University of Illinois at Urbana Champaign

Displaying 1-40 of 123 results

  • White Papers // Feb 2014

    Multi-tier Dynamic Vectorization for Translating GPU Optimizations into CPU Performance

    Developing high performance GPU code is labor intensive. Ideally, developers could recoup high GPU development costs by generating high-performance programs for CPUs and other architectures from the same source code. However, current OpenCL compilers for non-GPUs do not fully exploit optimizations in well-tuned GPU codes. To address this problem, the...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2014

    Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline

    The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital systems. In this work, the effects of transient faults on high performance microprocessors are explored. To perform a thorough exploration, a highly detailed register transfer level model of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2014

    Hardware/System Support for Four Economic Models for Many Core Computing

    In this paper, the authors argue for a new set of economic models for many-core computing. Current economic models for processors require a customer to estimate her average-case or worst-case computational requirements beforehand and then buy a processor/system that meets those needs. Physically changing the chip is the only way...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2014

    A Framework for Dynamic Energy Efficiency and Temperature Management

    While technology is delivering increasingly sophisticated and powerful chip designs, it is also imposing alarmingly high energy requirements on the chips. One way to address this problem is to manage the energy dynamically. Unfortunately, current dynamic schemes for energy management are relatively limited. In addition, they manage energy either for...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Dec 2013

    Employees' Acceptance of Knowledge Management Systems and Its Impact on Creating Learning Organizations

    Many organizations are eager to become learning organizations that are known to contribute to increased financial performance, innovation, and the retention of workers who possess valuable organizational knowledge. For this reason, Knowledge Management Systems (KMSs) in reality have been utilized as a means to foster the development of learning organizations....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Nov 2013

    A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures

    The scale and complexity of Advanced Metering Infrastructure (AMI) networks requires careful planning for the deployment of security solutions. In particular, the large number of AMI devices and the volume and diversity of communication expected to take place on the various AMI networks make the role of Intrusion Detection Systems...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Nov 2013

    Semantic Frame-Based Document Representation for Comparable Corpora

    Document representation is a fundamental problem for text mining. Many efforts have been done to generate concise yet semantic representation, such as bag-of-words, phrase, sentence and topic-level descriptions. Nevertheless, most existing techniques counter difficulties in handling monolingual comparable corpus, which is a collection of monolingual documents conveying the same topic....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2013

    A Feature-Enhanced Ranking-Based Classifier for Multimodal Data and Heterogeneous Information Networks

    The authors propose a heterogeneous information network mining algorithm: Feature-enhanced RankClass (F-RankClass). F-RankClass extends RankClass to a unified classification framework that can be applied to binary or multiclass classification of unimodal or multimodal data. They experimented on a multimodal document dataset, 2008/9 Wikipedia selection for schools. For unimodal classification, F-RankClass...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2013

    An Actor-Centric, Asset-Based Monitor Deployment Model for Cloud Computing

    Effective monitoring is essential for the security of cloud systems. Although many monitoring tools exist in the cloud domain, there is little guidance on how to deploy monitors to make the most of collected monitor data and increase the chances of detecting security breaches. The authors introduce an actor-centric, asset-based...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Apr 2013

    Large-Scale Spectral Clustering on Graphs

    Graph clustering has received growing attention in recent years as an important analytical technique, both due to the prevalence of graph data, and the usefulness of graph structures for exploiting intrinsic data characteristics. However, as graph data grows in scale, it becomes increasingly more challenging to identify clusters. In this...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Apr 2013

    Learning Universally Quantified Invariants of Linear Data Structures

    The authors propose a new automaton model, called quantified data automata over words that can model quantified invariants over linear data structures, and build poly-time active learning algorithms for them, where the learner is allowed to query the teacher with membership and equivalence queries. In order to express invariants in...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2013

    MemGuard: Memory Bandwidth Reservation System for Efficient Performance Isolation in Multi-Core Platforms

    Memory bandwidth in modern multi-core platforms is highly variable for many reasons and is a big challenge in designing real-time systems as applications are increasingly becoming more memory intensive. In this paper, the authors proposed, designed, and implemented an efficient memory bandwidth reservation system, that they call MemGuard. MemGuard distinguishes...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2013

