University of Massachusetts Lowell

Displaying 1-19 of 19 results

  • White Papers // Sep 2013

    Efficient Updates in Cross-Object Erasure-Coded Storage Systems

    In the past few years erasure codes have been increasingly embraced by distributed storage systems as an alternative for replication, since they provide high fault-tolerance for low overheads. Erasure codes, however, have few shortcomings that need to be addressed to make them a complete solution for networked storage systems. Lack...

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2013

    Secure Transmission of an Image Using Partial Encryption Based Algorithm

    Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper, the authors propose a novel concept of combined partial image encryption using phase manipulation and...

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2012

    Integrated Green Cloud Computing Architecture

    Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud...

    Provided By University of Massachusetts Lowell

  • White Papers // Sep 2012

    Small and Medium-Sized Enterprises in Mauritius and Their Owner-Managers: Does Education Matter?

    In this paper, the author examines the effect of the education level of owner-managers on the performance of small and medium-sized enterprises in Mauritius. It captures the effect of the level of education of owner-managers as measured by primary, secondary and tertiary education and finds that education is an important...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2011

    A Shifting Strategy for Dynamic Channel Assignment Under Spatially Varying Demand

    This paper presents a new method for Dynamic Channel Assignment (DCA) in wireless cellular systems under random spatio-temporal variation of traffic demand. The method uses a two-phase Integer Programming (IP) based heuristic to minimize the number of channels required to satisfy the traffic demand and a threshold criterion based on...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2011

    Dynamic Coverage of Mobile Sensor Network

    In this paper, the authors study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations are likely to be covered at a later time. A larger area is covered as time continues, and intruders that...

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2010

    Advanced Interactions With Heatmaps for Analyzing High-Dimensional Datasets

    The authors introduce an extended heatmap visualization integrated with enhanced interactive capabilities and computational tools for analyzing large and complex datasets. A heatmap is capable of displaying a large amount of data with many dimensions while minimizing graphic area. Varying levels of detail are provided by rendering cells as data...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2010

    Prompting Devices: A Survey of Memory Aids for Task Sequencing

    People with mild to medium cognitive impairments may have difficulty with remembering when to perform an Activity of Daily Living (ADL). For people with more severe cognitive impairments, it can be difficult to learn and/or recall the sequence of steps needed to complete a task. This paper presents a survey...

    Provided By University of Massachusetts Lowell

  • White Papers // Apr 2010

    3DLoc: Three Dimensional Wireless Localization Toolkit

    In this paper, the authors present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11-compliant mobile device in a Three Dimensional (3D) space. 3DLoc features two specialized antennas: an azimuth antenna and an elevation antenna, for detecting the azimuth and elevation angles of a mobile device...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2010

    Data-Centric Middleware for Context-Aware Pervasive Computing

    The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. This paper, motivate a data-centric design for such an infrastructure to support context-aware applications. The middleware system, solar, treats contextual data sources as stream publishers. The...

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2009

    The PL-Tree: A Fast High-Dimensional Access Method for Range Queries

    The quest for processing range queries of high-dimensional data has resulted in a number of innovative indexing mechanisms. Most of the early methods index data according to their geometric relationships. While they have met with certain success, these methods, unfortunately, either lack efficiency, particularly at higher dimensionality, or are too...

    Provided By University of Massachusetts Lowell

  • White Papers // Aug 2009

    Geographic Community Analysis of Mobile Social Network

    Location-based Mobile Social Networks (MSNs) are becoming increasingly popular given the success of Online Social Networks (OSNs), such as Facebook and MySpace, and recent availability of GPS-embedded mobile platforms, such as Apple iPhones and Google Android phones. MSNs extend existing OSNs by allowing a user to know where her friends...

    Provided By University of Massachusetts Lowell

  • White Papers // Jul 2009

    Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security

    With the widespread growth in applications for resource-limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs....

