University of Texas

Displaying 121-160 of 298 results

  • White Papers // Dec 2010

    ASSERT: A Wireless Networking Testbed

    As wireless networking is becoming more pervasive, there has been a greater desire to develop communication hardware and protocol stacks that have a number of desirable properties like increased throughput, reduced latency, reduced energy consumption, quality of service, security, etc. Consequently, several academic and industrial research groups are actively working...

    Provided By University of Texas

  • White Papers // Dec 2010

    Vertical Specialization, Intermediate Tariffs, And The Pattern Of Trade: Assessing The Role Of Tariff Liberalization To U.S.

    How important are intermediate tariffs in determining trade patterns? Empirical work measuring the impact of tariff liberalization most commonly focuses on the effects of barriers imposed by importers, but exporter trade policy should also matter when exports are produced with imported intermediates. Guided by extensions of the Eaton and Kortum...

    Provided By University of Texas

  • White Papers // Nov 2010

    Corporate Leverage, Debt Maturity And Credit Default Swaps: The Role Of Credit Supply

    Does the ability of suppliers of debt to hedge risk through Credit Default Swap (CDS) contracts impact firms' capital structures? This paper uses CDS markets as a proxy for a relaxation of firms' credit supply constraints and tests whether supply frictions impact capital structure and debt maturity. The authors find...

    Provided By University of Texas

  • White Papers // Nov 2010

    Transmission Capacity of Carrier Sensing Ad Hoc Networks With Multiple Antennas

    Multiple antennas have become a common component of wireless networks, improving range, throughput, and spatial reuse, both at the link and network levels. At the same time, carrier sensing is a widely used method of improving spatial reuse in distributed wireless networks, especially when there is limited coordination among non-communicating...

    Provided By University of Texas

  • White Papers // Nov 2010

    The Impact Of Bank Health On The Investment Of Its Corporate Borrowers

    This paper investigates the impact of changes in a bank's health on the investment behavior of its current borrowers for a panel of U.S. firms. The author finds that, after controlling for aggregate credit availability and the condition of outside banks, firms reduce their investment when the health of their...

    Provided By University of Texas

  • White Papers // Nov 2010

    How to Leak on Key Updates

    In the continual memory leakage model, security against attackers who can repeatedly obtain leakage is achieved by periodically updating the secret key. This is an appealing model which captures a wide class of side-channel attacks, but all previous constructions in this model provide only a very minimal amount of leakage...

    Provided By University of Texas

  • White Papers // Nov 2010

    Cooperative Spectral Covariance Sensing Under Correlated Shadowing

    This paper investigates the theoretical limits of white space sensing in a Cognitive Radio (CR) network limited by channel correlation. In a log-normal shadowing channel, the received signal power is correlated based on the distance between the sensors and this makes sensing the presence of a signal difficult, even with...

    Provided By University of Texas

  • White Papers // Oct 2010

    User Admission in MIMO Interference Alignment Networks

    In this paper, the authors consider an interference channel where a set of primary active users are cooperating through interference alignment over a constant multiple-input-multiple-output channel while a set of secondary users desire access to the channel. They present the conditions under which a secondary user can be admitted to...

    Provided By University of Texas

  • White Papers // Sep 2010

    Depot: Cloud Storage With Minimal Trust

    The paper describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First,...

    Provided By University of Texas

  • White Papers // Sep 2010

    Challenges and Future Directions of Software Technology: Secure Software Development

    Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure systems and secure services modeling. Large scale software development is one of the biggest challenges faced by corporations. Incorporating security into the software development process...

    Provided By University of Texas

  • White Papers // Sep 2010

    Identity-Based Encryption Secure Against Selective Opening Attack

    The authors present the first Identity-Based Encryption (IBE) schemes that are proven secure against Selective Opening Attack (SOA). This means that if an adversary, given a vector of ciphertexts, adaptively corrupts some fraction of the senders, exposing not only their messages but also their coins, the privacy of the unopened...

    Provided By University of Texas

  • White Papers // Sep 2010

    A Virtual Network Approach for Testing Wireless Mesh in Industrial Process Control

    Unlike wired networks, the configuration and the behavior of wireless networks are heavily dependent on many environmental factors. While this makes it more difficult to build a wireless network testbed whose behavior is controllable, it also makes the availability of such a testbed all the more desirable. Indeed, the difficulties...

