University of Illinois at Urbana-Champaign

Displaying 1-40 of 52 results

  • White Papers // Jun 2011

    Analysis of Credential Stealing Attacks in an Open Networked Environment

    This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Feb 2011

    On the Security of Index Coding With Side Information

    The problem of Index Coding with Side Information (ICSI) was introduced by Birk and Kol,. It was motivated by applications such as audio and video-on-demand, and daily newspaper delivery. In these applications a server (sender) has to deliver some sets of data, audio or video files to a set of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    A Security-Aware Routing Protocol for Wireless Ad Hoc Networks

    This paper proposes a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. The authors develop...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications

    Many Peer-to-Peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying Quality of Service (QoS). Previous approaches to building such overlays either involve non-scalable solutions such as global information and shared contact point, or rely on gossip style membership...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Quantitative Study of Differentiated Service Model Using UltraSAN

    In today's Internet, only best-effort service is provided. With upcoming Quality of Service (QoS) requirements raised by a wide range of communication-intensive, real-time multimedia applications, the best-effort service is no longer sufficient. As a result, Differentiated Service Model (DiffServ) has been proposed as a cost-effective way to provision QoS in...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    A Hierarchical Quality of Service Control Architecture for Configurable Multimedia Applications

    In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing and communication environments. QoS-sensitive adaptations are critical when applications run in general-purpose systems, with no mechanisms provided for supporting resource reservations and real-time guarantees. Such adaptations are...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    QoS Service Routing for Supporting Multimedia Applications

    Based on the distributed and composable service model, the QoS service routing problem for supporting multimedia applications has emerged. Different from the conventional QoS data routing, QoS service routing presents additional challenges caused by the service availability, service dependency, and resource requirement heterogeneity issues, which make solutions for QoS data...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach

    The shared-medium multi-hop nature of wireless ad hoc networks poses fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Joint Asynchronous Congestion Control and Distributed Scheduling for Multi-Hop Wireless Networks

    The authors consider a multi-hop wireless network shared by many users. For an interference model that only constrains a node to either transmit or receive at a time, but not both, the authors propose an architecture for fair resource allocation that consists of a distributed scheduling algorithm operating in conjunction...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design

    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. The authors explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Detection and Handling of MAC Layer Misbehavior in Wireless Networks

    Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Oct 2010

    DebianRunner: Running Desktop Applications on Android Smartphones

    The Android operating system runs atop the Linux kernel, yet lacks the ability to natively execute standard Linux desktop applications. Though efforts have been made to enable this functionality, all approaches to date require a user to switch to a separate desktop environment, resulting in a substantial loss of interface...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2010

    Bundle of Streams: Concept and Evaluation in Distributed Interactive Multimedia Environments

    Distributed Interactive Multimedia Environments (DIMEs) enable geographically distributed people to interact with each other in a joint media-rich virtual environment for a wide range of activities, such as art performance, medical consultation, sport training, etc. The real-time collaboration is made possible by exchanging a set of multi-modal sensory streams over...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Aug 2010

    Application-Aware Secure Multicast for Power Grid Communications

    This paper proposes an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. The authors designs an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2010

    BotGrep: Finding P2P Bots with Structured Graph Analysis

    A key feature that distinguishes modern botnets from earlier counterparts is their increasing use of structured overlay topologies. This lets them carry out sophisticated coordinated activities while being resilient to churn, but it can also be used as a point of detection. In this work, the authors devise techniques to...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Mar 2010

    Zero-Knowledge Real-Time Indoor Tracking Via Outdoor Wireless Directional Antennas

    WiFi localization and tracking of indoor moving objects is an important problem in many contexts of ubiquitous buildings, first responder environments, and others. Previous approaches in WiFi-based indoor localization and tracking either assume prior knowledge of indoor environment or assume many data samples from location-fixed WiFi sources (i.e. Anchor points)....

