State Street Corporation

Displaying 1-28 of 28 results

  • White Papers // Jan 2014

    Systematic Security and Timeliness Trade-Offs in Real-Time Embedded Systems

    Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, it is required to meet not only real-time but also security requirements. It is essential to meet as many deadlines as possible, e.g., to avoid a power outage or...

    Provided By State Street Corporation

  • White Papers // Nov 2013

    Flexible Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is typically used to enforce structure in the solution as, for example, in Lasso problems. Their framework is very flexible and includes both...

    Provided By State Street Corporation

  • White Papers // Aug 2013

    An Application-Level Approach for Privacy-preserving Virtual Machine Checkpointing

    Virtualization has been widely adopted in recent years in the cloud computing platform to improve server consolidation and reduce operating cost. Virtual Machine (VM) checkpointing refers to the act of saving a persistent snapshot (or checkpoint) of a VM's state at any instant. VM checkpointing can drastically prolong the lifetime...

    Provided By State Street Corporation

  • White Papers // Dec 2012

    Towards Experimental Evaluation of Software-Defined Underwater Networked Systems

    In this paper, the authors present their ongoing work on developing a reconfigurable underwater networking testbed based on the Teledyne Benthos Telesonar SM-75 modem. The testbed is designed with the objective of allowing researchers and developers to advance research activities in the field of underwater networking and communications through a...

    Provided By State Street Corporation

  • White Papers // Sep 2012

    MemX: Virtualization of Cluster-wide Memory

    High-performance, cloud, and enterprise computing environments increasingly use virtualization to improve the utilization efficiency of their computing, storage, and network resources. Applications that execute within Virtual Machines (VMs) often tend to be data-intensive and latency-sensitive in nature. The I/O and memory requirements of such VMs can easily exceed the limited...

    Provided By State Street Corporation

  • White Papers // Aug 2012

    An OFDM-Based Distributed Transmission Scheme for Uncoordinated Transmitters Without Carrier Frequency and Timing Synchronization

    Distributed transmission involving multiple uncoordinated transmitters has become a popular subject in wireless communications, such as cooperative transmissions, relaying, distributed MIMO, network coding, multi-access and multiuser detection. One of the major challenges for implementing distributed transmissions is the difficulty of synchronizing carrier frequency and timing of the distributed transmitters. In...

    Provided By State Street Corporation

  • White Papers // Aug 2012

    Secure Proactive Recovery - a Hardware Based Mission Assurance Scheme

    Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to fault-tolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system...

    Provided By State Street Corporation

  • White Papers // May 2012

    Joint Transceiver Beamforming Design and Power Allocation for Multiuser MIMO Systems

    Multi-User Multiple Input Multiple Output (MUMIMO) system is an excellent choice for the next generation broadband communications because of its great potential in enhancing MIMO system capacity. One major challenge of such system is the jointly optimal transceiver beamforming design that maximizes the sum capacity under a total power constraint....

    Provided By State Street Corporation

  • White Papers // May 2012

    On the Extraction of Spread-Spectrum Hidden Data in Digital Media

    This paper considers the problem of blindly extracting data embedded over a wide band in a spectrum (transform) domain of a digital medium (image, audio, video). The authors first develop a Multi-signature Iterative Generalized Least-Squares (MIGLS) core procedure to seek unknown data hidden in hosts via multi-signature direct-sequence spread-spectrum embedding....

    Provided By State Street Corporation

  • White Papers // May 2012

    Anti-Jamming Performance of Cognitive Radio Networks Under Multiple Uncoordinated Jammers in Fading Environment

    Cognitive Radio Networks (CRN) has attracted great attention recently as a means to resolve the critical spectrum shortage problem. With Dynamic Spectrum Access (DSA) techniques, CRN can be granted access of spectrum secondarily, i.e., as long as it can guarantee no interference to any Primary User (PU) who is using...

    Provided By State Street Corporation

  • White Papers // Apr 2012

    Supporting Preemptive Task Executions and Memory Copies in GPGPUs

    GPGPUs (General Purpose Graphic Processing Units) provide massive computational power. However, applying GPGPU technology to real-time computing is challenging due to the non-preemptive nature of GPGPUs. Especially, a job running in a GPGPU or a data copy between a GPGPU and CPU is non-preemptive. As a result, a high priority...

