University of Missouri

Displaying 1-26 of 26 results

  • White Papers // Jul 2013

    Generalised Cheater Detection and Identification

    "Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold)...

    Provided By University of Missouri

  • White Papers // May 2013

    Probability-Based Adaptive Forwarding Strategy in Named Data Networking

    Forwarding strategy is an important research problem in Named Data Networking (NDN). A Probability-based Adaptive Forwarding (PAF) strategy is introduced in this paper. Ant colony optimization is customized to a dynamic NDN environment to compute the selection probabilities. In addition, the authors use a statistical model in PAF to compute...

    Provided By University of Missouri

  • White Papers // May 2013

    Viewing Youtube From a Metropolitan Area: What Do Users Accessing From Residential Isps Experience?

    In this paper, the authors perform a controlled study on the perceived experience of viewing YouTube videos as observed from the end users' point of view through their residential ISPs in a metropolitan area. This study is conducted using their tool Pytomo, which they developed to emulate the end users'...

    Provided By University of Missouri

  • White Papers // May 2013

    An Experimental Study on Dynamic Network Reconfiguration in a Virtualized Network Environment Using Autonomic Management

    In a virtualized network, network virtualization is achieved by creating multiple instances of virtual routers over existing physical routers. Critical aspects of network virtualization are resource allocation and resource re-allocation, especially in the case of router failures or re-allocation of routers due for maintenance. In this paper, the authors present...

    Provided By University of Missouri

  • White Papers // May 2013

    A Behavior Based Policy Management for Adaptive Trustworthiness Assignment in Future Network

    A secure network is considered to be an important goal of the Future Internet; one way which can be embodied is by having flexible and robust routing functionality with built-in security and trustworthy mechanisms. However, there is a fundamental and important challenge how to determine the trustworthiness to every traffic...

    Provided By University of Missouri

  • White Papers // Mar 2013

    Using Network Measure to Reduce State Space Enumeration in Resilient Networks

    Resilient network design has become a prominent research topic in the wake of recent disasters in Japan and the United States. Often communications networks that are designed to be highly reliable have significant outages when rare but important events occur. Finding rare events is generally difficult because it may require...

    Provided By University of Missouri

  • White Papers // Jan 2013

    Ubiquitous Computing: Connecting Pervasive Computing through Semantic Web

    Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deals with acquiring context knowledge from the environment and providing dynamic, proactive and context-aware services to the user. A Ubiquitous computing environment is created by sharing...

    Provided By University of Missouri

  • White Papers // Jun 2012

    Constructing a Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE)

    With Cloud Computing technology occupying the majority of future Internet research and development work, research on deploying and extending existing capabilities onto a newly emerging infrastructure becomes more significant. For example, extending the virtual network provisioning capability onto a Geo-distributed Programmable Layer-2 Networking Environment (G-PLaNE) is a novel attempt and...

    Provided By University of Missouri

  • White Papers // Sep 2011

    A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem

    Multilayer network design has received significant attention over the years. Despite this, the explicit modeling of three-layer networks such as IP/MPLS-over-OTN-over-DWDM in which the OTN layer is specifically considered has not been addressed before. In this paper, the authors present an optimization model for network planning of such multilayer networks...

    Provided By University of Missouri

  • White Papers // Sep 2011

    Estimating Optimal Cost of Allocating Virtualized Resources With Dynamic Demand

    Data centers are designed to provision sufficient virtualized resources at all times to meet the demands of users. Now-a-days the users who have "Elastic demand" take advantage of the "Pay-as-you-go" model and only request needed demands which vary over time. Considering the dynamics of the demand on virtualized resources is...

    Provided By University of Missouri

  • White Papers // Sep 2011

    Performance Impacts Due to Number Portability Under Various Routing Schemes

    Number portability provides users the capability to keep their telephone numbers as they moves to another provider. Number portability technology involves complicated architecture between different providers. From a routing perspective, and in order to simplify the model, the authors consider that the traversal of a call to a ported number...

