University of Houston

Displaying 1-40 of 45 results

  • White Papers // Jun 2012

    Discovering Frequent Pattern Pairs

    Cubes and association rules discover frequent patterns in a data set, most of which are not significant. Thus previous research has introduced search constraints and statistical metrics to discover significant patterns and reduce processing time. The authors introduce cube pairs (comparing cube groups based on a parametric statistical test) and...

    Provided By University of Houston

  • White Papers // Jan 2012

    Bounding and Estimating Association Rule Support From Clusters on Binary Data

    The theoretical relationship between association rules and machine learning techniques needs to be studied in more depth. This explains the use of clustering as a model for association rule mining. The clustering model is exploited to bound and estimate association rule support and confidence. The authors first study the efficient...

    Provided By University of Houston

  • White Papers // Jan 2012

    Bayesian Classifiers Programmed in SQL

    The Bayesian classier is a fundamental classification technique. In this paper, the authors focus on programming Bayesian classifiers in SQL. They introduce two classifiers: Naive Bayes and a classier based on class decomposition using K-means clustering. They consider two complementary tasks: model computation and scoring a data set. They study...

    Provided By University of Houston

  • White Papers // Jan 2012

    Fast UDFs to Compute Sufficient Statistics on Large Data Sets Exploiting Caching and Sampling

    User-Defined Functions (UDFs) represent an extensibility mechanism provided by most DBMSs, whose execution happens in main memory. Also, UDFs leverage the DBMS multithreaded capabilities and exploit the C language speed and flexibility for mathematical computations. In this paper, the authors study how to accelerate computation of sufficient statistics on large...

    Provided By University of Houston

  • White Papers // Jan 2012

    Evaluating Join Performance on Relational Database Systems

    The join operator is fundamental in relational database systems. Evaluating join queries on large tables is challenging because records need to be efficiently matched based on a given key. In this paper, the authors analyze join queries in SQL with large tables in which a foreign key may be null,...

    Provided By University of Houston

  • White Papers // Aug 2011

    SenGuard: Passive User Identification on Smartphones Using Multiple Sensors

    User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user...

    Provided By University of Houston

  • White Papers // Apr 2011

    Extended Aggregations for Databases With Referential Integrity Issues

    Querying databases with incomplete or inconsistent content remains a broad and difficult problem. In this paper, the authors study how to improve aggregations computed on databases with referential errors in the context of database integration, where each source database has different tables, columns with similar content across multiple databases, but...

    Provided By University of Houston

  • White Papers // Mar 2011

    Using Six Sigma to Improve IT Help Desk Customer Service

    Within most organizations, the Information Technology (IT) department typically provides the infrastructure, implementation, and administration of hardware, software, networking, and database management. Unfortunately, employees using these systems sometimes encounter problems that hinder the daily productivity of the organization. When such problems occur, it interrupts the flow of work, thereby causing...

    Provided By University of Houston

  • White Papers // Jan 2011

    The Case for Aggressive Partial Preloading in Broadcasting Protocols for Video-on-Demand

    Broadcasting protocols for video-on-demand usually consume over fifty percent of their bandwidth to distribute the first ten to fifteen minutes of the videos they distribute. Since all these protocols require the user set-top box to include a disk drive, the authors propose to use this drive to store the first...

    Provided By University of Houston

  • White Papers // Jan 2011

    Toward Optimal Data Aggregation in Random Wireless Sensor Networks

    Fueled by the increasing capability and decreasing cost of computing and communication devices, Wireless Sensor Networks (WSNs) hold the promise of revolutionizing a wide range of application domains such as machine failure diagnosis, pollutant detection, medical emergency response, and supply chain management. Irrespective of the domain-specific characteristics of various applications,...

    Provided By University of Houston

  • White Papers // Jan 2011

    Butterflies in the Mesh: Lightweight Localized Wireless Network Coding

    In this paper, BFLY-a lightweight localized network coding protocol for wireless mesh networks-is proposed. To supplement forwarding packets in classical networks, intermediate wireless nodes code packets from different sources, so that each transmission's information content is increased by a factor of more than one. Prior work allowed intermediate nodes to...

