University of Southern California

Displaying 1-40 of 142 results

  • White Papers // Aug 2012

    Scaling Behaviors of Wireless Device-to-Device Communications With Distributed Caching

    The authors analyze a novel architecture for caching popular video content to enable wireless device-to-device collaboration. They focus on the asymptotic scaling characteristics and show how they depends on video content popularity statistics. They identify a fundamental conflict between collaboration distance and interference and show how to optimize the transmission...

    Provided By University of Southern California

  • White Papers // May 2012

    Bipartite Index Coding

    The authors analyze a generalized index coding problem that allows multiple users to request the same packet. For this problem they introduce a novel coding scheme called partition multicast. Their scheme can be seen as a natural generalization of clique cover for directed index coding problems. Further, partition multicast corresponds...

    Provided By University of Southern California

  • White Papers // May 2012

    Feedback in the K-User Interference Channel

    A traditional viewpoint on feedback capacity has been pessimistic over the past few decades. This is mainly due to Shannon's original result which shows that feedback provides no increase in capacity for discrete memory-less point-to-point channels. Although feedback can indeed increase the capacity of multiple access channels, the increase in...

    Provided By University of Southern California

  • White Papers // May 2012

    Locally Repairable Codes

    One main challenge in the design of distributed storage codes is the Exact Repair Problem: if a node storing encoded information fails, to maintain the same level of reliability, the authors need to exactly regenerate what was lost in a new node. A major open problem in this area has...

    Provided By University of Southern California

  • White Papers // May 2012

    vCRIB: Virtualized Rule Management in the Cloud

    Cloud operators increasingly need many fine-grained rules to better control individual network flows for various management tasks. While previous approaches have advocated placing rules either on hypervisors or switches, the authors argue that future data centers would benefit from leveraging rule processing capabilities at both for better scalability and performance....

    Provided By University of Southern California

  • White Papers // May 2012

    Wireless Device-to-Device Communications With Distributed Caching

    The authors introduce a novel wireless Device-To-Device (D2D) collaboration architecture that exploits distributed storage of popular content to enable frequency reuse. They identify a fundamental conflict between collaboration distance and interference and show how to optimize the transmission power to maximize frequency reuse. Their analysis depends on the user content...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Wireless Peer-to-Peer Scheduling in Mobile Networks

    This paper considers peer-to-peer scheduling for a network with multiple wireless devices. A subset of the devices are mobile users that desire specific files. Each user may already have certain popular files in its cache. The remaining devices are access points that typically have access to a larger set of...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Repairable Fountain Codes

    This paper is eligible for the student paper award. The authors introduce a new family of fountain codes that are systematic and also have sparse parities. Although this is impossible if they require the code to be MDS, they show it can be achieved if they relax their requirement into...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Allocations for Heterogeneous Distributed Storage

    The authors study the problem of storing a data object in a set of data nodes that fail independently with given probabilities. Their problem is a natural generalization of a homogenous storage allocation problem where all the nodes had the same reliability and is naturally motivated for peer-to-peer and cloud...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Automatic Request Categorization in Internet Services

    Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirements on anticipated workloads. The accuracy of these models benefits substantially by differentiating among categories of requests based on their resource usage characteristics. However, categorizing requests and their resource demands...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Communication Models for Algorithm Design in Wireless Sensor Networks

    With continuing advancements in sensor node design and increasingly complex applications for Wireless Sensor Networks (WSNs), formal communication models are needed for either fair comparison between various algorithms or the development of design automation in WSNs. Toward such a goal, the authors formally define two link-wise communication models, namely, the...

    Provided By University of Southern California

  • White Papers // Jan 2012

    MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis

    Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: distributed monitors that continuously collect traffic information, and a distributed query system that allows network operators to efficiently correlate information from different monitors in order to detect anomalous traffic...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Power-Aware Topology Control for Wireless Ad-Hoc Networks

    In this paper, the authors examine the problem of power-aware topology control for wireless ad-hoc networks. The reliance on wireless multihop communications to maintain connectivity among nodes adds new complexity on the design and operation of the wireless ad-hoc networks. In particular, the lack of a physical backbone infrastructure poses...

