University of Minnesota

Displaying 1-40 of 101 results

  • White Papers // May 2012

    Recovery of Low-Rank Plus Compressed Sparse Matrices With Application to Unveiling Traffic Anomalies

    Given the superposition of a low-rank matrix plus the product of a known fat compression matrix times a sparse matrix, the goal of this paper is to establish deterministic conditions under which exact recovery of the low-rank and sparse components becomes possible. This fundamental identifiability issue arises with traffic anomaly...

    Provided By University of Minnesota

  • White Papers // Apr 2012

    Dynamic Network Delay Cartography

    Path delays in IP networks are important metrics, required by network operators for assessment, planning, and fault diagnosis. Monitoring delays of all source-destination pairs in a large network is however challenging and wasteful of resources. The paper advocates a spatio-temporal Kalman filtering approach to construct network-wide delay maps using measurements...

    Provided By University of Minnesota

  • White Papers // Mar 2012

    Scalable Transaction Management With Snapshot Isolation on Cloud Data Management Systems

    Key-value based data storage systems such as HBase and Bigtable provide high scalability compared to traditional relational databases, however, they provide only limited transactional functionality, such as single-row transactions. The authors address the problem of building scalable transaction management mechanisms for multi-row transactions on key-value storage systems. They develop scalable...

    Provided By University of Minnesota

  • White Papers // Aug 2011

    Correlated Flooding in Low-Duty-Cycle Wireless Sensor Networks

    Flooding in low-duty-cycle wireless sensor networks is very costly due to asynchronous schedules of sensor nodes. To adapt existing flooding-tree-based designs for low-duty-cycle networks, the authors shall schedule nodes of common parents wake up simultaneously. Traditionally, energy optimality in a designated flooding-tree is achieved by selecting parents with the highest...

    Provided By University of Minnesota

  • White Papers // Jul 2011

    Safeguarding Schedule Updates in Wireless Sensor Networks

    Working in the duty cycling mode enables sensor nodes to utilize limited energy efficiently instead of unnecessary idle listening. In such networks, awareness of neighboring nodes' working schedules is essential, especially when each node sets up the schedule independently. Most traditional research assumes that a node can always share its...

    Provided By University of Minnesota

  • White Papers // Jun 2011

    Cross-Layer Design of Coded Multicast for Wireless Random Access Networks

    Joint optimization of network coding and Aloha-based Medium Access Control (MAC) for multi-hop wireless networks is considered. The multicast throughput with a power consumption-related penalty is maximized subject to flow conservation and MAC achievable rate constraints to obtain the optimal transmission probabilities. The relevant optimization problem is inherently non-convex and...

    Provided By University of Minnesota

  • White Papers // Jun 2011

    Credit Constraints And Generational Welfare Over The Great Recession

    The Great Recession of 2007-2009 has been one of the largest contractions in the United States since the Great Depression. However, the recession has not impacted all agents equally. Some have lost not only their jobs but also their homes, while others have made fortunes purchasing assets at depressed values....

    Provided By University of Minnesota

  • White Papers // May 2011

    Bubble Trace: Mobile Target Tracking Under Insufficient Anchor Coverage

    As an essential requirement for surveillance systems, target tracking has been studied extensively. Most of the tracking schemes are based on trilateration, which requires each point in the monitoring area to be covered by at least three anchors. However, due to the inadequate deployment of costly anchors and environment constraints,...

    Provided By University of Minnesota

  • White Papers // May 2011

    Sparsity-Aware Kalman Tracking of Target Signal Strengths on a Grid

    Tracking multiple moving targets is known to be challenged by the nonlinearity present in the measurement equation, and by the computationally burdensome data association task. This paper introduces a grid-based model of target signal strengths leading to linear state and measurement equations, that can afford state estimation via sparsity-aware Kalman...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Group Sparse Lasso for Cognitive Network Sensing Robust to Model Uncertainties and Outliers

    To account for variations in the frequency, time, and space dimensions, dynamic re-use of licensed bands under the Cognitive Radio (CR) paradigm calls for innovative network-level sensing algorithms for multi-dimensional spectrum opportunity awareness. Toward this direction, the present paper develops a collaborative scheme whereby CRs cooperate to localize active Primary...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Liquidsoap: A High-Level Programming Language for Multimedia Streaming

    Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users' needs. The authors introduce a novel approach in order to achieve it, based on a dedicated high-level functional programming language, called Liquid-soap, for generating, manipulating and broadcasting multimedia streams....

