University of Texas

Displaying 161-200 of 254 results

  • White Papers // Jul 2010

    Queue-Architecture and Stability Analysis in Cooperative Relay Networks

    An abstraction of the physical layer coding using bit pipes that are coupled through data-rates is insufficient to capture notions such as node cooperation in cooperative relay networks. Consequently, network-stability analyses based on such abstractions are valid for non-cooperative schemes alone and meaningless for cooperative schemes. Motivated from this, this...

    Provided By University of Texas

  • White Papers // Jul 2010

    User Partitioning for Less Overhead in MIMO Interference Channels

    This paper presents a study on multiple-antenna interference channels, accounting for general overhead as a function of the number of users and antennas in the network. The model includes both perfect and imperfect channel state information based on channel estimation in the presence of noise. Three low-complexity methods are proposed...

    Provided By University of Texas

  • White Papers // Jul 2010

    Collective Specification and Verification of Behavioral Models and Object-Oriented Implementations

    The authors present a finite-state-machine-based language, iFSM, to seamlessly integrate the behavioral logic and implementation strategies of object-oriented applications to prevent their design and implementation from being out-of-sync. The language allows developers to focus on higher-level abstractions to support software analysis and design instead of focusing on language or architecture...

    Provided By University of Texas

  • White Papers // Jul 2010

    Wi-HTest: Compliance Test Tool for Real-Time WirelessHART Mesh Network Devices

    WirelessHART was released in September 2007 and became IEC standard in April 2010 (IEC 62591). It is the first open wireless communication standard specifically designed for real-time process control applications. It is designed to the same standard as its wired counterpart for reliability and interoperability. To ensure the compliance with...

    Provided By University of Texas

  • White Papers // Jun 2010

    Sum Capacity of K User Gaussian Degraded Interference Channels

    This paper studies a family of genie-MAC (Multiple Access Channel) outer bounds for K-user Gaussian interference channels. This family is inspired by existing genie-aided bounding mechanisms, but differs from current approaches in its optimization problem formulation and application. The fundamental idea behind these bounds is to create a group of...

    Provided By University of Texas

  • White Papers // Jun 2010

    SIDEKICK: Genomic Data Driven Analysis and Decision-Making Framework

    Scientists striving to unlock mysteries within complex biological systems face myriad barriers in effectively integrating available information to enhance their understanding. While experimental techniques and available data sources are rapidly evolving, useful information is dispersed across a variety of sources, and sources of the same information often do not use...

    Provided By University of Texas

  • White Papers // Jun 2010

    Palmtree: An IP Alias Resolution Algorithm With Linear Probing Complexity

    Internet topology mapping studies utilize large scale topology maps to analyze various characteristics of the Internet. IP alias resolution, the task of mapping IP addresses to their corresponding routers, is an important task in building such topology maps. In this paper, the authors present a new probe-based IP alias resolution...

    Provided By University of Texas

  • White Papers // Jun 2010

    Geographic Routing in d-Dimensional Spaces With Guaranteed Delivery and Low Stretch

    Almost all geographic routing protocols have been designed for 2D. The authors present a novel geographic routing protocol, MDT, for 2D, 3D, and higher dimensions with these properties: guaranteed delivery for any connected graph of nodes and physical links, and low routing stretch from efficient forwarding of packets at local...

    Provided By University of Texas

  • White Papers // May 2010

    Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE

    The authors present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, they construct two new Hierarchical Identity-Based Encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based...

    Provided By University of Texas

  • White Papers // May 2010

    Foreign Portfolio Investment Inflows To The United States: The Impact Of Investor Risk Aversion And US Stock Market Performance

    This paper examines the relationship of net foreign portfolio investment inflows, namely corporate bonds and stocks, to two pull factors; investor risk aversion and the US stock market. Using a vector autoregressive model, we find that positive shocks to the stock market elicit an insignificant response to the net corporate...

    Provided By University of Texas

  • White Papers // May 2010

    Query Processing in Connectivity-Challenged Environments

    This paper presents a discussion of issues that need to be addressed for processing relational queries in distributed environments where the connectivity is unstable and is changing continuously. Query processing over data across nodes that are collecting information is an example of such an environment. Traditional distributed query processing techniques...

