Stevens Institute of Technology

Displaying 1-33 of 33 results

  • White Papers // Jan 2012

    Discrete Lyapunov Exponent and Differential Cryptanalysis

    Partly motivated by the developments in chaos-based block cipher design, a definition of the discrete Lyapunov exponent for an arbitrary permutation of a finite lattice was recently proposed. The authors explore the relation between the discrete Lyapunov exponent and the maximum differential probability of a bijective mapping (i.e., an S-box...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2012

    An Architecture for Secure Fault-Tolerant Global Applications

    Applications are increasingly being developed over the Internet, and Internet programming languages seek new abstractions for programming what is in effect a "Global computer." The characteristics of the evolving Internet environment have led to new ways of thinking about how to structure such global applications. The authors advocate a programming...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2011

    A Software Deployment Risk Assessment Heuristic for Use in a Rapidly-Changing Business-to-Consumer Web Environment

    In the 24/7 web industry, business owners can feel a constant need to push the latest and greatest software to the live site in order to remain competitive and ensure growth. However, the bottom line to the business must always be that the site is fully available and functional to...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2011

    Open Research Issues in Multi-Hop Cognitive Radio Networks

    Cognitive radio networks hold the key to achieving better radio bandwidth utilization and improving the quality of wireless applications. The next step in this fast emerging paradigm is the multi-hop cognitive radio network. Well designed multi-hop cognitive radio networks can provide high bandwidth efficiency by using dynamic spectrum access technologies...

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2011

    Generalized Learning Problems and Applications to Non-Commutative Cryptography

    The authors propose a generalization of the Learning Parity with Noise (LPN) and Learning With Errors (LWE) problems to an abstract class of group-theoretic learning problems that they term Learning Homomorphisms with Noise (LHN). This class of problems contains LPN and LWE as special cases, but is much more general....

    Provided By Stevens Institute of Technology

  • White Papers // Jun 2011

    SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster

    SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2011

    Trusting the Network

    Cryptography is often used to secure the secrecy and integrity of data, but its ubiquitous use (for example on every read and write of a program variable) is prohibitive. When protecting the secrecy and integrity of data, applications may choose to reply on the underlying runtime or network, or they...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2010

    Is Channel Fragmentation/Bonding in IEEE 802.22 Networks Secure?

    The authors address a unique security threat that arises due to channel fragmentation (or aggregation or bonding) in Dynamic Spectrum Access (DSA) based IEEE 802.22 networks. Typically, channel fragmentation, aggregation and bonding have been studied in the literature as a means to enhance the spectrum utilization. However, the loss of...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2010

    Abstractions for Fault Tolerant Global Computing

    Global computing (WAN programming, Internet programming) distinguishes itself from local computing (LAN computing) by the fact that it exposes some aspects of the network to the application, rather than seeking to hide them with network transparency, as in LAN programming. Global computing languages seek to provide useful abstractions for building...

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2010

    SpiderRadio: A Cognitive Radio Network With Commodity Hardware and Open Source Software

    In this paper, the authors present SpiderRadio a cognitive radio prototype for dynamic spectrum access networking. Spider-Radio is built using commodity IEEE 802.11a/b/g hardware and the open source MadWiFi driver. This helps one in developing and testing their prototype without having to buy and manage several licensed spectrum bands. They...

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2010

    New Advances on Privacy-Preserving Policy Reconciliation

    Entities define their own set of rules under which they are willing to collaborate, e.g., interact, share and exchange resources or information with others. Typically, these individual policies differ for different parties. Thus, collaboration requires the resolving of differences and reaching a consensus. This process is generally referred to as...