    Provided By University of Southern California

  • White Papers // Jan 2012

    ELECTION: Energy-Efficient and Low-LatEncy SCheduling Technique for WIreless Sensor Networks

    The authors propose ELECTION, a new sleep scheduling scheme that adaptively schedules the sleep cycles of both communication radios and sensors in wireless active sensor networks. Taking advantage of spatial and temporal correlations in the underlying physical phenomenon, their scheme controls sleeping schedules of radios and sensors, and adaptively meets...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network

    A large number of sensors networked together form self-organizing pervasive systems that provide the basis for implementation of several applications involving distributed, collaborative computations. Energy dissipation is a critical issue for these networks, as their life-time is limited by the battery power of the sensors. In this paper, the authors...

    Provided By University of Southern California

  • White Papers // Nov 2011

    Dynamic Index Coding for Wireless Broadcast Networks

    The authors consider a wireless broadcast station that transmits packets to multiple users. The packet requests for each user may overlap, and some users may already have certain packets. This presents a problem of broadcasting in the presence of side information, and is a generalization of the well known (and...

    Provided By University of Southern California

  • White Papers // Oct 2011

    Performance Analysis of Vertex-Centric Graph Algorithms on the Azure Cloud Platform

    Finding key vertices in large graphs is an important problem in many applications such as social networks, bioinformatics, and distribution networks. Betweenness centrality is a popular algorithm for finding such vertices and has been studied extensively, yielding several parallel formulations suitable to supercomputers and clusters. In this paper, the authors...

    Provided By University of Southern California

  • White Papers // Oct 2011

    A Review of Supply Chain Complexity Drivers

    Studies on supply chain complexity mainly use the static and dynamic complexity distinction. While static complexity describes the structure of the supply chain, the number and the variety of its components and strengths of interactions between these; the dynamic complexity represents the uncertainty in the supply chain and involves the...

    Provided By University of Southern California

  • White Papers // Sep 2011

    Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, the authors present an architecture for a secure data repository service...

    Provided By University of Southern California

  • White Papers // Sep 2011

    MCC: A High-Throughput Multi-Channel Data Collection Protocol for Wireless Sensor Networks

    The authors present the design and implementation of MCC, the first high-rate multi-channel time-scheduled protocol for fair, real-time data collection in Wireless Sensor Networks. MCC incorporates sophisticated mechanisms for balanced routing tree formation, multiple frequency channel allocation and globally synchronized TDMA scheduling. Through systematic experiments with real WSN hardware(Tmote Sky),...

    Provided By University of Southern California

  • White Papers // Aug 2011

    On Hardness of Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    The authors consider the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of Southern California

  • White Papers // Jul 2011

    Decentralized Online Learning Algorithms for Opportunistic Spectrum Access

    The fundamental problem of multiple secondary users contending for opportunistic spectrum access over multiple channels in cognitive radio networks has been formulated recently as a Decentralized Multi-Armed Bandit (D-MAB) problem. In a D-MAB problem there are M users and N arms (channels) that each offer i.i.d. stochastic rewards with unknown...

    Provided By University of Southern California

  • White Papers // Jul 2011

    Wireless Body Area Networks: Where Does Energy Go?

    Wireless Body Area Networks (WBANs) promise to revolutionize health care in the near future. By integrating bio-sensors with a mobile phone it is possible to monitor an individual's health and related behaviors. Monitoring is done by analyzing the sensor data either on a mobile phone or on a remote server...

    Provided By University of Southern California

  • White Papers // Jun 2011

    Distributed Storage Codes Reduce Latency in Vehicular Networks

    The authors investigate the benefits of distributed storage using erasure codes for file sharing in vehicular networks through both analysis and realistic trace-based simulations. They show that the key parameter affecting the file download latency is the ratio of file size to download bandwidth. When this ratio is small so...

    Provided By University of Southern California

  • White Papers // Jun 2011

    Distributed Storage Codes Through Hadamard Designs

    In distributed storage systems that employ erasure coding, the issue of minimizing the total repair bandwidth required to exactly regenerate a storage node after a failure arises. This repair bandwidth depends on the structure of the storage code and the repair strategies used to restore the lost data. Minimizing it...

    Provided By University of Southern California

  • White Papers // May 2011

    An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns...

    Provided By University of Southern California

  • White Papers // May 2011

    Multi-Dimensional SLA-Based Resource Allocation for Multi-Tier Cloud Computing Systems

    With increasing demand for computing and memory, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have Service Level Agreements (SLAs) and the total profit in the system depends on how the system...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Maximizing Profit in Cloud Computing System Via Resource Allocation

    With increasing demand for high performance computing and data storage, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have some Service Level Agreements (SLAs) and the total profit in the system depends...

