Rutgers University

Displaying 1-40 of 123 results

  • White Papers // Apr 2012

    Uncertainty-Aware Localization Solution for Under-Ice Autonomous Underwater Vehicles

    Localization underwater has been known to be challenging due to the limited accessibility of the Global Positioning System (GPS) to obtain absolute positions. This becomes more severe in the under-ice environment since the ocean surface is covered with ice, making it more difficult to access GPS or to deploy localization...

    Provided By Rutgers University

  • White Papers // Apr 2012

    Network Cooperation for Client-AP Association Optimization

    In a WiFi deployment with multiple access points, optimizing the way each client selects an AP from amongst the available choices, has a significant impact on the realized performance. When two or more such multi-AP networks are deployed in the same region, APs from different networks can cause severe interference...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Real-Time Status: How Often Should One Update?

    Increasingly ubiquitous communication networks and connectivity via portable devices have engendered a host of applications in which sources, for example people and environmental sensors, send updates of their status to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Efficient Program Power Behavior Characterization

    Fine-grained program power behavior is useful in both evaluating power optimizations and observing power optimization opportunities. Detailed power simulation is time-consuming and often inaccurate. Physical power measurement is faster and objective. However, fine-grained measurement generates enormous amounts of data in which locating important features is difficult, while coarse-grained measurement sacrifices...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Newton Iteration Acceleration of the Nash Game Algorithm for Power Control in 3G Wireless CDMA Networks

    In wireless communication systems, each user's signal contributes to the interference seen by the other users. Given limited available battery power, this creates a need for effective and efficient power control strategies. These strategies may be designed to achieve Quality of Service (QoS) or system capacity objectives, or both. The...

    Provided By Rutgers University

  • White Papers // Jan 2012

    SIR-Based Power Control Algorithms for Wireless CDMA Networks: An Overview

    This paper summarizes and explains the main results on Signal to Interference Ratio (SIR) based power control algorithms, which are used to increase capacity and improve quality of service in cellular wireless radio systems. The classic works of Aein, Meyerho, Nettle-ton, and Alavi attracted considerable attention in the nineties. The...

    Provided By Rutgers University

  • White Papers // Jan 2012

    LAP: Lightweight Anonymity and Privacy

    Popular anonymous communication systems often require sending packets through a sequence of relays on dilated paths for strong anonymity protection. As a result, increased end-to-end latency renders such systems inadequate for the majority of Internet users who seek an intermediate level of anonymity protection while using latency-sensitive applications, such as...

    Provided By Rutgers University

  • White Papers // Dec 2011

    Improving Robustness of Key Extraction From Wireless Channels With Differential Techniques

    Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior...

    Provided By Rutgers University

  • White Papers // Oct 2011

    On Some Network Design Problems With Degree Constraints

    In network design problems one seeks a cheap subgraph H of a given graph G that satisfies some given properties. In the b-Matching problem H should satisfy prescribed degree constraints, while in the Survivable Network problem H should satisfy prescribed connectivity requirements. The Degree-Constrained Survivable Network problems is a combination...

    Provided By Rutgers University

  • White Papers // Aug 2011

    Enhancing Mobile Malware Detection with Social Collaboration

    Resource-constrained mobile devices pose a challenge to the design of security mechanisms. Existing host-based malware detection solutions are often resource-intensive. The authors present a decentralized and resource-aware malware detection architecture for mobile devices. Their approach leverages two key ideas: social collaboration and the concept of a hot set. The hot...

    Provided By Rutgers University

  • White Papers // Jul 2011

    On Piggybacking in Vehicular Networks

    This paper is motivated by network applications that require nodes to disseminate their state to others. In particular, vehicular nodes will host applications that periodically disseminate time-critical state across the network to help improve on-road safety. In this paper, the authors want to minimize the average age of state information...

    Provided By Rutgers University

  • White Papers // Jul 2011

    Unbounded Contention Resolution in Multiple-Access Channels

    A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad...

