University of South Carolina

Displaying 1-18 of 18 results

  • White Papers // Jan 2012

    Wavelet-Based Real Time Detection of Network Traffic Anomalies

    Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techniques at the core and thus are ineffective in detecting unknown anomalous activities. In this paper, the authors apply signal processing techniques in intrusion detection...

    Provided By University of South Carolina

  • White Papers // Jan 2012

    Improving Availability With Adaptive Roaming Replicas in Presence of Determined DoS Attacks

    Static replicas have been proven useful in providing fault tolerance and load balancing, but they may not provide enough assurance on the continuous availability of mission-critical data in face of a determined Denial-of-Service (DoS) attacker. A roaming replica scheme can provide higher availability assurance, but the overhead associated with replica...

    Provided By University of South Carolina

  • White Papers // Jan 2011

    Selection of Bit-Rate for Wireless Network Coding

    Network coding is known to improve throughput by mixing information from different flows and conveying more information in each transmission. Recently some proposals have demonstrated the benefits of applying network coding to wireless networks with broadcast transmissions. It is expected that the opportunities for coding and the corresponding gains depend...

    Provided By University of South Carolina

  • White Papers // Jan 2011

    I2MIX: Integration of Intra-flow and Inter-flow Wireless Network Coding

    Wireless network coding has been shown to reduce the number of transmissions by exploiting the broadcast nature of the wireless medium. Multiple packets may be encoded into a single packet when their respective next hops have enough information to decode them. Previous research has shown that packets belonging to different...

    Provided By University of South Carolina

  • White Papers // Oct 2010

    The Extent Of Collective Bargaining And Workplace Representation: Transitions Between States And Their Determinants. A Comparative Analysis Of Germany And Great Britain

    Industrial relations are in flux in many nations, perhaps most notably in Germany and Britain. That said, comparatively little is known in any detail of the changing pattern of the institutions of collective bargaining and worker representation in Germany and still less in both countries about firm transitions between these...

    Provided By University of South Carolina

  • White Papers // Oct 2010

    How Does Capital Affect Bank Performance During Financial Crises?

    How does capital affect bank performance during financial crises? The authors address this question by examining the effect of pre-crisis bank capital ratios on banks' ability to survive financial crises, and their market shares, and profitability during such crises. They distinguish between two banking crises and three market crises that...

    Provided By University of South Carolina

  • White Papers // Sep 2010

    Bank Liquidity Creation, Monetary Policy, And Financial Crises

    The efficacy of monetary policy depends largely on how it affects bank behavior. Recent events have cast doubt on how well monetary policy works in this respect, particularly during financial crises. In addition, issues have been raised about the role of banks in creating asset bubbles that burst and lead...

    Provided By University of South Carolina

  • White Papers // Aug 2010

    MobiCom 2009 Poster: Movement Strategies for Intelligent Mobile Routers

    If the authors give routers the ability to move, they no longer have to sit idly in a non-optimal position. They can make their own decisions to attempt to improve the efficacy of themselves or the network. In the work, the authors will focus on how a router can use...

    Provided By University of South Carolina

  • White Papers // Aug 2010

    Bank Liquidity Creation And Risk Taking During Distress

    Liquidity creation is one of banks' raisons d'?tre. But what happens to liquidity creation and risk taking when a bank is identified as distressed by regulatory bodies and subjected to regulatory interventions and/or receives capital injections? What are the long-run effects of such interventions? To address these questions, the authors...

    Provided By University of South Carolina

  • White Papers // Jul 2010

    Distributed Transmit Beamforming With Autonomous and Self-Organizing Mobile Antennas

    The paper studies the problem of distributed transmit beamforming with autonomous and self-organizing mobile antennas. The objective is to design a distributed algorithm for a network of autonomous mobile robots with carry-on antennas so that they can form a functional antenna array and cooperatively transmit messages to a remote station....

    Provided By University of South Carolina

  • White Papers // May 2010

    Known Interference Cancellation: Resolving Collisions Due to Repeated Transmissions

    Reception of duplicate packets by a node in a wireless network is a common occurrence. Reasons for repeated transmissions range from broadcast flooding to multicast streaming to unicast forwarding. These repeated transmissions may also get involved in collisions like other original transmissions. The authors argue that when one of the...

    Provided By University of South Carolina

  • White Papers // Apr 2010

    Fast Convergence With Fast Reroute in IP Networks

    It has been observed that even in well managed networks, failures of links and routers are not uncommon. In order to satisfy the demand for high availability in case of a failure, fast restoration of loop-free forwarding along the optimal paths is imperative for a routing scheme. Failures can be...

