University of Southern California

Displaying 1-40 of 214 results

  • White Papers // Aug 2012

    Scaling Behaviors of Wireless Device-to-Device Communications With Distributed Caching

    The authors analyze a novel architecture for caching popular video content to enable wireless device-to-device collaboration. They focus on the asymptotic scaling characteristics and show how they depends on video content popularity statistics. They identify a fundamental conflict between collaboration distance and interference and show how to optimize the transmission...

    Provided By University of Southern California

  • White Papers // May 2012

    Bipartite Index Coding

    The authors analyze a generalized index coding problem that allows multiple users to request the same packet. For this problem they introduce a novel coding scheme called partition multicast. Their scheme can be seen as a natural generalization of clique cover for directed index coding problems. Further, partition multicast corresponds...

    Provided By University of Southern California

  • White Papers // May 2012

    Feedback in the K-User Interference Channel

    A traditional viewpoint on feedback capacity has been pessimistic over the past few decades. This is mainly due to Shannon's original result which shows that feedback provides no increase in capacity for discrete memory-less point-to-point channels. Although feedback can indeed increase the capacity of multiple access channels, the increase in...

    Provided By University of Southern California

  • White Papers // May 2012

    Locally Repairable Codes

    One main challenge in the design of distributed storage codes is the Exact Repair Problem: if a node storing encoded information fails, to maintain the same level of reliability, the authors need to exactly regenerate what was lost in a new node. A major open problem in this area has...

    Provided By University of Southern California

  • White Papers // May 2012

    vCRIB: Virtualized Rule Management in the Cloud

    Cloud operators increasingly need many fine-grained rules to better control individual network flows for various management tasks. While previous approaches have advocated placing rules either on hypervisors or switches, the authors argue that future data centers would benefit from leveraging rule processing capabilities at both for better scalability and performance....

    Provided By University of Southern California

  • White Papers // May 2012

    Wireless Device-to-Device Communications With Distributed Caching

    The authors introduce a novel wireless Device-To-Device (D2D) collaboration architecture that exploits distributed storage of popular content to enable frequency reuse. They identify a fundamental conflict between collaboration distance and interference and show how to optimize the transmission power to maximize frequency reuse. Their analysis depends on the user content...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Wireless Peer-to-Peer Scheduling in Mobile Networks

    This paper considers peer-to-peer scheduling for a network with multiple wireless devices. A subset of the devices are mobile users that desire specific files. Each user may already have certain popular files in its cache. The remaining devices are access points that typically have access to a larger set of...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Repairable Fountain Codes

    This paper is eligible for the student paper award. The authors introduce a new family of fountain codes that are systematic and also have sparse parities. Although this is impossible if they require the code to be MDS, they show it can be achieved if they relax their requirement into...

    Provided By University of Southern California

  • White Papers // Feb 2012

    Allocations for Heterogeneous Distributed Storage

    The authors study the problem of storing a data object in a set of data nodes that fail independently with given probabilities. Their problem is a natural generalization of a homogenous storage allocation problem where all the nodes had the same reliability and is naturally motivated for peer-to-peer and cloud...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Automatic Request Categorization in Internet Services

    Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirements on anticipated workloads. The accuracy of these models benefits substantially by differentiating among categories of requests based on their resource usage characteristics. However, categorizing requests and their resource demands...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network

    A large number of sensors networked together form self-organizing pervasive systems that provide the basis for implementation of several applications involving distributed, collaborative computations. Energy dissipation is a critical issue for these networks, as their life-time is limited by the battery power of the sensors. In this paper, the authors...

    Provided By University of Southern California

  • White Papers // Jan 2012

    MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis

    Detecting coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have two logically distinct elements: distributed monitors that continuously collect traffic information, and a distributed query system that allows network operators to efficiently correlate information from different monitors in order to detect anomalous traffic...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Communication Models for Algorithm Design in Wireless Sensor Networks

    With continuing advancements in sensor node design and increasingly complex applications for Wireless Sensor Networks (WSNs), formal communication models are needed for either fair comparison between various algorithms or the development of design automation in WSNs. Toward such a goal, the authors formally define two link-wise communication models, namely, the...

