Wayne State University

Displaying 1-26 of 26 results

  • White Papers // Apr 2012

    NetEye: A User-Centered Wireless Sensor Network Testbed for High-Fidelity, Robust Experimentation

    Experimentation infrastructures for Wireless Sensor Networks (WSNs) have been widely adopted over the past decade for hi-fidelity validation and rapid prototyping of applications and for discovering and modeling phenomena that have led to improvements in analysis and simulation capabilities. Nonetheless, the community is still looking for more heterogeneous WSN testbeds...

    Provided By Wayne State University

  • White Papers // Jan 2012

    Fine-Grained Power Management Using Process-Level Profiling

    Low-power hardware design itself is not enough to solve the power problem of computer systems. Operating system level power saving strategies have been proved as effective complement to hardware methods. However, most of these strategies work on system level, and some of them may severely influence performance. In order to...

    Provided By Wayne State University

  • White Papers // Oct 2011

    URL: A Unified Reinforcement Learning Approach for Autonomic Cloud Management

    Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides the capacity needed to meet service demands. In this paper, the authors present a unified reinforcement learning approach,...

    Provided By Wayne State University

  • White Papers // Sep 2011

    Simple Regenerating Codes: Network Coding for Cloud Storage

    Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher storage efficiency for the same availability. One main challenge in the design of such codes is the exact repair problem: if a node storing encoded information fails, in order to maintain the same level of...

    Provided By Wayne State University

  • White Papers // Aug 2011

    Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Jul 2011

    The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling

    Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling....

    Provided By Wayne State University

  • White Papers // Jul 2011

    LENS: Resource Specification for Wireless Sensor Network Experimentation Infrastructures

    As a first step towards predictable, repeatable WSN experimentation, the authors propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit...

    Provided By Wayne State University

  • White Papers // Jul 2011

    Experimental Analysis of Link Estimation Methods in Low Power Wireless Networks

    Wireless sensor networks are envisioned to be an integral part of cyber-physical systems, yet wireless networks are inherently dynamic and come with varieties of uncertainties. One such uncertainty is wireless communication itself which assumes complex spatial and temporal dynamics. For dependable and predictable performance, therefore, link estimation has become a...

    Provided By Wayne State University

  • White Papers // Apr 2011

    Mechanism Design for Stochastic Virtual Resource Allocation in Non-Cooperative Cloud Systems

    Currently, virtualization technology has been widely adopted by cloud service providers to provide flexible and cost-effective resource sharing among users. On cloud platforms, computing resources are allocated on-demand dynamically and the application hosted on a Virtual Machine(VM) usually has the illusion of complete control of resources. Thus, a selfish VM...

    Provided By Wayne State University

  • White Papers // Apr 2011

    OPQL: A First OPM-Level Query Language for Scientific Workflow Provenance

    Provenance, which is one kind of metadata that captures the derivation history of a data product, including its original data sources, intermediate products, and the steps that were applied to produce it, has become increasingly important in services computing and scientific workflows to validate, interpret, and analyze the result of...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Automatic Performance Debugging of SPMD-Style Parallel Programs

    Automatic performance debugging of parallel applications includes two main steps: locating performance bottlenecks and uncovering their root causes for performance optimization. Previous work fails to resolve this challenging issue in two ways: first, several previous efforts automate locating bottlenecks, but present results in a confined way that only identifies performance...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Towards Predictable Real-Time Routing for Wireless Networked Sensing and Control

    Real-time routing is a basic element of closed-loop, real-time sensing and control, but it is very challenging due to dynamic, uncertain link/path delay. A basis of real-time routing is determining probabilistically guaranteed path delays, but this problem is NP-hard and it may well have to be solved by resource-constrained devices...

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Hybrid Reinforcement Learning Approach for Coordinated Configuration of Virtual Machines and Appliances

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Distributed Self-Learning Approach for Elastic Provisioning of Virtualized Cloud Resources

    Although cloud computing has gained sufficient popularity recently, there are still some key impediments to enterprise adoption. Cloud management is one of the top challenges. The ability of on-the-fly partitioning hardware resources into Virtual Machine (VM) instances facilitates elastic computing environment to users. But the extra layer of resource virtualization...