    Provided By University of Southern California

  • White Papers // Mar 2011

    LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff

    Recent developments in stochastic network optimization theory have yielded a very general framework that solves a large class of networking problems of the following form: the authors are given a discrete time stochastic network. The network state, which describes the current realization of the underlying network randomness, such as the...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Semi-Markovian State Estimation and Policy Optimization for Energy Efficient Mobile Sensing

    User context monitoring on mobile devices benefits end-users by providing information support to various kinds of mobile applications. A pervasive question, however, is how the sensors on the mobile device could be scheduled energy efficiently without sacrificing too much detection accuracy. In this paper, the authors formulate the user state...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Reliability Aware Exceptions for Software Directed Fault Handling

    Today reliability emerges as a first order design constraint. Faults encountered in a chip can be classified into three categories: transient, intermittent and permanent. Fault classification allows a chip designer to provide the appropriate corrective action for each fault type. However, fault classification and correction are expensive mechanisms to implement...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Optimal Power Cost Management Using Stored Energy in Data Centers

    Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. The authors investigate cost reduction opportunities that arise by the use of Uninterrupted Power Supply (UPS) units as energy storage devices. This represents a deviation from the usual...

    Provided By University of Southern California

  • White Papers // Feb 2011

    On the Economics of Cloud Markets

    Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A cloud, also commonly known as a cloud network, typically comprises of hardware (network of servers) and a collection of software that is...

    Provided By University of Southern California

  • White Papers // Feb 2011

    A Framework for Quantitative Analysis of Cascades on Networks

    How does information flow in online social networks? How does the structure and size of the information cascade evolve in time? How can people efficiently mine the information contained in cascade dynamics? The authors approach these questions empirically and present an efficient and scalable mathematical framework for quantitative analysis of...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Adaptive Rate Stream Processing for Smart Grid Applications on Clouds

    The growing deployment of smart meters to continuously measure power usage by consumers as part of a smarter power grid is resulting in the need for utilities to process and analyze thousands of data streams in near real-time to detect system overload. The authors describe the use of Cloud platforms...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Towards Autonomous Wireless Backbone Deployment in Highly-Obstructed Environments

    In a setting that lacks infrastructure e.g., urban search and rescue, a team of networked mobile robots can provide a communication substrate by acting as routers in a wireless mesh network. The authors study the problem of determining the minimum number of robots, and how to position them, so that...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Household Location And Race: A Twenty-Year Retrospective

    In a paper published in The Review of Economics and Statistics some 20 years ago, the authors sought to assess the disparate residential location choices of black and white households in the Washington, D.C. metropolitan area (Gabriel and Rosenthal [1989]). The paper showed that simulated closure of large socio-economic gaps...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Optimizing Information Credibility in Social Swarming Applications

    With the advent of smartphone technology, it has become possible to conceive of entirely new classes of applications. Social swarming, in which users armed with smartphones are directed by a central director to report on events in the physical world, has several real-world applications. In this paper, the authors focus...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Energy Routing on the Future Grid: A Stochastic Network Optimization Approach

    Population expansion and broad deployment of wind and solar renewable power generation has highlighted concerns over the long-standing strategy for grid deployment, expansion and upgrade. Due to their stochastic and often volatile nature, these renewable sources are difficult to integrate into the grid in its current power-on-demand paradigm. In this...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Delay Constrained Minimum Energy Broadcast in Cooperative Wireless Networks

    The authors formulate the problem of delay constrained energy-efficient broadcast in cooperative multihop wireless networks. The authors show that this important problem is not only NP-complete, but also o(log(n)) inapproximable. They derive approximation results and an analytical lower-bound for this problem. They break this NP hard problem into three parts:...

    Provided By University of Southern California

  • White Papers // Dec 2009

    Network Routing Application Programmer's Interface (API) and Walk Through 9.0.1

    SCADDS data diffusion (at USC/ISI) and DRP (at MIT/LL) are both based on the core concept of subject-based routing. Although there are some fundamental differences between these approaches, authors believe that both can be accommodated with the same Network Routing API. An earlier version of this API was used by...

    Provided By University of Southern California

  • White Papers // Jan 2010

    Faster Network Design With Scenario Pre-Filtering

    The design and engineering of networks requires the consideration of many possible configurations different network topologies, bandwidths, traffic and policies. Network engineers may use network simulation to evaluate changes in network configuration, but detailed, packet-level simulation of many alternatives would be extremely time consuming. This paper introduces the concept of...

