Wayne State University

Displaying 1-40 of 40 results

  • White Papers // Apr 2012

    NetEye: A User-Centered Wireless Sensor Network Testbed for High-Fidelity, Robust Experimentation

    Experimentation infrastructures for Wireless Sensor Networks (WSNs) have been widely adopted over the past decade for hi-fidelity validation and rapid prototyping of applications and for discovering and modeling phenomena that have led to improvements in analysis and simulation capabilities. Nonetheless, the community is still looking for more heterogeneous WSN testbeds...

    Provided By Wayne State University

  • White Papers // Jan 2012

    Fine-Grained Power Management Using Process-Level Profiling

    Low-power hardware design itself is not enough to solve the power problem of computer systems. Operating system level power saving strategies have been proved as effective complement to hardware methods. However, most of these strategies work on system level, and some of them may severely influence performance. In order to...

    Provided By Wayne State University

  • White Papers // Oct 2011

    URL: A Unified Reinforcement Learning Approach for Autonomic Cloud Management

    Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides the capacity needed to meet service demands. In this paper, the authors present a unified reinforcement learning approach,...

    Provided By Wayne State University

  • White Papers // Sep 2011

    Simple Regenerating Codes: Network Coding for Cloud Storage

    Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher storage efficiency for the same availability. One main challenge in the design of such codes is the exact repair problem: if a node storing encoded information fails, in order to maintain the same level of...

    Provided By Wayne State University

  • White Papers // Aug 2011

    Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Jul 2011

    The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling

    Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling....

    Provided By Wayne State University

  • White Papers // Jul 2011

    LENS: Resource Specification for Wireless Sensor Network Experimentation Infrastructures

    As a first step towards predictable, repeatable WSN experimentation, the authors propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit...

    Provided By Wayne State University

  • White Papers // Jul 2011

    Experimental Analysis of Link Estimation Methods in Low Power Wireless Networks

    Wireless sensor networks are envisioned to be an integral part of cyber-physical systems, yet wireless networks are inherently dynamic and come with varieties of uncertainties. One such uncertainty is wireless communication itself which assumes complex spatial and temporal dynamics. For dependable and predictable performance, therefore, link estimation has become a...

    Provided By Wayne State University

  • White Papers // Apr 2011

    Mechanism Design for Stochastic Virtual Resource Allocation in Non-Cooperative Cloud Systems

    Currently, virtualization technology has been widely adopted by cloud service providers to provide flexible and cost-effective resource sharing among users. On cloud platforms, computing resources are allocated on-demand dynamically and the application hosted on a Virtual Machine(VM) usually has the illusion of complete control of resources. Thus, a selfish VM...

    Provided By Wayne State University

  • White Papers // Apr 2011

    OPQL: A First OPM-Level Query Language for Scientific Workflow Provenance

    Provenance, which is one kind of metadata that captures the derivation history of a data product, including its original data sources, intermediate products, and the steps that were applied to produce it, has become increasingly important in services computing and scientific workflows to validate, interpret, and analyze the result of...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Automatic Performance Debugging of SPMD-Style Parallel Programs

    Automatic performance debugging of parallel applications includes two main steps: locating performance bottlenecks and uncovering their root causes for performance optimization. Previous work fails to resolve this challenging issue in two ways: first, several previous efforts automate locating bottlenecks, but present results in a confined way that only identifies performance...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Towards Predictable Real-Time Routing for Wireless Networked Sensing and Control

    Real-time routing is a basic element of closed-loop, real-time sensing and control, but it is very challenging due to dynamic, uncertain link/path delay. A basis of real-time routing is determining probabilistically guaranteed path delays, but this problem is NP-hard and it may well have to be solved by resource-constrained devices...

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Distributed Self-Learning Approach for Elastic Provisioning of Virtualized Cloud Resources

    Although cloud computing has gained sufficient popularity recently, there are still some key impediments to enterprise adoption. Cloud management is one of the top challenges. The ability of on-the-fly partitioning hardware resources into Virtual Machine (VM) instances facilitates elastic computing environment to users. But the extra layer of resource virtualization...