    Provided By University of Southern California

  • White Papers // Jan 2012

    Power-Aware Topology Control for Wireless Ad-Hoc Networks

    In this paper, the authors examine the problem of power-aware topology control for wireless ad-hoc networks. The reliance on wireless multihop communications to maintain connectivity among nodes adds new complexity on the design and operation of the wireless ad-hoc networks. In particular, the lack of a physical backbone infrastructure poses...

    Provided By University of Southern California

  • White Papers // Jan 2012

    ELECTION: Energy-Efficient and Low-LatEncy SCheduling Technique for WIreless Sensor Networks

    The authors propose ELECTION, a new sleep scheduling scheme that adaptively schedules the sleep cycles of both communication radios and sensors in wireless active sensor networks. Taking advantage of spatial and temporal correlations in the underlying physical phenomenon, their scheme controls sleeping schedules of radios and sensors, and adaptively meets...

    Provided By University of Southern California

  • White Papers // Nov 2011

    Dynamic Index Coding for Wireless Broadcast Networks

    The authors consider a wireless broadcast station that transmits packets to multiple users. The packet requests for each user may overlap, and some users may already have certain packets. This presents a problem of broadcasting in the presence of side information, and is a generalization of the well known (and...

    Provided By University of Southern California

  • White Papers // Oct 2011

    Performance Analysis of Vertex-Centric Graph Algorithms on the Azure Cloud Platform

    Finding key vertices in large graphs is an important problem in many applications such as social networks, bioinformatics, and distribution networks. Betweenness centrality is a popular algorithm for finding such vertices and has been studied extensively, yielding several parallel formulations suitable to supercomputers and clusters. In this paper, the authors...

    Provided By University of Southern California

  • White Papers // Sep 2011

    Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, the authors present an architecture for a secure data repository service...

    Provided By University of Southern California

  • White Papers // Sep 2011

    MCC: A High-Throughput Multi-Channel Data Collection Protocol for Wireless Sensor Networks

    The authors present the design and implementation of MCC, the first high-rate multi-channel time-scheduled protocol for fair, real-time data collection in Wireless Sensor Networks. MCC incorporates sophisticated mechanisms for balanced routing tree formation, multiple frequency channel allocation and globally synchronized TDMA scheduling. Through systematic experiments with real WSN hardware(Tmote Sky),...

    Provided By University of Southern California

  • White Papers // Aug 2011

    On Hardness of Multiflow Transmission in Delay Constrained Cooperative Wireless Networks

    The authors consider the problem of energy-efficient transmission in multi-flow multi-hop cooperative wireless networks. Although the performance gains of cooperative approaches are well known, the combinatorial nature of these schemes makes it difficult to design efficient polynomial-time algorithms for joint routing, scheduling and power control. This becomes more so when...

    Provided By University of Southern California

  • White Papers // Jul 2011

    Decentralized Online Learning Algorithms for Opportunistic Spectrum Access

    The fundamental problem of multiple secondary users contending for opportunistic spectrum access over multiple channels in cognitive radio networks has been formulated recently as a Decentralized Multi-Armed Bandit (D-MAB) problem. In a D-MAB problem there are M users and N arms (channels) that each offer i.i.d. stochastic rewards with unknown...

    Provided By University of Southern California

  • White Papers // Jul 2011

    Wireless Body Area Networks: Where Does Energy Go?

    Wireless Body Area Networks (WBANs) promise to revolutionize health care in the near future. By integrating bio-sensors with a mobile phone it is possible to monitor an individual's health and related behaviors. Monitoring is done by analyzing the sensor data either on a mobile phone or on a remote server...

    Provided By University of Southern California

  • White Papers // Jun 2011

    Distributed Storage Codes Reduce Latency in Vehicular Networks

    The authors investigate the benefits of distributed storage using erasure codes for file sharing in vehicular networks through both analysis and realistic trace-based simulations. They show that the key parameter affecting the file download latency is the ratio of file size to download bandwidth. When this ratio is small so...

