University of Central England in Birmingham

Displaying 1-23 of 23 results

  • White Papers // Aug 2013

    Automatic Assembly of a Hybrid Cloud for the Management and Simulation of a Smart Power Grid

    Several potential cloud applications require cooperation of multiple organizations; each organization has to coordinate some aspects of its activity and share some data with several other organizations, yet has strict security requirements for its own private data. The management of a smart grid is such an application; it is data-intensive,...

    Provided By University of Central England in Birmingham

  • White Papers // May 2013

    Clustering Algorithms for Scale-Free Networks and Applications to Cloud Resource Management

    The analysis of high-level models of a system allows users to better understand its behavior. Oftentimes users use a finite state machine model of a system where vertices represent states and the directed arcs represent transitions between states. Such models provide insights on the system dynamics, but are seldom used...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    A Pragmatic Calue-of-Information Approach for Intruder Tracking Sensor Networks

    Sensor networks are distributed systems where nodes embedded in the environment collect readings through their sensors and transmit data to customers. The overall goal of these systems can be stated as maximizing a metric of the sensing quality while limiting the consumption of a set of scarce resources. In this...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Optimal Content Delivery in DSA Networks: A Path Auction Based Framework

    In this paper, the authors address the problem of Optimal Content Delivery (OCD) in Dynamic Spectrum Access (DSA) networks, where the source of a flow sends data traffic to the destination in exchange for some monetary benefit, such as a subscription fee. Also, each intermediate secondary node incurs a cost...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Is the Clustering Coefficient a Measure for Fault Tolerance in Wireless Sensor Networks?

    Distributed systems such as the Internet and wireless sensor networks must provide a high degree of resilience against errors and attacks. Besides steps that increase reliability of data and resources of the network, the topology structure itself plays a crucial role in the efficacy of the fault-tolerance behavior. The network...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Actor Positioning Based on Molecular Geometry in Aerial Sensor Networks

    Advances in Unmanned Aerial Vehicle (UAV) technology and Wireless Sensor and Actor Networks (WSAN) made it possible to equip small UAVs with sensors and deploy aerial sensor and actor networks. Aerial sensor networks enable high quality observation of events while reducing the number of requirements. Positioning of UAVs with actor...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    NSwitching: Virtual Machine Aware Relay Hardware Switching to Improve Intra-NIC Virtual Machine Traffic

    Recent development on Ethernet switching to provide Single Root I/O Virtualization (SR-IOV) on Network Interface cards (NICs) improves Ethernet throughput for Virtual Machines (VMs) and lowers CPU loads. SR-IOV creates multiple receive queues on a NIC, directly accessible by VMs for frames coming from sources external to the Ethernet port....

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2012

    A New High-performance, Energy-efficient Replication Storage System with Reliability Guarantee

    In modern replication storage systems where data carries two or more multiple copies, a primary group of disks is always up to service incoming requests while other disks are often spun down to sleep states to save energy during slack periods. However, since new writes cannot be immediately synchronized onto...

    Provided By University of Central England in Birmingham

  • White Papers // Sep 2011

    On the Relationship Between Response Probability and Redundancy in Teams of Collaborating Agents

    One of the expected benefits of multi-agent systems is their capacity for redundancy which is expected to promote system robustness. The authors examine the impact agents' probabilistic action has on generating redundancy in multi-agent systems with no direct inter-agent communication. They present a mathematical model of such a system, analyze...

    Provided By University of Central England in Birmingham

  • White Papers // May 2011

    A Team Registration System to Support Tracking Training and Enhancing Performance

    Programming competitions are varied and range from high school to college level. In addition, competitive learning, in general, is increasingly used in courses to foster improved focus on improvement. Such competitions require management tools; however, the authors also wish to support tracking of individual and team performance across such competitions....

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    MintMOS: A Lightweight, Real Time, No-Reference Tool for Inferring Video-QoE

    Inferring the subjective perception of a video stream in real time at arbitrary nodes in the Internet continues to be a stiff problem. This is because computing a Mean Opinion Score (MOS) in real time is both cumbersome and infeasible if the original frames are required for reference to infer...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    Effects of Internet Path Selection on Video-QoE: Analysis and Improvements

    This paper presents large scale Internet measurements to understand and improve the effects of Internet path selection on perceived video quality. The authors systematically study a large number of Internet paths between popular video destinations and clients to create an empirical understanding of location, persistence and recurrence of failures. They...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    Internet for Interactive Multimedia

    Multimedia traffic is poised to account for more than 90% of all consumer Internet traffic. A variety of multimedia applications consistently demand loss-free, low-latency paths from the Internet. However, Internet protocols and policies are highly optimized for elastic applications like text/images. While overlay networks promise application specific routing that often...

