University of Maryland University College

Displaying 1-40 of 67 results

  • White Papers // Apr 2014

    A Broadcast-Enabled Sensing System for Embedded Multi-Core Processors

    Contemporary multi-core architectures deployed in embedded systems are expected to function near the operational limits of temperature, voltage, and device wear-out. To date, most on-chip sensing systems have been designed to collect and use sensor information for these parameters locally. In this paper, a new sensing system to enhance multi-core...

    Provided By University of Maryland University College

  • White Papers // Apr 2014

    Nanowire Volatile RAM as an Alternative to SRAM

    Maintaining benefits of CMOS technology scaling is becoming challenging due to increased manufacturing complexities and unwanted passive power dissipations. This is particularly challenging in SRAM, where manufacturing precision and leakage power control are critical issues. To alleviate some of these challenges a novel non-volatile memory alternative to SRAM was proposed...

    Provided By University of Maryland University College

  • White Papers // Mar 2014

    Graph Stream Algorithms: A Survey

    Over the last decade, there has been considerable interest in designing algorithms for processing massive graphs in the data stream model. The original motivation was two-fold: in many applications, the dynamic graphs that arise are too large to be stored in the main memory of a single machine and considering...

    Provided By University of Maryland University College

  • White Papers // Dec 2013

    Interactive Data Exploration Based on User Relevance Feedback

    Interactive Data Exploration (IDE) applications typically involve users that aim to discover interesting objects by iteratively executing numerous ad-hoc exploration queries. Therefore, IDE can easily become an extremely labor and resource intensive process. To support these applications, the authors introduce a framework that assists users by automatically navigating them through...

    Provided By University of Maryland University College

  • White Papers // Dec 2013

    Predictive Synchronization for DVFS-Enabled Multi-Processor Systems

    Technology scaling has enabled the number of cores within a system on chip to increase significantly. Globally Asynchronous Locally Synchronous (GALS) systems using Dynamic Voltage and Frequency Scaling (DVFS) operate each of these cores on distinct and dynamic clock domains. Typically, the interfaces between these clock domains experience multi-cycle latency...

    Provided By University of Maryland University College

  • White Papers // Nov 2013

    Reducing Energy Costs in Internet-Scale Distributed Systems Using Load Shifting

    Energy costs have become a significant fraction of the operational costs of running large Internet-scale Distributed Systems (IDS). In this paper, the authors propose a demand-response technique where the system temporarily reduces its energy usage in response to pricing signals from a smart grid. Their proposed demand-response technique involves deferring...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    An Open-Source SATA Core for Virtex-4 FPGAs

    In this paper, the authors present an open-source Serial ATA core designed for Virtex-4 FPGAs. This core utilizes the RocketIO Multi-Gigabit Transceiver (MGT) of the Virtex-4 to interface with hard drives at SATA Generation 1 (SATA I, 1.5 Gb/s) and Generation 2 (SATA II, 3.0 Gb/s) speeds. A full design...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    FlexGrip: A Soft GPGPU for FPGAs

    Over the past decade, soft microprocessors and vector processors have been extensively used in FPGAs for a wide variety of applications. However, it is difficult to straightforwardly extend their functionality to support conditional and thread based execution characteristic of General-Purpose Graphics Processing Units (GPGPUs) without recompiling FPGA hardware for each...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    Accelerating Iterative Algorithms with Asynchronous Accumulative Updates on FPGAs

    Iterative algorithms represent a pervasive class of data mining, web search and scientific computing applications. In iterative algorithms, a final result is derived by performing repetitive computations on an input data set. Existing techniques to parallelize such algorithms typically use software frameworks such as MapReduce and Hadoop to distribute data...

    Provided By University of Maryland University College

  • White Papers // Jul 2013

    Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks

    Modern router hardware in computer networks is based on programmable network processors, which implement various packet forwarding operations in software. These processor systems are vulnerable to attacks that can be launched entirely through the data plane of the network without any access to the control interface of the router. Prior...

    Provided By University of Maryland University College

  • White Papers // Jun 2013

    Stealthy Dopant-Level Hardware Trojans

    In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g. for military or critical infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since...

