University of Northern Iowa

Displaying 1-40 of 56 results

  • White Papers // Mar 2014

    Accelerating Comparative Genomics Workflows in a Distributed Environment with Optimized Data Partitioning

    The advent of new sequencing technology has generated massive amounts of biological data at unprecedented rates. High-throughput bioinformatics tools are required to keep pace with this. Here, the authors implement a workflow-based model for parallelizing the data intensive task of genome alignment and variant calling with BWA and GATK's HaplotypeCaller....

    Provided By University of Northern Iowa

  • White Papers // Mar 2014

    Expanding Tasks of Logical Workflows into Independent Workflows for Improved Scalability

    Workflow management systems, such as Galaxy and Taverna, provide a portal through which data can be processed using a sequence of different tools. This sequence allows for the creation of a logical workflow that describes the process. However, when the data workload becomes large enough the time spent in each...

    Provided By University of Northern Iowa

  • White Papers // Oct 2013

    Energy Aware Real-Time Scheduling Policy with Guaranteed Security Protection

    In this paper, the authors address the emerging scheduling problem existed in the design of secure and energy-efficient real-time embedded systems. The objective is to minimize the energy consumption subject to security and schedulability constraints. Due to the complexity of the problem, they propose a dynamic programming based approximation approach...

    Provided By University of Northern Iowa

  • White Papers // Jul 2013

    Hosted Science: Managing Computational Workflows in the Cloud

    Scientists today are exploring the use of new tools and computing platforms to do their science. They are using workflow management tools to describe and manage complex applications and are evaluating the features and performance of clouds to see if they meet their computational needs. Although today, hosting is limited...

    Provided By University of Northern Iowa

  • White Papers // Jun 2013

    Diversity Polynomials for the Analysis of Temporal Correlations in Wireless Networks

    The interference in wireless networks is temporally correlated, since the node or user locations are correlated over time and the interfering transmitters are a subset of these nodes. For a wireless network where (potential) interferers form a Poisson point process and use ALOHA for channel access, the authors calculate the...

    Provided By University of Northern Iowa

  • White Papers // May 2013

    A Versatile Dependent Model for Heterogeneous Cellular Networks

    Due to the increasing spatial irregularity of cellular systems, point process models are ideally suited for analysis and simulation. When modeling multiple tiers, including macro-, micro-, and femto-tiers, a natural choice is the superposition of independent Poisson Point Processes (PPPs), each one modeling the locations of the base stations of...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    On Decoding the Kth Strongest User in Poisson Networks With Arbitrary Fading Distribution

    Consider a d-dimensional network whose transmitters form a non-uniform Poisson point process and whose links are subject to arbitrary fading. Assuming interference from the k-1 strongest users is canceled, the authors derive the probability of decoding the k-th strongest user in closed-form. As a special case, when k=1, this probability...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    The Aggregate Throughput in Random Wireless Networks With Successive Interference Cancellation

    The feasibility of Successive Interference Cancellation (SIC) depends on the received power ordering from different users, which, in turn, depends on the fading distribution, path loss function and network geometry. Using a framework based on stochastic geometry, this paper studies the aggregate throughput in d-dimensional random wireless networks with SIC...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    Joint Channel/Network Coding for Star Networks

    Channel coding alone is not sufficient to reliably transmit a message of finite length from a source to one or more destinations as in, e.g., file transfer. To ensure that no data is lost, it must be combined with rateless erasure correcting schemes on a higher layer, such as a...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    Delay Scaling in Poisson Networks

    The local delay, defined as the mean time it takes a node to connect to its nearest neighbor, is a fundamental performance metric in a wireless network. For a network with Poisson distributed nodes, the authors find its scaling behavior (as a function of the rate of transmission) for different...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Adaptive Web Services Monitoring in Cloud Environments

    Cloud computing environments provide flexible infrastructures for third-party management of organizations' Information Technology (IT) assets. With web services being a standard for realizing web-based business capabilities, the emergence of cloud computing will bring new challenges to different web service activities. In this paper, the authors propose an agent-based framework that...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Adaptive Resource Management for Service Workflows in Cloud Environments

