Rutgers University

Displaying 1-40 of 109 results

  • White Papers // Apr 2012

    Uncertainty-Aware Localization Solution for Under-Ice Autonomous Underwater Vehicles

    Localization underwater has been known to be challenging due to the limited accessibility of the Global Positioning System (GPS) to obtain absolute positions. This becomes more severe in the under-ice environment since the ocean surface is covered with ice, making it more difficult to access GPS or to deploy localization...

    Provided By Rutgers University

  • White Papers // Apr 2012

    Network Cooperation for Client-AP Association Optimization

    In a WiFi deployment with multiple access points, optimizing the way each client selects an AP from amongst the available choices, has a significant impact on the realized performance. When two or more such multi-AP networks are deployed in the same region, APs from different networks can cause severe interference...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Real-Time Status: How Often Should One Update?

    Increasingly ubiquitous communication networks and connectivity via portable devices have engendered a host of applications in which sources, for example people and environmental sensors, send updates of their status to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this is typically...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Newton Iteration Acceleration of the Nash Game Algorithm for Power Control in 3G Wireless CDMA Networks

    In wireless communication systems, each user's signal contributes to the interference seen by the other users. Given limited available battery power, this creates a need for effective and efficient power control strategies. These strategies may be designed to achieve Quality of Service (QoS) or system capacity objectives, or both. The...

    Provided By Rutgers University

  • White Papers // Jan 2012

    SIR-Based Power Control Algorithms for Wireless CDMA Networks: An Overview

    This paper summarizes and explains the main results on Signal to Interference Ratio (SIR) based power control algorithms, which are used to increase capacity and improve quality of service in cellular wireless radio systems. The classic works of Aein, Meyerho, Nettle-ton, and Alavi attracted considerable attention in the nineties. The...

    Provided By Rutgers University

  • White Papers // Jan 2012

    LAP: Lightweight Anonymity and Privacy

    Popular anonymous communication systems often require sending packets through a sequence of relays on dilated paths for strong anonymity protection. As a result, increased end-to-end latency renders such systems inadequate for the majority of Internet users who seek an intermediate level of anonymity protection while using latency-sensitive applications, such as...

    Provided By Rutgers University

  • White Papers // Jan 2012

    Efficient Program Power Behavior Characterization

    Fine-grained program power behavior is useful in both evaluating power optimizations and observing power optimization opportunities. Detailed power simulation is time-consuming and often inaccurate. Physical power measurement is faster and objective. However, fine-grained measurement generates enormous amounts of data in which locating important features is difficult, while coarse-grained measurement sacrifices...

    Provided By Rutgers University

  • White Papers // Dec 2011

    Improving Robustness of Key Extraction From Wireless Channels With Differential Techniques

    Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior...

    Provided By Rutgers University

  • White Papers // Oct 2011

    On Some Network Design Problems With Degree Constraints

    In network design problems one seeks a cheap subgraph H of a given graph G that satisfies some given properties. In the b-Matching problem H should satisfy prescribed degree constraints, while in the Survivable Network problem H should satisfy prescribed connectivity requirements. The Degree-Constrained Survivable Network problems is a combination...

    Provided By Rutgers University

  • White Papers // Aug 2011

    Enhancing Mobile Malware Detection with Social Collaboration

    Resource-constrained mobile devices pose a challenge to the design of security mechanisms. Existing host-based malware detection solutions are often resource-intensive. The authors present a decentralized and resource-aware malware detection architecture for mobile devices. Their approach leverages two key ideas: social collaboration and the concept of a hot set. The hot...

    Provided By Rutgers University

  • White Papers // Jul 2011

    On Piggybacking in Vehicular Networks

    This paper is motivated by network applications that require nodes to disseminate their state to others. In particular, vehicular nodes will host applications that periodically disseminate time-critical state across the network to help improve on-road safety. In this paper, the authors want to minimize the average age of state information...

    Provided By Rutgers University

  • White Papers // Jul 2011

    Unbounded Contention Resolution in Multiple-Access Channels

    A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad...

    Provided By Rutgers University

  • White Papers // May 2011

    Rate Adaptation in Visual MIMO

    The authors propose a rate adaptation scheme for visual MIMO camera-based communications, wherein parallel data transmissions from light emitting arrays are received by multiple receive elements of a CCD/CMOS camera image sensor. Unlike RF MIMO, multipath fading is negligible in the visual MIMO channel. Instead, the channel is largely dependent...