    Provided By University of Texas

  • White Papers // May 2010

    JSZap: Compressing JavaScript Code

    JavaScript is widely used in web-based applications, and gigabytes of JavaScript code are transmitted over the Internet every day. Current efforts to compress JavaScript to reduce network delays and server bandwidth requirements rely on syntactic changes to the source code and content encoding using gzip. This paper considers reducing the...

    Provided By University of Texas

  • White Papers // May 2010

    Translating First-Order Causal Theories Into Answer Set Programming

    Nonmonotonic causal logic became a basis for the semantics of several expressive action languages. Norman McCain and Paolo Ferraris showed how to embed propositional causal theories into logic programming, and this work paved the way to the use of answer set solvers for answering queries about actions described in causal...

    Provided By University of Texas

  • White Papers // May 2010

    Sensitive White Space Detection With Spectral Covariance Sensing

    This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and whitespace applications. The proposed Spectral Covariance Sensing (SCS) algorithm exploits the different statistical correlations of the received signal and noise in the frequency domain. Test statistics are computed from the covariance matrix of a partial spectrogram...

    Provided By University of Texas

  • White Papers // May 2010

    Runtime Constraint Checking Approaches for OCL, a Critical Comparison

    There are many benefits of checking design constraints at run-time - for example, automatic detection of design drift or corrosion. However, there is no comparative analysis of different approaches although such an analysis could provide a sound basis for determining the appropriateness of one approach over the others. In this...

    Provided By University of Texas

  • White Papers // Apr 2010

    An Efficient ARQ Scheme for Reliable Video Broadcasting in Wireless LANs

    Video streaming has become a popular and important type of network application. Meanwhile, wireless LANs has been gaining popularity too. It has thus become important to address the reliability problem for video streaming in wireless LANs and for video streaming from the Internet to the users in wireless LANs. This...

    Provided By University of Texas

  • White Papers // Apr 2010

    SKAIT: A Parameterized Key Assignment Scheme For Wireless Networks

    In this paper, the authors propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wireless network. Parameterization enables control over the number of keys assigned to a node, and allows users to trade increased key space complexity...

    Provided By University of Texas

  • White Papers // Apr 2010

    An Upper Bound on Multi-Hop Transmission Capacity With Dynamic Multipath Routing

    This paper develops upper bounds on the end-to-end transmission capacity of multi-hop wireless networks. Potential source-destination paths are dynamically selected from a pool of randomly located relays, from which a closed-form lower bound on the outage probability is derived in terms of the expected number of potential paths. This is...

    Provided By University of Texas

  • White Papers // Apr 2010

    Automated Programmable Code Transformation for Portable Performance Tuning

    The authors present a framework which uses POET, an interpreted code transformation language, to effectively combine programmable control from developers, advanced optimizations by compilers, and flexible empirical tuning of optimizations to achieve portable high performance for scientific computing. The authors have extended ROSE, a C/C++/Fortran source-to-source compiler, to automatically analyze...

    Provided By University of Texas

  • White Papers // Apr 2010

    Toward Practical Authorization-Dependent User Obligation Systems

    Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be usable, the system must ensure users have the authorizations they need when their obligations must be performed. Prior work in this area introduced accountability...

    Provided By University of Texas

  • White Papers // Apr 2010

    Distributed Rate Allocation for Wireless Networks

    This paper develops a distributed algorithm for rate allocation in wireless networks that achieves the same throughput region as optimal centralized algorithms. This cross-layer algorithm jointly performs Medium Access Control (MAC) and physical-layer rate adaptation. The paper establishes that this algorithm is throughput-optimal for general rate regions. In contrast to...

    Provided By University of Texas

  • White Papers // Apr 2010

    Access Control Contracts for Java Program Modules

    Application-level security has become an issue in recent years; for example, errors, discrepancies and omissions in the specification of access control constraints of security-sensitive software components are recognized as an important source for security vulnerabilities. The authors propose to formally specify access control assumptions or constraints of a program module...

    Provided By University of Texas

  • White Papers // Mar 2010

    A Graphical Model Approach to Downlink Cooperative MIMO Systems

    The authors propose a new method for computing transmit beamforming vectors for downlink multi-cell Multiple-Input Multiple-Output (MIMO) networks. The key novelty of the work is the application of graphical model theory to the intercell interference problem. An index restriction beamforming strategy is adopted to mitigate intercell interference, and is implemented...