    Provided By University of Missouri

  • White Papers // Apr 2011

    An Optimization-Based Approach for Connecting Partitioned Mobile Sensor/Actuator Networks

    Wireless Sensor and Actuator Networks (WSANs) employ mobile nodes in addition to stationary tiny sensors. Similarly, mobile sensors make it possible to have the flexibility of mobility in Mobile Sensor Network (MSN) applications. Mobility can be exploited to connect partitioned WSANs and MSNs due to large scale damages or deployment...

    Provided By University of Missouri

  • White Papers // Feb 2011

    Server Operational Cost Optimization for Cloud Computing Service Providers Over a Time Horizon

    Service providers are migrating to on-demand cloud computing services to unburden the task of managing infrastructure, while cloud computing providers expand the number of servers in their data centers because of the increase in load. With this growing need, their energy consumption increases significantly. Conserving energy and reducing the operational...

    Provided By University of Missouri

  • White Papers // Jan 2011

    A Network Management Framework for Multi-Layered Network Survivability: An Overview

    The authors consider an interconnected network environment where one network can act as a 'Provider' or 'Service' network to the 'User' network or a collection of 'User' networks. In such an environment, a major failure in a provider network can affect the user networks. Very often, failure management is addressed...

    Provided By University of Missouri

  • White Papers // Jan 2011

    A Deformable Modeling Paradigm for 3D Shape Recovery From Visual Inputs

    In this paper, the authors propose a deformable modeling paradigm for 3D shape recovery from visual inputs such as volumetric data and 3D point clouds. The new model is capable of automatically evolving its shape to capture the geometric boundary of the data and simultaneously discover its underlying topological structure....

    Provided By University of Missouri

  • White Papers // Jan 2011

    Energy-Efficient Broadcast and Multicast Routing in Multihop Ad Hoc Wireless Networks

    This paper addresses the problem of broadcasting and multi-casting in large scale multi-hop ad hoc wireless networks. The authors focus on the energy-efficient broadcast routing in stationary networks and consider the case where wireless nodes can dynamically control their transmission power for each broadcast session. Minimum Spanning Tree(MST) has the...

    Provided By University of Missouri

  • White Papers // Oct 2010

    Endogenous Credit Cycles

    The authors study models of credit with limited commitment, which implies endogenous borrowing constraints. They show that there are multiple stationary equilibria, as well as non-stationary equilibria, including some that display deterministic cyclic and chaotic dynamics. There are also stochastic (sunspot) equilibria, in which credit conditions change randomly over time,...

    Provided By University of Missouri

  • White Papers // Jul 2010

    Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Networks

    The future Internet will require the transport of a wide range of services including high bandwidth one-to-many applications, with a dynamic interconnection of devices. WDM layer support realizes such services in a transparent, reliable and efficient way. Most of the recent studies have been focused on efficiently building and configuring...

    Provided By University of Missouri

  • White Papers // May 2010

    Distributed Security for Multi-Agent Systems - Review and Applications

    "As two major communication technologies, the internet and wireless, are maturing rapidly to dominate civilized life, the authors urgently need to re-establish users' confidence to harvest new potential applications of large-scale distributed systems. Service agents and distributed Multi-Agent Systems (MASs) have shown the potential to help with this move as...

    Provided By University of Missouri

  • White Papers // Apr 2010

    Distributed Approaches to S-CSCF Selection in an IMS Network

    The IP Multimedia Subsystem (IMS) is a generic open-systems architecture offering converged multimedia services over IP. A function in the signaling plane of an IMS network is the Interrogating Call/Session Control Function (I-CSCF) choosing the serving CSCF (S-CSCF) for a request. In this paper, the authors investigate distributed S-CSCF selection...

    Provided By University of Missouri

  • White Papers // Apr 2010

    DReaM-Cache: Distributed Real-Time Transaction Memory Cache to Support Two-Factor Authentication Services and Its Reliability

    Phone-Factor is a two-factor authentication service that combines the knowledge-based authenticator with an object based authenticator in which the object-based authenticator has advantages of hardware token-based systems without requiring the administration overhead of distribution of special hardware to every user in advance. For transaction scalability of this service, the authors...

