University of Central Florida

Displaying 1-27 of 27 results

  • White Papers // Dec 2011

    Modular Enforcement of Supertype Abstraction and Information Hiding With Client-Side Checking

    Contemporary run-time assertion checkers for object-oriented languages over-zealously check assertions on the supplier side. For method calls, such supplier-side checking occurs at the exact run-time type of the receiver object, which in general can be a proper subtype of the receiver object's static type. However, the receiver object's static type...

    Provided By University of Central Florida

  • White Papers // Sep 2011

    Modular Contracts With Procedures, Annotations, Pointcuts and Advice

    There are numerous mechanisms for modularizing design by contract at the source code level. Three mechanisms have been the main focus of attention, metadata annotations, pointcuts and advice. The latter two are well-known aspect-oriented programming mechanisms, and according to the literature, fare better in achieving contract modularization. However, previous efforts...

    Provided By University of Central Florida

  • White Papers // Mar 2011

    Learning Non-Local Range Markov Random Field for Image Restoration

    In this paper, the authors design a novel MRF framework which is called Non-Local Range Markov Random Field (NLRMRF). The local spatial range of clique in traditional MRF is extended to the non-local range which is defined over the local patch and also its similar patches in a non-local window....

    Provided By University of Central Florida

  • White Papers // Feb 2011

    VisIO: Enabling Interactive Visualization of Ultra-Scale, Time Series Data Via High-Bandwidth Distributed I/O Systems

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visualization of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying...

    Provided By University of Central Florida

  • White Papers // Jan 2011

    A Scalable Reverse Lookup Scheme Using Group-Based Shifted Declustering Layout

    Recent years have witnessed an increasing demand for super data clusters. The super data clusters have reached the petabyte-scale that can consist of thousands or tens of thousands storage nodes at a single site. For this architecture, reliability is becoming a great concern. In order to achieve a high reliability,...

    Provided By University of Central Florida

  • White Papers // Jan 2011

    A Novel Power Management for CMP Systems in Data-Intensive Environment

    The emerging data-intensive applications of today are comprised of non-uniform CPU and I/O intensive workloads, thus imposing a requirement to consider both CPU and I/O effects in the power management strategies. Only scaling down the processor's frequency based on its busy/idle ratio cannot fully exploit opportunities of saving power. The...

    Provided By University of Central Florida

  • White Papers // Jan 2011

    Image Synthesis Using Adjoint Photons

    The most straightforward image synthesis algorithm is to follow photon-like particles from luminaires through the environment. These particles scatter or are absorbed when they interact with a surface or a volume. They contribute to the image if and when they strike a sensor. Such an algorithm implicitly solves the light...

    Provided By University of Central Florida

  • White Papers // Nov 2010

    Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    The overarching purpose of this paper is to determine the efficiency and sustained benefit of information security awareness training using simulated events in a V-CoP environment. The results of the study would provide useful feedback that organizations can use to determine if awareness training in a web-based simulated environment can...

    Provided By University of Central Florida

  • White Papers // Oct 2010

    Power Control by Distribution Tree With Classified Power Capping in Cloud Computing

    Power management is becoming very important in data centers. Cloud computing is also one of the newer promising techniques, that are appealing to many big companies. To apply power management in cloud computing has been proposed and considered as green computing. Cloud computing, due to its dynamic structure and property...

    Provided By University of Central Florida

  • White Papers // Oct 2010

    The Cost of Cloud Based Scientific Data Sharing

    Today with the increasing popularity of interdisciplinary study and collaborative research, sharing scientific data between research institutes is crucial. Meanwhile, as cloud storage is maturing and becoming an important alternative for on-premise storage, it is reasonable to anticipate that data sharing using cloud will become promising in the near future....

    Provided By University of Central Florida

  • White Papers // Sep 2010

    Local Positioning for Environmental Monitoring in Wireless Sensor and Actor Networks

    Location estimation of sensor nodes is an essential part of most applications for Wireless Sensor and Actor Networks (WSAN). The ambiguous location information often makes the collected data useless in these applications. Environmental monitoring in particular relies on an accurate position estimation in order to process or evaluate the collected...