    Provided By University of Texas

  • White Papers // Mar 2010

    An Overview of the Transmission Capacity of Wireless Networks

    This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results for multi-terminal or ad hoc networks, the Transmission Capacity (TC) framework allows for quantification...

    Provided By University of Texas

  • White Papers // Mar 2010

    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

    In this paper, the authors present two fully secure functional encryption schemes. The first result is a fully secure Attribute-Based Encryption (ABE) scheme. Previous constructions of ABE were only proven to be selectively secure. They achieve full security by adapting the dual system encryption methodology recently introduced by Waters and...

    Provided By University of Texas

  • White Papers // Mar 2010

    Lightweight Checkpoint Mechanism and Modeling in GPGPU Environment

    While High Performance Computing (HPC) systems continue to scale in volume of computing elements and overall computing powers, the performance/cost benefit of these systems is subject to their abilities to provide high reliability, availability, and transparency in utilizing the underlying computing resources. This is evidenced by a recent announcement from...

    Provided By University of Texas

  • White Papers // Mar 2010

    Energy Efficient Block-Partitioned Multicore Processors for Parallel Applications

    Energy management has become an important research area in the last decade. As an energy efficient architecture, multicore has been widely adopted. However, with the number of cores on a single chip continuing to increase, it has been a grand challenge to effectively manage the energy efficiency of multicore-based systems....

    Provided By University of Texas

  • White Papers // Mar 2010

    Analog Equalization for Low Power 60 GHz Receivers in Realistic Multipath Channels

    Multi-gigabit per second wireless network devices are emerging for Personal Area Networks (PAN) in the 60 GHz band. Such devices are typically power hungry, largely due to the requisite high speed Analog to Digital Converters (ADCs) that can consume hundreds of milliwatts of power. This paper studies the use of...

    Provided By University of Texas

  • White Papers // Mar 2010

    Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks

    To overcome the inherent lossy property of wireless links and increase network throughput, many multi-path routing protocols have been proposed to improve the reliability and latency of packet delivery in wireless networks. Multi-path routing protocols, however, do not take advantage of existing coding opportunities to maximize network throughput. In this...

    Provided By University of Texas

  • White Papers // Mar 2010

    Dynamic Connectivity in ALOHA Ad Hoc Networks

    In a wireless network the set of transmitting nodes changes frequently because of the MAC scheduler and the traffic load. Previously, connectivity in wireless networks was analyzed using static geometric graphs, and as the authors show leads to an overly constrained design criterion. The dynamic nature of the transmitting set...

    Provided By University of Texas

  • White Papers // Mar 2010

    Multi-Mode Transmission for the MIMO Broadcast Channel With Imperfect Channel State Information

    This paper proposes an adaptive multi-mode transmission strategy to improve the spectral efficiency achieved in the Multiple-Input Multiple-Output (MIMO) broadcast channel with delayed and quantized channel state information. The adaptive strategy adjusts the number of active users, denoted as the transmission mode, to balance transmit array gain, spatial division multiplexing...

    Provided By University of Texas

  • White Papers // Mar 2010

    Application Sessions: Conversation Abstractions for Pervasive Computing

    Pervasive computing application development demands abstractions that reify the notion of a conversation among distributed entities in dynamic and unpredictable environments. The authors define the Application Sessions model for representing and managing long-term conversations on behalf of applications. This model has been designed to remove the application developer's need for...

    Provided By University of Texas

  • White Papers // Mar 2010

    Real-Time Head Pose Estimation on Mobile Platforms

    Many computer vision applications such as augmented reality require head pose estimation. As far as the real-time implementation of head pose estimation on relatively resource limited mobile platforms is concerned, it is required to satisfy real-time constraints while maintaining reasonable head pose estimation accuracy. The authors introduced head pose estimation...

    Provided By University of Texas

  • White Papers // Mar 2010

    A New Eclipse-Based JML Compiler Built Using AST Merging

    The Java Modeling Language (JML) is a formal interface specification language to document the behavior of Java program modules and has been used in many research and industrial projects. However, its inability to support Java 5 features such as generics is reducing its user base significantly. Besides, the JML compiler...

