University of Texas

Displaying 201-240 of 318 results

  • White Papers // Jan 2010

    International Protection Of Intellectual Property: A Quantitative Assessment

    The strength of Intellectual Property Right (IPR) protection varies across countries and these differences have persisted across time. In this paper, the author builds a multi-country dynamic model where governments choose IPR policies each period. The author uses country heterogeneity in education, population, and bilateral trade costs to induce IPR...

    Provided By University of Texas

  • White Papers // Jan 2010

    A Simple SINR Characterization for Linear Interference Alignment Over Uncertain MIMO Channels

    This paper provides a simple closed-form SINR expression for interference alignment over MIMO channels with channel uncertainty. Assuming linear processing (specifically, zero-forcing) at the transmitters and receivers and a complex Gaussian interference channel, the authors show that random matrix theory can be successfully applied to find the SINR distribution of...

    Provided By University of Texas

  • White Papers // Jan 2010

    A New Method for Computing the Transmission Capacity of Non-Poisson Wireless Networks

    The relative locations of concurrent transmitting nodes play an important role in the performance of wireless networks because it largely determines their mutual interference. In most prior work the set of interfering transmitters has been modeled by a homogeneous Poisson distribution, which assumes independence in the transmitting node positions, and...

    Provided By University of Texas

  • White Papers // Jan 2010

    A Comparative Analysis of Parallel Computing Approaches for Genome Assembly

    Over the last two decades, the authors have witnessed a tremendous growth of sequenced genomic data. However, the algorithms and computational power required to expeditiously process, classify, and analyze genomic data has lagged considerably. In bio-informatics, one of the most challenging and computationally intensive processes, which may take up to...

    Provided By University of Texas

  • White Papers // Jan 2010

    Spectral Covariance for Spectrum Sensing, With Application to IEEE 802.22

    Despite the shortage of available frequency spectrum, recent studies have shown that the actual usage of the allocated spectrum is scarce. The IEEE is developing the 802.22 standard for spectral reuse in TV bands that uses Cognitive Radio (CR) technology. One of the essential and challenging features of CR is...

    Provided By University of Texas

  • White Papers // Jan 2010

    Logical Concurrency Control From Sequential Proofs

    The authors are interested in identifying and enforcing the isolation requirements of a concurrent program, i.e., concurrency control that ensures that the program meets its specification. This can be done systematically starting from a sequential proof, i.e., a proof of correctness of the program in the absence of concurrent inter-leavings....

    Provided By University of Texas

  • White Papers // Jan 2010

    Supporting Multi-Fidelity-Aware Concurrent Applications in Dynamic Sensor Networks

    Most existing research in wireless sensor networks focuses on optimally running a single application on top of a tailor-made and deployed network. However, as sensors become an integral part of the environments, the authors posit that sensor networks will be increasingly viewed as platforms that will be used to run...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet: A Free Space Optics Based BackHaul Architecture for Next Generation Cellular Networks

    There has been an increasing demand for bandwidth-intensive services in mobile devices, such as streaming video and music, which bring about a paradigm shift in wireless cellular network architectures. Although various coding and modulation schemes are being adopted to address these requirements, a critical area of modification is the existing...

    Provided By University of Texas

  • White Papers // Jan 2010

    PeterNet : An Emergent Technology Based Radio Access Network Architecture for Next Generation Cellular Wireless Systems

    For next generation wireless cellular networks, the Radio Access Network (RAN) component is destined to evolve into a high-capacity, flexible and reconfigurable network architecture supporting smaller cell sites and newer technologies. Based on the well-known Petersen graph, in this paper the authors propose a RAN architecture, named PeterNet, that interconnects...

    Provided By University of Texas

  • White Papers // Jan 2010

    IP Address Assignment in a Mobile Ad Hoc Network

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By University of Texas

  • White Papers // Jan 2010

    Energy Consumption in Wireless Sensor Networks Using GSP

    One of the main design issues for a sensor network is conservation of the energy available at each sensor node. The authors propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. They split the lifetime of the sensor network into equal periods of time...

    Provided By University of Texas

  • White Papers // Dec 2009

    Capacity Scaling of MIMO Broadcast Channels With Random User Distribution

    A novel capacity scaling law for Multiple-Input Multiple-Output (MIMO) broadcast channels is derived considering a random user distribution. The random locations cause unequal average SNRs amongst the users, whereas prior work typically assumes that all users have the same average SNR. Most centralized wireless networks, e.g. cellular systems, are more...