    Provided By University of Central Florida

  • White Papers // Sep 2010

    SOFROP: Self-Organizing and Fair Routing Protocol for Wireless Networks With Mobile Sensors and Stationary Actors

    Wireless Sensor and Actor Networks (WSAN) have become increasingly popular in recent years. The cooperative operation between sensor and actor nodes results in a major advantage against pure sensor networks and extends the range of possible application scenarios. One emerging application is the Amazon scenario in which stationary actors are...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Authentication Analysis of the 802.11i Protocol

    IEEE has designed 802.11i protocol to address the security issues in wireless local area networks. Formal analysis is important to ensure that the protocols work properly without having to resort to tedious testing and debugging which can only show the presence of errors, never their absence. In this paper, the...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Towards Efficiency and Portability: Programming With the BSP Model

    The Bulk-Synchronous Parallel (BSP) model was proposed by Valiant as a model for general-purpose parallel computation. The objective of the model is to allow the design of parallel programs that can be executed efficiently on a variety of architectures. While many theoretical arguments in support of the BSP model have...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Lightweight Routing With QoS Support in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) can be used for monitoring physical environments and acting according to the observations. In order to differentiate the actions based on the sensed information, WSANs comprise of various applications with different Quality of Service (QoS) requirements. QoS solutions for WSANs are challenging compared to...

    Provided By University of Central Florida

  • White Papers // Jun 2010

    3-CE: A Cooperation Enforcement Technique for Data Forwarding in Vehicular Networks

    Operations of vehicular ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on...

    Provided By University of Central Florida

  • White Papers // Jun 2010

    The Design of SafeJML, a Specification Language for SCJ With Support for WCET Specification

    Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear power plants. SafeJML extends the Java Modeling Language (JML) to allow specification and checking of both functional and timing constraints for SCJ programs. When the...

    Provided By University of Central Florida

  • White Papers // Apr 2010

    Android Vs IPhone

    Android, originally meaning "Robot", is a mobile operating system using a modified version of the Linux kernel. It was initially developed by Android Inc., a firm later purchased by Google, and lately by the Open Handset Alliance. It allows developers to write managed code in the Java language, controlling the...

    Provided By University of Central Florida

  • White Papers // Mar 2010

    BI Development for Education by Our Institutional Research Department or How BI Tools Made Our Motto "IR Is Data" a Fact

    In response to the demand for more sophisticated information collection, analysis, and reporting, the Office of Institutional Research (IR) at the University of Central Florida implemented the SAS Enterprise BI platform. The different components of the SAS BI toolset have aided one in meeting the challenge of delivering accessible data...

    Provided By University of Central Florida

  • White Papers // Jan 2010

    A WEP Post-Processing Algorithm for a Robust 802.11 WLAN Implementation

    Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "Major security flaws" thus Wireless Local Area Networks (WLANs) using the protocol are vulnerable to attacks. This paper proposes a scrambling algorithm that reduces the security vulnerabilities of the WEP. The algorithm randomizes the data and prevents access...

    Provided By University of Central Florida

  • White Papers // Jan 2010

    WRN: Improving System Performance in 3G Networks Through Fixed Multi-Hop Relay Nodes

    Non-uniform coverage and low system throughput due to location dependent fading in cellular networks is a major bottleneck in providing quality of service. Moreover, the growing number of stand-alone Wi-Fi hotspots is creating competition for the 3G cellular networks. This paper proposes an architecture which augments the existing 3G downlink...

    Provided By University of Central Florida

  • White Papers // Dec 2009

    TRAID: Exploiting Temporal Redundancy and Spatial Redundancy to Boost Transaction Processing Systems Performance

    In the past few years, more storage system applications have employed transaction processing techniques to ensure data integrity and consistency. Logging is one of the key requirements to ensure transaction ACID (Atomicity, Consistency, Isolation, Durability) properties and data recoverability in Transaction Processing Systems (TPS). Recently, emerging complex I/O bound transactions...