    Provided By University of Southern California

  • White Papers // Jun 2011

    Distributed Storage Codes Through Hadamard Designs

    In distributed storage systems that employ erasure coding, the issue of minimizing the total repair bandwidth required to exactly regenerate a storage node after a failure arises. This repair bandwidth depends on the structure of the storage code and the repair strategies used to restore the lost data. Minimizing it...

    Provided By University of Southern California

  • White Papers // May 2011

    An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns...

    Provided By University of Southern California

  • White Papers // May 2011

    Multi-Dimensional SLA-Based Resource Allocation for Multi-Tier Cloud Computing Systems

    With increasing demand for computing and memory, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have Service Level Agreements (SLAs) and the total profit in the system depends on how the system...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Maximizing Profit in Cloud Computing System Via Resource Allocation

    With increasing demand for high performance computing and data storage, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have some Service Level Agreements (SLAs) and the total profit in the system depends...

    Provided By University of Southern California

  • White Papers // Mar 2011

    LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff

    Recent developments in stochastic network optimization theory have yielded a very general framework that solves a large class of networking problems of the following form: the authors are given a discrete time stochastic network. The network state, which describes the current realization of the underlying network randomness, such as the...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Semi-Markovian State Estimation and Policy Optimization for Energy Efficient Mobile Sensing

    User context monitoring on mobile devices benefits end-users by providing information support to various kinds of mobile applications. A pervasive question, however, is how the sensors on the mobile device could be scheduled energy efficiently without sacrificing too much detection accuracy. In this paper, the authors formulate the user state...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Reliability Aware Exceptions for Software Directed Fault Handling

    Today reliability emerges as a first order design constraint. Faults encountered in a chip can be classified into three categories: transient, intermittent and permanent. Fault classification allows a chip designer to provide the appropriate corrective action for each fault type. However, fault classification and correction are expensive mechanisms to implement...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Optimal Power Cost Management Using Stored Energy in Data Centers

    Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. The authors investigate cost reduction opportunities that arise by the use of Uninterrupted Power Supply (UPS) units as energy storage devices. This represents a deviation from the usual...

    Provided By University of Southern California

  • White Papers // Feb 2011

    On the Economics of Cloud Markets

    Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A cloud, also commonly known as a cloud network, typically comprises of hardware (network of servers) and a collection of software that is...

    Provided By University of Southern California

  • White Papers // Feb 2011

    A Framework for Quantitative Analysis of Cascades on Networks

    How does information flow in online social networks? How does the structure and size of the information cascade evolve in time? How can people efficiently mine the information contained in cascade dynamics? The authors approach these questions empirically and present an efficient and scalable mathematical framework for quantitative analysis of...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Adaptive Rate Stream Processing for Smart Grid Applications on Clouds

    The growing deployment of smart meters to continuously measure power usage by consumers as part of a smarter power grid is resulting in the need for utilities to process and analyze thousands of data streams in near real-time to detect system overload. The authors describe the use of Cloud platforms...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Towards Autonomous Wireless Backbone Deployment in Highly-Obstructed Environments

    In a setting that lacks infrastructure e.g., urban search and rescue, a team of networked mobile robots can provide a communication substrate by acting as routers in a wireless mesh network. The authors study the problem of determining the minimum number of robots, and how to position them, so that...

    Provided By University of Southern California

  • White Papers // Feb 2011

    Household Location And Race: A Twenty-Year Retrospective

    In a paper published in The Review of Economics and Statistics some 20 years ago, the authors sought to assess the disparate residential location choices of black and white households in the Washington, D.C. metropolitan area (Gabriel and Rosenthal [1989]). The paper showed that simulated closure of large socio-economic gaps...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Optimizing Information Credibility in Social Swarming Applications

    With the advent of smartphone technology, it has become possible to conceive of entirely new classes of applications. Social swarming, in which users armed with smartphones are directed by a central director to report on events in the physical world, has several real-world applications. In this paper, the authors focus...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Delay Constrained Minimum Energy Broadcast in Cooperative Wireless Networks