    Provided By University of Missouri

  • White Papers // Mar 2010

    Toward A Theory Of Public Entrepreneurship

    This paper explores innovation, experimentation, and creativity in the public domain and in the public interest. Researchers in various disciplines have studied public entrepreneurship, but there is little work in management and economics on the nature, incentives, constraints and boundaries of entrepreneurship directed to public ends. The authors identify a...

    Provided By University of Missouri

  • White Papers // Aug 2009

    A Primer On Collective Entrepreneurship: A Preliminary Taxonomy

    The authors document an increasing prevalence of the term "Collective entrepreneurship" in scholarly research. By examining the context in which the term is utilized, they present a framework through which to understand motivations for research in collective entrepreneurship and the variety of entrepreneurial endeavors described as collective entrepreneurship. They identify...

    Provided By University of Missouri

  • White Papers // Jun 2009

    QoS and Channel Aware Packet Bundling for VoIP Traffic in Cellular Networks

    The authors study the problem of multiple packet bundling to improve spectral efficiency in cellular networks. The packet size of real-time data, such as VoIP, is often very small. However, the use of Time Division Multiplexing (TDM) limits the number of VoIP users supported, because a packet has to wait...

    Provided By University of Missouri

  • White Papers // Apr 2002

    Health Care Demand and Health Insurance

    The paper presents a model that uses the standard expected-utility model that considers a one-argument utility function. This approach seems nevertheless not very realistic and restrictive. The paper first compares health care demand with and without health insurance. It allows dealing with the problem of ex post moral hazard which...

    Provided By University of Missouri

  • White Papers // Mar 2001

    Structural Performance of a FRP Bridge Deck

    The purpose of this paper is to present fatigue and strength experimental qualifications performed for an all-composite bridge deck. The materials used for the fabrication of this 9.14 m (30 ft) long by 2.74 m (9 ft) wide deck were 76 mm (3 in) pultruded square hollow glass and carbon...

    Provided By University of Missouri

  • White Papers // Mar 2010

    Toward A Theory Of Public Entrepreneurship

    This paper explores innovation, experimentation, and creativity in the public domain and in the public interest. Researchers in various disciplines have studied public entrepreneurship, but there is little work in management and economics on the nature, incentives, constraints and boundaries of entrepreneurship directed to public ends. The authors identify a...

    Provided By University of Missouri

  • White Papers // Jul 2010

    Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Networks

    The future Internet will require the transport of a wide range of services including high bandwidth one-to-many applications, with a dynamic interconnection of devices. WDM layer support realizes such services in a transparent, reliable and efficient way. Most of the recent studies have been focused on efficiently building and configuring...

    Provided By University of Missouri

  • White Papers // Jan 2011

    A Deformable Modeling Paradigm for 3D Shape Recovery From Visual Inputs

    In this paper, the authors propose a deformable modeling paradigm for 3D shape recovery from visual inputs such as volumetric data and 3D point clouds. The new model is capable of automatically evolving its shape to capture the geometric boundary of the data and simultaneously discover its underlying topological structure....

    Provided By University of Missouri

  • White Papers // Aug 2009

    A Primer On Collective Entrepreneurship: A Preliminary Taxonomy

    The authors document an increasing prevalence of the term "Collective entrepreneurship" in scholarly research. By examining the context in which the term is utilized, they present a framework through which to understand motivations for research in collective entrepreneurship and the variety of entrepreneurial endeavors described as collective entrepreneurship. They identify...

    Provided By University of Missouri

  • White Papers // Jan 2011

    A Network Management Framework for Multi-Layered Network Survivability: An Overview

    The authors consider an interconnected network environment where one network can act as a 'Provider' or 'Service' network to the 'User' network or a collection of 'User' networks. In such an environment, a major failure in a provider network can affect the user networks. Very often, failure management is addressed...

    Provided By University of Missouri

  • White Papers // Apr 2002

    Health Care Demand and Health Insurance

    The paper presents a model that uses the standard expected-utility model that considers a one-argument utility function. This approach seems nevertheless not very realistic and restrictive. The paper first compares health care demand with and without health insurance. It allows dealing with the problem of ex post moral hazard which...

