Texas A&M University

Displaying 1-40 of 66 results

  • White Papers // May 2012

    Extending the Capability of Energy Detector for Sensing of Heterogeneous Wideband Spectrum

    Reliable spectrum sensing is the very task upon which the entire operation of the cognitive radio rests. Energy detection is one of the solutions that have been proposed for enabling opportunistic spectrum access but its capability has limited sensitivity, no resolution and requires high sampling rate when employed in the...

    Provided By Texas A&M University

  • White Papers // Apr 2012

    Real-Time Stochastic Processing Networks With Concurrent Resource Requirements

    Stochastic Processing Networks (SPNs) can be used to model communication networks, manufacturing systems, service systems, etc. The authors consider a real-time SPN where tasks generate jobs with strict deadlines according to their traffic patterns. Each job requires the concurrent usage of some resources to be processed. The processing time of...

    Provided By Texas A&M University

  • White Papers // Apr 2012

    Providing End-to-End Delay Guarantees for Multi-Hop Wireless Sensor Networks Over Unreliable Channels

    Wireless sensor networks have been increasingly used for real-time surveillance over large areas. In such applications, it is important to support end-to-end delay constraints for packet deliveries even when the corresponding flows require multi-hop transmissions. In addition to delay constraints, each flow of real-time surveillance may require some guarantees on...

    Provided By Texas A&M University

  • White Papers // Jan 2012

    A Factor Graph Approach to Clock Offset Estimation in Wireless Sensor Networks

    The problem of clock offset estimation in a two way timing message exchange regime is considered when the likelihood function of the observation time stamps is Gaussian, exponential or log-normally distributed. A parametrized solution to the Maximum Likelihood (ML) estimation of clock offset, based on convex optimization, is presented, which...

    Provided By Texas A&M University

  • White Papers // Dec 2011

    VIGOR+: Energy-Efficient Local Visibility Graph-Based Geographic Routing in Large-Scale Sensor Networks

    Geographic routing has received significant attention from the Wireless Sensor Network (WSN) research community due to its attractive properties: first, it is simple-that is, a forwarding node sends a packet to the geographically closest neighbor to a destination, without relying on control packet propagation, or beacon node selection; second, geographic...

    Provided By Texas A&M University

  • White Papers // Oct 2011

    Constructing Disjoint Paths for Failure Recovery and Multipath Routing

    Applications such as Voice over IP and video streaming require continuous network service, requiring fast failure recovery mechanisms. Proactive failure recovery schemes have been recently proposed to improve network performance during the failure transients. These proactive failure recovery schemes need extra infrastructural support in the form of routing table entries,...

    Provided By Texas A&M University

  • White Papers // Sep 2011

    A Wireless Sensor, AdHoc and Delay Tolerant Network System for Disaster Response

    This paper presents AnonymousNet (AnonNet), a system for emergency response in large scale disaster areas, e.g., earthquake and tsunami in Japan (2011) and earthquake in Haiti (2010). Despite the attention the "Emergency response" application area has received, the authors still lack data at the high spatial and temporal resolution needed...

    Provided By Texas A&M University

  • White Papers // Aug 2011

    Energy Efficient and Robust Multicast Routing for Large Scale Sensor Networks

    Multi-cast is an essential component in many Wireless Sensor Network (WSN) applications. Targeted queries, code updates, and mission assignments are well known examples of multi-cast services. Unfortunately, traditional tree-based and mesh-based multi-cast protocols, mainly designed for Mobile Ad hoc NETworks (MANET), are not suitable to WSNs. Such topology-based protocols require...

    Provided By Texas A&M University

  • White Papers // Jul 2011

    MiND : Misdirected DNS packet Detector

    In this paper, the authors present MiND, a tool to detect DNS packet indirection attacks within an Autonomous System (AS). MiND uses a name server database to detect misdirected DNS queries by examining only the network layer information. The name server database uses publicly available DNS PTR and NS records...

    Provided By Texas A&M University

  • White Papers // Jul 2011

    Winning With DNS Failures: Strategies for Faster Botnet Detection

    Botnets such as Conficker and Torpig utilize high entropy domains for fluxing and evasion. Bots may query a large number of domains, some of which may fail. In this paper, the authors present techniques where the failed Non-eXistence domain queries (NXDOMAIN) may be utilized for: speeding up the present detection...