    The authors formulate the problem of delay constrained energy-efficient broadcast in cooperative multihop wireless networks. The authors show that this important problem is not only NP-complete, but also o(log(n)) inapproximable. They derive approximation results and an analytical lower-bound for this problem. They break this NP hard problem into three parts:...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Energy Routing on the Future Grid: A Stochastic Network Optimization Approach

    Population expansion and broad deployment of wind and solar renewable power generation has highlighted concerns over the long-standing strategy for grid deployment, expansion and upgrade. Due to their stochastic and often volatile nature, these renewable sources are difficult to integrate into the grid in its current power-on-demand paradigm. In this...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Opportunistic Scheduling With Worst Case Delay Guarantees in Single and Multi-Hop Networks

    The authors first consider a multi-user, single-hop wireless network with arbitrarily varying (and possibly non-ergodic) arrivals and channels. They design an opportunistic scheduling algorithm that guarantees all sessions have a bounded worst case delay. The algorithm has no knowledge of the future, but yields throughput-utility that is close to (or...

    Provided By University of Southern California

  • White Papers // Nov 2008

    An Empirical Analysis Of Housing Price Dynamics With Factors

    The U.S. housing price indexes are subject to measurement problems that severely impair their ability to capture the true risk. In this paper, the authors seek alternative methodology of utilizing latent-variable statistical methods and provide new insight to understand housing market dynamics. Housing prices are assumed to respond to external...

    Provided By University of Southern California

  • White Papers // May 2009

    Immigrants And Housing Markets In Mid-Size Metropolitan Areas

    The recent trend of immigrants arriving in mid-size metropolitan areas has received growing attention in the literature. This paper examines the success of immigrants in the housing markets of a sample 60 metropolitan areas using Census microdata in both 2000 and 2005. The results suggest that immigrants are less successful...

    Provided By University of Southern California

  • White Papers // Sep 2008

    Is Public Space A Public Good? A Structure/Agency View Of The 'Narrative Of Loss'

    Public space is examined from the perspective of economic goods, defined by 'Rivalness' and 'Excludability', to explain the reasons for the 'Narrative of loss' through this framework. The explanation is twofold - the first part deals with the structural imperatives that lead to the commoditization of space, and the second...

    Provided By University of Southern California

  • White Papers // Jul 2008

    The Relationship Between Stock Returns And The Past Performance Of Hotel Real Estate Industry In The U.S.: Is Hotel Real Estate Prone To Overinvestment?

    This paper strongly confirms that short-horizon contrarian profits are partially due to lead-lag effects, while in the intermediate-term price momentum profits and long-term contrarian profits are partially due to the firms' overreaction to past price. The result tends to support the price overreaction hypothesis, and is clearly inconsistent with the...

    Provided By University of Southern California

  • White Papers // May 2008

    REITs Return Behavior And Legal Infrastructure: The 1993 Revenue Reconciliation Act And Inspirations For China's Emerging REITs Market

    REIT is an important but complex financial innovation. The next decade is likely to see the emergence and fast development of REITs market in China. The development of a sound legal and regulatory infrastructure is a critical first step. Obviously, the lessons in the 48 years development of the U.S....

    Provided By University of Southern California

  • White Papers // Jul 2008

    Housing Tenure Transitions Of Older Households: Life Cycle, Demographic, And Familial Factors

    Understanding the housing choices of the older households will grow in importance as the baby boom generation starts to retire. This proposed analysis utilizes a rich longitudinal data set (PSID) to provide insight into the reasons that older households leave homeownership to become renters. Because of the richness of the...

    Provided By University of Southern California

  • White Papers // Feb 2009

    Intergenerational Transmission Of, And Returns To Human Capital And Changes Therein Over Time: Empirical Evidence From Egypt

    The purposes of this paper are: To measure and explain changes in the gender-specific short and medium term returns to education in different sectors (private and public, formal and informal, tradable and non-tradable), and to examine the long-run effects of education from generation to generation and, in the process, to...