    Provided By State Street Corporation

  • White Papers // Mar 2012

    Uniquely Decodable Code-Division Via Augmented Sylvester-Hadamard Matrices

    The authors consider the problem of designing binary antipodal uniquely decodable (errorless) code sets for overloaded code-division multiplexing applications where the number of signals K is larger than the code length L. Their proposed errorless code set design aims at identifying the maximum number of columns that can be potentially...

    Provided By State Street Corporation

  • White Papers // Feb 2012

    A Predictive-Reactive Method for Improving the Robustness of Real-Time Data Services

    Supporting timely data services using fresh data in data-intensive real-time applications, such as e-commerce and transportation management, is desirable but challenging, since the workload may vary dynamically. To control the data service delay to be below the specified threshold, the authors develop a predictive as well as reactive method for...

    Provided By State Street Corporation

  • White Papers // Nov 2011

    Explicit Coordination to Prevent Congestion in Data Center Networks

    Large cluster-based cloud computing platforms increasingly use commodity Ethernet technologies, such as Gigabit Ethernet, 10GigE, and Fibre Channel over Ethernet (FCoE), for intra-cluster communication. Traffic congestion can become a performance concern in the Ethernet due to consolidation of data, storage, and control traffic over a common layer-2 fabric, as well...

    Provided By State Street Corporation

  • White Papers // Aug 2011

    Minimum Cost Optimization of MulticastWireless Networks With Network Coding

    Minimum cost optimization for multicast with network coding has attracted great research interests. In this paper, based on an information model that differentiates intermediate nodes in a multicast network into network coding, routing or replicating nodes, a method is developed to solve the minimum energy cost multicast problem in wireless...

    Provided By State Street Corporation

  • White Papers // Feb 2011

    Anti-Jamming Performance of Cognitive Radio Networks

    In this paper, the authors study both the jamming capability of the cognitive-radio-based jammers and the anti-jamming capability of the cognitive radio networks. They first setup the models of cognitive-radio-based jammers and the cognitive radio network transmissions. They then analyze various jamming attack strategies where the jammer spends various powers...

    Provided By State Street Corporation

  • White Papers // Feb 2011

    Task Allocation for Minimum System Power in a Homogenous Multi-Core Processor

    In this paper, the authors address the impact of task allocation to the system power consumption of a homogenous multi-core processor with a main focus on its impact on the leakage power and fan power. Although the leakage power is determined by the average die temperature and the fan power...

    Provided By State Street Corporation

  • White Papers // Sep 2010

    Recent Developments on Applying Biometrics in Cryptography

    Biometrics is an identification technology widely used in physical access control and forensics. Cryptography is the science for information security. People generally agreed that biometric information needs to be protected with cryptography. Many researchers also believe that biometrics can enhance the security of cryptography. In this paper, the author have...

    Provided By State Street Corporation

  • White Papers // Aug 2010

    Accurate Modeling and Prediction of Energy Availability in Energy Harvesting Real-Time Embedded Systems

    Energy availability is the primary subject that drives the research innovations in energy harvesting systems. In this paper, the authors first propose a novel concept of effective energy dissipation that defines a unique quantity to accurately quantify the energy dissipation of the system by including not only the energy demand...

    Provided By State Street Corporation

  • White Papers // Nov 2009

    Estimating and Enhancing Real-Time Data Service Delays: Control Theoretic Approaches

    It is essential to process real-time data service requests such as stock quotes and trade transactions in a timely manner using fresh data, which represent the current real world phenomena such as the stock market status. Users may simply leave when the database service delay is excessive. Also, temporally inconsistent...

    Provided By State Street Corporation

  • White Papers // Sep 2009

    IT Governance Practices in Small and Medium-Sized Enterprises: Recommendations From an Empirical Study

    Much has been learned through IT governance research about the nature of IT related decisions, the location of decision rights for these decisions, and governance mechanisms applied to facilitate associated decision processes in large organizations. The authors' knowledge about IT governance structures in Small and Medium-sized Enterprises (SME), on the...

    Provided By State Street Corporation

  • White Papers // Jan 2009

    A Frequency Hopping Spread Spectrum Transmission Scheme for Uncoordinated Cognitive Radios

    One of the major challenges to cognitive radios is the synchronization of distributed radios onto the same spectrum white spaces which vary in time and space. In this paper, the authors propose a frequency-hopping spread spectrum transmission scheme which works reliably without any a priori handshaking assumption. Each cognitive radio...