    Provided By University of Houston

  • White Papers // Dec 2010

    Coalition Formation Games for Relay Transmission: Stability Analysis Under Uncertainty

    Relay transmission or cooperative communication is an advanced technique that can improve the performance of data transmission among wireless nodes. However, while the performance (e.g., throughput) of a source node can be improved through cooperation with a number of relays, this improvement comes at the expense of a degraded performance...

    Provided By University of Houston

  • White Papers // Dec 2010

    Impact of Packet Loss on Power Demand Estimation and Power Supply Cost in Smart Grid

    The evolving smart grid will use advanced data communications and networking techniques to improve efficiency and reliability of electric power generation, transmission, distribution, and consumption. Packet loss performance of the data communications networks used in smart grid will have impact on the cost of power supply. In this paper, the...

    Provided By University of Houston

  • White Papers // Dec 2010

    Binary Inference for Primary User Separation in Cognitive Radio Networks

    Spectrum sensing receives much attention recently in the Cognitive Radio (CR) network research, i.e., Secondary Users (SUs) constantly monitor channel condition to detect the presence of the Primary Users (PUs). In this paper, the authors go beyond spectrum sensing and introduce the PU separation problem, which concerns with the issues...

    Provided By University of Houston

  • White Papers // Nov 2010

    An Analysis of Chaining Protocols for Video-on-Demand

    Chaining protocols for video-on-demand require each client to forward the video data it receives to the next client watching the same video. The authors present here the first analytical investigation of standard chaining, advanced chaining, optimal chaining, expanded chaining (also known as the cooperative protocol) and accelerated chaining. The authors'...

    Provided By University of Houston

  • White Papers // Nov 2010

    Using a Shared Storage Class Memory Device to Improve the Reliability of RAID Arrays

    Storage Class Memories (SCMs) constitute an emerging class of non-volatile storage devices that promise to be significantly faster and more reliable than magnetic disks. The authors propose to add one of these devices to each group of two or three RAID level arrays and store on it additional parity data....

    Provided By University of Houston

  • White Papers // Oct 2010

    Robust Coverage Under Uncertainty in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been employed in monitoring the health of civil structures, tracking objects, studying the wild life habitat, among others. One critical measure of the Quality of Sensing (QoS) in a wireless sensor network is its coverage, i.e., "How well do the sensors observe the physical space."...

    Provided By University of Houston

  • White Papers // Oct 2010

    On the Computation of Stochastic Search Variable Selection in Linear Regression With UDFs

    Computing Bayesian statistics with traditional techniques is extremely slow, specially when large data has to be exported from a relational DBMS. The authors propose algorithms for large scale processing of Stochastic Search Variable Selection (SSVS) for linear regression that can work entirely inside a DBMS. The traditional SSVS algorithm requires...

    Provided By University of Houston

  • White Papers // May 2010

    Multiple View Scalability of Presentations Distributed to Heterogeneous Devices

    This paper presents a novel approach of distributing lecture video by capturing multiple region of interest video streams from a high definition camera and then distributing via a peer-to-peer network to participants' viewing devices. This paper shows this approach is scalable and supports a broader range of viewing devices for...

    Provided By University of Houston

  • White Papers // May 2010

    A Two-Tier Market for Decentralized Dynamic Spectrum Access in Cognitive Radio Networks

    Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, the authors propose a two-tier market for decentralized dynamic spectrum access. In the proposed Tier-1 market, spectrum is traded from a Primary User (PU) to Secondary Users (SUs) in a...

    Provided By University of Houston

  • White Papers // Apr 2010

    Using Shared Parity Disks to Improve the Reliability of RAID Arrays

    This paper proposes to increase the reliability of RAID level 5 arrays used for storing archival data. First, the authors identify groups of two or three identical RAID arrays. Second, the authors add to each group a shared parity disk containing the diagonal parities of their arrays. This paper shows...