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Corporate Branding Effects On Consumer Purchase Preferences In Serbian Telecom Market

    This research is carried out to know the role of corporate branding in mobile phone network along with different influencing factors involved in the purchase of mobile telephone connections. This paper discusses corporate branding from consumer's point of view that how much they value it and what type of role...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    The Routing Continuum From Shortest-Path to All-Path: A Unifying Theory

    Routing is a critical operation in many types of networks from communication networks to transportation networks. For instance, in modern IP-based data networks, shortest path routing is most commonly used. In traditional telecommunication networks, dynamic alternative routing strategies that employ paths that are longer than shortest paths have been also...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Flat Versus Metered Rates, Bundling, and "Bandwidth Hogs"

    The current push for bandwidth caps, tiered usage pricing, and other measures in both wireless and wireline communications is usually justified by invoking the specter of "Bandwidth hogs" consuming an unfair share of the transmission capacity and being subsidized by the bulk of the users. This paper presents a conventional...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    The Natural Resource Decision Support System (NRDSS): Creation of a 9.2 ArcGIS Server Website and a SQL Server 2005 ArcSDE 9.2 Database for the Minnesota Board of Water and Soil Resources (BWSR)

    In the fall of 2007, GeoSpatial Services (GSS) accepted a contract from the Minnesota Board of Water and Soil Resources (BWSR) to develop a 9.2 ArcGIS Server application. This application was to be a web mapping site that would support Soils SURvey GeOgraphic Database (SSURGO) soils data interaction and allow...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Business Ethics Pedagogy: A Synthesis Of Paradigms, Philosophies, And Teaching Methods

    Is the job as educators to teach students how to make ethical decisions or is it to teach students how to become innately better people, thus becoming better ethical decision-makers on the job? This paper examines current teaching methods in business ethics. An argument for the necessity of ethics education...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Data Security in the Cloud

    Cloud computing is an emerging trend in the provision of computing resources. For economical reasons users are outsourcing applications and data storage to the cloud, a managed hardware infrastructure providing various services. As the cloud grows it becomes necessary to secure the data and applications from unwanted attackers. This paper...

    Provided By University of Minnesota

  • White Papers // Mar 2011

    Dynamic Outsourcing Mobile Computation to the Cloud

    Mobile devices are becoming the universal interface to online services and cloud computing applications. Since mobile phones have limited computing power and battery life, there is a potential to migrate computation intensive application components to external computing resources. The Cloud is an attractive platform for offloading due to elastic resource...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    Simplifying Manageability, Scalability and Host Mobility in Large-Scale Enterprise Networks Using VEIL-Click

    The explosive growth in the network driven services and devices is causing existing networks to continually expand to accommodate the demands set by them. However, underlying network architecture can not sustain this continual expansion. As a result, several ad-hoc mechanisms are used as workarounds, which make the networks increasingly complicated...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    A Geometric Approach to Robustness in Complex Networks

    Unlike traditional studies on network robustness, that typically treat networks as combinatoric objects and rely primarily on classical graph-theoretic concepts (e.g. minimum cuts) to characterize network robustness, the authors explore a geometric approach which enables one to employ more advanced theories and techniques, quantify and compare robustness of networks in...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    i-Code: A New Approach to Practical Network Coding for Content Distribution

    This paper studies the practicality of network coding to facilitate cooperative content distribution. Network coding is a new data transmission technique which allows any nodes in a network to encode and distribute data. It is a good solution offering reliability and efficiency in distributing content, but network coding has not...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    VIRO: A Scalable, Robust and Namespace Independent Virtual Id ROuting for Future Networks

    Today's Internet is increasingly strained to meet the demands and requirements of these Internet services and their users, such as scalability to accommodate the increasing number of network components and host devices, high availability, robustness, mobility and security. As the universal "Glue" that pieces together various heterogeneous physical networks, the...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    Trade Liberalization With Endogenous Borrowing Constraints

    A recent empirical literature has documented that credit availability is a significant barrier for firm-level exports. The authors develop a dynamic general equilibrium trade model with heterogeneous monopolistic competitive firms and imperfect credit markets due to limited contract enforce-ability. They show that this model is consistent with the findings of...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    Challenges In Demonstrating The Impact Of Overconfidence In M&A Activity

