University of Maryland University College

Displaying 1-40 of 72 results

  • White Papers // Nov 2013

    Reducing Energy Costs in Internet-Scale Distributed Systems Using Load Shifting

    Energy costs have become a significant fraction of the operational costs of running large Internet-scale Distributed Systems (IDS). In this paper, the authors propose a demand-response technique where the system temporarily reduces its energy usage in response to pricing signals from a smart grid. Their proposed demand-response technique involves deferring...

    Provided By University of Maryland University College

  • White Papers // Mar 2013

    Efficient Identification of Additive Link Metrics Via Network Tomography

    The authors investigate the problem of identifying individual link metrics in a communication network from accumulated end-to-end metrics over selected measurement paths, under the assumption that link metrics are additive and constant during the measurement, and measurement paths cannot contain cycles. They know from linear algebra that all link metrics...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    Spectrum Prediction in Cognitive Radio Networks

    Spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility are four major functions of Cognitive Radio (CR) systems. Spectrum sensing is utilized to identify primary users' spectrum occupancy status, based on which CR users can dynamically access the available channels through the regulation processes of spectrum decision, spectrum sharing, and...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

    As grid applications evolve, the need for user controlled network infrastructure is apparent in order to support emerging dynamic and interactive services. Due to the inherent bandwidth offered by optical Wavelength Division Multiplexed (WDM) networks, they prove to be a potential candidate to support the bandwidth intensive grid applications. In...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    An Immunologically-Inspired Adaptation Mechanism for Evolvable Network Applications

    Large-scale network applications are expected to be more autonomous and adaptive to dynamic changes in the network to improve user experience, expand applications' operational longevity and reduce maintenance cost. Based on the observation that various biological systems have already met the requirements (i.e., autonomy and adaptability), this paper describes a...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    An Adaptive, Scalable and Self-Healing Sensor Network Architecture for Autonomous Coastal Environmental Monitoring

    Wireless Sensor Networks (WSNs) are key technology enablers for the current and near future security and surveillance systems. In order to build real-time, multi-modal, high resolution monitoring in those systems, WSN applications need to address critical challenges such as autonomy, scalability, self-healing and simplicity. Based on the observation that various...

    Provided By University of Maryland University College

  • White Papers // Dec 2012

    Optimal Error of Query Sets Under the Differentially-Private Matrix Mechanism

    A common goal of privacy research is to release synthetic data that satisfies a formal privacy guarantee and can be used by an analyst in place of the original data. To achieve reasonable accuracy, a synthetic data set must be tuned to support a specified set of queries accurately, sacrificing...

    Provided By University of Maryland University College

  • White Papers // Sep 2012

    Self-Stabilizable Symbiosis for Cloud Data Center Applications: A Game Theoretic Perspective

    This paper describes and evaluates a self-stabilizable adaptation framework for data center applications. The design of the proposed architecture, SymbioticSphere, is inspired by key biological principles such as decentralization, natural selection, emergence and symbiosis. In SymbioticSphere, each data center application consists of application services and middleware platforms. Each service and...

    Provided By University of Maryland University College

  • White Papers // Sep 2012

    Speaker Independent Single Channel Source Separation Using Sinusoidal Features

    Model-based approaches to achieve Single Channel Source Separation (SCSS) have been reasonably successful at separating two sources. However, most of the currently used model-based approaches require pre-trained speaker specific models in order to perform the separation. Often, insufficient or no prior training data may be available to develop such speaker...

    Provided By University of Maryland University College

  • White Papers // Aug 2012

    DIBS: Efficient Distributed Information Brokerage in Large-Scale Sensor Networks

    This paper is focused on the problem of designing a distributed information brokerage infrastructure for sensor networks. The authors propose a solution, called DIBS, which is suitable for networks of any size with or without geographic location information, supports a wide range of applications, and allows any number of these...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    Topological Constraints on Identifying Additive Link Metrics Via End-to-End Paths Measurements

    The authors investigate the problem of identifying individual link metrics in a communication network through measuring accumulated end-to-end metrics over selected paths, under the assumption that link metrics are additive (e.g., delay) and constant in the measurement duration. Based on linear algebra, they know that all the link metrics can...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    Network Coding for Facilitating Secrecy in Large Wireless Networks

    Consider the transmission of a message from one party (Alice) to another (Bob), such that it is kept secret from an eavesdropping adversary (Eve). Cryptographic solutions assume that Eve will intercept the transmitted signal cleanly but impose a hard mathematical problem on Eve that is beyond her computational power to...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    Cloud computing provides a promising opportunity for both small and large organizations to transition from traditional data centers to cloud services, where the organizations can be more concerned with their applications, services, and data rather than the underlying network infrastructures and their associated cost. There are major concerns, however, with...