    Provided By University of Houston

  • White Papers // Apr 2010

    Detection and Punishment of Malicious Wireless Stations in IEEE 802.11e EDCA Network

    The authors propose a malicious detection algorithm that permits identification of misbehaving wireless stations, and then meting out punishment by not supplying an ACK packet permitting transmission by the malicious stations. The proposed algorithm is designed for IEEE 802.11e network and based upon detecting a change in QoS moving a...

    Provided By University of Houston

  • White Papers // Mar 2010

    Using Dynamic and Cascading Prompts in SAS Enterprise Guide

    SAS 9.2 Phase 2 and Enterprise Guide 4.2 offer new and improved ways of parameterizing one's programs. Prompted selection lists can be linked to data sets so that the lists change with the contents of the data. Prompts can also be connected to each other so that the value of...

    Provided By University of Houston

  • White Papers // Mar 2010

    Content Aware Burst Assembly - Supporting Telesurgery and Telemedicine in Optical Burst Switching Networks

    The emerging telemedicine and telesurgery technologies allow patients to share medical experts remotely through communication networks. However, network bandwidth, network latency and jitter (variation of latency), are the obstacles to the widespread use of this technology remotely. Optical Burst Switching (OBS) networks greatly expand network bandwidth in existing network infrastructure...

    Provided By University of Houston

  • White Papers // Jan 2010

    Collaborative Spectrum Sensing From Sparse Observations Using Matrix Completion for Cognitive Radio Networks

    In cognitive radio, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary users). Collaborative spectrum sensing among the cognitive radio nodes is expected to improve the ability of checking complete spectrum usage states. Unfortunately, due to power limitation and channel fading, available...

    Provided By University of Houston

  • White Papers // Jan 2010

    Improved Wireless Secrecy Capacity Using Distributed Auction Theory

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers....

    Provided By University of Houston

  • White Papers // Nov 2009

    Physical Layer Security Game: Interaction Between Source, Eavesdropper and Friendly Jammer

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eaves drop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the...

    Provided By University of Houston

  • White Papers // Oct 2009

    Planning And Projecting Critical Human Resource Needs

    The U.S. Army Reserve struggles with retention and faces difficulties with soldier turnover. The intent of the study was to assess key psychological variables such as optimism and hope to establish how those traits might impact soldiers' level of organizational commitment and turnover intention in the Army. The sample consisted...

    Provided By University of Houston

  • White Papers // Oct 2009

    WiserAnalyzer: A Passive Monitoring Framework for WLANs

    Due to low hardware costs, availability of unlicensed spectrums and support of mobility, WLANs have been widely adopted in home, enterprise, hospital, and campus environments. These networks are used for various purposes including VOIP, data services and inventory management. The QoS in WLANs may be degraded due to a number...

    Provided By University of Houston

  • White Papers // Oct 2009

    Improved Wireless Secrecy Rate Using Distributed Auction Theory

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy rate can be improved using friendly jammers that introduce extra interference to the eavesdroppers....

    Provided By University of Houston

  • White Papers // Oct 2009

    Repeated Auctions With Learning for Spectrum Access in Cognitive Radio Networks

    In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a...

    Provided By University of Houston

  • White Papers // Oct 2009

    Communication Framework for Fault-Tolerant Parallel Execution

    PC grids represent massive computation capacity at a low cost, but are challenging to employ for parallel computing because of variable and unpredictable performance and availability. A communicating parallel program must employ checkpoint-restart and/or process redundancy to make continuous forward progress in such an unreliable environment. A communication model based...

    Provided By University of Houston

  • White Papers // Sep 2009

    Logicalization of Communication Traces From Parallel Execution

    Communication traces are integral to performance modeling and analysis of parallel programs. However, execution on a large number of nodes results in a large trace volume that is cumbersome and expensive to analyze. This paper presents an automatic framework to convert all process traces corresponding to the parallel execution of...

    Provided By University of Houston

  • White Papers // Sep 2009

    A Multiplayer Real-Time Game Protocol Architecture for Reducing Network Latency

    Multiplayer, real-time games have become a huge commercial service. Because of this success, the need exists for a more efficient and reliable game server solution. Such games are a kind of soft real-time systems because a game server has to respond to requests from many clients, compute the action of...