    Provided By University of Texas

  • White Papers // Dec 2009

    Passive Network-Awareness for Dynamic Resource-Constrained Networks

    As computing devices and their users become increasingly mobile, the demand for information about the environment, or context, becomes of significant importance. Applications must be able to adapt themselves to the changing environment to satisfy users' demands and to ensure that the application's resource usage matches the environment's capabilities. However,...

    Provided By University of Texas

  • White Papers // Dec 2009

    Limited Feedback for Temporally Correlated MIMO Channels With Other Cell Interference

    Limited feedback improves link reliability with a small amount of feedback from the receiver back to the transmitter. In cellular systems, the performance of limited feedback will be degraded in the presence of other cell interference, when the base stations have limited or no coordination. This paper establishes the degradation...

    Provided By University of Texas

  • White Papers // Dec 2009

    Adaptive Limited Feedback for Sum-Rate Maximizing Beamforming in Cooperative Multicell Systems

    Base station cooperation improves the sum-rates that can be achieved in cellular systems. Conventional cooperation techniques require sharing large amounts of information over finite-capacity backhaul links and assume that base stations have full Channel State Information (CSI) of all the active users in the system. In this paper, a new...

    Provided By University of Texas

  • White Papers // Dec 2009

    Multicast Capacity Scaling of Wireless Networks With Multicast Outage

    Multicast transmission has several distinctive traits as opposed to more commonly studied unicast networks. Specially, these include - identical packets must be delivered successfully to several nodes, outage could simultaneously happen at different receivers, and the multicast rate is dominated by the receiver with the weakest link in order to...

    Provided By University of Texas

  • White Papers // Dec 2009

    Edge-Based Cloud Computing as a Feasible Network Paradigm

    The term edge based cloud computing refers to a network of edge systems that provide the services currently provided by data center clouds. In this paper the authors present modifications to MRPerf, an existing tool used to simulate MapReduce in data center clouds, enabling it to simulate Hadoop MapReduce jobs...

    Provided By University of Texas

  • White Papers // Nov 2009

    Opportunistic Routing for Interactive Traffic in Wireless Networks

    To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extra signaling overhead associated with operation of the opportunistic routing, these schemes work in terms of 'Batches' consisting of multiple packets. While these opportunistic techniques...

    Provided By University of Texas

  • White Papers // Nov 2009

    Feasibility of Interference Alignment of Measured MIMO-OFDM Channels

    Interference Alignment (IA) has been shown to provide all users of an interference channel with half the capacity achievable in an interference free point-to-point link resulting in linear sum capacity scaling with the number of users in the high SNR regime. The linear scaling is achieved by cooperatively precoding transmitted...

    Provided By University of Texas

  • White Papers // Nov 2009

    A Simple Upper Bound on Random Access Transport Capacity

    The authors attempt to quantify end-to-end throughput in multi-hop wireless networks using a metric that measures the maximum density of source-destination pairs that can successfully communicate over a specified distance at certain data rate. They term this metric the random access transport capacity, since it is similar to transport capacity...

    Provided By University of Texas

  • White Papers // Nov 2009

    Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WiMax

    IEEE 802.16e, a broadband wireless access technology that provides high speed internet access and multimedia services has seen very significant growth in recent times. With the due rapid deployment of WiMAX, there would be a growing demand for efficient support of voice applications. The performance of Voice over IP services...

    Provided By University of Texas

  • White Papers // Oct 2009

    Model-Checking In-Lined Reference Monitors

    A technique for elegantly expressing In-lined Reference Monitor (IRM) certification as model-checking is presented and implemented. In-lined Reference Monitors (IRM's) enforce software security policies by in-lining dynamic security guards into untrusted binary code. Certifying IRM systems provide strong formal guarantees for such systems by verifying that the instrumented code produced...

    Provided By University of Texas

  • White Papers // Oct 2009

    Pharos: An Application-Oriented Testbed for Heterogeneous Wireless Networking Environments

    This paper presents the Pharos mobile computing testbed which focuses on application-driven validation of pervasive computing research using real hardware and real mobility. Pharos enables meaningful and reproducible validation at all levels of the network stack, including mobility modeling, routing protocols, coordination, application support, and system configuration. At the same...

