University of Texas

Displaying 1-40 of 265 results

  • White Papers // Jan 2015

    KLOS: A High Performance Kernel-Less Operating System

    Operating systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is performed. This has one significant drawback that every service call involves an overhead of a context switch where processor state is saved and...

    Provided By University of Texas

  • White Papers // Nov 2014

    Encoded Archival Description: Data Quality and Analysis

    In order to authenticate the meaning of collections and to preserve their evidentiary value, archivists create documents (finding aids) that describe the provenance and original order of the records. Metadata standards such as Encoded Archival Description (EAD) enable finding aids to be encoded, searched, and displayed online. However, recent research...

    Provided By University of Texas

  • White Papers // Jun 2013

    Graduates' Perception of Employment in SMEs and Large Enterprises

    This paper looks at non business (n = 66) and business graduates (n = 18) and compares their employment preference in Small and Medium sized Enterprises (SME) or Large Enterprises (LE). In pursuit, a questionnaire was developed measuring the perception of graduates as regards on the content of a job,...

    Provided By University of Texas

  • White Papers // Aug 2012

    Offloading in Heterogeneous Networks: Modeling, Analysis and Design Insights

    Pushing data traffic from cellular to Wi-Fi is an example of inter-Radio Access Technology (RAT) offloading. While this clearly alleviates congestion on the over-loaded cellular network, the ultimate potential of such offloading and its effect on overall system performance is not well understood. To address this, the authors develop a...

    Provided By University of Texas

  • White Papers // Jul 2012

    Frankenstein: Stitching Malware From Benign Binaries

    This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-the-art metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the concept of...

    Provided By University of Texas

  • White Papers // Jun 2012

    New Proof Methods for Attribute-Based Encryption: Achieving Full Security Through Selective Techniques

    The authors develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of...

    Provided By University of Texas

  • White Papers // May 2012

    Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems

    A unique characteristics of provenance data is that it forms a Directed Acyclic Graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to...

    Provided By University of Texas

  • White Papers // May 2012

    Tag-Based Information Flow Analysis for Document Classification in Provenance

    A crucial aspect of certain applications such as the ones pertaining to Intelligence domain or Health-care, is to manage and protect sensitive information effectively and efficiently. In this paper, the authors propose a tagging mechanism to track the flow of sensitive or valuable information in a provenance graph and automate...

    Provided By University of Texas

  • White Papers // May 2012

    AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing

    A means of reliably concealing ownership of cloud data without impeding computation over the data is presented and evaluated. This facilitates information privacy enforcement in cloud environments by withholding data ownership information from cloud nodes that compute using the data. As a result, nodes that have access to private data...

    Provided By University of Texas

  • White Papers // May 2012

    Dual Form Signatures: An Approach for Proving Security From Static Assumptions

    In this paper, the authors introduce the abstraction of Dual Form Signatures as a useful framework for proving security (existential unforgeability) from static assumptions for schemes with special structure that are used as a basis of other cryptographic protocols and applications. They describe the power of this framework by proving...

    Provided By University of Texas

  • White Papers // May 2012

    Hatman: Intra-Cloud Trust Management for Hadoop

    Data and computation integrity and security are major concerns for users of cloud computing facilities. Many production-level clouds optimistically assume that all cloud nodes are equally trustworthy when dispatching jobs; jobs are dispatched based on node load, not reputation. This increases their vulnerability to attack, since compromising even one node...

    Provided By University of Texas

  • White Papers // Apr 2012

    An Empirical Study of Supplementary Bug Fixes

    A recent study finds that errors of omission are harder for programmers to detect than errors of commission. While several change recommendation systems already exist to prevent or reduce omission errors during software development, there have been very few studies on why errors of omission occur in practice and how...

    Provided By University of Texas

  • White Papers // Apr 2012

    Towards Understanding the Fundamentals of Mobility in Cellular Networks

    Despite the central role of mobility in wireless networks, there are surprisingly few fundamental results on its properties. This paper aims to address this gap by proposing a new Random Way-Point (RWP) mobility model defined on the entire plane and applying it to analyze two key cellular network parameters: handover...

