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    A TLV-Structured Data Naming Scheme for Content-Oriented Networking

    Content-Oriented Networking (CON) addresses the inefficiency of IP networks in supporting content distribution, by decoupling location from identity at the network level, and retrieving a content object through its name or identifier, instead of its storage location or host IP address. A naming scheme is critical in CON designs because...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Network Coding Aware Resource Allocation to Improve Throughput

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, the understanding of resource allocation for Random Network Coding (RNC) and its impact on network throughput has been limited. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Jan 2012

    Network Coding Aware Power Control in Wireless Networks

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understanding the impact of lower layers on coding of packets at network layer to improve the...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Non-interactive Localization of Cognitive Radios Based on Dynamic Signal Strength Mapping

    The openness of the lower-layer protocol stacks in cognitive radios increases the flexibility of dynamic spectrum access and promotes spectrally-efficient communications. To ensure the effectiveness of spectrum sharing, it is desirable to locate primary users, secondary users, and unauthorized users in a non-interactive fashion based on limited measurement data at...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Comparing Alternative Approaches for Networking of Named Objects in the Future Internet

    In this paper, the authors describe and compare the alternative architectures for achieving the functional goals of name oriented networking. The CCN (Content-Centric Network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a...

    Provided By Rutgers CMD

  • White Papers // Oct 2011

    Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries

    Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, the authors consider the effects...

    Provided By Rutgers CMD

  • White Papers // Feb 2010

    Experimental Evaluation Of OpenVZ From A Testbed Deployment Perspective

    A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means of sharing testbed resources among experimenters. The degree of programmability and isolation achieved with such a setup is largely dependent on the type of technology used for virtualization....

    Provided By Rutgers CMD

  • White Papers // May 2009

    Detecting Spoofing Attacks in Mobile Wireless Environments

    The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based spoofing attacks are serious network threats as they can facilitate a variety of advanced attacks to undermine the normal operation of networks. However, the existing mechanisms can only detect spoofing attacks when the...

    Provided By Rutgers CMD

  • White Papers // Jul 2006

    Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Siemens

    In this paper, the authors report on the approach they have developed and the lessons they have learned in an implementation of the monitoring and control layer for Continuous Monitoring of Business Process Controls (CMBPC) in the US internal IT audit department of Siemens Corporation. The architecture developed by the...

    Provided By Rutgers CMD

  • White Papers // Oct 2012

    Cooperative Scalable Moving Continuous Query Processing

    A range of applications call for a mobile client to continuously monitor others in close proximity. Past research on such problems has covered two extremes: It has offered totally centralized solutions, where a server takes care of all queries, and totally distributed solutions, in which there is no central authority...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Mojave: A Recommendation System for Software Upgrades

    Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. The authors argue that many of these failures can be avoided for new users of each upgrade by exploiting the characteristics of the upgrade and feedback from the users that have already installed it. To demonstrate that...

    Provided By Rutgers CMD

  • White Papers // May 2009

    Detecting Spoofing Attacks in Mobile Wireless Environments

    The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based spoofing attacks are serious network threats as they can facilitate a variety of advanced attacks to undermine the normal operation of networks. However, the existing mechanisms can only detect spoofing attacks when the...

    Provided By Rutgers CMD

  • White Papers // Mar 2012

    Wireless Access Considerations for the MobilityFirst Future Internet Architecture

    In this paper, the authors present an overview of wireless access considerations behind the design of the MobilityFirst clean-slate future Internet architecture. The MobilityFirst architecture is motivated by a historic shift of the Internet from the fixed host-server model to one in which access from mobile platforms becomes the norm....

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Comparing Alternative Approaches for Networking of Named Objects in the Future Internet

    In this paper, the authors describe and compare the alternative architectures for achieving the functional goals of name oriented networking. The CCN (Content-Centric Network) scheme proposed by Van Jacobson is contrasted with hybrid name and address based routing proposed in conjunction with the MobilityFirst (MF) future Internet architecture. In a...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Network Coding Aware Resource Allocation to Improve Throughput

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, the understanding of resource allocation for Random Network Coding (RNC) and its impact on network throughput has been limited. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    A TLV-Structured Data Naming Scheme for Content-Oriented Networking

    Content-Oriented Networking (CON) addresses the inefficiency of IP networks in supporting content distribution, by decoupling location from identity at the network level, and retrieving a content object through its name or identifier, instead of its storage location or host IP address. A naming scheme is critical in CON designs because...

