Stony Brook University

Displaying 1-40 of 66 results

  • White Papers // Apr 2012

    Extracting Flexible, Replayable Models From Large Block Traces

    I/O traces are good sources of information about real-world workloads; replaying such traces is often used to reproduce the most realistic system behavior possible. But traces tend to be large, hard to use and share, and inflexible in representing more than the exact system conditions at the point the traces...

    Provided By Stony Brook University

  • White Papers // Feb 2012

    Power Consumption in Enterprise-Scale Backup Storage Systems

    Power consumption has become an important factor in modern storage system design. Power efficiency is particularly beneficial in disk-based backup systems that store mostly cold data, have significant idle periods, and must compete with the operational costs of tape-based backup. There are no prior published studies on power consumption in...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Deductive Framework for Programming Sensor Networks

    Developing powerful paradigms for programming sensor networks is critical to realize the full potential of sensor networks as collaborative data processing engines. In this paper, the authors motivate and develop a deductive framework for programming sensor networks, extending the prior vision of viewing sensor network as a distributed database. The...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Compiler-Assisted Software Verification Using Plug-Ins

    The authors present Protagoras, a new plug-in architecture for the GNU compiler collection that allows one to modify GCC's internal representation of the program under compilation. They illustrate the utility of Protagoras by presenting plug-ins for both compile-time and runtime software verification and monitoring. In the compile-time case, they have...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Type-Safe Disks

    The authors present the notion of a Type-Safe Disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layers such as the file system. A TSD utilizes this knowledge in two key ways. First, it enables active...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Operating System Profiling Via Latency Analysis

    Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavior depends on actual workloads and external inputs. Runtime profiling is a key technique to prove new concepts, debug problems, and optimize performance....

    Provided By Stony Brook University

  • White Papers // Nov 2011

    FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol

    Ideally, the throughput of a Multipath TCP (MPTCP) connection should be as high as that of multiple disjoint single-path TCP flows. In reality, the throughput of MPTCP is far lower than expected. In this paper, the authors conduct an extensive simulation-based study on this phenomenon and the results indicate that...

    Provided By Stony Brook University

  • White Papers // Sep 2011

    Data Transmission and Base-Station Placement for Optimizing the Lifetime of Wireless Sensor Networks

    In this paper, the authors study the fundamental optimization problem in Wireless Sensor Networks of base-station positioning such that data from the sensors may be transmitted to it in an energy-efficient manner. They primarily consider the setting where a sensor transmits all of its data directly to the base-station or...

    Provided By Stony Brook University

  • White Papers // Aug 2011

    Runtime Verification With State Estimation

    The authors introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate the probability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in...

    Provided By Stony Brook University

  • White Papers // Jul 2011

    Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking

    The DNS Bandwidth Amplification Attack (BAA) is a distributed denial of service attack in which a network of computers (zombies) flood a DNS server with responses to requests that have never been made. Amplification enters into the attack by virtue of the fact that a small 60-byte request can be...

    Provided By Stony Brook University

  • White Papers // Jun 2011

    Geometric Algorithms for Sensor Networks

    Networked embedded sensors provide a unique opportunity for real time, large scale, high resolution environmental monitoring. Such systems are becoming ubiquitous across many activities important to the economy and life, from manufacturing and industrial sensing, to traffic and powergrid management, to wildlife, agriculture and environmental monitoring, to hospital operations and...

    Provided By Stony Brook University

  • White Papers // Jun 2011

    Toward Private Joins on Outsourced Data

    In an outsourced database framework, clients place data management responsibilities with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party without strong privacy assurances beyond policy "Fine prints". In this paper, the authors introduce a...

    Provided By Stony Brook University

  • White Papers // Apr 2011

    Illumination Estimation and Cast Shadow Detection Through a Higher-Order Graphical Model

    In this paper, the authors propose a novel framework to jointly recover the illumination environment and an estimate of the cast shadows in a scene from a single image, given coarse 3D geometry. They describe a higher-order Markov Random Field (MRF) illumination model, which combines low-level shadow evidence with high-level...