    Provided By University of Texas

  • White Papers // Apr 2012

    Vdiff: A Program Differencing Algorithm for Verilog Hardware Description Language

    During code review tasks, comparing two versions of a hardware design description using existing program differencing tools such as diff is inherently limited because these tools implicitly assume sequential execution semantics, while hardware description languages are designed to model concurrent computation. The authors designed a position-independent differencing algorithm to robustly...

    Provided By University of Texas

  • White Papers // Apr 2012

    BRACE: An Assertion Framework for Debugging Cyber-Physical Systems

    Developing Cyber-Physical Systems (CPS) is challenging because correctness depends on both logical and physical states, which are collectively difficult to observe. The developer often need to repeatedly rerun the system while observing its behavior and tweak the hardware and software until it meets minimum requirements. This process is tedious, error-prone,...

    Provided By University of Texas

  • White Papers // Apr 2012

    Extending Java for Android Programming

    Android is one of the most popular platforms for developing mobile applications. However, its framework relies on programming conventions and styles to implement framework-specific concepts like activities and intents, causing problems such as reliability, readability, understandability, and maintainability. The authors propose to extend Java to support Android framework concepts explicitly...

    Provided By University of Texas

  • White Papers // Feb 2012

    A-Serv: A Novel Architecture Providing Scalable Quality of Service

    QoS architectures define how routers process packets to ensure QoS service guarantees enforced. Existing QoS architectures such as Integrated Services (IntServ), Differentiated Services (DiffServ), and Dynamic Packet State (DPS) share one common property that the packet structure and the function of the routers are closely connected. Packets of one data...

    Provided By University of Texas

  • White Papers // Feb 2012

    Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes

    Prefix-Preserving Encryption (PPE) is an important type of encryption scheme, having a wide range of applications, such as IP addresses anonymization, prefix-matching search, and rang search. There are two issues in PPE schemes, security proof and single key requirement. Existing security proofs for PPE only reduce the security of a...

    Provided By University of Texas

  • White Papers // Feb 2012

    Decoupled Dynamic Cache Segmentation

    The Least Recently Used (LRU) replacement policy performs poorly in the Last-Level Cache (LLC) because temporal locality of memory accesses is filtered by first and second level caches. The authors propose a cache segmentation technique that dynamically adapts to cache access patterns by predicting the best number of not-yet-referenced and...

    Provided By University of Texas

  • White Papers // Jan 2012

    Identifying Failure-Inducing Combinations in a Combinatorial Test Set

    A t-way combinatorial test set is designed to detect failures that are triggered by combinations involving no more than t parameters. Assume that the authors have executed a t-way test set and some tests have failed. A natural question to ask is: what combinations have caused these failures? Identifying such...

    Provided By University of Texas

  • White Papers // Jan 2012

    Optimal Surface Deployment Problem in Wireless Sensor Networks

    Sensor deployment is a fundamental issue in a wireless sensor network, which often dictates the overall network performance. Previous studies on sensor deployment mainly focused on sensor networks on 2D plane or in 3D volume. In this paper, the authors tackle the problem of optimal sensor deployment on 3 surfaces,...

    Provided By University of Texas

  • White Papers // Jan 2012

    Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security

    The authors present a new approach for creating chosen ciphertext secure encryption. The focal point of their work is a new abstraction that they call Detectable Chosen Ciphertext Security (DCCA). Intuitively, this notion is meant to capture systems that are not necessarily Chosen Ciphertext Attack (CCA) secure, but where they...

    Provided By University of Texas

  • White Papers // Jan 2012

    A Lightweight Algorithm for Causal Message Ordering in Mobile Computing Systems

    Causally ordered message delivery is a required property for several distributed applications particularly those that involve human interactions (such as teleconferencing and collaborative work). In this paper, the authors present an efficient protocol for causal ordering in mobile computing systems. This protocol requires minimal resources on mobile hosts and wireless...

    Provided By University of Texas

  • White Papers // Jan 2012

    XML Query Routing in Structured P2P Systems

    This paper addresses the problem of data placement, indexing, and querying large XML data repositories distributed over an existing P2P service infrastructure. The authors' architecture scales gracefully to the network and data sizes, is fully distributed, fault tolerant and self-organizing, and handles complex queries efficiently, even those queries that use...