    Provided By University of Texas

  • White Papers // Sep 2010

    The Click Convergence Layer: Putting a Modular Router Under DTN2

    The Bundle Protocol shows great promise as a general purpose application-layer protocol for Delay-Tolerant Networks (DTNs) and has found many adopters within the research community. As an application layer protocol, a convergence layer (UDP/TCP sockets or some other domain-specific transport mechanism) is required to deliver bundles between nodes. The authors...

    Provided By University of Texas

  • White Papers // Sep 2010

    The Effect of Interference Cancellation on Spectrum-Sharing Transmission Capacity

    The efficiency of spectrum sharing can be improved by interference suppression and/or cancellation. This paper analyzes the performance of spectrum sharing networks with Interference Cancellation (IC) based on the Spectrum-sharing Transmission Capacity (S-TC), defined as the number of successful transmissions per unit area while guaranteeing all target outage probabilities of...

    Provided By University of Texas

  • White Papers // Sep 2010

    On the Accuracy of the Wyner Model in Downlink Cellular Networks

    Compared to real cellular systems where users are spatially distributed and interference levels vary by several orders of magnitude over a cell, in the Wyner model user locations are fixed and the interference intensity is characterized by a single fixed parameter. Although it is a fairly extreme simplification, the Wyner...

    Provided By University of Texas

  • White Papers // Sep 2010

    Comparison of Fractional Frequency Reuse Approaches in the OFDMA Cellular Downlink

    Fractional Frequency Reuse (FFR) is an interference coordination technique well-suited to OFDMA based wireless networks wherein cells are partitioned into spatial regions with different frequency reuse factors. This paper focuses on evaluating the two main types of FFR deployments: strict FFR and Soft Frequency Reuse (SFR). Relevant metrics are discussed,...

    Provided By University of Texas

  • White Papers // Sep 2010

    Two-Way Transmission Capacity of Wireless Ad-Hoc Networks

    The transmission capacity of an ad-hoc network is the maximum density of active transmitters per unit area, given an outage constraint at each receiver for a fixed rate of transmission. Most prior work on finding the transmission capacity of ad-hoc networks has focused only on one-way communication where a source...

    Provided By University of Texas

  • White Papers // Sep 2010

    A New Tractable Model for Cellular Coverage

    Cellular networks are usually modeled by placing the base stations according to a regular geometry such as a grid, with the mobile users scattered around the network either as a Poisson point process (i.e. uniform distribution) or deterministically. These models have been used extensively for cellular design and analysis but...

    Provided By University of Texas

  • White Papers // Aug 2010

    POET: A Scripting Language for Applying Parameterized Source-to-Source Program Transformations

    The authors present POET, a scripting language designed for applying advanced program transformations to code in arbitrary programming languages as well as building ad-hoc translators between these languages. The authors have used POET to support a large number of compiler optimizations, including loop interchange, parallelization, blocking, fusion/ fission, strength reduction,...

    Provided By University of Texas

  • White Papers // Aug 2010

    CDMA Uplink Capacity in Both Open and Closed Access Two-Tier Femtocell Networks

    Femtocells are assuming an increasingly important role in cellular coverage. Femtocells can be configured to be either open access or closed access. Seemingly, the network operator would prefer an open access deployment since this provides an inexpensive way to expand their network capabilities, whereas the femtocell owner would prefer closed...

    Provided By University of Texas

  • White Papers // Aug 2010

    The Case for End-User Programming of Ubiquitous Computing Environments

    Gone are the days that computers will be used by select users sitting at a desk with a mouse and keyboard. The next wave of computing, ubiquitous computing, is upon one. With smart phones, tablet computers, and embedded sensors/ actuators ourishing, users are already interacting with dozens of computers per...

    Provided By University of Texas

  • White Papers // Aug 2010

    Reducing Configurations to Monitor in a Software Product Line

    A software product line is a family of programs where each program is defined by a unique combination of features. Product lines, like conventional programs, can be checked for safety properties through execution monitoring. However, because a product line induces a number of programs that is potentially exponential in the...

