University of Adelaide

Displaying 1-24 of 24 results

  • White Papers // Jan 2012

    Multi-Observer Privacy-Preserving Hidden Markov Models

    Detection of malicious traffic and network health problems would be much easier if ISPs shared their data. Unfortunately, they are reluctant to share because doing so would either violate privacy legislation or expose business secrets. However, secure distributed computation allows calculations to be made using private data, without leaking this...

    Provided By University of Adelaide

  • White Papers // Jan 2012

    On the Identifiability of Multi-Observer Hidden Markovmodels

    Most large attacks on the Internet are distributed. As a result, such attacks are only partially observed by any one Internet Service Provider (ISP). Detection would be significantly easier with pooled observations, but privacy concerns often limit the information that providers are willing to share. Multiparty secure distributed computation provides...

    Provided By University of Adelaide

  • White Papers // Jan 2012

    Data Fusion Without Data Fusion: Localization and Tracking Without Sharing Sensitive Information

    It is now well known that data-fusion can improve detection and localisation of targets. However, traditional data fusion requires the sharing of detailed data from multiple sources. In some cases, the various sources may not be willing to share such detailed information. For instance, current allies may be willing to...

    Provided By University of Adelaide

  • White Papers // Sep 2011

    Absorbing Lexicographic Products in Metarouting

    Modern treatments of routing protocols use algebraic techniques to derive the protocol's properties, permitting a semantic richness more flexible than simple numerical "Shortest paths". Many such routing protocols make preference decisions based on multiple criteria. This fits well with an algebraic formulation with each strata in the decision process modeled...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    The Internet Topology Zoo

    The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these have overshadowed the more interesting questions about network structure. The...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    Planarity of Data Networks

    A planar graph is one that can be drawn (say on a piece of paper) without any crossing links. In this paper, the authors show, using a new data set, that data-network graphs show a surprisingly high likelihood of being planar. The data set - the Internet Topology Zoo -...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    10 Lessons From 10 Years of Measuring and Modeling the Internet's Autonomous Systems

    Formally, the Internet inter-domain routing system is a collection of networks, their policies, peering relationships and organizational affiliations, and the addresses they advertize. It also includes components like Internet exchange points. By its very definition, each and every aspect of this system is impacted by BGP, the de-facto standard inter-domain...

    Provided By University of Adelaide

  • White Papers // May 2011

    Conflict And Leadership: When Is There A Hawkish Drift In Politics?

    The authors analyze an agency model of political competition to examine whether conflict encourages hawkish behavior, and if such behavior can itself aggravate conflict. They consider situations of conflict between a state and an insurgent group, such as conflict over a piece of land. Negotiations are carried out on behalf...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Performance Analysis of the B.A.T.M.A.N. Wireless Ad-Hoc Network Routing Protocol With Mobility and Directional Antennas

    In this paper, the authors show how the network routing protocol B.A.T.M.A.N. can be augmented by a simple hysteresis mechanism called Batrytis in order to provide a more stable routing table with no decrease in performance. This leads to an improved operating environment for various networked applications. They conduct various...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Efficient Network-Wide Flow Record Generation

    Experiments on diverse topics such as network measurement, management and security are routinely conducted using empirical flow export traces. However, the availability of empirical flow traces from operational networks is limited and frequently comes with significant restrictions. Furthermore, empirical traces typically lack critical meta-data (e.g., labeled anomalies) which reduce their...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Impact Of FDI On Domestic Firms' Exports In China

    Using manufacturing industry firm-level census data from the period of 2000-2003 in China, this paper examines the impact of foreign direct investment on domestic firms' exports. After dealing with econometric problems of endogeneity and sample selection, the authors find that foreign direct investment in China has had a positive impact...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Labour Quality And Inward FDI: A Firm-level Empirical Study In China

    This paper uses a large sample of Chinese cross-section firm-level data with comprehensive information about labor quality to investigate the relationship between labor quality and FDI distribution in China. Using parametric, IV-GMM and non-parametric techniques, the author finds that labor quality measured by education level plays an important role on...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Secure Distributed DataMining and Its Application to LargeScale Network Measurements