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Feb 2010

    Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

    Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (Cognitive Radio) networks. This paper considers the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. This paper proposes viewing the area of interest as a grid of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    End-to-End QoS Support for Adaptive Applications Over the Internet

    In current end systems, multiple flexible, complex and distributed applications concurrently share and compete both end systems resources and transmission bandwidth of heterogeneous multi-protocol networks, especially the Internet. The objective is to enable adaptation awareness in these applications to fully cope with the dynamics in resource availability over the heterogeneous...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Classification and Comparison of QoS Specification Languages for Distributed Multimedia Applications

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    QoS-Directed Error Control of Video Multicast in Wireless Networks

    This paper presents a QoS-Directed Error Control scheme (QDEC) for video multicast in wireless networks. In order to provide multimedia services to mobile users, it is necessary to have not only sufficient bandwidth, but also effective control over wireless channel errors, which are characterized as bursty and location-dependent. The QDEC...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Optimal State Prediction for Feedback-Based QoS Adaptations

    In heterogeneous network environments with performance variations present, complex distributed applications, such as distributed visual tracking applications, are desired to adapt themselves and to adjust their resource demands dynamically, in response to fluctuations in either end system or network resources. By such adaptations, they are able to preserve the user-perceptible...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Optimizing Top-K Queries for Middleware Access: A Unied Cost-Based Approach

    This paper studies optimizing top-k queries in middleware. While many assorted algorithms have been proposed, none is generally applicable to a wide range of possible scenarios. Existing algorithms lack "Generality" to support a wide range of access scenarios and systematic "Adaptivity" to account for runtime specifics. To fulfill this critical...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Designing Routing Metrics for Mesh Networks

    Designing routing metrics is critical for performance in wireless mesh networks. The unique characteristics of mesh networks, such as static nodes and the shared nature of the wireless medium, invalidate existing solutions from both wired and wireless networks and impose unique requirements on designing routing metrics for mesh networks. In...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Power Aware Storage Cache Management

    Reducing energy consumption is an important issue for data centers. Among the various components of a data center, storage is one of the biggest energy consumers. Previous studies have shown that the average idle period for a server disk in a data center is very small compared to the time...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    QoS-Aware Middleware for Ubiquitous and Heterogeneous Environments

    Middleware systems have emerged in recent years to support applications in heterogenous and ubiquitous computing environments. Specifically, future middleware platforms are expected to provide Quality-of-Service (QoS) support, which is required by a new generation of QoS-sensitive applications such as media streaming and e-commerce. This paper presents four key aspects of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    QoS-Assured Service Composition in Managed Service Overlay Networks

    Many value-added and content delivery services are being offered via Service Level Agreements (SLAs). These services can be interconnected to form a Service Overlay Network (SON) over the Internet. Service composition in SON has emerged as a cost-effective approach to quickly creating new services. Previous research has addressed the reliability,...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Dec 2009

    Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing

    The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming self-selected communities around shared sensory data pools that enable community specific applications of mutual interest. Such applications have recently been termed participatory sensing. An important category of participatory sensing applications is one...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Oct 2009

    Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

    Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat against these systems an important goal is the development of effective cyber security standards. However, past experience shows that security protocols are...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    Secure Capacity of Wireless Broadcast Networks

    This paper gives a constructive characterization for the capacity of wireless broadcast networks that are prone to Byzantine attacks. The adversary controls a single node in the network and can modify the packets flowing through the node. The central trade-off in such a scenario is that of security and throughput....

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    ISO 9000: New Form Of Protectionism Or Common Language In International Trade?

    International standards have the potential to both promote and hinder international trade. Yet empirical scholarship on the standards-trade relationship has been held up due to some methodological challenges: measurement problems, varied effects, and endogeneity concerns. The authors are able to surmount these challenges while considering the impact of one particular...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    Real-World VANET Security Protocol Performance

    Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Ad hoc NETworks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To the authors' knowledge, no one...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Aug 2009

    A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation

    Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput and spectral efficiency. However, there has been no practical means for provisioning Quality of Service (QoS) in multichannel wireless networks. While previous proposals providing signaling and adaptation mechanisms for...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jul 2009

    On the Mobile Wireless Access Via MIMO Relays

    While a network with stationary nodes can provide large capacity in many current wireless systems, a network with mobile users suffers from severe performance degradation. This happens due to quick channel variation and its resulting protocol overheads that are especially large for multiuser Multiple-Input Multiple-Output (MIMO) systems. This paper proposes...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jul 2009

    Implementing Reflective Access Control in SQL

    Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control matrix. RDBAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2009