    Provided By University of Texas

  • White Papers // Aug 2010

    Minimum-Delay Service Provisioning in Opportunistic Networks

    Opportunistic networks are created dynamically by exploiting contacts between pairs of mobile devices that come within communication range. While forwarding in opportunistic networking has been explored, investigations into asynchronous service provisioning on top of opportunistic networks are unique contributions of this paper. Mobile devices are typically heterogeneous, possess disparate physical...

    Provided By University of Texas

  • White Papers // Aug 2010

    Template-Based Reconstruction of Complex Refactorings

    Knowing which types of refactoring occurred between two program versions can help programmers better understand code changes. The authors' survey of refactoring identification techniques found that existing techniques cannot easily identify complex refactorings, such as an replace conditional with polymorphism refactoring, which consist of a set of atomic refactorings. This...

    Provided By University of Texas

  • White Papers // Aug 2010

    Objective Risk Evaluation for Automated Security Management

    Network security depends on a number of factors. And a common characteristic of these factors is that they are dynamic in nature. Such factors include new vulnerabilities and threats, the network policy structure and traffic. These factors can be divided into two broad categories. Network risk and service risk. As...

    Provided By University of Texas

  • White Papers // Aug 2010

    Greedy Distance Vector Routing

    Greedy Distance Vector (GDV) is the first geographic routing protocol designed to optimize end-to-end path costs using any additive routing metric, such as: hop count, latency, ETX, ETT, etc. GDV requires no node location information. Instead, GDV uses estimated routing costs to destinations which are locally computed from node positions...

    Provided By University of Texas

  • White Papers // Aug 2010

    A Super-Logarithmic Lower Bound for Shuffle-Unshuffle Sorting Networks

    A variety of different classes of sorting networks have been described in the literature. Of particular interest here are the so-called AKS network discovered by Ajtai, Komlos, and Szemeredi, and the sorting networks proposed by Batcher. While the AKS network is the only known sorting network with O (lgn) depth,...

    Provided By University of Texas

  • White Papers // Aug 2010

    Global Scheduling Based Reliability-Aware Power Management for Multiprocessor Real-Time Systems

    Reliability-Aware Power Management (RAPM) has been a recent research focus due the negative effects of the popular power management technique Dynamic Voltage and Frequency Scaling (DVFS) on system reliability. As a result, several RAPM schemes have been proposed for uniprocessor real-time systems. In this paper, for a set of frame-based...

    Provided By University of Texas

  • White Papers // Aug 2010

    Characterizing Link and Path Reliability in Large-Scale Wireless Sensor Networks

    Reliable Data Transfer (RDT) is one of the key issues in Wireless Sensor Networks (WSNs) and can be achieved by using link-level re-transmissions and multipath routing. Another key issue is the scalability of WSNs. In this paper, the authors try to better understand and characterize/quantify the relationships between reliability and...

    Provided By University of Texas

  • White Papers // Aug 2010

    Functional Specification and Verification of Object-Oriented Programs

    One weakness of Hoare-style verification techniques based on first-order predicate logic is that reasoning is backward from post-conditions to preconditions. A natural, forward reasoning is possible by viewing a program as a mathematical function that maps one program state to another. This functional program verification technique requires a minimal mathematical...

    Provided By University of Texas

  • White Papers // Aug 2010

    Identifying Unnecessary Bounds Checks Through Block-Qualified Variable Elimination

    Java's memory-safety relies on the Java Virtual Machine checking that each access to an array does not exceed the bounds of that array. When static analysis can determine that some array access instruction will never use an out of bounds index, the cost of dynamically checking the index each time...

    Provided By University of Texas

  • White Papers // Jul 2010

    Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks

    Communication privacy techniques that protect the locations of source sensor nodes and sink nodes from either global or local adversaries have received significant attention recently. The improvement in capture time, which is the time it takes for an adversary to identify the location of the source, is often estimated using...

    Provided By University of Texas

  • White Papers // Jul 2010

    Fast Neighbor Discovery With Lightweight Termination Detection in Heterogeneous Cognitive Radio Networks

    An important step in the initialization of a wireless ad hoc network is neighbor discovery in which every node attempts to determine the set of nodes it can communicate with in one wireless hop. In recent years, cognitive radio technology has gained attention as an attractive approach to alleviate the...