    Cloud computing enables the on-demand provisioning of virtualized resources to its hosted applications and services to satisfy their fluctuating resource needs. As business processes and scientific jobs become more intricate, traditional reactive resource management method is not able to meet the new requirements. In this paper, the authors investigate the...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    An Agent-Based Services Framework With Adaptive Monitoring in Cloud Environments

    Cloud computing environments provide flexible infrastructures for third-party management of organizations' Information Technology (IT) assets. With web services being a standard for realizing web-based business capabilities, the emergence of cloud computing will bring new challenges to different web service activities. In this paper, the authors propose an agent-based framework that...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Case Studies in Designing Elastic Applications

    Clusters, clouds, and grids offer access to large scale computational resources at low cost. This is especially appealing to scientific applications that require a very large scale to compete in the research space. However, the resources available across these platforms differ significantly in their availability, hardware, environment, performance, cost of...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    On the Minimum Distance of Generalized Spatially Coupled LDPC Codes

    Families of Generalized Spatially-coupled Low-Density Parity-Check (GSC-LDPC) code ensembles can be formed by terminating protograph-based Generalized LDPC Convolutional (GLDPCC) codes. It has previously been shown that ensembles of GSC-LDPC codes constructed from a protograph have better iterative decoding thresholds than their block code counterparts, and that, for large termination lengths,...

    Provided By University of Northern Iowa

  • White Papers // Feb 2013

    An Overview of Issues and Recent Developments in Cloud Computing and Storage Security

    The recent rapid growth in the availability and popularity of cloud services allows for convenient on demand remote storage and computation. Security and privacy concerns, however, are among the top impediments standing in the way of wider adoption of cloud technologies. That is, in addition to the new security threats...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Decentralized Resource Coordination Across Service Workflows in a Cloud Environment

    As Cloud computing becomes one of the mainstream distributed computing paradigms, cloud users are generating more intricate business processes and scientific jobs which involve the use of service workflows. Efficient management of those workflows' resources can help save cost and improve QoS. In this paper, the authors investigate the problem...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Algebraic Superposition of LDGM Codes for Cooperative Diversity

    This paper presents a technique for achieving cooperative spatial diversity using serially concatenated Low Density Generator Matrix (LDGM) codes. Specifically, the authors consider a scenario in which a pair of transceivers employs algebraic superposition of error control codes to affect spatial diversity at their common destination. The construction of LDGM...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    On the Computation of EXIT Characteristics for Symbol-Based Iterative Decoding

    In this contribution the authors propose an efficient method for computing symbol-based EXtrinsic Information Transfer (EXIT) charts, which are useful for estimating the convergence properties of non-binary iterative decoding. A standard solution is to apply a priori reliability information to the A Posteriori Probability (APP) constituent decoder and compute the...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Nested Codes with Multiple Interpretations

    This paper proposes a new approach to channel code design for wireless network applications. The resulting nested codes can be decoded at different effective rates by different receivers - rates that depend on the prior knowledge possessed by each receiver; the authors say these codes have multiple interpretations. They have...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Chirp: A Practical Global Filesystem for Cluster and Grid Computing

    Traditional distributed file system technologies designed for local and campus area networks do not adapt well to wide area grid computing environments. To address this problem, the authors have designed the Chirp distributed file system, which is designed from the ground up to meet the needs of grid computing. Chirp...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Signal Superposition Coded Cooperative Diversity: Analysis and Optimization

    The performance of a coded cooperative diversity system employing the Euclidean superposition of two BPSK-modulated signals is analyzed. For an example using a convolutional code on block fading channels, the results show excellent agreement with computer simulations. The analysis makes it possible to optimize the power allocation between the local...

