University of Nebraska-Lincoln

Displaying 1-23 of 23 results

  • White Papers // Aug 2012

    A Probabilistic Quantum Key Transfer Protocol

    The authors propose a protocol to transfer a one-time-pad (in a probabilistic manner) from Alice to Bob, over a public channel. The proposed protocol is unique because Bob merely acts as the receiver of the pad (secret key), i.e. Bob does not need to send any message back to Alice...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2012

    A Quasigroup Based Random Number Generator for Resource Constrained Environments

    Pseudo Random Number Generators (PRNG) play an important role in computing and communication technology, whether it be for online gambling, reducing collisions on Ethernet networks, or securing data through cryptographic techniques. This paper proposes a Pseudo Random Number Generator (PRNG) based on quasigroups. The proposed PRNG has low memory requirements,...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2012

    A Fast Dual-Level Fingerprinting Scheme for Data Deduplication

    Data deduplication has attracted recent interest in the research community. Several approaches are proposed to eliminate duplicate data first at the file level and then at the chunk level to reduce the duplicate-lookup complexity. To meet the high-throughput requirements, this paper proposes a Fast Dual-level Fingerprinting (FDF) scheme that can...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2011

    Measuring An Information Security Awareness Program

    Research shows security awareness lacks a uniform definition. This paper explores the various attempts that have been made to define security awareness and then presents a clear and concise definition of security awareness. Due to the lack of a behaviorally-oriented measurement, security awareness has relied on the use of self-reported...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2011

    Real-Time Sensing Through the Continent: Towards Monitoring Migratory Birds Using Multi-Modal Wireless Sensor Networks

    Low-cost wireless sensor networks offer novel information gathering and research opportunities for conservation efforts. In this paper, a multi-modal wireless sensor network is presented for monitoring the migration of Whooping Cranes, an endangered species that conducts an annual migration of 4, 000 km between southern Texas and north-central Canada. The...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    Versioning for Mashups - An Exploratory Study

    End users with little software background are developing numerous software applications using devices such as spreadsheets, web mashups, and web macros. Web mashups are particularly popular because they are easy to create and there are large public repositories that store them and allow their reuse. Existing repositories, however, provide no...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    A Channel Model for Wireless Underground Sensor Networks Using Lateral Waves

    Wireless Underground Sensor Networks (WUSNs) are an emerging type of Wireless Sensor Networks (WSNs), where sensor nodes are located under the ground and communicate through soil. The major challenge in the development of efficient communication protocols for WUSNs is the characterization of the underground channel. So far, none of the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2011

    Using Property-Based Oracles When Testing Embedded System Applications

    Embedded systems are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques could improve the dependability of these systems. In prior work, the authors presented an approach for testing embedded systems, focusing on embedded system applications and the tasks that comprise them. In this...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2011

    VillageNet: A Low-Cost, 802.11-Based Mesh Network for Rural Regions

    VillageNet is a wireless mesh network that aims to provide low-cost broadband Internet access for rural regions. The cost of building the network is kept low by using off-the-shelf IEEE 802.11 equipment and optimizing the network topology to minimize cost. This paper describes the over-all operation of VillageNet and discusses...

    Provided By University of Nebraska-Lincoln

  • White Papers // Nov 2010

    Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints

    In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect Channel Side Information (CSI) is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2010

    Testing Inter-Layer and Inter-Task Interactions in RTES Applications

    Real-Time Embedded Systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques could improve the dependability of these systems. In this paper, the authors present an approach for testing RTESs, intended specifically to help RTES application developers detect faults related to functional...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2010

    An Application of IEEE 802.11 and 802.3 for a University Bike-Share Program

    A recently-started university bike-share program was in need of improvements in existing capabilities. The program utilized an honor system which lacked bike security, user accountability, and administrative control and monitoring. The program administrator approached the engineering college for a solution, which was taken up as a senior project. The team...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Authentic Leadership: Development And Validation Of A Theory-Based Measure