    Provided By University of Texas

  • White Papers // Jul 2010

    Femtocell Access Control in the TDMA/OFDMA Uplink

    This paper investigates open vs. closed access in the uplink of femtocell networks, for the particular case of orthogonal multiple access protocols like TDMA or OFDMA. Open access reduces near-far interference and provides an inexpensive way to expand the capacity of the operator's network. Additionally, with a cap on the...

    Provided By University of Texas

  • White Papers // Jul 2010

    On the Insecurity of Parallel Repetition for Leakage Resilience

    A fundamental question in leakage-resilient cryptography is: Can leakage resilience always be amplified by parallel repetition? It is natural to expect that if people have leakage-resilient primitive tolerating nl bits of leakage, they can take n copies of it to form a system tolerating nl bits of leakage. In this...

    Provided By University of Texas

  • White Papers // Jul 2010

    Queue-Architecture and Stability Analysis in Cooperative Relay Networks

    An abstraction of the physical layer coding using bit pipes that are coupled through data-rates is insufficient to capture notions such as node cooperation in cooperative relay networks. Consequently, network-stability analyses based on such abstractions are valid for non-cooperative schemes alone and meaningless for cooperative schemes. Motivated from this, this...

    Provided By University of Texas

  • White Papers // Jul 2010

    User Partitioning for Less Overhead in MIMO Interference Channels

    This paper presents a study on multiple-antenna interference channels, accounting for general overhead as a function of the number of users and antennas in the network. The model includes both perfect and imperfect channel state information based on channel estimation in the presence of noise. Three low-complexity methods are proposed...

    Provided By University of Texas

  • White Papers // Jul 2010

    Collective Specification and Verification of Behavioral Models and Object-Oriented Implementations

    The authors present a finite-state-machine-based language, iFSM, to seamlessly integrate the behavioral logic and implementation strategies of object-oriented applications to prevent their design and implementation from being out-of-sync. The language allows developers to focus on higher-level abstractions to support software analysis and design instead of focusing on language or architecture...

    Provided By University of Texas

  • White Papers // Jul 2010

    Wi-HTest: Compliance Test Tool for Real-Time WirelessHART Mesh Network Devices

    WirelessHART was released in September 2007 and became IEC standard in April 2010 (IEC 62591). It is the first open wireless communication standard specifically designed for real-time process control applications. It is designed to the same standard as its wired counterpart for reliability and interoperability. To ensure the compliance with...

    Provided By University of Texas

  • White Papers // Jun 2010

    Sum Capacity of K User Gaussian Degraded Interference Channels

    This paper studies a family of genie-MAC (Multiple Access Channel) outer bounds for K-user Gaussian interference channels. This family is inspired by existing genie-aided bounding mechanisms, but differs from current approaches in its optimization problem formulation and application. The fundamental idea behind these bounds is to create a group of...

    Provided By University of Texas

  • White Papers // Mar 2010

    A Graphical Model Approach to Downlink Cooperative MIMO Systems

    The authors propose a new method for computing transmit beamforming vectors for downlink multi-cell Multiple-Input Multiple-Output (MIMO) networks. The key novelty of the work is the application of graphical model theory to the intercell interference problem. An index restriction beamforming strategy is adopted to mitigate intercell interference, and is implemented...

    Provided By University of Texas

  • White Papers // Jul 2010

    Femtocell Access Control in the TDMA/OFDMA Uplink

    This paper investigates open vs. closed access in the uplink of femtocell networks, for the particular case of orthogonal multiple access protocols like TDMA or OFDMA. Open access reduces near-far interference and provides an inexpensive way to expand the capacity of the operator's network. Additionally, with a cap on the...

    Provided By University of Texas

  • White Papers // Aug 2010

    CDMA Uplink Capacity in Both Open and Closed Access Two-Tier Femtocell Networks

    Femtocells are assuming an increasingly important role in cellular coverage. Femtocells can be configured to be either open access or closed access. Seemingly, the network operator would prefer an open access deployment since this provides an inexpensive way to expand their network capabilities, whereas the femtocell owner would prefer closed...

    Provided By University of Texas

  • White Papers // Sep 2010

    Comparison of Fractional Frequency Reuse Approaches in the OFDMA Cellular Downlink

    Fractional Frequency Reuse (FFR) is an interference coordination technique well-suited to OFDMA based wireless networks wherein cells are partitioned into spatial regions with different frequency reuse factors. This paper focuses on evaluating the two main types of FFR deployments: strict FFR and Soft Frequency Reuse (SFR). Relevant metrics are discussed,...