    SecureCore: A Multicore-Based Intrusion Detection Architecture for Real-Time Embedded Systems

    Security violations are becoming more common in real-time systems - an area that was considered to be invulnerable in the past - as evidenced by the recent W32.Stuxnet and Duqu worms. A failure to protect such systems from malicious entities could result in significant harm to both humans as well...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2013

    Refrint: Intelligent Refresh to Minimize Power in On-Chip Multiprocessor Cache Hierarchies

    As manycores use dynamic energy ever more efficiently, static power consumption becomes a major concern. In particular, in a large manycore running at a low voltage, leakage in on-chip memory modules contributes substantially to the chip's power draw. This is unfortunate, given that, intuitively, the large multi-level cache hierarchy of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2013

    Adaptive Reliability Chipkill Correct (ARCC)

    Chipkill correct is an advanced type of error correction in memory that is popular among servers. Large field studies of memories have shown that chipkill correct reduces uncorrectable error rate by 4X to 36X compared to SECDED. Currently, there is a strong trade-off between power and reliability among different chipkill...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Dec 2012

    Smart Grid Protocol Testing Through Cyber-Physical Testbeds

    Sound cyber security testing is a critical challenge, in particular for large and complex systems such as the smart grid. In this paper, the authors explore the need for, and specific issues involved in, security testing for smart grid components and standards and how testbeds play a critical role in...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Dec 2012

    Low Rank Mechanism for Optimizing Batch Queries Under Differential Privacy

    Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each query result, such that it is provably hard for the adversary to infer the presence or absence of any individual record from the published noisy results. The main...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Dec 2012

    A General Framework for Distributed Vote Aggregation

    The authors present a general model for opinion dynamics in a social network together with several possibilities for object selections at times when the agents are communicating. They explain the limiting behavior of such a dynamics and show that this dynamics almost surely converges. They consider some special implications of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2012

    AMI Threats, Intrusion Detection Requirements and Deployment Recommendations

    Advanced Metering Infrastructures (AMI) facilitates bidirectional communication between smart meters and utilities, allowing information about consumption, outages, and electricity rates to be shared reliably and efficiently. However, the numerous smart meters being connected through mesh networks open new opportunities for attackers to interfere with communications and compromise utilities' assets or...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2012

    Stream Classification with Recurring and Novel Class Detection using Class-Based Ensemble

    Concept-evolution has recently received a lot of attention in the context of mining data streams. Concept-evolution occurs when a new class evolves in the stream. Although many recent studies address this issue, most of them do not consider the scenario of recurring classes in the stream. A class is called...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2012

    ETM: Entity Topic Models for Mining Documents Associated with Entities

    Topic models, which factor each document into different topics and represent each topic as a distribution of terms, have been widely and successfully used to better understand collections of text documents. However, documents are also associated with further information, such as the set of real-world entities mentioned in them. For...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2012

    Towards Active Learning on Graphs: An Error Bound Minimization Approach

    Active learning on graphs has received increasing interest in the past years. In this paper, the authors propose a non-adaptive active learning approach on graphs, based on generalization error bound minimization. In particular, they present a data-dependent error bound for a graph-based learning method, namely Learning with Local and Global...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2012

    Risk-Sensitive Mean Field Games

    In this paper, the authors study a class of risk-sensitive mean-field stochastic differential games. They show that under appropriate regularity conditions, the mean-field value of the stochastic differential game with exponentiated integral cost functional coincides with the value function described by a Hamilton-Jacobi-Bellman (HJB) equation with an additional quadratic term....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2012

    Cost Modeling of Response Actions for Automated Response and Recovery in AMI

    The smart grid is creating new security vulnerabilities due to the deployment of networked devices into the traditional grid. A core component of the smart grid is the Advanced Metering Infrastructures (AMIs), which increase the attack surface due to smart devices deployed at households. Manual management of security incidents in...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jul 2012

    Hiding Checkpoint Overhead in HPC Applications with a Semi-Blocking Algorithm

    The HPC community has seen a steady increase in the number of components in every generation of supercomputers. Assembling a large number of components into a single cluster makes a machine more powerful, but also much more prone to failures. Therefore, fault tolerance has become a major concern in HPC....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2012