    Provided By University of Texas

  • White Papers // Oct 2009

    On the Fundamental Limits of Interweaved Cognitive Radios

    This paper considers the problem of channel sensing in cognitive radios. The system model considered is a set of N parallel (dis-similar) channels, where each channel at any given time is either available or occupied by a legitimate user. The cognitive radio is permitted to sense channels to determine each...

    Provided By University of Texas

  • White Papers // Oct 2009

    Design of a Reliable Communication System for Grid-Style Traffic Control Networks

    This paper designs and analyzes the performance of a reliable communication scheme for the traffic control system built upon a wireless process control protocol, aiming at enhancing the robustness and timeliness of the safety critical control applications. Focusing on the slot-based predictable access and the grid topology of urban area...

    Provided By University of Texas

  • White Papers // Sep 2009

    Blurring Snapshots: Temporal Inference of Missing and Uncertain Data

    Many pervasive computing applications continuously monitor state changes in the environment by acquiring, interpreting and responding to information from sensors embedded in the environment. However, it is extremely difficult and expensive to obtain a continuous, complete, and consistent picture of a continuously evolving operating environment. One standard technique to mitigate...

    Provided By University of Texas

  • White Papers // Sep 2009

    Random Access Transport Capacity

    The authors develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which they term random access transport capacity since the interference model presumes uncoordinated transmissions. The metric quantifies the average maximum rate of successful end-to-end transmissions, multiplied by the communication distance, and normalized by the network area....

    Provided By University of Texas

  • White Papers // Sep 2009

    Diversity-Multiplexing Tradeoff of Network Coding With Bidirectional Random Relaying

    This paper develops a Diversity-Multiplexing Tradeoff (DMT) over a bidirectional random relay set in a wireless network where the distribution of all nodes is a stationary Poisson point process. This is a nontrivial extension of the DMT because it requires consideration of the cooperation (or lack thereof) of relay nodes,...

    Provided By University of Texas

  • White Papers // Sep 2009

    Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks

    Downlink spatial InterCell Interference Cancellation (ICIC) is considered for mitigating other-cell interference using multiple transmit antennas. A principle question the authors explore is whether it is better to do ICIC or simply standard single-cell beamforming. They explore this question analytically and show that beamforming is preferred for all users when...

    Provided By University of Texas

  • White Papers // Sep 2009

    Modeling Delivery Delay for Flooding in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) can have widely varying characteristics under different deployments, and previous studies show that the characteristics impact the behavior of routing protocols for MANETs. To deploy applications successfully in MANETs, application developers need to comprehend the potential behavior of any underlying protocol used. In mobile networks,...

    Provided By University of Texas

  • White Papers // Sep 2009

    Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems

    Maintaining the temporal validity of real-time data is one of the crucial issues in a real-time database system. Past studies focus on designing algorithms to minimize imposed workload by a fixed set of update transactions while maintaining data freshness within validity intervals. In this paper the authors revisit this problem...

    Provided By University of Texas

  • White Papers // Sep 2009

    Why Are Firms Unlevered?

    In this paper, the authors examine the motivations for firms to remain debt free. Using a sample of firms that have no debt for three consecutive years, they find little support for the managerial entrenchment, flexibility, or the tax hypotheses. These firms do not have weak governance mechanisms, they payout...

    Provided By University of Texas

  • White Papers // Aug 2009

    Using Dead Blocks as a Virtual Victim Cache

    Caches mitigate the long memory latency that limits the performance of modern processors. However, caches can be quite inefficient. On average, a cache block in a 2MB L2 cache is dead 59% of the time, i.e., it will not be referenced again before it is evicted. Increasing cache efficiency can...

    Provided By University of Texas

  • White Papers // Aug 2009

    User Association to Optimize Flow Level Performance In Wireless Systems With Dynamic Interference

    The authors study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference models (neighboring base stations are always active) and resorted to intuitive objectives such as load balancing. In this paper, they show that this can...