    Provided By Stevens Institute of Technology

  • White Papers // Apr 2010

    SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices

    Spectrum sensing is one of the critical features in cognitive radio based dynamic spectrum access networking. This paper discusses a new spectrum sensing technique for primary incumbent detection. The proposed method is based on observing the PHY errors, received signal strength and moving window averaging of the observed measurement. The...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    Ensuring Data Storage Security Against Frequency-Based Attacks in Wireless Networks

    As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges is how to store these data. To address this challenge, distributed data storage in wireless networks has attracted much attention recently, as it has major advantages over centralized approaches. To...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    A Performance Analysis for UMTS Packet Switched Network Based on Multivariate KPIs

    Mobile data services are penetrating mobile markets rapidly. The mobile industry relies heavily on data service to replace the traditional voice services with the evolution of the wireless technology and market. A reliable packet service network is critical to the mobile operators to maintain their core competence in data service...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    The Impact of Cell Site Re-Homing on the Performance of UMTS Core Networks

    Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio domain. This paper introduces the cell site re-homing in radio network...

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Information Flow Monitor Inlining

    In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use of JIT compilation makes it difficult to implement monitoring by modifying the language runtime system. An inliner avoids this problem and...

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

    The cognitive radio enabled IEEE 802.22 Wireless Regional Area Network (WRAN) is designed to opportunistically utilize the unused or under-utilized TV bands. However, due to the lack of proactive security protocols and proper interaction policies among the secondary networks themselves, the IEEE 802.22 networks are vulnerable to various Denial-of-Service (DoS)...

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Software Engineering Education (SEEd)

    This is the title of a paper by Jill Courte and Cathy Bishop-Clark from Miami University which appeared in the 2009 SIGCSE Technical Symposium on Computer Science Education. The main thrust of the paper is a study to determine how well students differentiate between the five major computing disciplines Computer...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2010

    A Multiobjective Optimization Framework for Routing in Wireless Ad Hoc Networks

    Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design tradeoffs in such networks. In this work, the authors address this problem by proposing a new modeling framework for routing in ad hoc networks,...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2010

    Distributed Discovery of Semantic Relationships

    The availability of large volumes of Semantic Web data has created the potential of discovering vast amount of knowledge, among which semantic relation discovery fundamentally changes the way the authors acquire and use knowledge. Due to the decentralized and distributed nature of Semantic Web development, semantic data tend to be...

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2009

    To Do or Not to Do: Metadata-guided Query Evaluation in Content Caching Networks

    To support emerging pervasive computer applications, efficient data access and information sharing is essential in mobile wireless environments. The data-centric storage approach provides energy-efficient data dissemination and organization. However, wireless devices have limited storage and are energy constrained. To address these issues, the authors introduce the concept of content caching...

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2009

    NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience Against Primary User Emulation Attacks

    The authors propose a distributed spectrum decision protocol resilient to Primary User Emulation Attacks (PUEA) in Dynamic Spectrum Access (DSA) networks. PUEA is a type of denial-of-service attack that can result in unreliable and/or disconnected DSA networks by depriving legitimate secondary users of spectrum access. They first propose an individual...

    Provided By Stevens Institute of Technology

  • White Papers // Nov 2009

    Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases

    Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of datamining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2009

    Hiding Distinguished Ones Into Crowd: Privacy-Preserving Publishing Data With Outliers

    Publishing microdata raises concerns of individual privacy. When there exist outlier records in the microdata, the distinguishability of the outliers enables their privacy to be easier to be compromised than that of regular ones. However, none of the existing anonymization techniques can provide sufficient protection to the privacy of the...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2009

    A Policy Framework for the Future Internet

    This paper is about the Internet's future, but the authors begin with its past. The history of network routing began as a topological problem: how does one find the shortest paths in a graph? However, with the advent of domain-based Internet routing, policy became an important consideration. In fact, policy...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2009

    On Adversarial Games in Dynamic Spectrum Access Networking Based Covert Timing Channels

    In this paper, the authors study tactical covert timing networks with dynamic spectrum access capability amidst adversaries. They present a two-tier game framework to model the attack-defense scenario. There are very few studies available in the literature on covert timing channels with multiple parallel transmissions. This paper presents a new...

