State University of New York

Displaying 1-28 of 28 results

  • White Papers // Jan 2012

    Hierarchical Partitioning Techniques for Structured Adaptive Mesh Refinement (SAMR) Applications

    This paper presents the design and preliminary evaluation of hierarchical partitioning and load-balancing techniques for distributed Structured Adaptive Mesh Refinement (SAMR) applications. The overall goal of these techniques is to enable the load distribution to reflect the state of the adaptive grid hierarchy and exploit it to reduce synchronization requirements,...

    Provided By State University of New York

  • White Papers // Jan 2012

    Distributed Pre-Processing of Data on Networks of Berkeley Motes Using Non-Parametric EM

    Inexpensive sensor networks, such as those constructed using Berkeley motes, record many missing or absurd values due to low battery levels, transmission errors, sensor device errors and node failures. However, many mining algorithms do not easily handle data with missing values and the mining literature illustrates that removing records with...

    Provided By State University of New York

  • White Papers // Dec 2011

    Dynamic and Invisible Messaging for Visual MIMO

    The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the term MIMO is used for multiple-input multiple-output where the multiple-input component is a set of radio transmitters and the multiple-output component is a set of...

    Provided By State University of New York

  • White Papers // Oct 2011

    A Federated Approach for Increasing the Timely Throughput of Real-Time Data Services

    As the demand for real-time data services (e.g., E-commerce or online auctions) increases, it is desired for a real-time database to increase the timely throughput - the amount of data processed in a timely manner. As the timely throughput of a centralized real-time database is limited, it is desired to...

    Provided By State University of New York

  • White Papers // Jul 2011

    On Designing Truthful Spectrum Auctions for Variable Bandwidths

    Dynamic spectrum auctions have been considered a promising approach to effectively re-distribute spectrum resources in the secondary spectrum market. However, the existing spectrum auctions are limited to allocating spectrum in units of channels. Recently software defined radio technologies make exciting progress in operating radios with variable bandwidths. They push the...

    Provided By State University of New York

  • White Papers // May 2011

    The HybrEx Model for Confidentiality and Privacy in Cloud Computing

    This paper proposes a new execution model for confidentiality and privacy in cloud computing, called the HybrEx (Hybrid Execution) model. The HybrEx model provides a seamless way for an organization to utilize their own infrastructure for sensitive, private data and computation, while integrating public clouds for nonsensitive, public data and...

    Provided By State University of New York

  • White Papers // Jan 2011

    Link Characteristics Aware Wireless Protocol Design

    Wireless networks are very different from wired networks. The nature of the medium strongly impacts performance of protocols at different levels of the protocol stack. Also, wireless networks offer greater control and flexibility as several network parameters such as topology, coverage and link rate can be controlled. Hence, the traditional...

    Provided By State University of New York

  • White Papers // Jan 2011

    Performance Optimizations for Deploying VoIP Services in Mesh Networks

    In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same VoIP service poses new challenges when deployed over a wireless mesh network while enabling users to make voice calls using WiFi phones. Packet...

    Provided By State University of New York

  • White Papers // Oct 2010

    Model and Protocol for Energy Efficient Routing Over Mobile Ad Hoc Networks

    Many minimum energy (energy efficient) routing protocols have been proposed in recent years. However, very limited effort has been made in studying routing overhead, route setup time, and route maintenance issues associated with these protocols. Without a careful design, an energy efficient routing protocol can perform much worse than a...

    Provided By State University of New York

  • White Papers // Sep 2010

    Cognitive Code-Division Channelization With Blind Primary-System Identification

    The authors consider the problem of cognitive code-division channelization (simultaneous power and code-channel allocation) for secondary transmission links co-existing with an unknown primary Code-Division Multiple-Access (CDMA) system. They first develop a blind primary-user identification scheme to detect the binary code sequences (signatures) utilized by primary users. To create a secondary...

    Provided By State University of New York

  • White Papers // Aug 2010

    Hop-by-Hop Congestion Control and Load Balancing in Wireless Sensor Networks

    Due to the relatively high node density and source-to-sink communication pattern, Wireless Sensor Networks (WSNs) are subject to congestion and packet losses. Further, the availability of low-cost hardware, such as Cyclops cameras, is promoting wireless multimedia sensing to support, for example, visual surveillance. As a result, congestion control is becoming...