    Provided By University of Northern Iowa

  • White Papers // Dec 2012

    Secure Computation on Floating Point Numbers

    Secure computation undeniably received a lot of attention in the recent years, with the shift toward cloud computing offering a new incentive for secure computation and outsourcing. Surprisingly little attention, however, has been paid to computation with non-integer data types. To narrow this gap, in this paper, the authors develop...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting

    Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a public sketch, which is later used to reproduce the original biometric and...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Link Prediction in Heterogeneous Networks: Influence and Time Matters

    Link prediction is an important task in network analysis, benefiting researchers and organizations in a variety of fields. Many networks in the real world, for example social networks, are heterogeneous, having multiple types of links and complex dependence structures. Link prediction in such networks must model the influence propagating between...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Grid Computing: The Next Decade

    The evolution of the global scientific Cyber Infrastructure (CI) has, over the last 10+ years, led to a large diversity of CI instances. While specialized, competing and alternative CI building blocks are inherent to a healthy ecosystem, it also becomes apparent that the increasing degree of fragmentation is hindering interoperation,...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    A Random Coding Approach to Gaussian Multiple Access Channels With Finite Blocklength

    Contrary to the common use of random coding and typicality decoding for the achievability proofs in information theory, the tightest achievable rates for point-to-point Gaussian channels build either on geometric arguments or composite hypothesis testing, for which direct generalization to multi-user settings appears challenging. In this paper, the authors provide...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Intermittent Communication and Partial Divergence

    The authors formulate a model for intermittent communication in which the transmissions of information symbols are bursty or the channel is sporadically available. They consider a general scenario in which information and noise symbols are grouped into packets of length l, and noise packets are inserted in the input sequence...

    Provided By University of Northern Iowa

  • White Papers // Aug 2012

    Transport Density Vs. Channel Access Time in Wireless Networks: Power Control and Efficient MAC Design

    Power control plays an important role in the design and operation of wireless networks. In this paper, the authors first define two critical metrics, transport density and channel access time to measure the system performance. The trade-off between these two metrics as a function of the peak power constraint is...

    Provided By University of Northern Iowa

  • White Papers // Aug 2012

    A Case Study in Elastic Scientific Application Design Using Work Queue

    The resources offered by clusters, clouds, and grids are appealing to high performance scientific workflows that can harness and federate these resources to achieve scales required to contribute to their field of study. However, the resources available across these platforms differ in their access models (shared vs. dedicated), hardware, costs,...

    Provided By University of Northern Iowa

  • White Papers // Jul 2012

    Cost-And Deadline-Constrained Provisioning for Scientific Workflow Ensembles in IaaS Clouds

    Large-scale applications expressed as scientific workflows are often grouped into ensembles of inter-related workflows. In this paper, the authors address a new and important problem concerning the efficient management of such ensembles under budget and deadline constraints on Infrastructure-as-a-Service (IaaS) clouds. They discuss, develop, and assess algorithms based on static...

    Provided By University of Northern Iowa

  • White Papers // Jul 2012

    Error Exponents for Block Markov Superposition Encoding With Varying Decoding Latency

    Block Markov superposition encoding has been used on a number of channels to enable transmitter cooperation, including the Decode-and-Forward (DF) relaying scheme on the full-duplex relay channel. The authors analyze the error performance of DF with regular encoding and sliding window decoding as the window size of the decoder is...

    Provided By University of Northern Iowa

  • White Papers // May 2012

    Efficient Dynamic Provable Possession of Remote Data via Update Trees

    The emergence and wide availability of remote storage service providers prompted work in the security community that allows a client to verify integrity and availability of the data that she outsourced to an untrusted remove storage server at a relatively low cost. Most recent solutions to this problem allow the...

    Provided By University of Northern Iowa

  • White Papers // May 2012

    Optimizing Spatial Reuse by Dynamic Power Control

    This paper first presents a geometric analysis of the convergence condition for the Foschini-Miljanic power control algorithm. Then, based on the analysis, the Dynamic Distributed Power Control MAC (D2PC-MAC) scheme is proposed for wireless networks. D2PC-MAC achieves high spatial reuse, since power control enables nesting of concurrent links, thereby achieving...

    Provided By University of Northern Iowa

  • White Papers // May 2012

    A Practical Approach to Strengthen Vulnerable Downlinks Using Superposition Coding

    The authors propose and experimentally demonstrate a novel approach to improve the packet delivery efficiency on a vulnerable downlink (e.g., from a transmitter to a far-away receiver) using superposition coding, a multiuser transmission scheme that forgoes orthogonal transmission and deliberately introduces interference among signals at the transmitter. On a software...