    Provided By University of Central Florida

  • White Papers // Dec 2009

    Consumer Perceptions Of Environmentally Friendly Lodging: The Generational Differences

    There is a growing consensus that all tourism, including hotels, plays a role in achieving sustainability. Involvement in environmental activities may be driven by economic as well as ethical considerations. Hotels implementing environmentally friendly strategies not only increase the efficiency of lodging operations but also attracts new market segments. Hospitality...

    Provided By University of Central Florida

  • White Papers // May 2009

    APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining

    While the emerging field of Privacy Preserving Data Mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are difficult to develop and computationally intensive to execute. Developers need convenient abstractions to reduce the costs of engineering PPDM applications. The individual parties involved...

    Provided By University of Central Florida

  • White Papers // Mar 2009

    Multiple and Unlinkable Public Key Encryption Without Certificates

    The authors newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, the scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the...

    Provided By University of Central Florida

  • White Papers // Nov 2008

    Introducing Map-Reduce to High End Computing

    In this paper, the authors present an scientific application that has been given a Hadoop MapReduce implementation. They also discuss other scientific fields of supercomputing that could benefit from a MapReduce implementation. They recognize in this work that Hadoop has potential benefit for more applications than simply datamining, but that...

    Provided By University of Central Florida

  • White Papers // Jan 2007

    Identifying Skilled Managers: Evidence From Mutual Fund Short Sales

    In this paper, the authors provide a first look at the short positions established by 75 mutual funds that used short sales of US domestic stocks as an investment strategy. They document that mutual funds tend to establish short positions in the larger and more liquid stocks, likely to minimize...

    Provided By University of Central Florida

  • White Papers // May 2009

    APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining

    While the emerging field of Privacy Preserving Data Mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are difficult to develop and computationally intensive to execute. Developers need convenient abstractions to reduce the costs of engineering PPDM applications. The individual parties involved...

    Provided By University of Central Florida

  • White Papers // Mar 2010

    BI Development for Education by Our Institutional Research Department or How BI Tools Made Our Motto "IR Is Data" a Fact

    In response to the demand for more sophisticated information collection, analysis, and reporting, the Office of Institutional Research (IR) at the University of Central Florida implemented the SAS Enterprise BI platform. The different components of the SAS BI toolset have aided one in meeting the challenge of delivering accessible data...

    Provided By University of Central Florida

  • White Papers // Jan 2010

    A WEP Post-Processing Algorithm for a Robust 802.11 WLAN Implementation

    Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "Major security flaws" thus Wireless Local Area Networks (WLANs) using the protocol are vulnerable to attacks. This paper proposes a scrambling algorithm that reduces the security vulnerabilities of the WEP. The algorithm randomizes the data and prevents access...

    Provided By University of Central Florida

  • White Papers // Apr 2010

    Android Vs IPhone

    Android, originally meaning "Robot", is a mobile operating system using a modified version of the Linux kernel. It was initially developed by Android Inc., a firm later purchased by Google, and lately by the Open Handset Alliance. It allows developers to write managed code in the Java language, controlling the...

    Provided By University of Central Florida

  • White Papers // Jan 2010

    WRN: Improving System Performance in 3G Networks Through Fixed Multi-Hop Relay Nodes

    Non-uniform coverage and low system throughput due to location dependent fading in cellular networks is a major bottleneck in providing quality of service. Moreover, the growing number of stand-alone Wi-Fi hotspots is creating competition for the 3G cellular networks. This paper proposes an architecture which augments the existing 3G downlink...