    Provided By University of Southern California

  • White Papers // Jan 2010

    Bandwidth-Aware Resource Allocation for Heterogeneous Computing Systems to Maximize Throughput

    This paper considers the resource allocation problem for computing a large set of equal-sized independent tasks on heterogeneous computing systems. This problem represents the computation paradigm for a wide range of applications such as SETI@home and Monte Carlo simulations. The authors consider a general problem in which the interconnection between...

    Provided By University of Southern California

  • White Papers // Jan 2010

    Admission Control and QoS for Continuous Media Displays in MANETs

    The authors consider continuous media delivery over a mobile ad-hoc network of vehicles equipped with Car-to-Car Peer-to-Peer (C2P2) devices. While the provision of high-bandwidth continuous media content with tight QoS requirements is challenging even in static networks, it is considerably more challenging when the network topology is dynamic due to...

    Provided By University of Southern California

  • White Papers // Jun 2009

    A Framework for Estimating the Energy Consumption Induced by a Distributed System's Architectural Style

    The architectural style used in a software system is an important factor in satisfying its quality requirements. In battery-powered environments, such as mobile and pervasive systems, efficiency with respect to energy consumption is often an important quality requirement. In this paper, the authors present a framework that facilitates early estimation...

    Provided By University of Southern California

  • White Papers // Mar 2010

    Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and anti-spam software. However, such software does not completely eliminate risk. Recent works...

    Provided By University of Southern California

  • White Papers // Jul 2010

    Selecting Representative IP Addresses for Internet Topology Studies

    An Internet hitlist is a set of addresses that cover and can represent the internet as a whole. Hitlists have long been used in studies of internet topology, reachability, and performance, serving as the destinations of traceroute or performance probes. Most early topology studies used manually generated lists of prominent...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Effect of Malicious Traffic on the Network

    The Internet has seen, in recent days, a continuous rise in malicious traffic including DDoS and worm attacks. In this paper, the authors study the effect of malicious traffic on the background traffic by gathering traces from two different locations. They show that the malicious traffic causes DNS latencies to...

    Provided By University of Southern California

  • White Papers // Jul 2009

    Cooperation and Coordination in Cognitive Networks With Packet Retransmission

    The cognitive framework, which fosters an efficient use of the channel resource by granting access to smart and adaptive terminals, has been recently integrated with the cooperative paradigm. Accordingly, following a spectrum-leasing approach, licensed (primary) users may let unlicensed (secondary) users access the owned bandwidth in exchange for an increased...

    Provided By University of Southern California

  • White Papers // Jan 2011

    A Measurement Study of Correlations of Internet Flow Characteristics

    Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of such flows for traffic monitoring and modeling purposes. Several prior researchers have characterized such flows using different classification schemes: by size as...

    Provided By University of Southern California

  • White Papers // Oct 2009

    Cognitive Interference Management in Retransmission-Based Wireless Networks

    Cognitive radio methodologies have the potential to dramatically increase the throughput of wireless systems. Herein, control strategies which enable the superposition in time and frequency of primary and secondary user transmissions are explored in contrast to more traditional sensing approaches which only allow the secondary user to transmit when the...

    Provided By University of Southern California

  • White Papers // Jun 2009

    A PIM (Processor-in-Memory) for Computer Graphics: Data Partitioning and Placement Schemes

    The demand for higher performance graphics continues to grow because of the incessant desire towards realism. And, rapid advances in fabrication technology have enabled one to build several processor cores on a single die. Hence, it is important to develop single chip parallel architectures for such data-intensive applications. In this...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Maximizing Profit in Cloud Computing System Via Resource Allocation

    With increasing demand for high performance computing and data storage, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have some Service Level Agreements (SLAs) and the total profit in the system depends...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Rebalancing Distributed Data Storage in Sensor Networks

    Sensor networks are an emerging class of systems with significant potential. Recent paper has proposed a distributed data structure called DIM for efficient support of multi-dimensional range queries in sensor networks. The original DIM design works well with uniform data distributions. However, real world data distributions are often skewed. Skewed...

    Provided By University of Southern California

  • White Papers // Feb 2011

    A Framework for Quantitative Analysis of Cascades on Networks

    How does information flow in online social networks? How does the structure and size of the information cascade evolve in time? How can people efficiently mine the information contained in cascade dynamics? The authors approach these questions empirically and present an efficient and scalable mathematical framework for quantitative analysis of...

    Provided By University of Southern California

  • White Papers // Oct 2010

    A Parameterized Centrality Metric for Network Analysis

    Centrality measures the degree to which network structure contributes to the importance, or status, of a node in a network. Over the years many different centrality metrics have been defined. One of the more popular metrics, between centrality, measures the fraction of all shortest paths in a network that pass...