    Provided By University of Texas

  • White Papers // Mar 2010

    Analog Equalization for Low Power 60 GHz Receivers in Realistic Multipath Channels

    Multi-gigabit per second wireless network devices are emerging for Personal Area Networks (PAN) in the 60 GHz band. Such devices are typically power hungry, largely due to the requisite high speed Analog to Digital Converters (ADCs) that can consume hundreds of milliwatts of power. This paper studies the use of...

    Provided By University of Texas

  • White Papers // Jan 2011

    Correlation of Link Outages in Low-Mobility Spatial Wireless Networks

    In this paper, the authors consider a network where the nodes' locations are modeled by a realization of a Poisson point process and remain fixed or change very slowly over time. Most of the literature focuses on the spatial average of the link outage probabilities. But each link in the...

    Provided By University of Texas

  • White Papers // Jan 2010

    A Simple SINR Characterization for Linear Interference Alignment Over Uncertain MIMO Channels

    This paper provides a simple closed-form SINR expression for interference alignment over MIMO channels with channel uncertainty. Assuming linear processing (specifically, zero-forcing) at the transmitters and receivers and a complex Gaussian interference channel, the authors show that random matrix theory can be successfully applied to find the SINR distribution of...

    Provided By University of Texas

  • White Papers // Apr 2009

    Quicklink Selection for Navigational Query Results

    Quicklinks for a website are navigational shortcuts displayed below the website homepage on a search results page, and that let the users directly jump to selected points inside the website. Since the real-estate on a search results page is constrained and valuable, picking the best set of quicklinks to maximize...

    Provided By University of Texas

  • White Papers // Feb 2010

    The Anatomy of a Click: Modeling User Behavior on Web Information Systems

    Providing relevant information to users with minimal effort on their part remains the holy grail of search science. Since the retrieval and presentation of search results as well as any dynamic search engine behavior depend on the estimated user intent, it is highly critical to accurately infer the user intent...

    Provided By University of Texas

  • White Papers // Jan 2011

    Discovering Substructures in the Chemical Toxicity Domain

    The researcher's ability to interpret the data and discover interesting patterns within the data is of great importance as it helps in obtaining relevant SARs [Srinivasan et al.], for the cause of chemical cancers (e.g., Progol identified a primary amine group as a relevant SAR for the cause of chemical...

    Provided By University of Texas

  • White Papers // Jan 2011

    Structure Discovery in Sequentially-Connected Data Streams

    Much of current data mining research is focused on discovering sets of attributes that discriminate data entities into classes, such as shopping trends for a particular demographic group. In contrast, the authors are working to develop data mining techniques to discover patterns consisting of complex relationships between entities. Their research...

    Provided By University of Texas

  • White Papers // Jan 2011

    Using a Graph-Based Data Mining System to Perform Web Search

    The World Wide Web provides an immense source of information. Accessing information of interest presents a challenge to scientists and analysts, particularly if the desired information is structural in nature. The authors' goal is to design a structural search engine that uses the hyperlink structure of the Web, in addition...

    Provided By University of Texas

  • White Papers // Jan 2011

    Qualitative Comparison of Graph-Based and Logicbased Multi-Relational Data Mining: A Case Study

    The goal of this paper is to generate insights about the differences between graph-based and logic-based approaches to multi-relational data mining by performing a case study of graph-based system, Subdue and the inductive logic programming system, CProgol. The authors identify three key factors for comparing graph-based and logic-based multi-relational data...

    Provided By University of Texas

  • White Papers // Aug 2010

    Global Scheduling Based Reliability-Aware Power Management for Multiprocessor Real-Time Systems

    Reliability-Aware Power Management (RAPM) has been a recent research focus due the negative effects of the popular power management technique Dynamic Voltage and Frequency Scaling (DVFS) on system reliability. As a result, several RAPM schemes have been proposed for uniprocessor real-time systems. In this paper, for a set of frame-based...

    Provided By University of Texas

  • White Papers // Jul 2010

    Collective Specification and Verification of Behavioral Models and Object-Oriented Implementations

    The authors present a finite-state-machine-based language, iFSM, to seamlessly integrate the behavioral logic and implementation strategies of object-oriented applications to prevent their design and implementation from being out-of-sync. The language allows developers to focus on higher-level abstractions to support software analysis and design instead of focusing on language or architecture...