    Provided By Texas A&M University

  • White Papers // Jul 2011

    Network-Wide Spectrum Situation Reconstruction Using Total Variation Inpainting in Cognitive Radio Ad Hoc Networks

    In this paper, the problem of spectrum situation reconstruction is considered for large cognitive radio ad hoc networks. The major challenge of such problem lies in the fact that only very limited measurements of spectrum occupancy may be obtained by the cognitive users for a certain location at any given...

    Provided By Texas A&M University

  • White Papers // Jun 2011

    Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Clusters

    The NAS Parallel Benchmarks (NPB) are well-known applications with fixed algorithms for evaluating parallel systems and tools. Multicore clusters provide a natural programming paradigm for hybrid programs, whereby OpenMP can be used with the data sharing with the multicores that comprise a node and MPI can be used with the...

    Provided By Texas A&M University

  • White Papers // Jun 2011

    Energy and Performance Characteristics of Different Parallel Implementations of Scientific Applications on Multicore Systems

    Energy consumption is a major concern with high performance multicore systems. In this paper, the authors explore the energy consumption and performance (execution time) characteristics of different parallel implementations of scientific applications. In particular, the experiments focus on Message-Passing Interface (MPI)-only versus hybrid MPI/OpenMP implementations for hybrid NAS (NASA Advanced...

    Provided By Texas A&M University

  • White Papers // Jun 2011

    Performance Modeling of Hybrid MPI/OpenMP Scientific Applications on Large-Scale Multicore Cluster Systems

    In this paper, the authors present a performance modeling framework based on memory bandwidth contention time and a parameterized communication model to predict the performance of OpenMP, MPI and hybrid applications with weak scaling on three large-scale multicore clusters: IBM POWER4, POWER5+ and BlueGene/P, and analyze the performance of these...

    Provided By Texas A&M University

  • White Papers // Jun 2011

    Power-Aware Predictive Models of Hybrid (MPI/OpenMP) Scientific Applications on Multicore Systems

    Predictive models enable a better understanding of the performance characteristics of applications on multicore systems. Previous work has utilized performance counters in a system-centered approach to model power consumption for the system, CPU, and memory components. Often, these approaches use the same group of counters across different applications. In contrast,...

    Provided By Texas A&M University

  • White Papers // May 2011

    Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best...

    Provided By Texas A&M University

  • White Papers // May 2011

    Optimal Regional Consecutive Leader Election in Mobile Ad-Hoc Networks

    Leader election is a challenging task even in a static infrastructure since node and link failures make it necessary to reelect a leader. In a mobile ad hoc environment, leader election becomes even more challenging since link failures become the norm due to unrestricted node mobility. In addition to failures,...

    Provided By Texas A&M University

  • White Papers // Mar 2011

    Study of Large Overlaid Cognitive Radio Networks: From Throughput Scaling to Asymptotic Multiplexing Gain

    The authors studied the interaction between two overlaid ad-hoc networks, one with legacy primary users who are licensed to access the spectrum and the other with cognitive secondary users who opportunistically access the spectrum. They showed that if the secondary network is denser than the primary network, they can guarantee...

    Provided By Texas A&M University

  • White Papers // Mar 2011

    A Dynamic Multimedia User-Weight Classification Scheme for IEEE_802.11 WLANs

    In this paper the authors expose a dynamic traffic-classification scheme to support multimedia applications such as voice and broadband video transmissions over IEEE 802.11 Wireless Local Area Networks (WLANs). Obviously, over a Wi-Fi link and to better serve these applications - which normally have strict bounded transmission delay or minimum...

    Provided By Texas A&M University

  • White Papers // Mar 2011

    Performance Characteristics of Hybrid MPI/OpenMP Implementations of NAS Parallel Benchmarks SP and BT on Large-Scale Multicore Supercomputers

    The NAS Parallel Benchmarks (NPB) are well-known applications with the fixed algorithms for evaluating parallel systems and tools. Multicore supercomputers provide a natural programming paradigm for hybrid programs, whereby OpenMP can be used with the data sharing with the multicores that comprise a node and MPI can be used with...