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Hybrid Reinforcement Learning Approach for Coordinated Configuration of Virtual Machines and Appliances

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Jan 2011

    State Observability and Observers of Linear-Time-Invariant Systems Under Irregular Sampling and Sensor Limitations

    State observability and observer designs are investigated for linear-time-invariant systems in continuous time when the outputs are measured only at a set of irregular sampling time sequences. The problem is primarily motivated by systems with limited sensor information in which sensor switching generates irregular sampling sequences. State observability may be...

    Provided By Wayne State University

  • White Papers // Jan 2011

    Autonomic Management of Virtualized Resources in Cloud Computing

    The last five years have witnessed a rapid growth of cloud computing in business, governmental and educational IT deployment. Hosting services in a cloud gradually supersedes traditional IT products in both small and large companies. It enables small businesses to have on-demand access to resources that would not likely be...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Efficient Bidding for Virtual Machine Instances in Clouds

    Combinatorial auctions are efficient mechanisms for allocating Virtual Machine (VM) instances to cloud computing users. Despite the fact that, in general, these mechanisms lead to higher revenues than the currently employed fixed-price mechanisms, the current cloud computing providers do not employ them to allocate their resources. One of the main...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Spherical Representation and Polyhedron Routing for Load Balancing in Wireless Sensor Networks

    In this paper, the authors address the problem of scalable and load balanced routing for wireless sensor networks. Motivated by the analog of the continuous setting that geodesic routing on a sphere gives perfect load balancing, they embed sensor nodes on a convex polyhedron in 3D and use greedy routing...

    Provided By Wayne State University

  • White Papers // Jun 2010

    Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Since multicasting is the most efficient method of group communication,...

    Provided By Wayne State University

  • White Papers // Mar 2010

    Guide To Hiring Foreign Employees

    Most non-immigrants coming to work, teach, perform research, or other related duties at WSU will need to be sponsored by a WSU Department and have their non-immigrant classification processed through the Office of International Students and Scholars. This guide will help one as one make the hiring decisions. The authors...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Link Asymmetry and One-Way Estimation in Wireless Sensor Networks

    Link asymmetry is one of the characteristic challenges that wireless sensor networks pose in the design of network protocols. The authors observe, based on testbed experiments that a substantial percentage of links are asymmetric, many are even unidirectional. They also find that the reliability of synchronous acknowledgments is considerably higher...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Measuring the Performance of Adaptive Wormhole Routing

    Adaptive routing is widely regarded as a promising approach to improving interconnection network performance. Many designers of adaptive routing algorithms have used synthetic communication patterns, such as uniform and transpose traffic, to compare the performance of various adaptive routing algorithms with each other and with oblivious routing. These comparisons have...

    Provided By Wayne State University

  • White Papers // Dec 2009

    TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks

    Multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in...

    Provided By Wayne State University

  • White Papers // Aug 2009

    Experimental Characterization of DSRC Signal Strength Drops

    Dedicated Short Range Communication (DSRC) is gaining momentum as the protocol of choice for wireless vehicle safety applications by automotive Original Equipment Manufacturers (OEMs) and road operators. DSRC is a low latency and reliable Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication protocol. A wide range of its applications have been conceptualized...

    Provided By Wayne State University

  • White Papers // Jul 2009

    Utility Analysis for Internet-Oriented Server Consolidation in VM-Based Data Centers

    Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's Internet-service-oriented enterprise data centers. How much power and how many servers for the underlying physical infrastructure are saved via server consolidation in VM-based data centers is of...

    Provided By Wayne State University

  • White Papers // May 2009

    A Game Theoretic Investigation of Deception in Network Security

    The authors perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. They model...

    Provided By Wayne State University

  • White Papers // May 2009

    A Distributed Algorithm for Web Content Replication

    Web caching and replication techniques increase accessibility of Web contents and reduce Internet bandwidth requirements. In this paper, the authors are considering the replica placement problem in a distributed replication group. The replication group consists of servers dedicating certain amount of memory for replicating objects. The replica placement problem is...

    Provided By Wayne State University

  • White Papers // Apr 2009

    Temporal Data Mining for Root-Cause Analysis of Machine Faults in Automotive Assembly Lines

    Engine assembly is a complex and heavily automated distributed-control process, with large amounts of faults data logged everyday. The authors describe an application of temporal data mining for analyzing fault logs in an engine assembly plant. Frequent episode discovery framework is a model-free method that can be used to deduce...