    Provided By Stevens Institute of Technology

  • White Papers // Jun 2009

    Integrity Verification of Outsourced XML Databases

    Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verification. Two important issues of integrity verification are correctness and completeness. In this paper, the authors consider these two issues for outsourced XML databases. They...

    Provided By Stevens Institute of Technology

  • White Papers // May 2009

    Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks

    As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One of the approaches in data-centric storage is that the nodes that collected data will transfer their data to other neighboring nodes that store the similar...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2009

    Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks Using Hypothesis Testing

    The authors present a Neyman-Pearson Composite Hypothesis Test (NPCHT) and a Wald's Sequential Probability Ratio Test (WSPRT) to detect Primary User Emulation Attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2009

    Localizing Jammers in Wireless Networks

    Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource and to defend against radio interference....

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2008

    Towards Integrated Modeling Of Business Processes And Business Rules

    While business process models describe business operations in a procedural form, business rules are typically expressed in a declarative fashion. Previous studies have demonstrated that both approaches are complementary as they address distinct aspects of organizational practices. However, both approaches share areas of overlap that allow for the linkage of...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2008

    Real-Time Virtual Instruments for Remote Sensor Monitoring Using Low Bandwidth Wireless Networks

    The development of a peer-to-peer virtual instrumentation system for remote acquisition, analysis and transmission of data on low bandwidth networks is described. The objective of this system is to collect high frequency/high bandwidth data from multiple sensors placed at remote locations and adaptively adjust the resolution of this data so...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2008

    An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks

    In this paper, the authors study the Denial-of-Service (DoS) attack on secondary users in a cognitive radio network by Primary User Emulation (PUE). Most approaches in the literature on Primary User Emulation Attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2012

    Discrete Lyapunov Exponent and Differential Cryptanalysis

    Partly motivated by the developments in chaos-based block cipher design, a definition of the discrete Lyapunov exponent for an arbitrary permutation of a finite lattice was recently proposed. The authors explore the relation between the discrete Lyapunov exponent and the maximum differential probability of a bijective mapping (i.e., an S-box...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2008

    An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks

    In this paper, the authors study the Denial-of-Service (DoS) attack on secondary users in a cognitive radio network by Primary User Emulation (PUE). Most approaches in the literature on Primary User Emulation Attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2009

    Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks Using Hypothesis Testing

    The authors present a Neyman-Pearson Composite Hypothesis Test (NPCHT) and a Wald's Sequential Probability Ratio Test (WSPRT) to detect Primary User Emulation Attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are...

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2009

    NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience Against Primary User Emulation Attacks

    The authors propose a distributed spectrum decision protocol resilient to Primary User Emulation Attacks (PUEA) in Dynamic Spectrum Access (DSA) networks. PUEA is a type of denial-of-service attack that can result in unreliable and/or disconnected DSA networks by depriving legitimate secondary users of spectrum access. They first propose an individual...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2011

    A Software Deployment Risk Assessment Heuristic for Use in a Rapidly-Changing Business-to-Consumer Web Environment

    In the 24/7 web industry, business owners can feel a constant need to push the latest and greatest software to the live site in order to remain competitive and ensure growth. However, the bottom line to the business must always be that the site is fully available and functional to...

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

    The cognitive radio enabled IEEE 802.22 Wireless Regional Area Network (WRAN) is designed to opportunistically utilize the unused or under-utilized TV bands. However, due to the lack of proactive security protocols and proper interaction policies among the secondary networks themselves, the IEEE 802.22 networks are vulnerable to various Denial-of-Service (DoS)...

    Provided By Stevens Institute of Technology

  • White Papers // Nov 2009

    Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases

    Spurred by developments such as cloud computing, there has been considerable recent interest in the paradigm of datamining-as-service. A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server). However, both the items and the association rules of the...