    Provided By University of Maryland University College

  • White Papers // May 2012

    An Energy Transmission and Distribution Network Using Electric Vehicles

    Vehicle-to-grid provides a viable approach that feeds the battery energy stored in Electric Vehicles (EVs) back to the power grid. Meanwhile, since EVs are mobile, the energy in EVs can be easily transported from one place to another. Based on these two observations, the authors introduce a novel concept called...

    Provided By University of Maryland University College

  • White Papers // May 2012

    Analysis of an Investment Social Network

    Much research has been done in the last several years on social network dynamics as online social networks have become ubiquitous. While networks like Facebook and LinkedIn have given the research world access to data on large-scale, general human social interaction in an online environment, there are a growing number...

    Provided By University of Maryland University College

  • White Papers // May 2012

    VNMBench: A Benchmark for Virtual Network Mapping Algorithms

    The network architecture of the current Internet cannot accommodate the deployment of novel network-layer protocols. To address this fundamental problem, network virtualization has been proposed, where a single physical infrastructure is shared among different virtual network slices. A key operational problem in network virtualization is the need to allocate physical...

    Provided By University of Maryland University College

  • White Papers // Apr 2012

    Dash: A Novel Search Engine for Database-Generated Dynamic Web Pages

    In the ever-growing World Wide Web (or the web, for brevity, hereafter), search engines are indispensable facilities enabling individuals to find web pages of interest efficiently. However, as estimated in 2000, 550 billion web pages were not reachable by search engines. Compared with 8.41 billion web pages collected and indexed...

    Provided By University of Maryland University College

  • White Papers // Apr 2012

    Automated Sensor Verification Using Outlier Detection in the Internet of Things

    Cyber-physical systems uses sensors, actuators, and computation to solve problems that cross the physical world and computational world. Traditionally, the systems have been designed to be specific to one application domain and to be managed by a single entity. However, to achieve scalability, it is necessary to reuse sensors and...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Packet Forwarding Misbehavior Detection in Next-Generation Networks

    The next-generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. With the introduction of programmability and dynamic protocol deployment in routers, potential vulnerabilities and attacks are expected to increase. In this paper, the authors consider the problem of detecting packet...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Saving Energy and Improving TCP Throughput With Rate Adaptation in Ethernet

    Reducing the power consumption of network inter-faces contributes to lowering the overall power needs of the compute and communication infrastructure. Most modern Ethernet interfaces can operate at one of several data rates. In this paper, the authors present Queue Length Based Rate Adaptation (QLBRA), which can dynamically adapt the link...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Virtual Network Mapping With Traffic Matrices

    Network virtualization is a core technology in next-generation networks to overcome the ossification problem that is observed in the current Internet. The key idea of network virtualization is to split physical network resources into multiple logical networks, each supporting different network services and functionalities. One of the key challenges for...

    Provided By University of Maryland University College

  • White Papers // Jan 2012

    High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems

    Passive network measurement and packet header trace collection are vital tools for network operation and research. To protect a user's privacy, it is necessary to anonymize header fields, particularly IP addresses. To preserve the correlation between IP addresses, prefix-preserving anonymization has been proposed. The limitations of this approach for a...

    Provided By University of Maryland University College

  • White Papers // Nov 2011

    Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness

    The relatively low spreading losses in underwater acoustic channels allows increased interference from distant interferers, which reduces the effectiveness of collision-avoidance MAC protocols. These collisions in turn reduce spatial reuse and network good-put, and increase power consumption. A competing channel effect, however, is the frequency-dependent absorption. The absorption can strongly...