    Provided By University of Texas

  • White Papers // Aug 2009

    Do Financial Intermediaries Help To Certify Firm Transparency? Effect Of Auditor Quality On SEO Transaction Costs

    The author empirically investigates the differing certification effects of a firm employing financial intermediaries of varying reputation. The author uses a treatment effects model to control for endogeneity in the selection of intermediary reputation, and the author demonstrates that the use of reputable financial intermediaries helps to mitigate transaction costs...

    Provided By University of Texas

  • White Papers // Aug 2009

    Goal-Oriented Security Threat Mitigation Patterns: A Case of Credit Card Theft Mitigation

    Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions suitable for a specific application or organization. This paper presents three...

    Provided By University of Texas

  • White Papers // Aug 2009

    On the Stability Region of Amplify-and-Forward Cooperative Relay Networks

    This paper considers an amplify-and-forward relay network with fading states. Amplify-and-forward scheme (along with its variations) is the core mechanism for enabling cooperative communication in wireless networks, and hence understanding the network stability region under amplify-and-forward scheme is very important. However, in a relay network employing amplify-and-forward, the interaction between...

    Provided By University of Texas

  • White Papers // Jul 2009

    Batch Forwarding in Wireless Sensor Networks

    Batch processing is a well-known concept in computer science and widely used to improve performance in many applications. Similarly, to improve the delivery ratio and end2end delay in Wireless Sensor Networks (WSNs), the authors propose to use batch forwarding instead of streaming. The main goal in this paper is to...

    Provided By University of Texas

  • White Papers // Jul 2009

    Calculating, Creating, And Claiming Value In Business Markets: Status And Research Agenda

    B2B markets offer challenges that differ from those in B2C markets in addressing these issues (e.g., Anderson, Narus, and Narayandas 2009; Dwyer and Tanner 2008). These challenges stem from the fact that most B2B markets (relative to B2C markets) are characterized by a far fewer buyers who buy in much...

    Provided By University of Texas

  • White Papers // Jul 2009

    An Optimal Boundary-Fair Scheduling Algorithm for Multiprocessor Real-Time Systems

    Although the scheduling problem for multiprocessor real-time systems has been studied for decades, it is still an evolving research field with many open problems. In this paper, focusing on periodic real-time tasks, the authors propose a novel optimal scheduling algorithm, namely Boundary fair (Bfair), which follows the same line of...

    Provided By University of Texas

  • White Papers // Nov 2010

    Corporate Leverage, Debt Maturity And Credit Default Swaps: The Role Of Credit Supply

    Does the ability of suppliers of debt to hedge risk through Credit Default Swap (CDS) contracts impact firms' capital structures? This paper uses CDS markets as a proxy for a relaxation of firms' credit supply constraints and tests whether supply frictions impact capital structure and debt maturity. The authors find...

    Provided By University of Texas

  • White Papers // Oct 2009

    On the Fundamental Limits of Interweaved Cognitive Radios

    This paper considers the problem of channel sensing in cognitive radios. The system model considered is a set of N parallel (dis-similar) channels, where each channel at any given time is either available or occupied by a legitimate user. The cognitive radio is permitted to sense channels to determine each...

    Provided By University of Texas

  • White Papers // May 2010

    Sensitive White Space Detection With Spectral Covariance Sensing

    This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and whitespace applications. The proposed Spectral Covariance Sensing (SCS) algorithm exploits the different statistical correlations of the received signal and noise in the frequency domain. Test statistics are computed from the covariance matrix of a partial spectrogram...

    Provided By University of Texas

  • White Papers // Feb 2011

    Innovating To Optimize Supply Chain Management

    As an innovator dedicated to collaboration with the network of vendors and customers, Advanced Micro Devices (AMD) considers the supply chain to be a key component to the success and one of the most important competitive assets. How important? Just one change the way the authors handle the supply chain...

    Provided By University of Texas

  • White Papers // Mar 2011

    Secure Multidimensional Range Queries Over Outsourced Data

    In this paper the authors study the problem of supporting multidimensional range queries on encrypted data. The problem is motivated by secure data outsourcing applications where a client may store his/her data on a remote server in encrypted form and want to execute queries using server's computational capabilities. The solution...

    Provided By University of Texas

  • White Papers // Dec 2009

    Limited Feedback for Temporally Correlated MIMO Channels With Other Cell Interference

    Limited feedback improves link reliability with a small amount of feedback from the receiver back to the transmitter. In cellular systems, the performance of limited feedback will be degraded in the presence of other cell interference, when the base stations have limited or no coordination. This paper establishes the degradation...