    Provided By University of Southern California

  • White Papers // Nov 2010

    Leveraging User-Specified Metadata to Personalize Image Search

    The social media sites, such as Flickr and del.icio.us, allow users to upload content and annotate it with descriptive labels known as tags, join special-interest groups, etc. The authors believe user-generated metadata expresses user's tastes and interests and can be used to personalize information to an individual user. Specifically, they...

    Provided By University of Southern California

  • White Papers // Oct 2010

    Using Stochastic Models to Describe and Predict Social Dynamics of Web Users

    Popularity of content in social media is unequally distributed, with some items receiving a disproportionate share of attention from users. Predicting which newly-submitted items will become popular is critically important for both hosts of social media content and its consumers. Accurate and timely prediction would enable hosts to maximize revenue...

    Provided By University of Southern California

  • White Papers // Oct 2010

    Aligning Ontologies of Geospatial Linked Data

    The Web of Linked Data is characterized by linking structured data from different sources using equivalence statements, such as owl:sameAs, as well as other types of linked properties. However, the ontologies behind these sources are not linked. The work described in this paper aims at providing alignments between these ontologies...

    Provided By University of Southern California

  • White Papers // Sep 2009

    Wrapper Maintenance

    A Web wrapper is a software application that extracts information from a semi-structured source and converts it to a structured format. While semi-structured sources, such as Web pages, contain no explicitly specified schema, they do have an implicit grammar that can be used to identify relevant information in the document....

    Provided By University of Southern California

  • White Papers // Jan 2011

    Performance of FPGA Implementation of Bit-Split Architecture for Intrusion Detection Systems

    The use of reconfigurable hardware for network security applications has recently made great strides as Field-Programmable Gate Array (FPGA) devices have provided larger and faster resources. The performance of an Intrusion Detection System is dependent on two metrics: throughput and the total number of patterns that can fit on a...

    Provided By University of Southern California

  • White Papers // Oct 2009

    LP Decoding Meets LP Decoding: A Connection Between Channel Coding and Compressed Sensing

    This is a tale of two linear programming decoders, namely Channel Coding Linear Programming Decoding (CCLPD) and Compressed Sensing Linear Programming Decoding (CS-LPD). So far, they have evolved quite independently. The aim of the present paper is to show that there is a tight connection between, on the one hand,...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Interactive Knowledge Capture in the New Millennium: How the Semantic Web Changed Everything

    The Semantic Web has radically changed the landscape of knowledge acquisition research. It used to be the case that a single user would edit a local knowledge base, that the user would have domain expertise to add to the system, and that the system would have a centralized knowledge base...

    Provided By University of Southern California

  • White Papers // Dec 2009

    WINGS: Intelligent Workflow-Based Design of Computational Experiments

    Scientists use computational experiments to study natural phenomena through the lens of software tools and computer programs. A computational experiment consists of a description of how selected datasets are to be processed by a series of software components, in what order, and with what parameter configurations. Designing computational experiments is...

    Provided By University of Southern California

  • White Papers // Dec 2009

    A Semantic Framework for Automatic Generation of Computational Workflows Using Distributed Data and Component Catalogs

    Computational workflows are a powerful paradigm to represent and manage complex applications, particularly in large-scale distributed scientific data analysis. Workflows represent application components that result in individual computations as well as their interdependencies in terms of data flow. Workflow systems use these representations to manage various aspects of workflow creation...

    Provided By University of Southern California

  • White Papers // Jul 2010

    Simple Yet Efficient, Transparent Airtime Allocation for TCP in Wireless Mesh Networks

    Previous work has shown that TCP flows can starve in a multi-hop wireless mesh network because they fail to effectively contend for the channel. In this paper, the authors explore a simple yet effective technique that explicitly allocates airtime to each active pair of communicating neighbors in a wireless neighborhood...

    Provided By University of Southern California

  • White Papers // Jul 2010

    Passive On-Line In-Band Interference Inference in Centralized WLANs

    In this paper, the authors describe a passive on-line method for determining the conflict graph in a centralized wireless LAN. The key insight in the work is to exploit the relative timing between successfully received frames: If two successful frames sent on two different links overlap in time, then the...

    Provided By University of Southern California

  • White Papers // Sep 2010

    A Mathematical Theory of Internet Security Investments Under Cyber-Insurance Coverage

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such...