    Provided By Wayne State University

  • White Papers // Apr 2009

    An Efficient XOR-Scheduling Algorithm for Erasure Codes Encoding

    In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data when components fail. Erasure codes can however impose significant performance overhead in two core operations: Encoding, where coding information is calculated...

    Provided By Wayne State University

  • White Papers // Mar 2009

    A Reinforcement Learning Approach to Online Web System Auto-Configuration

    In a web system, configuration is crucial to the performance and service availability. It is a challenge, not only because of the dynamics of Internet traffic, but also the dynamic virtual machine environment the system tends to be run on. In this paper, the authors propose a reinforcement learning approach...

    Provided By Wayne State University

  • White Papers // Mar 2009

    On the Convergence and Stability of Data-Driven Link Estimation and Routing in Sensor Networks

    The wireless network community has become increasingly aware of the benefits of data-driven link estimation and routing as compared with beacon-based approaches, but the issue of Biased Link Sampling (BLS) has not been well studied even though it affects routing convergence in the presence of network and environment dynamics. Focusing...

    Provided By Wayne State University

  • White Papers // Feb 2009

    Ontology-Based Annotation of Multimedia Language Data for the Semantic Web

    There is an increasing interest and effort in preserving and documenting endangered languages. Language data are valuable only when they are well-cataloged, indexed and searchable. Many language data, particularly those of lesser-spoken languages, are collected as audio and video recordings. While multimedia data provide more channels and dimensions to describe...

    Provided By Wayne State University

  • White Papers // Jan 2009

    Role-Based Deceptive Detection and Filtering in WSNs

    With more and more real applications of WSNs have been deployed, which are in charge of either monitoring parameters or event detection, the authors envision that the success of the WSNs is decided by the quality of the collected data. Further more, the quality of the collected data is mainly...

    Provided By Wayne State University

  • White Papers // Dec 2008

    Cross-Layer Design of Wireless Networking for Parallel Loading of Access Points (PLAP)

    This paper processes a new cross-layer framework design for Parallel Download and Upload (PDU). This technique has been called as Parallel Loading of Access Points (PLAP). The authors have shown here the PLAP for Access Point (AP) and integrate Ad-hoc Procedure with AP to support the parallel download or upload...

    Provided By Wayne State University

  • White Papers // Nov 2008

    Adaptive Secure Access to Remote Services

    Since the inception of service-oriented computing paradigm, the authors have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RPC-based services to SOAP-based Web services. Likewise, the proliferation of mobile devices has enabled the remote "On the move" access of these services from anywhere...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Accelerating the HMMER Sequence Analysis Suite Using Conventional Processors

    Due to the ever-increasing size of sequence databases it has become clear that faster techniques must be employed to effectively perform biological sequence analysis in a reasonable amount of time. Exploiting the inherent parallelism between sequences is a common strategy. In this paper the authors enhance both the fine-grained and...

    Provided By Wayne State University

  • White Papers // Oct 2008

    An Adaptive Heterogeneous Software DSM

    This paper presents a mechanism to run parallel applications in heterogeneous, dynamic environments while maintaining thread synchrony. A heterogeneous software DSM is used to provide synchronization constructs similar to Pthreads, while providing for individual thread mobility. An asymmetric data conversion scheme is adopted to restore thread states among different computers...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Principles of Network Monitoring

    Efficient and cost-effective measurement of network characteristics is pivotal for distributed systems deployed on the Internet. The network characteristics are utilized by Internet-based distributed systems to provide better service to the user and enhance performance for the application. This paper provides a detailed analysis of existing techniques for the measurement...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Building Self-Adaptive Cyber Physical Systems Using Unreliable Components

    Modern automobiles, featuring increased convenience, safety, and energy savings, have become more and more reliant on the outcomes of the IT industry. Existing services such as vehicle tracking, navigation and emergency notification envision a promising future of more powerful computing-assisted automobile systems. Some examples include remote vehicle controllers, short range...

    Provided By Wayne State University

  • White Papers // Sep 2008

    Secure Scientific Workflow Provenance Querying With Security Views

    In this work, the authors studied the problem of protecting scientific workflow provenance, including both data products and their provenance. First, this paper formalized scientific workflow provenance that builds the basis for querying and access control. Second, this paper proposed a security specification mechanism for provenance at various granularity levels...