    Provided By University of Texas

  • White Papers // Feb 2010

    Understanding Transactional Memory Performance

    This paper introduces Syncchar, a novel method and tool for reasoning about the performance of transactional memory. The authors have validated Syncchar's performance predictions and demonstrated its usefulness in guiding performance tuning on the TxLinux kernel. This paper also presents a detailed characterization of how the whole system, including architecture,...

    Provided By University of Texas

  • White Papers // Feb 2010

    On the Impact of Mobility on Multicast Capacity of Wireless Networks

    Analogous to the beneficial impact that mobility has on the throughput of unicast networks, this paper establishes that mobility can provide a similar gain in the order-wise growth-rate of the throughput for multicast networks. This paper considers an all-mobile multicast network, and characterizes its multicast capacity scaling. The scaling result...

    Provided By University of Texas

  • White Papers // Feb 2010

    Pilot Contamination Problem in Multi-Cell TDD Systems

    This paper considers a multi-cell multiple antenna system with precoding at the base stations for downlink transmission. To enable precoding, Channel State Information (CSI) is obtained via uplink training. This paper mathematically characterizes the impact that uplink training has on the performance of multi-cell multiple antenna systems. When non-orthogonal training...

    Provided By University of Texas

  • White Papers // Feb 2010

    Open Vs. Closed Access Femtocells in the Uplink

    Femtocells are assuming an increasingly important role in the coverage and capacity of cellular networks. In contrast to existing cellular systems, femtocells are end-user deployed and controlled, randomly located, and rely on third party backhaul (e.g., DSL or cable modem). Femtocells can be configured to be either open access or...

    Provided By University of Texas

  • White Papers // Feb 2010

    Real-Time, Unobtrusive, and Efficient Program Execution Tracing With Stream Caches and Last Stream Predictors

    This paper introduces a new hardware mechanism for capturing and compressing program execution traces unobtrusively in real-time. The proposed mechanism is based on two structures called stream cache and last stream predictor. The authors explore the effectiveness of a trace module based on these structures and analyze the design space....

    Provided By University of Texas

  • White Papers // Feb 2010

    The Anatomy of a Click: Modeling User Behavior on Web Information Systems

    Providing relevant information to users with minimal effort on their part remains the holy grail of search science. Since the retrieval and presentation of search results as well as any dynamic search engine behavior depend on the estimated user intent, it is highly critical to accurately infer the user intent...

    Provided By University of Texas

  • White Papers // Aug 2009

    Using Dead Blocks as a Virtual Victim Cache

    Caches mitigate the long memory latency that limits the performance of modern processors. However, caches can be quite inefficient. On average, a cache block in a 2MB L2 cache is dead 59% of the time, i.e., it will not be referenced again before it is evicted. Increasing cache efficiency can...

    Provided By University of Texas

  • White Papers // Jul 2009

    Batch Forwarding in Wireless Sensor Networks

    Batch processing is a well-known concept in computer science and widely used to improve performance in many applications. Similarly, to improve the delivery ratio and end2end delay in Wireless Sensor Networks (WSNs), the authors propose to use batch forwarding instead of streaming. The main goal in this paper is to...

    Provided By University of Texas

  • White Papers // Mar 2010

    Energy Efficient Block-Partitioned Multicore Processors for Parallel Applications

    Energy management has become an important research area in the last decade. As an energy efficient architecture, multicore has been widely adopted. However, with the number of cores on a single chip continuing to increase, it has been a grand challenge to effectively manage the energy efficiency of multicore-based systems....

    Provided By University of Texas

  • White Papers // Jul 2010

    Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks

    Communication privacy techniques that protect the locations of source sensor nodes and sink nodes from either global or local adversaries have received significant attention recently. The improvement in capture time, which is the time it takes for an adversary to identify the location of the source, is often estimated using...

    Provided By University of Texas

  • White Papers // Jun 2010

    SIDEKICK: Genomic Data Driven Analysis and Decision-Making Framework

    Scientists striving to unlock mysteries within complex biological systems face myriad barriers in effectively integrating available information to enhance their understanding. While experimental techniques and available data sources are rapidly evolving, useful information is dispersed across a variety of sources, and sources of the same information often do not use...

    Provided By University of Texas

  • White Papers // Jan 2010

    Safe, Multiphase Bounds Check Elimination in Java

    As part of its type-safety regime, the Java semantics require precise exceptions at runtime when programs attempt out-of-bound array accesses. This paper describes a Java implementation that utilizes a multiphase approach to identifying safe array accesses. This approach reduces runtime overhead by spreading the out-of-bounds checking effort across three phases...

