University of Toledo

Displaying 1-40 of 111 results

  • White Papers // Jun 2014

    Sampling-Based Approaches to Accelerate Network-on-Chip Simulation

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, Network-on-Chip (NoC) and memory controllers. Simulators are growing in complexity to reflect these system components. However, many full-system simulators fail to utilize the underlying hardware resources such as multiple cores; consequently, simulation...

    Provided By University of Toledo

  • White Papers // May 2014

    Evaluating the Memory System Behavior of Smartphone Workloads

    Modern Smartphone's comprise several processing and input/output units that communicate mostly through main memory. As a result, memory represents a critical performance bottleneck for Smartphone's. This paper introduces a set of emerging workloads for Smartphone's and characterizes the performance of several memory controller policies and address mapping schemes for those...

    Provided By University of Toledo

  • White Papers // Apr 2014

    DualTable: A Hybrid Storage Model for Update Optimization in Hive

    Hive is the most mature and prevalent data warehouse tool providing SQL-like interface in the Hadoop ecosystem. It is successfully used in many Internet companies and shows its value for big data processing in traditional industries. However, enterprise big data processing systems as in Smart Grid applications usually come with...

    Provided By University of Toledo

  • White Papers // Apr 2014

    Energy Compensated Cloud Assistance in Mobile Cloud Computing

    The authors consider the scenario where a mobile device requires assistance from nearby devices to forward its computational tasks to a cloud server. They incentivize cooperation by allowing helper devices to conserve computational energy by offloading their own tasks to the source device's cloud, as compensation for the communication energy...

    Provided By University of Toledo

  • White Papers // Feb 2014

    BigKernel - High Performance CPU-GPU Communication Pipelining for Big Data-style Applications

    GPUs offer an order of magnitude higher compute power and memory bandwidth than CPUs. GPUs therefore might appear to be well suited to accelerate computations that operate on voluminous data sets in independent ways; e.g., for transformations, filtering, aggregation, partitioning or other \"Big data\" style processing. Yet experience indicates that...

    Provided By University of Toledo

  • White Papers // Feb 2014

    Accelerating Network-on-Chip Simulation Via Sampling

    Architectural complexity continues to grow as the authors consider the large design space of multiple cores, cache architectures, networks-on-chip and memory controllers for emerging architectures. Simulators are growing in complexity to reflect each of these system components. However, many full-system simulators fail to take advantage of the underlying hardware resources...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Standardizing the Performance Assessment of Reconfigurable Processor Architectures

    Comparing and evaluating the performance of reconfigurable processors is a difficult task. For this research field to progress in a more meaningful and scientific fashion, there needs to be a method of measuring progress between different reconfigurable architectures as well as with respect to traditional computing technologies. This paper presents...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Simplifying the Integration of Processing Elements in Computing Systems Using a Programmable Controller

    As technology sizes decrease and die area increases, designers are creating increasingly complex computing systems using FPGAs. To reduce design time for new products, the reuse of previously designed Intellectual Property (IP) cores is essential. However, since no universally accepted inter-face standards exist for IP cores, there is often a...

    Provided By University of Toledo

  • White Papers // Jan 2014

    Designing an FPGA SoC Using a Standardized IP Block Interface

    Designing System-on-Chips (SoCs) is becoming increasingly popular as die sizes increase and technology sizes decrease. The complexity of integrating different types of Processing Elements (PEs) that use different communication protocols and interfaces complicates the system-level design methodology. Recent paper provided a proof of concept demonstrating how a controller could be...

    Provided By University of Toledo

  • White Papers // Jan 2014

    An Adaptive OpenMP Loop Scheduler for Hyperthreaded SMPs

    Hyper-Threaded (HT) and Simultaneous Multi-Threaded (SMT) processors are now available in commodity workstations and servers. This technology is designed to increase throughput by executing multiple concurrent threads on a single physical processor. These multiple threads share the processor's functional units and on-chip memory hierarchy in an attempt to make better...

    Provided By University of Toledo

  • White Papers // Nov 2013

    MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom

    The authors study a multi-antenna broadcast channel with two legitimate receivers and an external eavesdropper. They assume that the channel matrix of the eavesdropper is unknown to the legitimate terminals but satisfies a maximum rank constraint. As their main result they characterize the associated secrecy degrees of freedom for the...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo

  • White Papers // Sep 2013

    Enabling SDN Applications on Software-Defined Infrastructure

    In this paper the authors discuss how to enable Software-Defined Networking (SDN) applications on Software-Defined Infrastructure (SDI) which is an approach for integrated control and management of converged computing and networking resources. Current separated resource management for computing or networking resources is not sufficient for addressing applications and multimedia services...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Identity Access Management for Multi-tier Cloud Infrastructures

    In this paper the authors present a novel architecture to manage Identity Access Management (IAM) in a multi-tier cloud infrastructure, in which most services are supported by massive-scale data centers over the Internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tires. In this...