    Provided By University of Southern California

  • White Papers // Jul 2009

    Challenges in Security for Cyber-Physical Systems

    The design of security for cyber-physical systems must take into account several characteristics common to such systems. Among these are feedback between the cyber and physical environment, distributed management and control, uncertainty, real-time requirements, and geographic distribution. This paper discusses these characteristics and suggests a design approach that better integrates...

    Provided By University of Southern California

  • White Papers // Oct 2009

    Neighborhood-Centric Congestion Control for Multi-Hop Wireless Mesh Networks

    Complex interference in static multi-hop wireless mesh networks can adversely affect transport protocol performance. Since TCP does not explicitly account for this, starvation and unfairness can result from the use of TCP over such networks. This paper explores mechanisms for achieving fair and efficient congestion control for multi-hop wireless mesh...

    Provided By University of Southern California

  • White Papers // Oct 2008

    The Achievable Rate Region of 802.11-Scheduled Multi-Hop Networks

    This paper characterizes the achievable rate region for any 802.11-scheduled static multi-hop network. To do so, the authors first characterize the achievable edge-rate region, that is, the set of edge rates that are achievable on the given topology. This requires a careful consideration of the inter-dependence among edges, since neighboring...

    Provided By University of Southern California

  • White Papers // Mar 2010

    Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and anti-spam software. However, such software does not completely eliminate risk. Recent works...

    Provided By University of Southern California

  • White Papers // Jun 2009

    A Framework for Estimating the Energy Consumption Induced by a Distributed System's Architectural Style

    The architectural style used in a software system is an important factor in satisfying its quality requirements. In battery-powered environments, such as mobile and pervasive systems, efficiency with respect to energy consumption is often an important quality requirement. In this paper, the authors present a framework that facilitates early estimation...

    Provided By University of Southern California

  • White Papers // Sep 2008

    The Role Of Exports In The Economy Of Colonial North America: New Estimates For The Middle Colonies

    Economic historians of the eighteenth-century British mainland North American colonies have given considerable weight to the role of exports as a stimulus for economic growth. Yet their analyses have been handicapped by reliance on one or two time series to serve as indicators of broader changes rather than considering the...

    Provided By University of Southern California

  • White Papers // Feb 2011

    On the Economics of Cloud Markets

    Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A cloud, also commonly known as a cloud network, typically comprises of hardware (network of servers) and a collection of software that is...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Optimal Power Cost Management Using Stored Energy in Data Centers

    Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. The authors investigate cost reduction opportunities that arise by the use of Uninterrupted Power Supply (UPS) units as energy storage devices. This represents a deviation from the usual...

    Provided By University of Southern California

  • White Papers // Oct 2010

    Distributed Storage Codes Meet Multiple-Access Wiretap Channels

    The authors consider the overhead minimization of Maximum-Distance Separable (MDS) storage codes for the repair of a single failed node and the total Secure Degrees-of-Freedom (S-DoF) maximization in a multiple-access compound wiretap channel. They show that the two problems are connected. Specifically, the overhead minimization for a single node failure...

    Provided By University of Southern California

  • White Papers // Jun 2009

    Structure of Heterogeneous Networks

    Heterogeneous networks play a key role in the evolution of communities and the decisions individuals make. These networks link different types of entities, for example, people and the events they attend. Network analysis algorithms usually project such networks unto simple graphs composed of entities of a single type. In the...

    Provided By University of Southern California

  • White Papers // Jul 2009

    Analysis of Internet Measurement Systems for Optimized Anomaly Detection System Design

    Although there exist very accurate hardware systems for measuring traffic on the internet, their widespread use for analysis tasks is limited by their high cost. On the other hand, less expensive, software-based systems exist that are widely available and can be used to perform a number of simple analysis tasks....

    Provided By University of Southern California

  • White Papers // Jan 2011

    Rebalancing Distributed Data Storage in Sensor Networks

    Sensor networks are an emerging class of systems with significant potential. Recent paper has proposed a distributed data structure called DIM for efficient support of multi-dimensional range queries in sensor networks. The original DIM design works well with uniform data distributions. However, real world data distributions are often skewed. Skewed...