    Provided By University of South Carolina

  • White Papers // Mar 2010

    Dancing the Sample Size Limbo With Mixed Models: How Low Can You Go?

    Whereas general sample size guidelines have been suggested when estimating multilevel models, they are only generalizable to a relatively limited number of data conditions and model structures, both of which are not very feasible for the applied researcher. In an effort to expand the understanding of two-level multilevel models under...

    Provided By University of South Carolina

  • White Papers // Mar 2010

    AccuRate: Constellation Based Rate Estimation in Wireless Networks

    This paper proposes to exploit physical layer information towards improved rate selection in wireless networks. While existing schemes pick good transmission rates, this paper takes a step further towards computing the optimal bit rate. The main idea is to capture the channel behavior through symbol level dispersions, and "Replay" these...

    Provided By University of South Carolina

  • White Papers // Jan 2010

    Practical Approach to Programmable Analog Circuits With Memristors

    The authors suggest an approach to use memristors (resistors with memory) in programmable analog circuits. The idea consists in a circuit design in which low voltages are applied to memristors during their operation as analog circuit elements and high voltages are used to program the memristor's states. This way, as...

    Provided By University of South Carolina

  • White Papers // Jan 2010

    A Dual Authentication Protocol for IEEE 802.11 Wireless LANs

    This paper first identify a vulnerability of IEEE 802.11 wireless LANs in which a compromised access point can still authenticate itself to a wireless station and gain control over the connection, and show that the current IEEE 802.11i standard does not address this problem. This paper then propose a new...

    Provided By University of South Carolina

  • White Papers // Oct 2009

    Moving Away From Collision Avoidance: Towards Collision Detection in Wireless Networks

    Wireless networks are founded on the principles of collision avoidance. This paper makes an attempt to detect and abort collisions in wireless networks. Briefly, the receiver uses physical layer information to detect collisions, and immediately notifies the transmitter to abort transmission. The collision notification consists of a unique signature, sent...

    Provided By University of South Carolina

  • White Papers // Jan 2009

    Worker Directors: A German Product That Didnt Export?

    Despite its lack of attractiveness to other countries, the German system of quasi-parity codetermination at company level has held up remarkably well. The authors recount the theoretical arguments for and against codetermination and survey the empirical evidence on the effects of the institution, tracing the three phases of a still...

    Provided By University of South Carolina

  • White Papers // Mar 2010

    Dancing the Sample Size Limbo With Mixed Models: How Low Can You Go?

    Whereas general sample size guidelines have been suggested when estimating multilevel models, they are only generalizable to a relatively limited number of data conditions and model structures, both of which are not very feasible for the applied researcher. In an effort to expand the understanding of two-level multilevel models under...

    Provided By University of South Carolina

  • White Papers // Jan 2010

    A Dual Authentication Protocol for IEEE 802.11 Wireless LANs

    This paper first identify a vulnerability of IEEE 802.11 wireless LANs in which a compromised access point can still authenticate itself to a wireless station and gain control over the connection, and show that the current IEEE 802.11i standard does not address this problem. This paper then propose a new...

    Provided By University of South Carolina

  • White Papers // Aug 2010

    MobiCom 2009 Poster: Movement Strategies for Intelligent Mobile Routers

    If the authors give routers the ability to move, they no longer have to sit idly in a non-optimal position. They can make their own decisions to attempt to improve the efficacy of themselves or the network. In the work, the authors will focus on how a router can use...

    Provided By University of South Carolina

  • White Papers // Apr 2010

    Fast Convergence With Fast Reroute in IP Networks

    It has been observed that even in well managed networks, failures of links and routers are not uncommon. In order to satisfy the demand for high availability in case of a failure, fast restoration of loop-free forwarding along the optimal paths is imperative for a routing scheme. Failures can be...

    Provided By University of South Carolina

  • White Papers // Mar 2010

    AccuRate: Constellation Based Rate Estimation in Wireless Networks

    This paper proposes to exploit physical layer information towards improved rate selection in wireless networks. While existing schemes pick good transmission rates, this paper takes a step further towards computing the optimal bit rate. The main idea is to capture the channel behavior through symbol level dispersions, and "Replay" these...

    Provided By University of South Carolina

  • White Papers // Oct 2009

    Moving Away From Collision Avoidance: Towards Collision Detection in Wireless Networks

    Wireless networks are founded on the principles of collision avoidance. This paper makes an attempt to detect and abort collisions in wireless networks. Briefly, the receiver uses physical layer information to detect collisions, and immediately notifies the transmitter to abort transmission. The collision notification consists of a unique signature, sent...