    Provided By Wayne State University

  • White Papers // Jan 2011

    State Observability and Observers of Linear-Time-Invariant Systems Under Irregular Sampling and Sensor Limitations

    State observability and observer designs are investigated for linear-time-invariant systems in continuous time when the outputs are measured only at a set of irregular sampling time sequences. The problem is primarily motivated by systems with limited sensor information in which sensor switching generates irregular sampling sequences. State observability may be...

    Provided By Wayne State University

  • White Papers // Jan 2011

    Autonomic Management of Virtualized Resources in Cloud Computing

    The last five years have witnessed a rapid growth of cloud computing in business, governmental and educational IT deployment. Hosting services in a cloud gradually supersedes traditional IT products in both small and large companies. It enables small businesses to have on-demand access to resources that would not likely be...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Efficient Bidding for Virtual Machine Instances in Clouds

    Combinatorial auctions are efficient mechanisms for allocating Virtual Machine (VM) instances to cloud computing users. Despite the fact that, in general, these mechanisms lead to higher revenues than the currently employed fixed-price mechanisms, the current cloud computing providers do not employ them to allocate their resources. One of the main...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Spherical Representation and Polyhedron Routing for Load Balancing in Wireless Sensor Networks

    In this paper, the authors address the problem of scalable and load balanced routing for wireless sensor networks. Motivated by the analog of the continuous setting that geodesic routing on a sphere gives perfect load balancing, they embed sensor nodes on a convex polyhedron in 3D and use greedy routing...

    Provided By Wayne State University

  • White Papers // Jun 2010

    Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Since multicasting is the most efficient method of group communication,...

    Provided By Wayne State University

  • White Papers // Mar 2010

    Guide To Hiring Foreign Employees

    Most non-immigrants coming to work, teach, perform research, or other related duties at WSU will need to be sponsored by a WSU Department and have their non-immigrant classification processed through the Office of International Students and Scholars. This guide will help one as one make the hiring decisions. The authors...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Link Asymmetry and One-Way Estimation in Wireless Sensor Networks

    Link asymmetry is one of the characteristic challenges that wireless sensor networks pose in the design of network protocols. The authors observe, based on testbed experiments that a substantial percentage of links are asymmetric, many are even unidirectional. They also find that the reliability of synchronous acknowledgments is considerably higher...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Measuring the Performance of Adaptive Wormhole Routing

    Adaptive routing is widely regarded as a promising approach to improving interconnection network performance. Many designers of adaptive routing algorithms have used synthetic communication patterns, such as uniform and transpose traffic, to compare the performance of various adaptive routing algorithms with each other and with oblivious routing. These comparisons have...

    Provided By Wayne State University

  • White Papers // Dec 2009

    TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks

    Multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in...

    Provided By Wayne State University

  • White Papers // Aug 2009

    Experimental Characterization of DSRC Signal Strength Drops

    Dedicated Short Range Communication (DSRC) is gaining momentum as the protocol of choice for wireless vehicle safety applications by automotive Original Equipment Manufacturers (OEMs) and road operators. DSRC is a low latency and reliable Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication protocol. A wide range of its applications have been conceptualized...

    Provided By Wayne State University

  • White Papers // Jul 2009

    Utility Analysis for Internet-Oriented Server Consolidation in VM-Based Data Centers

    Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's Internet-service-oriented enterprise data centers. How much power and how many servers for the underlying physical infrastructure are saved via server consolidation in VM-based data centers is of...

    Provided By Wayne State University

  • White Papers // May 2009

    A Game Theoretic Investigation of Deception in Network Security

    The authors perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. They model...

    Provided By Wayne State University

  • White Papers // Jul 2009

    Utility Analysis for Internet-Oriented Server Consolidation in VM-Based Data Centers

    Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's Internet-service-oriented enterprise data centers. How much power and how many servers for the underlying physical infrastructure are saved via server consolidation in VM-based data centers is of...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Measuring the Performance of Adaptive Wormhole Routing

    Adaptive routing is widely regarded as a promising approach to improving interconnection network performance. Many designers of adaptive routing algorithms have used synthetic communication patterns, such as uniform and transpose traffic, to compare the performance of various adaptive routing algorithms with each other and with oblivious routing. These comparisons have...