    Provided By University of Northern Iowa

  • White Papers // Mar 2012

    Two New Approaches to Bandwidth-Efficient Partnering for Cooperative Diversity

    This paper presents two new techniques employing bandwidth-efficient modulation to enable two partners to cooperatively convey their data to a common destination. Both approaches integrate relaying and channel coding, exploiting the fact that each partner knows the data relayed by the other partner to enhance the partner-to-partner link. The first...

    Provided By University of Northern Iowa

  • White Papers // Feb 2012

    PREPRINT: A Framework for Scalable Genome Assembly on Clusters, Clouds, and Grids

    The landscape of genomics and bioinformatics research is undergoing a dramatic change. The cost of traditional genome sequencing was once in the range of millions of dollars and only accessible to national-scale centers focused on the study of model organisms. Today, second generation sequencing devices are operating at hundreds of...

    Provided By University of Northern Iowa

  • White Papers // Feb 2012

    An Evaluation of the Cost and Performance of Scientific Workflows on Amazon EC2

    Workflows are used to orchestrate data-intensive applications in many different scientific domains. Workflow applications typically communicate data between processing steps using intermediate files. When tasks are distributed, these files are either transferred from one computational node to another, or accessed through a shared storage system. As a result, the efficient...

    Provided By University of Northern Iowa

  • White Papers // Jan 2012

    ALOHA Performs Optimal Power Control in Poisson Networks

    This paper studies power control strategies in interference-limited wireless networks with Poisson distributed nodes. The authors focus on the case where each transmitter knows its distance to its desired receiver but does not know the topology of the rest of the network. They study three sets of strategies: the Single-Node...

    Provided By University of Northern Iowa

  • White Papers // Jun 2011

    Exact Free Distance and Trapping Set Growth Rates for LDPC Convolutional Codes

    Ensembles of (J,K)-regular Low-Density Parity Check Convolutional (LDPCC) codes are known to be asymptotically good, in the sense that the minimum free distance grows linearly with the constraint length. In this paper, the authors use a protograph-based analysis of terminated LDPCC codes to obtain an upper bound on the free...

    Provided By University of Northern Iowa

  • White Papers // Feb 2012

    PREPRINT: A Framework for Scalable Genome Assembly on Clusters, Clouds, and Grids

    The landscape of genomics and bioinformatics research is undergoing a dramatic change. The cost of traditional genome sequencing was once in the range of millions of dollars and only accessible to national-scale centers focused on the study of model organisms. Today, second generation sequencing devices are operating at hundreds of...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Case Studies in Designing Elastic Applications

    Clusters, clouds, and grids offer access to large scale computational resources at low cost. This is especially appealing to scientific applications that require a very large scale to compete in the research space. However, the resources available across these platforms differ significantly in their availability, hardware, environment, performance, cost of...

    Provided By University of Northern Iowa

  • White Papers // Mar 2014

    Expanding Tasks of Logical Workflows into Independent Workflows for Improved Scalability

    Workflow management systems, such as Galaxy and Taverna, provide a portal through which data can be processed using a sequence of different tools. This sequence allows for the creation of a logical workflow that describes the process. However, when the data workload becomes large enough the time spent in each...

    Provided By University of Northern Iowa

  • White Papers // Mar 2014

    Accelerating Comparative Genomics Workflows in a Distributed Environment with Optimized Data Partitioning

    The advent of new sequencing technology has generated massive amounts of biological data at unprecedented rates. High-throughput bioinformatics tools are required to keep pace with this. Here, the authors implement a workflow-based model for parallelizing the data intensive task of genome alignment and variant calling with BWA and GATK's HaplotypeCaller....

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting

    Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a public sketch, which is later used to reproduce the original biometric and...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Algebraic Superposition of LDGM Codes for Cooperative Diversity

    This paper presents a technique for achieving cooperative spatial diversity using serially concatenated Low Density Generator Matrix (LDGM) codes. Specifically, the authors consider a scenario in which a pair of transceivers employs algebraic superposition of error control codes to affect spatial diversity at their common destination. The construction of LDGM...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    On the Computation of EXIT Characteristics for Symbol-Based Iterative Decoding

    In this contribution the authors propose an efficient method for computing symbol-based EXtrinsic Information Transfer (EXIT) charts, which are useful for estimating the convergence properties of non-binary iterative decoding. A standard solution is to apply a priori reliability information to the A Posteriori Probability (APP) constituent decoder and compute the...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Nested Codes with Multiple Interpretations

    This paper proposes a new approach to channel code design for wireless network applications. The resulting nested codes can be decoded at different effective rates by different receivers - rates that depend on the prior knowledge possessed by each receiver; the authors say these codes have multiple interpretations. They have...

