Temple University

Displaying 1-26 of 26 results

  • White Papers // Mar 2012

    Minimum Latency Broadcasting With Conflict Awareness in Wireless Sensor Networks

    In this paper, the authors illustrate a practice of pipeline process to maximize the parallelization of all possible interference free relays in the broadcasting of Wireless Sensor Networks (WSNs), in order to optimize the end-to-end delay performance in both the (synchronous) round-based systems and the (asynchronous) duty cycle systems. Broadcasting...

    Provided By Temple University

  • White Papers // Jul 2011

    ZigZag: A Content-Based Publish/Subscribe Architecture for Human Networks

    The wide use of mobile devices gives rise to many novel network applications, which require an efficient communication substrate. These networks, which are comprised solely of human-carried mobile devices, are called HUman NETworks (HUNETs). In this paper, the authors present ZigZag, a Content-Based Publish/Subscribe (CBPS) architecture for HUNETs. The authors...

    Provided By Temple University

  • White Papers // Jul 2011

    Flow Based XOR Network Coding for Lossy Wireless Networks

    The broadcast nature of wireless links makes wireless networks an attractive environment for intersession network coding. Most intersession network coding protocols exploit this property, but ignore the diversity among the links by turning off coding when the channels are lossy. Other protocols deal with the packets separately - not as...

    Provided By Temple University

  • White Papers // Jun 2011

    Making Many People Happy: Greedy Solutions for Content Distribution

    The increase in multimedia content makes providing good quality of service in wireless networks a challenging problem. Consider a set of users, with different content interests, connected to the same base station. The base station can only broadcast a limited amount of content, but wishes to satisfy the largest number...

    Provided By Temple University

  • White Papers // Jun 2011

    On the Construction of the Minimum Cost Content-Based Publish/Subscribe Overlays

    Content-based publish/subscribe overlay is gaining popularity in large-scale content distribution applications for its flexibility and anonymity. Since such overlays are built on top of diverse infrastructures, minimizing the cost of using network resources in the overlays is challenging. In this paper, the authors tackle the problem using a combinatorial optimization...

    Provided By Temple University

  • White Papers // May 2011

    Fast Mobility Control Protocols With Sink Location Protection in Wireless Sensor Networks

    In this paper, the authors propose several novel fast converging mobility control protocols to achieve optimal deployment for streaming data flows in Wireless Sensor Networks (WSNs). The authors also identify a unique sink privacy issue in mobility control protocols and propose a new privacy-preserving scheme which can be integrated into...

    Provided By Temple University

  • White Papers // May 2011

    Local Channel Assignments in Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) promise to enable the next generation of communication networks. The Channel Assignment (CA) problem is one of the most important issues in CRNs. In this paper, the authors' goal is to design highly efficient and localized protocols for CA. In addition, they want to maximize node...

    Provided By Temple University

  • White Papers // Mar 2011

    Connected Point Coverage in Wireless Sensor Networks Using Robust Spanning Trees

    Energy limitation is one of the most critical challenges in the area of sensor networks. Sleep scheduling mechanisms can reduce the energy consumption. Coverage mechanisms attempt to cover the area with the minimum possible number of sensors. There are many area coverage approaches which also consider the connectivity problem. However,...

    Provided By Temple University

  • White Papers // Mar 2011

    Fine-Grained Localization With Pairwise Nodes Coverage

    Localization is an important design issue in wireless sensor networks. In this paper, the authors will focus on the sensor deployment for localization with the consideration of coverage and accuracy. Their pairwise localization pattern requires the information of only two coverages for the target. With this information, there are two...

    Provided By Temple University

  • White Papers // Mar 2011

    Channel on Demand: Optimal Capacity for Cooperative Multi-Channel Multi-Interface Wireless Mesh Networks

    Cooperative Communication (CC) has been proposed recently as an effective way to mitigate channel impairments. It has been shown that cooperative communications have the potential to significantly increase the capacity of Wireless Mesh Networks (WMNs). However, most of the works focus on single channel based WMNs. In this paper, the...

    Provided By Temple University

  • White Papers // Mar 2011

    Towards Approximate Event Processing in a Large-Scale Content-Based Network

    Event matching is a critical component of large-scale content-based publish/subscribe systems. However, most existing methods suffer from a dramatic performance degradation when the system scales up. In this paper, the authors present TAMA (TAble MAtch), a highly efficient content-based event matching and forwarding engine. The authors consider range-based attribute constraints...

    Provided By Temple University

  • White Papers // Mar 2011

    Delegation Forwarding in Delay Tolerant Networks Multicasting

    Delay Tolerant Networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied...