    Provided By Wayne State University

  • White Papers // Mar 2010

    Guide To Hiring Foreign Employees

    Most non-immigrants coming to work, teach, perform research, or other related duties at WSU will need to be sponsored by a WSU Department and have their non-immigrant classification processed through the Office of International Students and Scholars. This guide will help one as one make the hiring decisions. The authors...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Automatic Performance Debugging of SPMD-Style Parallel Programs

    Automatic performance debugging of parallel applications includes two main steps: locating performance bottlenecks and uncovering their root causes for performance optimization. Previous work fails to resolve this challenging issue in two ways: first, several previous efforts automate locating bottlenecks, but present results in a confined way that only identifies performance...

    Provided By Wayne State University

  • White Papers // Dec 2009

    TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks

    Multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an adversary to misdirect significant network traffic, resulting in disastrous consequences. It cannot be solved solely by encryption or authentication techniques. To secure multi-hop routing in...

    Provided By Wayne State University

  • White Papers // Jan 2010

    On Link Asymmetry and One-Way Estimation in Wireless Sensor Networks

    Link asymmetry is one of the characteristic challenges that wireless sensor networks pose in the design of network protocols. The authors observe, based on testbed experiments that a substantial percentage of links are asymmetric, many are even unidirectional. They also find that the reliability of synchronous acknowledgments is considerably higher...

    Provided By Wayne State University

  • White Papers // Jul 2011

    LENS: Resource Specification for Wireless Sensor Network Experimentation Infrastructures

    As a first step towards predictable, repeatable WSN experimentation, the authors propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit...

    Provided By Wayne State University

  • White Papers // Jul 2011

    Experimental Analysis of Link Estimation Methods in Low Power Wireless Networks

    Wireless sensor networks are envisioned to be an integral part of cyber-physical systems, yet wireless networks are inherently dynamic and come with varieties of uncertainties. One such uncertainty is wireless communication itself which assumes complex spatial and temporal dynamics. For dependable and predictable performance, therefore, link estimation has become a...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Efficient Bidding for Virtual Machine Instances in Clouds

    Combinatorial auctions are efficient mechanisms for allocating Virtual Machine (VM) instances to cloud computing users. Despite the fact that, in general, these mechanisms lead to higher revenues than the currently employed fixed-price mechanisms, the current cloud computing providers do not employ them to allocate their resources. One of the main...

    Provided By Wayne State University

  • White Papers // Sep 2011

    Simple Regenerating Codes: Network Coding for Cloud Storage

    Network codes designed specifically for distributed storage systems have the potential to provide dramatically higher storage efficiency for the same availability. One main challenge in the design of such codes is the exact repair problem: if a node storing encoded information fails, in order to maintain the same level of...

    Provided By Wayne State University

  • White Papers // Jan 2011

    Autonomic Management of Virtualized Resources in Cloud Computing

    The last five years have witnessed a rapid growth of cloud computing in business, governmental and educational IT deployment. Hosting services in a cloud gradually supersedes traditional IT products in both small and large companies. It enables small businesses to have on-demand access to resources that would not likely be...

    Provided By Wayne State University

  • White Papers // Oct 2010

    Spherical Representation and Polyhedron Routing for Load Balancing in Wireless Sensor Networks

    In this paper, the authors address the problem of scalable and load balanced routing for wireless sensor networks. Motivated by the analog of the continuous setting that geodesic routing on a sphere gives perfect load balancing, they embed sensor nodes on a convex polyhedron in 3D and use greedy routing...

    Provided By Wayne State University

  • White Papers // Jan 2012

    Fine-Grained Power Management Using Process-Level Profiling

    Low-power hardware design itself is not enough to solve the power problem of computer systems. Operating system level power saving strategies have been proved as effective complement to hardware methods. However, most of these strategies work on system level, and some of them may severely influence performance. In order to...

    Provided By Wayne State University

  • White Papers // Jun 2010

    Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Since multicasting is the most efficient method of group communication,...