    Provided By University of Toledo

  • White Papers // Aug 2013

    Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

    The authors study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. They design a multi-resource allocation mechanism, called DRFH that generalizes the...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Revenue Maximization With Dynamic Auctions in IaaS Cloud Markets

    Cloud service pricing plays a pivotal role towards the success of cloud computing. Existing pricing schemes, however, either provide no service guarantees (e.g., Spot Instances in Amazon EC2), or use static on-demand pricing in which the price cannot respond quickly to market dynamics (e.g., On-demand Instances in Amazon EC2). To...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Efficient Implementation of Security Applications in OpenFlow Controller with FleXam

    Current OpenFlow specifications provide limited access to packet-level information such as packet content, making it very inefficient, if not impossible, to deploy security and monitoring applications as controller applications. In this paper, the authors propose FleXam, a flexible sampling extension for OpenFlow designed to provide access to packet level information...

    Provided By University of Toledo

  • White Papers // Jul 2013

    DistCL: A Framework for the Distributed Execution of OpenCL Kernels

    GPUs are used to speed up many scientific computations; however, to use several networked GPUs concurrently, the programmer must explicitly partition work and transmit data between devices. The authors propose DistCL, a novel framework that distributes the execution of OpenCL kernels across a GPU cluster. DistCL makes multiple distributed compute...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Certificateless Public Auditing for Data Integrity in the Cloud

    Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Toward Scalable Transaction Processing

    Designing scalable transaction processing systems on modern multicore hardware has been a challenge for almost a decade. The typical characteristics of transaction processing workloads lead to a high degree of unbounded communication on multicores for conventional system designs. In this paper, the authors initially present a systematic way of eliminating...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Large-Scale Malware Classification Using Random Projections and Neural Networks

    Automatically generated malware is a significant problem for computer users. Analysts are able to manually investigate a small number of unknown files, but the best large-scale defense for detecting malware is automated malware classification. Malware classifiers often use sparse binary features, and the number of potential features can be on...

    Provided By University of Toledo

  • White Papers // May 2013

    Designing Secure Socio-Technical Systems with STS-ml

    A Socio-Technical System (STS) is interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous paper, they have proposed STS-ml, a security requirements modelling language for the design of secure STSs. STS-ml represents security requirements as constraints...

    Provided By University of Toledo

  • White Papers // May 2013

    To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds

    Infrastructure-as-a-Service (IaaS) clouds offer diverse instance purchasing options. A user can either run instances on demand or pay only for what it uses, or it can prepay to reserve instances for a long period, during which a usage discount is entitled. An important problem facing a user is how these...

    Provided By University of Toledo

  • White Papers // May 2013

    Artificial-Noise Alignment for Secure Multicast using Multiple Antennas

    The authors propose an artificial-noise alignment scheme for multicasting a common-confidential message to a group of legitimate receivers. Their scheme transmits a superposition of information and noise symbols. At each legitimate receiver, the noise symbols are aligned in such a way that the information symbols can be decoded with high...

    Provided By University of Toledo

  • White Papers // May 2013

    BIM-Tool: Modeling and Reasoning Support for Strategic Business Models

    The BIM-Tool provides graphical modeling and analysis support for the Business Intelligence Model (BIM). BIM-Tool is a standalone application built on top of Eclipse. The tool supports two kinds of automated reasoning: bottom-up \"What-if\" analysis: given input labels about some elements of a BIM model (for example, success/failure for leaf...

    Provided By University of Toledo

  • White Papers // May 2013

    Multi-Resource Generalized Processor Sharing for Packet Processing

    Middleboxes have found widespread adoption in today's networks. They perform a variety of network functions such as WAN optimization, intrusion detection, and network-level firewalls. Processing packets to serve these functions often require multiple middlebox resources, e.g., CPU and link bandwidth. Furthermore, different packet traffic flows may consume significantly different amounts...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Anticipatory Buffer Control and Resource Allocation for Wireless Video Streaming

    In this paper, the authors describe a new approach for allocating resources to video streaming traffic. Assuming that the future channel state can be predicted for a certain time, they minimize the fraction of the bandwidth consumed for smooth streaming by jointly allocating wireless channel resources and play-out buffer size....