    Provided By Stony Brook University

  • White Papers // Apr 2011

    Hierarchical Semantic Indexing for Large Scale Image Retrieval

    This paper addresses the problem of similar image retrieval, especially in the setting of large-scale datasets with millions to billions of images. The core novel contribution is an approach that can exploit prior knowledge of a semantic hierarchy. When semantic labels and a hierarchy relating them are available during training,...

    Provided By Stony Brook University

  • White Papers // Mar 2011

    Oblivious Outsourced Storage With Delegation

    In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In this paper, the authors consider a scenario where multiple clients want to share data on a server,...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Gateway Strategies for VoIP Traffic Over Wireless Multihop Networks

    When supporting both voice and TCP in a wireless multi-hop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. The authors investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Wireless Cloud Infrastructure for High-Performance Wireless Applications and Services

    In a Cloud service environment, besides long-term data transfers, many short-term connections may be needed to transmit management information, while no communication is needed for a long period when the providers are busy with certain services. Current routing protocols are normally designed to support long-term traffic. In topology based routing,...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security

    Network and computer courses need dedicated laboratories for students to carry out hands-on assignments and course projects. Typically, these projects require each student to be given administrative access to an entire, isolated network of computers. The obvious approach of creating one dedicated physical network for each student is prohibitively expensive,...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Regulatory Compliant Oblivious RAM

    The authors introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    A Framework for Building Privacy-Conscious Composite Web Services

    The rapid growth of web applications has prompted increasing interest in the area of composite web services that involve several service providers. The potential for such composite web services can be realized only if consumer privacy concerns are satisfactorily addressed. This paper proposes a framework that addresses consumer privacy concerns...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Centralized Channel Assignment and Routing Algorithms for Multi-Channel Wi Reless Mesh Networks

    The IEEE 802.11 Wireless LAN standards allow multiple non-overlapping frequency channels to be used simultaneously to increase the aggregate bandwidth available to end-users. Such bandwidth aggregation capability is routinely used in infrastructure mode operation, where the traffic to and from wireless nodes is distributed among multiple interfaces of an access...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    End-to-End Flow Fairness Over IEEE 802.11-Based Wireless Mesh Networks

    Economies of scale make IEEE 802.11 an attractive technology for building Wireless Mesh Networks (WMNs). However, the IEEE 802.11 protocol exhibits serious link-layer unfairness when used in multi-hop networks. Existing fairness solutions either do not address this problem, or require proprietary MAC protocol to provide fairness. In this paper, the...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Network-Centric Buffer Cache Organization

    A pass-through server such as an NFS server backed by an iSCSI storage server only passes data between the storage server and NFS clients. Ideally it should require at most one data copying operation on sending or receiving, as in normal IP routers. In practice, pass-through servers actually incur multiple...

    Provided By Stony Brook University

  • White Papers // Dec 2010

    Software Monitoring With Controllable Overhead

    The authors introduce the technique of Software Monitoring with Controllable Overhead (SMCO), which is based on a novel combination of supervisory control theory of discrete event systems and PID-control theory of discrete time systems. SMCO controls monitoring overhead by temporarily disabling monitoring of selected events for as short a time...

    Provided By Stony Brook University

  • White Papers // Nov 2010

    Fast Packet Classification Using Condition Factorization

    Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled into a matching automaton that can quickly identify the subset of rules that are applicable to a given network packet. The principal metrics in the design of...

    Provided By Stony Brook University

  • White Papers // Nov 2010

    Placement and Orientation of Rotating Directional Sensors

    In this paper, the authors address several problems that arise in the context of rotating directional sensors. Rotating Directional Sensors (RDS) have a "Directional" coverage region that "rotates" at a certain speed. For RDS with fixed given locations, they address three problems with the objective to minimize different functions of...

    Provided By Stony Brook University

  • White Papers // Oct 2010

    To Cloud or Not to Cloud? Musings on Costs and Viability

    This paper aim to understand the types of applications for which cloud computing is economically tenable, i.e., for which the cost savings associated with cloud placement outweigh any associated deployment costs. The authors discover two scenarios. In a "Unified Client" scenario, once cloud-hosted, applications are meant to be accessible only...

    Provided By Stony Brook University

  • White Papers // Oct 2010

    Context-Aware I/O: Exploiting Application Context in the Storage Stack

    The authors propose the concept of Context-Aware I/O (CAIO), a generic mechanism that enables lower layers of the storage stack such as the disk, to track application-data and application-I/O relationships. In CAIO, higher-level application context is propagated along with every I/O operation, in an end-to-end fashion, across the storage stack....