    Provided By University of Maryland University College

  • White Papers // Mar 2013

    Efficient Identification of Additive Link Metrics Via Network Tomography

    The authors investigate the problem of identifying individual link metrics in a communication network from accumulated end-to-end metrics over selected measurement paths, under the assumption that link metrics are additive and constant during the measurement, and measurement paths cannot contain cycles. They know from linear algebra that all link metrics...

    Provided By University of Maryland University College

  • White Papers // Mar 2013

    Birth and Adolescence of Reconfigurable Computing: A Survey of the First 20 Years of Field-Programmable Custom Computing Machines

    In twenty years, reconfigurable computing has grown from a wild, exploratory idea to a viable alternative to Application-Specific Integrated Circuits (ASICs) and fixed microprocessors in the authors' computing systems. With increasing energy and reliability concerns, there is every reason to believe its importance will grow as technology scales. As they...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    Spectrum Prediction in Cognitive Radio Networks

    Spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility are four major functions of Cognitive Radio (CR) systems. Spectrum sensing is utilized to identify primary users' spectrum occupancy status, based on which CR users can dynamically access the available channels through the regulation processes of spectrum decision, spectrum sharing, and...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

    As grid applications evolve, the need for user controlled network infrastructure is apparent in order to support emerging dynamic and interactive services. Due to the inherent bandwidth offered by optical Wavelength Division Multiplexed (WDM) networks, they prove to be a potential candidate to support the bandwidth intensive grid applications. In...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    An Adaptive, Scalable and Self-Healing Sensor Network Architecture for Autonomous Coastal Environmental Monitoring

    Wireless Sensor Networks (WSNs) are key technology enablers for the current and near future security and surveillance systems. In order to build real-time, multi-modal, high resolution monitoring in those systems, WSN applications need to address critical challenges such as autonomy, scalability, self-healing and simplicity. Based on the observation that various...

    Provided By University of Maryland University College

  • White Papers // Jan 2013

    An Immunologically-Inspired Adaptation Mechanism for Evolvable Network Applications

    Large-scale network applications are expected to be more autonomous and adaptive to dynamic changes in the network to improve user experience, expand applications' operational longevity and reduce maintenance cost. Based on the observation that various biological systems have already met the requirements (i.e., autonomy and adaptability), this paper describes a...

    Provided By University of Maryland University College

  • White Papers // Dec 2012

    Optimal Error of Query Sets Under the Differentially-Private Matrix Mechanism

    A common goal of privacy research is to release synthetic data that satisfies a formal privacy guarantee and can be used by an analyst in place of the original data. To achieve reasonable accuracy, a synthetic data set must be tuned to support a specified set of queries accurately, sacrificing...

    Provided By University of Maryland University College

  • White Papers // Sep 2012

    Self-Stabilizable Symbiosis for Cloud Data Center Applications: A Game Theoretic Perspective

    This paper describes and evaluates a self-stabilizable adaptation framework for data center applications. The design of the proposed architecture, SymbioticSphere, is inspired by key biological principles such as decentralization, natural selection, emergence and symbiosis. In SymbioticSphere, each data center application consists of application services and middleware platforms. Each service and...

    Provided By University of Maryland University College

  • White Papers // Sep 2012

    Speaker Independent Single Channel Source Separation Using Sinusoidal Features

    Model-based approaches to achieve Single Channel Source Separation (SCSS) have been reasonably successful at separating two sources. However, most of the currently used model-based approaches require pre-trained speaker specific models in order to perform the separation. Often, insufficient or no prior training data may be available to develop such speaker...

    Provided By University of Maryland University College

  • White Papers // Aug 2012

    DIBS: Efficient Distributed Information Brokerage in Large-Scale Sensor Networks

    This paper is focused on the problem of designing a distributed information brokerage infrastructure for sensor networks. The authors propose a solution, called DIBS, which is suitable for networks of any size with or without geographic location information, supports a wide range of applications, and allows any number of these...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    Topological Constraints on Identifying Additive Link Metrics Via End-to-End Paths Measurements

    The authors investigate the problem of identifying individual link metrics in a communication network through measuring accumulated end-to-end metrics over selected paths, under the assumption that link metrics are additive (e.g., delay) and constant in the measurement duration. Based on linear algebra, they know that all the link metrics can...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    Network Coding for Facilitating Secrecy in Large Wireless Networks

    Consider the transmission of a message from one party (Alice) to another (Bob), such that it is kept secret from an eavesdropping adversary (Eve). Cryptographic solutions assume that Eve will intercept the transmitted signal cleanly but impose a hard mathematical problem on Eve that is beyond her computational power to...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    Cloud computing provides a promising opportunity for both small and large organizations to transition from traditional data centers to cloud services, where the organizations can be more concerned with their applications, services, and data rather than the underlying network infrastructures and their associated cost. There are major concerns, however, with...