    Provided By Rutgers University

  • White Papers // May 2011

    Rate Adaptation in Visual MIMO

    The authors propose a rate adaptation scheme for visual MIMO camera-based communications, wherein parallel data transmissions from light emitting arrays are received by multiple receive elements of a CCD/CMOS camera image sensor. Unlike RF MIMO, multipath fading is negligible in the visual MIMO channel. Instead, the channel is largely dependent...

    Provided By Rutgers University

  • White Papers // May 2011

    GreenSlot: Scheduling Energy Consumption in Green Datacenters

    In this paper, the authors propose GreenSlot, a parallel batch job scheduler for a datacenter powered by a photovoltaic solar array and the electrical grid (as a backup). GreenSlot predicts the amount of solar energy that will be available in the near future, and schedules the workload to maximize the...

    Provided By Rutgers University

  • White Papers // Apr 2011

    Minimizing Age of Information in Vehicular Networks

    Emerging applications rely on wireless broadcast to disseminate time-critical information. For example, vehicular networks may exchange vehicle position and velocity information to enable safety applications. The number of nodes in one-hop communication range in such networks can be very large, leading to congestion and undesirable levels of packet collisions. Earlier...

    Provided By Rutgers University

  • White Papers // Apr 2011

    On the Impact of Neighborhood Discovery on Geographical Routing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), sensing nodes operate in dynamic environments resulting in neighboring nodes being discovered or lost at any moment causing the network topology to change constantly. Hence, routing schemes especially geographical ones (which use node positions to route data packets) require periodic exchange of control packets to...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Enhancing Privacy and Accuracy in Probe Vehicle Based Traffic Monitoring Via Virtual Trip Lines

    Traffic monitoring using probe vehicles with GPS receivers promises significant improvements in cost, coverage, and accuracy over dedicated infrastructure systems. Current approaches, however, raise privacy concerns because they require participants to reveal their positions to an external traffic monitoring server. To address this challenge, the authors describe a system based...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Intelligent Placement of Datacenters for Internet Services

    Popular Internet services are hosted by multiple geographically distributed datacenters. The location of the datacenters has a direct impact on the services' response times, capital and operational costs, and (indirect) carbon dioxide emissions. Selecting a location involves many important considerations, including its proximity to population centers, power plants, and network...

    Provided By Rutgers University

  • White Papers // Feb 2011

    Energy-Aware Application-Centric VM Allocation for HPC Workloads

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency, cost-effectiveness, and utilization of datacenter resources while ensuring performance and other Quality of Service (QoS) guarantees for HPC applications requires careful consideration of...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Target Container: A Target-Centric Parallel Programming Abstraction for Video-Based Surveillance

    Surveillance systems are some of the most computationally intensive applications. Despite technological advances, low-cost of sensors, and continuous improvement of computer vision algorithms, large-scale reliable surveillance systems have yet to become common. The authors argue that building effective smart surveillance systems requires a new approach, with a focus on programmability...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Cost-Aware Virtual Machine Placement in Cloud Computing Systems

    Cloud service providers operate multiple geographically distributed data centers. These data centers consume huge amounts of energy, which translate into high operating costs. Interestingly, the geographical distribution of the data centers provides many opportunities for cost savings. For example, the electricity prices and outside temperatures may be widely different at...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Power Optimization for Connectivity Problems

    Given a graph with costs on the edges, the power of a node is the maximum cost of an edge leaving it, and the power of the graph is the sum of the powers of the nodes of this graph. Motivated by applications in wireless multi-hop networks, the authors consider...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Cost-And Energy-Aware Load Distribution Across Data Centers

    Today, many large organizations operate multiple data centers. The reasons for this include natural business distribution, the need for high availability and disaster tolerance, the sheer size of their computational infrastructure, and/or the desire to provide uniform access times to the infrastructure from widely distributed client sites. Regardless of the...