    Provided By University of Texas

  • White Papers // Jan 2011

    Operating System Support for Massive Replication

    The increasing number of devices used by each user to access data and services and the increasing importance of the data and services available electronically both favor "Access-anywhere" network-delivered services. Unfortunately, making such services highly available is difficult. For example, even though end servers or service hosting sites advertise an...

    Provided By University of Texas

  • White Papers // Oct 2009

    On the Fundamental Limits of Interweaved Cognitive Radios

    This paper considers the problem of channel sensing in cognitive radios. The system model considered is a set of N parallel (dis-similar) channels, where each channel at any given time is either available or occupied by a legitimate user. The cognitive radio is permitted to sense channels to determine each...

    Provided By University of Texas

  • White Papers // May 2010

    Sensitive White Space Detection With Spectral Covariance Sensing

    This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and whitespace applications. The proposed Spectral Covariance Sensing (SCS) algorithm exploits the different statistical correlations of the received signal and noise in the frequency domain. Test statistics are computed from the covariance matrix of a partial spectrogram...

    Provided By University of Texas

  • White Papers // Feb 2011

    Innovating To Optimize Supply Chain Management

    As an innovator dedicated to collaboration with the network of vendors and customers, Advanced Micro Devices (AMD) considers the supply chain to be a key component to the success and one of the most important competitive assets. How important? Just one change the way the authors handle the supply chain...

    Provided By University of Texas

  • White Papers // Mar 2011

    Secure Friend Discovery in Mobile Social Networks

    Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who happen to be in their physical vicinity. Despite their promise to enable many exciting applications, serious security and privacy concerns have hindered wide...

    Provided By University of Texas

  • White Papers // Aug 2010

    A Super-Logarithmic Lower Bound for Shuffle-Unshuffle Sorting Networks

    A variety of different classes of sorting networks have been described in the literature. Of particular interest here are the so-called AKS network discovered by Ajtai, Komlos, and Szemeredi, and the sorting networks proposed by Batcher. While the AKS network is the only known sorting network with O (lgn) depth,...

    Provided By University of Texas

  • White Papers // Aug 2010

    Global Scheduling Based Reliability-Aware Power Management for Multiprocessor Real-Time Systems

    Reliability-Aware Power Management (RAPM) has been a recent research focus due the negative effects of the popular power management technique Dynamic Voltage and Frequency Scaling (DVFS) on system reliability. As a result, several RAPM schemes have been proposed for uniprocessor real-time systems. In this paper, for a set of frame-based...

    Provided By University of Texas

  • White Papers // Jul 2010

    Collective Specification and Verification of Behavioral Models and Object-Oriented Implementations

    The authors present a finite-state-machine-based language, iFSM, to seamlessly integrate the behavioral logic and implementation strategies of object-oriented applications to prevent their design and implementation from being out-of-sync. The language allows developers to focus on higher-level abstractions to support software analysis and design instead of focusing on language or architecture...

    Provided By University of Texas

  • White Papers // Dec 2009

    Limited Feedback for Temporally Correlated MIMO Channels With Other Cell Interference

    Limited feedback improves link reliability with a small amount of feedback from the receiver back to the transmitter. In cellular systems, the performance of limited feedback will be degraded in the presence of other cell interference, when the base stations have limited or no coordination. This paper establishes the degradation...

    Provided By University of Texas

  • White Papers // Jan 2011

    Discovering Substructures in the Chemical Toxicity Domain

    The researcher's ability to interpret the data and discover interesting patterns within the data is of great importance as it helps in obtaining relevant SARs [Srinivasan et al.], for the cause of chemical cancers (e.g., Progol identified a primary amine group as a relevant SAR for the cause of chemical...

    Provided By University of Texas

  • White Papers // Jan 2011

    Structure Discovery in Sequentially-Connected Data Streams

    Much of current data mining research is focused on discovering sets of attributes that discriminate data entities into classes, such as shopping trends for a particular demographic group. In contrast, the authors are working to develop data mining techniques to discover patterns consisting of complex relationships between entities. Their research...