    Provided By Stony Brook University

  • White Papers // Aug 2010

    Adaptive Exploitation of Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks

    With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly, ad hoc networks can potentially connect different wireless devices to enable more powerful wireless applications and mobile computing capabilities. To meet the ever increasing communication need,...

    Provided By Stony Brook University

  • White Papers // Jul 2010

    Truthful Spectrum Auctions With Approximate Revenue

    In cellular networks, a recent trend is to make spectrum access dynamic in the spatial and temporal dimensions, for the sake of efficient utilization of spectrum. In such a model, the spectrum is divided into channels and periodically allocated to competing base stations using an auction-based market mechanism. An "Efficient"...

    Provided By Stony Brook University

  • White Papers // Jul 2010

    Joining Privately on Outsourced Data

    In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party without strong privacy assurances beyond policy "Fine-prints". In this paper, the authors introduce a mechanism for...

    Provided By Stony Brook University

  • White Papers // Jun 2010

    In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

    In a sensor network of n nodes in which k of them have sensed interesting data, the authors perform in-network erasure coding such that each node stores a linear combination of all the network data with random coefficients. This scheme greatly improves data resilience to node failures: as long as...

    Provided By Stony Brook University

  • White Papers // Apr 2010

    Deconstructing Interference Relations in WiFi Networks

    Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. This paper presents an approach to estimate the interference between nodes and links in a live wireless network by passive monitoring of wireless traffic. This does not require any controlled experiments, injection of probe traffic in...

    Provided By Stony Brook University

  • White Papers // Apr 2010

    Exploiting Use of a New Performance Metric for Construction of Robust and Efficient Wireless Backbone Network

    In order to improve transmission throughput of a multi-hop wireless network, many efforts have been made in recent years to reduce traffic and hence transmission collisions by constructing backbone networks with minimum size. However, many other important issues need to be considered. Instead of simply minimizing the number of backbone...

    Provided By Stony Brook University

  • White Papers // Apr 2010

    Detecting Selfish Carrier-Sense Behavior in WiFi Networks by Passive Monitoring

    With the advent of programmability in radios, it is becoming easier for wireless network nodes to cheat to obtain an unfair share of the bandwidth. In this work the authors study the widely used 802.11 protocol and present a solution to detect selfish carrier-sensing behavior where a node raises the...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    OneClick: A Framework for Measuring Network Quality of Experience

    As the service requirements of network applications shift from high throughput to high media quality, interactivity, and responsiveness, the definition of QoE (Quality of Experience) has become multidimensional. Although it may not be difficult to measure individual dimensions of the QoE, how to capture users' overall perceptions when they are...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Evaluating Performance and Energy in File System Server Workloads

    Recently, power has emerged as a critical factor in designing components of storage systems, especially for power-hungry data centers. While there is some research into power-aware storage stack components, there are no systematic studies evaluating each component's impact separately. This paper evaluates the file system's impact on energy consumption and...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Evaluation of a Method's Robustness

    In signal processing, it is typical to develop or use a method based on a given model. In practice, however, the authors almost never know the actual model and they hope that the assumed model is in the neighborhood of the true one. If deviations exist, the method may be...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Practical Proactive Integrity Preservation: A Basis for Malware Defense

    Unlike today's reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated malware. However, there hasn't been much success in applying information flow based techniques to desktop systems running modern COTS operating systems. This is, in part, due to the...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Portable and Efficient Continuous Data Protection for Network File Servers

    Continuous Data Protection (CDP) is a critical building block that quickly repairs damage to a file system due to malicious attacks or innocent human errors. This paper describes a user-level continuous data protection architecture that is both efficient and portable, and thus completely eliminates barriers such as performance overhead and...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security

    Network and computer courses need dedicated laboratories for students to carry out hands-on assignments and course projects. Typically, these projects require each student to be given administrative access to an entire, isolated network of computers. The obvious approach of creating one dedicated physical network for each student is prohibitively expensive,...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Wireless Cloud Infrastructure for High-Performance Wireless Applications and Services

    In a Cloud service environment, besides long-term data transfers, many short-term connections may be needed to transmit management information, while no communication is needed for a long period when the providers are busy with certain services. Current routing protocols are normally designed to support long-term traffic. In topology based routing,...