    Provided By University of Maryland University College

  • White Papers // Aug 2011

    Encrypted Packet Forwarding in Virtualized Networks

    Virtualized networks provide a shared infrastructure platform for hosting multiple independent networks with different protocol stacks. The infrastructure and the virtual networks are operated by different entities who may not trust each other. In the authors' work, they address one of the arising security issues by providing data confidentiality for...

    Provided By University of Maryland University College

  • White Papers // Jul 2011

    Efficient Conflict Detection in Flow-Based Virtualized Networks

    In the current Internet, traffic is routed at the level of destination prefixes. The next-generation Internet requires control of traffic at the level of flows or flow aggregates. To accommodate fine-grained control, modern switching substrates (e.g., OpenFlow) maintain forwarding information for each active flow in a flow table. A separate...

    Provided By University of Maryland University College

  • White Papers // Jul 2011

    High-Performance Implementation of In-Network Traffic Pacing

    Optical packet switching networks promise to provide high-speed data communication and serve as the foundation of the future Internet. A key technological problem is the very small size of packet buffers that can be implemented in the optical domain. Existing protocols, for example the transmission control protocol, do not perform...

    Provided By University of Maryland University College

  • White Papers // May 2011

    Security Issues in Network Virtualization for the Future Internet

    Network virtualization is a key technology that is necessary to support diverse protocol suites in the future Internet. A virtualized network uses a single physical infrastructure to support multiple logical networks. Each logical network can provide its users with a custom set of protocols and functionalities. Much research work has...

    Provided By University of Maryland University College

  • White Papers // May 2011

    Attacks on Network Infrastructure

    The authors present the first practical example of an entirely new class of network attacks - attacks that target the network infrastructure. Modern routers in computer networks use general-purpose programmable packet processors. The software used for packet processing on these systems is potentially vulnerable to remote exploits. In this paper,...

    Provided By University of Maryland University College

  • White Papers // May 2011

    A Study of the Impact of Network Traffic Pacing From Network and End-User Perspectives

    As the demand on the Internet bandwidth keeps increasing, all-optical network architectures emerge as a promising solution to high-speed telecommunication networks. However, the performance of optical routers/switches is sensitive to the statistics of Internet traffic due to their limited buffer size, which weakens the optical routers' capability of absorbing Internet...

    Provided By University of Maryland University College

  • White Papers // Apr 2011

    Private Database Synthesis for Outsourced System Evaluation

    In this paper, the authors are to permit secure outsourced system evaluation. They propose a method for generating synthetic databases and obfuscating a workload of queries in order to protect the sensitive information present in the database. The synthetic database and workload can be used by a third party to...

    Provided By University of Maryland University College

  • White Papers // Mar 2011

    A Cost-Aware Elasticity Provisioning System for the Cloud

    Cloud computing has emerged as a new IT delivery model in which an organization or individual can rent remote compute and storage resources dynamically, using a credit card, to host networked applications \"In the cloud\". In this paper, the authors present Kingfisher, a cost-aware system that provides efficient support for...

    Provided By University of Maryland University College

  • White Papers // Sep 2010

    An Analysis of Activities in Facebook

    Human dynamics in real-world social networks has been a long lasting topic of research. Recently, the rapid growing of online social networks with their data made accessible has given researchers a door of opportunity to study large-scale social networks. Facebook has been the largest, most influential, and fastest growing social...

    Provided By University of Maryland University College

  • White Papers // Jun 2010

    CRES: A Content-Based Routing Substrate for Large-Scale Data-Centric Sensor Networks

    The authors propose CRES as a substrate structure to enable content-based routing in large-scale sensor networks without location information. With CRES, traffic is routed based on its content rather than the destination's physical address. CRES is therefore applicable to data-centric sensor networks where sensor data and user queries need to...

    Provided By University of Maryland University College

  • White Papers // May 2010

    Automated Service Composition and Routing in Networks With Data-Path Services

    Advanced packet processing in the data path of networks is common in the current Internet and is expanding to next-generation networks. Dynamic composition of such "Network services" allows networks to establish connections with customized communication characteristics to satisfy various application requirements. In these networks, there are two problems that need...