    Provided By State Street Corporation

  • White Papers // Sep 2007

    Chronos: Feedback Control of a Real Database System Performance

    It is challenging to process transactions in a timely fashion using fresh data, e.g., current stock prices, since database workloads may considerably vary due to dynamic data/resource contention. Further, transaction timeliness and data freshness requirements may compete for system resources. In this paper, the authors propose a novel feedback control...

    Provided By State Street Corporation

  • White Papers // Aug 2007

    Symmetric Hash Functions for Secure Fingerprint Biometric Systems

    Securing biometrics databases from being compromised is an important research challenge that must be overcome in order to support widespread use of biometrics based authentication. In this paper, the authors present a novel method for securing fingerprints by hashing the fingerprint minutia and performing matching in the hash space. Their...

    Provided By State Street Corporation

  • White Papers // Jan 2007

    Resource-Aware High Performance Scheduling for Embedded MPSoCs with the Application of MPEG Decoding

    Multiprocessor System-on-Chip (MPSoC) platform has become more and more popular in the design of embedded systems. Due to the parallel architecture, the MPSoC provides significant performance improvement compared with the traditional single processor. In this paper, the authors propose a scheduling algorithm to minimize the resource contentions and the processing...

    Provided By State Street Corporation

  • White Papers // Dec 2006

    An Adaptive Algorithm for Information Dissemination in Self-Organizing Grids

    Effective scheduling in large-scale computational grids is challenging because it requires tracking the dynamic state of the large number of distributed resources that comprise the grid. Classical distributed information dissemination approaches such as push, pull, and their combinations, are not well suited to the problem of resource tracking, where resources...

    Provided By State Street Corporation

  • White Papers // Aug 2006

    Task Merging for Dynamic Power Management of Cyclic Applications in Real-Time Multiprocessor Systems

    In this paper, the authors propose the method of task merging and idle period clustering for Dynamic Power Management (DPM) in a real-time system with multiple processing elements. They show that with good task scheduling, the energy and delay overheads due to power mode switching can be reduced significantly, while...

    Provided By State Street Corporation

  • White Papers // Jan 2006

    A 3D Facial Expression Database for Facial Behavior Research

    Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations. Although 3D modeling techniques have been extensively used for 3D face recognition and 3D face animation, barely any research on 3D facial expression recognition...

    Provided By State Street Corporation

  • White Papers // Aug 2011

    Minimum Cost Optimization of MulticastWireless Networks With Network Coding

    Minimum cost optimization for multicast with network coding has attracted great research interests. In this paper, based on an information model that differentiates intermediate nodes in a multicast network into network coding, routing or replicating nodes, a method is developed to solve the minimum energy cost multicast problem in wireless...

    Provided By State Street Corporation

  • White Papers // Feb 2011

    Anti-Jamming Performance of Cognitive Radio Networks

    In this paper, the authors study both the jamming capability of the cognitive-radio-based jammers and the anti-jamming capability of the cognitive radio networks. They first setup the models of cognitive-radio-based jammers and the cognitive radio network transmissions. They then analyze various jamming attack strategies where the jammer spends various powers...

    Provided By State Street Corporation

  • White Papers // May 2012

    Anti-Jamming Performance of Cognitive Radio Networks Under Multiple Uncoordinated Jammers in Fading Environment

    Cognitive Radio Networks (CRN) has attracted great attention recently as a means to resolve the critical spectrum shortage problem. With Dynamic Spectrum Access (DSA) techniques, CRN can be granted access of spectrum secondarily, i.e., as long as it can guarantee no interference to any Primary User (PU) who is using...

    Provided By State Street Corporation

  • White Papers // Jan 2009

    A Frequency Hopping Spread Spectrum Transmission Scheme for Uncoordinated Cognitive Radios

    One of the major challenges to cognitive radios is the synchronization of distributed radios onto the same spectrum white spaces which vary in time and space. In this paper, the authors propose a frequency-hopping spread spectrum transmission scheme which works reliably without any a priori handshaking assumption. Each cognitive radio...

    Provided By State Street Corporation

  • White Papers // Aug 2012

    An OFDM-Based Distributed Transmission Scheme for Uncoordinated Transmitters Without Carrier Frequency and Timing Synchronization

    Distributed transmission involving multiple uncoordinated transmitters has become a popular subject in wireless communications, such as cooperative transmissions, relaying, distributed MIMO, network coding, multi-access and multiuser detection. One of the major challenges for implementing distributed transmissions is the difficulty of synchronizing carrier frequency and timing of the distributed transmitters. In...