    Provided By University of Maryland University College

  • White Papers // May 2012

    An Energy Transmission and Distribution Network Using Electric Vehicles

    Vehicle-to-grid provides a viable approach that feeds the battery energy stored in Electric Vehicles (EVs) back to the power grid. Meanwhile, since EVs are mobile, the energy in EVs can be easily transported from one place to another. Based on these two observations, the authors introduce a novel concept called...

    Provided By University of Maryland University College

  • White Papers // May 2012

    Analysis of an Investment Social Network

    Much research has been done in the last several years on social network dynamics as online social networks have become ubiquitous. While networks like Facebook and LinkedIn have given the research world access to data on large-scale, general human social interaction in an online environment, there are a growing number...

    Provided By University of Maryland University College

  • White Papers // May 2012

    VNMBench: A Benchmark for Virtual Network Mapping Algorithms

    The network architecture of the current Internet cannot accommodate the deployment of novel network-layer protocols. To address this fundamental problem, network virtualization has been proposed, where a single physical infrastructure is shared among different virtual network slices. A key operational problem in network virtualization is the need to allocate physical...

    Provided By University of Maryland University College

  • White Papers // Apr 2012

    Dash: A Novel Search Engine for Database-Generated Dynamic Web Pages

    In the ever-growing World Wide Web (or the web, for brevity, hereafter), search engines are indispensable facilities enabling individuals to find web pages of interest efficiently. However, as estimated in 2000, 550 billion web pages were not reachable by search engines. Compared with 8.41 billion web pages collected and indexed...

    Provided By University of Maryland University College

  • White Papers // Apr 2012

    Automated Sensor Verification Using Outlier Detection in the Internet of Things

    Cyber-physical systems uses sensors, actuators, and computation to solve problems that cross the physical world and computational world. Traditionally, the systems have been designed to be specific to one application domain and to be managed by a single entity. However, to achieve scalability, it is necessary to reuse sensors and...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Packet Forwarding Misbehavior Detection in Next-Generation Networks

    The next-generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. With the introduction of programmability and dynamic protocol deployment in routers, potential vulnerabilities and attacks are expected to increase. In this paper, the authors consider the problem of detecting packet...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Saving Energy and Improving TCP Throughput With Rate Adaptation in Ethernet

    Reducing the power consumption of network inter-faces contributes to lowering the overall power needs of the compute and communication infrastructure. Most modern Ethernet interfaces can operate at one of several data rates. In this paper, the authors present Queue Length Based Rate Adaptation (QLBRA), which can dynamically adapt the link...

    Provided By University of Maryland University College

  • White Papers // Feb 2012

    Virtual Network Mapping With Traffic Matrices

    Network virtualization is a core technology in next-generation networks to overcome the ossification problem that is observed in the current Internet. The key idea of network virtualization is to split physical network resources into multiple logical networks, each supporting different network services and functionalities. One of the key challenges for...

    Provided By University of Maryland University College

  • White Papers // Jan 2012

    High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems

    Passive network measurement and packet header trace collection are vital tools for network operation and research. To protect a user's privacy, it is necessary to anonymize header fields, particularly IP addresses. To preserve the correlation between IP addresses, prefix-preserving anonymization has been proposed. The limitations of this approach for a...

    Provided By University of Maryland University College

  • White Papers // Nov 2011

    Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness

    The relatively low spreading losses in underwater acoustic channels allows increased interference from distant interferers, which reduces the effectiveness of collision-avoidance MAC protocols. These collisions in turn reduce spatial reuse and network good-put, and increase power consumption. A competing channel effect, however, is the frequency-dependent absorption. The absorption can strongly...