    One of the foundations of behavioral finance is the overconfidence hypothesis. Barberis and Thaler (2003) list it as one of the main beliefs that characterize study in the field. Simply put, the overconfidence hypothesis suggests that the subjects of study (investors or corporate managers) believe that they are more competent...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Efficient Data Collection From Wireless Nodes Under Two-Ring Communication Model

    Research on Wireless Sensor Networks (WSNs) has been very active in the last two decades with researchers focusing on issues ranging from deployments with coverage guarantees to the development of energy-efficient communication protocols to improve network lifetime. Consequently, the technology advanced to the level that WSNs are now being routinely...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Un-Zipping Cellular Infrastructure Locations Via User Geo-Intent

    Despite the rapid growth in cellular data traffic, the authors know very little about the (operational) Cellular Data Service Network (CDSN) infrastructure. A key step in the process of developing any such understanding is to first understand the locations and distribution of the base-stations in the CDSN infrastructure that serve...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    A First Look at Inter-Data Center Traffic Characteristics Via Yahoo! Datasets

    Recent years have seen unprecedented growth in the data center driven technologies and services. Various organizations are now sourcing their computing to "Cloud-based" infrastructures. Therefore, large scale data centers and associated cloud services are developed and deployed by various organizations and service providers to store massive amounts of data, and...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Making Sense of Customer Tickets in Cellular Networks

    Effective management of large-scale cellular data networks is critical to meet customer demands and expectations. Customer calls for technical support provide direct indication as to the problems customers encounter. In this paper, the authors study the customer tickets - free-text recordings and classifications by customer support agents - collected at...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Deuteronomy: Transaction Support for Cloud Data

    The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: a Transactional Component (TC) that manages transactions and their "Logical" concurrency control and undo/redo recovery, but knows nothing about physical data location and a Data Component (DC) that...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    On-Demand Time Synchronization With Predictable Accuracy

    Time synchronization remains as a challenging task in wireless sensor networks that face severe resource constraints. Unlike previous work's aiming at pure clock accuracy, this paper proposes On-Demand Synchronization (ODS), a design to achieve efficient clock synchronization with customized performance. By carefully modeling the error uncertainty of skew detection and...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Proxy-Assisted Periodic Broadcast for Video Streaming With Multiple Servers

    Large scale video streaming over Internet requires a large amount of resources such as server I/O bandwidth, network bandwidth. A number of video delivery techniques can be used to lower these requirements. Periodic broadcast by a central server combined with proxy caching offers a significant reduction of the aggregate network...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Proxy-Assisted Periodic Broadcast Architecture for Large-Scale Video Streaming

    Many multimedia applications rely on video streaming techniques. However, large scale video delivery is still challenging since it requires a large amount of resources. This paper proposes a proxy-assisted periodic broadcast architecture for video delivery to a large number of clients over the Internet. The video delivery technique is based...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Heterogeneity-Aware Workload Distribution in Donation-Based Grids

    In this paper, the authors explore the tradeoffs and opportunities in porting a high-throughput Grid computing middleware to a high-performance service oriented environment. They present the limitations of the Grid computing middleware when operating in such a performance sensitive environment and suggest ways of overcoming these limitations. They focus on...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Practical Techniques for Eliminating Storage of Deleted Data

    The layered design of modern file systems hides the liveness of data from the underlying storage systems. In this paper, the authors define a generic "Purge" operation that can be used by a file system to pass liveness information to the storage system with minimal changes in the layer interfaces....

    Provided By University of Minnesota

  • White Papers // Dec 2010

    The Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer Network Simulation

    The ability to analyze the behavior of large distributed systems can be limited by the modeling tools used. The Distributed Virtual Network (DVN) is a discrete event network simulator providing a platform for realistic, high fidelity, scalable and repeatable simulations of large distributed systems. With a global view of the...

    Provided By University of Minnesota

  • White Papers // Nov 2010

    Optimized Multi-Antenna Communication in Ad-Hoc Networks With Opportunistic Routing

    The authors consider the problem of using multiple antennas to maximize end-to-end performance in a multi-hop ad hoc wireless network with opportunistic routing. They find that when a single data stream is sent per-hop, performance is maximized by aggressively increasing spatial reuse, as opposed to increasing per-hop length or rate....