    Provided By University of Texas

  • White Papers // Jan 2011

    Using a Graph-Based Data Mining System to Perform Web Search

    The World Wide Web provides an immense source of information. Accessing information of interest presents a challenge to scientists and analysts, particularly if the desired information is structural in nature. The authors' goal is to design a structural search engine that uses the hyperlink structure of the Web, in addition...

    Provided By University of Texas

  • White Papers // Jun 2011

    XML Query Optimization in Map-Reduce

    The authors present a novel query language for large-scale analysis of XML data on a map-reduce environment, called MRQL, that is expressive enough to capture most common data analysis tasks and at the same time is amenable to optimization. The authors' evaluation plans are constructed using a small number of...

    Provided By University of Texas

  • White Papers // Dec 2010

    Hybrid Partial Evaluation

    The authors present Hybrid Partial Evaluation (HPE), a pragmatic approach to partial evaluation that borrows ideas from both online and offline partial evaluation. HPE performs offline-style specialization using an online approach without static binding time analysis. The goal of HPE is to provide a practical and predictable level of optimization...

    Provided By University of Texas

  • White Papers // Jan 2011

    Programming Many-Core Architectures - A Case Study: Dense Matrix Computations on the Intel SCC Processor

    A message passing, distributed-memory parallel computer on a chip is one possible design for future, many-core architectures. The authors discuss initial experiences with the Intel Single-chip Cloud Computer research processor, which is a prototype architecture that incorporates 48 cores on a single die that can communicate via a small, shared,...

    Provided By University of Texas

  • White Papers // Feb 2011

    Is That You? Authentication in a Network Without Identities

    Most networks require that their users have "Identities", i.e. have names that are fixed for a relatively long time, unique, and have been approved by a central authority (in order to guarantee their uniqueness). Unfortunately, this requirement, which was introduced to simplify the design of networks, has its own drawbacks....

    Provided By University of Texas

  • White Papers // Mar 2011

    TPP: The Two-Way Password Protocol

    The need for secure communication in the Internet has led to the widespread deployment of secure application-level protocols. The current state-of-the-art is to use TLS, in conjunction with a password protocol. The password protocol, which the authors call a One-way Password Protocol (OPP), authenticates the client to the server, using...

    Provided By University of Texas

  • White Papers // Apr 2011

    The K-Observer Problem in Computer Networks

    For any non-negative integer K, a K-observer P of a network N is a set of nodes in N such that each message, that travels at least K hops in N, is handled (and so observed) by at least one node in P. A K-observer P of a network N...

    Provided By University of Texas

  • White Papers // Apr 2011

    Mechanizing the Expert Dense Linear Algebra Developer

    Sustained high performance on the fastest computers in the world has traditionally been accomplished by experts who carefully hand-code key routines. This quickly becomes unmanageable for large bodies of software and/or as architectures change enough that entire libraries need to be rewritten. The authors believe the problem is that a...

    Provided By University of Texas

  • White Papers // May 2011

    Regret-Freedom Isn't Free

    Cooperative, Peer-To-Peer (P2P) services-distributed systems consisting of participants from Multiple Administrative Domains (MAD)|must deal with the threat of arbitrary (Byzan-tine) failures while incentivizing the cooperation of potentially selfish (rational) nodes that such services rely on to function. Although previous work has generally agreed that these types of participants need to...

    Provided By University of Texas

  • White Papers // May 2011

    Consistency, Availability, and Convergence

    The authors examine the limits of consistency in fault-tolerant distributed storage systems. In particular, they identify fundamental tradeoffs among properties of consistency, availability, and convergence, and the authors close the gap between what is known to be impossible (i.e. CAP) and known systems that are highly-available but that provide weaker...

    Provided By University of Texas

  • White Papers // Jan 2011

    Qualitative Comparison of Graph-Based and Logicbased Multi-Relational Data Mining: A Case Study

    The goal of this paper is to generate insights about the differences between graph-based and logic-based approaches to multi-relational data mining by performing a case study of graph-based system, Subdue and the inductive logic programming system, CProgol. The authors identify three key factors for comparing graph-based and logic-based multi-relational data...

    Provided By University of Texas

  • White Papers // Mar 2011

    Secure Multidimensional Range Queries Over Outsourced Data

    In this paper the authors study the problem of supporting multidimensional range queries on encrypted data. The problem is motivated by secure data outsourcing applications where a client may store his/her data on a remote server in encrypted form and want to execute queries using server's computational capabilities. The solution...

