University of Miami School of Business Administration

Displaying 1-38 of 38 results

  • White Papers // Jan 2014

    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay

    Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Operating System Support for Virtual Machines

    A Virtual-Machine Monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II VMMs) builds on the abstractions provided by a host operating system. Type II VMMs are elegant and convenient, but their performance is currently an order...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2013

    Small is Better: Avoiding Latency Traps in Virtualized Data Centers

    Public clouds have become a popular platform for building internet-scale applications. Using virtualization, public cloud services grant customers full control of guest operating systems and applications, while service providers still retain the management of their host infrastructure. Because applications built with public clouds are often highly sensitive to response time,...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Direction-Preserving Trajectory Simplification

    Trajectories of moving objects are collected in many applications. Raw trajectory data is typically very large, and has to be simplified before use. In this paper, the authors introduce the notion of direction preserving trajectory simplification, and show both analytically and empirically that it can support a broader range of...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Detecting Traditional Packers, Decisively

    Many important decidability results in malware analysis are based on turing machine models of computation. The authors exhibit computational models that use more realistic assumptions about machine and attacker resources. While seminal results such as remain true for turing machines, they show that under more realistic assumptions important tasks are...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2013

    Adoption of Business Intelligence & Analytics in Organizations - An Empirical Study of Antecedents

    Although Business Intelligence& Analytics (BIA) systems are increasingly seen as a source of competitive advantage, limited research, to the authors' knowledge, has examined the factors driving their organizational adoption. Drawing on Technology-Organization-Environment framework, they present a theoretical model of factors associated with the extent of organizational adoption of BIA technologies...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2013

    Leveraging It for Business Innovation: Does the Role of the CIO Matter?

    The evolving role of Information Technology (IT) in business innovation places increasing emphasis on the role of the Chief Information Officer (CIO). Yet, the role of the CIO in business innovation is understudied in the extant literature. Drawing on organizational theory of boundary spanning leadership, the authors posit that the...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2013

    CogWnet: A Resource Management Architecture for Cognitive Wireless Networks

    With the increasing adoption of wireless communication technologies, there is a need to improve management of existing radio resources. Cognitive radio is a promising technology to improve the utilization of wireless spectrum. Its operating principle is based on building an integrated hardware and software architecture that configures the radio to...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Bobtail: Avoiding Long Tails in the Cloud

    Highly modular data center applications such as Bing, Facebook, and Amazon's retail platform are known to be susceptible to long tails in response times. Services such as Amazon's EC2 have proven attractive platforms for building similar applications. Unfortunately, virtualization used in such platforms exacerbates the long tail problem by factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Enabling Secure Database as a Service Using Fully Homomorphic Encryption: Challenges and Opportunities

    The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solution. A recent breakthrough in the cryptographic community (in 2009) related to Fully Homomorphic Encryption (FHE) showed that arbitrary computation on encrypted data is possible. Successful...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Clear and Present Data: Opaque Traffic and Its Security Implications for the Future

    Opaque traffic, i.e., traffic that is compressed or encrypted, incurs particularly high overhead for deep packet inspection engines and often yields little or no useful information. The authors' experiments indicate that an astonishing 89% of payload-carrying TCP packets - and 86% of bytes transmitted - are opaque, forcing them to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Characterization of Blacklists and Tainted Network Traffic

    Threats to the security and availability of the network have contributed to the use of Real-time Black hole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. A variety of...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Toward Software-Defined Cellular Networks

    Existing cellular networks suffer from inflexible and expensive equipment, complex control-plane protocols, and vendor-specific configuration interfaces. In this position paper, the authors argue that Software Defined Networking (SDN) can simplify the design and management of cellular data networks, while enabling new services. However, supporting many subscribers, frequent mobility, fine-grained measurement...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software

    Troubleshooting the performance of production software is challenging. Most existing tools, such as profiling, tracing, and logging systems, reveal what events occurred during performance anomalies. However, users of such tools must infer why these events occurred; e.g., that their execution was due to a root cause such as a specific...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Safeguarding Academic Accounts and Resources With the University Credential Abuse Auditing System

    Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at their own institutions reveals that perpetrators often steal university credentials to gain free and unfettered...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2012

    Learning From Early Attempts to Measure Information Security Performance

    The rapid evolution of threat ecosystems and the shifting focus of adversarial actions complicate efforts to assure security of an organization's computer networks. Efforts to build a rigorous science of security, one consisting of sound and reproducible empirical evaluations, start with measures of these threats, their impacts, and the factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    Cyberinfrastructure Enabling Personalized Production