    Provided By University of Central Florida

  • White Papers // Dec 2009

    Consumer Perceptions Of Environmentally Friendly Lodging: The Generational Differences

    There is a growing consensus that all tourism, including hotels, plays a role in achieving sustainability. Involvement in environmental activities may be driven by economic as well as ethical considerations. Hotels implementing environmentally friendly strategies not only increase the efficiency of lodging operations but also attracts new market segments. Hospitality...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Lightweight Routing With QoS Support in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) can be used for monitoring physical environments and acting according to the observations. In order to differentiate the actions based on the sensed information, WSANs comprise of various applications with different Quality of Service (QoS) requirements. QoS solutions for WSANs are challenging compared to...

    Provided By University of Central Florida

  • White Papers // Sep 2010

    SOFROP: Self-Organizing and Fair Routing Protocol for Wireless Networks With Mobile Sensors and Stationary Actors

    Wireless Sensor and Actor Networks (WSAN) have become increasingly popular in recent years. The cooperative operation between sensor and actor nodes results in a major advantage against pure sensor networks and extends the range of possible application scenarios. One emerging application is the Amazon scenario in which stationary actors are...

    Provided By University of Central Florida

  • White Papers // Sep 2010

    Local Positioning for Environmental Monitoring in Wireless Sensor and Actor Networks

    Location estimation of sensor nodes is an essential part of most applications for Wireless Sensor and Actor Networks (WSAN). The ambiguous location information often makes the collected data useless in these applications. Environmental monitoring in particular relies on an accurate position estimation in order to process or evaluate the collected...

    Provided By University of Central Florida

  • White Papers // Jan 2011

    A Scalable Reverse Lookup Scheme Using Group-Based Shifted Declustering Layout

    Recent years have witnessed an increasing demand for super data clusters. The super data clusters have reached the petabyte-scale that can consist of thousands or tens of thousands storage nodes at a single site. For this architecture, reliability is becoming a great concern. In order to achieve a high reliability,...

    Provided By University of Central Florida

  • White Papers // Oct 2010

    The Cost of Cloud Based Scientific Data Sharing

    Today with the increasing popularity of interdisciplinary study and collaborative research, sharing scientific data between research institutes is crucial. Meanwhile, as cloud storage is maturing and becoming an important alternative for on-premise storage, it is reasonable to anticipate that data sharing using cloud will become promising in the near future....

    Provided By University of Central Florida

  • White Papers // Jan 2011

    A Novel Power Management for CMP Systems in Data-Intensive Environment

    The emerging data-intensive applications of today are comprised of non-uniform CPU and I/O intensive workloads, thus imposing a requirement to consider both CPU and I/O effects in the power management strategies. Only scaling down the processor's frequency based on its busy/idle ratio cannot fully exploit opportunities of saving power. The...

    Provided By University of Central Florida

  • White Papers // Dec 2009

    TRAID: Exploiting Temporal Redundancy and Spatial Redundancy to Boost Transaction Processing Systems Performance

    In the past few years, more storage system applications have employed transaction processing techniques to ensure data integrity and consistency. Logging is one of the key requirements to ensure transaction ACID (Atomicity, Consistency, Isolation, Durability) properties and data recoverability in Transaction Processing Systems (TPS). Recently, emerging complex I/O bound transactions...

    Provided By University of Central Florida

  • White Papers // Feb 2011

    VisIO: Enabling Interactive Visualization of Ultra-Scale, Time Series Data Via High-Bandwidth Distributed I/O Systems

    Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visualization of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying...

    Provided By University of Central Florida

  • White Papers // Oct 2010

    Power Control by Distribution Tree With Classified Power Capping in Cloud Computing

    Power management is becoming very important in data centers. Cloud computing is also one of the newer promising techniques, that are appealing to many big companies. To apply power management in cloud computing has been proposed and considered as green computing. Cloud computing, due to its dynamic structure and property...