    Provided By University of Minnesota

  • White Papers // Nov 2010

    HOSPITAL: Host and Network System Profiler and Internet Traffic Analyzer

    The ever-increasing complexity and diversity of the Internet pose several challenges to network operators and administrators and, in general, Internet users. More specifically, because of the diversity in applications and usage patterns; the prevalence of dynamic IP addresses and applications that do not conform to standard configuration (e.g. VoIP to...

    Provided By University of Minnesota

  • White Papers // Oct 2010

    Dynamic Switching-Based Data Forwarding for Low-Duty-Cycle Wireless Sensor Networks

    In this paper, the authors introduce the concept of Dynamic Switch-based Forwarding (DSF) that optimizes the expected data delivery ratio, expected communication delay, or expected energy consumption for low-duty-cycle wireless sensor networks under unreliable communication links. DSF is designed for networks with possibly unreliable communication links and predetermined node communication...

    Provided By University of Minnesota

  • White Papers // Oct 2010

    VEIL-Click: Creating Advanced Large-Scale Ethernet Networks

    VEIL (Virtual Ethernet Identifier Layer) is a novel concept for below IP networking. It addresses the scalability, efficiency and reliability challenges facing the traditional Ethernet, while retaining its simplicity. Furthermore, it provides a uniform (Below IP) convergence layer to support a large, dynamic and heterogeneous (Layer-2) network that is capable...

    Provided By University of Minnesota

  • White Papers // Oct 2010

    Exact Hamming Distortion Analysis of Viterbi Encoded Trellis Coded Quantizers

    Let G be a finite strongly connected aperiodic directed graph in which each edge carries a label from a finite alphabet A. Then G induces a trellis coded quantizer for encoding an alphabet A memoryless source. A source sequence of long finite length is encoded by finding a path in...

    Provided By University of Minnesota

  • White Papers // Jun 2003

    The Effectiveness and Safety of Traffic and Non-Traffic Related Messages Presented on Changeable Message Signs (CMS)

    This report discusses two experiments investigating Changeable Message Signs (CMS). The objectives of this study were to determine whether or not CMS messages really work, whether or not CMS messages cause traffic slow-downs, the likely impact of CMS messages on traffic flow, and whether or not messages should be presented...

    Provided By University of Minnesota

  • White Papers // Jan 2003

    Negotiation, Supply Management, And Farm Income

    Negotiating and supply management are two important marketing tools for farmers to consider. The two strategies are commonly used in business. They work in different ways, however. To get a feeling for how they are different, consider a common experience we have all had, that of buying a car. Surely,...

    Provided By University of Minnesota

  • White Papers // Jan 2005

    Fertility And Social Security

    The data show that an increase in government provided old-age pensions is strongly correlated with a reduction in fertility. What type of model is consistent with this finding? We explore this question using two models of fertility, the one by Barro and Becker (1989), and the one inspired by Caldwell...

    Provided By University of Minnesota

  • White Papers // Jan 2010

    Paradigms for Mobile Agent-Based Active Monitoring of Network Systems

    This paper presents here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In one's framework mobile agents are used to perform remote information filtering and control functions. Such agents can detect basic events or correlate existing events that are stored in...

    Provided By University of Minnesota

  • White Papers // Oct 2009

    The Economic Impact of Wireless Number Portability

    This paper examines the price response of wireless carriers to the introduction of number portability. The authors find that wireless prices decreased in response to number portability, but not uniformly across plans. Average prices for the plans with the fewest minutes decreased by only $0.19/month (0.97%), but average prices for...

    Provided By University of Minnesota

  • White Papers // Sep 2009

    A Multi-Robot System for Unconfined Video-Conferencing

    Telepresence or tele-immersion technologies allow people to attend a shared meeting without being physically present in the same location. Commercial telepresence solutions available in the market today have significant drawbacks - they are very expensive, and confine people to the area covered by stationary cameras. This paper presents a mobile...

    Provided By University of Minnesota

  • White Papers // Mar 2010

    Using SAS to Perform Individual Matching in Design of Case-Control Studies

    In the design of case-control studies it is often desired to match each case with one or more controls based on a set of variables and maximum differences between case and control in these variables. Case-control studies can arise within cohort studies where it is desired to compare subjects experiencing...

    Provided By University of Minnesota

  • White Papers // Mar 2010

    Choosing Management strategy

    The authors describe two structured decision-making methods-one using a hierarchy of goals and a second using ranking on the sum of the weighted criteria-that may be useful for many practical conversion problems particularly when advisory groups evaluate the output of simulation models. The authors illustrate both methods by applying them...