    Provided By University of Texas

  • White Papers // Dec 2011

    Making Argument Systems for Outsourced Computation Practical (Sometimes)

    This paper describes the design, implementation, and evaluation of a system for performing verifiable outsourced computation. It has long been known that this problem can be solved in theory using Probabilistically Checkable Proofs (PCPs) coupled with modern cryptographic tools, and these solutions have wholly impractical performance, according to the conventional...

    Provided By University of Texas

  • White Papers // Nov 2011

    Heterogeneous Cellular Networks: From Theory to Practice

    The proliferation of internet-connected mobile devices will continue to drive growth in data traffic in an exponential fashion, forcing network operators to dramatically increase the capacity of their networks. To do this cost-effectively, a paradigm shift in cellular network infrastructure deployment is occurring away from traditional (expensive) high-power tower-mounted base...

    Provided By University of Texas

  • White Papers // Nov 2011

    Efficient Similarity Search Over Encrypted Data

    In recent years, due to the appealing features of cloud computing, large amount of data have been stored in the cloud. Although cloud based services offer many advantages, privacy and security of the sensitive data is a big concern. To mitigate the concerns, it is desirable to outsource sensitive data...

    Provided By University of Texas

  • White Papers // Nov 2011

    Leakage - Delay Tradeoff in Wide-Bit Nanoscale CMOS Adders

    The scaling of nanometer technology has had a major impact on the power dissipation of CMOS circuits. As transistor size decreases it has become apparent that leakage power is becoming a dominant fighting force against future technology. In this paper, the importance of static power consumption on the design of...

    Provided By University of Texas

  • White Papers // Nov 2011

    Insider Threat Detection Using Stream Mining and Graph Mining

    Evidence of malicious insider activity is often buried within large data streams, such as system logs accumulated over months or years. Ensemble-based stream mining leverages multiple classification models to achieve highly accurate anomaly detection in such streams even when the stream is unbounded, evolving, and unlabeled. This makes the approach...

    Provided By University of Texas

  • White Papers // Nov 2011

    Program Interferometry

    Modern microprocessors have many micro-architectural features. Quantifying the performance impact of one feature such as dynamic branch prediction can be difficult. On one hand, a timing simulator can predict the difference in performance given two different implementations of the technique, but simulators can be quite inaccurate. On the other hand,...

    Provided By University of Texas

  • White Papers // Nov 2011

    Functional Verification of Class Invariants in CleanJava

    In Cleanroom-style functional program verification, a program is viewed as a mathematical function from one program state to another, and the program is verified by comparing two functions, the implemented and the expected behaviors of a program. The technique requires a minimal mathematical background and supports forward reasoning, but it...

    Provided By University of Texas

  • White Papers // Oct 2011

    An Optimized Scaled Neural Branch Predictor

    Conditional branch prediction remains one of the most important enabling technologies for high-performance microprocessors. A small improvement in accuracy can result in a large improvement in performance as well as a significant reduction in energy wasted on wrong-path instructions. Neural-based branch predictors have been among the most accurate in the...

    Provided By University of Texas

  • White Papers // Sep 2011

    Transmission Capacity of Ad-Hoc Networks With Multiple Antennas Using Transmit Stream Adaptation and Interference Cancelation

    The transmission capacity of an ad-hoc network is the maximum density of active transmitters per unit area, given an outage constraint at each receiver for a fixed rate of transmission. Assuming that the transmitter locations are distributed as a Poisson point process, this paper derives upper and lower bounds on...

    Provided By University of Texas

  • White Papers // Sep 2011

    AOVis: A Model-Driven Multiple-Graph Approach to Program Fact Extraction for AspectJ/Java Source Code

    AspectJ reverse engineering and visualization remains a challenge at the architectural and design levels, with fewer tools available for reverse engineers compared to other languages such as Java. Prior work on AspectJ modeling focused on forward engineering or detailed-design reverse engineering, or required special instrumentation to identify cross-cutting relationships. Effective...