    Provided By Rutgers University

  • White Papers // Jan 2011

    LHP: An End-to-End Reliable Transport Protocol Over Wireless Data Networks

    The next generation wireless networks are posited to support large scale data applications. Implementing end-to-end TCP in such networks faces two problems. First, it is well known that TCP cannot distinguish packet losses due to link failures and that due to network congestion. Second, TCP congestion control mechanism does not...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Power and Energy Management for Server Systems

    Power and energy consumption are key concerns for Internet data centers. These centers house hundreds, sometimes thousands, of servers and supporting cooling infrastructures. Research on power and energy management for servers can ease data center installation, reduce costs, and protect the environment. Given these benefits, researchers have made important strides...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Compiler-Directed Remote Task Execution for Power Management

    This paper discusses the potential benefits of application-specific power management through remote task execution. Power management is of particular importance for mobile devices that have to rely on battery power for extended periods of time. Image processing is a class of applications important in mobile environments. Image processing can be...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Accurate and Energy-Efficient Congestion Level Measurement in Ad Hoc Networks

    Congestion in ad hoc networks not only degrades throughput, but also wastes the scarce energy due to a large number of retransmissions and packet drops. For efficient congestion control, an accurate and timely estimation of resource demands by measuring the network congestion level is necessary. Unlike the wired networks, congestion...

    Provided By Rutgers University

  • White Papers // Jan 2011

    TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks

    Network congestion can be alleviated either by reducing demand (traffic control) or by increasing capacity (resource control). Unlike in traditional wired or other wireless counterparts, sensor network deployments provide elastic resource availability for satisfying the fidelity level required by applications. In many cases, using traffic control can violate fidelity requirements....

    Provided By Rutgers University

  • White Papers // Jan 2011

    End-to-End Channel Capacity Measurement for Congestion Control in Sensor Networks

    Congestion control in sensor networks is important not only to improve the overall throughput but also to enlengthen the network lifetime by saving the scarce energy wasted during congestion. While throttling the incoming traffic during congestion can effectively alleviate congestion, it also lowers the throughput called accuracy level observed by...

    Provided By Rutgers University

  • White Papers // Jan 2011

    An Optimal Resource Control Scheme Under Fidelity and Energy Constraints in Sensor Networks

    To control congestion, either the traffic from sources should be "Reduced" (traffic controlling) or the available resources should be "Increased" (resource controlling). Compared to the wired and other wireless counterparts, wireless sensor networks usually have elastic resource availability, and the applications require a certain level of throughput called fidelity. As...

    Provided By Rutgers University

  • White Papers // Dec 2010

    Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks

    In the problem of location anonymity of the events exposed to a global eavesdropper, the authors highlight and analyze some aspects that are missing in the prior work, which is especially relevant for the quality of secure sensing in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as...

    Provided By Rutgers University

  • White Papers // Dec 2010

    The Quality of Source Location Protection in Globally Attacked Sensor Networks

    The authors propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Crowds Replace Experts: Building Better Location-Based Services Using Mobile Social Network Interactions

    Location-based services are growing in popularity due to the ubiquity of smartphone users. The relevance of location-based query results is very important, especially for mobile phones with limited form factor. Location-based data is real-time and highly dynamic; this introduces challenges in indexing and ranking places. The growing popularity of mobile...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Engineering And Engineering Skills: What's Really Needed For Global Competitiveness

    In the midst of a protracted economic crisis, coupled with persistent and outsized trade deficits, there has been a growing sense of insecurity about the ability of the United States to compete in the global economy. The answer, according to many policy analysts, is supporting and reinvigorating the U.S. strength...

    Provided By Rutgers University

  • White Papers // Oct 2010

    Exploring the Performance Fluctuations of HPC Workloads on Clouds

    Clouds enable novel execution modes often supported by advanced capabilities such as autonomic schedulers. These capabilities are predicated upon an accurate estimation and calculation of runtimes on a given infrastructure. Using a well-understood high-performance computing workload, the authors find strong fluctuations from the mean performance on EC2 and Eucalyptus-based cloud...