    Provided By University of Texas

  • White Papers // Jan 2007

    Disclosure Quality And Its Effect On Litigation Risk

    This paper examines the relationship between the quality of disclosure in companies' 10-K filings and the risk of securities class action litigation. The author uses a dataset containing 10-K documents filed electronically with the SEC in the period 1996-2005. Using two content analysis software programs that analyze the categories of...

    Provided By University of Texas

  • White Papers // Dec 2008

    Freenet: A Distributed Anonymous Information Storage and Retrieval System

    The authors describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests...

    Provided By University of Texas

  • White Papers // Aug 2010

    A Super-Logarithmic Lower Bound for Shuffle-Unshuffle Sorting Networks

    A variety of different classes of sorting networks have been described in the literature. Of particular interest here are the so-called AKS network discovered by Ajtai, Komlos, and Szemeredi, and the sorting networks proposed by Batcher. While the AKS network is the only known sorting network with O (lgn) depth,...

    Provided By University of Texas

  • White Papers // Oct 2008

    A Machine-Checked Model of Safe Composition

    Programs of a software product line can be synthesized by composing features which implement some unit of program functionality. In most product lines, only some combinations of features are meaningful; feature models express the high-level domain constraints that govern feature compatibility. Product line developers also face the problem of safe...

    Provided By University of Texas

  • White Papers // Dec 2008

    Gel: A Generic Extensible Language

    Both XML and Lisp have demonstrated the utility of generic syntax for expressing tree-structured data. But generic languages do not provide the syntactic richness of custom languages. Generic Expression Language (GEL) is a rich generic syntax that embodies many of the common syntactic conventions for operators, grouping and lists in...

    Provided By University of Texas

  • White Papers // Dec 2008

    Interprocedural Query Extraction for Transparent Persistence

    Transparent persistence promises to integrate programming languages and databases by allowing programs to access persistent data with the same ease as non-persistent data. In this paper the authors demonstrate the feasibility of optimizing transparently persistent programs by extracting queries to efficiently prefetch required data. A static analysis derives query structure...

    Provided By University of Texas

  • White Papers // Sep 2008

    Structured Interacting Computations

    Today, concurrency is ubiquitous, in desktop applications, client-server systems, workflow systems, transaction processing and web services. Design of concurrent systems, particularly in the presence of communication failures, time-outs and interrupts, is still difficult and error-prone. Theoretical models of concurrency focus on expressive power and simplicity, but do not provide high-level...

    Provided By University of Texas

  • White Papers // Mar 2009

    Synthesis of Fast Programs for Maximum Segment Sum Problems

    It is well-known that a naive algorithm can often be turned into an efficient program by applying appropriate semantic spreserving transformations. This technique has been used to derive programs to solve a variety of maximum-sum programs. One problem with this approach is that each problem variation requires a new set...

    Provided By University of Texas

  • White Papers // Dec 2008

    Model Transformation by Partial Evaluation of Model Interpreters

    In model-driven development, the use of both model translators and model interpreters is widespread. It is also well-known that partial evaluation can turn an interpreter into a translator. In this paper the authors show that a simple online partial evaluator is effective at specializing a model interpreter with respect to...

    Provided By University of Texas

  • White Papers // Dec 2008

    Generic Operations and Partial Evaluation Using Models

    Model-driven software development is a promising new application area for partial evaluation. In this papers, the authors develop an approach to generic programming using models instead of types. The work is done in the context of Pummel, a first-order subset of Scheme with objects and monoid comprehensions. The authors define...

    Provided By University of Texas

  • White Papers // Mar 2009

    Tactical Synthesis of Efficient Global Search Algorithms

    Algorithm synthesis transforms a formal specification into an efficient algorithm to solve a problem. Algorithm synthesis in Specware combines the formal specification of a problem with a high-level algorithm strategy. To derive an efficient algorithm, a developer must define operators that refine the algorithm by combining the generic operators in...

    Provided By University of Texas

  • White Papers // Oct 2009

    Pharos: An Application-Oriented Testbed for Heterogeneous Wireless Networking Environments

    This paper presents the Pharos mobile computing testbed which focuses on application-driven validation of pervasive computing research using real hardware and real mobility. Pharos enables meaningful and reproducible validation at all levels of the network stack, including mobility modeling, routing protocols, coordination, application support, and system configuration. At the same...