    Provided By University of Maryland University College

  • White Papers // May 2010

    A Taxonomy and Comparative Evaluation of Algorithms for Parallel Anomaly Detection

    Anomaly detection in network traffic is an important technique for identifying operation and security problems in networks. Numerous anomaly detection algorithms have been proposed and deployed in practice. The recent availability of high-performance embedded processors in network systems has made it possible to implement these algorithms to monitor traffic in...

    Provided By University of Maryland University College

  • White Papers // May 2010

    Enforcement of Data-Plane Policies in Next-Generation Networks

    Modern networks not only forward traffic, but also perform a variety of processing operations on packets (e.g., content inspection, transcoding, QoS scheduling). Such dataplane operations cannot be easily coordinated in the current Internet architectures since there is no explicit policy support for packet processing services. As more diverse systems and...

    Provided By University of Maryland University College

  • White Papers // Apr 2010

    Implementation of a Simplified Network Processor

    Programmable packet processors have replaced traditional fixed-function custom logic in the data path of routers. Programmability of these systems allows the introduction of new packet processing functions, which is essential for today's Internet as well as for next-generation network architectures. Software development for many existing implementations of these network processors...

    Provided By University of Maryland University College

  • White Papers // Feb 2010

    Data Path Management in Mesh-Based Programmable Routers

    With dozens to hundreds of processing cores deployed in next generation packet processor, regular topologies such as mesh are widely adopted in Network-on-Chip design to provide scalable interconnection to cores. Although such packet processors are rich in raw system processing power, utilization of hardware resource plays a critical role in...

    Provided By University of Maryland University College

  • White Papers // Feb 2010

    Convergence of Communication and Processing in Next-Generation Networks

    The authors argue that applications can benefit from the offloading of processing tasks into the data path of next-generation networks, where custom packet processing functions can be implemented. They present the concept of application-layer services and how they can be integrated into their existing network service architecture for easy use...

    Provided By University of Maryland University College

  • White Papers // Dec 2009

    A Practical On-Line Pacing Scheme at Edges of Small Buffer Networks

    For the optical packet-switching routers to be widely deployed in the Internet, the size of packet buffers on routers has to be significantly small. Such small-buffer networks rely on traffic with low levels of burstiness to avoid buffer overflows and packet losses. The authors present a pacing system that proactively...

    Provided By University of Maryland University College

  • White Papers // Mar 2011

    A Cost-Aware Elasticity Provisioning System for the Cloud

    Cloud computing has emerged as a new IT delivery model in which an organization or individual can rent remote compute and storage resources dynamically, using a credit card, to host networked applications \"In the cloud\". In this paper, the authors present Kingfisher, a cost-aware system that provides efficient support for...

    Provided By University of Maryland University College

  • White Papers // Nov 2013

    Reducing Energy Costs in Internet-Scale Distributed Systems Using Load Shifting

    Energy costs have become a significant fraction of the operational costs of running large Internet-scale Distributed Systems (IDS). In this paper, the authors propose a demand-response technique where the system temporarily reduces its energy usage in response to pricing signals from a smart grid. Their proposed demand-response technique involves deferring...

    Provided By University of Maryland University College

  • White Papers // May 2011

    A Study of the Impact of Network Traffic Pacing From Network and End-User Perspectives

    As the demand on the Internet bandwidth keeps increasing, all-optical network architectures emerge as a promising solution to high-speed telecommunication networks. However, the performance of optical routers/switches is sensitive to the statistics of Internet traffic due to their limited buffer size, which weakens the optical routers' capability of absorbing Internet...

    Provided By University of Maryland University College

  • White Papers // May 2010

    Automated Service Composition and Routing in Networks With Data-Path Services

    Advanced packet processing in the data path of networks is common in the current Internet and is expanding to next-generation networks. Dynamic composition of such "Network services" allows networks to establish connections with customized communication characteristics to satisfy various application requirements. In these networks, there are two problems that need...