    Provided By University of Minnesota

  • White Papers // Dec 2009

    A Bluetooth Keyboard Attack

    Bluetooth devices have become increasingly popular and are expected to surpass two billion devices sold by 2010. Bluetooth provides communication between devices, such as cell phones and headsets, or computers and robots, among other things. Bluetooth keyboards and mice are also very popular, making people more mobile when working at...

    Provided By University of Minnesota

  • White Papers // Dec 2009

    S-MED: Sarcoma MicroRNA Expression Database

    Human sarcomas are a heterogeneous group of over 50 different malignant tumors for which very few diagnostic markers currently exist. MicroRNA (miRNA) transcript levels have been proposed for use in the diagnosis, classification and prognosis of tumors. Over 700 miRNAs are identified in humans and miRNA are considered attractive candidates...

    Provided By University of Minnesota

  • White Papers // Apr 2010

    A Wireless Sensor Network Communication Model for Automation of Electric Power Distribution

    Automation of electric power distribution in a cost-efficient and reliable manner can be accomplished by complete automation of the load dispatch centers and substations on a large scale. For efficient load balancing among the feed lines, a continuous monitoring of parameters, such as voltage, current in the line, temperature, pressure,...

    Provided By University of Minnesota

  • White Papers // Jan 2010

    PDIO: High-Performance Remote File I/O for Portals-Enabled Compute Nodes

    Portals Direct I/O ("PDIO") is a special purpose middleware infrastructure for writing data from compute processor memory on Portals-enabled compute nodes to remote agents anywhere on the WAN in real-time. The prototype implementation provided a means for aggregation of outgoing data through multiple load balanced routing daemons, end-to-end parallel data...

    Provided By University of Minnesota

  • White Papers // Feb 2010

    Multi-Robot System for Unconfined Video-Conferencing

    Telepresence or tele-immersion technologies allow people to attend a shared meeting without being physically present in the same location. Commercial telepresence solutions available in the market today have significant drawbacks - they are very expensive, and confine people to the area covered by stationary cameras. This paper presents a mobile...

    Provided By University of Minnesota

  • White Papers // Jan 2010

    Sampling-Based Metadata Management for Flash Storage

    Existing garbage collection algorithms for the ash-based storage use score-based heuristics to select victim blocks for reclaiming free space and wear leveling. The score for a block is estimated using metadata information such as age, utilization, and erase count. To quickly find a victim block, these algorithms need to maintain...

    Provided By University of Minnesota

  • White Papers // Dec 2009

    Examining Return On Human Capital Investments In The Context Of Offshore IT Workers

    The rapid pace of technological innovation necessitates Information Technology (IT) services firms to continually invest in replenishing the skills of their key asset base, the human capital. Controlling for unobservable employee characteristics and possible selection bias, one find significant a positive impact of training on employee performance. An additional training...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Proxy-Assisted Periodic Broadcast for Video Streaming With Multiple Servers

    Large scale video streaming over Internet requires a large amount of resources such as server I/O bandwidth, network bandwidth. A number of video delivery techniques can be used to lower these requirements. Periodic broadcast by a central server combined with proxy caching offers a significant reduction of the aggregate network...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    Proxy-Assisted Periodic Broadcast Architecture for Large-Scale Video Streaming

    Many multimedia applications rely on video streaming techniques. However, large scale video delivery is still challenging since it requires a large amount of resources. This paper proposes a proxy-assisted periodic broadcast architecture for video delivery to a large number of clients over the Internet. The video delivery technique is based...

    Provided By University of Minnesota

  • White Papers // Oct 2010

    VEIL-Click: Creating Advanced Large-Scale Ethernet Networks

    VEIL (Virtual Ethernet Identifier Layer) is a novel concept for below IP networking. It addresses the scalability, efficiency and reliability challenges facing the traditional Ethernet, while retaining its simplicity. Furthermore, it provides a uniform (Below IP) convergence layer to support a large, dynamic and heterogeneous (Layer-2) network that is capable...

    Provided By University of Minnesota

  • White Papers // May 2010

    Dynamic Resource Allocation for Network Aware Applications

    Network aware applications provide opportunities for adaptive resource allocations for both network resources and distributed hosting of critical applications. This paper proposes an Automatic Dynamic Resource Management (AutoDRM) architecture for efficiently managing shared resources in tactical network environments without human operator intervention. The AutoDRM architecture was developed to resolve the...