    Provided By University of Texas

  • White Papers // Aug 2010

    Identifying Unnecessary Bounds Checks Through Block-Qualified Variable Elimination

    Java's memory-safety relies on the Java Virtual Machine checking that each access to an array does not exceed the bounds of that array. When static analysis can determine that some array access instruction will never use an out of bounds index, the cost of dynamically checking the index each time...

    Provided By University of Texas

  • White Papers // Apr 2010

    Toward Practical Authorization-Dependent User Obligation Systems

    Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability...

    Provided By University of Texas

  • White Papers // Jul 2009

    An Optimal Boundary-Fair Scheduling Algorithm for Multiprocessor Real-Time Systems

    Although the scheduling problem for multiprocessor real-time systems has been studied for decades, it is still an evolving research field with many open problems. In this paper, focusing on periodic real-time tasks, the authors propose a novel optimal scheduling algorithm, namely Boundary fair (Bfair), which follows the same line of...

    Provided By University of Texas

  • White Papers // Mar 2011

    Secure Friend Discovery in Mobile Social Networks

    Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who happen to be in their physical vicinity. Despite their promise to enable many exciting applications, serious security and privacy concerns have hindered wide...

    Provided By University of Texas

  • White Papers // Jun 2011

    XML Query Optimization in Map-Reduce

    The authors present a novel query language for large-scale analysis of XML data on a map-reduce environment, called MRQL, that is expressive enough to capture most common data analysis tasks and at the same time is amenable to optimization. The authors' evaluation plans are constructed using a small number of...

    Provided By University of Texas

  • White Papers // Dec 2010

    Hybrid Partial Evaluation

    The authors present Hybrid Partial Evaluation (HPE), a pragmatic approach to partial evaluation that borrows ideas from both online and offline partial evaluation. HPE performs offline-style specialization using an online approach without static binding time analysis. The goal of HPE is to provide a practical and predictable level of optimization...

    Provided By University of Texas

  • White Papers // Jan 2011

    Programming Many-Core Architectures - A Case Study: Dense Matrix Computations on the Intel SCC Processor

    A message passing, distributed-memory parallel computer on a chip is one possible design for future, many-core architectures. The authors discuss initial experiences with the Intel Single-chip Cloud Computer research processor, which is a prototype architecture that incorporates 48 cores on a single die that can communicate via a small, shared,...

    Provided By University of Texas

  • White Papers // Feb 2011

    Is That You? Authentication in a Network Without Identities

    Most networks require that their users have "Identities", i.e. have names that are fixed for a relatively long time, unique, and have been approved by a central authority (in order to guarantee their uniqueness). Unfortunately, this requirement, which was introduced to simplify the design of networks, has its own drawbacks....

    Provided By University of Texas

  • White Papers // Mar 2011

    TPP: The Two-Way Password Protocol

    The need for secure communication in the Internet has led to the widespread deployment of secure application-level protocols. The current state-of-the-art is to use TLS, in conjunction with a password protocol. The password protocol, which the authors call a One-way Password Protocol (OPP), authenticates the client to the server, using...

    Provided By University of Texas

  • White Papers // Apr 2011

    The K-Observer Problem in Computer Networks

    For any non-negative integer K, a K-observer P of a network N is a set of nodes in N such that each message, that travels at least K hops in N, is handled (and so observed) by at least one node in P. A K-observer P of a network N...

    Provided By University of Texas

  • White Papers // Apr 2011

    Mechanizing the Expert Dense Linear Algebra Developer

    Sustained high performance on the fastest computers in the world has traditionally been accomplished by experts who carefully hand-code key routines. This quickly becomes unmanageable for large bodies of software and/or as architectures change enough that entire libraries need to be rewritten. The authors believe the problem is that a...

    Provided By University of Texas

  • White Papers // Feb 2007

    Sustainable IT Outsourcing Success: Let Enterprise Architecture Be Your Guide

    This paper explores the relationship between IT outsourcing and enterprise architecture. In an earlier paper which described four stages of architecture maturity (business silos, standardized technology, rationalized process, and business modularity). In this paper it is concluded that three different outsourcing arrangements support transitions from one stage to another. Firms...