    Provided By University of Maryland University College

  • White Papers // May 2010

    A Taxonomy and Comparative Evaluation of Algorithms for Parallel Anomaly Detection

    Anomaly detection in network traffic is an important technique for identifying operation and security problems in networks. Numerous anomaly detection algorithms have been proposed and deployed in practice. The recent availability of high-performance embedded processors in network systems has made it possible to implement these algorithms to monitor traffic in...

    Provided By University of Maryland University College

  • White Papers // May 2010

    Enforcement of Data-Plane Policies in Next-Generation Networks

    Modern networks not only forward traffic, but also perform a variety of processing operations on packets (e.g., content inspection, transcoding, QoS scheduling). Such dataplane operations cannot be easily coordinated in the current Internet architectures since there is no explicit policy support for packet processing services. As more diverse systems and...

    Provided By University of Maryland University College

  • White Papers // Apr 2010

    Implementation of a Simplified Network Processor

    Programmable packet processors have replaced traditional fixed-function custom logic in the data path of routers. Programmability of these systems allows the introduction of new packet processing functions, which is essential for today's Internet as well as for next-generation network architectures. Software development for many existing implementations of these network processors...

    Provided By University of Maryland University College

  • White Papers // Feb 2010

    Data Path Management in Mesh-Based Programmable Routers

    With dozens to hundreds of processing cores deployed in next generation packet processor, regular topologies such as mesh are widely adopted in Network-on-Chip design to provide scalable interconnection to cores. Although such packet processors are rich in raw system processing power, utilization of hardware resource plays a critical role in...

    Provided By University of Maryland University College

  • White Papers // Feb 2010

    Convergence of Communication and Processing in Next-Generation Networks

    The authors argue that applications can benefit from the offloading of processing tasks into the data path of next-generation networks, where custom packet processing functions can be implemented. They present the concept of application-layer services and how they can be integrated into their existing network service architecture for easy use...

    Provided By University of Maryland University College

  • White Papers // Dec 2009

    A Practical On-Line Pacing Scheme at Edges of Small Buffer Networks

    For the optical packet-switching routers to be widely deployed in the Internet, the size of packet buffers on routers has to be significantly small. Such small-buffer networks rely on traffic with low levels of burstiness to avoid buffer overflows and packet losses. The authors present a pacing system that proactively...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    Evaluation of Path Recording Techniques in Secure MANET

    Secure operation of mobile ad-hoc networks requires the ability to track the flow of traffic through the network. Knowledge of the path of a packet allows inference of correct operation or potential attacks. In prior work, the authors have described a number of different techniques for recording such path information...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    Techniques for Policy Enforcement on Encrypted Network Traffic

    Most large-scale data communication net-works are built from multiple autonomous sub-networks, which are managed by different administrative entities. In many practical environments, information about traffic policies is considered proprietary and is not disclosed by network operators. However, some operational scenarios require routers within a network to check if traffic matches...

    Provided By University of Maryland University College

  • White Papers // Jul 2009

    Design of a Secure Router System for Next-Generation Networks

    Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. The authors present the design of a Secure Packet Processing Platform (SPPP) that can protect these router systems. They use an instruction-level monitoring...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection

    Developing algorithms to detect anomalies in network traffic is an important goal to achieve secure and efficient operation of the Internet. To evaluate different algorithms, it is crucial to have a set of standardized test cases. The authors propose a benchmark suite called "AnomBench" that consists of sixteen different traffic...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    Burstiness as Traffic Metric in Next-Generation Optical Core Networks

    Next-generation all-optical packet-switched core networks use very small packet buffers. The authors argue that it is essential to focus on burstiness rather than bandwidth when conditioning traffic for effective network operation. The all-optical core of the next-generation Internet exhibits characteristics that are the exact opposite of traditional network. Since the...

    Provided By University of Maryland University College

  • White Papers // May 2009

    Runtime Resource Allocation in Multi-Core Packet Processing Systems

    Packet forwarding operations in network systems are often performed in software so that routers can be updated as new protocols and service features are developed. To meet the processing demands of high-performance networks, multiprocessor systems-on-a-chip with dozens of cores are employed to provide raw processing power. Management of these processors...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    A High-Performance Capabilities-Based Network Protocol

    Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    Automated Service Composition in Next-Generation Networks

    Dynamic composition of protocol features allows applications to establish connections with custom communication characteristics. Automatically computing possible compositions and checking given compositions requires a common framework for expressing application needs, service features, and system characteristics. In this paper, the authors present such a framework that is based on situation calculus....