    Provided By University of Toledo

  • White Papers // Apr 2013

    On Fairness-Efficiency Tradeoffs for Multi-Resource Packet Processing

    Middleboxes are widely deployed in today's datacenter networks. They perform a variety of network functions, each requiring multiple hardware resources, such as CPU cycles and link bandwidth. Depending on the functions they go through, packet processing of different traffic flows may consume a vastly different amount of hardware resources. An...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Distributed Ranked Data Dissemination in Social Networks

    The amount of content served on social networks can overwhelm users, who must sift through the data for relevant information. To facilitate users, the authors develop and implement dissemination of ranked data in social networks. Although top-k computation can be performed centrally at the user, the size of the event...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Adapting to Uncertain and Evolving Enterprise Requirements

    Information systems today are expected to function in an increasingly dynamic world with many uncertainties. System development is seldom a linear progression from well defined, fully-specified requirements to finished products that fully meet the initial requirements. More likely, there are ongoing cycles of exploration, design and implementation, taking into account...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Secure and Efficient Context Data Collection Using Content-Centric Networking

    Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility,...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Software-Defined Infrastructure and the Future Central Office

    In this paper the authors discuss the role of virtualization and Software-Defined Infrastructure (SDI) in the design of future application platforms, and in particular the future Central Office (CO). A multi-tier computing cloud is presented in which resources in the smart edge of the network play a crucial role in...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Rethinking Definitions of Security for Session Key Agreement

    The authors consider Session Key Agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers that take no session ID as input, and output only a session key. Despite much work on SKA, they argue that there is no good definition of security for this (very natural) protocol...

    Provided By University of Toledo

  • White Papers // Feb 2013

    Performance Analysis of Broadcasting Algorithms on the Intel Single-Chip Cloud Computer

    Efficient broadcasting is essential for good performance on distributed or multiprocessor systems. Broadcasts are commonly used to implement message passing synchronization primitives, such as barriers, and also appear frequently in the set up stage of scientific applications. The Intel Single-Chip Cloud computer (SCC), an experimental processor, uses synchronous message passing...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Implementation Issues for High-Bandwidth Field-Programmable Analog Arrays

    This paper is a tutorial introduction to field-programmable analog arrays, as well as a review of existing field-programmable analog array architectures, of both educational and industrial origin. Circuit issues relevant to the development of high-bandwidth FPAAs are presented. A current conveyor-based architecture, which promises to achieve video bandwidths, is described....

    Provided By University of Toledo

  • White Papers // Nov 2012

    Dynamic Cloud Resource Reservation Via Cloud Brokerage

    Infrastructure-as-a-Service clouds offer diverse pricing options, including on-demand and reserved instances with various discounts to attract different cloud users. A practical problem facing cloud users is how to minimize their costs by choosing among different pricing options based on their own demands. In this paper, the authors propose a new...

    Provided By University of Toledo

  • White Papers // Jul 2012

    Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks

    Groups are becoming one of the most compelling features in both online social networks and Twitter-like micro-blogging services. A stranger outside of an existing group may have the need to find out more information about attributes of current members in the group, in order to make a decision to join....

    Provided By University of Toledo

  • White Papers // Oct 2012

    Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud

    The authors present Anchor, a general resource management architecture that uses the stable matching framework to decouple policies from mechanisms when mapping virtual machines to physical servers. In Anchor, clients and operators are able to express a variety of distinct resource management policies as they deem fit, and these policies...

    Provided By University of Toledo

  • White Papers // Apr 2012

    Practical Scrubbing: Getting to the Bad Sector at the Right Time

    Latent Sector Errors (LSEs) are a common hard disk failure mode, where disk sectors become inaccessible while the rest of the disk remains unaffected. To protect against LSEs, commercial storage systems use scrubbers: background processes verifying disk data. The efficiency of different scrubbing algorithms in detecting LSEs has been studied...

    Provided By University of Toledo

  • White Papers // Sep 2012

    Functional Encryption: New Perspectives and Lower Bounds

    Functional encryption is a new paradigm for public-key encryption that enables fine-grained control of access to encrypted data. It extends several previous notions, most notably identity-based encryption and provides, for instance, the ability to generate and release secret keys associated with a keyword that can decrypt only those documents that...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Paradigm-Based Adaptive Provisioning in Virtualized Data Centers

    Virtualized data centers host multiple applications with distinct objectives in a shared infrastructure. Accommodating several dynamic applications in virtual data centers is a challenging task for cloud providers. Current provisioning solutions focus on a limited set of objectives that may not be suited for the increasing number of applications deployed...