    Provided By Temple University

  • White Papers // Jan 2011

    Non-Replication Multicasting Scheme in Delay Tolerant Networks

    Delay tolerant Networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile...

    Provided By Temple University

  • White Papers // Sep 2010

    Systemic Risk And The U.S. Insurance Sector

    This paper examines the potential for the U.S. insurance industry to cause systemic risk events that spill over to other segments of the economy. The authors examine primary indicators that determine whether institutions are systemically risky as well as contributing factors that exacerbate vulnerability to systemic events. Evaluation of systemic...

    Provided By Temple University

  • White Papers // Sep 2010

    Fit Does Matter! An Empirical Study On Product Fit Uncertainty In Online Marketplaces

    This paper examines the antecedents and consequences of product uncertainty in online marketplaces by conceptualizing the dimensions of product uncertainty - description uncertainty (identifying product characteristics), performance uncertainty (inferring product's future performance) and fit uncertainty (matching product's characteristics with buyer's needs), with the focus on product fit uncertainty. It also...

    Provided By Temple University

  • White Papers // Aug 2010

    FlowTrust: Trust Inference With Network Flows

    Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies. However, social networking applications still cannot obtain a wider acceptance by many users due to some unresolved issues, such as trust, security, and privacy. Trust, in social networks, mainly studies whether a remote user,...

    Provided By Temple University

  • White Papers // Aug 2010

    A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

    The authors present a new scheme to reduce the end-to-end routing delay in the mission-critical applications of the Wireless Sensor Networks (WSNs) under the duty cycle model. While greedy routing in the synchronized MAC model has been studied extensively, efficient routing in an asynchronous MAC model is considerably different because...

    Provided By Temple University

  • White Papers // Jul 2010

    Multicasting in Delay Tolerant Networks: Delegation Forwarding

    Delay Tolerant Networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied extensively,...

    Provided By Temple University

  • White Papers // May 2010

    Fuzzy Location Service for Mobile Ad Hoc Networks

    Over the past years, location-based routing protocols have been studied extensively in Mobile Ad hoc NETworks (MANETs). However, how to efficiently provide the location information for nodes is still a challenge. So far, many protocols have been proposed to solve this problem, most of which offer exact routing location information,...

    Provided By Temple University

  • White Papers // Mar 2010

    Near-Minimum-Energy Routing in Heterogeneous Wireless Sensor Networks

    Routing is an essential operation in wireless sensor networks. Most existing routing protocols are designed for homogeneous sensor networks, where all sensor nodes have the same capabilities in terms of communication, computation, energy supply, and other aspects. Recent studies show that a homogeneous sensor network has a poor fundamental performance...

    Provided By Temple University

  • White Papers // Dec 2009

    Designing a Practical Access Point Association Protocol

    In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily influences the performance of its own and others. Through theoretical analysis, the authors reveal that previously proposed association protocols are not effective in maximizing the minimal throughput among all clients. Accordingly, they propose an...

    Provided By Temple University

  • White Papers // Dec 2009

    Convergence of Expected Utility for Universal AI

    The authors consider a sequence of repeated interactions between an agent and an environment. Uncertainty about the environment is captured by a probability distribution over a space of hypotheses, which includes all computable functions. Given a utility function, they can evaluate the expected utility of any computational policy for interaction...

    Provided By Temple University

  • White Papers // Sep 2009

    Overlapping Product Life Cycles

    This paper proposes a model of "Overlapping product life cycles" wherein firm exit is induced by the pursuit of more profitable opportunities elsewhere rather than comparative lack of success within the industry or product line. Every period, a new competitive industry is born that undergoes a predetermined life cycle. At...

    Provided By Temple University

  • White Papers // Sep 2009

    A Model Of International Cities: Implications For Real Exchange Rates

    The authors develop a model of cities each inhabited by two agents, one specializing in manufacturing, the other in retail distribution. The distribution sector represents the physical transformation of all internationally traded goods from the factory gate to the final consumer. Using a panel of micro-prices at the city level,...

    Provided By Temple University

  • White Papers // Aug 2009

    QoS-Aware Optimization Strategy for Security Ranking in SSL Protocol

    The primary goal of the Secure Socket Layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to...

    Provided By Temple University

  • White Papers // Oct 2008

    Micro-Navigation Satellite Network Design and Analysis

    Accurate position and orientation data are the bases for successful navigation. This paper design and analyze the micro-navigation satellite network that share orientation information among the satellite network. Satellites use GPS, IMU and lasers to align with each other, transferring and sharing the accurate absolute and relative orientation information. The...