    Provided By University of Maryland University College

  • White Papers // Feb 2009

    Support for Dynamic Adaptation in Next Generation Packet Processing Systems

    Designs of next-generation Internet architectures propose a diverse and changing set of features in the data path of routers. These routers require high-performance programmable packet processing platforms to allow for dynamic feature deployment and adaptation. In this paper, the authors present programming abstractions that quantifies processing and storage of network...

    Provided By University of Maryland University College

  • White Papers // Feb 2009

    Evaluating Algorithms for Composable Service Placement in Computer Networks

    Novel network architectures with distributed service components on both routers and end-systems have been proposed to provide the necessary flexibility in the next-generation Internet. Such architectures allow services to be composed along the data path to satisfy different communication requirements. A major operational challenge in such systems is to determine...

    Provided By University of Maryland University College

  • White Papers // Feb 2009

    Practical Packet Pacing in Small-Buffer Networks

    The demand for more bandwidth has lead to proposals for an all-optical network core. Due to inherent constraints of optical technology, only routers with small packet buffers are feasible to be implemented. In order to ensure efficient operation of such small-buffer networks, it is necessary to ensure that traffic is...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    Design of a System to Track Student Progress in Virtual Laboratories

    Laboratories are an important part of technical and scientific education. To amortize the cost of setup and maintenance, some laboratory facilities can be shared and via remote network access. Such virtual laboratories provide realistic environments and allow for interactive student experimentation. When students access a virtual laboratory via the Internet,...

    Provided By University of Maryland University College

  • White Papers // Sep 2009

    Hop-Count Based Techniques for Passive Target Localization in Sensor Networks

    Target tracking techniques usually assume that the target is within the detection range of one or more sensor nodes at known locations, so that the target's location can be determined based on these locations. Instead, the authors are interested in networks where most sensor nodes do not know their location;...

    Provided By University of Maryland University College

  • White Papers // Jul 2008

    Cost-Effective Multidimensional Publish/Subscribe Services in Sensor Networks

    Publish/subscribe services are natural applications of sensor networks as sensors are designed mainly to detect and notify upon events of interest. To enable these services, the brokerage mechanism that routes a given event to the subscribing nodes must be confined to the network's resource constraints. GHT has been used as...

    Provided By University of Maryland University College

  • White Papers // Jun 2008

    A Random Projection Approach to Subscription Covering Detection in Publish/Subscribe Systems

    Subscription covering detection is useful to improving the performance of any publish/subscribe system. However, an exact solution to querying coverings among a large set of subscriptions in high dimension is computationally too expensive to be practicable. Therefore, the authors are interested in an approximate approach. They focus on spherical subscriptions...

    Provided By University of Maryland University College

  • White Papers // May 2012

    An Energy Transmission and Distribution Network Using Electric Vehicles

    Vehicle-to-grid provides a viable approach that feeds the battery energy stored in Electric Vehicles (EVs) back to the power grid. Meanwhile, since EVs are mobile, the energy in EVs can be easily transported from one place to another. Based on these two observations, the authors introduce a novel concept called...

    Provided By University of Maryland University College

  • White Papers // May 2012

    Analysis of an Investment Social Network

    Much research has been done in the last several years on social network dynamics as online social networks have become ubiquitous. While networks like Facebook and LinkedIn have given the research world access to data on large-scale, general human social interaction in an online environment, there are a growing number...

    Provided By University of Maryland University College

  • White Papers // Dec 2012

    Optimal Error of Query Sets Under the Differentially-Private Matrix Mechanism

    A common goal of privacy research is to release synthetic data that satisfies a formal privacy guarantee and can be used by an analyst in place of the original data. To achieve reasonable accuracy, a synthetic data set must be tuned to support a specified set of queries accurately, sacrificing...