    Provided By Rutgers University

  • White Papers // Sep 2010

    Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams

    Network Intrusion Detection Systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite automata. Existing representations of finite automata present a well-known time-space tradeoff: Deterministic automata (DFAs) provide fast matching but are memory intensive, while non-deterministic automata (NFAs) are space-efficient...

    Provided By Rutgers University

  • White Papers // Sep 2010

    Immigrant Networks And The U.S. Bilateral Trade: The Role Of Immigrant Income

    This paper examines the role of immigrant networks on trade, particulalry through the demand effect. First, the authors examine the effect of immigration on trade when the immigrants consume more of the goods that are abundant in their home country than the natives in a standard Heckscher-Ohlin model and find...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Unifying Access and Resource Usage Control Over Standard Client-Server Interactions

    The authors propose a novel framework for integrated access and resource usage control over standard client-server interactions. Historically, access control has been developed without considering resource usage. Resource control has thus developed as an ad hoc server-centric set of mechanisms (e.g., file system quota, network bandwidth quote, etc.). They believe...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Opportunistic Information Dissemination in Mobile Ad-Hoc Networks: The Profit of Global Synchrony

    A Mobile Ad-hoc NETwork (aka MANET) is a set of mobile nodes which communicate over a multi-hop radio network, without relying on a stable infrastructure. In these networks, nodes are usually battery-operated devices that can communicate via radio with other devices that are in range. Due to unreliable power supply...

    Provided By Rutgers University

  • White Papers // Aug 2010

    FDI Spillovers And The Timing Of Foreign Entry

    This paper analyzes the dynamic effect of FDI on local firms' productivity by relaxing the standard implicit assumption that technological spillovers are immediate and permanent. The authors find that the entry of majority foreign owned firms has a short run negative effect on the productivity of local competitors, which is...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Opportunistic Information Dissemination in Mobile Ad-Hoc Networks: The Profit of Global Synchrony

    A Mobile Ad-hoc NETwork (aka MANET) is a set of mobile nodes which communicate over a multi-hop radio network, without relying on a stable infrastructure. In these networks, nodes are usually battery-operated devices that can communicate via radio with other devices that are in range. Due to unreliable power supply...

    Provided By Rutgers University

  • White Papers // Aug 2008

    Distributed Coordination Schemes for Multi-Radio Co-Existence in Dense Spectrum Environments: An Experimental Study on the ORBIT Testbed

    This paper presents an experimental study on the spectrum coexistence problems between multi-radio platforms in dense-radio physical world environments. Computing and communication devices such as laptops and cellular phones with multiple radios including WiFi, Bluetooth, UWB, WiMax and Zigbee in a small conference room face significant interference problems. The CSCC...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Bandwidth Exchange for Enabling Forwarding in Wireless Access Networks

    Cooperative forwarding in wireless networks has shown to yield benefits of rate and diversity gains, but it needs to be incentivized due to the energy and delay costs incurred by individual nodes in such cooperation. In this paper, the authors consider an incentive mechanism called Bandwidth Exchange (BE) where the...

    Provided By Rutgers University

  • White Papers // Jul 2010

    Resource Allocation for Multicast in an OFDMA Network With Random Network Coding

    In this paper, the authors consider multicast with Random Network Coding (RNC) over a wireless network using Orthogonal Frequency Division Multiple Access (OFDMA). Specifically, they propose a cross-layer resource allocation mechanism to minimize the total transmit power in the network to achieve a target throughput. The problem in its original...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Analyzing Multiple Flows in a Wireless Network With Differential Equations and Differential Inclusions

    A framework based on Differential Equations and Differential Inclusions (DEDI) for analyzing the throughput of random network coding in a wireless network has been proposed. In this paper, the authors extend this framework to further address the throughput when multiple multicast flows are simultaneously launched using an intersession coding scheme....

    Provided By Rutgers University

  • White Papers // Mar 2010

    Sensing Wireless Microphone With ESPRIT From Noise and Adjacent Channel Interference

    FCC requires that any white space device be able to sense Wireless Microphone (WM) signals at -114dBm typically corresponding to a SNR of -20dB, an extremely challenging task. This paper presents a novel WM detector based on the ESPRIT algorithm along with an auxiliary pre-whitening filter that meets this requirement....