    Provided By University of Toledo

  • White Papers // Dec 2008

    A Matrix-Less Model for Tracing Software Requirements to Source Code

    Requirements traceability, regardless of the process used to produce a software system (e.g., traditional or agile development process), is a highly desirable quality attribute for the resulting software product. Building a Requirements Traceability Matrix (RTM) for a software product, which is the basis for existing approaches to achieving requirements traceability,...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Adaptive Partitioned Interference Management in Cellular Networks

    This paper proposes an adaptive and scalable approach to resource allocation in cellular networks. The authors introduce an adaptive strategy to form clusters of coordinating base stations, referred to as Scheduling Cells (SCs), based on the local traffic demand. A system parameter is proposed which adjusts the level of coordination...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Joint Request Mapping and Response Routing for Geo-distributed Cloud Services

    Many cloud services are running on geographically distributed datacenters for better reliability and performance. The authors consider the emerging problem of joint request mapping and response routing with distributed datacenters in this paper. They formulate the problem as a general workload management optimization. A utility function is used to capture...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Core-Selecting Combinatorial Auction Design for Secondary Spectrum Markets

    In a secondary spectrum market, the utility of a secondary user often depends on not only whether it wins, but also which channels it wins. Combinatorial auctions are a natural fit here to allow secondary users to bid for combinations of channels. In this paper, the VCG mechanism constitutes a...

    Provided By University of Toledo

  • White Papers // Apr 2013

    Anticipatory Buffer Control and Resource Allocation for Wireless Video Streaming

    In this paper, the authors describe a new approach for allocating resources to video streaming traffic. Assuming that the future channel state can be predicted for a certain time, they minimize the fraction of the bandwidth consumed for smooth streaming by jointly allocating wireless channel resources and play-out buffer size....

    Provided By University of Toledo

  • White Papers // Oct 2009

    Revenue Management in the Presence of Self- Similar Alpha-Stable Distributions

    The authors consider the problem of maximizing network revenue from the perspective of bandwidth allocation and route selection. The objective is to perform offline maximization of revenue from served demands in the context of self-similar (long range dependent) traffic. They use an alpha-stable distribution for the aggregate demand volume to...

    Provided By University of Toledo

  • White Papers // Apr 2013

    On Fairness-Efficiency Tradeoffs for Multi-Resource Packet Processing

    Middleboxes are widely deployed in today's datacenter networks. They perform a variety of network functions, each requiring multiple hardware resources, such as CPU cycles and link bandwidth. Depending on the functions they go through, packet processing of different traffic flows may consume a vastly different amount of hardware resources. An...

    Provided By University of Toledo

  • White Papers // May 2013

    Multi-Resource Generalized Processor Sharing for Packet Processing

    Middleboxes have found widespread adoption in today's networks. They perform a variety of network functions such as WAN optimization, intrusion detection, and network-level firewalls. Processing packets to serve these functions often require multiple middlebox resources, e.g., CPU and link bandwidth. Furthermore, different packet traffic flows may consume significantly different amounts...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Dynamic Cloud Resource Reservation Via Cloud Brokerage

    Infrastructure-as-a-Service clouds offer diverse pricing options, including on-demand and reserved instances with various discounts to attract different cloud users. A practical problem facing cloud users is how to minimize their costs by choosing among different pricing options based on their own demands. In this paper, the authors propose a new...

    Provided By University of Toledo

  • White Papers // May 2013

    To Reserve or Not to Reserve: Optimal Online Multi-Instance Acquisition in IaaS Clouds

    Infrastructure-as-a-Service (IaaS) clouds offer diverse instance purchasing options. A user can either run instances on demand or pay only for what it uses, or it can prepay to reserve instances for a long period, during which a usage discount is entitled. An important problem facing a user is how these...

    Provided By University of Toledo

  • White Papers // Jan 2010

    On the MISO Compound Wiretap Channel

    The authors study the secure Degrees Of Freedom (d.o.f) of the MISO compound wiretap channel. The transmitter has M antennas, whereas the legitimate receiver and the eavesdropper each have one antenna and the channel vectors take one of finitely many values. If the number of states of either the legitimate...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Optimization of Wireless Access Point Placement in Realistic Urban Heterogeneous Networks

    The placement of the Access Points (APs) has a significant impact on the wireless system performance, especially for irregular heterogeneous networks with hierarchical APs such as macro/micro base-stations, pico-stations, and femto-stations. Traditional system modeling and optimization are based on the regular 2D hexagonal cellular topology and a set of predefined...