    The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data - for instance, how much traffic does the Internet now carry? The problem is not that the data is technically hard to obtain, or...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Commodity Windfalls, Democracy, And External Debt

    The authors examine the effects that revenue windfalls from international commodity price booms have on external debt in a panel of 93 countries during the period 1970-2007. Their main finding is that increases in the international prices of exported commodity goods lead to a significant reduction in the level of...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Node Localisation in Wireless Ad Hoc Networks

    Wireless ad hoc networks often require a method for estimating their nodes' locations. Typically this is achieved by the use of pair-wise measurements between nodes and their neighbours, where a number of nodes already accurately know their location and the remaining nodes must calculate theirs using these known locations. Typically,...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Multiple Target Localisation in Sensor Networks With Location Privacy

    It is now well known that data-fusion from multiple sensors can improve detection and localisation of targets. Traditional data fusion requires the sharing of detailed data from multiple sources. In some cases, the various sources may not be willing to share such detailed information. For instance, current military allies may...

    Provided By University of Adelaide

  • White Papers // Dec 2010

    How to Build Complex, Large-Scale Emulated Networks

    This paper describes AutoNetkit, an auto-configuration tool for complex network emulations using Netkit, allowing large-scale networks to be tested on commodity hardware. AutoNetkit uses an object orientated approach for router configuration management, significantly reducing the complexities in large-scale network configuration. Using AutoNetkit, a user can generate large and complex emulations...

    Provided By University of Adelaide

  • White Papers // Jul 2010

    Inflation Persistence And Labour Market Frictions: An Estimated Efficiency Wage Model Of The Australian Economy

    The purpose of this paper is to evaluate whether adding labour market frictions improves the basic New Keynesian model's ability to generate greater inflation persistence and plausible labour market dynamics. This paper builds and compares two sticky price models, one of which is augmented by an efficiency wage model of...

    Provided By University of Adelaide

  • White Papers // Feb 2010

    A Case-Study of the Accuracy of SNMP Measurements

    For some time it has been known that the standard method for collecting link-traffic measurements in IP networks - the Simple Network Management Protocol or SNMP - is flawed. It has oft been noted that SNMP is subject to missing data, and that its measurements contain errors. However, very little...

    Provided By University of Adelaide

  • White Papers // Jan 2010

    Sunspots And Credit Frictions

    The authors examine a general equilibrium model with collateral constraints and increasing returns to scale in production. The utility function is nonseparable, with no income effect on the consumer's choice of leisure. Unlike this model without a collateral constraint, they find that indeterminacy of equilibria is possible. Hence, business cycles...

    Provided By University of Adelaide

  • White Papers // Dec 2009

    Netscope: Practical Network Loss Tomography

    The authors present Netscope, a tomographic technique that infers the loss rates of network links from unicast end-to-end measurements. Netscope uses a novel combination of first- and second-order moments of end-to-end measurements to identify and characterize the links that cannot be (accurately) characterized through existing practical tomographic techniques. Using both...

    Provided By University of Adelaide

  • White Papers // Sep 2009

    Capital Investment And Network Logic

    The industrial network framework is discussed from the perspective of capital investment theory. To the authors' knowledge this is the first time that these academic fields are considered together. The theory and method described allow an understanding of the forward projection of firm networks from a specific time, so providing...

    Provided By University of Adelaide

  • White Papers // Mar 2009

    Leading Change, Transition And Transformation

    Change management is a set of processes employed to ensure that significant changes are implemented in a controlled and systematic manner. One of the goals of change management is the alignment of people and culture with strategic shifts in the organisation, to overcome resistance to change in order to increase...

    Provided By University of Adelaide

  • White Papers // Feb 2009

    ContextServ: A Platform for Rapid and Flexible Development of Context-Aware Web Services

    Context-aware web services are currently emerging as an important technology for building innovative context-aware applications. Unfortunately, context-aware Web services are still difficult to build. This paper describes ContextServ, a platform for rapid development of context-aware web services. ContextServ adopts model-driven development where context-aware web services are specified using ContextUML, a...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    10 Lessons From 10 Years of Measuring and Modeling the Internet's Autonomous Systems

    Formally, the Internet inter-domain routing system is a collection of networks, their policies, peering relationships and organizational affiliations, and the addresses they advertize. It also includes components like Internet exchange points. By its very definition, each and every aspect of this system is impacted by BGP, the de-facto standard inter-domain...