    Provided By Wayne State University

  • White Papers // Oct 2011

    URL: A Unified Reinforcement Learning Approach for Autonomic Cloud Management

    Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides the capacity needed to meet service demands. In this paper, the authors present a unified reinforcement learning approach,...

    Provided By Wayne State University

  • White Papers // Mar 2009

    A Reinforcement Learning Approach to Online Web System Auto-Configuration

    In a web system, configuration is crucial to the performance and service availability. It is a challenge, not only because of the dynamics of Internet traffic, but also the dynamic virtual machine environment the system tends to be run on. In this paper, the authors propose a reinforcement learning approach...

    Provided By Wayne State University

  • White Papers // Jan 2011

    State Observability and Observers of Linear-Time-Invariant Systems Under Irregular Sampling and Sensor Limitations

    State observability and observer designs are investigated for linear-time-invariant systems in continuous time when the outputs are measured only at a set of irregular sampling time sequences. The problem is primarily motivated by systems with limited sensor information in which sensor switching generates irregular sampling sequences. State observability may be...

    Provided By Wayne State University

  • White Papers // Aug 2011

    Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Distributed Self-Learning Approach for Elastic Provisioning of Virtualized Cloud Resources

    Although cloud computing has gained sufficient popularity recently, there are still some key impediments to enterprise adoption. Cloud management is one of the top challenges. The ability of on-the-fly partitioning hardware resources into Virtual Machine (VM) instances facilitates elastic computing environment to users. But the extra layer of resource virtualization...

    Provided By Wayne State University

  • White Papers // Apr 2011

    OPQL: A First OPM-Level Query Language for Scientific Workflow Provenance

    Provenance, which is one kind of metadata that captures the derivation history of a data product, including its original data sources, intermediate products, and the steps that were applied to produce it, has become increasingly important in services computing and scientific workflows to validate, interpret, and analyze the result of...

    Provided By Wayne State University

  • White Papers // Dec 2009

    TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks

    Multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Efficient Bidding for Virtual Machine Instances in Clouds

    Combinatorial auctions are efficient mechanisms for allocating Virtual Machine (VM) instances to cloud computing users. Despite the fact that, in general, these mechanisms lead to higher revenues than the currently employed fixed-price mechanisms, the current cloud computing providers do not employ them to allocate their resources. One of the main...

    Provided By Wayne State University

  • White Papers // Jul 2011

    Experimental Analysis of Link Estimation Methods in Low Power Wireless Networks

    Wireless sensor networks are envisioned to be an integral part of cyber-physical systems, yet wireless networks are inherently dynamic and come with varieties of uncertainties. One such uncertainty is wireless communication itself which assumes complex spatial and temporal dynamics. For dependable and predictable performance, therefore, link estimation has become a...

    Provided By Wayne State University

  • White Papers // Mar 2009

    On the Convergence and Stability of Data-Driven Link Estimation and Routing in Sensor Networks

    The wireless network community has become increasingly aware of the benefits of data-driven link estimation and routing as compared with beacon-based approaches, but the issue of Biased Link Sampling (BLS) has not been well studied even though it affects routing convergence in the presence of network and environment dynamics. Focusing...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Link Asymmetry and One-Way Estimation in Wireless Sensor Networks

    Link asymmetry is one of the characteristic challenges that wireless sensor networks pose in the design of network protocols. The authors observe, based on testbed experiments that a substantial percentage of links are asymmetric, many are even unidirectional. They also find that the reliability of synchronous acknowledgments is considerably higher...

    Provided By Wayne State University

  • White Papers // Jul 2011

    LENS: Resource Specification for Wireless Sensor Network Experimentation Infrastructures

    As a first step towards predictable, repeatable WSN experimentation, the authors propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit...

    Provided By Wayne State University

  • White Papers // Sep 2011

    Simple Regenerating Codes: Network Coding for Cloud Storage

    Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher storage efficiency for the same availability. One main challenge in the design of such codes is the exact repair problem: if a node storing encoded information fails, in order to maintain the same level of...

