University of Nebraska-Lincoln

Displaying 1-22 of 22 results

  • White Papers // Mar 2011

    Versioning for Mashups - An Exploratory Study

    End users with little software background are developing numerous software applications using devices such as spreadsheets, web mashups, and web macros. Web mashups are particularly popular because they are easy to create and there are large public repositories that store them and allow their reuse. Existing repositories, however, provide no...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    A Channel Model for Wireless Underground Sensor Networks Using Lateral Waves

    Wireless Underground Sensor Networks (WUSNs) are an emerging type of Wireless Sensor Networks (WSNs), where sensor nodes are located under the ground and communicate through soil. The major challenge in the development of efficient communication protocols for WUSNs is the characterization of the underground channel. So far, none of the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Nov 2010

    Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints

    In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect Channel Side Information (CSI) is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2010

    An Application of IEEE 802.11 and 802.3 for a University Bike-Share Program

    A recently-started university bike-share program was in need of improvements in existing capabilities. The program utilized an honor system which lacked bike security, user accountability, and administrative control and monitoring. The program administrator approached the engineering college for a solution, which was taken up as a senior project. The team...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Improving Multi-View Peer-to-Peer Live Streaming Systems With the Divide-and-Conquer Strategy

    Multi-view Peer-To-Peer (P2P) live streaming systems have recently emerged, where a user is allowed to simultaneously watch one or multiple channels. Previous work on building multi-view P2P streaming systems requires network coding in data block scheduling within each channel, since it solves the fundamental inter-channel bandwidth competition problem at the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2010

    Comparing Multi-Channel Peer-to-Peer Streaming System Designs

    Peer-To-Peer (P2P) video streaming systems, including both live streaming and Video-On-Demand (VOD) applications, have been hugely successful in providing multimedia streaming services with hundreds of channels (e.g. UUSee claims to provide about 10,000 channels). Other similar large-scale industry deployments including PPStream, CoolStreaming and PPLive, support hundreds of channels with tens...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Repairing GUI Test Suites Using a Genetic Algorithm

    Recent advances in automated functional testing of Graphical User Interfaces (GUIs) rely on deriving graph models that approximate all possible sequences of events that may be executed on the GUI, and then use the graphs to generate test cases (event sequences) that achieve a specified coverage goal. However, because these...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Querying Spatiotemporal XML Using DataFoX

    This paper describes DataFoX, which is a new query language for XML documents and extends Datalog with support for trees as the domain of the variables. This paper also introduces for DataFoX a layer algebra, which supports data heterogeneity at the language level, and several algebra-based evaluation techniques. XML is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    Reducing Cross-ISP Traffic of P2P Systems: The End or the Beginning of P2P Traffic Control

    As Peer-To-Peer (P2P) systems are widely deployed in the Internet, P2P traffic control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors. Some recent works consider the interaction between ISPs and P2P systems and propose ISP-friendly P2P traffic control mechanisms for reducing cross-ISP traffic. In this paper,...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    MIMO Wireless Communications Under Statistical Queueing Constraints

    The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2009

    Framework to Improve Mobile Robot's Navigation Using Wireless Sensor Modules

    As on-going research, this paper presents a framework to improve wireless mobile robot's navigational accuracy in diverse indoor environments where the signals are affected by various types of interference including electromagnetic, multi-path, and fading and scattering. In particular, indoor construction environments pose unique challenges to accurate wireless navigation due to...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2009

    Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks

    Emerging applications of Wireless Sensor Networks (WSNs) require real-time Quality of Service (QoS) guarantees to be provided by the network. However, designing real-time scheduling and communication solutions for these networks is challenging since the characteristics of QoS metrics in WSNs are not well known yet. Due to the nature of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    The Impact of Hard-Decision Detection on the Energy Efficiency of Phase and Frequency Modulation

    The central design challenge in next generation wireless systems is to have these systems operate at high bandwidths and provide high data rates while being cognizant of the energy consumption levels especially in mobile applications. Since communicating at very high data rates prohibits obtaining high bit resolutions from the Analog-to-Digital...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    Energy-Efficient Modulation Design For Reliable Communication in Wireless Networks

    In this paper, the authors have considered the optimization of the M-ary Quadrature Amplitude Modulation (MQAM) constellation size to minimize the bit energy consumption under average Bit Error Rate (BER) constraints. In the computation of the energy expenditure, the circuit, transmission, and retransmission energies are taken into account. A combined...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning

    In this paper, cognitive transmission under Quality of Service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sends the data at two different average power levels, depending on the activity of the primary users, which is determined by channel sensing performed...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2009

    DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks

    Slot assignment is the core component of TDMA (Time Division Multiple Access) protocols in wireless networks. For a given network where wireless nodes are communicating over the same radio frequency, if two nodes in close proximity transmit at the same time and their signal interference ranges include a node that...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2009

    IDEAS: An Identity-Based Security Architecture for Large-Scale and High-Performance Storage Systems

    The authors develop IDEAS, identity-based security architecture for large-scale and high-performance storage systems, designed to improve security, convenience and total cost of access control by merging identity management with access control in these systems. IDEAS authenticates users at each I/O node by using a single-identity certificate without the service of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Low-SNR Analysis of Interference Channels Under Secrecy Constraints

    The open nature of wireless communications allows for the signals to be received by all users within the communication range. Thus, wireless communication is vulnerable to eavesdropping. This problem was first studied by Wyner, who proposed a wiretap channel model. In this model, a single source-destination communication link is eavesdropped...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Energy Efficiency of Fixed-Rate Wireless Transmissions Under Queueing Constraints and Channel Uncertainty

    Energy efficiency of fixed-rate transmissions is studied in the presence of queueing constraints and channel uncertainty. It is assumed that neither the transmitter nor the receiver has channel side information prior to transmission. The channel coefficients are estimated at the receiver via Minimum Mean-Square-Error (MMSE) estimation with the aid of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    Secure transmission of confidential messages is a critical issue in communication systems and especially in wireless systems due to the broadcast nature of wireless transmissions. In, Wyner addressed the transmission security from an information-theoretic point of view, and identified the rate-equivocation region and established the secrecy capacity of the discrete...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2008

    The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate Wireless Transmissions

    Transmission over wireless fading channels under Quality of Service (QoS) constraints is studied when only the receiver has channel side information. Being unaware of the channel conditions, transmitter is assumed to send the information at a fixed rate. Under these assumptions, a two-state (ON-OFF) transmission model is adopted, where information...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2008

    On Incorporating Learning Theories to Simulate a Computer-Supported Collaborative Learning Environment

    The success of a Computer-Supported Collaborative Learning (CSCL) environment in improving student knowledge depends on factors like student attributes (e.g., ability and motivation) and elements of the CSCL environment (e.g., group size and group formation). Better understanding of the individual and combined effects of these factors on the learning outcome...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Low-SNR Analysis of Interference Channels Under Secrecy Constraints

    The open nature of wireless communications allows for the signals to be received by all users within the communication range. Thus, wireless communication is vulnerable to eavesdropping. This problem was first studied by Wyner, who proposed a wiretap channel model. In this model, a single source-destination communication link is eavesdropped...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2010

    Comparing Multi-Channel Peer-to-Peer Streaming System Designs

    Peer-To-Peer (P2P) video streaming systems, including both live streaming and Video-On-Demand (VOD) applications, have been hugely successful in providing multimedia streaming services with hundreds of channels (e.g. UUSee claims to provide about 10,000 channels). Other similar large-scale industry deployments including PPStream, CoolStreaming and PPLive, support hundreds of channels with tens...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Energy Efficiency of Fixed-Rate Wireless Transmissions Under Queueing Constraints and Channel Uncertainty

    Energy efficiency of fixed-rate transmissions is studied in the presence of queueing constraints and channel uncertainty. It is assumed that neither the transmitter nor the receiver has channel side information prior to transmission. The channel coefficients are estimated at the receiver via Minimum Mean-Square-Error (MMSE) estimation with the aid of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2009

    IDEAS: An Identity-Based Security Architecture for Large-Scale and High-Performance Storage Systems

    The authors develop IDEAS, identity-based security architecture for large-scale and high-performance storage systems, designed to improve security, convenience and total cost of access control by merging identity management with access control in these systems. IDEAS authenticates users at each I/O node by using a single-identity certificate without the service of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2008

    The Impact of QoS Constraints on the Energy Efficiency of Fixed-Rate Wireless Transmissions

    Transmission over wireless fading channels under Quality of Service (QoS) constraints is studied when only the receiver has channel side information. Being unaware of the channel conditions, transmitter is assumed to send the information at a fixed rate. Under these assumptions, a two-state (ON-OFF) transmission model is adopted, where information...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    Reducing Cross-ISP Traffic of P2P Systems: The End or the Beginning of P2P Traffic Control

    As Peer-To-Peer (P2P) systems are widely deployed in the Internet, P2P traffic control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors. Some recent works consider the interaction between ISPs and P2P systems and propose ISP-friendly P2P traffic control mechanisms for reducing cross-ISP traffic. In this paper,...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    Energy-Efficient Modulation Design For Reliable Communication in Wireless Networks