    Provided By Stevens Institute of Technology

  • White Papers // Jun 2009

    Integrity Verification of Outsourced XML Databases

    Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verification. Two important issues of integrity verification are correctness and completeness. In this paper, the authors consider these two issues for outsourced XML databases. They...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2009

    Hiding Distinguished Ones Into Crowd: Privacy-Preserving Publishing Data With Outliers

    Publishing microdata raises concerns of individual privacy. When there exist outlier records in the microdata, the distinguishability of the outliers enables their privacy to be easier to be compromised than that of regular ones. However, none of the existing anonymization techniques can provide sufficient protection to the privacy of the...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2010

    Distributed Discovery of Semantic Relationships

    The availability of large volumes of Semantic Web data has created the potential of discovering vast amount of knowledge, among which semantic relation discovery fundamentally changes the way the authors acquire and use knowledge. Due to the decentralized and distributed nature of Semantic Web development, semantic data tend to be...

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2009

    To Do or Not to Do: Metadata-guided Query Evaluation in Content Caching Networks

    To support emerging pervasive computer applications, efficient data access and information sharing is essential in mobile wireless environments. The data-centric storage approach provides energy-efficient data dissemination and organization. However, wireless devices have limited storage and are energy constrained. To address these issues, the authors introduce the concept of content caching...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2009

    Localizing Jammers in Wireless Networks

    Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource and to defend against radio interference....

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2011

    Generalized Learning Problems and Applications to Non-Commutative Cryptography

    The authors propose a generalization of the Learning Parity with Noise (LPN) and Learning With Errors (LWE) problems to an abstract class of group-theoretic learning problems that they term Learning Homomorphisms with Noise (LHN). This class of problems contains LPN and LWE as special cases, but is much more general....

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Information Flow Monitor Inlining

    In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use of JIT compilation makes it difficult to implement monitoring by modifying the language runtime system. An inliner avoids this problem and...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2010

    Abstractions for Fault Tolerant Global Computing

    Global computing (WAN programming, Internet programming) distinguishes itself from local computing (LAN computing) by the fact that it exposes some aspects of the network to the application, rather than seeking to hide them with network transparency, as in LAN programming. Global computing languages seek to provide useful abstractions for building...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2011

    Trusting the Network

    Cryptography is often used to secure the secrecy and integrity of data, but its ubiquitous use (for example on every read and write of a program variable) is prohibitive. When protecting the secrecy and integrity of data, applications may choose to reply on the underlying runtime or network, or they...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2008

    Real-Time Virtual Instruments for Remote Sensor Monitoring Using Low Bandwidth Wireless Networks

    The development of a peer-to-peer virtual instrumentation system for remote acquisition, analysis and transmission of data on low bandwidth networks is described. The objective of this system is to collect high frequency/high bandwidth data from multiple sensors placed at remote locations and adaptively adjust the resolution of this data so...

    Provided By Stevens Institute of Technology

  • White Papers // Jun 2011

    SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster

    SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2010

    Is Channel Fragmentation/Bonding in IEEE 802.22 Networks Secure?

    The authors address a unique security threat that arises due to channel fragmentation (or aggregation or bonding) in Dynamic Spectrum Access (DSA) based IEEE 802.22 networks. Typically, channel fragmentation, aggregation and bonding have been studied in the literature as a means to enhance the spectrum utilization. However, the loss of...

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2010

    SpiderRadio: A Cognitive Radio Network With Commodity Hardware and Open Source Software

    In this paper, the authors present SpiderRadio a cognitive radio prototype for dynamic spectrum access networking. Spider-Radio is built using commodity IEEE 802.11a/b/g hardware and the open source MadWiFi driver. This helps one in developing and testing their prototype without having to buy and manage several licensed spectrum bands. They...

    Provided By Stevens Institute of Technology

  • White Papers // Sep 2009

    On Adversarial Games in Dynamic Spectrum Access Networking Based Covert Timing Channels

    In this paper, the authors study tactical covert timing networks with dynamic spectrum access capability amidst adversaries. They present a two-tier game framework to model the attack-defense scenario. There are very few studies available in the literature on covert timing channels with multiple parallel transmissions. This paper presents a new...