    Provided By University of Texas

  • White Papers // Dec 2009

    Passive Network-Awareness for Dynamic Resource-Constrained Networks

    As computing devices and their users become increasingly mobile, the demand for information about the environment, or context, becomes of significant importance. Applications must be able to adapt themselves to the changing environment to satisfy users' demands and to ensure that the application's resource usage matches the environment's capabilities. However,...

    Provided By University of Texas

  • White Papers // Jan 2010

    Supporting Multi-Fidelity-Aware Concurrent Applications in Dynamic Sensor Networks

    Most existing research in wireless sensor networks focuses on optimally running a single application on top of a tailor-made and deployed network. However, as sensors become an integral part of the environments, the authors posit that sensor networks will be increasingly viewed as platforms that will be used to run...

    Provided By University of Texas

  • White Papers // Feb 2010

    MaDMAN: A Middleware for Delay-Tolerant Mobile Ad-Hoc Networks

    As Delay-Tolerant Networks (DTNs), dynamic networks in which nodes are not always connected to one another, gain traction in both the research community and in real-world deployments, research must explore how DTN protocols can coexist with traditional mobile ad-hoc networking protocols. This is a requirement for future deployments in which...

    Provided By University of Texas

  • White Papers // Feb 2010

    Usability of Semantic Web for Enhancing Digital Living Experience

    The number of different types of devices on the home network is expanding rapidly. While this explosion of innovation provides compelling new devices to consumers, there are challenges ensuring compatibility among these devices and providing a comprehensive user interface that supports consumers managing their digital content across several devices. The...

    Provided By University of Texas

  • White Papers // Mar 2010

    Application Sessions: Conversation Abstractions for Pervasive Computing

    Pervasive computing application development demands abstractions that reify the notion of a conversation among distributed entities in dynamic and unpredictable environments. The authors define the Application Sessions model for representing and managing long-term conversations on behalf of applications. This model has been designed to remove the application developer's need for...

    Provided By University of Texas

  • White Papers // Aug 2010

    The Case for End-User Programming of Ubiquitous Computing Environments

    Gone are the days that computers will be used by select users sitting at a desk with a mouse and keyboard. The next wave of computing, ubiquitous computing, is upon one. With smart phones, tablet computers, and embedded sensors/ actuators ourishing, users are already interacting with dozens of computers per...

    Provided By University of Texas

  • White Papers // Sep 2010

    The Click Convergence Layer: Putting a Modular Router Under DTN2

    The Bundle Protocol shows great promise as a general purpose application-layer protocol for Delay-Tolerant Networks (DTNs) and has found many adopters within the research community. As an application layer protocol, a convergence layer (UDP/TCP sockets or some other domain-specific transport mechanism) is required to deliver bundles between nodes. The authors...

    Provided By University of Texas

  • White Papers // Jun 2009

    Towards Adaptive Resource-Driven Routing

    In pervasive computing environments, applications find themselves in constantly changing operating conditions. Such applications often need to discover locally available resources on-demand. Communication protocols have been developed that base discovery not on the unique address of the destination but on application-level characteristics of the destination host. Previous work has focused...

    Provided By University of Texas

  • White Papers // Nov 2009

    Investigating the Performance of Various Vocoders for a Fair Scheduling Algorithm in WiMax

    IEEE 802.16e, a broadband wireless access technology that provides high speed internet access and multimedia services has seen very significant growth in recent times. With the due rapid deployment of WiMAX, there would be a growing demand for efficient support of voice applications. The performance of Voice over IP services...

    Provided By University of Texas

  • White Papers // Aug 2010

    Objective Risk Evaluation for Automated Security Management

    Network security depends on a number of factors. And a common characteristic of these factors is that they are dynamic in nature. Such factors include new vulnerabilities and threats, the network policy structure and traffic. These factors can be divided into two broad categories. Network risk and service risk. As...

    Provided By University of Texas

  • White Papers // Feb 2011

    Synthesizing Concurrent Schedulers for Irregular Algorithms

    Scheduling is the assignment of tasks or activities to processors for execution, and it is an important concern in parallel programming. Most prior work on scheduling has focused either on static scheduling of applications in which the dependence graph is known at compile-time or on dynamic scheduling of independent loop...