    Provided By Temple University

  • White Papers // May 2011

    Fast Mobility Control Protocols With Sink Location Protection in Wireless Sensor Networks

    In this paper, the authors propose several novel fast converging mobility control protocols to achieve optimal deployment for streaming data flows in Wireless Sensor Networks (WSNs). The authors also identify a unique sink privacy issue in mobility control protocols and propose a new privacy-preserving scheme which can be integrated into...

    Provided By Temple University

  • White Papers // Mar 2011

    Delegation Forwarding in Delay Tolerant Networks Multicasting

    Delay Tolerant Networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied...

    Provided By Temple University

  • White Papers // Mar 2011

    Towards Approximate Event Processing in a Large-Scale Content-Based Network

    Event matching is a critical component of large-scale content-based publish/subscribe systems. However, most existing methods suffer from a dramatic performance degradation when the system scales up. In this paper, the authors present TAMA (TAble MAtch), a highly efficient content-based event matching and forwarding engine. The authors consider range-based attribute constraints...

    Provided By Temple University

  • White Papers // Jun 2011

    On the Construction of the Minimum Cost Content-Based Publish/Subscribe Overlays

    Content-based publish/subscribe overlay is gaining popularity in large-scale content distribution applications for its flexibility and anonymity. Since such overlays are built on top of diverse infrastructures, minimizing the cost of using network resources in the overlays is challenging. In this paper, the authors tackle the problem using a combinatorial optimization...

    Provided By Temple University

  • White Papers // Jul 2011

    ZigZag: A Content-Based Publish/Subscribe Architecture for Human Networks

    The wide use of mobile devices gives rise to many novel network applications, which require an efficient communication substrate. These networks, which are comprised solely of human-carried mobile devices, are called HUman NETworks (HUNETs). In this paper, the authors present ZigZag, a Content-Based Publish/Subscribe (CBPS) architecture for HUNETs. The authors...

    Provided By Temple University

  • White Papers // May 2011

    Local Channel Assignments in Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) promise to enable the next generation of communication networks. The Channel Assignment (CA) problem is one of the most important issues in CRNs. In this paper, the authors' goal is to design highly efficient and localized protocols for CA. In addition, they want to maximize node...

    Provided By Temple University

  • White Papers // Jun 2011

    Making Many People Happy: Greedy Solutions for Content Distribution

    The increase in multimedia content makes providing good quality of service in wireless networks a challenging problem. Consider a set of users, with different content interests, connected to the same base station. The base station can only broadcast a limited amount of content, but wishes to satisfy the largest number...

    Provided By Temple University

  • White Papers // Mar 2011

    Fine-Grained Localization With Pairwise Nodes Coverage

    Localization is an important design issue in wireless sensor networks. In this paper, the authors will focus on the sensor deployment for localization with the consideration of coverage and accuracy. Their pairwise localization pattern requires the information of only two coverages for the target. With this information, there are two...

    Provided By Temple University

  • White Papers // Mar 2011

    Connected Point Coverage in Wireless Sensor Networks Using Robust Spanning Trees

    Energy limitation is one of the most critical challenges in the area of sensor networks. Sleep scheduling mechanisms can reduce the energy consumption. Coverage mechanisms attempt to cover the area with the minimum possible number of sensors. There are many area coverage approaches which also consider the connectivity problem. However,...

    Provided By Temple University

  • White Papers // Jul 2011

    Flow Based XOR Network Coding for Lossy Wireless Networks

    The broadcast nature of wireless links makes wireless networks an attractive environment for intersession network coding. Most intersession network coding protocols exploit this property, but ignore the diversity among the links by turning off coding when the channels are lossy. Other protocols deal with the packets separately - not as...

    Provided By Temple University

  • White Papers // Aug 2010

    A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

    The authors present a new scheme to reduce the end-to-end routing delay in the mission-critical applications of the Wireless Sensor Networks (WSNs) under the duty cycle model. While greedy routing in the synchronized MAC model has been studied extensively, efficient routing in an asynchronous MAC model is considerably different because...

    Provided By Temple University

  • White Papers // Mar 2011

    Channel on Demand: Optimal Capacity for Cooperative Multi-Channel Multi-Interface Wireless Mesh Networks

    Cooperative Communication (CC) has been proposed recently as an effective way to mitigate channel impairments. It has been shown that cooperative communications have the potential to significantly increase the capacity of Wireless Mesh Networks (WMNs). However, most of the works focus on single channel based WMNs. In this paper, the...

    Provided By Temple University

  • White Papers // Jan 2011

    Non-Replication Multicasting Scheme in Delay Tolerant Networks

    Delay tolerant Networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile...

