University of Nevada

Displaying 1-16 of 16 results

  • White Papers // Apr 2011

    Enhancing Data Privacy and Integrity in the Cloud

    Cloud computing is a new computing paradigm in which dynamically scalable resources are provided as a service over the Internet. One central concern in cloud computing is the privacy and integrity of data processed at the cloud. In this paper, the authors propose blind processing service using trusted computing mechanisms...

    Provided By University of Nevada

  • White Papers // Feb 2011

    On the Scalability of Path Exploration Using Opportunistic Path-Vector Routing

    It can be argued that, BGP, de-facto inter-domain routing protocol, provides fairly stable routes. Path stability is a desired product of that limited level of deterministic performance of BGP. To attain this performance level, BGP relies on keeping up-to-date (aggregated) global information by incurring the cost of control traffic and...

    Provided By University of Nevada

  • White Papers // Feb 2011

    Virtual Direction Multicast for Overlay Networks

    In this paper, the authors propose Virtual Direction Multicast (VDM) which aims to minimize network usage and disconnection time for video multicast applications on peer-to-peer overlay networks. It locates the end hosts relative to each other based on a virtualized orientation scheme. It builds multicast tree by connecting the nodes...

    Provided By University of Nevada

  • White Papers // Jan 2011

    Two-Market Inter-Domain Bandwidth Contracting

    An automated way of establishing inter-ISP contracts will enable ISPs to flexibly allocate their network resources to different contracts. However, this flexibility comes with the additional complexity in managing the ISP network and its risks. In this paper, the authors address how an ISP should assess the risk of a...

    Provided By University of Nevada

  • White Papers // Oct 2010

    Ensuring Access Control in Cloud Provisioned Healthcare Systems

    An important issues in cloud provisioned multi-tenant healthcare systems is the access control, which focuses on the protection of information against unauthorized access. As different tenants including hospitals, clinics, insurance companies, and pharmacies access the system, sensitive information should be provided only to authorized users and tenants. This paper analyzes...

    Provided By University of Nevada

  • White Papers // Sep 2010

    Open Cyber-Architecture for Electrical Energy Markets

    Automated control and management of large-scale physical systems is a challenging problem in a wide variety of applications including: Power grids, transportation networks, and telecommunication networks. Such systems require data collection, secure data transfer to processing centers, data processing, and timely decision making and control actions. These tasks are complicated...

    Provided By University of Nevada

  • White Papers // Jul 2010

    Packet-Based Simulation for Optical Wireless Communication

    This paper presents packet-based simulation tools for Free-Space-Optical (FSO) wireless communication. The authors implement the well-known propagation models for free-space-optical communication as a set of modules in NS-2. The focus is on accurately simulating Line-Of-Sight (LOS) requirement for two communicating antennas, the drop in the received power with respect to...

    Provided By University of Nevada

  • White Papers // Apr 2010

    Dynamic Overlay Single-Domain Contracting for End-to-End Contract-Switching

    The Internet's simple design resulted in huge success in basic telecommunication services. However, in terms of providing end-to-end QoS services, the Internet's architecture needs major shifts since it neither allows users to indicate their value choices at sufficient granularity nor providers to manage risks involved in investment for new innovative...

    Provided By University of Nevada

  • White Papers // Apr 2010

    Leadership Skills And Wages Revisited: Is There A Causal Relation?

    This paper examines the role of holding a leadership position in high school on adult earnings and assesses the sensitivity of the previously found positive association to nonrandom selection bias. Using a recently developed procedure, the authors show that a substantial part of this relation is causal. Moreover, the results...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Statistical Modeling of the Mechanical Behavior of the Spring, Mass and Damper Aeembly Using SAS

    Dampers in mechanical systems provide safety and comfort against dynamical and impact forces transmitted by external profiles. Since dampers are made of diverse elements, have a large range of performance variables. Therefore, analytical solution for predicting damper behavior is difficult. In the absence of analytical models, one of the popular...

    Provided By University of Nevada

  • White Papers // Mar 2010

    BMI Made Simple - What Is Your "Maximum Weight Limit ?