    Provided By Stony Brook University

  • White Papers // Feb 2009

    Wireless Link Scheduling Under a Graded SINR Interference Model

    In this paper, the authors revisit the wireless link scheduling problem under a graded version of the SINR interference model. Unlike the traditional thresholded version of the SINR model, the graded SINR model allows use of "Imperfect links", where communication is still possible, although with degraded performance (in terms of...

    Provided By Stony Brook University

  • White Papers // Sep 2011

    Data Transmission and Base-Station Placement for Optimizing the Lifetime of Wireless Sensor Networks

    In this paper, the authors study the fundamental optimization problem in Wireless Sensor Networks of base-station positioning such that data from the sensors may be transmitted to it in an energy-efficient manner. They primarily consider the setting where a sensor transmits all of its data directly to the base-station or...

    Provided By Stony Brook University

  • White Papers // Jun 2011

    Geometric Algorithms for Sensor Networks

    Networked embedded sensors provide a unique opportunity for real time, large scale, high resolution environmental monitoring. Such systems are becoming ubiquitous across many activities important to the economy and life, from manufacturing and industrial sensing, to traffic and powergrid management, to wildlife, agriculture and environmental monitoring, to hospital operations and...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Gateway Strategies for VoIP Traffic Over Wireless Multihop Networks

    When supporting both voice and TCP in a wireless multi-hop network, there are two conflicting goals: to protect the VoIP traffic, and to completely utilize the remaining capacity for TCP. The authors investigate the interaction between these two popular categories of traffic and find that conventional solution approaches, such as...

    Provided By Stony Brook University

  • White Papers // Jun 2011

    Toward Private Joins on Outsourced Data

    In an outsourced database framework, clients place data management responsibilities with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party without strong privacy assurances beyond policy "Fine prints". In this paper, the authors introduce a...

    Provided By Stony Brook University

  • White Papers // Mar 2011

    Oblivious Outsourced Storage With Delegation

    In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In this paper, the authors consider a scenario where multiple clients want to share data on a server,...

    Provided By Stony Brook University

  • White Papers // Jan 2011

    Regulatory Compliant Oblivious RAM

    The authors introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client...

    Provided By Stony Brook University

  • White Papers // Jul 2010

    Joining Privately on Outsourced Data

    In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party without strong privacy assurances beyond policy "Fine-prints". In this paper, the authors introduce a mechanism for...

    Provided By Stony Brook University

  • White Papers // Nov 2010

    Placement and Orientation of Rotating Directional Sensors

    In this paper, the authors address several problems that arise in the context of rotating directional sensors. Rotating Directional Sensors (RDS) have a "Directional" coverage region that "rotates" at a certain speed. For RDS with fixed given locations, they address three problems with the objective to minimize different functions of...

    Provided By Stony Brook University

  • White Papers // Jul 2010

    Truthful Spectrum Auctions With Approximate Revenue

    In cellular networks, a recent trend is to make spectrum access dynamic in the spatial and temporal dimensions, for the sake of efficient utilization of spectrum. In such a model, the spectrum is divided into channels and periodically allocated to competing base stations using an auction-based market mechanism. An "Efficient"...

    Provided By Stony Brook University

  • White Papers // May 2009

    Selection and Orientation of Directional Sensors for Coverage Maximization

    Sensor nodes may be equipped with a "Directional" sensing device (such as a camera) which senses a physical phenomenon in a certain direction depending on the chosen orientation. In this paper, the authors address the problem of selection and orientation of such directional sensors with the objective of maximizing coverage...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Deductive Framework for Programming Sensor Networks

    Developing powerful paradigms for programming sensor networks is critical to realize the full potential of sensor networks as collaborative data processing engines. In this paper, the authors motivate and develop a deductive framework for programming sensor networks, extending the prior vision of viewing sensor network as a distributed database. The...

    Provided By Stony Brook University

  • White Papers // Oct 2008

    Near-Optimal Dynamic Spectrum Allocation in Cellular Networks

    In this paper, the authors address the spectrum allocation problem in cellular networks under the Coordinated Dynamic Spectrum Access (CDSA) model. In this model, a centralized spectrum broker owns a part of the spectrum and issues dynamic spectrum leases to competing base stations in the region it controls. They consider...