    Provided By University of Maryland University College

  • White Papers // Aug 2011

    ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization

    Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has highlighted Field Programmable Gate Arrays (FPGAs) as attractive platforms for high performance network virtualization, these devices remain inaccessible to the larger networking research community due to the...

    Provided By University of Maryland University College

  • White Papers // Aug 2011

    Encrypted Packet Forwarding in Virtualized Networks

    Virtualized networks provide a shared infrastructure platform for hosting multiple independent networks with different protocol stacks. The infrastructure and the virtual networks are operated by different entities who may not trust each other. In the authors' work, they address one of the arising security issues by providing data confidentiality for...

    Provided By University of Maryland University College

  • White Papers // Jul 2011

    Efficient Conflict Detection in Flow-Based Virtualized Networks

    In the current Internet, traffic is routed at the level of destination prefixes. The next-generation Internet requires control of traffic at the level of flows or flow aggregates. To accommodate fine-grained control, modern switching substrates (e.g., OpenFlow) maintain forwarding information for each active flow in a flow table. A separate...

    Provided By University of Maryland University College

  • White Papers // Jul 2011

    High-Performance Implementation of In-Network Traffic Pacing

    Optical packet switching networks promise to provide high-speed data communication and serve as the foundation of the future Internet. A key technological problem is the very small size of packet buffers that can be implemented in the optical domain. Existing protocols, for example the transmission control protocol, do not perform...

    Provided By University of Maryland University College

  • White Papers // Jun 2011

    A Dynamically-Reconfigurable Phased Array Radar Processing System

    Digital beamforming is an important radar processing technique used in many communication and radar sensing applications. This paper presents a low-cost digital beamforming system which takes advantage of four eight channel Analog-to-Digital (A-to-D) converter chips and dynamic FPGA reconfiguration. A full digital beamforming algorithm capable of forming up to 24...

    Provided By University of Maryland University College

  • White Papers // May 2011

    Security Issues in Network Virtualization for the Future Internet

    Network virtualization is a key technology that is necessary to support diverse protocol suites in the future Internet. A virtualized network uses a single physical infrastructure to support multiple logical networks. Each logical network can provide its users with a custom set of protocols and functionalities. Much research work has...

    Provided By University of Maryland University College

  • White Papers // Apr 2014

    Nanowire Volatile RAM as an Alternative to SRAM

    Maintaining benefits of CMOS technology scaling is becoming challenging due to increased manufacturing complexities and unwanted passive power dissipations. This is particularly challenging in SRAM, where manufacturing precision and leakage power control are critical issues. To alleviate some of these challenges a novel non-volatile memory alternative to SRAM was proposed...

    Provided By University of Maryland University College

  • White Papers // Jan 2010

    High-Level Transformations Using Canonical Dataflow Representation

    In this paper, the authors describe a systematic method and an experimental software system for high-level transformations of designs specified at behavioral level. The goal is to transform the initial design specifications into an optimized Data Flow Graph (DFG) better suited for high-level synthesis. The optimizing transformations are based on...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    An Interactive Approach to Timing Accurate PCI-X Simulation

    To date, most system-level bus simulation platforms have focused on the functional correctness of individual bus components rather than the full system-level evaluation of multiple components operating simultaneously. In this paper, a new scalable system-level bus simulation environment is described which allows for the evaluation of the PCI-X bus and...

    Provided By University of Maryland University College

  • White Papers // Aug 2011

    ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization

    Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has highlighted Field Programmable Gate Arrays (FPGAs) as attractive platforms for high performance network virtualization, these devices remain inaccessible to the larger networking research community due to the...

    Provided By University of Maryland University College

  • White Papers // Jun 2011

    A Dynamically-Reconfigurable Phased Array Radar Processing System

    Digital beamforming is an important radar processing technique used in many communication and radar sensing applications. This paper presents a low-cost digital beamforming system which takes advantage of four eight channel Analog-to-Digital (A-to-D) converter chips and dynamic FPGA reconfiguration. A full digital beamforming algorithm capable of forming up to 24...