    Provided By University of Northern Iowa

  • White Papers // Oct 2008

    Coding Theorems for Repeat Multiple Accumulate Codes

    In this paper the ensemble of codes formed by a serial concatenation of a repetition code with multiple accumulators connected through random inter-leavers is considered. Based on finite length weight enumerators for these codes, asymptotic expressions for the minimum distance and an arbitrary number of accumulators larger than one are...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Chirp: A Practical Global Filesystem for Cluster and Grid Computing

    Traditional distributed file system technologies designed for local and campus area networks do not adapt well to wide area grid computing environments. To address this problem, the authors have designed the Chirp distributed file system, which is designed from the ground up to meet the needs of grid computing. Chirp...

    Provided By University of Northern Iowa

  • White Papers // Feb 2013

    An Overview of Issues and Recent Developments in Cloud Computing and Storage Security

    The recent rapid growth in the availability and popularity of cloud services allows for convenient on demand remote storage and computation. Security and privacy concerns, however, are among the top impediments standing in the way of wider adoption of cloud technologies. That is, in addition to the new security threats...

    Provided By University of Northern Iowa

  • White Papers // Jul 2013

    Hosted Science: Managing Computational Workflows in the Cloud

    Scientists today are exploring the use of new tools and computing platforms to do their science. They are using workflow management tools to describe and manage complex applications and are evaluating the features and performance of clouds to see if they meet their computational needs. Although today, hosting is limited...

    Provided By University of Northern Iowa

  • White Papers // Oct 2013

    Energy Aware Real-Time Scheduling Policy with Guaranteed Security Protection

    In this paper, the authors address the emerging scheduling problem existed in the design of secure and energy-efficient real-time embedded systems. The objective is to minimize the energy consumption subject to security and schedulability constraints. Due to the complexity of the problem, they propose a dynamic programming based approximation approach...

    Provided By University of Northern Iowa

  • White Papers // Apr 2010

    Development of an Application-Oriented Wireless Communication Networks Course for Engineering Technology Program

    The use of wireless networks continues to grow rapidly. New wireless technologies and standards are keeping on emerging. To prepare the graduates in Electrical Engineering Technology (EET) program with the ability to understand and apply wireless networking technology, an application-oriented wireless communication networks course is developed. Typically there are two...

    Provided By University of Northern Iowa

  • White Papers // Aug 2009

    BGP Route Analysis and Management Systems

    The Border Gateway Protocol (BGP) is an important component in today's IP network infrastructure. As the main routing protocol of the Internet, clear understanding of its dynamics is crucial for configuring, diagnosing and debugging Internet routing problems. Despite the increase in the services that BGP provide such as MPLS VPNs,...

    Provided By University of Northern Iowa

  • White Papers // Dec 2012

    Secure Computation on Floating Point Numbers

    Secure computation undeniably received a lot of attention in the recent years, with the shift toward cloud computing offering a new incentive for secure computation and outsourcing. Surprisingly little attention, however, has been paid to computation with non-integer data types. To narrow this gap, in this paper, the authors develop...

    Provided By University of Northern Iowa

  • White Papers // May 2012

    Efficient Dynamic Provable Possession of Remote Data via Update Trees

    The emergence and wide availability of remote storage service providers prompted work in the security community that allows a client to verify integrity and availability of the data that she outsourced to an untrusted remove storage server at a relatively low cost. Most recent solutions to this problem allow the...

    Provided By University of Northern Iowa

  • White Papers // Jul 2012

    Cost-And Deadline-Constrained Provisioning for Scientific Workflow Ensembles in IaaS Clouds

    Large-scale applications expressed as scientific workflows are often grouped into ensembles of inter-related workflows. In this paper, the authors address a new and important problem concerning the efficient management of such ensembles under budget and deadline constraints on Infrastructure-as-a-Service (IaaS) clouds. They discuss, develop, and assess algorithms based on static...