    Provided By State Street Corporation

  • White Papers // Feb 2012

    A Predictive-Reactive Method for Improving the Robustness of Real-Time Data Services

    Supporting timely data services using fresh data in data-intensive real-time applications, such as e-commerce and transportation management, is desirable but challenging, since the workload may vary dynamically. To control the data service delay to be below the specified threshold, the authors develop a predictive as well as reactive method for...

    Provided By State Street Corporation

  • White Papers // Nov 2009

    Estimating and Enhancing Real-Time Data Service Delays: Control Theoretic Approaches

    It is essential to process real-time data service requests such as stock quotes and trade transactions in a timely manner using fresh data, which represent the current real world phenomena such as the stock market status. Users may simply leave when the database service delay is excessive. Also, temporally inconsistent...

    Provided By State Street Corporation

  • White Papers // Apr 2012

    Supporting Preemptive Task Executions and Memory Copies in GPGPUs

    GPGPUs (General Purpose Graphic Processing Units) provide massive computational power. However, applying GPGPU technology to real-time computing is challenging due to the non-preemptive nature of GPGPUs. Especially, a job running in a GPGPU or a data copy between a GPGPU and CPU is non-preemptive. As a result, a high priority...

    Provided By State Street Corporation

  • White Papers // Dec 2012

    Towards Experimental Evaluation of Software-Defined Underwater Networked Systems

    In this paper, the authors present their ongoing work on developing a reconfigurable underwater networking testbed based on the Teledyne Benthos Telesonar SM-75 modem. The testbed is designed with the objective of allowing researchers and developers to advance research activities in the field of underwater networking and communications through a...

    Provided By State Street Corporation

  • White Papers // Sep 2009

    IT Governance Practices in Small and Medium-Sized Enterprises: Recommendations From an Empirical Study

    Much has been learned through IT governance research about the nature of IT related decisions, the location of decision rights for these decisions, and governance mechanisms applied to facilitate associated decision processes in large organizations. The authors' knowledge about IT governance structures in Small and Medium-sized Enterprises (SME), on the...

    Provided By State Street Corporation

  • White Papers // Aug 2007

    Symmetric Hash Functions for Secure Fingerprint Biometric Systems

    Securing biometrics databases from being compromised is an important research challenge that must be overcome in order to support widespread use of biometrics based authentication. In this paper, the authors present a novel method for securing fingerprints by hashing the fingerprint minutia and performing matching in the hash space. Their...

    Provided By State Street Corporation

  • White Papers // Sep 2010

    Recent Developments on Applying Biometrics in Cryptography

    Biometrics is an identification technology widely used in physical access control and forensics. Cryptography is the science for information security. People generally agreed that biometric information needs to be protected with cryptography. Many researchers also believe that biometrics can enhance the security of cryptography. In this paper, the author have...

    Provided By State Street Corporation

  • White Papers // Jan 2014

    Systematic Security and Timeliness Trade-Offs in Real-Time Embedded Systems

    Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, it is required to meet not only real-time but also security requirements. It is essential to meet as many deadlines as possible, e.g., to avoid a power outage or...

    Provided By State Street Corporation

  • White Papers // Sep 2007

    Chronos: Feedback Control of a Real Database System Performance

    It is challenging to process transactions in a timely fashion using fresh data, e.g., current stock prices, since database workloads may considerably vary due to dynamic data/resource contention. Further, transaction timeliness and data freshness requirements may compete for system resources. In this paper, the authors propose a novel feedback control...

    Provided By State Street Corporation

  • White Papers // Jan 2006

    A 3D Facial Expression Database for Facial Behavior Research

    Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations. Although 3D modeling techniques have been extensively used for 3D face recognition and 3D face animation, barely any research on 3D facial expression recognition...

    Provided By State Street Corporation

  • White Papers // Aug 2012

    Secure Proactive Recovery - a Hardware Based Mission Assurance Scheme

    Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to fault-tolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system...

    Provided By State Street Corporation

  • White Papers // Nov 2013

    Flexible Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is typically used to enforce structure in the solution as, for example, in Lasso problems. Their framework is very flexible and includes both...

    Provided By State Street Corporation

  • White Papers // Aug 2006

    Task Merging for Dynamic Power Management of Cyclic Applications in Real-Time Multiprocessor Systems

    In this paper, the authors propose the method of task merging and idle period clustering for Dynamic Power Management (DPM) in a real-time system with multiple processing elements. They show that with good task scheduling, the energy and delay overheads due to power mode switching can be reduced significantly, while...