    BMI is a simple index of weight-for-height that is commonly used in screening overweight and obesity in adult populations. It is defined as the weight in kilograms divided by the square of the height in meters (kg/m2) and it the most widely used and universally accepted index. Because BMI measurement...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Multi-Transceiver Simulation Modules for Free-Space Optical Mobile Ad Hoc Networks

    This paper presents realistic simulation modules to assess characteristics of multi-transceiver Free-Space-Optical (FSO) mobile ad-hoc networks. The authors start with a physical propagation model for FSO communications in the context of Mobile Ad-hoc NETworks (MANETs). They specifically focus on the drop in power of the light beam and probability of...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Probabilistic Trans-Algorithmic Search for Automated Network Management and Configuration

    Online configuration of large-scale systems such as networks requires parameter optimization to be done within a limited amount of time. This time limit is even more pressing when configuration is needed as a recovery response to a failure in the system. To quickly configure such systems in an online manner,...

    Provided By University of Nevada

  • White Papers // Jan 2010

    An Application for Tree Detection Using Satellite Imagery and Vegetation Data

    Virtual reconstruction of large landscapes from satellite imagery can be a time-consuming task due to the number of objects that must be extracted. Poor image resolution and noise hinder automatic detection processes and thus must be corrected by the user. This paper describes an application that allows the user to...

    Provided By University of Nevada

  • White Papers // Jan 2010

    WiELD-CAVE: Wireless Ergonomic Lightweight Device for Use in the CAVE

    The goal of this project was to design a wireless input device for the CAVE virtual reality environment. The current solutions for this problem are not adequate, due to their high cost and wired nature. By eliminating these two problems, this team aimed to develop a more widely useable device...

    Provided By University of Nevada

  • White Papers // Sep 2009

    Load-Similar Node Distribution for Prolonging Network Lifetime in PMRC-Based Wireless Sensor Networks

    In this paper, the energy hole problem in Progressive Multi-hop Rotational Clustered (PMRC)-based Wireless Sensor Networks (WSNs) is studied. The authors first analyze the traffic load distribution in PMRC-based WSNs. Based on the analysis, they propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme...

    Provided By University of Nevada

  • White Papers // Oct 2010

    Ensuring Access Control in Cloud Provisioned Healthcare Systems

    An important issues in cloud provisioned multi-tenant healthcare systems is the access control, which focuses on the protection of information against unauthorized access. As different tenants including hospitals, clinics, insurance companies, and pharmacies access the system, sensitive information should be provided only to authorized users and tenants. This paper analyzes...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Statistical Modeling of the Mechanical Behavior of the Spring, Mass and Damper Aeembly Using SAS

    Dampers in mechanical systems provide safety and comfort against dynamical and impact forces transmitted by external profiles. Since dampers are made of diverse elements, have a large range of performance variables. Therefore, analytical solution for predicting damper behavior is difficult. In the absence of analytical models, one of the popular...

    Provided By University of Nevada

  • White Papers // Mar 2010

    BMI Made Simple - What Is Your "Maximum Weight Limit ?

    BMI is a simple index of weight-for-height that is commonly used in screening overweight and obesity in adult populations. It is defined as the weight in kilograms divided by the square of the height in meters (kg/m2) and it the most widely used and universally accepted index. Because BMI measurement...

    Provided By University of Nevada

  • White Papers // Apr 2010

    Leadership Skills And Wages Revisited: Is There A Causal Relation?

    This paper examines the role of holding a leadership position in high school on adult earnings and assesses the sensitivity of the previously found positive association to nonrandom selection bias. Using a recently developed procedure, the authors show that a substantial part of this relation is causal. Moreover, the results...

    Provided By University of Nevada

  • White Papers // Apr 2011

    Enhancing Data Privacy and Integrity in the Cloud

    Cloud computing is a new computing paradigm in which dynamically scalable resources are provided as a service over the Internet. One central concern in cloud computing is the privacy and integrity of data processed at the cloud. In this paper, the authors propose blind processing service using trusted computing mechanisms...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Multi-Transceiver Simulation Modules for Free-Space Optical Mobile Ad Hoc Networks

    This paper presents realistic simulation modules to assess characteristics of multi-transceiver Free-Space-Optical (FSO) mobile ad-hoc networks. The authors start with a physical propagation model for FSO communications in the context of Mobile Ad-hoc NETworks (MANETs). They specifically focus on the drop in power of the light beam and probability of...