    Provided By University of South Carolina

  • White Papers // Jan 2011

    Selection of Bit-Rate for Wireless Network Coding

    Network coding is known to improve throughput by mixing information from different flows and conveying more information in each transmission. Recently some proposals have demonstrated the benefits of applying network coding to wireless networks with broadcast transmissions. It is expected that the opportunities for coding and the corresponding gains depend...

    Provided By University of South Carolina

  • White Papers // Sep 2010

    Bank Liquidity Creation, Monetary Policy, And Financial Crises

    The efficacy of monetary policy depends largely on how it affects bank behavior. Recent events have cast doubt on how well monetary policy works in this respect, particularly during financial crises. In addition, issues have been raised about the role of banks in creating asset bubbles that burst and lead...

    Provided By University of South Carolina

  • White Papers // Oct 2010

    How Does Capital Affect Bank Performance During Financial Crises?

    How does capital affect bank performance during financial crises? The authors address this question by examining the effect of pre-crisis bank capital ratios on banks' ability to survive financial crises, and their market shares, and profitability during such crises. They distinguish between two banking crises and three market crises that...

    Provided By University of South Carolina

  • White Papers // Aug 2010

    Bank Liquidity Creation And Risk Taking During Distress

    Liquidity creation is one of banks' raisons d'?tre. But what happens to liquidity creation and risk taking when a bank is identified as distressed by regulatory bodies and subjected to regulatory interventions and/or receives capital injections? What are the long-run effects of such interventions? To address these questions, the authors...

    Provided By University of South Carolina

  • White Papers // Oct 2010

    The Extent Of Collective Bargaining And Workplace Representation: Transitions Between States And Their Determinants. A Comparative Analysis Of Germany And Great Britain

    Industrial relations are in flux in many nations, perhaps most notably in Germany and Britain. That said, comparatively little is known in any detail of the changing pattern of the institutions of collective bargaining and worker representation in Germany and still less in both countries about firm transitions between these...

    Provided By University of South Carolina

  • White Papers // Jan 2010

    Practical Approach to Programmable Analog Circuits With Memristors

    The authors suggest an approach to use memristors (resistors with memory) in programmable analog circuits. The idea consists in a circuit design in which low voltages are applied to memristors during their operation as analog circuit elements and high voltages are used to program the memristor's states. This way, as...

    Provided By University of South Carolina

  • White Papers // Jan 2009

    Worker Directors: A German Product That Didnt Export?

    Despite its lack of attractiveness to other countries, the German system of quasi-parity codetermination at company level has held up remarkably well. The authors recount the theoretical arguments for and against codetermination and survey the empirical evidence on the effects of the institution, tracing the three phases of a still...

    Provided By University of South Carolina

  • White Papers // Jan 2011

    I2MIX: Integration of Intra-flow and Inter-flow Wireless Network Coding

    Wireless network coding has been shown to reduce the number of transmissions by exploiting the broadcast nature of the wireless medium. Multiple packets may be encoded into a single packet when their respective next hops have enough information to decode them. Previous research has shown that packets belonging to different...

    Provided By University of South Carolina

  • White Papers // Jul 2010

    Distributed Transmit Beamforming With Autonomous and Self-Organizing Mobile Antennas

    The paper studies the problem of distributed transmit beamforming with autonomous and self-organizing mobile antennas. The objective is to design a distributed algorithm for a network of autonomous mobile robots with carry-on antennas so that they can form a functional antenna array and cooperatively transmit messages to a remote station....

    Provided By University of South Carolina

  • White Papers // May 2010

    Known Interference Cancellation: Resolving Collisions Due to Repeated Transmissions

    Reception of duplicate packets by a node in a wireless network is a common occurrence. Reasons for repeated transmissions range from broadcast flooding to multicast streaming to unicast forwarding. These repeated transmissions may also get involved in collisions like other original transmissions. The authors argue that when one of the...

    Provided By University of South Carolina

  • White Papers // Jan 2012

    Wavelet-Based Real Time Detection of Network Traffic Anomalies

    Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techniques at the core and thus are ineffective in detecting unknown anomalous activities. In this paper, the authors apply signal processing techniques in intrusion detection...

    Provided By University of South Carolina

  • White Papers // Jan 2012

    Improving Availability With Adaptive Roaming Replicas in Presence of Determined DoS Attacks

    Static replicas have been proven useful in providing fault tolerance and load balancing, but they may not provide enough assurance on the continuous availability of mission-critical data in face of a determined Denial-of-Service (DoS) attacker. A roaming replica scheme can provide higher availability assurance, but the overhead associated with replica...

    Provided By University of South Carolina