    Performance Evaluation of the Illinois Cloud Computing Testbed

    Cloud computing has the potential to bring sophisticated computing facility at the door-steps of users. The performance of services hosted at a cloud generally depends on its computation, storage and networking models. Since the storage and communication costs in a data-intensive application usually dominate the overall cost, the authors analyze...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2009

    HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks

    Broadcast is a crucial yet expensive building block for many applications in bandwidth-scarce mobile wireless ad hoc networks. The paper proposes a hybrid deterministic/probabilistic, decentralized broadcast protocol with adjustable broadcast reliability and overhead. The paper first proposes a purely probabilistic, topology-aware broadcast algorithm. The probabilistic broadcast adjusts each node's broadcast...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // May 2009

    Distributed RFID Tag Storage Infrastructures

    This paper leverages increasing passive RFID tag memory to propose distributed RFID tag storage infrastructures (D-RFID stores). A D-RFID store is a large set of tags with significantly sized re-writeable storage. Interrogators interact with D-RFID stores by reading from and writing to tags, providing a wide range of possible applications...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Apr 2009

    Linear Spatial Pyramid Matching Using Sparse Coding for Image Classification

    In recent years the Bag-of-Features (BoF) model has been extremely popular in image categorization. The method treats an image as a collection of unordered appearance descriptors extracted from local patches, quantizes them into discrete "Visual words", and then computes a compact histogram representation for semantic image classification, e.g. object recognition...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Apr 2009

    RRE: A Game-Theoretic Intrusion Response and Recovery Engine

    Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in automated response techniques. This paper proposes a new approach to automated response called the Response and Recovery Engine (RRE). Its engine employs a game-theoretic response...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Mar 2009

    Adaptive Carrier Sense With Enhanced Fairness in IEEE 802.15.4 Wireless Networks

    The authors propose an adaptive Carrier Sense (CS) scheme with enhanced fairness based on the observation that conventional adaptive CS mechanisms may lead to significant unfairness. Their experiments with an IEEE 802.15.4 testbed show that the proposed algorithm significantly improves fairness while providing competitive throughput performance. Physical carrier sense is...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jul 2008

    Survey of Computational Grid Systems and Virtualization in the Grid Space

    Distributed systems, and in particular, computational grid systems and computational cluster systems, are extensions of the traditional concept of a computer system. As processing demands continued to increase with scientific research, data analysis, modeling and other computational problems, computers also grew in size and capability. Different classes of computers were...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Oct 2009

    Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

    Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat against these systems an important goal is the development of effective cyber security standards. However, past experience shows that security protocols are...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Dec 2008

    Large-Scale Network Simulation Scalability and an FPGA-Based Network Simulator

    Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid large-scale outages or performance bottlenecks. However, evaluating a network algorithm in a simulator results in significant run times which scale poorly as the authors increases the number of routers. An alternative network simulator design is...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Aug 2010

    Application-Aware Secure Multicast for Power Grid Communications

    This paper proposes an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. The authors designs an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Oct 2008

    The Private Market For Long-Term Care Insurance In The U.S.: A Review Of The Evidence

    This paper reviews the growing literature on the market for private long-term care insurance, a market notable for its small size despite the fact that long-term care expenses are potentially large and highly uncertain. After summarizing long-term care utilization and insurance coverage in the United States, the paper reviews research...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    A Security-Aware Routing Protocol for Wireless Ad Hoc Networks

    This paper proposes a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. The authors develop...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications

    Many Peer-to-Peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying Quality of Service (QoS). Previous approaches to building such overlays either involve non-scalable solutions such as global information and shared contact point, or rely on gossip style membership...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Mar 2010

    Zero-Knowledge Real-Time Indoor Tracking Via Outdoor Wireless Directional Antennas

    WiFi localization and tracking of indoor moving objects is an important problem in many contexts of ubiquitous buildings, first responder environments, and others. Previous approaches in WiFi-based indoor localization and tracking either assume prior knowledge of indoor environment or assume many data samples from location-fixed WiFi sources (i.e. Anchor points)....