    The Internet has facilitated the development of e-businesses using web-based services leveraging back-end database systems, inventory systems and payment processing systems. Online retail businesses can be set up in a relatively short period of time. In contrast, set-up of a manufacturing system takes much longer; the system design involves various...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Exploiting Interference Locality in Coordinated Multi-Point Transmission Systems

    Coordinated Multi-Point (CoMP) transmission is emerging as a concept that can substantially suppress interference, thus improving the capacity of multi-cell wireless networks. However, existing CoMP techniques either require sharing of data and Channel State Information (CSI) for all links in the network, or have limited capability of interference suppression. In...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Average Delay SLAs in Cloud Computing

    In this paper, the authors conduct feasibility studies on the average delay space for Cloud computing, and they propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Their work is strongly motivated by the fact that delay control plays a critical role to...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    An Interpretation of the Cover and Leung Capacity Region for the MAC With Feedback Through Stochastic Control

    The authors consider the problem of communication over a Multiple Access Channel (MAC) with noiseless feedback. A single-letter characterization of the capacity of this channel is not currently known in general. They formulate the MAC with feedback capacity problem as a stochastic control problem for a special class of channels...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    On the Optimal Number of Hops in Relay Networks

    In this paper, the authors investigate the bandwidth (throughput) and energy efficiency considering both the physical layer and the Medium Access Control (MAC) layer in multi-hop relay wireless networks. For a given distance between the source and the destination, as the number of relays increases the overhead necessary to operate...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2011

    Towards Improved Scalability in Smart Grid Modeling: Simplifying Generator Dynamics Analysis Via Spectral Graph Sparsification

    Smart-grid technologies focus on the complex interactions between different components of the electricity grid, together with the computing, control and communication functionalities that will bring together this future smarter infrastructure. Investigating these complex dynamic interactions is crucial for the efficiency and robustness of the emerging smart grid. In particular, it...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2011

    Censorship and Co-Option of the Internet Infrastructure

    Over a few short years, the Internet has grown to play an integral part of daily economic, social, and political life in most countries. From the Egyptian "Velvet Revolution" to the last US presidential campaign, Internet communication shapes public opinion and fosters social change. But despite its immense social importance,...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2010

    CANVuS: Context-Aware Network Vulnerability Scanning

    Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of network devices and the services they are running. Traditional vulnerability scanning systems meet these requirements by periodically probing target networks to discover hosts and the services...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2010

    Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

    Unsolicited Bulk E-mail (UBE) or spam constitutes a significant fraction of all e-mail connection attempts and routinely frustrates users, consumes resources, and serves as an infection vector for malicious software. In an effort to scalably and effectively reduce the impact of these e-mails, e-mail system designers have increasingly turned to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    A Framework for Understanding and Applying Ethical Principles in Network and Security Research

    Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, the authors present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    Making the Case for Random Access Scheduling in Wireless Multi-Hop Networks

    This paper formally establishes that random access scheduling schemes, and, more specifically CSMA-CA, yields exceptionally good performance in the context of wireless multi-hop networks. While it is believed that CSMA-CA performs significantly worse than optimal, this belief is usually based on experiments that use rate allocation mechanisms which grossly underutilize...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2009

    HC-BGP: A Light-Weight and Flexible Scheme for Securing Prefix Ownership

    The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of mis-configuration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    If It Ain't Broke, Don't Fix It: Challenges and New Directions for Inferring the Impact of Software Patches

    Software patches are designed to have a positive effect on the operation of software systems. However, these patches may cause incompatibilities, regressions, and other unintended negative impact on the reliability, performance, and security of software. In this paper, the authors propose PatchAdvisor, a technique to improve the manageability of the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion

    Packers have long been a valuable tool in the toolbox of offensive users for evading the detection capabilities of signature-based antivirus engines. However, selecting the packer that results in the most effective evasion of antivirus engines may not be a trivial task due to diversity in the capabilities of both...