    Provided By Rutgers University

  • White Papers // Apr 2010

    DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network

    The authors develop a framework called DEDI based on Differential Equations (DE) and Differential Inclusions (DI) to describe the rank evolution of Random Network Coding (RNC). The DEDI serves as a powerful numerical and analytical tool to study RNC and they demonstrate this via numerical examples as well as an...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Optimized Content Caching and Request Capture in CNF Networks

    In order to meet the overwhelming demands of content retrieval for mobile end users, a novel architecture for the next-generation Internet called Cache-and-Forward (CNF) has been proposed to transport content as large "Packages" in a hop by hop manner towards the destination, instead of transporting a stream of small packets...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

    Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim device on the network. Identity spoofing allows an attacker to avail network services that are normally restricted to legitimate users. Prior techniques to...

    Provided By Rutgers University

  • White Papers // Apr 2010

    Random Channel Hopping Schemes for Key Agreement in Wireless Networks

    Secure wireless communications typically rely on secret keys, which are hard to establish in a mobile setting without a key management infrastructure. In this paper, the authors propose a channel hopping protocol that lets two stations agree on a secret key over an open wireless channel and without use of...

    Provided By Rutgers University

  • White Papers // Feb 2010

    On Predicting and Compressing Vehicular GPS Traces

    Many vehicular safety applications rely on vehicles periodically broadcasting their position information and location trace. In very dense networks, such safety messaging can lead to offered traffic loads that saturate the shared wireless medium. One approach to address this problem is to reduce the frequency of location update messages when...

    Provided By Rutgers University

  • White Papers // Apr 2010

    Joint Power Control and Scheduling Algorithm for Wi-Fi Ad-Hoc Networks

    Power control is a widely used technique in improving the throughput and the quality of services in wireless communications. In this paper, a power control method based on a utility maximization method is applied to Ad-hoc networks built on Wi-Fi radios. First, a fully distributed power control algorithm is developed...

    Provided By Rutgers University

  • White Papers // May 2011

    Rate Adaptation in Visual MIMO

    The authors propose a rate adaptation scheme for visual MIMO camera-based communications, wherein parallel data transmissions from light emitting arrays are received by multiple receive elements of a CCD/CMOS camera image sensor. Unlike RF MIMO, multipath fading is negligible in the visual MIMO channel. Instead, the channel is largely dependent...

    Provided By Rutgers University

  • White Papers // Apr 2011

    Minimizing Age of Information in Vehicular Networks

    Emerging applications rely on wireless broadcast to disseminate time-critical information. For example, vehicular networks may exchange vehicle position and velocity information to enable safety applications. The number of nodes in one-hop communication range in such networks can be very large, leading to congestion and undesirable levels of packet collisions. Earlier...

    Provided By Rutgers University

  • White Papers // May 2008

    Achieving Temporal Fairness in Multi-Rate 802.11 WLANs With Capture Effect

    This paper proposes new MAC layer Transmission OPportunity (TXOP) adaptation algorithms for achieving temporal fairness in multi-rate 802.11 WLANs, which take underlying capture effect into account. Due to capture effect, a frame with the strongest received signal strength can be correctly decoded at the receiver even in the presence of...

    Provided By Rutgers University

  • White Papers // Feb 2010

    Towards Maximizing Wireless Testbed Utilization Using Spectrum Slicing

    As experimentation becomes one of the de-facto approaches for benchmarking, researchers are turning to testbeds to test, review and verify their work. As a result, several research laboratories build wireless testbeds, in order to offer their researchers a real environment to test their algorithms. As testbeds become more and more...

    Provided By Rutgers University

  • White Papers // Jun 2009

    Mobile Experiments Made Easy With OMF/Orbit

    Experimental facilities (or testbeds) are instrumental in the development and evaluation of new Internet technologies. Evaluations based on simulation and emulation does provide valuable, yet inexpensive insight into the performance of new networking technologies at large scales. How-ever, simulators and emulators inherently make simplifying model assumptions. Thus, convincing the networking...