    Provided By University of Maryland University College

  • White Papers // May 2011

    Real-Time Estimates of Differential Signal Phase for Spaceborne Systems Using FPGAs

    The high cost and inaccessibility of spaceborne systems necessitates the adaptation of computing resources based on changes in environmental conditions. In this paper, a new, adaptive phase difference detection circuit that can be implemented in reconfigurable hardware is described. This circuit measures both phase changes of a single signal over...

    Provided By University of Maryland University College

  • White Papers // Mar 2009

    Application-Specific Customization and Scalability of Soft Multiprocessors

    Although soft microprocessors are widely used in FPGAs, limited paper has been performed regarding how to automatically and efficiently generate soft multiprocessors. In this paper, an automated parallel compilation environment for multiple soft processors which incorporates parallel compilation and inter-processor communication structures is described. A total of eight previously-developed parallel...

    Provided By University of Maryland University College

  • White Papers // May 2008

    RTL Dynamic Power Optimization for FPGAs

    As FPGA devices grow in size and speed, power consumption is becoming a limiting problem. In this document, a dynamic power optimization CAD tool for FPGAs that is applied at the Register Transfer Level (RTL) during design synthesis is described. The automatic design transformations implemented by this tool reduce dynamic...

    Provided By University of Maryland University College

  • White Papers // Mar 2010

    Reconfigurable Sparse Matrix-Vector Multiplication on FPGAs

    Cache-based, general purpose CPUs perform at a small fraction of their maximum floating point performance when executing memory-intensive simulations, such as those required for sparse matrix-vector multiplication. This effect is due to the memory bottleneck that is encountered with large arrays that must be stored in dynamic RAM. An FPGA...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    Accelerating Iterative Algorithms with Asynchronous Accumulative Updates on FPGAs

    Iterative algorithms represent a pervasive class of data mining, web search and scientific computing applications. In iterative algorithms, a final result is derived by performing repetitive computations on an input data set. Existing techniques to parallelize such algorithms typically use software frameworks such as MapReduce and Hadoop to distribute data...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    An Open-Source SATA Core for Virtex-4 FPGAs

    In this paper, the authors present an open-source Serial ATA core designed for Virtex-4 FPGAs. This core utilizes the RocketIO Multi-Gigabit Transceiver (MGT) of the Virtex-4 to interface with hard drives at SATA Generation 1 (SATA I, 1.5 Gb/s) and Generation 2 (SATA II, 3.0 Gb/s) speeds. A full design...

    Provided By University of Maryland University College

  • White Papers // Jul 2013

    Scalable Hardware Monitors to Protect Network Processors from Data Plane Attacks

    Modern router hardware in computer networks is based on programmable network processors, which implement various packet forwarding operations in software. These processor systems are vulnerable to attacks that can be launched entirely through the data plane of the network without any access to the control interface of the router. Prior...

    Provided By University of Maryland University College

  • White Papers // Mar 2013

    Birth and Adolescence of Reconfigurable Computing: A Survey of the First 20 Years of Field-Programmable Custom Computing Machines

    In twenty years, reconfigurable computing has grown from a wild, exploratory idea to a viable alternative to Application-Specific Integrated Circuits (ASICs) and fixed microprocessors in the authors' computing systems. With increasing energy and reliability concerns, there is every reason to believe its importance will grow as technology scales. As they...

    Provided By University of Maryland University College

  • White Papers // Mar 2014

    Graph Stream Algorithms: A Survey

    Over the last decade, there has been considerable interest in designing algorithms for processing massive graphs in the data stream model. The original motivation was two-fold: in many applications, the dynamic graphs that arise are too large to be stored in the main memory of a single machine and considering...

    Provided By University of Maryland University College

  • White Papers // Apr 2014

    A Broadcast-Enabled Sensing System for Embedded Multi-Core Processors

    Contemporary multi-core architectures deployed in embedded systems are expected to function near the operational limits of temperature, voltage, and device wear-out. To date, most on-chip sensing systems have been designed to collect and use sensor information for these parameters locally. In this paper, a new sensing system to enhance multi-core...

    Provided By University of Maryland University College

  • White Papers // Oct 2013

    FlexGrip: A Soft GPGPU for FPGAs

    Over the past decade, soft microprocessors and vector processors have been extensively used in FPGAs for a wide variety of applications. However, it is difficult to straightforwardly extend their functionality to support conditional and thread based execution characteristic of General-Purpose Graphics Processing Units (GPGPUs) without recompiling FPGA hardware for each...