    Provided By Rutgers University

  • White Papers // May 2011

    GreenSlot: Scheduling Energy Consumption in Green Datacenters

    In this paper, the authors propose GreenSlot, a parallel batch job scheduler for a datacenter powered by a photovoltaic solar array and the electrical grid (as a backup). GreenSlot predicts the amount of solar energy that will be available in the near future, and schedules the workload to maximize the...

    Provided By Rutgers University

  • White Papers // Apr 2011

    Minimizing Age of Information in Vehicular Networks

    Emerging applications rely on wireless broadcast to disseminate time-critical information. For example, vehicular networks may exchange vehicle position and velocity information to enable safety applications. The number of nodes in one-hop communication range in such networks can be very large, leading to congestion and undesirable levels of packet collisions. Earlier...

    Provided By Rutgers University

  • White Papers // Apr 2011

    On the Impact of Neighborhood Discovery on Geographical Routing in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), sensing nodes operate in dynamic environments resulting in neighboring nodes being discovered or lost at any moment causing the network topology to change constantly. Hence, routing schemes especially geographical ones (which use node positions to route data packets) require periodic exchange of control packets to...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Enhancing Privacy and Accuracy in Probe Vehicle Based Traffic Monitoring Via Virtual Trip Lines

    Traffic monitoring using probe vehicles with GPS receivers promises significant improvements in cost, coverage, and accuracy over dedicated infrastructure systems. Current approaches, however, raise privacy concerns because they require participants to reveal their positions to an external traffic monitoring server. To address this challenge, the authors describe a system based...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Intelligent Placement of Datacenters for Internet Services

    Popular Internet services are hosted by multiple geographically distributed datacenters. The location of the datacenters has a direct impact on the services' response times, capital and operational costs, and (indirect) carbon dioxide emissions. Selecting a location involves many important considerations, including its proximity to population centers, power plants, and network...

    Provided By Rutgers University

  • White Papers // Feb 2011

    Energy-Aware Application-Centric VM Allocation for HPC Workloads

    Virtualized datacenters and clouds are being increasingly considered for traditional High-Performance Computing (HPC) workloads that have typically targeted Grids and conventional HPC platforms. However, maximizing energy efficiency, cost-effectiveness, and utilization of datacenter resources while ensuring performance and other Quality of Service (QoS) guarantees for HPC applications requires careful consideration of...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Target Container: A Target-Centric Parallel Programming Abstraction for Video-Based Surveillance

    Surveillance systems are some of the most computationally intensive applications. Despite technological advances, low-cost of sensors, and continuous improvement of computer vision algorithms, large-scale reliable surveillance systems have yet to become common. The authors argue that building effective smart surveillance systems requires a new approach, with a focus on programmability...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Cost-Aware Virtual Machine Placement in Cloud Computing Systems

    Cloud service providers operate multiple geographically distributed data centers. These data centers consume huge amounts of energy, which translate into high operating costs. Interestingly, the geographical distribution of the data centers provides many opportunities for cost savings. For example, the electricity prices and outside temperatures may be widely different at...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Compiler-Directed Remote Task Execution for Power Management

    This paper discusses the potential benefits of application-specific power management through remote task execution. Power management is of particular importance for mobile devices that have to rely on battery power for extended periods of time. Image processing is a class of applications important in mobile environments. Image processing can be...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Accurate and Energy-Efficient Congestion Level Measurement in Ad Hoc Networks

    Congestion in ad hoc networks not only degrades throughput, but also wastes the scarce energy due to a large number of retransmissions and packet drops. For efficient congestion control, an accurate and timely estimation of resource demands by measuring the network congestion level is necessary. Unlike the wired networks, congestion...

    Provided By Rutgers University

  • White Papers // Jan 2011

    TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks

    Network congestion can be alleviated either by reducing demand (traffic control) or by increasing capacity (resource control). Unlike in traditional wired or other wireless counterparts, sensor network deployments provide elastic resource availability for satisfying the fidelity level required by applications. In many cases, using traffic control can violate fidelity requirements....

    Provided By Rutgers University

  • White Papers // Jan 2011

    End-to-End Channel Capacity Measurement for Congestion Control in Sensor Networks

    Congestion control in sensor networks is important not only to improve the overall throughput but also to enlengthen the network lifetime by saving the scarce energy wasted during congestion. While throttling the incoming traffic during congestion can effectively alleviate congestion, it also lowers the throughput called accuracy level observed by...