    Provided By University of Central England in Birmingham

  • White Papers // Jan 2011

    Combining Local and Global History for High Performance Data Prefetching

    In this paper, the authors present their design of a high performance prefetcher, which exploits various localities in both local cache-miss streams (misses generated from the same instruction) and the global cache-miss address stream (the misses from different instructions). Besides the stride and context localities that have been exploited in...

    Provided By University of Central England in Birmingham

  • White Papers // Jul 2010

    Improving Privacy and Lifetime of PCM-Based Main Memory

    Phase Change Memory (PCM) is a promising technology for computer memory systems. However, the non-volatile nature of PCM poses serious threats to computer privacy. The low programming endurance of PCM devices also limits the lifetime of PCM-based main memory. In this paper, the authors first adopt counter-mode encryption for privacy...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2010

    Evaluating Quality of Experience for Streaming Video in Real Time

    The authors present a scalable, lightweight, no-reference framework to infer video QoE. Their framework revolves around a onetime offline construction of a k-dimensional space, which they call the QoE space. The k-dimensions accommodate k parameters (network-dependent/independent) that potentially affect video quality. The k-dimensional space is partitioned to N representative zones,...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2009

    Mitigating Self-Interference Among IEEE 802.22 Networks: A Game Theoretic Perspective

    In this paper, the authors use game theory to mitigate self-interference among cognitive radio based IEEE 802.22 networks such that these networks can efficiently co-exist. When a network experiences interference, it can adopt either one of two choices-switch to a new band hoping to find a non-interfering one, or stay...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2009

    An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks

    While the problem of greedy behavior at the MAC layer has been widely explored in the context of Wireless Local Area Networks, its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a Wireless Local Area Network, an Access Point mostly forwards packets sent by...

    Provided By University of Central England in Birmingham

  • White Papers // Dec 2008

    Hardware-Software Integrated Approaches to Defend Against Software Cache-Based Side Channel Attacks

    Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in cryptographic operations through legitimate activities. Among existing countermeasures, software solutions are typically application specific and incur substantial performance overhead. Recent hardware proposals...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2007

    PMPM: Prediction by Combining Multiple Partial Matches

    The Prediction-by-Partial Matching (PPM) algorithm has been well known for its high prediction accuracy. Recent proposals of PPM-like predictors confirm its effectiveness on branch prediction. In this paper, the authors introduce a new branch prediction algorithm, named Prediction by combining Multiple Partial Matches (PMPM). The PMPM algorithm selectively combines multiple...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2006

    Locality-Based Information Redundancy for Processor Reliability

    In this paper, the authors propose a novel information redundancy scheme to protect microprocessors from transient faults. Similar to traditional information redundancy techniques such as ECC, their approach does not require redundant execution in order to detect faults. Instead, redundant bits are used to encode correct instruction execution. However, their...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2006

    Applying Chunking Theory in Organizational Password Guidelines

    In this paper, the authors evaluate the human impact that password authentication issues have on the security of information systems within organizations. This paper resulted in the creation of pass-word guidelines for authentication with passwords based on Miller's and Cowan's chunking theory research and a model for predicting the vulnerability...

    Provided By University of Central England in Birmingham

  • White Papers // Aug 2006

    Efficient Transient-Fault Tolerance for Multithreaded Processors Using Dual-Thread Execution

    Reliability becomes a key issue in computer system design as microprocessors are increasingly susceptible to transient faults. Many previously proposed schemes exploit Simultaneous Multi-Threaded (SMT) architectures to achieve transient-fault tolerance by running a program concurrently on two threads, a main thread and a redundant checker thread. Such schemes however often...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2012

    A New High-performance, Energy-efficient Replication Storage System with Reliability Guarantee

    In modern replication storage systems where data carries two or more multiple copies, a primary group of disks is always up to service incoming requests while other disks are often spun down to sleep states to save energy during slack periods. However, since new writes cannot be immediately synchronized onto...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2006

    Applying Chunking Theory in Organizational Password Guidelines

    In this paper, the authors evaluate the human impact that password authentication issues have on the security of information systems within organizations. This paper resulted in the creation of pass-word guidelines for authentication with passwords based on Miller's and Cowan's chunking theory research and a model for predicting the vulnerability...