    Provided By State University of New York

  • White Papers // Jul 2010

    On Designing Truthful and Optimal Spectrum Assignment Mechanisms for Dynamic Spectrum Access

    With the advances of cognitive radio technologies, Dynamic Spectrum Access (DSA) has received increasing attention. For dynamic spectrum access, a good spectrum assignment algorithm often considers the spectrum demands of different devices and assigns contiguous and variable bandwidth to them. However, if the DSA devices at a location belong to...

    Provided By State University of New York

  • White Papers // Jul 2010

    A Survey of Virtualization Technologies With Performance Testing

    Virtualization has rapidly become a go-to technology for increasing efficiency in the data center. With virtualization technologies providing tremendous flexibility, even disparate architectures may be deployed on a single machine without interference. Awareness of limitations and requirements of physical hosts to be used for virtualization is important. This paper reviews...

    Provided By State University of New York

  • White Papers // Jun 2010

    A Multi-Staged Approach to Risk Management in IT Software Implementation

    Software implementations in organizations are highly complex undertakings with non-trivial risk implications pertaining to data, applications and other resources. This research in progress paper presents two-tiered approach to managing risk over a multi-staged implementation. As an example, the authors use the application area of Single Sign-on (SSO) whereby a user...

    Provided By State University of New York

  • White Papers // May 2010

    Do Small IT Firms Benefit From Higher Process Capability?

    Small businesses are the lifeblood of the U.S. Information Technology (IT) sector, with small IT providers accounting for approximately 80% of the IT jobs in the country. No longer shielded from the global marketplace, small IT providers must contend with competition from overseas companies. Further, this competition is not limited...

    Provided By State University of New York

  • White Papers // May 2010

    C-DMRC: Compressive Distortion-Minimizing Rate Control for Wireless Multimedia Sensor Networks

    This paper investigates the potential of the Compressed Sensing (CS) paradigm for video streaming in wireless multimedia sensor networks. The objective is to co-design a low-complexity video encoder based on compressed sensing and a rate-adaptive streaming protocol for wireless video transmission. The proposed rate control scheme is designed with the...

    Provided By State University of New York

  • White Papers // Nov 2009

    Using XML for Web Site Management

    As government Web sites grow in size and complexity, it is important for agencies to develop sounder approaches to Web site management and publication processes. Poor public image, prohibitive maintenance costs, lack of consistency, and limited capacity to provide multiple formats are just some of the problems that many government...

    Provided By State University of New York

  • White Papers // Oct 2009

    ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks

    Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where local spectrum resources may change from time to time and hop-by-hop. For this reason, a crosslayer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, called ROSA (Routing and Spectrum Allocation...

    Provided By State University of New York

  • White Papers // Oct 2009

    Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices

    Data security is one of the major challenges that prevent the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to protect private and sensitive data stored in these devices due to the limited resources and computing power, particularly when they fall in the hand...

    Provided By State University of New York

  • White Papers // Oct 2009

    Dense and Symmetric Graph Formulation and Generation for Wireless Information Networks

    Dense and symmetric graphs are useful for modeling fast information distribution in wireless information networks. In this paper, the authors focus on a specific family of dense and symmetric graphs, the Borel Cayley graphs. More specifically, they investigate the various parameters in the original formulation of Borel Cayley graphs defined...

    Provided By State University of New York

  • White Papers // Oct 2009

    LASE: Latency Aware Simple Encryption for Embedded Systems Security

    Security in the area of embedded systems has been drawing enormous attention lately. Although recent advances in hardware based security models have shown promise for faster and more reliable security solutions, particular characteristics of embedded systems, such as computation and energy constraints, pose a unique challenge for the security researchers...

    Provided By State University of New York

  • White Papers // Aug 2009

    Comparison of ROC and Likelihood Decision Methods in Automatic Fingerprint Verification

    The biometric verification task is to determine whether or not an input and a template belong to the same individual. In the context of automatic fingerprint verification the task consists of three steps: Feature extraction, where features (typically minutiae) are extracted from each fingerprint, scoring, where the degree of match...