    This paper develops and tests a theory-based measure of authentic leadership using five separate samples obtained from China, Kenya, and the United States. Confirmatory factor analyses supported a higher order, multidimensional model of the authentic leadership construct (the Authentic Leadership Questionnaire [ALQ]) comprising leader self-awareness, relational transparency, internalized moral perspective,...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Improving Multi-View Peer-to-Peer Live Streaming Systems With the Divide-and-Conquer Strategy

    Multi-view Peer-To-Peer (P2P) live streaming systems have recently emerged, where a user is allowed to simultaneously watch one or multiple channels. Previous work on building multi-view P2P streaming systems requires network coding in data block scheduling within each channel, since it solves the fundamental inter-channel bandwidth competition problem at the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2010

    Comparing Multi-Channel Peer-to-Peer Streaming System Designs

    Peer-To-Peer (P2P) video streaming systems, including both live streaming and Video-On-Demand (VOD) applications, have been hugely successful in providing multimedia streaming services with hundreds of channels (e.g. UUSee claims to provide about 10,000 channels). Other similar large-scale industry deployments including PPStream, CoolStreaming and PPLive, support hundreds of channels with tens...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Repairing GUI Test Suites Using a Genetic Algorithm

    Recent advances in automated functional testing of Graphical User Interfaces (GUIs) rely on deriving graph models that approximate all possible sequences of events that may be executed on the GUI, and then use the graphs to generate test cases (event sequences) that achieve a specified coverage goal. However, because these...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Querying Spatiotemporal XML Using DataFoX

    This paper describes DataFoX, which is a new query language for XML documents and extends Datalog with support for trees as the domain of the variables. This paper also introduces for DataFoX a layer algebra, which supports data heterogeneity at the language level, and several algebra-based evaluation techniques. XML is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    SDRCS: A Service-Differentiated Real-Time Communication Scheme for Event Sensing in Wireless Sensor Networks

    Real-time communication is important for Wireless Sensor Networks (WSNs) to accomplish collaborative event sensing tasks with specific timing constraints. In this paper, a Service-Differentiated Real-time Communication Scheme (SDRCS) is proposed to provide soft real-time guarantees for event-based converge-cast traffic in WSNs. SDRCS features a cross-layer packet forwarding design to integrate...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    Reducing Cross-ISP Traffic of P2P Systems: The End or the Beginning of P2P Traffic Control

    As Peer-To-Peer (P2P) systems are widely deployed in the Internet, P2P traffic control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors. Some recent works consider the interaction between ISPs and P2P systems and propose ISP-friendly P2P traffic control mechanisms for reducing cross-ISP traffic. In this paper,...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    Testing Inter-Layer and Inter-Task Interactions in Real-Time Embedded Systems

    Real-time embedded systems are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Testing is the most commonly used method for validating software systems, and effective testing methodologies could be helpful for improving the dependability of these systems. In this paper the authors present a methodology for...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    MIMO Wireless Communications Under Statistical Queueing Constraints

    The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2009

    Framework to Improve Mobile Robot's Navigation Using Wireless Sensor Modules

    As on-going research, this paper presents a framework to improve wireless mobile robot's navigational accuracy in diverse indoor environments where the signals are affected by various types of interference including electromagnetic, multi-path, and fading and scattering. In particular, indoor construction environments pose unique challenges to accurate wireless navigation due to...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2009

    Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks

    Emerging applications of Wireless Sensor Networks (WSNs) require real-time Quality of Service (QoS) guarantees to be provided by the network. However, designing real-time scheduling and communication solutions for these networks is challenging since the characteristics of QoS metrics in WSNs are not well known yet. Due to the nature of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Sep 2009

    Framework to Improve Mobile Robot's Navigation Using Wireless Sensor Modules

    As on-going research, this paper presents a framework to improve wireless mobile robot's navigational accuracy in diverse indoor environments where the signals are affected by various types of interference including electromagnetic, multi-path, and fading and scattering. In particular, indoor construction environments pose unique challenges to accurate wireless navigation due to...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Querying Spatiotemporal XML Using DataFoX