    State-Based Analysis in ADVISE

    There is an increasing need for quantitative security metrics to empower the decision-making of system architects and administrators. The authors previously defined the ADVISE method, which combines a state-based security model and an adversary profile to generate quantitative metrics through simulation. Since simulation is often costly, particularly when applied to...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2012

    Heavy Traffic Optimal Resource Allocation Algorithms for Cloud Computing Clusters

    Cloud computing is emerging as an important platform for business, personal and mobile computing applications. In this paper, the authors explain a stochastic model of cloud computing, where jobs arrive according to a stochastic process and request resources like CPU, memory and storage space. They consider a model where the...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // May 2012

    Surviving Congestion in Geo-Distributed Storage Systems

    In this paper, the authors presented Vivace, a distributed key value storage system that replicates data synchronously across many sites, while being able to cope with congestion of the links connecting those sites. Vivace relies on two novel algorithms that can overcome congestion by prioritizing a small amount of critical...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Apr 2012

    Memory Access Control in Multiprocessor for Real-time Systems with Mixed Criticality

    Shared resource access interference, particularly memory and system bus, is a big challenge in designing predictable real-time systems because its worst case behavior can significantly differ. In this paper, the authors propose a software based memory throttling mechanism to explicitly control the memory interference. They developed analytic solutions to compute...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Apr 2012

    Understanding the Role of Automated Response Actions in Improving AMI Resiliency

    The smart grid promises better services and higher reliability but is exposed to new security threats. In particular, deployment of Advanced Metering Infrastructures (AMIs) will vastly increase the attack surface because of the smart meters installed in customer homes. Managing the security of AMIs cannot be done manually because of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Mar 2012

    Octopus: A Secure and Anonymous DHT Lookup

    Distributed Hash Table (DHT) lookup is a core technique in structured Peer-to-Peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. The authors present Octopus,...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Mar 2012

    An Algorithm for Fast Edit Distance Computation on GPUs

    The problem of finding the edit distance between two sequences are important problems with applications in many domains like virus scanners, security kernels, natural language translation and genome sequence alignment. The traditional dynamic-programming based algorithm is hard to parallelize on SIMD processors as the algorithm is memory intensive and has...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Feb 2012

    S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems

    Until recently, cyber-physical systems, especially those with safety-critical properties that manage critical infrastructure (e.g. power generation plants, water treatment facilities, etc.) were considered to be invulnerable against software security breaches. The recently discovered 'W32.Stuxnet' worm has drastically changed this perception by demonstrating that such systems are susceptible to external attacks....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2012

    Fixed and Market Pricing for Cloud Services

    This paper considers two simple pricing schemes for selling cloud instances and studies the trade-off between them. The authors characterize the equilibrium for the hybrid system where arriving jobs can choose between fixed or the market based pricing. They provide theoretical and simulation based evidence suggesting that fixed price generates...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2012

    BulkSMT: Designing SMT Processors for Atomic-Block Execution

    Multiprocessor architectures that continuously execute atomic blocks (or chunks) of instructions can improve performance and software productivity. However, all of the prior proposals for such architectures assume single-context cores as building blocks - rather than the widely-used Simultaneous Multi-Threading (SMT) cores. As a result, they are underutilizing hardware resources. This...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2012

    Power Balanced Pipelines

    Since, the onset of pipelined processors, balancing the delay of the microarchitectural pipeline stages such that each microarchitectural pipeline stage has an equal delay has been a primary design objective, as it maximizes instruction throughput. Unfortunately, this causes significant energy inefficiency in processors, as each microarchitectural pipeline stage gets the...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jul 2011

    Dynamic Load Balance for Optimized Message Logging in Fault Tolerant HPC Applications

    Computing systems will grow significantly larger in the near future to satisfy the needs of computational scientists in areas like climate modeling, biophysics and cosmology. Supercomputers being installed in the next few years will comprise millions of cores, hundreds of thousands of processor chips and millions of physical components. However,...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2011