    Provided By University of Maryland University College

  • White Papers // Apr 2009

    Workload Generation and Instrumentation for Reproducible Networking Experiments

    The authors propose the design of a benchmarking and instrumentation component for the GENI experimental networking test-bed. Their design uses a workload generation system to create reproducible network conditions and an instrumentation component to collect measurement data. They discuss the research challenges related to this design. Research on the design...

    Provided By University of Maryland University College

  • White Papers // Aug 2008

    A Framework for Network State Management in the Next-Generation Internet Architecture

    In the next-generation Internet architecture, more functionality will be placed in the data path of routers in the form of "Services" and other packet processing features. This trend will increase the amount of state information that is maintained by system inside the network. In this paper, the authors present a...

    Provided By University of Maryland University College

  • White Papers // Sep 2008

    A Scalable Distributed Routing Protocol for Networks With Data-Path Services

    Advanced packet processing functions in the data path of routers are commonly used in the current Internet and are likely to expand in next-generation networks. One of the key challenges related to such "Network services" is to develop a suitable control plane infrastructure for routing and connection setup. In this...

    Provided By University of Maryland University College

  • White Papers // May 2008

    A Distributed Routing Algorithm for Networks With Data-Path Services

    Many next-generation Internet architectures propose advanced packet processing functions in the data path of the network. Such "Services" are typically performed on some nodes along the path of a packet. The authors present a novel decentralized algorithm that can determine an allocation of services to network nodes. The algorithm can...

    Provided By University of Maryland University College

  • White Papers // May 2008

    Massively Parallel Anomaly Detection in Online Network Measurement

    Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing systems allow traffic monitoring and anomaly detection in real-time. In this paper, the authors show how such processing capabilities can be used to run several different anomaly...

    Provided By University of Maryland University College

  • White Papers // Aug 2012

    DIBS: Efficient Distributed Information Brokerage in Large-Scale Sensor Networks

    This paper is focused on the problem of designing a distributed information brokerage infrastructure for sensor networks. The authors propose a solution, called DIBS, which is suitable for networks of any size with or without geographic location information, supports a wide range of applications, and allows any number of these...

    Provided By University of Maryland University College

  • White Papers // Sep 2010

    An Analysis of Activities in Facebook

    Human dynamics in real-world social networks has been a long lasting topic of research. Recently, the rapid growing of online social networks with their data made accessible has given researchers a door of opportunity to study large-scale social networks. Facebook has been the largest, most influential, and fastest growing social...

    Provided By University of Maryland University College

  • White Papers // Jun 2010

    CRES: A Content-Based Routing Substrate for Large-Scale Data-Centric Sensor Networks

    The authors propose CRES as a substrate structure to enable content-based routing in large-scale sensor networks without location information. With CRES, traffic is routed based on its content rather than the destination's physical address. CRES is therefore applicable to data-centric sensor networks where sensor data and user queries need to...

    Provided By University of Maryland University College

  • White Papers // Sep 2009

    A Parsimonious Statistical Protocol for Generating Power-Law Networks

    The authors propose a new mechanism for generating networks with a wide variety of degree distributions. The idea is a modification of the well-studied preferential attachment scheme in which the degree of each node is used to determine its evolving connectivity. Modifications to this base protocol to include features other...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks

    This paper is focused on the content-based publish/subscribe service and the authors' problem is to devise an efficient mechanism that enables this service in any given P2P network of cooperative nodes. Most techniques require some overlay structuralization added on top of the network. They propose a solution called PUB-2-SUB which...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    An Immunologically-Inspired Adaptation Mechanism for Evolvable Network Applications

    Large-scale network applications are expected to be more autonomous and adaptive to dynamic changes in the network to improve user experience, expand applications' operational longevity and reduce maintenance cost. Based on the observation that various biological systems have already met the requirements (i.e., autonomy and adaptability), this paper describes a...

    Provided By University of Maryland University College

  • White Papers // Mar 2013

    Efficient Identification of Additive Link Metrics Via Network Tomography

    The authors investigate the problem of identifying individual link metrics in a communication network from accumulated end-to-end metrics over selected measurement paths, under the assumption that link metrics are additive and constant during the measurement, and measurement paths cannot contain cycles. They know from linear algebra that all link metrics...

    Provided By University of Maryland University College