    Provided By Texas A&M University

  • White Papers // Feb 2011

    On the Random 1/2-Disk Routing Scheme in Wireless Ad Hoc Networks

    Random 1/2-disk routing in wireless ad-hoc networks is a localized geometric routing scheme in which each node chooses the next relay randomly among the nodes within its transmission range and in the general direction of the destination. The authors introduce a notion of convergence for geometric routing schemes that not...

    Provided By Texas A&M University

  • White Papers // Feb 2011

    Security Embedding Codes

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    A Deterministic Polynomial-Time Algorithm for Constructing a Multicast Coding Scheme for Linear Deterministic Relay Networks

    The authors propose a new way to construct a multicast coding scheme for linear deterministic relay networks. The construction can be regarded as a generalization of the well-known multicast network coding scheme of Jaggi et al. to linear deterministic relay networks and is based on the notion of flow for...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    Modeling Residual-Geometric Flow Sampling

    Traffic monitoring and estimation of flow parameters in high speed routers have recently become challenging as the Internet grew in both scale and complexity. In this paper, the authors focus on a family of flow-size estimation algorithms they call Residual-Geometric Sampling (RGS), which generates a random point within each flow...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages

    This paper presents two new results on Multiple-Input Multiple-Output (MIMO) Gaussian broadcast channels with confidential messages. First, the problem of the MIMO Gaussian wiretap channel is revisited. A matrix characterization of the capacity-equivocation region is provided, which extends the previous result on the secrecy capacity of the MIMO Gaussian wiretap...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    Agnostic Topology-Based Spam Avoidance in Large-Scale Web Crawls

    With the proliferation of web spam and questionable content with virtually infinite auto-generated structure, large-scale web crawlers now require low-complexity ranking methods to effectively budget their limited resources and allocate the majority of bandwidth to reputable sites. To shed light on Internet-wide spam avoidance, the authors study the domain-level graph...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    An Optimal Strategy for Anonymous Communication Protocols

    For many Internet applications, the ability to protect the identity of participants in distributed applications is critical. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. (The...

    Provided By Texas A&M University

  • White Papers // Nov 2010

    Measurement and Performance Study of PERT for On-Demand Video Streaming

    This paper demonstrates the performance of PERT, a new TCP congestion control, for video streaming. PERT stands for Probabilistic Early Response TCP. As a delay based protocol, it measures the delay at the end host and adjusts the congestion window accordingly. As the NS-2 simulation results show, the late packet...

    Provided By Texas A&M University

  • White Papers // Oct 2010

    On the Optimization of the IEEE 802.11 DCF: A Cross-Layer Perspective

    DCF represents the main access mechanism at the Medium Access Control (MAC) layer of the IEEE 802.11 series of standards, and it is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Many papers, following the seminal work by Bianchi, have addressed the problem of modeling, as well as...

    Provided By Texas A&M University

  • White Papers // Aug 2010

    Scientific Software Engineering in a Nutshell

    Writing complex computer programs to study scientific problems requires careful planning and an in-depth knowledge of programming languages and tools. In this paper, the importance of using the right tool for the right problem is emphasized. Common tools to organize computer programs, as well as to debug and improve them...

    Provided By Texas A&M University

  • White Papers // Jul 2010

    Reliable Networks With Unreliable Sensors

    Wireless Sensor Networks (WSNs) deployed in hostile environments suffer from a high rate of node failure. The authors investigate the effect of such failure rate on network connectivity. They provide a formal analysis that establishes the relationship between node density, network size, failure probability, and network connectivity. They show that...

    Provided By Texas A&M University

  • White Papers // Jul 2010

    Support for the Evolution of C++ Generic Functions

    The choice of requirements for an argument of a generic type or algorithm is a central design issue in generic programming. In the context of C++, a specification of requirements for a template argument or a set of template arguments is called a concept. In this paper, the authors present...

    Provided By Texas A&M University

  • White Papers // Jul 2010

    Avoiding Interruptions - A QoE Reliability Function for Streaming Media Applications

    The authors take an analytical approach to study fundamental rate-delay-reliability trade-offs in the context of media streaming. They consider the probability of interruption in media playback (buffer underflow) as well as the number of initially buffered packets (initial waiting time) as the Quality of user Experience (QoE) metrics. The authors...