    Provided By University of Miami School of Business Administration

  • White Papers // Apr 2009

    Performance Differentiation for Multi-Port Arrays: A Control-Theoretic Approach

    Large multi-port disk arrays typically store data for multiple applications with diverse performance requirements. Each application has a different priority, representing the relative importance of the application to the business. Currently, performance differentiation and isolation for storage workloads is implemented by statically partitioning the disk array resources, which results in...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2009

    One Size Does Not Fit All: 10 Years of Applying Context-Aware Security

    Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based Intrusion Detection Systems (IDS), host-based Anti-Virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2009

    Memory Overbooking and Dynamic Control of Xen Virtual Machines in Consolidated Environments

    The newly emergent cloud computing environments host hundreds to thousands of services on a shared resource pool. The sharing is enhanced by virtualization technologies allowing multiple services to run in different Virtual Machines (VMs) on a single physical node. Resource overbooking allows more services with time-varying demands to be consolidated...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    Small Bandwidth Asymptotics for Density-Weighted Average Derivatives

    In this paper, the authors propose (apparently) novel standard error formulas for the density-weighted average derivative estimator of Powell, Stock, and Stoker (1989). Asymptotic validity of the standard errors developed in this paper does not require the use of higher-order kernels and the standard errors are "Robust" in the sense...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    What Does Control Theory Bring to Systems Research?

    Feedback mechanisms can help today's increasingly complex computer systems adapt to changes in workloads or operating conditions. Control theory offers a principled way for designing feedback loops to deal with unpredictable changes, uncertainties, and disturbances in systems. The authors provide an overview of the joint research at HP Labs and...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2008

    Shades of Grey: On the Effectiveness of Reputation-Based "Blacklists"

    Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed, and it...

    Provided By University of Miami School of Business Administration

  • White Papers // Nov 2007

    Scalable Rule-Based Gene Expression Data Classification

    Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: association rule mining from training data followed by classification of query data using the mined rules. In the worst case, these methods require an exponential search over the subset space of the training data set's samples and/or...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2007

    Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments

    A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Managing privacy is expected to be a significant concern for acceptance of such pervasive environments. This paper outlines an initial design of a publish-subscribe communication...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay

    Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt removes the dependency on the target operating system by moving it into a virtual machine...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2014

    Operating System Support for Virtual Machines

    A Virtual-Machine Monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II VMMs) builds on the abstractions provided by a host operating system. Type II VMMs are elegant and convenient, but their performance is currently an order...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Direction-Preserving Trajectory Simplification

    Trajectories of moving objects are collected in many applications. Raw trajectory data is typically very large, and has to be simplified before use. In this paper, the authors introduce the notion of direction preserving trajectory simplification, and show both analytically and empirically that it can support a broader range of...

    Provided By University of Miami School of Business Administration

  • White Papers // Nov 2007

    Scalable Rule-Based Gene Expression Data Classification

    Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: association rule mining from training data followed by classification of query data using the mined rules. In the worst case, these methods require an exponential search over the subset space of the training data set's samples and/or...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software

    Troubleshooting the performance of production software is challenging. Most existing tools, such as profiling, tracing, and logging systems, reveal what events occurred during performance anomalies. However, users of such tools must infer why these events occurred; e.g., that their execution was due to a root cause such as a specific...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Bobtail: Avoiding Long Tails in the Cloud

    Highly modular data center applications such as Bing, Facebook, and Amazon's retail platform are known to be susceptible to long tails in response times. Services such as Amazon's EC2 have proven attractive platforms for building similar applications. Unfortunately, virtualization used in such platforms exacerbates the long tail problem by factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Characterization of Blacklists and Tainted Network Traffic

    Threats to the security and availability of the network have contributed to the use of Real-time Black hole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. A variety of...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2012

    Clear and Present Data: Opaque Traffic and Its Security Implications for the Future

    Opaque traffic, i.e., traffic that is compressed or encrypted, incurs particularly high overhead for deep packet inspection engines and often yields little or no useful information. The authors' experiments indicate that an astonishing 89% of payload-carrying TCP packets - and 86% of bytes transmitted - are opaque, forcing them to...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2012

    Learning From Early Attempts to Measure Information Security Performance

    The rapid evolution of threat ecosystems and the shifting focus of adversarial actions complicate efforts to assure security of an organization's computer networks. Efforts to build a rigorous science of security, one consisting of sound and reproducible empirical evaluations, start with measures of these threats, their impacts, and the factors...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Safeguarding Academic Accounts and Resources With the University Credential Abuse Auditing System

    Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at their own institutions reveals that perpetrators often steal university credentials to gain free and unfettered...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2011