    The Multiple-Asymmetric-Utility System Model: A Framework for Modeling Cyber-Human Systems

    Traditional cyber security modeling approaches either do not explicitly consider system participants or assume a fixed set of participant behaviors that are independent of the system. Increasingly, accumulated cyber security data indicate that system participants can play an important role in the creation or elimination of cyber security vulnerabilities. Thus,...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2011

    Analysis of Credential Stealing Attacks in an Open Networked Environment

    This paper analyses the forensic data on credential stealing incidents over a period of 5 years across 5000 machines monitored at the National Center for Supercomputing Applications at the University of Illinois. The analysis conducted is the first attempt in an open operational environment (i) to evaluate the intricacies of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2011

    Model-Based Security Metrics Using ADversary VIew Security Evaluation (ADVISE)

    System architects need quantitative security metrics to make informed trade-off decisions involving system security. The security metrics need to provide insight on weak points in the system defense, considering characteristics of both the system and its adversaries. To provide such metrics, the authors formally define the ADversary VIew Security Evaluation...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2009

    Analyzing 802.11n Performance Gains

    This paper examines the peak performance of an 802.11n system with respect to the achievable throughput and the authors decompose the gains observed due to the various PHY/MAC layer features offered from 802.11n. The results show that while the MIMO PHY and channel bonding offered from 802.11n increase the PHY...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2009

    Performance Evaluation of the Illinois Cloud Computing Testbed

    Cloud computing has the potential to bring sophisticated computing facility at the door-steps of users. The performance of services hosted at a cloud generally depends on its computation, storage and networking models. Since the storage and communication costs in a data-intensive application usually dominate the overall cost, the authors analyze...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2009

    Secure Capacity of Wireless Broadcast Networks

    This paper gives a constructive characterization for the capacity of wireless broadcast networks that are prone to Byzantine attacks. The adversary controls a single node in the network and can modify the packets flowing through the node. The central trade-off in such a scenario is that of security and throughput....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2009

    Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

    Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat against these systems an important goal is the development of effective cyber security standards. However, past experience shows that security protocols are...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Aug 2010

    Application-Aware Secure Multicast for Power Grid Communications

    This paper proposes an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. The authors designs an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications

    Location awareness significantly enhances the functionality of ubiquitous computing services and applications, and enriches the way they interact with users and resources in the environment. Many different alternative or complementary location sensing technologies are available. However, these technologies give location information in different formats and with different resolution and confidence....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications

    Many Peer-to-Peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying Quality of Service (QoS). Previous approaches to building such overlays either involve non-scalable solutions such as global information and shared contact point, or rely on gossip style membership...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Mar 2010

    Zero-Knowledge Real-Time Indoor Tracking Via Outdoor Wireless Directional Antennas

    WiFi localization and tracking of indoor moving objects is an important problem in many contexts of ubiquitous buildings, first responder environments, and others. Previous approaches in WiFi-based indoor localization and tracking either assume prior knowledge of indoor environment or assume many data samples from location-fixed WiFi sources (i.e. Anchor points)....

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2009

    ISO 9000: New Form Of Protectionism Or Common Language In International Trade?

    International standards have the potential to both promote and hinder international trade. Yet empirical scholarship on the standards-trade relationship has been held up due to some methodological challenges: measurement problems, varied effects, and endogeneity concerns. The authors are able to surmount these challenges while considering the impact of one particular...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Quantitative Study of Differentiated Service Model Using UltraSAN

    In today's Internet, only best-effort service is provided. With upcoming Quality of Service (QoS) requirements raised by a wide range of communication-intensive, real-time multimedia applications, the best-effort service is no longer sufficient. As a result, Differentiated Service Model (DiffServ) has been proposed as a cost-effective way to provision QoS in...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Sep 2010

    Bundle of Streams: Concept and Evaluation in Distributed Interactive Multimedia Environments

    Distributed Interactive Multimedia Environments (DIMEs) enable geographically distributed people to interact with each other in a joint media-rich virtual environment for a wide range of activities, such as art performance, medical consultation, sport training, etc. The real-time collaboration is made possible by exchanging a set of multi-modal sensory streams over...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    A Hierarchical Quality of Service Control Architecture for Configurable Multimedia Applications