    Provided By Texas A&M University

  • White Papers // Jun 2010

    Performance of Quantized Congestion Notification in TCP Incast Scenarios of Data Centers

    This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers. The authors analyze the reasons why QCN does not perform adequately in these situations and propose several modifications to the protocol to improve its performance in...

    Provided By Texas A&M University

  • White Papers // Jun 2010

    Exploiting Concurrency to Improve Latency and Throughput in a Hybrid Storage System

    This paper considers the problem of how to improve the performance of hybrid storage system employing solid state disks and hard disk drives. The authors utilize both initial block allocation as well as migration to reach "Wardrop equilibrium", in which the response times of different devices equalize. They show that...

    Provided By Texas A&M University

  • White Papers // May 2010

    Characterizing Tight-Link Bandwidth of Multi-Hop Paths Using Probing Response Curves

    Bandwidth estimation plays an important role in characterizing Internet paths. Existing approaches can be classified into measurement tools which usually have extensive simulations, but no convergence analysis for general cross-traffic, and theoretical models which usually have provable convergence, but no practical implementation. Another issue in related work is the unknown...

    Provided By Texas A&M University

  • White Papers // May 2010

    On Design of Distributed Beamforming for Two-Way Relay Networks

    The authors consider a two-way relay network, where two source nodes, S1 and S2, exchange information through a cluster of relay nodes. The relay nodes receive the sum signal from S1 and S2 in the first time slot. In the second time slot, each relay node multiplies its received signal...

    Provided By Texas A&M University

  • White Papers // Apr 2010

    A Robust Approach for Clock Offset Estimation in Wireless Sensor Networks

    The Maximum Likelihood Estimators (MLEs) for the clock phase offset assuming a two-way message exchange mechanism between the nodes of a wireless sensor network were recently derived assuming Gaussian and exponential network delays. However, the MLE performs poorly in the presence of non-Gaussian or non-exponential network delay distributions. Currently, there...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    Multipath Wireless Network Coding: A Population Game Perspective

    This paper considers wireless networks in which multiple paths are available between each source and destination. The authors allow each source to split traffic among all of its available paths, and ask the question: how do the authors attain the lowest possible number of transmissions per unit time to support...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    Design of Efficient Robust Network Codes for Multicast Connections

    This paper considers the problem of establishing reliable multicast connections across a communication network. The goal is to provide instantaneous recovery from single edge failures. With instantaneous recovery, all destination nodes can decode the packets sent by the source node even if one of the edges in the network fails,...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    Multipath Wireless Network Coding: A Population Game Perspective

    This paper considers wireless networks in which multiple paths are available between each source and destination. The authors allow each source to split traffic among all of its available paths, and ask the question: how do the authors attain the lowest possible number of transmissions per unit time to support...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    Design of Efficient Robust Network Codes for Multicast Connections

    This paper considers the problem of establishing reliable multicast connections across a communication network. The goal is to provide instantaneous recovery from single edge failures. With instantaneous recovery, all destination nodes can decode the packets sent by the source node even if one of the edges in the network fails,...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    An Optimal Strategy for Anonymous Communication Protocols

    For many Internet applications, the ability to protect the identity of participants in distributed applications is critical. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. (The...

    Provided By Texas A&M University

  • White Papers // Jul 2010

    Avoiding Interruptions - A QoE Reliability Function for Streaming Media Applications

    The authors take an analytical approach to study fundamental rate-delay-reliability trade-offs in the context of media streaming. They consider the probability of interruption in media playback (buffer underflow) as well as the number of initially buffered packets (initial waiting time) as the Quality of user Experience (QoE) metrics. The authors...

    Provided By Texas A&M University

  • White Papers // Sep 2009

    Data Movement in Flash Memories

    NAND flash memories are the most widely used non-volatile memories due to their high data density and efficiency. In a NAND flash memory, cells are organized as blocks. A block has about 105 cells, and a cell can store one or more bits. Every block is partitioned into pages, where...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Data Movement and Aggregation in Flash Memories

    NAND flash memories have become the most widely used type of non-volatile memories. In a NAND flash memory, every block of memory cells consists of numerous pages, and rewriting a single page requires the whole block to be erased. As block erasures significantly reduce the longevity, speed and power efficiency...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    DSSS-Based Flow Marking Technique for Invisible Traceback

    Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the proliferation of anonymous communication systems on the Internet has posed significant challenges to providing such traceback capability. In this paper, the authors develop a new class of...