    Provided By Temple University

  • White Papers // Mar 2010

    Near-Minimum-Energy Routing in Heterogeneous Wireless Sensor Networks

    Routing is an essential operation in wireless sensor networks. Most existing routing protocols are designed for homogeneous sensor networks, where all sensor nodes have the same capabilities in terms of communication, computation, energy supply, and other aspects. Recent studies show that a homogeneous sensor network has a poor fundamental performance...

    Provided By Temple University

  • White Papers // Jul 2010

    Multicasting in Delay Tolerant Networks: Delegation Forwarding

    Delay Tolerant Networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users, a service needed for many potential DTNs applications. While multicasting in the Internet and mobile ad hoc networks has been studied extensively,...

    Provided By Temple University

  • White Papers // May 2010

    Fuzzy Location Service for Mobile Ad Hoc Networks

    Over the past years, location-based routing protocols have been studied extensively in Mobile Ad hoc NETworks (MANETs). However, how to efficiently provide the location information for nodes is still a challenge. So far, many protocols have been proposed to solve this problem, most of which offer exact routing location information,...

    Provided By Temple University

  • White Papers // Aug 2010

    FlowTrust: Trust Inference With Network Flows

    Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies. However, social networking applications still cannot obtain a wider acceptance by many users due to some unresolved issues, such as trust, security, and privacy. Trust, in social networks, mainly studies whether a remote user,...

    Provided By Temple University

  • White Papers // Mar 2012

    Minimum Latency Broadcasting With Conflict Awareness in Wireless Sensor Networks

    In this paper, the authors illustrate a practice of pipeline process to maximize the parallelization of all possible interference free relays in the broadcasting of Wireless Sensor Networks (WSNs), in order to optimize the end-to-end delay performance in both the (synchronous) round-based systems and the (asynchronous) duty cycle systems. Broadcasting...

    Provided By Temple University

  • White Papers // Oct 2008

    Micro-Navigation Satellite Network Design and Analysis

    Accurate position and orientation data are the bases for successful navigation. This paper design and analyze the micro-navigation satellite network that share orientation information among the satellite network. Satellites use GPS, IMU and lasers to align with each other, transferring and sharing the accurate absolute and relative orientation information. The...

    Provided By Temple University

  • White Papers // Aug 2009

    QoS-Aware Optimization Strategy for Security Ranking in SSL Protocol

    The primary goal of the Secure Socket Layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to...

    Provided By Temple University

  • White Papers // Sep 2010

    Fit Does Matter! An Empirical Study On Product Fit Uncertainty In Online Marketplaces

    This paper examines the antecedents and consequences of product uncertainty in online marketplaces by conceptualizing the dimensions of product uncertainty - description uncertainty (identifying product characteristics), performance uncertainty (inferring product's future performance) and fit uncertainty (matching product's characteristics with buyer's needs), with the focus on product fit uncertainty. It also...

    Provided By Temple University

  • White Papers // Sep 2009

    Overlapping Product Life Cycles

    This paper proposes a model of "Overlapping product life cycles" wherein firm exit is induced by the pursuit of more profitable opportunities elsewhere rather than comparative lack of success within the industry or product line. Every period, a new competitive industry is born that undergoes a predetermined life cycle. At...

    Provided By Temple University

  • White Papers // Sep 2010

    Systemic Risk And The U.S. Insurance Sector

    This paper examines the potential for the U.S. insurance industry to cause systemic risk events that spill over to other segments of the economy. The authors examine primary indicators that determine whether institutions are systemically risky as well as contributing factors that exacerbate vulnerability to systemic events. Evaluation of systemic...

    Provided By Temple University

  • White Papers // Sep 2009

    A Model Of International Cities: Implications For Real Exchange Rates

    The authors develop a model of cities each inhabited by two agents, one specializing in manufacturing, the other in retail distribution. The distribution sector represents the physical transformation of all internationally traded goods from the factory gate to the final consumer. Using a panel of micro-prices at the city level,...

    Provided By Temple University

  • White Papers // Dec 2009

    Designing a Practical Access Point Association Protocol

    In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily influences the performance of its own and others. Through theoretical analysis, the authors reveal that previously proposed association protocols are not effective in maximizing the minimal throughput among all clients. Accordingly, they propose an...

    Provided By Temple University

  • White Papers // Dec 2009

    Convergence of Expected Utility for Universal AI

    The authors consider a sequence of repeated interactions between an agent and an environment. Uncertainty about the environment is captured by a probability distribution over a space of hypotheses, which includes all computable functions. Given a utility function, they can evaluate the expected utility of any computational policy for interaction...

    Provided By Temple University