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    Analysis of a Location-Based Social Network

    Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged content within their social graph, and to meet others nearby. The recent availability of open mobile platforms, such as Apple iPhones and Google Android phones, makes LSNs much more accessible to mobile users. To study...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    Model-Based Fault Diagnosis for IEEE 802.11 Wireless LANs

    The increasingly deployed IEEE 802.11 Wireless LANs (WLANs) challenge traditional network management systems because of the shared open medium and the varying channel conditions. There needs to be an automated tool that can help diagnosing both malicious security faults and benign performance faults. It is often difficult, however, to identify...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    MPCS: Mobile-Phone Based Patient Compliance System for Chronic Illness Care

    More than 100 million Americans are currently living with at least one chronic health condition and expenditures on chronic diseases account for more than 75 percent of the $2.3 trillion cost of the healthcare system. To improve chronic illness care, patients must be empowered and engaged in health self-management. However,...

    Provided By University of Massachusetts Lowell

  • White Papers // Apr 2009

    Collaborative Visual Analytics With Session Histories

    Using sonar to detect submarines used to be an effective method. Current technologies, however, have made it possible for submarines to thwart standard (active or passive) sonar mechanisms. One viable alternative is to use magnetic or acoustic sensors in close proximity to possible underwater pathways a submarine may pass through....

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2009

    A Class of New Protocol-Level Attacks Against Tor

    Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, the authors present a new class of attacks, protocol-level attacks, against Tor. Different from existing attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and...

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2009

    Blind Detection of Spread Spectrum Flow Watermarks

    Recently, the Direct Sequence Spread-Spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous Pseudo-Noise (PN) codes are used to modulate multiple-bit signals that are embedded into the target flow as watermarks. This technique could be maliciously used to degrade an anonymous communication network. In...

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2013

    Secure Transmission of an Image Using Partial Encryption Based Algorithm

    Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper, the authors propose a novel concept of combined partial image encryption using phase manipulation and...

    Provided By University of Massachusetts Lowell

  • White Papers // Sep 2012

    Small and Medium-Sized Enterprises in Mauritius and Their Owner-Managers: Does Education Matter?

    In this paper, the author examines the effect of the education level of owner-managers on the performance of small and medium-sized enterprises in Mauritius. It captures the effect of the level of education of owner-managers as measured by primary, secondary and tertiary education and finds that education is an important...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    Model-Based Fault Diagnosis for IEEE 802.11 Wireless LANs

    The increasingly deployed IEEE 802.11 Wireless LANs (WLANs) challenge traditional network management systems because of the shared open medium and the varying channel conditions. There needs to be an automated tool that can help diagnosing both malicious security faults and benign performance faults. It is often difficult, however, to identify...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2010

    Prompting Devices: A Survey of Memory Aids for Task Sequencing

    People with mild to medium cognitive impairments may have difficulty with remembering when to perform an Activity of Daily Living (ADL). For people with more severe cognitive impairments, it can be difficult to learn and/or recall the sequence of steps needed to complete a task. This paper presents a survey...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2010

    Data-Centric Middleware for Context-Aware Pervasive Computing

    The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that assist applications to collect, aggregate, and disseminate contextual data. This paper, motivate a data-centric design for such an infrastructure to support context-aware applications. The middleware system, solar, treats contextual data sources as stream publishers. The...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    Analysis of a Location-Based Social Network

    Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged content within their social graph, and to meet others nearby. The recent availability of open mobile platforms, such as Apple iPhones and Google Android phones, makes LSNs much more accessible to mobile users. To study...

    Provided By University of Massachusetts Lowell

  • White Papers // Apr 2010

    3DLoc: Three Dimensional Wireless Localization Toolkit

    In this paper, the authors present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11-compliant mobile device in a Three Dimensional (3D) space. 3DLoc features two specialized antennas: an azimuth antenna and an elevation antenna, for detecting the azimuth and elevation angles of a mobile device...

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2009

    Blind Detection of Spread Spectrum Flow Watermarks

    Recently, the Direct Sequence Spread-Spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous Pseudo-Noise (PN) codes are used to modulate multiple-bit signals that are embedded into the target flow as watermarks. This technique could be maliciously used to degrade an anonymous communication network. In...