    Provided By Texas A&M University

  • White Papers // Feb 2010

    Avoiding Interruptions - QoE Trade-Offs in Block-Coded Streaming Media Applications

    The authors take an analytical approach to study Quality of user Experience (QoE) for media streaming applications. They use the fact that random linear network coding applied to blocks of video frames can significantly simplify the packet requests at the network layer and avoid duplicate packet reception. The authors model...

    Provided By Texas A&M University

  • White Papers // Nov 2010

    Measurement and Performance Study of PERT for On-Demand Video Streaming

    This paper demonstrates the performance of PERT, a new TCP congestion control, for video streaming. PERT stands for Probabilistic Early Response TCP. As a delay based protocol, it measures the delay at the end host and adjusts the congestion window accordingly. As the NS-2 simulation results show, the late packet...

    Provided By Texas A&M University

  • White Papers // Jun 2010

    Exploiting Concurrency to Improve Latency and Throughput in a Hybrid Storage System

    This paper considers the problem of how to improve the performance of hybrid storage system employing solid state disks and hard disk drives. The authors utilize both initial block allocation as well as migration to reach "Wardrop equilibrium", in which the response times of different devices equalize. They show that...

    Provided By Texas A&M University

  • White Papers // Jun 2010

    Performance of Quantized Congestion Notification in TCP Incast Scenarios of Data Centers

    This paper analyzes the performance of Ethernet layer congestion control mechanism Quantized Congestion Notification (QCN) during data access from clustered servers in data centers. The authors analyze the reasons why QCN does not perform adequately in these situations and propose several modifications to the protocol to improve its performance in...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Source Code Rejuvenation Is Not Refactoring

    Programmers rely on programming idioms, design patterns, and workaround techniques to make up for missing programming language support. Evolving languages often address frequently encountered problems by adding language and library support to subsequent releases. By using new features, programmers can express their intent more directly. As new concerns, such as...

    Provided By Texas A&M University

  • White Papers // Feb 2010

    Performance of Early Retransmission Scheme in Streaming Media

    In this paper, the authors propose a new variant of TCP with an early retransmission scheme as an enhancement to make it more suitable for streaming media. They call this new protocol TCP-ER. They performed extensive ns2 simulations to show that: The early retransmission scheme can considerably reduce the number...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    A Deterministic Polynomial-Time Algorithm for Constructing a Multicast Coding Scheme for Linear Deterministic Relay Networks

    The authors propose a new way to construct a multicast coding scheme for linear deterministic relay networks. The construction can be regarded as a generalization of the well-known multicast network coding scheme of Jaggi et al. to linear deterministic relay networks and is based on the notion of flow for...

    Provided By Texas A&M University

  • White Papers // Mar 2011

    A Dynamic Multimedia User-Weight Classification Scheme for IEEE_802.11 WLANs

    In this paper the authors expose a dynamic traffic-classification scheme to support multimedia applications such as voice and broadband video transmissions over IEEE 802.11 Wireless Local Area Networks (WLANs). Obviously, over a Wi-Fi link and to better serve these applications - which normally have strict bounded transmission delay or minimum...

    Provided By Texas A&M University

  • White Papers // Feb 2011

    Security Embedding Codes

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing...