    Provided By University of Southern California

  • White Papers // Feb 2009

    DCOPs Meet the Real World: Exploring Unknown Reward Matrices With Applications to Mobile Sensor Networks

    Buoyed by the recent successes in the area of Distributed Constraint Optimization Problems (DCOPs), this paper addresses challenges faced when applying DCOPs to real-world domains. This expedition reveals that three fundamental challenges must be addressed for a large class of real-world domains, requiring design of novel DCOP algorithms. First, in...

    Provided By University of Southern California

  • White Papers // Jul 2010

    Simple Yet Efficient, Transparent Airtime Allocation for TCP in Wireless Mesh Networks

    Previous work has shown that TCP flows can starve in a multi-hop wireless mesh network because they fail to effectively contend for the channel. In this paper, the authors explore a simple yet effective technique that explicitly allocates airtime to each active pair of communicating neighbors in a wireless neighborhood...

    Provided By University of Southern California

  • White Papers // Jul 2010

    Passive On-Line In-Band Interference Inference in Centralized WLANs

    In this paper, the authors describe a passive on-line method for determining the conflict graph in a centralized wireless LAN. The key insight in the work is to exploit the relative timing between successfully received frames: If two successful frames sent on two different links overlap in time, then the...

    Provided By University of Southern California

  • White Papers // Sep 2010

    A Mathematical Theory of Internet Security Investments Under Cyber-Insurance Coverage

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such...

    Provided By University of Southern California

  • White Papers // Nov 2010

    P2P Streaming Systems: A Study on the Use of Advertisements as Incentives

    P2P streaming systems, such as PPLive, PPStream, and TVUPlayer, have become popular services with the widespread deployment of broadband networks. However, P2P streaming systems still face free-riding problems, similar to those that have been observed in P2P file sharing systems. Thus, one important problem in providing streaming services is that...

    Provided By University of Southern California

  • White Papers // Oct 2009

    LP Decoding Meets LP Decoding: A Connection Between Channel Coding and Compressed Sensing

    This is a tale of two linear programming decoders, namely Channel Coding Linear Programming Decoding (CCLPD) and Compressed Sensing Linear Programming Decoding (CS-LPD). So far, they have evolved quite independently. The aim of the present paper is to show that there is a tight connection between, on the one hand,...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Performance of FPGA Implementation of Bit-Split Architecture for Intrusion Detection Systems

    The use of reconfigurable hardware for network security applications has recently made great strides as Field-Programmable Gate Array (FPGA) devices have provided larger and faster resources. The performance of an Intrusion Detection System is dependent on two metrics: throughput and the total number of patterns that can fit on a...

    Provided By University of Southern California

  • White Papers // Mar 2011

    Maximizing Profit in Cloud Computing System Via Resource Allocation

    With increasing demand for high performance computing and data storage, distributed computing systems have attracted a lot of attention. Resource allocation is one of the most important challenges in the distributed systems specially when the clients have some Service Level Agreements (SLAs) and the total profit in the system depends...

    Provided By University of Southern California

  • White Papers // Sep 2008

    TID Damage and Annealing Response of 90 Nm Commercial-Density SRAMs

    The authors characterize the TID resilience and annealing response of high-density SRAMs, fabricated in 90 nm commercial processes. Results demonstrate intrinsic SRAM hardness at 300 krad(Si), but also reveal several orders of magnitude increase in leakage current at 1 Mrad(Si) of exposure, with recorded critical functionality failures. However, the technology...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Interactive Knowledge Capture in the New Millennium: How the Semantic Web Changed Everything

    The Semantic Web has radically changed the landscape of knowledge acquisition research. It used to be the case that a single user would edit a local knowledge base, that the user would have domain expertise to add to the system, and that the system would have a centralized knowledge base...