    Provided By University of Nevada

  • White Papers // Apr 2010

    Dynamic Overlay Single-Domain Contracting for End-to-End Contract-Switching

    The Internet's simple design resulted in huge success in basic telecommunication services. However, in terms of providing end-to-end QoS services, the Internet's architecture needs major shifts since it neither allows users to indicate their value choices at sufficient granularity nor providers to manage risks involved in investment for new innovative...

    Provided By University of Nevada

  • White Papers // Jan 2010

    An Application for Tree Detection Using Satellite Imagery and Vegetation Data

    Virtual reconstruction of large landscapes from satellite imagery can be a time-consuming task due to the number of objects that must be extracted. Poor image resolution and noise hinder automatic detection processes and thus must be corrected by the user. This paper describes an application that allows the user to...

    Provided By University of Nevada

  • White Papers // Jan 2010

    WiELD-CAVE: Wireless Ergonomic Lightweight Device for Use in the CAVE

    The goal of this project was to design a wireless input device for the CAVE virtual reality environment. The current solutions for this problem are not adequate, due to their high cost and wired nature. By eliminating these two problems, this team aimed to develop a more widely useable device...

    Provided By University of Nevada

  • White Papers // Mar 2010

    Probabilistic Trans-Algorithmic Search for Automated Network Management and Configuration

    Online configuration of large-scale systems such as networks requires parameter optimization to be done within a limited amount of time. This time limit is even more pressing when configuration is needed as a recovery response to a failure in the system. To quickly configure such systems in an online manner,...

    Provided By University of Nevada

  • White Papers // Jul 2010

    Packet-Based Simulation for Optical Wireless Communication

    This paper presents packet-based simulation tools for Free-Space-Optical (FSO) wireless communication. The authors implement the well-known propagation models for free-space-optical communication as a set of modules in NS-2. The focus is on accurately simulating Line-Of-Sight (LOS) requirement for two communicating antennas, the drop in the received power with respect to...

    Provided By University of Nevada

  • White Papers // Sep 2010

    Open Cyber-Architecture for Electrical Energy Markets

    Automated control and management of large-scale physical systems is a challenging problem in a wide variety of applications including: Power grids, transportation networks, and telecommunication networks. Such systems require data collection, secure data transfer to processing centers, data processing, and timely decision making and control actions. These tasks are complicated...

    Provided By University of Nevada

  • White Papers // Feb 2011

    Virtual Direction Multicast for Overlay Networks

    In this paper, the authors propose Virtual Direction Multicast (VDM) which aims to minimize network usage and disconnection time for video multicast applications on peer-to-peer overlay networks. It locates the end hosts relative to each other based on a virtualized orientation scheme. It builds multicast tree by connecting the nodes...

    Provided By University of Nevada

  • White Papers // Feb 2011

    On the Scalability of Path Exploration Using Opportunistic Path-Vector Routing

    It can be argued that, BGP, de-facto inter-domain routing protocol, provides fairly stable routes. Path stability is a desired product of that limited level of deterministic performance of BGP. To attain this performance level, BGP relies on keeping up-to-date (aggregated) global information by incurring the cost of control traffic and...

    Provided By University of Nevada

  • White Papers // Jan 2011

    Two-Market Inter-Domain Bandwidth Contracting

    An automated way of establishing inter-ISP contracts will enable ISPs to flexibly allocate their network resources to different contracts. However, this flexibility comes with the additional complexity in managing the ISP network and its risks. In this paper, the authors address how an ISP should assess the risk of a...

    Provided By University of Nevada

  • White Papers // Sep 2009

    Load-Similar Node Distribution for Prolonging Network Lifetime in PMRC-Based Wireless Sensor Networks

    In this paper, the energy hole problem in Progressive Multi-hop Rotational Clustered (PMRC)-based Wireless Sensor Networks (WSNs) is studied. The authors first analyze the traffic load distribution in PMRC-based WSNs. Based on the analysis, they propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme...

    Provided By University of Nevada