    Provided By University of Toledo

  • White Papers // Nov 2012

    Interference Mitigation Via Power Control Under the One-Power-Zone Constraint

    Complexity and hardware constraints are two essential considerations in applying interference mitigation techniques to practical wireless systems. This paper considers a practical wireless backhaul network composed of several Access Nodes (AN), each serving several Remote Terminals (RT), and where the transmit frame structure at each AN is comprised of multiple...

    Provided By University of Toledo

  • White Papers // Apr 2012

    Feedback-Efficient Agile Scheduling-Beamforming for Network MIMO OFDMA Systems With Realistic Channel Models

    The acquisition of channel state information is a pressing issue in the implementation of network Multi-Input Multi-Output (MIMO) systems, where the base-stations coordinate across multiple cells for inter-cell interference mitigation. This paper proposes a two-stage channel quantization and feedback mechanism named Agile Scheduling-Beamforming (ASB) for the downlink network MIMO system...

    Provided By University of Toledo

  • White Papers // Dec 2011

    On Noisy Network Coding for a Gaussian Relay Chain Network With Correlated Noises

    Noisy network coding, which elegantly combines the conventional compress-and-forward relaying strategy and ideas from network coding, has recently drawn much attention for its simplicity and optimality in achieving to within constant gap of the capacity of the multisource multicast Gaussian network. The constant-gap result, however, applies only to Gaussian relay...

    Provided By University of Toledo

  • White Papers // Mar 2009

    Pushing the Envelope: Extreme Network Coding on the GPU

    While it is well known that network coding achieves optimal flow rates in multicast sessions, its potential for practical use has remained to be a question, due to its high computational complexity. With GPU computing gaining momentum as a result of increased hardware capabilities and improved programmability, the authors show...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Toward Scalable Transaction Processing

    Designing scalable transaction processing systems on modern multicore hardware has been a challenge for almost a decade. The typical characteristics of transaction processing workloads lead to a high degree of unbounded communication on multicores for conventional system designs. In this paper, the authors initially present a systematic way of eliminating...

    Provided By University of Toledo

  • White Papers // Nov 2012

    SLICC: Self-Assembly of Instruction Cache Collectives for OLTP Workloads

    Online Transaction Processing (OLTP) is at the core of many data center applications. OLTP workloads are known to have large instruction footprints that foil existing L1 instruction caches resulting in poor overall performance. Prefetching can reduce the impact of such instruction cache miss stalls; however, state-of-the-art solutions require large dedicated...

    Provided By University of Toledo

  • White Papers // Aug 2009

    On Metrics for Error Correction in Network Coding

    The problem of error correction in both coherent and non-coherent network coding is considered under an adversarial model. For coherent network coding, where knowledge of the network topology and network code is assumed at the source and destination nodes, the error correction capability of an (outer) code is succinctly described...

    Provided By University of Toledo

  • White Papers // Jan 2011

    Network Coding for Content Distribution and Multimedia Streaming in Peer-to-Peer Networks

    Peer-To-Peer (P2P) networks have been one of the most promising platforms to realize the potential of network coding, since end hosts (referred to as peers) at the edge of the Internet have abundant computational resources with modern processors. In this paper, the authors take a journey into the application world...

    Provided By University of Toledo

  • White Papers // Jan 2013

    Implementation Issues for High-Bandwidth Field-Programmable Analog Arrays

    This paper is a tutorial introduction to field-programmable analog arrays, as well as a review of existing field-programmable analog array architectures, of both educational and industrial origin. Circuit issues relevant to the development of high-bandwidth FPAAs are presented. A current conveyor-based architecture, which promises to achieve video bandwidths, is described....

    Provided By University of Toledo

  • White Papers // Aug 2011

    Enhancing Application Robustness in Cloud Data Centers

    The authors propose OX, a runtime system that uses application-level availability constraints and application topologies discovered on the y to enhance resilience to infrastructure anomalies for cloud applications. OX allows application owners to specify groups of highly available virtual machines, following component roles and replication semantics. To discover application topologies,...