    Provided By Stony Brook University

  • White Papers // Aug 2011

    Runtime Verification With State Estimation

    The authors introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate the probability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in...

    Provided By Stony Brook University

  • White Papers // Jul 2011

    Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking

    The DNS Bandwidth Amplification Attack (BAA) is a distributed denial of service attack in which a network of computers (zombies) flood a DNS server with responses to requests that have never been made. Amplification enters into the attack by virtue of the fact that a small 60-byte request can be...

    Provided By Stony Brook University

  • White Papers // Feb 2012

    Power Consumption in Enterprise-Scale Backup Storage Systems

    Power consumption has become an important factor in modern storage system design. Power efficiency is particularly beneficial in disk-based backup systems that store mostly cold data, have significant idle periods, and must compete with the operational costs of tape-based backup. There are no prior published studies on power consumption in...

    Provided By Stony Brook University

  • White Papers // Apr 2012

    Extracting Flexible, Replayable Models From Large Block Traces

    I/O traces are good sources of information about real-world workloads; replaying such traces is often used to reproduce the most realistic system behavior possible. But traces tend to be large, hard to use and share, and inflexible in representing more than the exact system conditions at the point the traces...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Evaluating Performance and Energy in File System Server Workloads

    Recently, power has emerged as a critical factor in designing components of storage systems, especially for power-hungry data centers. While there is some research into power-aware storage stack components, there are no systematic studies evaluating each component's impact separately. This paper evaluates the file system's impact on energy consumption and...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Compiler-Assisted Software Verification Using Plug-Ins

    The authors present Protagoras, a new plug-in architecture for the GNU compiler collection that allows one to modify GCC's internal representation of the program under compilation. They illustrate the utility of Protagoras by presenting plug-ins for both compile-time and runtime software verification and monitoring. In the compile-time case, they have...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Type-Safe Disks

    The authors present the notion of a Type-Safe Disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layers such as the file system. A TSD utilizes this knowledge in two key ways. First, it enables active...

    Provided By Stony Brook University

  • White Papers // Jan 2012

    Operating System Profiling Via Latency Analysis

    Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavior depends on actual workloads and external inputs. Runtime profiling is a key technique to prove new concepts, debug problems, and optimize performance....

    Provided By Stony Brook University

  • White Papers // Dec 2010

    Software Monitoring With Controllable Overhead

    The authors introduce the technique of Software Monitoring with Controllable Overhead (SMCO), which is based on a novel combination of supervisory control theory of discrete event systems and PID-control theory of discrete time systems. SMCO controls monitoring overhead by temporarily disabling monitoring of selected events for as short a time...

    Provided By Stony Brook University

  • White Papers // Jan 2009

    Data-Driven Online Variational Filtering in Wireless Sensor Networks

    In this paper, a data-driven extension of the variational algorithm is proposed. Based on a few selected sensors, target tracking is performed distributively without any information about the observation model. Tracking under such conditions is possible if one exploits the information collected from extra inter-sensor RSSI measurements. The target tracking...

    Provided By Stony Brook University

  • White Papers // Nov 2011

    FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol

    Ideally, the throughput of a Multipath TCP (MPTCP) connection should be as high as that of multiple disjoint single-path TCP flows. In reality, the throughput of MPTCP is far lower than expected. In this paper, the authors conduct an extensive simulation-based study on this phenomenon and the results indicate that...

    Provided By Stony Brook University

  • White Papers // Jun 2009

    Joint Routing, Channel Assignment, and Scheduling for Throughput Maximization in General Interference Models

    Throughput optimization in wireless networks with multiple channels and multiple radio interfaces per node is a challenging problem. For general traffic models (given a set of source-destination pairs), optimization of throughput entails design of "Efficient" routes between the given source-destination pairs, in conjunction with assignment of channels to interfaces and...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Evaluation of a Method's Robustness

    In signal processing, it is typical to develop or use a method based on a given model. In practice, however, the authors almost never know the actual model and they hope that the assumed model is in the neighborhood of the true one. If deviations exist, the method may be...