    Provided By University of Southern California

  • White Papers // Jan 2011

    A Measurement Study of Correlations of Internet Flow Characteristics

    Previous studies of Internet traffic have shown that a very small percentage of flows consume most of the network bandwidth. It is important to understand the characteristics of such flows for traffic monitoring and modeling purposes. Several prior researchers have characterized such flows using different classification schemes: by size as...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Effect of Malicious Traffic on the Network

    The Internet has seen, in recent days, a continuous rise in malicious traffic including DDoS and worm attacks. In this paper, the authors study the effect of malicious traffic on the background traffic by gathering traces from two different locations. They show that the malicious traffic causes DNS latencies to...

    Provided By University of Southern California

  • White Papers // Jul 2009

    Corporate Governance In The Recent Financial Crisis: Evidence From Financial Institutions Worldwide

    This paper investigates the role of corporate governance in the current financial crisis using a unique dataset of 306 global financial firms across 31 countries that were at the center of the 2007-2008 credit crisis. The authors document that financial firm's experienced substantial CEO turnover during this period. They find...

    Provided By University of Southern California

  • White Papers // Nov 2010

    On Using Cloud Platforms in a Software Architecture for Smart Energy Grids

    Increasing concern about energy consumption is leading to infrastructure that continuously monitors consumer energy usage and allow power utilities to provide dynamic feedback to curtail peak power load. Smart grid infrastructure being deployed globally needs scalable software platforms to rapidly integrate and analyze information streaming from millions of smart meters,...

    Provided By University of Southern California

  • White Papers // Dec 2010

    Multi-Channel Scheduling and Spanning Trees: Throughput-Delay Trade-Off for Fast Data Collection in Sensor Networks

    The authors investigate the trade-off between two mutually conflicting performance objectives - throughput and delay - for fast, periodic data collection in tree-based sensor networks arbitrarily deployed in 2-D. Two primary factors that affect the data collection rate (throughput) and timeliness (delay) are: efficiency of the link scheduling protocol, and...

    Provided By University of Southern California

  • White Papers // Nov 2009

    Perspectives on Quality of Experience for Video Streaming Over WiMAX

    The advent of broadband wireless networks, such as WiMAX, is paving the way for the widespread deployment of high-bandwidth video streaming services for mobile users. To provide acceptable end-to-end performance in such a network, it is important to monitor the Quality of Experience (QoE) of the user, since the inherent...

    Provided By University of Southern California

  • White Papers // Sep 2008

    Center In Law, Economics And Organization Research Paper Series And Legal Studies Research Paper Series

    Thurgood Marshall's life - as a litigator and a jurist - is a testament to his commitment to the words engraved above the entrance to the Supreme Court building: Equal Justice Under Law. His jurisprudence relating to law and politics - elections, campaigns, and political parties - provides his vision...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Underwater Sensor Networking: Research Challenges and Potential Applications

    This paper summarizes the authors' research directions in underwater sensor networks. They highlight potential applications to off-shore oilfields for seismic monitoring, equipment monitoring, and underwater robotics. They identify research directions in short-range acoustic communications, MAC, time synchronization, and localization protocols for high-latency acoustic networks, long-duration network sleeping, and application-level data...

    Provided By University of Southern California

  • White Papers // Jan 2011

    Delay Constrained Minimum Energy Broadcast in Cooperative Wireless Networks

    The authors formulate the problem of delay constrained energy-efficient broadcast in cooperative multihop wireless networks. The authors show that this important problem is not only NP-complete, but also o(log(n)) inapproximable. They derive approximation results and an analytical lower-bound for this problem. They break this NP hard problem into three parts:...

    Provided By University of Southern California

  • White Papers // May 2009

    Feasibility of the Receiver Capacity Model for Multi-Hop Wireless Networks

    The receiver capacity model is a simple model to capture flow dynamics in a multi-hop wireless network, by presenting linear constraints to define the feasible rate region of the network, taking into account interference. The model associates with each receiver in the network a notion of constant receiver capacity. Receiver...

    Provided By University of Southern California

  • White Papers // Sep 2009

    Wrapper Maintenance

    A Web wrapper is a software application that extracts information from a semi-structured source and converts it to a structured format. While semi-structured sources, such as Web pages, contain no explicitly specified schema, they do have an implicit grammar that can be used to identify relevant information in the document....

    Provided By University of Southern California