    Provided By University of Missouri

  • White Papers // Mar 2001

    Structural Performance of a FRP Bridge Deck

    The purpose of this paper is to present fatigue and strength experimental qualifications performed for an all-composite bridge deck. The materials used for the fabrication of this 9.14 m (30 ft) long by 2.74 m (9 ft) wide deck were 76 mm (3 in) pultruded square hollow glass and carbon...

    Provided By University of Missouri

  • White Papers // Oct 2010

    Endogenous Credit Cycles

    The authors study models of credit with limited commitment, which implies endogenous borrowing constraints. They show that there are multiple stationary equilibria, as well as non-stationary equilibria, including some that display deterministic cyclic and chaotic dynamics. There are also stochastic (sunspot) equilibria, in which credit conditions change randomly over time,...

    Provided By University of Missouri

  • White Papers // Feb 2011

    Server Operational Cost Optimization for Cloud Computing Service Providers Over a Time Horizon

    Service providers are migrating to on-demand cloud computing services to unburden the task of managing infrastructure, while cloud computing providers expand the number of servers in their data centers because of the increase in load. With this growing need, their energy consumption increases significantly. Conserving energy and reducing the operational...

    Provided By University of Missouri

  • White Papers // Apr 2010

    Distributed Approaches to S-CSCF Selection in an IMS Network

    The IP Multimedia Subsystem (IMS) is a generic open-systems architecture offering converged multimedia services over IP. A function in the signaling plane of an IMS network is the Interrogating Call/Session Control Function (I-CSCF) choosing the serving CSCF (S-CSCF) for a request. In this paper, the authors investigate distributed S-CSCF selection...

    Provided By University of Missouri

  • White Papers // Jun 2009

    QoS and Channel Aware Packet Bundling for VoIP Traffic in Cellular Networks

    The authors study the problem of multiple packet bundling to improve spectral efficiency in cellular networks. The packet size of real-time data, such as VoIP, is often very small. However, the use of Time Division Multiplexing (TDM) limits the number of VoIP users supported, because a packet has to wait...

    Provided By University of Missouri

  • White Papers // Jan 2011

    Energy-Efficient Broadcast and Multicast Routing in Multihop Ad Hoc Wireless Networks

    This paper addresses the problem of broadcasting and multi-casting in large scale multi-hop ad hoc wireless networks. The authors focus on the energy-efficient broadcast routing in stationary networks and consider the case where wireless nodes can dynamically control their transmission power for each broadcast session. Minimum Spanning Tree(MST) has the...

    Provided By University of Missouri

  • White Papers // Apr 2011

    An Optimization-Based Approach for Connecting Partitioned Mobile Sensor/Actuator Networks

    Wireless Sensor and Actuator Networks (WSANs) employ mobile nodes in addition to stationary tiny sensors. Similarly, mobile sensors make it possible to have the flexibility of mobility in Mobile Sensor Network (MSN) applications. Mobility can be exploited to connect partitioned WSANs and MSNs due to large scale damages or deployment...

    Provided By University of Missouri

  • White Papers // Jan 2013

    Ubiquitous Computing: Connecting Pervasive Computing through Semantic Web

    Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deals with acquiring context knowledge from the environment and providing dynamic, proactive and context-aware services to the user. A Ubiquitous computing environment is created by sharing...

    Provided By University of Missouri

  • White Papers // May 2013

    Probability-Based Adaptive Forwarding Strategy in Named Data Networking

    Forwarding strategy is an important research problem in Named Data Networking (NDN). A Probability-based Adaptive Forwarding (PAF) strategy is introduced in this paper. Ant colony optimization is customized to a dynamic NDN environment to compute the selection probabilities. In addition, the authors use a statistical model in PAF to compute...

    Provided By University of Missouri

  • White Papers // May 2013

    Viewing Youtube From a Metropolitan Area: What Do Users Accessing From Residential Isps Experience?

    In this paper, the authors perform a controlled study on the perceived experience of viewing YouTube videos as observed from the end users' point of view through their residential ISPs in a metropolitan area. This study is conducted using their tool Pytomo, which they developed to emulate the end users'...