    Provided By Wayne State University

  • White Papers // Jan 2011

    Autonomic Management of Virtualized Resources in Cloud Computing

    The last five years have witnessed a rapid growth of cloud computing in business, governmental and educational IT deployment. Hosting services in a cloud gradually supersedes traditional IT products in both small and large companies. It enables small businesses to have on-demand access to resources that would not likely be...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Spherical Representation and Polyhedron Routing for Load Balancing in Wireless Sensor Networks

    In this paper, the authors address the problem of scalable and load balanced routing for wireless sensor networks. Motivated by the analog of the continuous setting that geodesic routing on a sphere gives perfect load balancing, they embed sensor nodes on a convex polyhedron in 3D and use greedy routing...

    Provided By Wayne State University

  • White Papers // May 2009

    A Game Theoretic Investigation of Deception in Network Security

    The authors perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. They model...

    Provided By Wayne State University

  • White Papers // May 2009

    A Distributed Algorithm for Web Content Replication

    Web caching and replication techniques increase accessibility of Web contents and reduce Internet bandwidth requirements. In this paper, the authors are considering the replica placement problem in a distributed replication group. The replication group consists of servers dedicating certain amount of memory for replicating objects. The replica placement problem is...

    Provided By Wayne State University

  • White Papers // Jan 2012

    Fine-Grained Power Management Using Process-Level Profiling

    Low-power hardware design itself is not enough to solve the power problem of computer systems. Operating system level power saving strategies have been proved as effective complement to hardware methods. However, most of these strategies work on system level, and some of them may severely influence performance. In order to...

    Provided By Wayne State University

  • White Papers // Jan 2009

    Role-Based Deceptive Detection and Filtering in WSNs

    With more and more real applications of WSNs have been deployed, which are in charge of either monitoring parameters or event detection, the authors envision that the success of the WSNs is decided by the quality of the collected data. Further more, the quality of the collected data is mainly...

    Provided By Wayne State University

  • White Papers // Jun 2010

    Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Since multicasting is the most efficient method of group communication,...

    Provided By Wayne State University

  • White Papers // Aug 2009

    Experimental Characterization of DSRC Signal Strength Drops

    Dedicated Short Range Communication (DSRC) is gaining momentum as the protocol of choice for wireless vehicle safety applications by automotive Original Equipment Manufacturers (OEMs) and road operators. DSRC is a low latency and reliable Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication protocol. A wide range of its applications have been conceptualized...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Towards Predictable Real-Time Routing for Wireless Networked Sensing and Control

    Real-time routing is a basic element of closed-loop, real-time sensing and control, but it is very challenging due to dynamic, uncertain link/path delay. A basis of real-time routing is determining probabilistically guaranteed path delays, but this problem is NP-hard and it may well have to be solved by resource-constrained devices...

    Provided By Wayne State University

  • White Papers // Jul 2011

    The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling

    Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling....

    Provided By Wayne State University

  • White Papers // Apr 2012

    NetEye: A User-Centered Wireless Sensor Network Testbed for High-Fidelity, Robust Experimentation

    Experimentation infrastructures for Wireless Sensor Networks (WSNs) have been widely adopted over the past decade for hi-fidelity validation and rapid prototyping of applications and for discovering and modeling phenomena that have led to improvements in analysis and simulation capabilities. Nonetheless, the community is still looking for more heterogeneous WSN testbeds...

    Provided By Wayne State University

  • White Papers // Apr 2011

    Mechanism Design for Stochastic Virtual Resource Allocation in Non-Cooperative Cloud Systems

    Currently, virtualization technology has been widely adopted by cloud service providers to provide flexible and cost-effective resource sharing among users. On cloud platforms, computing resources are allocated on-demand dynamically and the application hosted on a Virtual Machine(VM) usually has the illusion of complete control of resources. Thus, a selfish VM...

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Hybrid Reinforcement Learning Approach for Coordinated Configuration of Virtual Machines and Appliances

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Jul 2009

    Utility Analysis for Internet-Oriented Server Consolidation in VM-Based Data Centers

    Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's Internet-service-oriented enterprise data centers. How much power and how many servers for the underlying physical infrastructure are saved via server consolidation in VM-based data centers is of...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Principles of Network Monitoring

    Efficient and cost-effective measurement of network characteristics is pivotal for distributed systems deployed on the Internet. The network characteristics are utilized by Internet-based distributed systems to provide better service to the user and enhance performance for the application. This paper provides a detailed analysis of existing techniques for the measurement...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Measuring the Performance of Adaptive Wormhole Routing

    Adaptive routing is widely regarded as a promising approach to improving interconnection network performance. Many designers of adaptive routing algorithms have used synthetic communication patterns, such as uniform and transpose traffic, to compare the performance of various adaptive routing algorithms with each other and with oblivious routing. These comparisons have...