    Provided By University of Southern California

  • White Papers // Nov 2010

    P2P Streaming Systems: A Study on the Use of Advertisements as Incentives

    P2P streaming systems, such as PPLive, PPStream, and TVUPlayer, have become popular services with the widespread deployment of broadband networks. However, P2P streaming systems still face free-riding problems, similar to those that have been observed in P2P file sharing systems. Thus, one important problem in providing streaming services is that...

    Provided By University of Southern California

  • White Papers // Nov 2010

    On Using Cloud Platforms in a Software Architecture for Smart Energy Grids

    Increasing concern about energy consumption is leading to infrastructure that continuously monitors consumer energy usage and allow power utilities to provide dynamic feedback to curtail peak power load. Smart grid infrastructure being deployed globally needs scalable software platforms to rapidly integrate and analyze information streaming from millions of smart meters,...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Using Targeted Analytics To Improve Talent Decisions

    Analytics and metrics offer great potential to improve the quality of decision making on HR and human capital issues in organizations. Despite conventional wisdom, strong statistical skills are not necessarily a barrier to applying analytic ways of examining and solving organizational issue. The bigger barrier to applying analytics is the...

    Provided By University of Southern California

  • White Papers // Aug 2009

    Explicit and Precise Rate Control for Wireless Sensor Networks

    The state of the art congestion control algorithms for wireless sensor networks respond to coarse-grained feedback regarding available capacity in the network with an additive increase multiplicative decrease mechanism to set source rates. Providing precise feedback is challenging in wireless networks because link capacities vary with traffic on interfering links....

    Provided By University of Southern California

  • White Papers // Mar 2010

    Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks

    Data collection is a fundamental operation in Wireless Sensor Networks (WSN) where sensor nodes measure attributes about a phenomenon of interest and transmit their readings to a common base station. In this chapter, the author's survey contention-free Time Division Multiple Access (TDMA) based scheduling protocols for such data collection applications...

    Provided By University of Southern California

  • White Papers // Jul 2008

    Corporate Board Attributes, Team Effectiveness And Financial Performance

    Researchers have recently begun to integrate the literature on corporate boards with that of team effectiveness in an effort to understand how boards function and impact company performance. This study identifies five attributes of high-performing teams - knowledge, information, power, incentives and opportunity/time - and argues that these attributes will...

    Provided By University of Southern California

  • White Papers // Nov 2010

    Fast HRM: Confidence, Energy And Engagement

    The recession has not yet gone away; companies are not yet hiring, sales are not skyrocketing, and the world seems cautiously waiting for something a bit more positive to happen. That seems to explain the state of the leaders in the last pulse dialogue. As a result of all the...

    Provided By University of Southern California

  • White Papers // Sep 2010

    Building A Collaboration Capability For Sustainability: How Gap Inc. Is Creating And Leveraging A Strategic Asset

    Organizations are being challenged to find socially acceptable and ecologically proactive solutions while fulfilling economic expectations. One emerging pattern in response to this challenge is the development of sustainability goals and strategies that include the development of internal processes and systems to lower carbon footprints, address other green issues, and...

    Provided By University of Southern California

  • White Papers // Sep 2010

    The Organizational Sustainability Journey: Introduction To The Special Issue

    Sustainability has become a prominent topic in the popular press, corporate boardrooms, political arenas, and academia. Conversations and debates about what it is, why it is important, what should be done about it, and how quickly the authors should act are pervasive. An important, but often unspoken, urgency accompanies these...

    Provided By University of Southern California

  • White Papers // Aug 2010

    HRM In IPOs

    This paper reports critical information for firms planning to go public and those going through high rates of change. Based on several empirical studies and case study work done over the last 20 years, the paper finds that the key to survival, stock price growth and earnings growth is structural...

    Provided By University of Southern California

  • White Papers // Mar 2010

    Pass-through, Exposure, And The Currency Composition Of Debt

    Using a dataset of traded Mexican firms, the author documents two stylized facts about firms in the non-tradable sector: they take on large amounts of dollar-denominated debt and their earnings are not sensitive to the exchange rate. The author proposes an explanation based on imperfect competition in the domestic goods...

    Provided By University of Southern California

  • White Papers // Mar 2010

    Network Coding for Distributed Storage Systems

    Distributed storage systems provide reliable access to data through redundancy spread over individually unreliable nodes. Application scenarios include data centers, peer-to-peer storage systems, and storage in wireless networks. Storing data using an erasure code, in fragments spread across nodes, requires less redundancy than simple replication for the same level of...

    Provided By University of Southern California