    Provided By Rutgers University

  • White Papers // Jan 2011

    An Optimal Resource Control Scheme Under Fidelity and Energy Constraints in Sensor Networks

    To control congestion, either the traffic from sources should be "Reduced" (traffic controlling) or the available resources should be "Increased" (resource controlling). Compared to the wired and other wireless counterparts, wireless sensor networks usually have elastic resource availability, and the applications require a certain level of throughput called fidelity. As...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Power Optimization for Connectivity Problems

    Given a graph with costs on the edges, the power of a node is the maximum cost of an edge leaving it, and the power of the graph is the sum of the powers of the nodes of this graph. Motivated by applications in wireless multi-hop networks, the authors consider...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Power and Energy Management for Server Systems

    Power and energy consumption are key concerns for Internet data centers. These centers house hundreds, sometimes thousands, of servers and supporting cooling infrastructures. Research on power and energy management for servers can ease data center installation, reduce costs, and protect the environment. Given these benefits, researchers have made important strides...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Cost-And Energy-Aware Load Distribution Across Data Centers

    Today, many large organizations operate multiple data centers. The reasons for this include natural business distribution, the need for high availability and disaster tolerance, the sheer size of their computational infrastructure, and/or the desire to provide uniform access times to the infrastructure from widely distributed client sites. Regardless of the...

    Provided By Rutgers University

  • White Papers // Jan 2011

    LHP: An End-to-End Reliable Transport Protocol Over Wireless Data Networks

    The next generation wireless networks are posited to support large scale data applications. Implementing end-to-end TCP in such networks faces two problems. First, it is well known that TCP cannot distinguish packet losses due to link failures and that due to network congestion. Second, TCP congestion control mechanism does not...

    Provided By Rutgers University

  • White Papers // Dec 2010

    Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks

    In the problem of location anonymity of the events exposed to a global eavesdropper, the authors highlight and analyze some aspects that are missing in the prior work, which is especially relevant for the quality of secure sensing in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as...

    Provided By Rutgers University

  • White Papers // Dec 2010

    The Quality of Source Location Protection in Globally Attacked Sensor Networks

    The authors propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Crowds Replace Experts: Building Better Location-Based Services Using Mobile Social Network Interactions

    Location-based services are growing in popularity due to the ubiquity of smartphone users. The relevance of location-based query results is very important, especially for mobile phones with limited form factor. Location-based data is real-time and highly dynamic; this introduces challenges in indexing and ranking places. The growing popularity of mobile...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Engineering And Engineering Skills: What's Really Needed For Global Competitiveness

    In the midst of a protracted economic crisis, coupled with persistent and outsized trade deficits, there has been a growing sense of insecurity about the ability of the United States to compete in the global economy. The answer, according to many policy analysts, is supporting and reinvigorating the U.S. strength...

    Provided By Rutgers University

  • White Papers // Oct 2010

    Exploring the Performance Fluctuations of HPC Workloads on Clouds

    Clouds enable novel execution modes often supported by advanced capabilities such as autonomic schedulers. These capabilities are predicated upon an accurate estimation and calculation of runtimes on a given infrastructure. Using a well-understood high-performance computing workload, the authors find strong fluctuations from the mean performance on EC2 and Eucalyptus-based cloud...

    Provided By Rutgers University

  • White Papers // Sep 2010

    Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams

    Network Intrusion Detection Systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite automata. Existing representations of finite automata present a well-known time-space tradeoff: Deterministic automata (DFAs) provide fast matching but are memory intensive, while non-deterministic automata (NFAs) are space-efficient...

    Provided By Rutgers University

  • White Papers // Sep 2010

    Immigrant Networks And The U.S. Bilateral Trade: The Role Of Immigrant Income

    This paper examines the role of immigrant networks on trade, particulalry through the demand effect. First, the authors examine the effect of immigration on trade when the immigrants consume more of the goods that are abundant in their home country than the natives in a standard Heckscher-Ohlin model and find...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Unifying Access and Resource Usage Control Over Standard Client-Server Interactions

    The authors propose a novel framework for integrated access and resource usage control over standard client-server interactions. Historically, access control has been developed without considering resource usage. Resource control has thus developed as an ad hoc server-centric set of mechanisms (e.g., file system quota, network bandwidth quote, etc.). They believe...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Opportunistic Information Dissemination in Mobile Ad-Hoc Networks: The Profit of Global Synchrony

    A Mobile Ad-hoc NETwork (aka MANET) is a set of mobile nodes which communicate over a multi-hop radio network, without relying on a stable infrastructure. In these networks, nodes are usually battery-operated devices that can communicate via radio with other devices that are in range. Due to unreliable power supply...