    Provided By State University of New York

  • White Papers // Aug 2009

    Interference Across Multi-Hop Wireless Chains

    Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher layer protocols. This paper examines the problem of how MAC level interactions influence chain behavior in a general multi-hop wireless network where multiple chains coexist. The...

    Provided By State University of New York

  • White Papers // Aug 2009

    Disjunctive Databases for Representing Repairs

    This paper addresses the problem of representing the set of repairs of a possibly inconsistent database by means of a disjunctive database. Specifically, the class of denial constraints is considered. The authors show that, given a database and a set of denial constraints, there exists a (unique) disjunctive database, called...

    Provided By State University of New York

  • White Papers // Jul 2009

    Pseudo-Random Graphs for Fast Consensus Protocol

    In this paper, the authors focus on the design of network topology to achieve fast information distribution. They present the information distribution performance of Borel-Cayley graphs, a family of pseudo-random graphs, is far superior than that of other well-known graph families. To demonstrate the effectiveness of this pseudo-random approach, they...

    Provided By State University of New York

  • White Papers // Jan 2009

    Distributed Neighborhood Admission Code Assignment for Mobile Ad Hoc Networks

    CDMA has proven to be a superior technology for wireless communication in cellular environments. However, it has not been fully exploited in ad hoc networks; several key challenges have to be resolved to enable distributed CDMA operation. One of the key challenges is distributed code assignment: how to assign codes...

    Provided By State University of New York

  • White Papers // Dec 2008

    Generative Models for Fingerprint Individuality Using Ridge Models

    Generative models of pattern individuality attempt to learn the distribution of observed quantitative features to determine the probability of two random patterns being the same. Considering fingerprint patterns, Gaussian distributions have been previously used for minutiae location and von-Mises distributions for minutiae orientation so as to determine the Probability of...

    Provided By State University of New York

  • White Papers // Dec 2008

    Equity Issuance And Dividend Policy under Commitment: Work in Progress

    This paper studies a model of corporate finance in which firms use stock issuance to finance investment. The authors assume that the firm is "Rational" and therefore recognizes the relationship between future dividends and stock prices. Under this assumption, future variables enter in the constraints of the firm, so that...

    Provided By State University of New York

  • White Papers // Jan 2009

    Distributed Neighborhood Admission Code Assignment for Mobile Ad Hoc Networks

    CDMA has proven to be a superior technology for wireless communication in cellular environments. However, it has not been fully exploited in ad hoc networks; several key challenges have to be resolved to enable distributed CDMA operation. One of the key challenges is distributed code assignment: how to assign codes...

    Provided By State University of New York

  • White Papers // Oct 2009

    LASE: Latency Aware Simple Encryption for Embedded Systems Security

    Security in the area of embedded systems has been drawing enormous attention lately. Although recent advances in hardware based security models have shown promise for faster and more reliable security solutions, particular characteristics of embedded systems, such as computation and energy constraints, pose a unique challenge for the security researchers...

    Provided By State University of New York

  • White Papers // Oct 2009

    Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices

    Data security is one of the major challenges that prevent the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to protect private and sensitive data stored in these devices due to the limited resources and computing power, particularly when they fall in the hand...

    Provided By State University of New York

  • White Papers // Nov 2009

    Using XML for Web Site Management

    As government Web sites grow in size and complexity, it is important for agencies to develop sounder approaches to Web site management and publication processes. Poor public image, prohibitive maintenance costs, lack of consistency, and limited capacity to provide multiple formats are just some of the problems that many government...

    Provided By State University of New York

  • White Papers // Dec 2008

    Equity Issuance And Dividend Policy under Commitment: Work in Progress

    This paper studies a model of corporate finance in which firms use stock issuance to finance investment. The authors assume that the firm is "Rational" and therefore recognizes the relationship between future dividends and stock prices. Under this assumption, future variables enter in the constraints of the firm, so that...

    Provided By State University of New York

  • White Papers // Oct 2009

    ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks

    Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where local spectrum resources may change from time to time and hop-by-hop. For this reason, a crosslayer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, called ROSA (Routing and Spectrum Allocation...

    Provided By State University of New York

  • White Papers // May 2010

    Do Small IT Firms Benefit From Higher Process Capability?