    Provided By University of Minnesota

  • White Papers // Sep 2009

    Cash Flow Risk Ratio: An Aid To Marketing Decisions

    Financial risk differs from the business risks previously described in that it results from the way the firm's capital is obtained and financed. A producer may be subject to fluctuations in interest rates on borrowed capital, or face cash flow difficulties if there are insufficient funds to repay creditors. The...

    Provided By University of Minnesota

  • White Papers // Jun 2010

    From Traffic Matrix to Routing Matrix: PoP Level Traffic Characteristics for a Tier-1 ISP

    Traffic matrices play a pivotal role in the management of an ISP's network such as various levels of traffic engineering and capacity planning. However, it is unclear how the interaction between the internal traffic routing policies chosen by the ISPs and large-scale content providers, and the ongoing trend of "Cloud-computing"...

    Provided By University of Minnesota

  • White Papers // Mar 2010

    Exploring Link Correlation for Efficient Flooding in Wireless Sensor Networks

    Existing flooding algorithms have demonstrated their effectiveness in achieving communication efficiency and reliability in wireless sensor networks. However, further performance improvement has been hampered by the assumption of link independence, a design premise imposing the need for costly ACKnowledgements (ACKs) from every receiver. This paper presents Collective Flooding (CF), which...

    Provided By University of Minnesota

  • White Papers // Dec 2009

    Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing

    Due to the unique characteristics of wireless technologies and the dynamics in the environments (e.g., Mobility and interference) they operate in, wireless channels are known to be time-varying, unreliable, and asymmetric. Furthermore, wireless networks are often designed to support certain applications or missions, and deployed in specific environments. For these...

    Provided By University of Minnesota

  • White Papers // May 2010

    Safe Inter-Domain Routing Under Diverse Commercial Agreements

    Commercial agreements drive the routing policies used in today's Internet. The two most extensively studied commercial agreements are transit and peering; however, they are only two of many diverse and continuously evolving commercial agreements that ISPs enter into. So far, the only known practical safe and robust routing policy is...

    Provided By University of Minnesota

  • White Papers // Feb 2011

    VIRO: A Scalable, Robust and Namespace Independent Virtual Id ROuting for Future Networks

    Today's Internet is increasingly strained to meet the demands and requirements of these Internet services and their users, such as scalability to accommodate the increasing number of network components and host devices, high availability, robustness, mobility and security. As the universal "Glue" that pieces together various heterogeneous physical networks, the...

    Provided By University of Minnesota

  • White Papers // Jan 2011

    A First Look at Inter-Data Center Traffic Characteristics Via Yahoo! Datasets

    Recent years have seen unprecedented growth in the data center driven technologies and services. Various organizations are now sourcing their computing to "Cloud-based" infrastructures. Therefore, large scale data centers and associated cloud services are developed and deployed by various organizations and service providers to store massive amounts of data, and...

    Provided By University of Minnesota

  • White Papers // Sep 2010

    STEAMEngine: Driving MapReduce Provisioning in the Cloud

    MapReduce has gained in popularity as a distributed data analysis paradigm, particularly in the cloud, where MapReduce jobs are run on virtual clusters. The provisioning of MapReduce jobs in the cloud is an important problem for optimizing several user as well as provider-side metrics, such as runtime, cost, throughput, energy,...

    Provided By University of Minnesota

  • White Papers // Feb 2010

    DECOR: Distributed and Energy Efficient Collection of Raw Data in Sensor Networks

    In wireless sensor networks, collection of raw sensor data at a base station provides the flexibility to perform offline detailed analysis on the data which may not be possible with in network data aggregation. However, lossless data collection consumes considerable amount of energy for communication while sensors usually have limited...

    Provided By University of Minnesota

  • White Papers // Mar 2010

    TSF: Trajectory-Based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks

    This paper considers the scenarios where Internet access points are sparsely deployed in road networks to provide individual vehicles with customized road condition information for the driving safety, such as holes and bumps along their trajectories. Due to the limited communication coverage, vehicular ad-hoc networks are used to support the...