    Censorship and Co-Option of the Internet Infrastructure

    Over a few short years, the Internet has grown to play an integral part of daily economic, social, and political life in most countries. From the Egyptian "Velvet Revolution" to the last US presidential campaign, Internet communication shapes public opinion and fosters social change. But despite its immense social importance,...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2010

    CANVuS: Context-Aware Network Vulnerability Scanning

    Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of network devices and the services they are running. Traditional vulnerability scanning systems meet these requirements by periodically probing target networks to discover hosts and the services...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2010

    Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

    Unsolicited Bulk E-mail (UBE) or spam constitutes a significant fraction of all e-mail connection attempts and routinely frustrates users, consumes resources, and serves as an infection vector for malicious software. In an effort to scalably and effectively reduce the impact of these e-mails, e-mail system designers have increasingly turned to...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    A Framework for Understanding and Applying Ethical Principles in Network and Security Research

    Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, the authors present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    If It Ain't Broke, Don't Fix It: Challenges and New Directions for Inferring the Impact of Software Patches

    Software patches are designed to have a positive effect on the operation of software systems. However, these patches may cause incompatibilities, regressions, and other unintended negative impact on the reliability, performance, and security of software. In this paper, the authors propose PatchAdvisor, a technique to improve the manageability of the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jul 2009

    PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion

    Packers have long been a valuable tool in the toolbox of offensive users for evading the detection capabilities of signature-based antivirus engines. However, selecting the packer that results in the most effective evasion of antivirus engines may not be a trivial task due to diversity in the capabilities of both...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2009

    One Size Does Not Fit All: 10 Years of Applying Context-Aware Security

    Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based Intrusion Detection Systems (IDS), host-based Anti-Virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2008

    Shades of Grey: On the Effectiveness of Reputation-Based "Blacklists"

    Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware have been shown to be significantly flawed, and it...

    Provided By University of Miami School of Business Administration

  • White Papers // Mar 2013

    CogWnet: A Resource Management Architecture for Cognitive Wireless Networks

    With the increasing adoption of wireless communication technologies, there is a need to improve management of existing radio resources. Cognitive radio is a promising technology to improve the utilization of wireless spectrum. Its operating principle is based on building an integrated hardware and software architecture that configures the radio to...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    Small Bandwidth Asymptotics for Density-Weighted Average Derivatives

    In this paper, the authors propose (apparently) novel standard error formulas for the density-weighted average derivative estimator of Powell, Stock, and Stoker (1989). Asymptotic validity of the standard errors developed in this paper does not require the use of higher-order kernels and the standard errors are "Robust" in the sense...

    Provided By University of Miami School of Business Administration

  • White Papers // Dec 2009

    Making the Case for Random Access Scheduling in Wireless Multi-Hop Networks

    This paper formally establishes that random access scheduling schemes, and, more specifically CSMA-CA, yields exceptionally good performance in the context of wireless multi-hop networks. While it is believed that CSMA-CA performs significantly worse than optimal, this belief is usually based on experiments that use rate allocation mechanisms which grossly underutilize...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2013

    Enabling Secure Database as a Service Using Fully Homomorphic Encryption: Challenges and Opportunities

    The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solution. A recent breakthrough in the cryptographic community (in 2009) related to Fully Homomorphic Encryption (FHE) showed that arbitrary computation on encrypted data is possible. Successful...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2011

    Towards Improved Scalability in Smart Grid Modeling: Simplifying Generator Dynamics Analysis Via Spectral Graph Sparsification

    Smart-grid technologies focus on the complex interactions between different components of the electricity grid, together with the computing, control and communication functionalities that will bring together this future smarter infrastructure. Investigating these complex dynamic interactions is crucial for the efficiency and robustness of the emerging smart grid. In particular, it...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2013

    Leveraging It for Business Innovation: Does the Role of the CIO Matter?

    The evolving role of Information Technology (IT) in business innovation places increasing emphasis on the role of the Chief Information Officer (CIO). Yet, the role of the CIO in business innovation is understudied in the extant literature. Drawing on organizational theory of boundary spanning leadership, the authors posit that the...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2013

    Adoption of Business Intelligence & Analytics in Organizations - An Empirical Study of Antecedents

    Although Business Intelligence& Analytics (BIA) systems are increasingly seen as a source of competitive advantage, limited research, to the authors' knowledge, has examined the factors driving their organizational adoption. Drawing on Technology-Organization-Environment framework, they present a theoretical model of factors associated with the extent of organizational adoption of BIA technologies...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2009

    HC-BGP: A Light-Weight and Flexible Scheme for Securing Prefix Ownership

    The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of mis-configuration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the...