    Provided By University of Toledo

  • White Papers // Mar 2008

    Formal Analysis of BPMN Via a Translation Into COWS

    A challenging question for organizations is how to create strong, yet flexible, business processes. Business Process Management is emerging as a means for understanding the activities that organizations can perform to optimize their business processes or to adapt them to new organizational needs .A translation of the Business Process Modeling...

    Provided By University of Toledo

  • White Papers // Jul 2011

    Security Risk Management by Qualitative Vulnerability Analysis

    Security risk assessment in the requirements phase is challenging because probability and damage of attacks are not always numerically measurable or available in the early phases of development. Selecting proper security solutions is also problematic because mitigating impacts and side-effects of solutions are not often quantifiable either. In the early...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Efficient Implementation of Security Applications in OpenFlow Controller with FleXam

    Current OpenFlow specifications provide limited access to packet-level information such as packet content, making it very inefficient, if not impossible, to deploy security and monitoring applications as controller applications. In this paper, the authors propose FleXam, a flexible sampling extension for OpenFlow designed to provide access to packet level information...

    Provided By University of Toledo

  • White Papers // Jun 2013

    Large-Scale Malware Classification Using Random Projections and Neural Networks

    Automatically generated malware is a significant problem for computer users. Analysts are able to manually investigate a small number of unknown files, but the best large-scale defense for detecting malware is automated malware classification. Malware classifiers often use sparse binary features, and the number of potential features can be on...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Revenue Maximization With Dynamic Auctions in IaaS Cloud Markets

    Cloud service pricing plays a pivotal role towards the success of cloud computing. Existing pricing schemes, however, either provide no service guarantees (e.g., Spot Instances in Amazon EC2), or use static on-demand pricing in which the price cannot respond quickly to market dynamics (e.g., On-demand Instances in Amazon EC2). To...

    Provided By University of Toledo

  • White Papers // Jul 2013

    Pipelined Regeneration With Regenerating Codes for Distributed Storage Systems

    Distributed storage systems store a substantial amount of data and maintain data integrity by storing redundancy in a large number of storage nodes. When storage nodes fail, the lost data should be regenerated on replacement nodes. Regenerating codes minimize the volume of network traffic brought by the regeneration process. However,...

    Provided By University of Toledo

  • White Papers // Sep 2009

    A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements elicitation and analysis centered on vulnerabilities. The framework offers modeling and analysis facilities...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Enabling SDN Applications on Software-Defined Infrastructure

    In this paper the authors discuss how to enable Software-Defined Networking (SDN) applications on Software-Defined Infrastructure (SDI) which is an approach for integrated control and management of converged computing and networking resources. Current separated resource management for computing or networking resources is not sufficient for addressing applications and multimedia services...

    Provided By University of Toledo

  • White Papers // Sep 2013

    Identity Access Management for Multi-tier Cloud Infrastructures

    In this paper the authors present a novel architecture to manage Identity Access Management (IAM) in a multi-tier cloud infrastructure, in which most services are supported by massive-scale data centers over the Internet. Multi-tier cloud infrastructure uses tier-based model from software engineering to provide resources in different tires. In this...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Secure and Efficient Context Data Collection Using Content-Centric Networking

    Context data collection is a fundamental and important process for realizing context-aware recommender or personalization systems. The existing context data collection approaches are based-on traditional TCP/IP that has several disadvantages such as lack of mobility and security. On the other hand, Content-Centric Networking (CCN) provides advantages in terms of mobility,...

    Provided By University of Toledo

  • White Papers // Mar 2013

    Software-Defined Infrastructure and the Future Central Office

    In this paper the authors discuss the role of virtualization and Software-Defined Infrastructure (SDI) in the design of future application platforms, and in particular the future Central Office (CO). A multi-tier computing cloud is presented in which resources in the smart edge of the network play a crucial role in...

    Provided By University of Toledo

  • White Papers // Sep 2009

    Development of a Virtualized Application Networking Infrastructure Node

    In this paper the authors describe the design of a Virtualized Application and Networking Infrastructure (VANI) node that can be used to facilitate network architecture experimentation. Currently the VANI nodes provide four classes of physical resources: processing, reconfigurable hardware, storage and interconnection fabric, but the set of sharable resources can...

    Provided By University of Toledo

  • White Papers // Oct 2013

    A Study of Pricing for Cloud Resources

    The authors present a study of pricing cloud resources in this position paper. Their objective is to explore and understand the interplay between economics and systems designs proposed by recent research. They develop a general model that captures the resource needs of various applications and usage pricing of cloud computing....

    Provided By University of Toledo