    Provided By Rutgers University

  • White Papers // Nov 2009

    Empirical Evaluation of the Limits on Localization Using Signal Strength

    This paper investigates the lower bounds of wireless localization accuracy using signal strength on commodity hardware. Their work relies on trace-driven analysis using an extensive indoor experimental infrastructure. First, they report the best experimental accuracy, twice the best prior reported accuracy for any localization system. They experimentally show that adding...

    Provided By Rutgers University

  • White Papers // Aug 2009

    DOMA: Deploy Once Multi Application Sensor Network Framework

    Collaborating semantic wireless sensor actor network systems coupled with context driven semantic web services promise to support multiple flexible applications that were not specified before deployment. Applications range from multiple environmental monitoring tasks sharing a single network to complex systems assisting disaster response teams in developing good situation awareness and...

    Provided By Rutgers University

  • White Papers // Jul 2011

    On Piggybacking in Vehicular Networks

    This paper is motivated by network applications that require nodes to disseminate their state to others. In particular, vehicular nodes will host applications that periodically disseminate time-critical state across the network to help improve on-road safety. In this paper, the authors want to minimize the average age of state information...

    Provided By Rutgers University

  • White Papers // Oct 2010

    Exploring the Performance Fluctuations of HPC Workloads on Clouds

    Clouds enable novel execution modes often supported by advanced capabilities such as autonomic schedulers. These capabilities are predicated upon an accurate estimation and calculation of runtimes on a given infrastructure. Using a well-understood high-performance computing workload, the authors find strong fluctuations from the mean performance on EC2 and Eucalyptus-based cloud...

    Provided By Rutgers University

  • White Papers // Apr 2011

    On the Impact of Neighborhood Discovery on Geographical Routing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), sensing nodes operate in dynamic environments resulting in neighboring nodes being discovered or lost at any moment causing the network topology to change constantly. Hence, routing schemes especially geographical ones (which use node positions to route data packets) require periodic exchange of control packets to...

    Provided By Rutgers University

  • White Papers // Feb 2011

    Energy-Aware Application-Centric VM Allocation for HPC Workloads

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency, cost-effectiveness, and utilization of datacenter resources while ensuring performance and other Quality of Service (QoS) guarantees for HPC applications requires careful consideration of...

    Provided By Rutgers University

  • White Papers // Apr 2010

    Trajectory-Aware Communication Solution for Underwater Gliders Using WHOI Micro-Modems

    The predictable trajectory of underwater gliders can be used in geographic routing protocols. Factors such as drifting and localization errors cause uncertainty when estimating a glider's trajectory. Existing geographic routing protocols in underwater networks generally assume the positions of the nodes are accurately determined by neglecting position uncertainty. In this...

    Provided By Rutgers University

  • White Papers // Jun 2010

    A Testbed for Performance Evaluation of Underwater Vehicle Team Formation and Steering Algorithms

    Underwater testbeds are key tools for performance evaluation of underwater communication and coordination algorithms to enable swarming of autonomous vehicles. The authors describe a demonstration of underwater vehicle team formation and steering algorithms using the underwater testbed. The tesdbed allows the user to configure ocean currents and underwater communication parameters...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Bio-Inspired Communications for Coordination Among Autonomous Underwater Vehicles

    To take measurements in space and time from the undersampled vast ocean, it is necessary to employ multiple autonomous underwater vehicles, such as gliders, that communicate and coordinate with each other. These vehicles need to form a team in a specific formation, steer through the 3D region of interest, and...