    Provided By University of Houston

  • White Papers // Jul 2009

    Security in Cyber-Physical Systems

    Information Security is a domain of IT that has a well developed body of knowledge, and a cadre of practitioners with significant experience in securing IT systems. Cyber Physical Systems (CPS) also has a well developed body of knowledge and a well trained cadre of professionals that have been successfully...

    Provided By University of Houston

  • White Papers // Jun 2009

    A Referential Integrity Browser for Distributed Databases

    The authors demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The program computes data quality metrics for referential integrity at four granularity levels: database, table, column and value, going from a global to a detailed...

    Provided By University of Houston

  • White Papers // Jun 2009

    Coalitional Games for Distributed Eavesdroppers Cooperation in Wireless Networks

    Physical layer security aspects of wireless networks have recently attracted an increased attention due to the emergence of large-scale decentralized networks. While most existing literature focuses on link-level performance analysis from the perspective of the wireless users, this paper turns the attention to the eavesdroppers' (attacker) side of the problem....

    Provided By University of Houston

  • White Papers // May 2009

    Auction-Based Resource Allocation for Cooperative Video Transmission Protocols Over Wireless Networks

    Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast...

    Provided By University of Houston

  • White Papers // Mar 2009

    Sparse Event Detection in Wireless Sensor Networks Using Compressive Sensing

    Compressive sensing is a revolutionary idea proposed recently to achieve much lower sampling rate for sparse signals. For large wireless sensor networks, the events are relatively sparse compared with the number of sources. Because of deployment cost, the number of sensors is limited, and due to energy constraint, not all...

    Provided By University of Houston

  • White Papers // Feb 2009

    Weather And Financial Risk-Taking: Is Happiness The Channel?

    Weather variables, in particular sunshine, are found to be strongly correlated with financial variables. The author considers self-reported happiness as a channel through which sunshine affects financial variables. The author examines the influence of happiness on risk-taking behavior by incrementing individual happiness with regional sunshine. The author fined that happy...

    Provided By University of Houston

  • White Papers // Nov 2006

    Supply Chain Management In The Petroleum Industry

    Supply chain management in the petroleum industry contains various challenges, specifically in the logistics area, that are not present in most other industries. These logistical challenges are a major influence on the cost of oil and its derivatives. However, opportunities for cost savings in logistics still do exist. Giant oil...

    Provided By University of Houston

  • White Papers // Nov 2009

    Physical Layer Security Game: Interaction Between Source, Eavesdropper and Friendly Jammer

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eaves drop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the...

    Provided By University of Houston

  • White Papers // Mar 2010

    Using Dynamic and Cascading Prompts in SAS Enterprise Guide

    SAS 9.2 Phase 2 and Enterprise Guide 4.2 offer new and improved ways of parameterizing one's programs. Prompted selection lists can be linked to data sets so that the lists change with the contents of the data. Prompts can also be connected to each other so that the value of...

    Provided By University of Houston

  • White Papers // Apr 2006

    Marketing - Sales Interface For New Products: Analytical And Empirical Essays

    Commercializing new products successfully provides the financial return companies need for continuous growth. Though studies have demonstrated that the sales force is a major contributing factor to new product success, few efforts have been devoted to understanding the interplay of diffusion processes and sales force management strategies in new product...

    Provided By University of Houston

  • White Papers // Apr 2010

    Using Shared Parity Disks to Improve the Reliability of RAID Arrays

    This paper proposes to increase the reliability of RAID level 5 arrays used for storing archival data. First, the authors identify groups of two or three identical RAID arrays. Second, the authors add to each group a shared parity disk containing the diagonal parities of their arrays. This paper shows...

    Provided By University of Houston

  • White Papers // Oct 2009

    Planning And Projecting Critical Human Resource Needs

    The U.S. Army Reserve struggles with retention and faces difficulties with soldier turnover. The intent of the study was to assess key psychological variables such as optimism and hope to establish how those traits might impact soldiers' level of organizational commitment and turnover intention in the Army. The sample consisted...