    Provided By University of Northern Iowa

  • White Papers // Feb 2012

    An Evaluation of the Cost and Performance of Scientific Workflows on Amazon EC2

    Workflows are used to orchestrate data-intensive applications in many different scientific domains. Workflow applications typically communicate data between processing steps using intermediate files. When tasks are distributed, these files are either transferred from one computational node to another, or accessed through a shared storage system. As a result, the efficient...

    Provided By University of Northern Iowa

  • White Papers // Oct 2009

    Fast Admission Control for Short TCP Flows

    Over the last decade, numerous admission control schemes have been studied to allocate network resources. Although per-flow control schemes can provide guaranteed QoS, such schemes face scalability issues in large networks due to the tremendous number of flows present. While aggregation-based approaches such as Differentiated Services relieve the storage of...

    Provided By University of Northern Iowa

  • White Papers // Apr 2011

    Component Approach to Computational Applications on Clouds

    Running computational science applications on the emerging cloud infrastructures requires appropriate programming models and tools. In this paper, the authors investigate the applicability of the component model to developing such applications. The component model they propose takes advantages of the features of the IaaS infrastructure and offers a high-level application...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    On Decoding the Kth Strongest User in Poisson Networks With Arbitrary Fading Distribution

    Consider a d-dimensional network whose transmitters form a non-uniform Poisson point process and whose links are subject to arbitrary fading. Assuming interference from the k-1 strongest users is canceled, the authors derive the probability of decoding the k-th strongest user in closed-form. As a special case, when k=1, this probability...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    The Aggregate Throughput in Random Wireless Networks With Successive Interference Cancellation

    The feasibility of Successive Interference Cancellation (SIC) depends on the received power ordering from different users, which, in turn, depends on the fading distribution, path loss function and network geometry. Using a framework based on stochastic geometry, this paper studies the aggregate throughput in d-dimensional random wireless networks with SIC...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    Joint Channel/Network Coding for Star Networks

    Channel coding alone is not sufficient to reliably transmit a message of finite length from a source to one or more destinations as in, e.g., file transfer. To ensure that no data is lost, it must be combined with rateless erasure correcting schemes on a higher layer, such as a...

    Provided By University of Northern Iowa

  • White Papers // Apr 2013

    Delay Scaling in Poisson Networks

    The local delay, defined as the mean time it takes a node to connect to its nearest neighbor, is a fundamental performance metric in a wireless network. For a network with Poisson distributed nodes, the authors find its scaling behavior (as a function of the rate of transmission) for different...

    Provided By University of Northern Iowa

  • White Papers // Aug 2012

    Transport Density Vs. Channel Access Time in Wireless Networks: Power Control and Efficient MAC Design

    Power control plays an important role in the design and operation of wireless networks. In this paper, the authors first define two critical metrics, transport density and channel access time to measure the system performance. The trade-off between these two metrics as a function of the peak power constraint is...

    Provided By University of Northern Iowa

  • White Papers // Jan 2012

    ALOHA Performs Optimal Power Control in Poisson Networks

    This paper studies power control strategies in interference-limited wireless networks with Poisson distributed nodes. The authors focus on the case where each transmitter knows its distance to its desired receiver but does not know the topology of the rest of the network. They study three sets of strategies: the Single-Node...

    Provided By University of Northern Iowa

  • White Papers // Aug 2012

    A Case Study in Elastic Scientific Application Design Using Work Queue

    The resources offered by clusters, clouds, and grids are appealing to high performance scientific workflows that can harness and federate these resources to achieve scales required to contribute to their field of study. However, the resources available across these platforms differ in their access models (shared vs. dedicated), hardware, costs,...

    Provided By University of Northern Iowa

  • White Papers // May 2013

    A Versatile Dependent Model for Heterogeneous Cellular Networks

    Due to the increasing spatial irregularity of cellular systems, point process models are ideally suited for analysis and simulation. When modeling multiple tiers, including macro-, micro-, and femto-tiers, a natural choice is the superposition of independent Poisson Point Processes (PPPs), each one modeling the locations of the base stations of...