    Provided By University of Texas

  • White Papers // Jan 2009

    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks

    This paper presents GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Their protocol exploits the property of ad hoc networks that each member of a group is both a host and a router, and distributes the group key to member nodes via a...

    Provided By University of Texas

  • White Papers // Mar 2009

    Detection and Prevention Methods of Botnet-Generated Spam

    Although anti-spam measures are improving, the spam volume is increasing due to the use of Botnets. Botnets facilitate an efficient generation and guaranteed delivery of large volumes of spam. Spambots, or spam-generating bots, use different transmission methods based on the network settings of the infected host. These methods include relaying,...

    Provided By University of Texas

  • White Papers // Apr 2009

    Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities

    As networked systems grow in complexity, they are increasingly vulnerable to Denial-of-Service (DoS) attacks involving resource exhaustion. A single malicious input of coma can trigger high-complexity behavior such as deep recursion in a carelessly implemented server, exhausting CPU time or stack space and making the server unavailable to legitimate clients....

    Provided By University of Texas

  • White Papers // May 2009

    Security Threat and Vulnerability Mitigation Patterns: A Case of Credit Card Theft Mitigation

    Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that one needs a lot of knowledge in developing secure systems, but it is difficult to obtain sufficient knowledge and use it correctly as security incident reports and security standards are...

    Provided By University of Texas

  • White Papers // May 2009

    SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks

    Multihop wireless mesh networks are becoming a new attractive communication paradigm owing to their low cost and ease of deployment. Routing protocols are critical to the performance and reliability of wireless mesh networks. Traditional routing protocols send traffic along predetermined paths and face difficulties in coping with unreliable and unpredictable...

    Provided By University of Texas

  • White Papers // Jan 2009

    Hierarchical-Battery Aware Routing in Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) have been envisioned to help in numerous monitoring applications. Pulsed battery discharge from the nodes prolongs the battery capacity as compared to constant discharge. Idle time between the pulses of discharge helps in recovering the discharged battery capacity. In the hierarchical routing protocol, cluster head...

    Provided By University of Texas

  • White Papers // Jun 2009

    A Framework for Modeling Security Measures

    This paper introduces a framework that provides a model for describing security measures and their relative effectiveness as well as importance. This model enhances computer security training and educational curriculum by providing experimental data and analysis to educators and students. Business environments will benefit from this model by enabling more...

    Provided By University of Texas

  • White Papers // Jan 2009

    E-Government and Cyber Security: The Role of Cyber Security Exercises

    e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce solutions. The span of control of e-government and its impact across a community defines a system that is more than a sum of just single systems. To...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet: A Free Space Optics Based BackHaul Architecture for Next Generation Cellular Networks

    There has been an increasing demand for bandwidth-intensive services in mobile devices, such as streaming video and music, which bring about a paradigm shift in wireless cellular network architectures. Although various coding and modulation schemes are being adopted to address these requirements, a critical area of modification is the existing...

    Provided By University of Texas

  • White Papers // Jul 2009

    Calculating, Creating, And Claiming Value In Business Markets: Status And Research Agenda

    B2B markets offer challenges that differ from those in B2C markets in addressing these issues (e.g., Anderson, Narus, and Narayandas 2009; Dwyer and Tanner 2008). These challenges stem from the fact that most B2B markets (relative to B2C markets) are characterized by a far fewer buyers who buy in much...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet : An Emergent Technology Based Radio Access Network Architecture for Next Generation Cellular Wireless Systems

    For next generation wireless cellular networks, the Radio Access Network (RAN) component is destined to evolve into a high-capacity, flexible and reconfigurable network architecture supporting smaller cell sites and newer technologies. Based on the well-known Petersen graph, in this paper the authors propose a RAN architecture, named PeterNet, that interconnects...

    Provided By University of Texas

  • White Papers // Jan 2010

    IP Address Assignment in a Mobile Ad Hoc Network

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By University of Texas

  • White Papers // Jan 2010

    Energy Consumption in Wireless Sensor Networks Using GSP

    One of the main design issues for a sensor network is conservation of the energy available at each sensor node. The authors propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. They split the lifetime of the sensor network into equal periods of time...

    Provided By University of Texas