    Provided By University of Central England in Birmingham

  • White Papers // Jul 2010

    Improving Privacy and Lifetime of PCM-Based Main Memory

    Phase Change Memory (PCM) is a promising technology for computer memory systems. However, the non-volatile nature of PCM poses serious threats to computer privacy. The low programming endurance of PCM devices also limits the lifetime of PCM-based main memory. In this paper, the authors first adopt counter-mode encryption for privacy...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2006

    Locality-Based Information Redundancy for Processor Reliability

    In this paper, the authors propose a novel information redundancy scheme to protect microprocessors from transient faults. Similar to traditional information redundancy techniques such as ECC, their approach does not require redundant execution in order to detect faults. Instead, redundant bits are used to encode correct instruction execution. However, their...

    Provided By University of Central England in Birmingham

  • White Papers // Aug 2006

    Efficient Transient-Fault Tolerance for Multithreaded Processors Using Dual-Thread Execution

    Reliability becomes a key issue in computer system design as microprocessors are increasingly susceptible to transient faults. Many previously proposed schemes exploit Simultaneous Multi-Threaded (SMT) architectures to achieve transient-fault tolerance by running a program concurrently on two threads, a main thread and a redundant checker thread. Such schemes however often...

    Provided By University of Central England in Birmingham

  • White Papers // Jan 2011

    Combining Local and Global History for High Performance Data Prefetching

    In this paper, the authors present their design of a high performance prefetcher, which exploits various localities in both local cache-miss streams (misses generated from the same instruction) and the global cache-miss address stream (the misses from different instructions). Besides the stride and context localities that have been exploited in...

    Provided By University of Central England in Birmingham

  • White Papers // Dec 2008

    Hardware-Software Integrated Approaches to Defend Against Software Cache-Based Side Channel Attacks

    Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in cryptographic operations through legitimate activities. Among existing countermeasures, software solutions are typically application specific and incur substantial performance overhead. Recent hardware proposals...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2007

    PMPM: Prediction by Combining Multiple Partial Matches

    The Prediction-by-Partial Matching (PPM) algorithm has been well known for its high prediction accuracy. Recent proposals of PPM-like predictors confirm its effectiveness on branch prediction. In this paper, the authors introduce a new branch prediction algorithm, named Prediction by combining Multiple Partial Matches (PMPM). The PMPM algorithm selectively combines multiple...

    Provided By University of Central England in Birmingham

  • White Papers // Aug 2013

    Automatic Assembly of a Hybrid Cloud for the Management and Simulation of a Smart Power Grid

    Several potential cloud applications require cooperation of multiple organizations; each organization has to coordinate some aspects of its activity and share some data with several other organizations, yet has strict security requirements for its own private data. The management of a smart grid is such an application; it is data-intensive,...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    MintMOS: A Lightweight, Real Time, No-Reference Tool for Inferring Video-QoE

    Inferring the subjective perception of a video stream in real time at arbitrary nodes in the Internet continues to be a stiff problem. This is because computing a Mean Opinion Score (MOS) in real time is both cumbersome and infeasible if the original frames are required for reference to infer...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    Effects of Internet Path Selection on Video-QoE: Analysis and Improvements

    This paper presents large scale Internet measurements to understand and improve the effects of Internet path selection on perceived video quality. The authors systematically study a large number of Internet paths between popular video destinations and clients to create an empirical understanding of location, persistence and recurrence of failures. They...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2011

    Internet for Interactive Multimedia

    Multimedia traffic is poised to account for more than 90% of all consumer Internet traffic. A variety of multimedia applications consistently demand loss-free, low-latency paths from the Internet. However, Internet protocols and policies are highly optimized for elastic applications like text/images. While overlay networks promise application specific routing that often...