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Feb 2009

    Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    It is challenging to provide authentication to time critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Quantitative Study of Differentiated Service Model Using UltraSAN

    In today's Internet, only best-effort service is provided. With upcoming Quality of Service (QoS) requirements raised by a wide range of communication-intensive, real-time multimedia applications, the best-effort service is no longer sufficient. As a result, Differentiated Service Model (DiffServ) has been proposed as a cost-effective way to provision QoS in...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2010

    Bundle of Streams: Concept and Evaluation in Distributed Interactive Multimedia Environments

    Distributed Interactive Multimedia Environments (DIMEs) enable geographically distributed people to interact with each other in a joint media-rich virtual environment for a wide range of activities, such as art performance, medical consultation, sport training, etc. The real-time collaboration is made possible by exchanging a set of multi-modal sensory streams over...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    A Hierarchical Quality of Service Control Architecture for Configurable Multimedia Applications

    In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing and communication environments. QoS-sensitive adaptations are critical when applications run in general-purpose systems, with no mechanisms provided for supporting resource reservations and real-time guarantees. Such adaptations are...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    QoS Service Routing for Supporting Multimedia Applications

    Based on the distributed and composable service model, the QoS service routing problem for supporting multimedia applications has emerged. Different from the conventional QoS data routing, QoS service routing presents additional challenges caused by the service availability, service dependency, and resource requirement heterogeneity issues, which make solutions for QoS data...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach

    The shared-medium multi-hop nature of wireless ad hoc networks poses fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Joint Asynchronous Congestion Control and Distributed Scheduling for Multi-Hop Wireless Networks

    The authors consider a multi-hop wireless network shared by many users. For an interference model that only constrains a node to either transmit or receive at a time, but not both, the authors propose an architecture for fair resource allocation that consists of a distributed scheduling algorithm operating in conjunction...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    ISO 9000: New Form Of Protectionism Or Common Language In International Trade?

    International standards have the potential to both promote and hinder international trade. Yet empirical scholarship on the standards-trade relationship has been held up due to some methodological challenges: measurement problems, varied effects, and endogeneity concerns. The authors are able to surmount these challenges while considering the impact of one particular...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design

    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. The authors explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2010

    BotGrep: Finding P2P Bots with Structured Graph Analysis

    A key feature that distinguishes modern botnets from earlier counterparts is their increasing use of structured overlay topologies. This lets them carry out sophisticated coordinated activities while being resilient to churn, but it can also be used as a point of detection. In this work, the authors devise techniques to...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Feb 2011

    On the Security of Index Coding With Side Information

    The problem of Index Coding with Side Information (ICSI) was introduced by Birk and Kol,. It was motivated by applications such as audio and video-on-demand, and daily newspaper delivery. In these applications a server (sender) has to deliver some sets of data, audio or video files to a set of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2011

    Analysis of Credential Stealing Attacks in an Open Networked Environment

    This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Apr 2009

    Linear Spatial Pyramid Matching Using Sparse Coding for Image Classification

    In recent years the Bag-of-Features (BoF) model has been extremely popular in image categorization. The method treats an image as a collection of unordered appearance descriptors extracted from local patches, quantizes them into discrete "Visual words", and then computes a compact histogram representation for semantic image classification, e.g. object recognition...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jul 2008

    State Space Reduction in the Maude-NRL Protocol Analyzer

    The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. It both extends and provides a formal framework for the original NRL Protocol Analyzer, which supported equational reasoning in a more limited way....

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Feb 2009

    The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety

    Embedded systems in safety-critical environments demand safety guarantees while providing many useful services that are too complex to formally verify or fully test. Existing application-level fault-tolerance methods, even if formally verified, leave the system vulnerable to errors in the Real-Time Operating System (RTOS), middleware, and microprocessor. The authors introduce the...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Dec 2009

    Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing

    The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming self-selected communities around shared sensory data pools that enable community specific applications of mutual interest. Such applications have recently been termed participatory sensing. An important category of participatory sensing applications is one...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Nov 2008

    The Interdependence Of Private And Public Interests

    The predominant focus in research on organizations is either on private or public institutions without consistent consideration of their interdependencies. The emphasis in scholarship on private or public interests has strengthened as disciplinary and professional knowledge has deepened: management scholars, for example, tend to consider the corporation as the unit...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2011

    Detection and Handling of MAC Layer Misbehavior in Wireless Networks

    Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Nov 2008

    Dynamic Spectrum Access With Learning for Cognitive Radio

    The authors study the problem of cooperative dynamic spectrum sensing and access in cognitive radio systems as a Partially Observed Markov Decision Process (POMDP). Assuming Markovian state-evolutions for the primary channels, the authors propose a greedy channel selection and access policy that satisfies an interference constraint and also outperforms some...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Mar 2009