    This paper describes DataFoX, which is a new query language for XML documents and extends Datalog with support for trees as the domain of the variables. This paper also introduces for DataFoX a layer algebra, which supports data heterogeneity at the language level, and several algebra-based evaluation techniques. XML is...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Authentic Leadership: Development And Validation Of A Theory-Based Measure

    This paper develops and tests a theory-based measure of authentic leadership using five separate samples obtained from China, Kenya, and the United States. Confirmatory factor analyses supported a higher order, multidimensional model of the authentic leadership construct (the Authentic Leadership Questionnaire [ALQ]) comprising leader self-awareness, relational transparency, internalized moral perspective,...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2011

    VillageNet: A Low-Cost, 802.11-Based Mesh Network for Rural Regions

    VillageNet is a wireless mesh network that aims to provide low-cost broadband Internet access for rural regions. The cost of building the network is kept low by using off-the-shelf IEEE 802.11 equipment and optimizing the network topology to minimize cost. This paper describes the over-all operation of VillageNet and discusses...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2010

    Repairing GUI Test Suites Using a Genetic Algorithm

    Recent advances in automated functional testing of Graphical User Interfaces (GUIs) rely on deriving graph models that approximate all possible sequences of events that may be executed on the GUI, and then use the graphs to generate test cases (event sequences) that achieve a specified coverage goal. However, because these...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    A Channel Model for Wireless Underground Sensor Networks Using Lateral Waves

    Wireless Underground Sensor Networks (WUSNs) are an emerging type of Wireless Sensor Networks (WSNs), where sensor nodes are located under the ground and communicate through soil. The major challenge in the development of efficient communication protocols for WUSNs is the characterization of the underground channel. So far, none of the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    SDRCS: A Service-Differentiated Real-Time Communication Scheme for Event Sensing in Wireless Sensor Networks

    Real-time communication is important for Wireless Sensor Networks (WSNs) to accomplish collaborative event sensing tasks with specific timing constraints. In this paper, a Service-Differentiated Real-time Communication Scheme (SDRCS) is proposed to provide soft real-time guarantees for event-based converge-cast traffic in WSNs. SDRCS features a cross-layer packet forwarding design to integrate...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2009

    Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks

    Emerging applications of Wireless Sensor Networks (WSNs) require real-time Quality of Service (QoS) guarantees to be provided by the network. However, designing real-time scheduling and communication solutions for these networks is challenging since the characteristics of QoS metrics in WSNs are not well known yet. Due to the nature of...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    Testing Inter-Layer and Inter-Task Interactions in Real-Time Embedded Systems

    Real-time embedded systems are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Testing is the most commonly used method for validating software systems, and effective testing methodologies could be helpful for improving the dependability of these systems. In this paper the authors present a methodology for...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2009

    MIMO Wireless Communications Under Statistical Queueing Constraints

    The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2011

    Real-Time Sensing Through the Continent: Towards Monitoring Migratory Birds Using Multi-Modal Wireless Sensor Networks

    Low-cost wireless sensor networks offer novel information gathering and research opportunities for conservation efforts. In this paper, a multi-modal wireless sensor network is presented for monitoring the migration of Whooping Cranes, an endangered species that conducts an annual migration of 4, 000 km between southern Texas and north-central Canada. The...

    Provided By University of Nebraska-Lincoln

  • White Papers // Feb 2010

    Comparing Multi-Channel Peer-to-Peer Streaming System Designs

    Peer-To-Peer (P2P) video streaming systems, including both live streaming and Video-On-Demand (VOD) applications, have been hugely successful in providing multimedia streaming services with hundreds of channels (e.g. UUSee claims to provide about 10,000 channels). Other similar large-scale industry deployments including PPStream, CoolStreaming and PPLive, support hundreds of channels with tens...