    Provided By Texas A&M University

  • White Papers // Oct 2009

    Modulation Codes for Flash Memory Based on Load-Balancing Theory

    Information-theoretic research on capacity and coding for write-limited memory originates. The authors consider a model of Write-Once Memory (WOM). In particular, each memory cell can be in state either 0 or 1. The state of a cell can go from 0 to 1, but not from 1 back to 0...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms

    This paper addresses the problem of geocasting in Mobile Ad hoc Network (MANET) environments. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. However, for geocasting, the group consists of...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    A Study of Providing Statistical QoS in a Differentiated Sevices Network

    In this paper, authors propose and analyze a methodology for providing statistical guarantees within the diffserv model in a network that uses static-priority schedulers. They extend the previous work on statistical delay analysis and develop a method that can be used to derive delay bounds without specific information on flow...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Statistical QoS Provisionings for Wireless Unicast/Multicast of Layered Video Streams

    Due to the highly-varying wireless channels, deterministic Quality of Service (QoS) is usually difficult to guarantee for real-time multi-layer video transmissions in wireless networks. Consequently, statistical QoS guarantees have become an important alternative in supporting real-time video transmissions. This paper proposes an efficient framework to model the statistical delay QoS...

    Provided By Texas A&M University

  • White Papers // Feb 2010

    The Satisfaction of Community College Students Regarding Distance Education Versus Traditional Education

    Over the past several years, traditional education at community colleges has vastly changed. This is largely due to the rapid changes in technology and transformations in education. Current technology has afforded many major colleges and universities the opportunity to provide students with off-site instruction through the use of distance education....

    Provided By Texas A&M University

  • White Papers // Jan 2011

    Agnostic Topology-Based Spam Avoidance in Large-Scale Web Crawls

    With the proliferation of web spam and questionable content with virtually infinite auto-generated structure, large-scale web crawlers now require low-complexity ranking methods to effectively budget their limited resources and allocate the majority of bandwidth to reputable sites. To shed light on Internet-wide spam avoidance, the authors study the domain-level graph...

    Provided By Texas A&M University

  • White Papers // May 2010

    Characterizing Tight-Link Bandwidth of Multi-Hop Paths Using Probing Response Curves

    Bandwidth estimation plays an important role in characterizing Internet paths. Existing approaches can be classified into measurement tools which usually have extensive simulations, but no convergence analysis for general cross-traffic, and theoretical models which usually have provable convergence, but no practical implementation. Another issue in related work is the unknown...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Enabling High-Performance Internet-Wide Measurements on Windows

    This paper presents analysis of the Windows kernel network stack and designs a novel high-performance NDIS driver platform called IRLstack whose goal is to enable large-scale Internet measurements that require sending billions of packets and managing millions of outstanding connections on inexpensive commodity hardware available to any research lab. The...

    Provided By Texas A&M University

  • White Papers // Jan 2011

    Modeling Residual-Geometric Flow Sampling

    Traffic monitoring and estimation of flow parameters in high speed routers have recently become challenging as the Internet grew in both scale and complexity. In this paper, the authors focus on a family of flow-size estimation algorithms they call Residual-Geometric Sampling (RGS), which generates a random point within each flow...

    Provided By Texas A&M University

  • White Papers // May 2011

    Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

    Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments battery-powered mesh routers, operating in an energy efficient manner, are required. To the best...

    Provided By Texas A&M University

  • Presentations // Jan 2003

    Negotiating Globally

    Negotiation is the process wherein one individual or party tries to persuade another individual or party to alter his/her idea or thoughts. It is an approach by which parties having different viewpoints are made to arrive at a mutually agreeable solution. Cultural differences between parties are key challenges to successful...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    Distributed Fair Scheduling in a Wireless LAN

    Fairness is an important issue when accessing a shared wireless channel. With fair scheduling, it is possible to allocate bandwidth in proportion to weights of the packet flows sharing the channel. This paper presents a fully distributed algorithm for fair scheduling in a wireless LAN. The algorithm can be implemented...

    Provided By Texas A&M University

  • White Papers // Dec 2009

    Cyber Crimes Aimed at Publicly Traded Companies: Is Stock Price Affected?

    E-commerce has been a boon for business. A great deal of business activity now occurs in the realm of cyberspace on the Web. The downside of cyber-business is cyber crimes, also called electronic crime or simply e-crime. Cyber crime costs publicly traded companies billions of dollars annually in stolen assets...

    Provided By Texas A&M University

  • White Papers // Feb 2010

    Mobile Marketing in the Retailing Environment: Current Insights and Future Research Avenues

    Mobile marketing, which involves two- or multi-way communication and promotion of an offer between a firm and its customers using the mobile, a term that refers to the mobile medium, device, channel, or technology, is growing in importance in the retailing environment. It has the potential to change the paradigm...