    Provided By University of Texas

  • White Papers // Sep 2011

    Supervised Learning for Insider Threat Detection Using Stream Mining

    Insider threat detection requires the identification of rare anomalies in contexts where evolving behaviors tend to mask such anomalies. This paper proposes and tests an ensemble-based stream mining algorithm based on supervised learning that addresses this challenge by maintaining an evolving collection of multiple models to classify dynamic data streams...

    Provided By University of Texas

  • White Papers // Sep 2011

    Toward the Verification of a Simple Hypervisor

    Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achieving these benefits depends upon the reliability of the underlying virtual machine monitors (hypervisors). This paper describes an ongoing project to develop and verify MinVisor, a simple but functional Type-I x86 hypervisor, proving protection properties at the assembly level using...

    Provided By University of Texas

  • White Papers // Sep 2011

    Building Malware Infection Trees

    "Dynamic analysis of malware is an ever evolving and challenging task. A Malware infection Tree (MiT) can assist in analysis by identifying processes and files related to a specific malware sample. In this paper, the authors propose an abstract approach to building a comprehensive MiT based on rules describing execution...

    Provided By University of Texas

  • White Papers // Aug 2011

    Remote Batch Invocation for SQL Databases

    Batch services are a new approach to distributed computation in which clients send batches of operations for execution on a server and receive hierarchical results sets in response. In this paper, the authors show how batch services provide a simple and powerful interface to relational databases, with support for arbitrary...

    Provided By University of Texas

  • White Papers // Aug 2011

    The CleanJava Language for Functional Program Verification

    Unlike Hoare-style program verification, functional program verification supports forward reasoning by viewing a program as a mathematical function from one program state to another and proving its correctness by essentially comparing two mathematical functions, the function computed by the program and its specification. Since it requires a minimal mathematical background...

    Provided By University of Texas

  • White Papers // Aug 2011

    A Tutorial on Functional Program Verification

    This paper gives a quick tutorial introduction to functional program verification. In functional program verification, a program is viewed as a mathematical function from one program state to another, and proving its correctness is essentially comparing two mathematical functions, the function computed by the program and the specification of the...

    Provided By University of Texas

  • White Papers // Jul 2001

    Product Costing And Pricing Under Long Term Capacity Commitment

    This white paper discusses about a model that is developed to analyze optimal product costing and pricing decisions when a firm must make long term commitments to some activity resource capacities. The problem is complex because of interactions between the initial capacity choices and adjustments in product costs and prices...

    Provided By University of Texas

  • White Papers // Feb 2007

    Sustainable IT Outsourcing Success: Let Enterprise Architecture Be Your Guide

    This paper explores the relationship between IT outsourcing and enterprise architecture. In an earlier paper which described four stages of architecture maturity (business silos, standardized technology, rationalized process, and business modularity). In this paper it is concluded that three different outsourcing arrangements support transitions from one stage to another. Firms...

    Provided By University of Texas

  • White Papers // Jun 2009

    A Framework for Modeling Security Measures

    This paper introduces a framework that provides a model for describing security measures and their relative effectiveness as well as importance. This model enhances computer security training and educational curriculum by providing experimental data and analysis to educators and students. Business environments will benefit from this model by enabling more...

    Provided By University of Texas

  • White Papers // Jul 2009

    Calculating, Creating, And Claiming Value In Business Markets: Status And Research Agenda

    B2B markets offer challenges that differ from those in B2C markets in addressing these issues (e.g., Anderson, Narus, and Narayandas 2009; Dwyer and Tanner 2008). These challenges stem from the fact that most B2B markets (relative to B2C markets) are characterized by a far fewer buyers who buy in much...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet : An Emergent Technology Based Radio Access Network Architecture for Next Generation Cellular Wireless Systems

    For next generation wireless cellular networks, the Radio Access Network (RAN) component is destined to evolve into a high-capacity, flexible and reconfigurable network architecture supporting smaller cell sites and newer technologies. Based on the well-known Petersen graph, in this paper the authors propose a RAN architecture, named PeterNet, that interconnects...

    Provided By University of Texas

  • White Papers // Jan 2010

    IP Address Assignment in a Mobile Ad Hoc Network

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By University of Texas

  • White Papers // Jan 2010

    Energy Consumption in Wireless Sensor Networks Using GSP

    One of the main design issues for a sensor network is conservation of the energy available at each sensor node. The authors propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. They split the lifetime of the sensor network into equal periods of time...