    Provided By University of Minnesota

  • White Papers // Apr 2010

    Exploiting Spatio-Temporal Tradeoffs for Energy Efficient MapReduce in the Cloud

    MapReduce is a distributed computing paradigm that is being widely used for building large-scale data processing applications like content indexing, data mining and log file analysis. Offered in the cloud, users can construct their own virtualized MapReduce clusters using Virtual Machines (VMs) managed by the cloud service provider. However, to...

    Provided By University of Minnesota

  • White Papers // Apr 2010

    Data Mining Based Predictive Models for Overall Health Indices

    Having quantitative indices of overall health of citizens is essential to moving from ad hoc decisions to a systematic approach for public health maintenance, and for individual care. In recent months, for lack of an overall health indicator, policies for whom to vaccinate with the (Scarce) H1N1 flu vaccine in...

    Provided By University of Minnesota

  • White Papers // Aug 2010

    Early Experience With Mobile Computation Outsourcing (Preliminary)

    End-user mobile devices such as smart phones, PDAs, and tablets, offer the promise of anywhere, anytime computing and communication. Indeed, users increasingly expect their mobile device to support the same activities (And same performance) as their desktop counterparts: seamless multitasking, ubiquitous data access, social networking, game playing, and real work,...

    Provided By University of Minnesota

  • White Papers // Sep 2010

    Content-Based Methods for Predicting Web-Site Demographic Attributes

    Demographic information plays an important role in gaining valuable insights about a web-site's user-base and is used extensively to target online advertisements and pro-motions. This paper investigates machine-learning approaches for predicting the demographic attributes of web-sites using information derived from their content and their hyperlinked structure and not relying on...

    Provided By University of Minnesota

  • White Papers // Dec 2009

    Starling: Minimizing Communication Overhead in Virtualized Computing Platforms Using Decentralized Affinity-Aware Migration

    Virtualization is being widely used in large-scale computing environments, such as clouds, data centers, and grids, to provide application portability and facilitate resource multiplexing while retaining application isolation. In many existing virtualized platforms, it has been found that the network bandwidth often becomes the bottleneck resource, causing both high network...

    Provided By University of Minnesota

  • White Papers // Aug 2010

    Google Apps For The University Of Minnesota

    This paper is to describe the various services associated with Google Apps for the University of Minnesota that are administered by the Office of Information Technology (OIT), and identify related support resources. The University has entered into an agreement with Google to make applications within the Google Apps for Education...

    Provided By University of Minnesota

  • White Papers // Apr 2011

    Liquidsoap: A High-Level Programming Language for Multimedia Streaming

    Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users' needs. The authors introduce a novel approach in order to achieve it, based on a dedicated high-level functional programming language, called Liquid-soap, for generating, manipulating and broadcasting multimedia streams....

    Provided By University of Minnesota

  • White Papers // Aug 2011

    Correlated Flooding in Low-Duty-Cycle Wireless Sensor Networks

    Flooding in low-duty-cycle wireless sensor networks is very costly due to asynchronous schedules of sensor nodes. To adapt existing flooding-tree-based designs for low-duty-cycle networks, the authors shall schedule nodes of common parents wake up simultaneously. Traditionally, energy optimality in a designated flooding-tree is achieved by selecting parents with the highest...

    Provided By University of Minnesota

  • White Papers // May 2010

    Bounding Communication Delay in Energy Harvesting Sensor Networks

    In energy-harvesting sensor networks, limited ambient energy from environment necessitates sensor nodes to operate at a low-duty-cycle, i.e., they communicate briefly and stay asleep most of time. Such low-duty-cycle operation leads to orders of magnitude longer communication delays in comparison with traditional always-active networks, imposing a new challenge in many...

    Provided By University of Minnesota

  • White Papers // Sep 2009

    Spatiotemporal Delay Control for Low-Duty-Cycle Sensor Networks

    Data delivery is a major function of sensor network applications. Many applications, such as military surveillance, require the detection of interested events to be reported to a command center within a specified time frame, and therefore impose a real-time bound on communication delay. On the other hand, to conserve energy,...

    Provided By University of Minnesota

  • White Papers // Sep 2009

    ESC: Energy Synchronized Communication in Sustainable Sensor Networks

    With advances in energy harvesting techniques, it is now feasible to build Sustainable Sensor Networks (SSN) to support long-term applications. Unlike battery-powered sensor networks, the objective of sustainable sensor networks is to effectively utilize a continuous stream of ambient energy. Instead of pushing the limits of energy conservation, the authors...

    Provided By University of Minnesota