    Provided By Texas A&M University

  • White Papers // Jan 2010

    A Decomposition Mechanism for Scalable Optical Interconnection Networks

    This paper proposes a formal decomposition mechanism for Single-hop WDM all-Optical Interconnection network for Scalable Multiprocessor systems. Future real-time applications requiring massively parallel computer systems also put high demands on the interconnection networks. Various topologies have been proposed and implemented that harness the immense advantages of optical communication. WDM techniques...

    Provided By Texas A&M University

  • White Papers // Sep 2009

    Asynchronous Bypass Channel Routers

    Network-on-Chip (NoC) designs have emerged as a replacement for traditional shared-bus designs for on-chip communications. Typically, these systems require fully balanced clock distribution trees to enable synchronous communication between all nodes on-chip, resulting in higher power consumption. One approach to reduce power consumption is to replace the balanced clock tree...

    Provided By Texas A&M University

  • White Papers // Aug 2009

    Dynamically Configurable Systolic-Like Architecture for Close to Optimal Soft MIMO Detection

    A novel configurable processor architecture is presented for detecting Spatially Multiplexed (SM) data in a high order (4x4) Multiple-Input-Multiple-Output (MIMO) wireless systems. It is a customized architecture to match an algorithm that provides "Soft" values to the Forward Error Decoder (FEC), with systolic-like data and control flow. The processor is...

    Provided By Texas A&M University

  • White Papers // May 2012

    Extending the Capability of Energy Detector for Sensing of Heterogeneous Wideband Spectrum

    Reliable spectrum sensing is the very task upon which the entire operation of the cognitive radio rests. Energy detection is one of the solutions that have been proposed for enabling opportunistic spectrum access but its capability has limited sensitivity, no resolution and requires high sampling rate when employed in the...

    Provided By Texas A&M University

  • White Papers // Sep 2011

    A Wireless Sensor, AdHoc and Delay Tolerant Network System for Disaster Response

    This paper presents AnonymousNet (AnonNet), a system for emergency response in large scale disaster areas, e.g., earthquake and tsunami in Japan (2011) and earthquake in Haiti (2010). Despite the attention the "Emergency response" application area has received, the authors still lack data at the high spatial and temporal resolution needed...

    Provided By Texas A&M University

  • White Papers // May 2011

    Optimal Regional Consecutive Leader Election in Mobile Ad-Hoc Networks

    Leader election is a challenging task even in a static infrastructure since node and link failures make it necessary to reelect a leader. In a mobile ad hoc environment, leader election becomes even more challenging since link failures become the norm due to unrestricted node mobility. In addition to failures,...

    Provided By Texas A&M University

  • White Papers // Jul 2010

    Reliable Networks With Unreliable Sensors

    Wireless Sensor Networks (WSNs) deployed in hostile environments suffer from a high rate of node failure. The authors investigate the effect of such failure rate on network connectivity. They provide a formal analysis that establishes the relationship between node density, network size, failure probability, and network connectivity. They show that...

    Provided By Texas A&M University

  • White Papers // Oct 2010

    On the Optimization of the IEEE 802.11 DCF: A Cross-Layer Perspective

    DCF represents the main access mechanism at the Medium Access Control (MAC) layer of the IEEE 802.11 series of standards, and it is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Many papers, following the seminal work by Bianchi, have addressed the problem of modeling, as well as...

    Provided By Texas A&M University

  • White Papers // Mar 2010

    Discounting Debt Tax Shields At The Levered Cost Of Equity

    The value of debt tax shields in foundational valuation models by Nobel Laureates Modigliani and Miller (MM) continues to be a controversial issue that is central to the authors' understanding of corporate finance. This paper contributes to this pivotal debate by proposing that the appropriate discount rate to value interest...

    Provided By Texas A&M University

  • White Papers // Feb 2011

    On the Random 1/2-Disk Routing Scheme in Wireless Ad Hoc Networks

    Random 1/2-disk routing in wireless ad-hoc networks is a localized geometric routing scheme in which each node chooses the next relay randomly among the nodes within its transmission range and in the general direction of the destination. The authors introduce a notion of convergence for geometric routing schemes that not...

    Provided By Texas A&M University