    Adaptive Carrier Sense With Enhanced Fairness in IEEE 802.15.4 Wireless Networks

    The authors propose an adaptive Carrier Sense (CS) scheme with enhanced fairness based on the observation that conventional adaptive CS mechanisms may lead to significant unfairness. Their experiments with an IEEE 802.15.4 testbed show that the proposed algorithm significantly improves fairness while providing competitive throughput performance. Physical carrier sense is...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2009

    Optimal Resource Allocation for Multicast Sessions in Multihop Wireless Networks

    In this paper, the authors extend recent results on fair and stable resource allocation in wireless networks to include multicast sessions, in particular multi-rate multicast. The solution for multi-rate multicast is based on scheduling virtual (shadow) "Traffic" that "Moves" in reverse direction from destinations to sources. This shadow scheduling algorithm...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    Real-World VANET Security Protocol Performance

    Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Ad hoc NETworks (VANETs). These simulations use as input traces of vehicle movements that have been generated by traffic simulators which are based on traffic theory models. To the authors' knowledge, no one...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    End-to-End QoS Support for Adaptive Applications Over the Internet

    In current end systems, multiple flexible, complex and distributed applications concurrently share and compete both end systems resources and transmission bandwidth of heterogeneous multi-protocol networks, especially the Internet. The objective is to enable adaptation awareness in these applications to fully cope with the dynamics in resource availability over the heterogeneous...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Classification and Comparison of QoS Specification Languages for Distributed Multimedia Applications

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Aug 2009

    A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation

    Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput and spectral efficiency. However, there has been no practical means for provisioning Quality of Service (QoS) in multichannel wireless networks. While previous proposals providing signaling and adaptation mechanisms for...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2008

    Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations

    Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches to find and exploit vulnerability, developers rely on the traditional way of writing ad hoc checks in source code. This paper shows that security engineering to...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    QoS-Directed Error Control of Video Multicast in Wireless Networks

    This paper presents a QoS-Directed Error Control scheme (QDEC) for video multicast in wireless networks. In order to provide multimedia services to mobile users, it is necessary to have not only sufficient bandwidth, but also effective control over wireless channel errors, which are characterized as bursty and location-dependent. The QDEC...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Optimal State Prediction for Feedback-Based QoS Adaptations

    In heterogeneous network environments with performance variations present, complex distributed applications, such as distributed visual tracking applications, are desired to adapt themselves and to adjust their resource demands dynamically, in response to fluctuations in either end system or network resources. By such adaptations, they are able to preserve the user-perceptible...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jan 2010

    Optimizing Top-K Queries for Middleware Access: A Unied Cost-Based Approach

    This paper studies optimizing top-k queries in middleware. While many assorted algorithms have been proposed, none is generally applicable to a wide range of possible scenarios. Existing algorithms lack "Generality" to support a wide range of access scenarios and systematic "Adaptivity" to account for runtime specifics. To fulfill this critical...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Sep 2009

    Secure Capacity of Wireless Broadcast Networks

    This paper gives a constructive characterization for the capacity of wireless broadcast networks that are prone to Byzantine attacks. The adversary controls a single node in the network and can modify the packets flowing through the node. The central trade-off in such a scenario is that of security and throughput....

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2009

    Performance Evaluation of the Illinois Cloud Computing Testbed

    Cloud computing has the potential to bring sophisticated computing facility at the door-steps of users. The performance of services hosted at a cloud generally depends on its computation, storage and networking models. Since the storage and communication costs in a data-intensive application usually dominate the overall cost, the authors analyze...

    Provided By University of Illinois at Urbana-Champaign

  • White Papers // Jun 2009

    HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks

    Broadcast is a crucial yet expensive building block for many applications in bandwidth-scarce mobile wireless ad hoc networks. The paper proposes a hybrid deterministic/probabilistic, decentralized broadcast protocol with adjustable broadcast reliability and overhead. The paper first proposes a purely probabilistic, topology-aware broadcast algorithm. The probabilistic broadcast adjusts each node's broadcast...

    Provided By University of Illinois at Urbana-Champaign