    Provided By University of Maryland University College

  • White Papers // Jan 2008

    Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security

    Inter-Organizational WorkFlows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secured computing infrastructure like Multi-Level Security (MLS) is needed to support today's vast businesses. In this paper, Message Sequence Charts (MSC) are used to specify the positive...

    Provided By University of Maryland University College

  • White Papers // Apr 2011

    Private Database Synthesis for Outsourced System Evaluation

    In this paper, the authors are to permit secure outsourced system evaluation. They propose a method for generating synthetic databases and obfuscating a workload of queries in order to protect the sensitive information present in the database. The synthetic database and workload can be used by a third party to...

    Provided By University of Maryland University College

  • White Papers // Dec 2013

    Interactive Data Exploration Based on User Relevance Feedback

    Interactive Data Exploration (IDE) applications typically involve users that aim to discover interesting objects by iteratively executing numerous ad-hoc exploration queries. Therefore, IDE can easily become an extremely labor and resource intensive process. To support these applications, the authors introduce a framework that assists users by automatically navigating them through...

    Provided By University of Maryland University College

  • White Papers // Dec 2013

    Predictive Synchronization for DVFS-Enabled Multi-Processor Systems

    Technology scaling has enabled the number of cores within a system on chip to increase significantly. Globally Asynchronous Locally Synchronous (GALS) systems using Dynamic Voltage and Frequency Scaling (DVFS) operate each of these cores on distinct and dynamic clock domains. Typically, the interfaces between these clock domains experience multi-cycle latency...

    Provided By University of Maryland University College

  • White Papers // Jun 2013

    Stealthy Dopant-Level Hardware Trojans

    In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g. for military or critical infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since...

    Provided By University of Maryland University College

  • White Papers // Nov 2013

    Reducing Energy Costs in Internet-Scale Distributed Systems Using Load Shifting

    Energy costs have become a significant fraction of the operational costs of running large Internet-scale Distributed Systems (IDS). In this paper, the authors propose a demand-response technique where the system temporarily reduces its energy usage in response to pricing signals from a smart grid. Their proposed demand-response technique involves deferring...

    Provided By University of Maryland University College

  • White Papers // Mar 2011

    A Cost-Aware Elasticity Provisioning System for the Cloud

    Cloud computing has emerged as a new IT delivery model in which an organization or individual can rent remote compute and storage resources dynamically, using a credit card, to host networked applications \"In the cloud\". In this paper, the authors present Kingfisher, a cost-aware system that provides efficient support for...

    Provided By University of Maryland University College

  • White Papers // Jul 2012

    A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    Cloud computing provides a promising opportunity for both small and large organizations to transition from traditional data centers to cloud services, where the organizations can be more concerned with their applications, services, and data rather than the underlying network infrastructures and their associated cost. There are major concerns, however, with...

    Provided By University of Maryland University College

  • White Papers // May 2012

    An Energy Transmission and Distribution Network Using Electric Vehicles

    Vehicle-to-grid provides a viable approach that feeds the battery energy stored in Electric Vehicles (EVs) back to the power grid. Meanwhile, since EVs are mobile, the energy in EVs can be easily transported from one place to another. Based on these two observations, the authors introduce a novel concept called...

    Provided By University of Maryland University College

  • White Papers // Aug 2012

    DIBS: Efficient Distributed Information Brokerage in Large-Scale Sensor Networks

    This paper is focused on the problem of designing a distributed information brokerage infrastructure for sensor networks. The authors propose a solution, called DIBS, which is suitable for networks of any size with or without geographic location information, supports a wide range of applications, and allows any number of these...

    Provided By University of Maryland University College

  • White Papers // Sep 2009

    Hop-Count Based Techniques for Passive Target Localization in Sensor Networks

    Target tracking techniques usually assume that the target is within the detection range of one or more sensor nodes at known locations, so that the target's location can be determined based on these locations. Instead, the authors are interested in networks where most sensor nodes do not know their location;...