    Provided By State Street Corporation

  • White Papers // Aug 2010

    Accurate Modeling and Prediction of Energy Availability in Energy Harvesting Real-Time Embedded Systems

    Energy availability is the primary subject that drives the research innovations in energy harvesting systems. In this paper, the authors first propose a novel concept of effective energy dissipation that defines a unique quantity to accurately quantify the energy dissipation of the system by including not only the energy demand...

    Provided By State Street Corporation

  • White Papers // Feb 2011

    Task Allocation for Minimum System Power in a Homogenous Multi-Core Processor

    In this paper, the authors address the impact of task allocation to the system power consumption of a homogenous multi-core processor with a main focus on its impact on the leakage power and fan power. Although the leakage power is determined by the average die temperature and the fan power...

    Provided By State Street Corporation

  • White Papers // Jan 2007

    Resource-Aware High Performance Scheduling for Embedded MPSoCs with the Application of MPEG Decoding

    Multiprocessor System-on-Chip (MPSoC) platform has become more and more popular in the design of embedded systems. Due to the parallel architecture, the MPSoC provides significant performance improvement compared with the traditional single processor. In this paper, the authors propose a scheduling algorithm to minimize the resource contentions and the processing...

    Provided By State Street Corporation

  • White Papers // Dec 2006

    An Adaptive Algorithm for Information Dissemination in Self-Organizing Grids

    Effective scheduling in large-scale computational grids is challenging because it requires tracking the dynamic state of the large number of distributed resources that comprise the grid. Classical distributed information dissemination approaches such as push, pull, and their combinations, are not well suited to the problem of resource tracking, where resources...

    Provided By State Street Corporation

  • White Papers // May 2012

    Joint Transceiver Beamforming Design and Power Allocation for Multiuser MIMO Systems

    Multi-User Multiple Input Multiple Output (MUMIMO) system is an excellent choice for the next generation broadband communications because of its great potential in enhancing MIMO system capacity. One major challenge of such system is the jointly optimal transceiver beamforming design that maximizes the sum capacity under a total power constraint....

    Provided By State Street Corporation

  • White Papers // May 2012

    On the Extraction of Spread-Spectrum Hidden Data in Digital Media

    This paper considers the problem of blindly extracting data embedded over a wide band in a spectrum (transform) domain of a digital medium (image, audio, video). The authors first develop a Multi-signature Iterative Generalized Least-Squares (MIGLS) core procedure to seek unknown data hidden in hosts via multi-signature direct-sequence spread-spectrum embedding....

    Provided By State Street Corporation

  • White Papers // Mar 2012

    Uniquely Decodable Code-Division Via Augmented Sylvester-Hadamard Matrices

    The authors consider the problem of designing binary antipodal uniquely decodable (errorless) code sets for overloaded code-division multiplexing applications where the number of signals K is larger than the code length L. Their proposed errorless code set design aims at identifying the maximum number of columns that can be potentially...

    Provided By State Street Corporation

  • White Papers // Nov 2011

    Explicit Coordination to Prevent Congestion in Data Center Networks

    Large cluster-based cloud computing platforms increasingly use commodity Ethernet technologies, such as Gigabit Ethernet, 10GigE, and Fibre Channel over Ethernet (FCoE), for intra-cluster communication. Traffic congestion can become a performance concern in the Ethernet due to consolidation of data, storage, and control traffic over a common layer-2 fabric, as well...

    Provided By State Street Corporation

  • White Papers // Sep 2012

    MemX: Virtualization of Cluster-wide Memory

    High-performance, cloud, and enterprise computing environments increasingly use virtualization to improve the utilization efficiency of their computing, storage, and network resources. Applications that execute within Virtual Machines (VMs) often tend to be data-intensive and latency-sensitive in nature. The I/O and memory requirements of such VMs can easily exceed the limited...

    Provided By State Street Corporation

  • White Papers // Aug 2013

    An Application-Level Approach for Privacy-preserving Virtual Machine Checkpointing

    Virtualization has been widely adopted in recent years in the cloud computing platform to improve server consolidation and reduce operating cost. Virtual Machine (VM) checkpointing refers to the act of saving a persistent snapshot (or checkpoint) of a VM's state at any instant. VM checkpointing can drastically prolong the lifetime...

    Provided By State Street Corporation