    Provided By University of Texas

  • White Papers // Dec 2010

    Parallel Graph Partitioning on Multicore Architectures

    Graph partitioning is a common and frequent preprocessing step in many high-performance parallel applications on distributed and shared-memory architectures. It is used to distribute graphs across memory and to improve spatial locality. There are several parallel implementations of graph partitioning for distributed-memory architectures. In this paper, the authors present a...

    Provided By University of Texas

  • White Papers // Oct 2008

    Network Imprecision: A New Consistency Metric for Scalable Monitoring

    This paper introduces a new consistency metric, Network Imprecision (NI), to address a central challenge in large-scale monitoring systems: Safeguarding accuracy despite node and network failures. To implement NI, an overlay that monitors a set of attributes also monitors its own state so that queries return not only attribute values...

    Provided By University of Texas

  • White Papers // Aug 2009

    Using Dead Blocks as a Virtual Victim Cache

    Caches mitigate the long memory latency that limits the performance of modern processors. However, caches can be quite inefficient. On average, a cache block in a 2MB L2 cache is dead 59% of the time, i.e., it will not be referenced again before it is evicted. Increasing cache efficiency can...

    Provided By University of Texas

  • White Papers // Jul 2009

    Batch Forwarding in Wireless Sensor Networks

    Batch processing is a well-known concept in computer science and widely used to improve performance in many applications. Similarly, to improve the delivery ratio and end2end delay in Wireless Sensor Networks (WSNs), the authors propose to use batch forwarding instead of streaming. The main goal in this paper is to...

    Provided By University of Texas

  • White Papers // Mar 2010

    Energy Efficient Block-Partitioned Multicore Processors for Parallel Applications

    Energy management has become an important research area in the last decade. As an energy efficient architecture, multicore has been widely adopted. However, with the number of cores on a single chip continuing to increase, it has been a grand challenge to effectively manage the energy efficiency of multicore-based systems....

    Provided By University of Texas

  • White Papers // Jul 2010

    Source Capture Time Analysis of Privacy Communication Protocols for Wireless Sensor Networks

    Communication privacy techniques that protect the locations of source sensor nodes and sink nodes from either global or local adversaries have received significant attention recently. The improvement in capture time, which is the time it takes for an adversary to identify the location of the source, is often estimated using...

    Provided By University of Texas

  • White Papers // Jun 2010

    SIDEKICK: Genomic Data Driven Analysis and Decision-Making Framework

    Scientists striving to unlock mysteries within complex biological systems face myriad barriers in effectively integrating available information to enhance their understanding. While experimental techniques and available data sources are rapidly evolving, useful information is dispersed across a variety of sources, and sources of the same information often do not use...

    Provided By University of Texas

  • White Papers // Sep 2010

    Identity-Based Encryption Secure Against Selective Opening Attack

    The authors present the first Identity-Based Encryption (IBE) schemes that are proven secure against Selective Opening Attack (SOA). This means that if an adversary, given a vector of ciphertexts, adaptively corrupts some fraction of the senders, exposing not only their messages but also their coins, the privacy of the unopened...

    Provided By University of Texas

  • White Papers // Mar 2010

    Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

    In this paper, the authors present two fully secure functional encryption schemes. The first result is a fully secure Attribute-Based Encryption (ABE) scheme. Previous constructions of ABE were only proven to be selectively secure. They achieve full security by adapting the dual system encryption methodology recently introduced by Waters and...

    Provided By University of Texas

  • White Papers // Nov 2010

    How to Leak on Key Updates

    In the continual memory leakage model, security against attackers who can repeatedly obtain leakage is achieved by periodically updating the secret key. This is an appealing model which captures a wide class of side-channel attacks, but all previous constructions in this model provide only a very minimal amount of leakage...

    Provided By University of Texas

  • White Papers // Mar 2011

    Deterministic Public-Key Encryption Revisited

    One of the maxims of modern cryptography is that "Randomness is needed for good encryption," meaning the encryption algorithm of a scheme that should be randomized. Such an encryption scheme is called probabilistic. Indeed, probabilistic encryption is necessary to meet the fundamental notion of semantic security introduced by Goldwasser and...

    Provided By University of Texas