    Provided By University of Massachusetts Lowell

  • White Papers // Feb 2009

    A Class of New Protocol-Level Attacks Against Tor

    Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications over the Internet. In this paper, the authors present a new class of attacks, protocol-level attacks, against Tor. Different from existing attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and...

    Provided By University of Massachusetts Lowell

  • White Papers // Jun 2009

    MPCS: Mobile-Phone Based Patient Compliance System for Chronic Illness Care

    More than 100 million Americans are currently living with at least one chronic health condition and expenditures on chronic diseases account for more than 75 percent of the $2.3 trillion cost of the healthcare system. To improve chronic illness care, patients must be empowered and engaged in health self-management. However,...

    Provided By University of Massachusetts Lowell

  • White Papers // Apr 2009

    Collaborative Visual Analytics With Session Histories

    Using sonar to detect submarines used to be an effective method. Current technologies, however, have made it possible for submarines to thwart standard (active or passive) sonar mechanisms. One viable alternative is to use magnetic or acoustic sensors in close proximity to possible underwater pathways a submarine may pass through....

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2010

    Advanced Interactions With Heatmaps for Analyzing High-Dimensional Datasets

    The authors introduce an extended heatmap visualization integrated with enhanced interactive capabilities and computational tools for analyzing large and complex datasets. A heatmap is capable of displaying a large amount of data with many dimensions while minimizing graphic area. Varying levels of detail are provided by rendering cells as data...

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2009

    The PL-Tree: A Fast High-Dimensional Access Method for Range Queries

    The quest for processing range queries of high-dimensional data has resulted in a number of innovative indexing mechanisms. Most of the early methods index data according to their geometric relationships. While they have met with certain success, these methods, unfortunately, either lack efficiency, particularly at higher dimensionality, or are too...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2011

    A Shifting Strategy for Dynamic Channel Assignment Under Spatially Varying Demand

    This paper presents a new method for Dynamic Channel Assignment (DCA) in wireless cellular systems under random spatio-temporal variation of traffic demand. The method uses a two-phase Integer Programming (IP) based heuristic to minimize the number of channels required to satisfy the traffic demand and a threshold criterion based on...

    Provided By University of Massachusetts Lowell

  • White Papers // Aug 2009

    Geographic Community Analysis of Mobile Social Network

    Location-based Mobile Social Networks (MSNs) are becoming increasingly popular given the success of Online Social Networks (OSNs), such as Facebook and MySpace, and recent availability of GPS-embedded mobile platforms, such as Apple iPhones and Google Android phones. MSNs extend existing OSNs by allowing a user to know where her friends...

    Provided By University of Massachusetts Lowell

  • White Papers // Jan 2011

    Dynamic Coverage of Mobile Sensor Network

    In this paper, the authors study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations are likely to be covered at a later time. A larger area is covered as time continues, and intruders that...

    Provided By University of Massachusetts Lowell

  • White Papers // Dec 2012

    Integrated Green Cloud Computing Architecture

    Arbitrary usage of cloud computing, either private or public, can lead to uneconomical energy consumption in data processing, storage and communication. Hence, green cloud computing solutions aim not only to save energy but also reduce operational costs and carbon footprints on the environment. In this paper, an Integrated Green Cloud...

    Provided By University of Massachusetts Lowell

  • White Papers // Sep 2013

    Efficient Updates in Cross-Object Erasure-Coded Storage Systems

    In the past few years erasure codes have been increasingly embraced by distributed storage systems as an alternative for replication, since they provide high fault-tolerance for low overheads. Erasure codes, however, have few shortcomings that need to be addressed to make them a complete solution for networked storage systems. Lack...

    Provided By University of Massachusetts Lowell

  • White Papers // Jul 2009

    Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security

    With the widespread growth in applications for resource-limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs....

    Provided By University of Massachusetts Lowell