    Provided By University of Central Florida

  • White Papers // Mar 2009

    Multiple and Unlinkable Public Key Encryption Without Certificates

    The authors newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, the scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Towards Efficiency and Portability: Programming With the BSP Model

    The Bulk-Synchronous Parallel (BSP) model was proposed by Valiant as a model for general-purpose parallel computation. The objective of the model is to allow the design of parallel programs that can be executed efficiently on a variety of architectures. While many theoretical arguments in support of the BSP model have...

    Provided By University of Central Florida

  • White Papers // Jan 2007

    Identifying Skilled Managers: Evidence From Mutual Fund Short Sales

    In this paper, the authors provide a first look at the short positions established by 75 mutual funds that used short sales of US domestic stocks as an investment strategy. They document that mutual funds tend to establish short positions in the larger and more liquid stocks, likely to minimize...

    Provided By University of Central Florida

  • White Papers // Aug 2010

    Authentication Analysis of the 802.11i Protocol

    IEEE has designed 802.11i protocol to address the security issues in wireless local area networks. Formal analysis is important to ensure that the protocols work properly without having to resort to tedious testing and debugging which can only show the presence of errors, never their absence. In this paper, the...

    Provided By University of Central Florida

  • White Papers // Jan 2011

    Image Synthesis Using Adjoint Photons

    The most straightforward image synthesis algorithm is to follow photon-like particles from luminaires through the environment. These particles scatter or are absorbed when they interact with a surface or a volume. They contribute to the image if and when they strike a sensor. Such an algorithm implicitly solves the light...

    Provided By University of Central Florida

  • White Papers // Mar 2011

    Learning Non-Local Range Markov Random Field for Image Restoration

    In this paper, the authors design a novel MRF framework which is called Non-Local Range Markov Random Field (NLRMRF). The local spatial range of clique in traditional MRF is extended to the non-local range which is defined over the local patch and also its similar patches in a non-local window....

    Provided By University of Central Florida

  • White Papers // Jun 2010

    3-CE: A Cooperation Enforcement Technique for Data Forwarding in Vehicular Networks

    Operations of vehicular ad hoc networks rely on the collaboration of participating nodes to route data for each other. This standard approach using a fixed set of nodes for each communication link cannot cope with high mobility due to a high frequency of link breaks. A recent approach based on...

    Provided By University of Central Florida

  • White Papers // Nov 2010

    Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    The overarching purpose of this paper is to determine the efficiency and sustained benefit of information security awareness training using simulated events in a V-CoP environment. The results of the study would provide useful feedback that organizations can use to determine if awareness training in a web-based simulated environment can...

    Provided By University of Central Florida

  • White Papers // Dec 2011

    Modular Enforcement of Supertype Abstraction and Information Hiding With Client-Side Checking

    Contemporary run-time assertion checkers for object-oriented languages over-zealously check assertions on the supplier side. For method calls, such supplier-side checking occurs at the exact run-time type of the receiver object, which in general can be a proper subtype of the receiver object's static type. However, the receiver object's static type...

    Provided By University of Central Florida

  • White Papers // Sep 2011

    Modular Contracts With Procedures, Annotations, Pointcuts and Advice

    There are numerous mechanisms for modularizing design by contract at the source code level. Three mechanisms have been the main focus of attention, metadata annotations, pointcuts and advice. The latter two are well-known aspect-oriented programming mechanisms, and according to the literature, fare better in achieving contract modularization. However, previous efforts...

    Provided By University of Central Florida

  • White Papers // Jun 2010

    The Design of SafeJML, a Specification Language for SCJ With Support for WCET Specification

    Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear power plants. SafeJML extends the Java Modeling Language (JML) to allow specification and checking of both functional and timing constraints for SCJ programs. When the...

    Provided By University of Central Florida

  • White Papers // Nov 2008

    Introducing Map-Reduce to High End Computing

    In this paper, the authors present an scientific application that has been given a Hadoop MapReduce implementation. They also discuss other scientific fields of supercomputing that could benefit from a MapReduce implementation. They recognize in this work that Hadoop has potential benefit for more applications than simply datamining, but that...

    Provided By University of Central Florida