    Small businesses are the lifeblood of the U.S. Information Technology (IT) sector, with small IT providers accounting for approximately 80% of the IT jobs in the country. No longer shielded from the global marketplace, small IT providers must contend with competition from overseas companies. Further, this competition is not limited...

    Provided By State University of New York

  • White Papers // Jun 2010

    A Multi-Staged Approach to Risk Management in IT Software Implementation

    Software implementations in organizations are highly complex undertakings with non-trivial risk implications pertaining to data, applications and other resources. This research in progress paper presents two-tiered approach to managing risk over a multi-staged implementation. As an example, the authors use the application area of Single Sign-on (SSO) whereby a user...

    Provided By State University of New York

  • White Papers // Jul 2010

    A Survey of Virtualization Technologies With Performance Testing

    Virtualization has rapidly become a go-to technology for increasing efficiency in the data center. With virtualization technologies providing tremendous flexibility, even disparate architectures may be deployed on a single machine without interference. Awareness of limitations and requirements of physical hosts to be used for virtualization is important. This paper reviews...

    Provided By State University of New York

  • White Papers // Oct 2011

    A Federated Approach for Increasing the Timely Throughput of Real-Time Data Services

    As the demand for real-time data services (e.g., E-commerce or online auctions) increases, it is desired for a real-time database to increase the timely throughput - the amount of data processed in a timely manner. As the timely throughput of a centralized real-time database is limited, it is desired to...

    Provided By State University of New York

  • White Papers // Aug 2009

    Comparison of ROC and Likelihood Decision Methods in Automatic Fingerprint Verification

    The biometric verification task is to determine whether or not an input and a template belong to the same individual. In the context of automatic fingerprint verification the task consists of three steps: Feature extraction, where features (typically minutiae) are extracted from each fingerprint, scoring, where the degree of match...

    Provided By State University of New York

  • White Papers // Dec 2008

    Generative Models for Fingerprint Individuality Using Ridge Models

    Generative models of pattern individuality attempt to learn the distribution of observed quantitative features to determine the probability of two random patterns being the same. Considering fingerprint patterns, Gaussian distributions have been previously used for minutiae location and von-Mises distributions for minutiae orientation so as to determine the Probability of...

    Provided By State University of New York

  • White Papers // Aug 2009

    Disjunctive Databases for Representing Repairs

    This paper addresses the problem of representing the set of repairs of a possibly inconsistent database by means of a disjunctive database. Specifically, the class of denial constraints is considered. The authors show that, given a database and a set of denial constraints, there exists a (unique) disjunctive database, called...

    Provided By State University of New York

  • White Papers // Jan 2011

    Link Characteristics Aware Wireless Protocol Design

    Wireless networks are very different from wired networks. The nature of the medium strongly impacts performance of protocols at different levels of the protocol stack. Also, wireless networks offer greater control and flexibility as several network parameters such as topology, coverage and link rate can be controlled. Hence, the traditional...

    Provided By State University of New York

  • White Papers // May 2010

    C-DMRC: Compressive Distortion-Minimizing Rate Control for Wireless Multimedia Sensor Networks

    This paper investigates the potential of the Compressed Sensing (CS) paradigm for video streaming in wireless multimedia sensor networks. The objective is to co-design a low-complexity video encoder based on compressed sensing and a rate-adaptive streaming protocol for wireless video transmission. The proposed rate control scheme is designed with the...

    Provided By State University of New York

  • White Papers // Sep 2010

    Cognitive Code-Division Channelization With Blind Primary-System Identification

    The authors consider the problem of cognitive code-division channelization (simultaneous power and code-channel allocation) for secondary transmission links co-existing with an unknown primary Code-Division Multiple-Access (CDMA) system. They first develop a blind primary-user identification scheme to detect the binary code sequences (signatures) utilized by primary users. To create a secondary...

    Provided By State University of New York

  • White Papers // Jan 2011

    Performance Optimizations for Deploying VoIP Services in Mesh Networks

    In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same VoIP service poses new challenges when deployed over a wireless mesh network while enabling users to make voice calls using WiFi phones. Packet...