    Provided By Rutgers University

  • White Papers // Aug 2010

    FDI Spillovers And The Timing Of Foreign Entry

    This paper analyzes the dynamic effect of FDI on local firms' productivity by relaxing the standard implicit assumption that technological spillovers are immediate and permanent. The authors find that the entry of majority foreign owned firms has a short run negative effect on the productivity of local competitors, which is...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Power Infrastructure Security: Fundamental Insights of Potential Cyber Attacks and Their Impacts on the Power Grid

    The information infrastructure for the power networks was often viewed as a collection of individual communication channels, separate databases, multiple systems, and different protocols. Automation systems and controller nodes performed minimal monitoring on data and information availability, validity, and integrity. Like any other industry sector, the electrical power industry is...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Cyber-Related Risk Assessment and Critical Asset Identification Within the Power Grid

    This paper introduces a new way to detect and improve the vulnerability of bulk power systems against the intrusion and malicious acts of cyber hackers. For this aim, detecting the most vulnerable part of the power grid to hacker attack is needed. The method for finding the most vulnerable substation...

    Provided By Rutgers University

  • White Papers // Jul 2010

    Applications and Security of Next-Generation, User-Centric Wireless Systems

    Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users' daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often...

    Provided By Rutgers University

  • White Papers // May 2009

    Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases

    Outsourced databases provide a solution for data owners who want to delegate the task of answering database queries to third-party service providers. However, distrustful users may desire a means of verifying the integrity of responses to their database queries. Simultaneously, for privacy or security reasons, the data owner may want...

    Provided By Rutgers University

  • White Papers // Apr 2009

    Poster: CompareView - A Provenance Verification Framework for Detecting Rootkit-Based Malware

    Using rootkit mechanisms to hide malware presence is pervasive in today's computer attacks. This paper proposes the CompareView framework, a host-based solution to detect stealthy outbound traffic generated by rootkit-based malware. Using a lightweight cryptographic protocol, the CompareView framework compares the views of outbound network packets at different layers of...

    Provided By Rutgers University

  • White Papers // Oct 2009

    User-Assisted Host-Based Detection of Outbound Malware Traffic

    Conventional network security solutions are performed on network layer packets using statistical measures. These types of traffic analysis may not catch stealthy attacks carried out by today's malware. The authors aim to develop a host-based security tool that identifies suspicious outbound network connections through analyzing the user's surfing activities. Specifically,...

    Provided By Rutgers University

  • White Papers // Apr 2009

    Detection and Prevention of Insider Threats in Database DrivenWeb Services

    In this paper, the authors take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. They consider both insider and outsider attacks in the third-party web hosting scenarios. They present SafeWS, a modular solution that is...

    Provided By Rutgers University

  • White Papers // Mar 2011

    Intelligent Placement of Datacenters for Internet Services

    Popular Internet services are hosted by multiple geographically distributed datacenters. The location of the datacenters has a direct impact on the services' response times, capital and operational costs, and (indirect) carbon dioxide emissions. Selecting a location involves many important considerations, including its proximity to population centers, power plants, and network...

    Provided By Rutgers University

  • White Papers // Jul 2010

    Capping the Brown Energy Consumption of Internet Services at Low Cost

    The large amount of energy consumed by Internet services represents significant and fast-growing financial and environmental costs. Increasingly, services are exploring dynamic methods to minimize energy costs while respecting their service-level agreements (SLAs). Furthermore, it will soon be important for these services to manage their usage of "brown energy" (produced...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Cost-Aware Virtual Machine Placement in Cloud Computing Systems

    Cloud service providers operate multiple geographically distributed data centers. These data centers consume huge amounts of energy, which translate into high operating costs. Interestingly, the geographical distribution of the data centers provides many opportunities for cost savings. For example, the electricity prices and outside temperatures may be widely different at...