    Provided By University of Miami School of Business Administration

  • White Papers // Feb 2007

    Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments

    A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Managing privacy is expected to be a significant concern for acceptance of such pervasive environments. This paper outlines an initial design of a publish-subscribe communication...

    Provided By University of Miami School of Business Administration

  • White Papers // Aug 2013

    Detecting Traditional Packers, Decisively

    Many important decidability results in malware analysis are based on turing machine models of computation. The authors exhibit computational models that use more realistic assumptions about machine and attacker resources. While seminal results such as remain true for turing machines, they show that under more realistic assumptions important tasks are...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2013

    Small is Better: Avoiding Latency Traps in Virtualized Data Centers

    Public clouds have become a popular platform for building internet-scale applications. Using virtualization, public cloud services grant customers full control of guest operating systems and applications, while service providers still retain the management of their host infrastructure. Because applications built with public clouds are often highly sensitive to response time,...

    Provided By University of Miami School of Business Administration

  • White Papers // Jun 2012

    Cyberinfrastructure Enabling Personalized Production

    The Internet has facilitated the development of e-businesses using web-based services leveraging back-end database systems, inventory systems and payment processing systems. Online retail businesses can be set up in a relatively short period of time. In contrast, set-up of a manufacturing system takes much longer; the system design involves various...

    Provided By University of Miami School of Business Administration

  • White Papers // Sep 2012

    Toward Software-Defined Cellular Networks

    Existing cellular networks suffer from inflexible and expensive equipment, complex control-plane protocols, and vendor-specific configuration interfaces. In this position paper, the authors argue that Software Defined Networking (SDN) can simplify the design and management of cellular data networks, while enabling new services. However, supporting many subscribers, frequent mobility, fine-grained measurement...

    Provided By University of Miami School of Business Administration

  • White Papers // Apr 2009

    Performance Differentiation for Multi-Port Arrays: A Control-Theoretic Approach

    Large multi-port disk arrays typically store data for multiple applications with diverse performance requirements. Each application has a different priority, representing the relative importance of the application to the business. Currently, performance differentiation and isolation for storage workloads is implemented by statically partitioning the disk array resources, which results in...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2009

    Memory Overbooking and Dynamic Control of Xen Virtual Machines in Consolidated Environments

    The newly emergent cloud computing environments host hundreds to thousands of services on a shared resource pool. The sharing is enhanced by virtualization technologies allowing multiple services to run in different Virtual Machines (VMs) on a single physical node. Resource overbooking allows more services with time-varying demands to be consolidated...

    Provided By University of Miami School of Business Administration

  • White Papers // Oct 2008

    What Does Control Theory Bring to Systems Research?

    Feedback mechanisms can help today's increasingly complex computer systems adapt to changes in workloads or operating conditions. Control theory offers a principled way for designing feedback loops to deal with unpredictable changes, uncertainties, and disturbances in systems. The authors provide an overview of the joint research at HP Labs and...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Exploiting Interference Locality in Coordinated Multi-Point Transmission Systems

    Coordinated Multi-Point (CoMP) transmission is emerging as a concept that can substantially suppress interference, thus improving the capacity of multi-cell wireless networks. However, existing CoMP techniques either require sharing of data and Channel State Information (CSI) for all links in the network, or have limited capability of interference suppression. In...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    Average Delay SLAs in Cloud Computing

    In this paper, the authors conduct feasibility studies on the average delay space for Cloud computing, and they propose a heuristic method to control the vector of average delays, subject to predefined delay constraints. Their work is strongly motivated by the fact that delay control plays a critical role to...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    An Interpretation of the Cover and Leung Capacity Region for the MAC With Feedback Through Stochastic Control

    The authors consider the problem of communication over a Multiple Access Channel (MAC) with noiseless feedback. A single-letter characterization of the capacity of this channel is not currently known in general. They formulate the MAC with feedback capacity problem as a stochastic control problem for a special class of channels...

    Provided By University of Miami School of Business Administration

  • White Papers // May 2012

    On the Optimal Number of Hops in Relay Networks

    In this paper, the authors investigate the bandwidth (throughput) and energy efficiency considering both the physical layer and the Medium Access Control (MAC) layer in multi-hop relay wireless networks. For a given distance between the source and the destination, as the number of relays increases the overhead necessary to operate...

    Provided By University of Miami School of Business Administration