    In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing and communication environments. QoS-sensitive adaptations are critical when applications run in general-purpose systems, with no mechanisms provided for supporting resource reservations and real-time guarantees. Such adaptations are...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    QoS Service Routing for Supporting Multimedia Applications

    Based on the distributed and composable service model, the QoS service routing problem for supporting multimedia applications has emerged. Different from the conventional QoS data routing, QoS service routing presents additional challenges caused by the service availability, service dependency, and resource requirement heterogeneity issues, which make solutions for QoS data...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach

    The shared-medium multi-hop nature of wireless ad hoc networks poses fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Joint Asynchronous Congestion Control and Distributed Scheduling for Multi-Hop Wireless Networks

    The authors consider a multi-hop wireless network shared by many users. For an interference model that only constrains a node to either transmit or receive at a time, but not both, the authors propose an architecture for fair resource allocation that consists of a distributed scheduling algorithm operating in conjunction...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    A Security-Aware Routing Protocol for Wireless Ad Hoc Networks

    This paper proposes a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. The authors develop...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Understanding the Propagation of Hard Errors to Software and Implications for Resilient System Design

    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. The authors explore a cooperative hardware-software solution that watches for anomalous software behavior to indicate the presence of hardware...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2010

    BotGrep: Finding P2P Bots with Structured Graph Analysis

    A key feature that distinguishes modern botnets from earlier counterparts is their increasing use of structured overlay topologies. This lets them carry out sophisticated coordinated activities while being resilient to churn, but it can also be used as a point of detection. In this work, the authors devise techniques to...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2010

    VEX: Vetting Browser Extensions for Security Vulnerabilities

    The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which does not scale well and is subject to human error. In this...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Feb 2011

    On the Security of Index Coding With Side Information

    The problem of Index Coding with Side Information (ICSI) was introduced by Birk and Kol,. It was motivated by applications such as audio and video-on-demand, and daily newspaper delivery. In these applications a server (sender) has to deliver some sets of data, audio or video files to a set of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    QoS-Aware Middleware for Ubiquitous and Heterogeneous Environments

    Middleware systems have emerged in recent years to support applications in heterogenous and ubiquitous computing environments. Specifically, future middleware platforms are expected to provide Quality-of-Service (QoS) support, which is required by a new generation of QoS-sensitive applications such as media streaming and e-commerce. This paper presents four key aspects of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    QoS-Directed Error Control of Video Multicast in Wireless Networks

    This paper presents a QoS-Directed Error Control scheme (QDEC) for video multicast in wireless networks. In order to provide multimedia services to mobile users, it is necessary to have not only sufficient bandwidth, but also effective control over wireless channel errors, which are characterized as bursty and location-dependent. The QDEC...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    Optimizing Top-K Queries for Middleware Access: A Unied Cost-Based Approach

    This paper studies optimizing top-k queries in middleware. While many assorted algorithms have been proposed, none is generally applicable to a wide range of possible scenarios. Existing algorithms lack "Generality" to support a wide range of access scenarios and systematic "Adaptivity" to account for runtime specifics. To fulfill this critical...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    Optimal State Prediction for Feedback-Based QoS Adaptations

    In heterogeneous network environments with performance variations present, complex distributed applications, such as distributed visual tracking applications, are desired to adapt themselves and to adjust their resource demands dynamically, in response to fluctuations in either end system or network resources. By such adaptations, they are able to preserve the user-perceptible...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    End-to-End QoS Support for Adaptive Applications Over the Internet

    In current end systems, multiple flexible, complex and distributed applications concurrently share and compete both end systems resources and transmission bandwidth of heterogeneous multi-protocol networks, especially the Internet. The objective is to enable adaptation awareness in these applications to fully cope with the dynamics in resource availability over the heterogeneous...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    Classification and Comparison of QoS Specification Languages for Distributed Multimedia Applications

    Quality of Service (QoS) is becoming an integral part of currently ubiquitous distributed multimedia applications. However, before any QoS-related mechanisms and policies, such as admission control, resource reservation, enforcement, and adaptation, can be invoked, applications need to express their QoS requirements. A considerable amount of research has been done in...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Aug 2009