    Provided By Rutgers University

  • White Papers // Jan 2010

    Ad-Hoc Voice-Based Group Communication

    People waste many hours driving each day. Although unavoidable, this time can be very boring to motorists. Similar to people taking mass transit who often pass the time socializing with those around them, motorists could benefit from social interactions if they were given broader social opportunities. Unfortunately, existing Multi-party Voice...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Safe Transient Use of Local Storage for VM-Based Mobility

    This paper investigates the transient use of free local storage for improving performance in VM-based mobile computing systems. Many such systems boot from a portable storage device to create a "Zero-install" environment on a computer that is borrowed for temporary use. Unfortunately, consumer-grade portable storage devices are optimized for capacity...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Target Container: A Target-Centric Parallel Programming Abstraction for Video-Based Surveillance

    Surveillance systems are some of the most computationally intensive applications. Despite technological advances, low-cost of sensors, and continuous improvement of computer vision algorithms, large-scale reliable surveillance systems have yet to become common. The authors argue that building effective smart surveillance systems requires a new approach, with a focus on programmability...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Communication-Efficient Privacy-Preserving Clustering

    The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well as regulations, often prevent the sharing of data between multiple parties. Privacy-preserving distributed data mining allows the cooperative computation of data...

    Provided By Rutgers University

  • White Papers // Aug 2009

    Detecting Identity Spoofs in 802.11e Wireless Networks

    Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim device on the network. Identity spoofing allows an attacker to avail network services that are normally restricted to legitimate users. Prior techniques to...

    Provided By Rutgers University

  • White Papers // Dec 2009

    Analyzing Information Flow in JavaScript-Based Browser Extensions

    JavaScript-based browser Extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To enable a rich set of functionalities, browsers typically execute JSEs with elevated privileges. For example, unlike JavaScript code in a web application, code in a...

    Provided By Rutgers University

  • White Papers // Sep 2010

    Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams

    Network Intrusion Detection Systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite automata. Existing representations of finite automata present a well-known time-space tradeoff: Deterministic automata (DFAs) provide fast matching but are memory intensive, while non-deterministic automata (NFAs) are space-efficient...

    Provided By Rutgers University

  • White Papers // Dec 2010

    Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks

    In the problem of location anonymity of the events exposed to a global eavesdropper, the authors highlight and analyze some aspects that are missing in the prior work, which is especially relevant for the quality of secure sensing in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as...

    Provided By Rutgers University

  • White Papers // Dec 2010

    The Quality of Source Location Protection in Globally Attacked Sensor Networks

    The authors propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with...

    Provided By Rutgers University

  • White Papers // Jun 2009

    Multi-Label Prediction Via Compressed Sensing

    The authors consider multi-label prediction problems with large output spaces under the assumption of output sparsity - that the target (label) vectors have small support. They develop a general theory for a variant of the popular error correcting output code scheme, using ideas from compressed sensing for exploiting this sparsity....

    Provided By Rutgers University

  • White Papers // Apr 2009

    Fading Broadcast Channels With State Information at the Receivers

    Despite considerable progress on the information-theoretic broadcast channel, the capacity region of fading broadcast channels with channel state known at the receivers but unknown at the transmitter remains unresolved. The authors address this subject by introducing a layered erasure broadcast channel model in which each component channel has a state...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Reducing Spam Via Trustworthy Self Regulation by Email Senders

    This paper introduces an email sending technique, called Trustworthy Self Regulation (TSR), which enables the receiver of an email message to recognize the sending protocol that generated it. The availability of this sending technique is expected to help induce email users to send messages via spam-immune protocols preferred by their...

    Provided By Rutgers University

  • White Papers // Mar 2009

    Decentralized Governance of Networked Systems: From Access Control to Interaction Control

    This paper introduces an abstract model for mechanisms for the governance of large, heterogeneous, and open networked systems. This, so called Interaction Control (IC), model goes well beyond conventional access control, along a number of dimensions. In Particular, the IC model is inherently decentralized, and thus scalable even for wide...

    Provided By Rutgers University

  • White Papers // Oct 2009

    Poster: Privacy-Aware Publishing of Netflix Data

    To seek better prediction techniques, data owners of recommender systems such as Netflix sometimes make their customers' reviews available to the public, which raises serious privacy concerns. With only a small amount of knowledge about individuals in a recommender system, an adversary may be able to re-identify users and consequently...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Compiler-Directed Remote Task Execution for Power Management

    This paper discusses the potential benefits of application-specific power management through remote task execution. Power management is of particular importance for mobile devices that have to rely on battery power for extended periods of time. Image processing is a class of applications important in mobile environments. Image processing can be...

    Provided By Rutgers University

  • White Papers // Jul 2009

    Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

    The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper the authors propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, they describe a physical-layer algorithm...