    Provided By University of Texas

  • White Papers // Jan 2007

    Disclosure Quality And Its Effect On Litigation Risk

    This paper examines the relationship between the quality of disclosure in companies' 10-K filings and the risk of securities class action litigation. The author uses a dataset containing 10-K documents filed electronically with the SEC in the period 1996-2005. Using two content analysis software programs that analyze the categories of...

    Provided By University of Texas

  • White Papers // Feb 2010

    The Anatomy of a Click: Modeling User Behavior on Web Information Systems

    Providing relevant information to users with minimal effort on their part remains the holy grail of search science. Since the retrieval and presentation of search results as well as any dynamic search engine behavior depend on the estimated user intent, it is highly critical to accurately infer the user intent...

    Provided By University of Texas

  • White Papers // Oct 2010

    User Admission in MIMO Interference Alignment Networks

    In this paper, the authors consider an interference channel where a set of primary active users are cooperating through interference alignment over a constant multiple-input-multiple-output channel while a set of secondary users desire access to the channel. They present the conditions under which a secondary user can be admitted to...

    Provided By University of Texas

  • White Papers // Nov 2010

    Transmission Capacity of Carrier Sensing Ad Hoc Networks With Multiple Antennas

    Multiple antennas have become a common component of wireless networks, improving range, throughput, and spatial reuse, both at the link and network levels. At the same time, carrier sensing is a widely used method of improving spatial reuse in distributed wireless networks, especially when there is limited coordination among non-communicating...

    Provided By University of Texas

  • White Papers // Sep 2009

    Random Access Transport Capacity

    The authors develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which they term random access transport capacity since the interference model presumes uncoordinated transmissions. The metric quantifies the average maximum rate of successful end-to-end transmissions, multiplied by the communication distance, and normalized by the network area....

    Provided By University of Texas

  • White Papers // Mar 2011

    Fuzzy Optimization for Mobile Ad Hoc Networks: A Bottom-up Cross-Layer Approach

    In this paper, the authors introduce a new method for cross-layer design in mobile ad hoc networks. They use Fuzzy Logic System (FLS) to coordinate physical layer, data-link layer and application layer for cross-layer design. Ground speed, average delay and packets successful transmission ratio are selected as antecedents for the...

    Provided By University of Texas

  • White Papers // Dec 2010

    A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks

    Optical Transport Network (OTN) is a standard approach to offering transport support to a variety of existing service technologies, e.g., ESCON, HDTV, GE, etc. Multiple service technologies can be concurrently multiplexed onto one common transport network, which offers hierarchical transmission rate wrappers physically supported by Wavelength Division Multiplexing (WDM) lambda...

    Provided By University of Texas

  • White Papers // Dec 2009

    Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in Cooperative Multicell Systems

    Base station cooperation improves the sum-rates that can be achieved in cellular systems. Conventional cooperation techniques require sharing large amounts of information over finite-capacity backhaul links and assume that base stations have full Channel State Information (CSI) of all the active users in the system. In this paper, a new...

    Provided By University of Texas

  • White Papers // Jul 2010

    User Partitioning for Less Overhead in MIMO Interference Channels

    This paper presents a study on multiple-antenna interference channels, accounting for general overhead as a function of the number of users and antennas in the network. The model includes both perfect and imperfect channel state information based on channel estimation in the presence of noise. Three low-complexity methods are proposed...

    Provided By University of Texas

  • White Papers // Dec 2011

    Making Argument Systems for Outsourced Computation Practical (Sometimes)

    This paper describes the design, implementation, and evaluation of a system for performing verifiable outsourced computation. It has long been known that this problem can be solved in theory using Probabilistically Checkable Proofs (PCPs) coupled with modern cryptographic tools, and these solutions have wholly impractical performance, according to the conventional...

    Provided By University of Texas

  • White Papers // Apr 2011

    Toward Practical and Unconditional Verification of Remote Computations

    This paper revisits a classic question: how can a machine specify a computation to another one and then, without executing the computation, check that the other machine carried it out correctly? The applications of such a primitive include cloud computing (a computationally limited device offloads processing to the cloud but...

    Provided By University of Texas