    Provided By University of Adelaide

  • White Papers // Dec 2010

    How to Build Complex, Large-Scale Emulated Networks

    This paper describes AutoNetkit, an auto-configuration tool for complex network emulations using Netkit, allowing large-scale networks to be tested on commodity hardware. AutoNetkit uses an object orientated approach for router configuration management, significantly reducing the complexities in large-scale network configuration. Using AutoNetkit, a user can generate large and complex emulations...

    Provided By University of Adelaide

  • White Papers // Feb 2010

    A Case-Study of the Accuracy of SNMP Measurements

    For some time it has been known that the standard method for collecting link-traffic measurements in IP networks - the Simple Network Management Protocol or SNMP - is flawed. It has oft been noted that SNMP is subject to missing data, and that its measurements contain errors. However, very little...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Secure Distributed DataMining and Its Application to LargeScale Network Measurements

    The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data - for instance, how much traffic does the Internet now carry? The problem is not that the data is technically hard to obtain, or...

    Provided By University of Adelaide

  • White Papers // Jan 2012

    Multi-Observer Privacy-Preserving Hidden Markov Models

    Detection of malicious traffic and network health problems would be much easier if ISPs shared their data. Unfortunately, they are reluctant to share because doing so would either violate privacy legislation or expose business secrets. However, secure distributed computation allows calculations to be made using private data, without leaking this...

    Provided By University of Adelaide

  • White Papers // Jan 2012

    On the Identifiability of Multi-Observer Hidden Markovmodels

    Most large attacks on the Internet are distributed. As a result, such attacks are only partially observed by any one Internet Service Provider (ISP). Detection would be significantly easier with pooled observations, but privacy concerns often limit the information that providers are willing to share. Multiparty secure distributed computation provides...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    The Internet Topology Zoo

    The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these have overshadowed the more interesting questions about network structure. The...

    Provided By University of Adelaide

  • White Papers // Jun 2011

    Planarity of Data Networks

    A planar graph is one that can be drawn (say on a piece of paper) without any crossing links. In this paper, the authors show, using a new data set, that data-network graphs show a surprisingly high likelihood of being planar. The data set - the Internet Topology Zoo -...

    Provided By University of Adelaide

  • White Papers // Sep 2011

    Absorbing Lexicographic Products in Metarouting

    Modern treatments of routing protocols use algebraic techniques to derive the protocol's properties, permitting a semantic richness more flexible than simple numerical "Shortest paths". Many such routing protocols make preference decisions based on multiple criteria. This fits well with an algebraic formulation with each strata in the decision process modeled...

    Provided By University of Adelaide

  • White Papers // Jan 2012

    Data Fusion Without Data Fusion: Localization and Tracking Without Sharing Sensitive Information

    It is now well known that data-fusion can improve detection and localisation of targets. However, traditional data fusion requires the sharing of detailed data from multiple sources. In some cases, the various sources may not be willing to share such detailed information. For instance, current allies may be willing to...

    Provided By University of Adelaide

  • White Papers // Dec 2009

    Netscope: Practical Network Loss Tomography

    The authors present Netscope, a tomographic technique that infers the loss rates of network links from unicast end-to-end measurements. Netscope uses a novel combination of first- and second-order moments of end-to-end measurements to identify and characterize the links that cannot be (accurately) characterized through existing practical tomographic techniques. Using both...

    Provided By University of Adelaide

  • White Papers // Mar 2009

    Leading Change, Transition And Transformation

    Change management is a set of processes employed to ensure that significant changes are implemented in a controlled and systematic manner. One of the goals of change management is the alignment of people and culture with strategic shifts in the organisation, to overcome resistance to change in order to increase...

    Provided By University of Adelaide

  • White Papers // Sep 2009

    Capital Investment And Network Logic

    The industrial network framework is discussed from the perspective of capital investment theory. To the authors' knowledge this is the first time that these academic fields are considered together. The theory and method described allow an understanding of the forward projection of firm networks from a specific time, so providing...