    Provided By University of Nebraska-Lincoln

  • White Papers // Dec 2009

    Reducing Cross-ISP Traffic of P2P Systems: The End or the Beginning of P2P Traffic Control

    As Peer-To-Peer (P2P) systems are widely deployed in the Internet, P2P traffic control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors. Some recent works consider the interaction between ISPs and P2P systems and propose ISP-friendly P2P traffic control mechanisms for reducing cross-ISP traffic. In this paper,...

    Provided By University of Nebraska-Lincoln

  • White Papers // May 2010

    Improving Multi-View Peer-to-Peer Live Streaming Systems With the Divide-and-Conquer Strategy

    Multi-view Peer-To-Peer (P2P) live streaming systems have recently emerged, where a user is allowed to simultaneously watch one or multiple channels. Previous work on building multi-view P2P streaming systems requires network coding in data block scheduling within each channel, since it solves the fundamental inter-channel bandwidth competition problem at the...

    Provided By University of Nebraska-Lincoln

  • White Papers // Oct 2010

    Testing Inter-Layer and Inter-Task Interactions in RTES Applications

    Real-Time Embedded Systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques could improve the dependability of these systems. In this paper, the authors present an approach for testing RTESs, intended specifically to help RTES application developers detect faults related to functional...

    Provided By University of Nebraska-Lincoln

  • White Papers // Nov 2010

    Secure Wireless Communication and Optimal Power Control Under Statistical Queueing Constraints

    In this paper, secure transmission of information over fading broadcast channels is studied in the presence of statistical queueing constraints. Effective capacity is employed as a performance metric to identify the secure throughput of the system, i.e., effective secure throughput. It is assumed that perfect Channel Side Information (CSI) is...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jun 2010

    An Application of IEEE 802.11 and 802.3 for a University Bike-Share Program

    A recently-started university bike-share program was in need of improvements in existing capabilities. The program utilized an honor system which lacked bike security, user accountability, and administrative control and monitoring. The program administrator approached the engineering college for a solution, which was taken up as a senior project. The team...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2011

    Using Property-Based Oracles When Testing Embedded System Applications

    Embedded systems are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques could improve the dependability of these systems. In prior work, the authors presented an approach for testing embedded systems, focusing on embedded system applications and the tasks that comprise them. In this...

    Provided By University of Nebraska-Lincoln

  • White Papers // Mar 2011

    Versioning for Mashups - An Exploratory Study

    End users with little software background are developing numerous software applications using devices such as spreadsheets, web mashups, and web macros. Web mashups are particularly popular because they are easy to create and there are large public repositories that store them and allow their reuse. Existing repositories, however, provide no...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2011

    Measuring An Information Security Awareness Program

    Research shows security awareness lacks a uniform definition. This paper explores the various attempts that have been made to define security awareness and then presents a clear and concise definition of security awareness. Due to the lack of a behaviorally-oriented measurement, security awareness has relied on the use of self-reported...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jan 2012

    A Fast Dual-Level Fingerprinting Scheme for Data Deduplication

    Data deduplication has attracted recent interest in the research community. Several approaches are proposed to eliminate duplicate data first at the file level and then at the chunk level to reduce the duplicate-lookup complexity. To meet the high-throughput requirements, this paper proposes a Fast Dual-level Fingerprinting (FDF) scheme that can...

    Provided By University of Nebraska-Lincoln

  • White Papers // Aug 2012

    A Probabilistic Quantum Key Transfer Protocol

    The authors propose a protocol to transfer a one-time-pad (in a probabilistic manner) from Alice to Bob, over a public channel. The proposed protocol is unique because Bob merely acts as the receiver of the pad (secret key), i.e. Bob does not need to send any message back to Alice...

    Provided By University of Nebraska-Lincoln

  • White Papers // Jul 2012

    A Quasigroup Based Random Number Generator for Resource Constrained Environments

    Pseudo Random Number Generators (PRNG) play an important role in computing and communication technology, whether it be for online gambling, reducing collisions on Ethernet networks, or securing data through cryptographic techniques. This paper proposes a Pseudo Random Number Generator (PRNG) based on quasigroups. The proposed PRNG has low memory requirements,...

    Provided By University of Nebraska-Lincoln