    In this paper, the authors have considered the optimization of the M-ary Quadrature Amplitude Modulation (MQAM) constellation size to minimize the bit energy consumption under average Bit Error Rate (BER) constraints. In the computation of the energy expenditure, the circuit, transmission, and retransmission energies are taken into account. A combined...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Improving Multi-View Peer-to-Peer Live Streaming Systems With the Divide-and-Conquer Strategy

    Multi-view Peer-To-Peer (P2P) live streaming systems have recently emerged, where a user is allowed to simultaneously watch one or multiple channels. Previous work on building multi-view P2P streaming systems requires network coding in data block scheduling within each channel, since it solves the fundamental inter-channel bandwidth competition problem at the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning

    In this paper, cognitive transmission under Quality of Service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sends the data at two different average power levels, depending on the activity of the primary users, which is determined by channel sensing performed...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2010

    An Application of IEEE 802.11 and 802.3 for a University Bike-Share Program

    A recently-started university bike-share program was in need of improvements in existing capabilities. The program utilized an honor system which lacked bike security, user accountability, and administrative control and monitoring. The program administrator approached the engineering college for a solution, which was taken up as a senior project. The team...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Repairing GUI Test Suites Using a Genetic Algorithm

    Recent advances in automated functional testing of Graphical User Interfaces (GUIs) rely on deriving graph models that approximate all possible sequences of events that may be executed on the GUI, and then use the graphs to generate test cases (event sequences) that achieve a specified coverage goal. However, because these...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    Versioning for Mashups - An Exploratory Study

    End users with little software background are developing numerous software applications using devices such as spreadsheets, web mashups, and web macros. Web mashups are particularly popular because they are easy to create and there are large public repositories that store them and allow their reuse. Existing repositories, however, provide no...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    MIMO Wireless Communications Under Statistical Queueing Constraints

    The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    A Channel Model for Wireless Underground Sensor Networks Using Lateral Waves

    Wireless Underground Sensor Networks (WUSNs) are an emerging type of Wireless Sensor Networks (WSNs), where sensor nodes are located under the ground and communicate through soil. The major challenge in the development of efficient communication protocols for WUSNs is the characterization of the underground channel. So far, none of the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2009

    Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks

    Emerging applications of Wireless Sensor Networks (WSNs) require real-time Quality of Service (QoS) guarantees to be provided by the network. However, designing real-time scheduling and communication solutions for these networks is challenging since the characteristics of QoS metrics in WSNs are not well known yet. Due to the nature of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2008

    On Incorporating Learning Theories to Simulate a Computer-Supported Collaborative Learning Environment

    The success of a Computer-Supported Collaborative Learning (CSCL) environment in improving student knowledge depends on factors like student attributes (e.g., ability and motivation) and elements of the CSCL environment (e.g., group size and group formation). Better understanding of the individual and combined effects of these factors on the learning outcome...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2009

    Framework to Improve Mobile Robot's Navigation Using Wireless Sensor Modules

    As on-going research, this paper presents a framework to improve wireless mobile robot's navigational accuracy in diverse indoor environments where the signals are affected by various types of interference including electromagnetic, multi-path, and fading and scattering. In particular, indoor construction environments pose unique challenges to accurate wireless navigation due to...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Querying Spatiotemporal XML Using DataFoX

    This paper describes DataFoX, which is a new query language for XML documents and extends Datalog with support for trees as the domain of the variables. This paper also introduces for DataFoX a layer algebra, which supports data heterogeneity at the language level, and several algebra-based evaluation techniques. XML is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2009

    DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks

    Slot assignment is the core component of TDMA (Time Division Multiple Access) protocols in wireless networks. For a given network where wireless nodes are communicating over the same radio frequency, if two nodes in close proximity transmit at the same time and their signal interference ranges include a node that...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2009

    The Impact of Hard-Decision Detection on the Energy Efficiency of Phase and Frequency Modulation

    The central design challenge in next generation wireless systems is to have these systems operate at high bandwidths and provide high data rates while being cognizant of the energy consumption levels especially in mobile applications. Since communicating at very high data rates prohibits obtaining high bit resolutions from the Analog-to-Digital...

    Provided By University of Nebraska-Lincoln

  • White Papers // Nov 2010

    Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints

    In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect Channel Side Information (CSI) is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2009

    Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff

    Secure transmission of confidential messages is a critical issue in communication systems and especially in wireless systems due to the broadcast nature of wireless transmissions. In, Wyner addressed the transmission security from an information-theoretic point of view, and identified the rate-equivocation region and established the secrecy capacity of the discrete...

    Provided By University of Nebraska-Lincoln