    Provided By University of Texas

  • White Papers // May 2010

    JSZap: Compressing JavaScript Code

    JavaScript is widely used in web-based applications, and gigabytes of JavaScript code are transmitted over the Internet every day. Current efforts to compress JavaScript to reduce network delays and server bandwidth requirements rely on syntactic changes to the source code and content encoding using gzip. This paper considers reducing the...

    Provided By University of Texas

  • White Papers // Feb 2010

    Real-Time, Unobtrusive, and Efficient Program Execution Tracing With Stream Caches and Last Stream Predictors

    This paper introduces a new hardware mechanism for capturing and compressing program execution traces unobtrusively in real-time. The proposed mechanism is based on two structures called stream cache and last stream predictor. The authors explore the effectiveness of a trace module based on these structures and analyze the design space....

    Provided By University of Texas

  • White Papers // Jan 2011

    Practical Utilities for Monitoring Multicast Service Availability

    Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to monitor several different characteristics of IP multicast. In this paper, the authors focus on one specific monitoring task: monitoring end-to-end...

    Provided By University of Texas

  • White Papers // Jan 2010

    International Protection Of Intellectual Property: A Quantitative Assessment

    The strength of Intellectual Property Right (IPR) protection varies across countries and these differences have persisted across time. In this paper, the author builds a multi-country dynamic model where governments choose IPR policies each period. The author uses country heterogeneity in education, population, and bilateral trade costs to induce IPR...

    Provided By University of Texas

  • White Papers // Mar 2010

    Real-Time Head Pose Estimation on Mobile Platforms

    Many computer vision applications such as augmented reality require head pose estimation. As far as the real-time implementation of head pose estimation on relatively resource limited mobile platforms is concerned, it is required to satisfy real-time constraints while maintaining reasonable head pose estimation accuracy. The authors introduced head pose estimation...

    Provided By University of Texas

  • White Papers // Jan 2011

    Toward a Practical Packet Marking Approach for IP Traceback

    IP traceback is an important step in defending against Denial-of-Service (DoS) attacks. Probabilistic Packet Marking (PPM) has been studied as a promising approach to realize IP traceback. In this paper, the authors propose a new PPM approach that improves the current state of the art in two practical directions: it...

    Provided By University of Texas

  • White Papers // Jan 2011

    Vertical Specialization, Intermediate Tariffs, And The Pattern Of Trade: Assessing The Role Of Tariff Liberalization To U.S. Bilateral Trade 1989-2001

    How important are intermediate tariffs in determining trade patterns? Empirical work measuring the impact of tariff liberalization most commonly focuses on the effects of barriers imposed by importers, but exporter trade policy should also matter when exports are produced with imported intermediates. Guided by extensions of the Eaton and Kortum...

    Provided By University of Texas

  • White Papers // Jan 2011

    DRES: Dynamic Range Encoding Scheme for TCAM Coprocessors

    One of the most critical resource management issues in the use of Ternary Content Addressable Memory (TCAM) for packet classification/filtering is how to effectively support filtering rules with ranges, known as range matching. In this paper, a Dynamic Range Encoding Scheme (DRES) is proposed to significantly improve TCAM storage efficiency...

    Provided By University of Texas

  • White Papers // Jun 2011

    3G Meets the Internet: Understanding the Performance of Hierarchical Routing in 3G Networks

    The volume of Internet traffic over 3G wireless networks is sharply rising. In contrast to many Internet services utilizing replicated resources, such as Content Distribution Networks (CDN), the current 3G standard architecture employs hierarchical routing, where all user data traffic goes through a small number of aggregation points using logical...

    Provided By University of Texas

  • White Papers // Jul 2010

    Wi-HTest: Compliance Test Tool for Real-Time WirelessHART Mesh Network Devices

    WirelessHART was released in September 2007 and became IEC standard in April 2010 (IEC 62591). It is the first open wireless communication standard specifically designed for real-time process control applications. It is designed to the same standard as its wired counterpart for reliability and interoperability. To ensure the compliance with...