    Provided By Rutgers CMD

  • White Papers // Jan 2012

    Network Coding Aware Power Control in Wireless Networks

    In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understanding the impact of lower layers on coding of packets at network layer to improve the...

    Provided By Rutgers CMD

  • White Papers // Feb 2010

    Experimental Evaluation Of OpenVZ From A Testbed Deployment Perspective

    A scalable approach to building large scale experimentation testbeds involves multiplexing the system resources for better utilization. Virtualization provides a convenient means of sharing testbed resources among experimenters. The degree of programmability and isolation achieved with such a setup is largely dependent on the type of technology used for virtualization....

    Provided By Rutgers CMD

  • White Papers // Jul 2006

    Continuous Monitoring of Business Process Controls: A Pilot Implementation of a Continuous Auditing System at Siemens

    In this paper, the authors report on the approach they have developed and the lessons they have learned in an implementation of the monitoring and control layer for Continuous Monitoring of Business Process Controls (CMBPC) in the US internal IT audit department of Siemens Corporation. The architecture developed by the...

    Provided By Rutgers CMD

  • White Papers // May 2012

    Experiences in Mapping the Business Intelligence Model to Description Logics, and the Case for Parametric Concepts

    BIM is a new language for capturing business models containing information relevant for strategic analysis of business operations. It has been used in several large case studies and is being pursued in industry. The paper introduces the key notions of BIM, including goals, evidence, and influence. It also outlines their...

    Provided By Rutgers CMD

  • White Papers // Oct 2011

    Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries

    Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, the authors consider the effects...

    Provided By Rutgers CMD

  • White Papers // Dec 2011

    Non-interactive Localization of Cognitive Radios Based on Dynamic Signal Strength Mapping

    The openness of the lower-layer protocol stacks in cognitive radios increases the flexibility of dynamic spectrum access and promotes spectrally-efficient communications. To ensure the effectiveness of spectrum sharing, it is desirable to locate primary users, secondary users, and unauthorized users in a non-interactive fashion based on limited measurement data at...

    Provided By Rutgers CMD

  • White Papers // Mar 2013

    Providing Green SLAs in High Performance Computing Clouds

    Demand for clean products and services is increasing as society is becoming increasingly aware of climate change. In response, many enterprises are setting explicit sustainability goals and implementing initiatives to reduce carbon emissions. Quantification and disclosure of such goals and initiatives have become important marketing tools. As enterprises and individuals...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    VMAP: Proactive Thermal-Aware Virtual Machine Allocation in HPC Cloud Datacenters

    Clouds provide the abstraction of nearly-unlimited computing resources through the elastic use of federated resource pools (virtualized datacenters). They are being increasingly considered for HPC applications, which have traditionally targeted grids and supercomputing clusters. However, maximizing energy efficiency and utilization of cloud datacenter resources, avoiding undesired thermal hotspots (due to...

    Provided By Rutgers CMD

  • White Papers // Feb 2012

    Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming

    A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equipped with two antennas, which implement cooperative jamming, i.e., transmitting noise to confound Eve. The optimal structure of...

    Provided By Rutgers CMD

  • White Papers // Sep 2012

    Low Complexity Differentiating Adaptive Erasure Codes in Multimedia Wireless Broadcast

    Based on the erasure channel FEC model as defined in multimedia wireless broadcast standards, the authors illustrate how doping mechanisms included in the design of erasure coding and decoding may improve the scalability of the packet throughput, decrease overall latency and potentially differentiate among classes of multimedia subscribers regardless of...

    Provided By Rutgers CMD

  • White Papers // Dec 2012

    Content as a Network Primitive

    The current functionality supported by OpenFlowbased Software Defined Networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this paper,...

    Provided By Rutgers CMD

  • White Papers // Aug 2012

    Network Coding as a WiMAX Link Reliability Mechanism

    The authors design and implement network-coding-enabled reliability architecture for next generation wireless networks. Their Network Coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the IP layer, to ensure the fast and reliable transfer...

    Provided By Rutgers CMD