    Provided By University of Houston

  • White Papers // May 2010

    Multiple View Scalability of Presentations Distributed to Heterogeneous Devices

    This paper presents a novel approach of distributing lecture video by capturing multiple region of interest video streams from a high definition camera and then distributing via a peer-to-peer network to participants' viewing devices. This paper shows this approach is scalable and supports a broader range of viewing devices for...

    Provided By University of Houston

  • White Papers // Oct 2009

    Improved Wireless Secrecy Rate Using Distributed Auction Theory

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy rate can be improved using friendly jammers that introduce extra interference to the eavesdroppers....

    Provided By University of Houston

  • White Papers // Feb 2009

    Weather And Financial Risk-Taking: Is Happiness The Channel?

    Weather variables, in particular sunshine, are found to be strongly correlated with financial variables. The author considers self-reported happiness as a channel through which sunshine affects financial variables. The author examines the influence of happiness on risk-taking behavior by incrementing individual happiness with regional sunshine. The author fined that happy...

    Provided By University of Houston

  • White Papers // Jul 2009

    Security in Cyber-Physical Systems

    Information Security is a domain of IT that has a well developed body of knowledge, and a cadre of practitioners with significant experience in securing IT systems. Cyber Physical Systems (CPS) also has a well developed body of knowledge and a well trained cadre of professionals that have been successfully...

    Provided By University of Houston

  • White Papers // Jan 2010

    Collaborative Spectrum Sensing From Sparse Observations Using Matrix Completion for Cognitive Radio Networks

    In cognitive radio, spectrum sensing is a key component to detect spectrum holes (i.e., channels not used by any primary users). Collaborative spectrum sensing among the cognitive radio nodes is expected to improve the ability of checking complete spectrum usage states. Unfortunately, due to power limitation and channel fading, available...

    Provided By University of Houston

  • White Papers // Dec 2010

    Binary Inference for Primary User Separation in Cognitive Radio Networks

    Spectrum sensing receives much attention recently in the Cognitive Radio (CR) network research, i.e., Secondary Users (SUs) constantly monitor channel condition to detect the presence of the Primary Users (PUs). In this paper, the authors go beyond spectrum sensing and introduce the PU separation problem, which concerns with the issues...

    Provided By University of Houston

  • White Papers // Jan 2011

    The Case for Aggressive Partial Preloading in Broadcasting Protocols for Video-on-Demand

    Broadcasting protocols for video-on-demand usually consume over fifty percent of their bandwidth to distribute the first ten to fifteen minutes of the videos they distribute. Since all these protocols require the user set-top box to include a disk drive, the authors propose to use this drive to store the first...

    Provided By University of Houston

  • White Papers // Oct 2009

    Repeated Auctions With Learning for Spectrum Access in Cognitive Radio Networks

    In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a...

    Provided By University of Houston

  • White Papers // Sep 2009

    Logicalization of Communication Traces From Parallel Execution

    Communication traces are integral to performance modeling and analysis of parallel programs. However, execution on a large number of nodes results in a large trace volume that is cumbersome and expensive to analyze. This paper presents an automatic framework to convert all process traces corresponding to the parallel execution of...

    Provided By University of Houston

  • White Papers // Oct 2009

    Communication Framework for Fault-Tolerant Parallel Execution

    PC grids represent massive computation capacity at a low cost, but are challenging to employ for parallel computing because of variable and unpredictable performance and availability. A communicating parallel program must employ checkpoint-restart and/or process redundancy to make continuous forward progress in such an unreliable environment. A communication model based...

    Provided By University of Houston

  • White Papers // Jun 2009

    A Referential Integrity Browser for Distributed Databases

    The authors demonstrate a program that can inspect a distributed relational database on the Internet to discover and quantify referential integrity issues for integration purposes. The program computes data quality metrics for referential integrity at four granularity levels: database, table, column and value, going from a global to a detailed...

    Provided By University of Houston

  • White Papers // Mar 2009

    Sparse Event Detection in Wireless Sensor Networks Using Compressive Sensing

    Compressive sensing is a revolutionary idea proposed recently to achieve much lower sampling rate for sparse signals. For large wireless sensor networks, the events are relatively sparse compared with the number of sources. Because of deployment cost, the number of sensors is limited, and due to energy constraint, not all...