    Provided By Wayne State University

  • White Papers // Aug 2009

    Experimental Characterization of DSRC Signal Strength Drops

    Dedicated Short Range Communication (DSRC) is gaining momentum as the protocol of choice for wireless vehicle safety applications by automotive Original Equipment Manufacturers (OEMs) and road operators. DSRC is a low latency and reliable Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communication protocol. A wide range of its applications have been conceptualized...

    Provided By Wayne State University

  • White Papers // Apr 2011

    OPQL: A First OPM-Level Query Language for Scientific Workflow Provenance

    Provenance, which is one kind of metadata that captures the derivation history of a data product, including its original data sources, intermediate products, and the steps that were applied to produce it, has become increasingly important in services computing and scientific workflows to validate, interpret, and analyze the result of...

    Provided By Wayne State University

  • White Papers // Mar 2011

    Towards Predictable Real-Time Routing for Wireless Networked Sensing and Control

    Real-time routing is a basic element of closed-loop, real-time sensing and control, but it is very challenging due to dynamic, uncertain link/path delay. A basis of real-time routing is determining probabilistically guaranteed path delays, but this problem is NP-hard and it may well have to be solved by resource-constrained devices...

    Provided By Wayne State University

  • White Papers // Apr 2012

    NetEye: A User-Centered Wireless Sensor Network Testbed for High-Fidelity, Robust Experimentation

    Experimentation infrastructures for Wireless Sensor Networks (WSNs) have been widely adopted over the past decade for hi-fidelity validation and rapid prototyping of applications and for discovering and modeling phenomena that have led to improvements in analysis and simulation capabilities. Nonetheless, the community is still looking for more heterogeneous WSN testbeds...

    Provided By Wayne State University

  • White Papers // Jul 2011

    The Case for Addressing the Limiting Impact of Interference on Wireless Scheduling

    Co-channel interference is a limiting factor to the predictability and performance of wireless networks, thus interference-oriented scheduling of channel access has become a basic building block of wireless networking. Despite much work in this area, the existing algorithms did not address the limiting impact of interference when optimizing transmission scheduling....

    Provided By Wayne State University

  • White Papers // Oct 2011

    URL: A Unified Reinforcement Learning Approach for Autonomic Cloud Management

    Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides the capacity needed to meet service demands. In this paper, the authors present a unified reinforcement learning approach,...

    Provided By Wayne State University

  • White Papers // Jan 2011

    State Observability and Observers of Linear-Time-Invariant Systems Under Irregular Sampling and Sensor Limitations

    State observability and observer designs are investigated for linear-time-invariant systems in continuous time when the outputs are measured only at a set of irregular sampling time sequences. The problem is primarily motivated by systems with limited sensor information in which sensor switching generates irregular sampling sequences. State observability may be...

    Provided By Wayne State University

  • White Papers // Apr 2011

    Mechanism Design for Stochastic Virtual Resource Allocation in Non-Cooperative Cloud Systems

    Currently, virtualization technology has been widely adopted by cloud service providers to provide flexible and cost-effective resource sharing among users. On cloud platforms, computing resources are allocated on-demand dynamically and the application hosted on a Virtual Machine(VM) usually has the illusion of complete control of resources. Thus, a selfish VM...

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Hybrid Reinforcement Learning Approach for Coordinated Configuration of Virtual Machines and Appliances

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Aug 2011

    Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach

    Cloud computing has a key requirement for resource configuration in a real-time manner. In such virtualized environments, both Virtual Machines (VMs) and hosted applications need to be configured on-the-fly to adapt to system dynamics. The interplay between the layers of VMs and applications further complicates the problem of cloud configuration....

    Provided By Wayne State University

  • White Papers // Mar 2011

    A Distributed Self-Learning Approach for Elastic Provisioning of Virtualized Cloud Resources

    Although cloud computing has gained sufficient popularity recently, there are still some key impediments to enterprise adoption. Cloud management is one of the top challenges. The ability of on-the-fly partitioning hardware resources into Virtual Machine (VM) instances facilitates elastic computing environment to users. But the extra layer of resource virtualization...

    Provided By Wayne State University

  • White Papers // May 2009

    A Game Theoretic Investigation of Deception in Network Security

    The authors perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. They model...

    Provided By Wayne State University