    Provided By University of Texas

  • White Papers // Aug 2010

    Greedy Distance Vector Routing

    Greedy Distance Vector (GDV) is the first geographic routing protocol designed to optimize end-to-end path costs using any additive routing metric, such as: hop count, latency, ETX, ETT, etc. GDV requires no node location information. Instead, GDV uses estimated routing costs to destinations which are locally computed from node positions...

    Provided By University of Texas

  • White Papers // Jun 2010

    Geographic Routing in d-Dimensional Spaces With Guaranteed Delivery and Low Stretch

    Almost all geographic routing protocols have been designed for 2D. The authors present a novel geographic routing protocol, MDT, for 2D, 3D, and higher dimensions with these properties: guaranteed delivery for any connected graph of nodes and physical links, and low routing stretch from efficient forwarding of packets at local...

    Provided By University of Texas

  • White Papers // Jan 2011

    Pseudorandom Financial Derivatives

    Arora, Barak, Brunnermeier, and Ge [ABBG] showed that taking computational complexity into account, a dishonest seller could dramatically increase the lemon costs of a family of financial derivatives. The authors show that if the seller is required to construct derivatives of a certain form, then this phenomenon disappears. In particular,...

    Provided By University of Texas

  • White Papers // Jan 2011

    Using Valgrind to Detect Undefined Value Errors With Bit-Precision

    The authors present Memcheck, a tool that has been implemented with the dynamic binary instrumentation framework Valgrind. Memcheck detects a wide range of memory errors in programs as they run. This paper focuses on one kind of error that Memcheck detects: undefined value errors. Such errors are common, and often...

    Provided By University of Texas

  • White Papers // Jan 2011

    Qualitative Comparison of Graph-Based and Logicbased Multi-Relational Data Mining: A Case Study

    The goal of this paper is to generate insights about the differences between graph-based and logic-based approaches to multi-relational data mining by performing a case study of graph-based system, Subdue and the inductive logic programming system, CProgol. The authors identify three key factors for comparing graph-based and logic-based multi-relational data...

    Provided By University of Texas

  • White Papers // Jan 2011

    Discovering Substructures in the Chemical Toxicity Domain

    The researcher's ability to interpret the data and discover interesting patterns within the data is of great importance as it helps in obtaining relevant SARs [Srinivasan et al.], for the cause of chemical cancers (e.g., Progol identified a primary amine group as a relevant SAR for the cause of chemical...

    Provided By University of Texas

  • White Papers // Jan 2011

    Structure Discovery in Sequentially-Connected Data Streams

    Much of current data mining research is focused on discovering sets of attributes that discriminate data entities into classes, such as shopping trends for a particular demographic group. In contrast, the authors are working to develop data mining techniques to discover patterns consisting of complex relationships between entities. Their research...

    Provided By University of Texas

  • White Papers // Jan 2011

    Using a Graph-Based Data Mining System to Perform Web Search

    The World Wide Web provides an immense source of information. Accessing information of interest presents a challenge to scientists and analysts, particularly if the desired information is structural in nature. The authors' goal is to design a structural search engine that uses the hyperlink structure of the Web, in addition...

    Provided By University of Texas

  • White Papers // Oct 2009

    On the Fundamental Limits of Interweaved Cognitive Radios

    This paper considers the problem of channel sensing in cognitive radios. The system model considered is a set of N parallel (dis-similar) channels, where each channel at any given time is either available or occupied by a legitimate user. The cognitive radio is permitted to sense channels to determine each...

    Provided By University of Texas

  • White Papers // May 2010

    Sensitive White Space Detection With Spectral Covariance Sensing

    This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and whitespace applications. The proposed Spectral Covariance Sensing (SCS) algorithm exploits the different statistical correlations of the received signal and noise in the frequency domain. Test statistics are computed from the covariance matrix of a partial spectrogram...

    Provided By University of Texas

  • White Papers // Feb 2011

    Innovating To Optimize Supply Chain Management

    As an innovator dedicated to collaboration with the network of vendors and customers, Advanced Micro Devices (AMD) considers the supply chain to be a key component to the success and one of the most important competitive assets. How important? Just one change the way the authors handle the supply chain...