    Provided By Rutgers University

  • White Papers // Feb 2010

    Patient Vital Signs Monitoring Using Wireless Body Area Networks

    Today hospitals are equipped with many electronic transmitting devices, which results in electromagnetic interference that may impair wireless transmissions between medical devices. On the other hand, reliable and continuous collection via wireless communications of patient vital signs such as blood pressure and flow, core temperature, ECG, carbon dioxide (CO2) concentration...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Crowds Replace Experts: Building Better Location-Based Services Using Mobile Social Network Interactions

    Location-based services are growing in popularity due to the ubiquity of smartphone users. The relevance of location-based query results is very important, especially for mobile phones with limited form factor. Location-based data is real-time and highly dynamic; this introduces challenges in indexing and ranking places. The growing popularity of mobile...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

    Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmissions propagate beyond the confines of a car's body. To understand the risks associated with these wireless systems, this paper presents a privacy and security...

    Provided By Rutgers University

  • White Papers // Jul 2011

    Unbounded Contention Resolution in Multiple-Access Channels

    A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Lifted Inference: Normalizing Loops by Evaluation

    Many loops in probabilistic inference map almost every individual in their domain to the same result. Running such loops symbolically takes time sub-linear in the domain size. Using normalization by evaluation with first-class delimited continuations, the authors lift inference procedures to reap this speed-up without interpretive overhead. To express nested...

    Provided By Rutgers University

  • White Papers // Apr 2010

    Generating Quantifiers and Negation to Explain Homework Testing

    The authors describe Prograder, a software package for automatic checking of requirements for programming homework assignments. Prograder lets instructors specify requirements in natural language as well as explains grading results to students in natural language. It does so using a grammar that generates as well as parses to translate between...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Efficient Program Power Behavior Characterization

    Fine-grained program power behavior is useful in both evaluating power optimizations and observing power optimization opportunities. Detailed power simulation is time-consuming and often inaccurate. Physical power measurement is faster and objective. However, fine-grained measurement generates enormous amounts of data in which locating important features is difficult, while coarse-grained measurement sacrifices...

    Provided By Rutgers University

  • White Papers // Apr 2009

    Tool Support for Change-Centric Test Development: How Do Developers Know They Have Done a Good Job?

    Developers use unit testing to improve the quality of software systems. Current development tools for unit testing help to automate test execution, to report results, and to generate test stubs. However, they offer no aid for designing tests aimed specifically at exercising the effects of changes to a program. This...

    Provided By Rutgers University

  • White Papers // Nov 2008

    Effectively Automate and Enforce Process Rules and Tasks When Delivering Changes

    Most software systems are built by a team of collaborating developers changing the system's code base in parallel. New development environments make rules and patterns the team is following explicit to ensure better quality of a developer's edit before it is delivered to a shared repository. Current tool support checks...

    Provided By Rutgers University

  • White Papers // Apr 2012

    Network Cooperation for Client-AP Association Optimization

    In a WiFi deployment with multiple access points, optimizing the way each client selects an AP from amongst the available choices, has a significant impact on the realized performance. When two or more such multi-AP networks are deployed in the same region, APs from different networks can cause severe interference...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Real-Time Status: How Often Should One Update?

    Increasingly ubiquitous communication networks and connectivity via portable devices have engendered a host of applications in which sources, for example people and environmental sensors, send updates of their status to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically...

    Provided By Rutgers University

  • White Papers // Dec 2011

    Improving Robustness of Key Extraction From Wireless Channels With Differential Techniques

    Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Enhancing Privacy and Accuracy in Probe Vehicle Based Traffic Monitoring Via Virtual Trip Lines

    Traffic monitoring using probe vehicles with GPS receivers promises significant improvements in cost, coverage, and accuracy over dedicated infrastructure systems. Current approaches, however, raise privacy concerns because they require participants to reveal their positions to an external traffic monitoring server. To address this challenge, the authors describe a system based...

    Provided By Rutgers University

  • White Papers // Apr 2012

    Uncertainty-Aware Localization Solution for Under-Ice Autonomous Underwater Vehicles

    Localization underwater has been known to be challenging due to the limited accessibility of the Global Positioning System (GPS) to obtain absolute positions. This becomes more severe in the under-ice environment since the ocean surface is covered with ice, making it more difficult to access GPS or to deploy localization...

    Provided By Rutgers University