    Provided By University of Adelaide

  • White Papers // Jul 2010

    Inflation Persistence And Labour Market Frictions: An Estimated Efficiency Wage Model Of The Australian Economy

    The purpose of this paper is to evaluate whether adding labour market frictions improves the basic New Keynesian model's ability to generate greater inflation persistence and plausible labour market dynamics. This paper builds and compares two sticky price models, one of which is augmented by an efficiency wage model of...

    Provided By University of Adelaide

  • White Papers // Feb 2009

    ContextServ: A Platform for Rapid and Flexible Development of Context-Aware Web Services

    Context-aware web services are currently emerging as an important technology for building innovative context-aware applications. Unfortunately, context-aware Web services are still difficult to build. This paper describes ContextServ, a platform for rapid development of context-aware web services. ContextServ adopts model-driven development where context-aware web services are specified using ContextUML, a...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Impact Of FDI On Domestic Firms' Exports In China

    Using manufacturing industry firm-level census data from the period of 2000-2003 in China, this paper examines the impact of foreign direct investment on domestic firms' exports. After dealing with econometric problems of endogeneity and sample selection, the authors find that foreign direct investment in China has had a positive impact...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Labour Quality And Inward FDI: A Firm-level Empirical Study In China

    This paper uses a large sample of Chinese cross-section firm-level data with comprehensive information about labor quality to investigate the relationship between labor quality and FDI distribution in China. Using parametric, IV-GMM and non-parametric techniques, the author finds that labor quality measured by education level plays an important role on...

    Provided By University of Adelaide

  • White Papers // May 2011

    Conflict And Leadership: When Is There A Hawkish Drift In Politics?

    The authors analyze an agency model of political competition to examine whether conflict encourages hawkish behavior, and if such behavior can itself aggravate conflict. They consider situations of conflict between a state and an insurgent group, such as conflict over a piece of land. Negotiations are carried out on behalf...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Efficient Network-Wide Flow Record Generation

    Experiments on diverse topics such as network measurement, management and security are routinely conducted using empirical flow export traces. However, the availability of empirical flow traces from operational networks is limited and frequently comes with significant restrictions. Furthermore, empirical traces typically lack critical meta-data (e.g., labeled anomalies) which reduce their...

    Provided By University of Adelaide

  • White Papers // Jan 2010

    Sunspots And Credit Frictions

    The authors examine a general equilibrium model with collateral constraints and increasing returns to scale in production. The utility function is nonseparable, with no income effect on the consumer's choice of leisure. Unlike this model without a collateral constraint, they find that indeterminacy of equilibria is possible. Hence, business cycles...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Commodity Windfalls, Democracy, And External Debt

    The authors examine the effects that revenue windfalls from international commodity price booms have on external debt in a panel of 93 countries during the period 1970-2007. Their main finding is that increases in the international prices of exported commodity goods lead to a significant reduction in the level of...

    Provided By University of Adelaide

  • White Papers // Mar 2011

    Performance Analysis of the B.A.T.M.A.N. Wireless Ad-Hoc Network Routing Protocol With Mobility and Directional Antennas

    In this paper, the authors show how the network routing protocol B.A.T.M.A.N. can be augmented by a simple hysteresis mechanism called Batrytis in order to provide a more stable routing table with no decrease in performance. This leads to an improved operating environment for various networked applications. They conduct various...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Node Localisation in Wireless Ad Hoc Networks

    Wireless ad hoc networks often require a method for estimating their nodes' locations. Typically this is achieved by the use of pair-wise measurements between nodes and their neighbours, where a number of nodes already accurately know their location and the remaining nodes must calculate theirs using these known locations. Typically,...

    Provided By University of Adelaide

  • White Papers // Jan 2011

    Multiple Target Localisation in Sensor Networks With Location Privacy

    It is now well known that data-fusion from multiple sensors can improve detection and localisation of targets. Traditional data fusion requires the sharing of detailed data from multiple sources. In some cases, the various sources may not be willing to share such detailed information. For instance, current military allies may...

    Provided By University of Adelaide