    Provided By University of Texas

  • White Papers // Jan 2007

    Disclosure Quality And Its Effect On Litigation Risk

    This paper examines the relationship between the quality of disclosure in companies' 10-K filings and the risk of securities class action litigation. The author uses a dataset containing 10-K documents filed electronically with the SEC in the period 1996-2005. Using two content analysis software programs that analyze the categories of...

    Provided By University of Texas

  • White Papers // Aug 2009

    Using Dead Blocks as a Virtual Victim Cache

    Caches mitigate the long memory latency that limits the performance of modern processors. However, caches can be quite inefficient. On average, a cache block in a 2MB L2 cache is dead 59% of the time, i.e., it will not be referenced again before it is evicted. Increasing cache efficiency can...

    Provided By University of Texas

  • White Papers // Jul 2009

    Batch Forwarding in Wireless Sensor Networks

    Batch processing is a well-known concept in computer science and widely used to improve performance in many applications. Similarly, to improve the delivery ratio and end2end delay in Wireless Sensor Networks (WSNs), the authors propose to use batch forwarding instead of streaming. The main goal in this paper is to...

    Provided By University of Texas

  • White Papers // Mar 2010

    Energy Efficient Block-Partitioned Multicore Processors for Parallel Applications

    Energy management has become an important research area in the last decade. As an energy efficient architecture, multicore has been widely adopted. However, with the number of cores on a single chip continuing to increase, it has been a grand challenge to effectively manage the energy efficiency of multicore-based systems....

    Provided By University of Texas

  • White Papers // Jul 2010

    Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks

    Communication privacy techniques that protect the locations of source sensor nodes and sink nodes from either global or local adversaries have received significant attention recently. The improvement in capture time, which is the time it takes for an adversary to identify the location of the source, is often estimated using...

    Provided By University of Texas

  • White Papers // Jun 2010

    SIDEKICK: Genomic Data Driven Analysis and Decision-Making Framework

    Scientists striving to unlock mysteries within complex biological systems face myriad barriers in effectively integrating available information to enhance their understanding. While experimental techniques and available data sources are rapidly evolving, useful information is dispersed across a variety of sources, and sources of the same information often do not use...

    Provided By University of Texas

  • White Papers // Jan 2010

    Safe, Multiphase Bounds Check Elimination in Java

    As part of its type-safety regime, the Java semantics require precise exceptions at runtime when programs attempt out-of-bound array accesses. This paper describes a Java implementation that utilizes a multiphase approach to identifying safe array accesses. This approach reduces runtime overhead by spreading the out-of-bounds checking effort across three phases...

    Provided By University of Texas

  • White Papers // Jan 2011

    Operating System Support for Massive Replication

    The increasing number of devices used by each user to access data and services and the increasing importance of the data and services available electronically both favor "Access-anywhere" network-delivered services. Unfortunately, making such services highly available is difficult. For example, even though end servers or service hosting sites advertise an...

    Provided By University of Texas

  • White Papers // Sep 2009

    Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks

    Downlink spatial InterCell Interference Cancellation (ICIC) is considered for mitigating other-cell interference using multiple transmit antennas. A principle question the authors explore is whether it is better to do ICIC or simply standard single-cell beamforming. They explore this question analytically and show that beamforming is preferred for all users when...

    Provided By University of Texas

  • White Papers // Mar 2011

    Secure Friend Discovery in Mobile Social Networks

    Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who happen to be in their physical vicinity. Despite their promise to enable many exciting applications, serious security and privacy concerns have hindered wide...

    Provided By University of Texas

  • White Papers // Dec 2009

    Limited Feedback for Temporally Correlated MIMO Channels With Other Cell Interference

    Limited feedback improves link reliability with a small amount of feedback from the receiver back to the transmitter. In cellular systems, the performance of limited feedback will be degraded in the presence of other cell interference, when the base stations have limited or no coordination. This paper establishes the degradation...

    Provided By University of Texas

  • White Papers // Feb 2010

    The Anatomy of a Click: Modeling User Behavior on Web Information Systems

    Providing relevant information to users with minimal effort on their part remains the holy grail of search science. Since the retrieval and presentation of search results as well as any dynamic search engine behavior depend on the estimated user intent, it is highly critical to accurately infer the user intent...

    Provided By University of Texas