    Provided By University of Central England in Birmingham

  • White Papers // Mar 2010

    Evaluating Quality of Experience for Streaming Video in Real Time

    The authors present a scalable, lightweight, no-reference framework to infer video QoE. Their framework revolves around a onetime offline construction of a k-dimensional space, which they call the QoE space. The k-dimensions accommodate k parameters (network-dependent/independent) that potentially affect video quality. The k-dimensional space is partitioned to N representative zones,...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2009

    Mitigating Self-Interference Among IEEE 802.22 Networks: A Game Theoretic Perspective

    In this paper, the authors use game theory to mitigate self-interference among cognitive radio based IEEE 802.22 networks such that these networks can efficiently co-exist. When a network experiences interference, it can adopt either one of two choices-switch to a new band hoping to find a non-interfering one, or stay...

    Provided By University of Central England in Birmingham

  • White Papers // Oct 2009

    An Effective Strategy for Greedy Behavior in Wireless Ad hoc Networks

    While the problem of greedy behavior at the MAC layer has been widely explored in the context of Wireless Local Area Networks, its study for multi-hop wireless networks still almost an unexplored and unexplained problem. Indeed, in a Wireless Local Area Network, an Access Point mostly forwards packets sent by...

    Provided By University of Central England in Birmingham

  • White Papers // May 2013

    Clustering Algorithms for Scale-Free Networks and Applications to Cloud Resource Management

    The analysis of high-level models of a system allows users to better understand its behavior. Oftentimes users use a finite state machine model of a system where vertices represent states and the directed arcs represent transitions between states. Such models provide insights on the system dynamics, but are seldom used...

    Provided By University of Central England in Birmingham

  • White Papers // May 2011

    A Team Registration System to Support Tracking Training and Enhancing Performance

    Programming competitions are varied and range from high school to college level. In addition, competitive learning, in general, is increasingly used in courses to foster improved focus on improvement. Such competitions require management tools; however, the authors also wish to support tracking of individual and team performance across such competitions....

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    A Pragmatic Calue-of-Information Approach for Intruder Tracking Sensor Networks

    Sensor networks are distributed systems where nodes embedded in the environment collect readings through their sensors and transmit data to customers. The overall goal of these systems can be stated as maximizing a metric of the sensing quality while limiting the consumption of a set of scarce resources. In this...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Optimal Content Delivery in DSA Networks: A Path Auction Based Framework

    In this paper, the authors address the problem of Optimal Content Delivery (OCD) in Dynamic Spectrum Access (DSA) networks, where the source of a flow sends data traffic to the destination in exchange for some monetary benefit, such as a subscription fee. Also, each intermediate secondary node incurs a cost...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Is the Clustering Coefficient a Measure for Fault Tolerance in Wireless Sensor Networks?

    Distributed systems such as the Internet and wireless sensor networks must provide a high degree of resilience against errors and attacks. Besides steps that increase reliability of data and resources of the network, the topology structure itself plays a crucial role in the efficacy of the fault-tolerance behavior. The network...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    Actor Positioning Based on Molecular Geometry in Aerial Sensor Networks

    Advances in Unmanned Aerial Vehicle (UAV) technology and Wireless Sensor and Actor Networks (WSAN) made it possible to equip small UAVs with sensors and deploy aerial sensor and actor networks. Aerial sensor networks enable high quality observation of events while reducing the number of requirements. Positioning of UAVs with actor...

    Provided By University of Central England in Birmingham

  • White Papers // Sep 2011

    On the Relationship Between Response Probability and Redundancy in Teams of Collaborating Agents

    One of the expected benefits of multi-agent systems is their capacity for redundancy which is expected to promote system robustness. The authors examine the impact agents' probabilistic action has on generating redundancy in multi-agent systems with no direct inter-agent communication. They present a mathematical model of such a system, analyze...

    Provided By University of Central England in Birmingham

  • White Papers // May 2012

    NSwitching: Virtual Machine Aware Relay Hardware Switching to Improve Intra-NIC Virtual Machine Traffic

    Recent development on Ethernet switching to provide Single Root I/O Virtualization (SR-IOV) on Network Interface cards (NICs) improves Ethernet throughput for Virtual Machines (VMs) and lowers CPU loads. SR-IOV creates multiple receive queues on a NIC, directly accessible by VMs for frames coming from sources external to the Ethernet port....

    Provided By University of Central England in Birmingham