    Provided By University of Houston

  • White Papers // Apr 2010

    Detection and Punishment of Malicious Wireless Stations in IEEE 802.11e EDCA Network

    The authors propose a malicious detection algorithm that permits identification of misbehaving wireless stations, and then meting out punishment by not supplying an ACK packet permitting transmission by the malicious stations. The proposed algorithm is designed for IEEE 802.11e network and based upon detecting a change in QoS moving a...

    Provided By University of Houston

  • White Papers // Sep 2009

    A Multiplayer Real-Time Game Protocol Architecture for Reducing Network Latency

    Multiplayer, real-time games have become a huge commercial service. Because of this success, the need exists for a more efficient and reliable game server solution. Such games are a kind of soft real-time systems because a game server has to respond to requests from many clients, compute the action of...

    Provided By University of Houston

  • White Papers // Nov 2010

    An Analysis of Chaining Protocols for Video-on-Demand

    Chaining protocols for video-on-demand require each client to forward the video data it receives to the next client watching the same video. The authors present here the first analytical investigation of standard chaining, advanced chaining, optimal chaining, expanded chaining (also known as the cooperative protocol) and accelerated chaining. The authors'...

    Provided By University of Houston

  • White Papers // Mar 2010

    Content Aware Burst Assembly - Supporting Telesurgery and Telemedicine in Optical Burst Switching Networks

    The emerging telemedicine and telesurgery technologies allow patients to share medical experts remotely through communication networks. However, network bandwidth, network latency and jitter (variation of latency), are the obstacles to the widespread use of this technology remotely. Optical Burst Switching (OBS) networks greatly expand network bandwidth in existing network infrastructure...

    Provided By University of Houston

  • White Papers // Dec 2010

    Coalition Formation Games for Relay Transmission: Stability Analysis Under Uncertainty

    Relay transmission or cooperative communication is an advanced technique that can improve the performance of data transmission among wireless nodes. However, while the performance (e.g., throughput) of a source node can be improved through cooperation with a number of relays, this improvement comes at the expense of a degraded performance...

    Provided By University of Houston

  • White Papers // Dec 2010

    Impact of Packet Loss on Power Demand Estimation and Power Supply Cost in Smart Grid

    The evolving smart grid will use advanced data communications and networking techniques to improve efficiency and reliability of electric power generation, transmission, distribution, and consumption. Packet loss performance of the data communications networks used in smart grid will have impact on the cost of power supply. In this paper, the...

    Provided By University of Houston

  • White Papers // Jan 2010

    Improved Wireless Secrecy Capacity Using Distributed Auction Theory

    Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdroppers....

    Provided By University of Houston

  • White Papers // Jun 2009

    Coalitional Games for Distributed Eavesdroppers Cooperation in Wireless Networks

    Physical layer security aspects of wireless networks have recently attracted an increased attention due to the emergence of large-scale decentralized networks. While most existing literature focuses on link-level performance analysis from the perspective of the wireless users, this paper turns the attention to the eavesdroppers' (attacker) side of the problem....

    Provided By University of Houston

  • White Papers // Mar 2011

    Using Six Sigma to Improve IT Help Desk Customer Service

    Within most organizations, the Information Technology (IT) department typically provides the infrastructure, implementation, and administration of hardware, software, networking, and database management. Unfortunately, employees using these systems sometimes encounter problems that hinder the daily productivity of the organization. When such problems occur, it interrupts the flow of work, thereby causing...

    Provided By University of Houston

  • White Papers // May 2009

    Auction-Based Resource Allocation for Cooperative Video Transmission Protocols Over Wireless Networks

    Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast...

    Provided By University of Houston

  • White Papers // Oct 2009

    WiserAnalyzer: A Passive Monitoring Framework for WLANs

    Due to low hardware costs, availability of unlicensed spectrums and support of mobility, WLANs have been widely adopted in home, enterprise, hospital, and campus environments. These networks are used for various purposes including VOIP, data services and inventory management. The QoS in WLANs may be degraded due to a number...