    Provided By Wayne State University

  • White Papers // Dec 2008

    Cross-Layer Design of Wireless Networking for Parallel Loading of Access Points (PLAP)

    This paper processes a new cross-layer framework design for Parallel Download and Upload (PDU). This technique has been called as Parallel Loading of Access Points (PLAP). The authors have shown here the PLAP for Access Point (AP) and integrate Ad-hoc Procedure with AP to support the parallel download or upload...

    Provided By Wayne State University

  • White Papers // Mar 2010

    Guide To Hiring Foreign Employees

    Most non-immigrants coming to work, teach, perform research, or other related duties at WSU will need to be sponsored by a WSU Department and have their non-immigrant classification processed through the Office of International Students and Scholars. This guide will help one as one make the hiring decisions. The authors...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Building Self-Adaptive Cyber Physical Systems Using Unreliable Components

    Modern automobiles, featuring increased convenience, safety, and energy savings, have become more and more reliant on the outcomes of the IT industry. Existing services such as vehicle tracking, navigation and emergency notification envision a promising future of more powerful computing-assisted automobile systems. Some examples include remote vehicle controllers, short range...

    Provided By Wayne State University

  • White Papers // Sep 2008

    Secure Scientific Workflow Provenance Querying With Security Views

    In this work, the authors studied the problem of protecting scientific workflow provenance, including both data products and their provenance. First, this paper formalized scientific workflow provenance that builds the basis for querying and access control. Second, this paper proposed a security specification mechanism for provenance at various granularity levels...

    Provided By Wayne State University

  • White Papers // Oct 2008

    Accelerating the HMMER Sequence Analysis Suite Using Conventional Processors

    Due to the ever-increasing size of sequence databases it has become clear that faster techniques must be employed to effectively perform biological sequence analysis in a reasonable amount of time. Exploiting the inherent parallelism between sequences is a common strategy. In this paper the authors enhance both the fine-grained and...

    Provided By Wayne State University

  • White Papers // Oct 2008

    An Adaptive Heterogeneous Software DSM

    This paper presents a mechanism to run parallel applications in heterogeneous, dynamic environments while maintaining thread synchrony. A heterogeneous software DSM is used to provide synchronization constructs similar to Pthreads, while providing for individual thread mobility. An asymmetric data conversion scheme is adopted to restore thread states among different computers...

    Provided By Wayne State University

  • White Papers // Nov 2008

    Adaptive Secure Access to Remote Services

    Since the inception of service-oriented computing paradigm, the authors have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RPC-based services to SOAP-based Web services. Likewise, the proliferation of mobile devices has enabled the remote "On the move" access of these services from anywhere...

    Provided By Wayne State University

  • White Papers // Feb 2009

    Ontology-Based Annotation of Multimedia Language Data for the Semantic Web

    There is an increasing interest and effort in preserving and documenting endangered languages. Language data are valuable only when they are well-cataloged, indexed and searchable. Many language data, particularly those of lesser-spoken languages, are collected as audio and video recordings. While multimedia data provide more channels and dimensions to describe...

    Provided By Wayne State University

  • White Papers // Apr 2009

    Temporal Data Mining for Root-Cause Analysis of Machine Faults in Automotive Assembly Lines

    Engine assembly is a complex and heavily automated distributed-control process, with large amounts of faults data logged everyday. The authors describe an application of temporal data mining for analyzing fault logs in an engine assembly plant. Frequent episode discovery framework is a model-free method that can be used to deduce...

    Provided By Wayne State University

  • White Papers // Apr 2009

    An Efficient XOR-Scheduling Algorithm for Erasure Codes Encoding

    In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data when components fail. Erasure codes can however impose significant performance overhead in two core operations: Encoding, where coding information is calculated...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Automatic Performance Debugging of SPMD-Style Parallel Programs

    Automatic performance debugging of parallel applications includes two main steps: locating performance bottlenecks and uncovering their root causes for performance optimization. Previous work fails to resolve this challenging issue in two ways: first, several previous efforts automate locating bottlenecks, but present results in a confined way that only identifies performance...

    Provided By Wayne State University