    Provided By State University of New York

  • White Papers // Oct 2010

    Model and Protocol for Energy Efficient Routing Over Mobile Ad Hoc Networks

    Many minimum energy (energy efficient) routing protocols have been proposed in recent years. However, very limited effort has been made in studying routing overhead, route setup time, and route maintenance issues associated with these protocols. Without a careful design, an energy efficient routing protocol can perform much worse than a...

    Provided By State University of New York

  • White Papers // May 2011

    The HybrEx Model for Confidentiality and Privacy in Cloud Computing

    This paper proposes a new execution model for confidentiality and privacy in cloud computing, called the HybrEx (Hybrid Execution) model. The HybrEx model provides a seamless way for an organization to utilize their own infrastructure for sensitive, private data and computation, while integrating public clouds for nonsensitive, public data and...

    Provided By State University of New York

  • White Papers // Jul 2011

    On Designing Truthful Spectrum Auctions for Variable Bandwidths

    Dynamic spectrum auctions have been considered a promising approach to effectively re-distribute spectrum resources in the secondary spectrum market. However, the existing spectrum auctions are limited to allocating spectrum in units of channels. Recently software defined radio technologies make exciting progress in operating radios with variable bandwidths. They push the...

    Provided By State University of New York

  • White Papers // Jul 2010

    On Designing Truthful and Optimal Spectrum Assignment Mechanisms for Dynamic Spectrum Access

    With the advances of cognitive radio technologies, Dynamic Spectrum Access (DSA) has received increasing attention. For dynamic spectrum access, a good spectrum assignment algorithm often considers the spectrum demands of different devices and assigns contiguous and variable bandwidth to them. However, if the DSA devices at a location belong to...

    Provided By State University of New York

  • White Papers // Oct 2009

    Dense and Symmetric Graph Formulation and Generation for Wireless Information Networks

    Dense and symmetric graphs are useful for modeling fast information distribution in wireless information networks. In this paper, the authors focus on a specific family of dense and symmetric graphs, the Borel Cayley graphs. More specifically, they investigate the various parameters in the original formulation of Borel Cayley graphs defined...

    Provided By State University of New York

  • White Papers // Jul 2009

    Pseudo-Random Graphs for Fast Consensus Protocol

    In this paper, the authors focus on the design of network topology to achieve fast information distribution. They present the information distribution performance of Borel-Cayley graphs, a family of pseudo-random graphs, is far superior than that of other well-known graph families. To demonstrate the effectiveness of this pseudo-random approach, they...

    Provided By State University of New York

  • White Papers // Jan 2012

    Hierarchical Partitioning Techniques for Structured Adaptive Mesh Refinement (SAMR) Applications

    This paper presents the design and preliminary evaluation of hierarchical partitioning and load-balancing techniques for distributed Structured Adaptive Mesh Refinement (SAMR) applications. The overall goal of these techniques is to enable the load distribution to reflect the state of the adaptive grid hierarchy and exploit it to reduce synchronization requirements,...

    Provided By State University of New York

  • White Papers // Jan 2012

    Distributed Pre-Processing of Data on Networks of Berkeley Motes Using Non-Parametric EM

    Inexpensive sensor networks, such as those constructed using Berkeley motes, record many missing or absurd values due to low battery levels, transmission errors, sensor device errors and node failures. However, many mining algorithms do not easily handle data with missing values and the mining literature illustrates that removing records with...

    Provided By State University of New York

  • White Papers // Dec 2011

    Dynamic and Invisible Messaging for Visual MIMO

    The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the term MIMO is used for multiple-input multiple-output where the multiple-input component is a set of radio transmitters and the multiple-output component is a set of...

    Provided By State University of New York

  • White Papers // Aug 2009

    Interference Across Multi-Hop Wireless Chains

    Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher layer protocols. This paper examines the problem of how MAC level interactions influence chain behavior in a general multi-hop wireless network where multiple chains coexist. The...

    Provided By State University of New York

  • White Papers // Aug 2010

    Hop-by-Hop Congestion Control and Load Balancing in Wireless Sensor Networks

    Due to the relatively high node density and source-to-sink communication pattern, Wireless Sensor Networks (WSNs) are subject to congestion and packet losses. Further, the availability of low-cost hardware, such as Cyclops cameras, is promoting wireless multimedia sensing to support, for example, visual surveillance. As a result, congestion control is becoming...

    Provided By State University of New York