    Provided By University of Missouri

  • White Papers // May 2013

    An Experimental Study on Dynamic Network Reconfiguration in a Virtualized Network Environment Using Autonomic Management

    In a virtualized network, network virtualization is achieved by creating multiple instances of virtual routers over existing physical routers. Critical aspects of network virtualization are resource allocation and resource re-allocation, especially in the case of router failures or re-allocation of routers due for maintenance. In this paper, the authors present...

    Provided By University of Missouri

  • White Papers // May 2013

    A Behavior Based Policy Management for Adaptive Trustworthiness Assignment in Future Network

    A secure network is considered to be an important goal of the Future Internet; one way which can be embodied is by having flexible and robust routing functionality with built-in security and trustworthy mechanisms. However, there is a fundamental and important challenge how to determine the trustworthiness to every traffic...

    Provided By University of Missouri

  • White Papers // Mar 2013

    Using Network Measure to Reduce State Space Enumeration in Resilient Networks

    Resilient network design has become a prominent research topic in the wake of recent disasters in Japan and the United States. Often communications networks that are designed to be highly reliable have significant outages when rare but important events occur. Finding rare events is generally difficult because it may require...

    Provided By University of Missouri

  • White Papers // Jun 2012

    Constructing a Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE)

    With Cloud Computing technology occupying the majority of future Internet research and development work, research on deploying and extending existing capabilities onto a newly emerging infrastructure becomes more significant. For example, extending the virtual network provisioning capability onto a Geo-distributed Programmable Layer-2 Networking Environment (G-PLaNE) is a novel attempt and...

    Provided By University of Missouri

  • White Papers // Sep 2011

    A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem

    Multilayer network design has received significant attention over the years. Despite this, the explicit modeling of three-layer networks such as IP/MPLS-over-OTN-over-DWDM in which the OTN layer is specifically considered has not been addressed before. In this paper, the authors present an optimization model for network planning of such multilayer networks...

    Provided By University of Missouri

  • White Papers // Sep 2011

    Estimating Optimal Cost of Allocating Virtualized Resources With Dynamic Demand

    Data centers are designed to provision sufficient virtualized resources at all times to meet the demands of users. Now-a-days the users who have "Elastic demand" take advantage of the "Pay-as-you-go" model and only request needed demands which vary over time. Considering the dynamics of the demand on virtualized resources is...

    Provided By University of Missouri

  • White Papers // Sep 2011

    Performance Impacts Due to Number Portability Under Various Routing Schemes

    Number portability provides users the capability to keep their telephone numbers as they moves to another provider. Number portability technology involves complicated architecture between different providers. From a routing perspective, and in order to simplify the model, the authors consider that the traversal of a call to a ported number...

    Provided By University of Missouri

  • White Papers // Apr 2010

    DReaM-Cache: Distributed Real-Time Transaction Memory Cache to Support Two-Factor Authentication Services and Its Reliability

    Phone-Factor is a two-factor authentication service that combines the knowledge-based authenticator with an object based authenticator in which the object-based authenticator has advantages of hardware token-based systems without requiring the administration overhead of distribution of special hardware to every user in advance. For transaction scalability of this service, the authors...

    Provided By University of Missouri

  • White Papers // Jul 2013

    Generalised Cheater Detection and Identification

    "Cheater detection and identification are important issues in the process of secret reconstruction. To detect and identify cheaters most of the algorithms need the dealer to generate and distribute additional information to shareholders. Recently, algorithms have been proposed to detect and identify cheaters. If more than t (i.e. the threshold)...

    Provided By University of Missouri

  • White Papers // May 2010

    Distributed Security for Multi-Agent Systems - Review and Applications

    "As two major communication technologies, the internet and wireless, are maturing rapidly to dominate civilized life, the authors urgently need to re-establish users' confidence to harvest new potential applications of large-scale distributed systems. Service agents and distributed Multi-Agent Systems (MASs) have shown the potential to help with this move as...

    Provided By University of Missouri