    Provided By Rutgers University

  • White Papers // Jan 2011

    Accurate and Energy-Efficient Congestion Level Measurement in Ad Hoc Networks

    Congestion in ad hoc networks not only degrades throughput, but also wastes the scarce energy due to a large number of retransmissions and packet drops. For efficient congestion control, an accurate and timely estimation of resource demands by measuring the network congestion level is necessary. Unlike the wired networks, congestion...

    Provided By Rutgers University

  • White Papers // Jan 2011

    TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks

    Network congestion can be alleviated either by reducing demand (traffic control) or by increasing capacity (resource control). Unlike in traditional wired or other wireless counterparts, sensor network deployments provide elastic resource availability for satisfying the fidelity level required by applications. In many cases, using traffic control can violate fidelity requirements....

    Provided By Rutgers University

  • White Papers // Jan 2011

    End-to-End Channel Capacity Measurement for Congestion Control in Sensor Networks

    Congestion control in sensor networks is important not only to improve the overall throughput but also to enlengthen the network lifetime by saving the scarce energy wasted during congestion. While throttling the incoming traffic during congestion can effectively alleviate congestion, it also lowers the throughput called accuracy level observed by...

    Provided By Rutgers University

  • White Papers // Jan 2011

    An Optimal Resource Control Scheme Under Fidelity and Energy Constraints in Sensor Networks

    To control congestion, either the traffic from sources should be "Reduced" (traffic controlling) or the available resources should be "Increased" (resource controlling). Compared to the wired and other wireless counterparts, wireless sensor networks usually have elastic resource availability, and the applications require a certain level of throughput called fidelity. As...

    Provided By Rutgers University

  • White Papers // May 2010

    Prediction Promotes Privacy in Dynamic Social Networks

    Recent work on anonymizing Online Social Networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a single instance is inadequate for analyzing their evolution or performing longitudinal data analysis. The authors study the problem of repeatedly publishing OSN data...

    Provided By Rutgers University

  • White Papers // May 2011

    GreenSlot: Scheduling Energy Consumption in Green Datacenters

    In this paper, the authors propose GreenSlot, a parallel batch job scheduler for a datacenter powered by a photovoltaic solar array and the electrical grid (as a backup). GreenSlot predicts the amount of solar energy that will be available in the near future, and schedules the workload to maximize the...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Unifying Access and Resource Usage Control Over Standard Client-Server Interactions

    The authors propose a novel framework for integrated access and resource usage control over standard client-server interactions. Historically, access control has been developed without considering resource usage. Resource control has thus developed as an ad hoc server-centric set of mechanisms (e.g., file system quota, network bandwidth quote, etc.). They believe...

    Provided By Rutgers University

  • White Papers // Mar 2010

    Position Paper: The Case for JavaScript Transactions

    Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code. This paper makes...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Improving Bicycle Safety Through Automated Real-Time Vehicle Detection

    The manner in which people use bicycles has changed very little since their invention in 1817. In that time, though, roadways have become congested with a dramatically less environmentally friendly mode of transportation: automobiles. These vehicles and the motorists who drive them represent, at times, a serious threat to the...

    Provided By Rutgers University

  • White Papers // Dec 2009

    Unified Structure and Content Search for Personal Information Management Systems

    The amount of data that users are storing and accessing in personal information systems is growing massively. At the same time, the organization of this data is becoming more heterogeneous, with data spread across different organizational domains such as emails, music databases, and photo albums, some of which are structured...

    Provided By Rutgers University

  • White Papers // Feb 2010

    Patient Vital Signs Monitoring Using Wireless Body Area Networks

    Today hospitals are equipped with many electronic transmitting devices, which results in electromagnetic interference that may impair wireless transmissions between medical devices. On the other hand, reliable and continuous collection via wireless communications of patient vital signs such as blood pressure and flow, core temperature, ECG, carbon dioxide (CO2) concentration...

    Provided By Rutgers University

  • White Papers // Nov 2010

    Crowds Replace Experts: Building Better Location-Based Services Using Mobile Social Network Interactions

    Location-based services are growing in popularity due to the ubiquity of smartphone users. The relevance of location-based query results is very important, especially for mobile phones with limited form factor. Location-based data is real-time and highly dynamic; this introduces challenges in indexing and ranking places. The growing popularity of mobile...

    Provided By Rutgers University

  • White Papers // Aug 2010

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

    Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmissions propagate beyond the confines of a car's body. To understand the risks associated with these wireless systems, this paper presents a privacy and security...

    Provided By Rutgers University

  • White Papers // Jul 2011

    Unbounded Contention Resolution in Multiple-Access Channels

    A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad...

    Provided By Rutgers University