    A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation

    Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput and spectral efficiency. However, there has been no practical means for provisioning Quality of Service (QoS) in multichannel wireless networks. While previous proposals providing signaling and adaptation mechanisms for...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2010

    QoS-Assured Service Composition in Managed Service Overlay Networks

    Many value-added and content delivery services are being offered via Service Level Agreements (SLAs). These services can be interconnected to form a Service Overlay Network (SON) over the Internet. Service composition in SON has emerged as a cost-effective approach to quickly creating new services. Previous research has addressed the reliability,...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jul 2009

    Implementing Reflective Access Control in SQL

    Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control matrix. RDBAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Feb 2010

    Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

    Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (Cognitive Radio) networks. This paper considers the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. This paper proposes viewing the area of interest as a grid of...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics

    Building reliable storage systems becomes increasingly challenging as the complexity of modern storage systems continues to grow. Understanding storage failure characteristics is crucially important for designing and building a reliable storage system. While several recent studies have been conducted on understanding storage failures, almost all of them focus on the...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // May 2011

    P3CA: Private Anomaly Detection Across ISP Networks

    Detection of malicious traffic in the Internet would be much easier if ISP networks shared their traffic traces. Unfortunately, state-of-the-art anomaly detection algorithms require detailed traffic information which is considered extremely private by operators. To address this, the authors propose an algorithm that allows ISPs to cooperatively detect anomalies without...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Apr 2011

    CoCo: Coding-Based Covert Timing Channels for Network Flows

    In this paper, the authors propose CoCo, a novel framework for establishing covert timing channels. The CoCo covert channel modulates the covert message in the inter-packet delays of the network flows, while a coding algorithm is used to ensure the robustness of the covert message to different perturbations. The CoCo...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Oct 2010

    Towards Improving Network Flow Watermarks Using the Repeat-Accumulate Codes

    Network intruders try to hide their identity by relaying their traffic through a number of intermediate hosts, called stepping stones. Network flow watermarks have been used to detect such attacks by inserting a special timing pattern into one flow by means of artificial delays and detecting relayed flows by searching...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Dec 2009

    Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing

    The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming self-selected communities around shared sensory data pools that enable community specific applications of mutual interest. Such applications have recently been termed participatory sensing. An important category of participatory sensing applications is one...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jan 2011

    Scalable Modeling and Performance Evaluation of Wireless Sensor Networks

    A notable feature of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state of the entire system as a cross-product of the states of individual nodes results in the well-known state explosion problem. Instead, the authors...

    Provided By University of Illinois at Urbana Champaign

  • Presentations // Jan 2003

    Transfer Pricing

    Transfer price is the price charged by one division of an organization for the product or service that it supplies to another segment of the organization. It is an effective tool for performance evaluation of business units and managers. Transfer pricing aids the management in decision-making. The paper examines the...

    Provided By University of Illinois at Urbana Champaign

  • Presentations // Oct 2000

    Managerial Accounting

    The purpose of managerial accounting is to assess the financial position of an organization and accordingly engage in future financial planning. It has an internal focus and deals with planning, implementation, and control of internal financial matters of the organization. The balance sheet portrays the precise financial position of an...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jun 2009

    HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks

    Broadcast is a crucial yet expensive building block for many applications in bandwidth-scarce mobile wireless ad hoc networks. The paper proposes a hybrid deterministic/probabilistic, decentralized broadcast protocol with adjustable broadcast reliability and overhead. The paper first proposes a purely probabilistic, topology-aware broadcast algorithm. The probabilistic broadcast adjusts each node's broadcast...

    Provided By University of Illinois at Urbana Champaign

  • White Papers // Jul 2009

    On the Mobile Wireless Access Via MIMO Relays

    While a network with stationary nodes can provide large capacity in many current wireless systems, a network with mobile users suffers from severe performance degradation. This happens due to quick channel variation and its resulting protocol overheads that are especially large for multiuser Multiple-Input Multiple-Output (MIMO) systems. This paper proposes...

    Provided By University of Illinois at Urbana Champaign