    Provided By University of Maryland University College

  • White Papers // Dec 2009

    A Practical On-Line Pacing Scheme at Edges of Small Buffer Networks

    For the optical packet-switching routers to be widely deployed in the Internet, the size of packet buffers on routers has to be significantly small. Such small-buffer networks rely on traffic with low levels of burstiness to avoid buffer overflows and packet losses. The authors present a pacing system that proactively...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    Evaluation of Path Recording Techniques in Secure MANET

    Secure operation of mobile ad-hoc networks requires the ability to track the flow of traffic through the network. Knowledge of the path of a packet allows inference of correct operation or potential attacks. In prior work, the authors have described a number of different techniques for recording such path information...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    Techniques for Policy Enforcement on Encrypted Network Traffic

    Most large-scale data communication net-works are built from multiple autonomous sub-networks, which are managed by different administrative entities. In many practical environments, information about traffic policies is considered proprietary and is not disclosed by network operators. However, some operational scenarios require routers within a network to check if traffic matches...

    Provided By University of Maryland University College

  • White Papers // Jul 2009

    Design of a Secure Router System for Next-Generation Networks

    Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. The authors present the design of a Secure Packet Processing Platform (SPPP) that can protect these router systems. They use an instruction-level monitoring...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection

    Developing algorithms to detect anomalies in network traffic is an important goal to achieve secure and efficient operation of the Internet. To evaluate different algorithms, it is crucial to have a set of standardized test cases. The authors propose a benchmark suite called "AnomBench" that consists of sixteen different traffic...

    Provided By University of Maryland University College

  • White Papers // Aug 2009

    A High-Performance Capabilities-Based Network Protocol

    Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge...

    Provided By University of Maryland University College

  • White Papers // Sep 2010

    An Analysis of Activities in Facebook

    Human dynamics in real-world social networks has been a long lasting topic of research. Recently, the rapid growing of online social networks with their data made accessible has given researchers a door of opportunity to study large-scale social networks. Facebook has been the largest, most influential, and fastest growing social...

    Provided By University of Maryland University College

  • White Papers // Jun 2010

    CRES: A Content-Based Routing Substrate for Large-Scale Data-Centric Sensor Networks

    The authors propose CRES as a substrate structure to enable content-based routing in large-scale sensor networks without location information. With CRES, traffic is routed based on its content rather than the destination's physical address. CRES is therefore applicable to data-centric sensor networks where sensor data and user queries need to...

    Provided By University of Maryland University College

  • White Papers // Sep 2009

    A Parsimonious Statistical Protocol for Generating Power-Law Networks

    The authors propose a new mechanism for generating networks with a wide variety of degree distributions. The idea is a modification of the well-studied preferential attachment scheme in which the degree of each node is used to determine its evolving connectivity. Modifications to this base protocol to include features other...

    Provided By University of Maryland University College

  • White Papers // Jan 2012

    High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems

    Passive network measurement and packet header trace collection are vital tools for network operation and research. To protect a user's privacy, it is necessary to anonymize header fields, particularly IP addresses. To preserve the correlation between IP addresses, prefix-preserving anonymization has been proposed. The limitations of this approach for a...

    Provided By University of Maryland University College

  • White Papers // May 2012

    VNMBench: A Benchmark for Virtual Network Mapping Algorithms

    The network architecture of the current Internet cannot accommodate the deployment of novel network-layer protocols. To address this fundamental problem, network virtualization has been proposed, where a single physical infrastructure is shared among different virtual network slices. A key operational problem in network virtualization is the need to allocate physical...

    Provided By University of Maryland University College

  • White Papers // Apr 2012

    Automated Sensor Verification Using Outlier Detection in the Internet of Things

    Cyber-physical systems uses sensors, actuators, and computation to solve problems that cross the physical world and computational world. Traditionally, the systems have been designed to be specific to one application domain and to be managed by a single entity. However, to achieve scalability, it is necessary to reuse sensors and...

    Provided By University of Maryland University College

  • White Papers // May 2011

    Security Issues in Network Virtualization for the Future Internet

    Network virtualization is a key technology that is necessary to support diverse protocol suites in the future Internet. A virtualized network uses a single physical infrastructure to support multiple logical networks. Each logical network can provide its users with a custom set of protocols and functionalities. Much research work has...

    Provided By University of Maryland University College