    Provided By Stevens Institute of Technology

  • White Papers // Aug 2011

    Open Research Issues in Multi-Hop Cognitive Radio Networks

    Cognitive radio networks hold the key to achieving better radio bandwidth utilization and improving the quality of wireless applications. The next step in this fast emerging paradigm is the multi-hop cognitive radio network. Well designed multi-hop cognitive radio networks can provide high bandwidth efficiency by using dynamic spectrum access technologies...

    Provided By Stevens Institute of Technology

  • White Papers // Oct 2009

    A Policy Framework for the Future Internet

    This paper is about the Internet's future, but the authors begin with its past. The history of network routing began as a topological problem: how does one find the shortest paths in a graph? However, with the advent of domain-based Internet routing, policy became an important consideration. In fact, policy...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2012

    An Architecture for Secure Fault-Tolerant Global Applications

    Applications are increasingly being developed over the Internet, and Internet programming languages seek new abstractions for programming what is in effect a "Global computer." The characteristics of the evolving Internet environment have led to new ways of thinking about how to structure such global applications. The authors advocate a programming...

    Provided By Stevens Institute of Technology

  • White Papers // May 2009

    Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks

    As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One of the approaches in data-centric storage is that the nodes that collected data will transfer their data to other neighboring nodes that store the similar...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    A Performance Analysis for UMTS Packet Switched Network Based on Multivariate KPIs

    Mobile data services are penetrating mobile markets rapidly. The mobile industry relies heavily on data service to replace the traditional voice services with the evolution of the wireless technology and market. A reliable packet service network is critical to the mobile operators to maintain their core competence in data service...

    Provided By Stevens Institute of Technology

  • White Papers // Feb 2010

    Software Engineering Education (SEEd)

    This is the title of a paper by Jill Courte and Cathy Bishop-Clark from Miami University which appeared in the 2009 SIGCSE Technical Symposium on Computer Science Education. The main thrust of the paper is a study to determine how well students differentiate between the five major computing disciplines Computer...

    Provided By Stevens Institute of Technology

  • White Papers // Apr 2010

    SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices

    Spectrum sensing is one of the critical features in cognitive radio based dynamic spectrum access networking. This paper discusses a new spectrum sensing technique for primary incumbent detection. The proposed method is based on observing the PHY errors, received signal strength and moving window averaging of the observed measurement. The...

    Provided By Stevens Institute of Technology

  • White Papers // Dec 2008

    Towards Integrated Modeling Of Business Processes And Business Rules

    While business process models describe business operations in a procedural form, business rules are typically expressed in a declarative fashion. Previous studies have demonstrated that both approaches are complementary as they address distinct aspects of organizational practices. However, both approaches share areas of overlap that allow for the linkage of...

    Provided By Stevens Institute of Technology

  • White Papers // Jan 2010

    A Multiobjective Optimization Framework for Routing in Wireless Ad Hoc Networks

    Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design tradeoffs in such networks. In this work, the authors address this problem by proposing a new modeling framework for routing in ad hoc networks,...

    Provided By Stevens Institute of Technology

  • White Papers // Jul 2010

    New Advances on Privacy-Preserving Policy Reconciliation

    Entities define their own set of rules under which they are willing to collaborate, e.g., interact, share and exchange resources or information with others. Typically, these individual policies differ for different parties. Thus, collaboration requires the resolving of differences and reaching a consensus. This process is generally referred to as...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    The Impact of Cell Site Re-Homing on the Performance of UMTS Core Networks

    Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio domain. This paper introduces the cell site re-homing in radio network...

    Provided By Stevens Institute of Technology

  • White Papers // Mar 2010

    Ensuring Data Storage Security Against Frequency-Based Attacks in Wireless Networks

    As wireless networks become more pervasive, the amount of the wireless data is rapidly increasing. One of the biggest challenges is how to store these data. To address this challenge, distributed data storage in wireless networks has attracted much attention recently, as it has major advantages over centralized approaches. To...

    Provided By Stevens Institute of Technology