    Provided By University of Northern Iowa

  • White Papers // Jun 2013

    Diversity Polynomials for the Analysis of Temporal Correlations in Wireless Networks

    The interference in wireless networks is temporally correlated, since the node or user locations are correlated over time and the interfering transmitters are a subset of these nodes. For a wireless network where (potential) interferers form a Poisson point process and use ALOHA for channel access, the authors calculate the...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Link Prediction in Heterogeneous Networks: Influence and Time Matters

    Link prediction is an important task in network analysis, benefiting researchers and organizations in a variety of fields. Many networks in the real world, for example social networks, are heterogeneous, having multiple types of links and complex dependence structures. Link prediction in such networks must model the influence propagating between...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Adaptive Web Services Monitoring in Cloud Environments

    Cloud computing environments provide flexible infrastructures for third-party management of organizations' Information Technology (IT) assets. With web services being a standard for realizing web-based business capabilities, the emergence of cloud computing will bring new challenges to different web service activities. In this paper, the authors propose an agent-based framework that...

    Provided By University of Northern Iowa

  • White Papers // Jan 2013

    Decentralized Resource Coordination Across Service Workflows in a Cloud Environment

    As Cloud computing becomes one of the mainstream distributed computing paradigms, cloud users are generating more intricate business processes and scientific jobs which involve the use of service workflows. Efficient management of those workflows' resources can help save cost and improve QoS. In this paper, the authors investigate the problem...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    Adaptive Resource Management for Service Workflows in Cloud Environments

    Cloud computing enables the on-demand provisioning of virtualized resources to its hosted applications and services to satisfy their fluctuating resource needs. As business processes and scientific jobs become more intricate, traditional reactive resource management method is not able to meet the new requirements. In this paper, the authors investigate the...

    Provided By University of Northern Iowa

  • White Papers // Mar 2013

    An Agent-Based Services Framework With Adaptive Monitoring in Cloud Environments

    Cloud computing environments provide flexible infrastructures for third-party management of organizations' Information Technology (IT) assets. With web services being a standard for realizing web-based business capabilities, the emergence of cloud computing will bring new challenges to different web service activities. In this paper, the authors propose an agent-based framework that...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Grid Computing: The Next Decade

    The evolution of the global scientific Cyber Infrastructure (CI) has, over the last 10+ years, led to a large diversity of CI instances. While specialized, competing and alternative CI building blocks are inherent to a healthy ecosystem, it also becomes apparent that the increasing degree of fragmentation is hindering interoperation,...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    A Random Coding Approach to Gaussian Multiple Access Channels With Finite Blocklength

    Contrary to the common use of random coding and typicality decoding for the achievability proofs in information theory, the tightest achievable rates for point-to-point Gaussian channels build either on geometric arguments or composite hypothesis testing, for which direct generalization to multi-user settings appears challenging. In this paper, the authors provide...

    Provided By University of Northern Iowa

  • White Papers // Oct 2012

    Intermittent Communication and Partial Divergence

    The authors formulate a model for intermittent communication in which the transmissions of information symbols are bursty or the channel is sporadically available. They consider a general scenario in which information and noise symbols are grouped into packets of length l, and noise packets are inserted in the input sequence...

    Provided By University of Northern Iowa

  • White Papers // Jul 2012

    Error Exponents for Block Markov Superposition Encoding With Varying Decoding Latency

    Block Markov superposition encoding has been used on a number of channels to enable transmitter cooperation, including the Decode-and-Forward (DF) relaying scheme on the full-duplex relay channel. The authors analyze the error performance of DF with regular encoding and sliding window decoding as the window size of the decoder is...

    Provided By University of Northern Iowa

  • White Papers // Feb 2011

    AWGN Channel Analysis of Terminated LDPC Convolutional Codes

    It has previously been shown that ensembles of terminated protograph-based Low-Density Parity-Check (LDPC) convolutional codes have a typical minimum distance that grows linearly with block length and that they are capable of achieving capacity approaching iterative decoding thresholds on the Binary Erasure Channel (BEC). In this paper, the authors review...

    Provided By University of Northern Iowa