    Provided By Stony Brook University

  • White Papers // Oct 2008

    Fast Packet Classification for Snort by Native Compilation of Rules

    Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based Network Intrusion Detection System (NIDS). This paper presents a technique to improve the performance of packet classification of Snort, a popular open-source NIDS, based on generating native code from Snort signatures. An obvious...

    Provided By Stony Brook University

  • White Papers // Sep 2008

    Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks

    This paper investigates the transmission-power assignment problem for k-connected Mobile Ad hoc NETworks (MANETs), the problem of optimizing the lifetime of a MANET at a given degree k of connectivity by minimizing power consumption. The proposed solution is fully distributed and uses a model-based transmission power adaptation strategy based on...

    Provided By Stony Brook University

  • White Papers // Jan 2009

    A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor Networks

    This paper presents a new desynchronization algorithm aimed at providing collision-free transmission scheduling for single-hop and acyclic multi-hop wireless sensor networks. The desynchronization approach is resilient to the hidden terminal problem and topology changes. Each node distributively converges upon a single collision-free transmission slot, utilizing only minimal neighbor information. In...

    Provided By Stony Brook University

  • White Papers // Jan 2009

    Expanding Malware Defense by Securing Software Installations

    Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of access needed to install backdoors, spyware, rootkits, or "Bot" software, and to hide these installations from users. Previous research has been focused mainly on securing the...

    Provided By Stony Brook University

  • White Papers // Jan 2009

    Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits

    Attacks which exploit memory programming errors (such as buffer overflows) are one of today's most serious security threats. These attacks require an attacker to have an in-depth understanding of the internal details of a victim program, including the locations of critical data and/or code. Program obfuscation is a general technique...

    Provided By Stony Brook University

  • White Papers // Sep 2009

    An Efficient Black-Box Technique for Defeating Web Application Attacks

    For most web applications, this interception may be achieved using network layer interposition or library interposition. It then develops a class of policies called syntax- and taint-aware policies that can accurately detect and/or block most injection attacks. An experimental evaluation shows that techniques are effective in detecting a broad range...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Practical Proactive Integrity Preservation: A Basis for Malware Defense

    Unlike today's reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated malware. However, there hasn't been much success in applying information flow based techniques to desktop systems running modern COTS operating systems. This is, in part, due to the...

    Provided By Stony Brook University

  • White Papers // Oct 2009

    A Model for Teaching Mobile Application Development for Social Changes: Implementation and Lessons Learned in Senegal

    Africa happens to be one of the fastest growing mobile phone market in the world today. Though, the data shows that there are still very limited numbers of mobile phone applications in the continent that have any impact on the populations. It is also felt that future African graduates will...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    Portable and Efficient Continuous Data Protection for Network File Servers

    Continuous Data Protection (CDP) is a critical building block that quickly repairs damage to a file system due to malicious attacks or innocent human errors. This paper describes a user-level continuous data protection architecture that is both efficient and portable, and thus completely eliminates barriers such as performance overhead and...

    Provided By Stony Brook University

  • White Papers // Jan 2009

    Implementation and Evaluation of a Mobile Tetherless VoIP/PSTN Gateway

    This paper talks about the implementation and evaluation of a mobile tether-less VoIP/PSTN gateway. The internet, which is the IP-based packet-switched network, and Public-circuit Switched Telephone Networks (PSTN) are brought together by a voice-over-IP (VoIP) gateway. A telephony card, which happens to be the key building block of a VoIP...

    Provided By Stony Brook University

  • White Papers // Jan 2010

    VoIP on Wireless Meshes: Models, Algorithms and Evaluation

    The paper studies the problem of supporting VoIP calls in a wireless mesh network. Specifically, the paper proposes solutions for Call Admission Control (CAC) and route selection for VoIP calls. Call admission decisions must evaluate how the capacity of the mesh network is utilized by the existing calls. The paper...

    Provided By Stony Brook University

  • White Papers // Oct 2010

    To Cloud or Not to Cloud? Musings on Costs and Viability

    This paper aim to understand the types of applications for which cloud computing is economically tenable, i.e., for which the cost savings associated with cloud placement outweigh any associated deployment costs. The authors discover two scenarios. In a "Unified Client" scenario, once cloud-hosted, applications are meant to be accessible only...

    Provided By Stony Brook University