    Provided By University of Houston

  • White Papers // Oct 2008

    Robust Channel Assignment for Link-Level Resource Provision in Multi-Radio Multi-Channel Wireless Networks

    In this paper, the authors investigate the problem of link-level resource provision in Multi-Radio Multi-Channel (MR-MC) wireless networks. To quantify robustness of resource provision schemes, the authors propose the novel concept of interference margin. Using the notion of interference margin, a robust radio and channel assignment problem is formulated that...

    Provided By University of Houston

  • White Papers // Jan 2011

    Toward Optimal Data Aggregation in Random Wireless Sensor Networks

    Fueled by the increasing capability and decreasing cost of computing and communication devices, Wireless Sensor Networks (WSNs) hold the promise of revolutionizing a wide range of application domains such as machine failure diagnosis, pollutant detection, medical emergency response, and supply chain management. Irrespective of the domain-specific characteristics of various applications,...

    Provided By University of Houston

  • White Papers // Feb 2009

    Wealth Effects Of Hedge Fund Activism

    Do hedge funds add value to the companies they target or reap short-term benefits at the expense of others? This paper looks at the impact of shareholder activism on bondholders' wealth through the prism of bondholder-shareholder-manager conflicts as opposed to that of the activism literature, which exclusively focuses on the...

    Provided By University of Houston

  • White Papers // Jan 2009

    Controlling Shareholders And The Agency Cost Of Debt: Evidence From Syndicated Loans

    Controlling shareholders are pervasive globally, but how do they impact the agency cost of debt? The authors examine the effect of ownership structure on syndicated loans in major European and East Asian economies. Ownership structures conducive to controlling shareholder moral hazard, such as the deviation of control from cash flow...

    Provided By University of Houston

  • White Papers // May 2010

    A Two-Tier Market for Decentralized Dynamic Spectrum Access in Cognitive Radio Networks

    Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, the authors propose a two-tier market for decentralized dynamic spectrum access. In the proposed Tier-1 market, spectrum is traded from a Primary User (PU) to Secondary Users (SUs) in a...

    Provided By University of Houston

  • White Papers // Jan 2011

    Butterflies in the Mesh: Lightweight Localized Wireless Network Coding

    In this paper, BFLY-a lightweight localized network coding protocol for wireless mesh networks-is proposed. To supplement forwarding packets in classical networks, intermediate wireless nodes code packets from different sources, so that each transmission's information content is increased by a factor of more than one. Prior work allowed intermediate nodes to...

    Provided By University of Houston

  • White Papers // Oct 2010

    Robust Coverage Under Uncertainty in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been employed in monitoring the health of civil structures, tracking objects, studying the wild life habitat, among others. One critical measure of the Quality of Sensing (QoS) in a wireless sensor network is its coverage, i.e., "How well do the sensors observe the physical space."...

    Provided By University of Houston

  • White Papers // Nov 2010

    Using a Shared Storage Class Memory Device to Improve the Reliability of RAID Arrays

    Storage Class Memories (SCMs) constitute an emerging class of non-volatile storage devices that promise to be significantly faster and more reliable than magnetic disks. The authors propose to add one of these devices to each group of two or three RAID level arrays and store on it additional parity data....

    Provided By University of Houston

  • White Papers // Aug 2011

    SenGuard: Passive User Identification on Smartphones Using Multiple Sensors

    User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user...

    Provided By University of Houston

  • White Papers // Oct 2010

    On the Computation of Stochastic Search Variable Selection in Linear Regression With UDFs

    Computing Bayesian statistics with traditional techniques is extremely slow, specially when large data has to be exported from a relational DBMS. The authors propose algorithms for large scale processing of Stochastic Search Variable Selection (SSVS) for linear regression that can work entirely inside a DBMS. The traditional SSVS algorithm requires...

    Provided By University of Houston

  • White Papers // Jan 2012

    Bounding and Estimating Association Rule Support From Clusters on Binary Data

    The theoretical relationship between association rules and machine learning techniques needs to be studied in more depth. This explains the use of clustering as a model for association rule mining. The clustering model is exploited to bound and estimate association rule support and confidence. The authors first study the efficient...

    Provided By University of Houston