Worcester Polytechnic Institute

Displaying 1-20 of 20 results

  • White Papers // Jun 2011

    Automatic Physical Database Tuning Middleware for Web-Based Applications

    In this paper, the authors conceptualize the database layout problem as a state space search problem. A state is a given assignment of tables to computer servers. They begin with a database and collect, for use as a workload input, a sequence of queries that were executed during normal usage...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Impact of Group Cooperation Over Competitive Secondary Subnetworks

    In this paper, the authors examine dynamic spectrum sharing between several networks of licensed and unlicensed users wherein the unlicensed user subnetworks compete against other unlicensed subnetworks for spectrum access while nodes belonging to the same subnetwork cooperate with each other. In such a hostile transmission environment, they observe that...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2011

    Distributed Data Mining With Differential Privacy

    With recent advances in communication and data storage technology, an explosive amount of information is being collected and stored in the Internet. Even though such vast amount of information presents great opportunities for knowledge discovery, organizations might not want to share their data due to legal or competitive reasons. This...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    On Broadcast Authentication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have enabled data gathering from a vast geographical region, and present unprecedented opportunities for a wide range of tracking and monitoring applications from both civilian and military domains. In these applications, WSNs are expected to process, store and provide the sensed data to the network users...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    How's My Network? A Java Approach to Home Network Measurement

    As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. The authors have developed a Java applet tool to understand the capabilities of such a tool for...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    Packet Dispersion in IEEE 802.11 Wireless Networks

    Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network environments and can provide inaccurate results in wireless networks due to wireless capacity variability over short time scales. This paper develops an analytical model to investigate packet...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2010

    Energy Analysis of Four Wireless Sensor Network MAC Protocols

    Using the MAC Layer Architecture framework, four power-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single-hop network topology were conducted using three wireless sensor network traffic patterns (broadcast, convergecast and local gossip). AS-MAC was the most energy-efficient for convergecast and local gossip traffic,...

    Provided By Worcester Polytechnic Institute

  • White Papers // Aug 2010

    CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding

    Live Multimedia Streaming (LMS) services are important in Vehicular Ad hoc NETworks (VANETs) for their capability of providing comprehensive and user-friendly information. The fundamental challenges come from achieving stable and high streaming rate (smooth playback) for all the interested vehicles while using minimal bandwidth resources, especially under the highly dynamic...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2010

    Analysis of an IEEE 802.11 Network Activity During a Small Workshop

    Understanding current performance and usage of IEEE 802.11 networks is valuable for effectively managing and deploying wireless networks in the future. This paper analyzes a wireless trace from NetGames'08 and compares the results with previous research. The analysis indicates increasing dominance of Web traffic, emerging p2p applications consuming significant uplink...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2009

    Network Performance Evaluation in a Web Browser

    The Web browser is increasingly used for emerging applications such as online games and streaming audio/ video. End users seeking better quality for these applications need methods to ascertain network performance in a simple manner. This work investigates methods for measuring network performance through a Web browser and Flash plug-in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Oct 2009

    Elliptic Curve Cryptography on Smart Cardswithout Coprocessors

    This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. They focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost sensitive devices. The implementation is based on the use of the finite...

    Provided By Worcester Polytechnic Institute

  • White Papers // Sep 2009

    R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks With Unreliable Links

    Broadcast is an important primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software update require reliable reception of the content with low-latency and high scalability (i.e., utilizing little bandwidth resource). In reality, the link layer broadcast transmission in WMNs is unreliable, which makes these goals hard to be attained...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jul 2009

    Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

    Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Business Intelligence for Financial Risk Management

    This paper evaluated the implementation of Business Intelligence (BI) platforms and alternative visualization techniques for risk management in fixed income trading at the sponsor, BNP Paribas. The paper examined literature related to fixed income products and risk, the implementation of common BI solutions, analytical tools, and modeling techniques, as well...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Scalability and Robustness in the Domain of Web-Based Tutoring

    Web-based Intelligent Tutoring Systems distribute content using a server based infrastructure. These systems need to be easily accessible to provide a reliable and scalable architecture for students, teachers, parents, content creators, and researchers. Scaling up web-based applications requires a well designed system that distributes the load ac-cross multiple application servers...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Ensuring Data Storage Security in Cloud Computing

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2009

    Secure and Dependable Distributed Data Storage and Access Control in Mission-Critical Wireless Sensor Networks

    Distributed data storage and access in Wireless Sensor Networks (WSNs) recently has found increased popularity driven by many mission-critical applications. While WSN security has been extensively studied in recent years with focus on network communication security, little attention has been paid to the security and dependability of distributed data storage...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2009

    CHAP Credit-Based Home Access Point for Overall Application QoS Improvement

    Wireless APs have become very popular in networking multiple devices at home and allow multiple individuals to share the Internet connections, doing different tasks simultaneously. People use not only desktop and laptop computers but also many other devices with network capabilities. These devices include gaming consoles, portable gaming con-soles, Voice-over-IP...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2008

    Access Point Tuning in Chaotic Wireless Networks

    In dense wireless environments a large number of WLANs may overlap and interfere with one another. This paper reports on two wireless measurement experiments designed to study Access Point (AP) interference. The first experiment shows that using only non-overlapping channels may not be optimal. The second experiment examines the relationship...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2008

    Novel PUF-Based Error Detection Methods in Finite State Machines

    The authors propose a number of techniques for securing Finite State Machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on Physically Unclonable Functions (PUFs), and they address different fault injection threats on various parts of the FSM. The first mechanism targets the protection of state-transitions in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Ensuring Data Storage Security in Cloud Computing

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2009

    Network Performance Evaluation in a Web Browser

    The Web browser is increasingly used for emerging applications such as online games and streaming audio/ video. End users seeking better quality for these applications need methods to ascertain network performance in a simple manner. This work investigates methods for measuring network performance through a Web browser and Flash plug-in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Oct 2009

    Elliptic Curve Cryptography on Smart Cardswithout Coprocessors

    This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. They focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost sensitive devices. The implementation is based on the use of the finite...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2009

    CHAP Credit-Based Home Access Point for Overall Application QoS Improvement

    Wireless APs have become very popular in networking multiple devices at home and allow multiple individuals to share the Internet connections, doing different tasks simultaneously. People use not only desktop and laptop computers but also many other devices with network capabilities. These devices include gaming consoles, portable gaming con-soles, Voice-over-IP...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2009

    Secure and Dependable Distributed Data Storage and Access Control in Mission-Critical Wireless Sensor Networks

    Distributed data storage and access in Wireless Sensor Networks (WSNs) recently has found increased popularity driven by many mission-critical applications. While WSN security has been extensively studied in recent years with focus on network communication security, little attention has been paid to the security and dependability of distributed data storage...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2010

    Analysis of an IEEE 802.11 Network Activity During a Small Workshop

    Understanding current performance and usage of IEEE 802.11 networks is valuable for effectively managing and deploying wireless networks in the future. This paper analyzes a wireless trace from NetGames'08 and compares the results with previous research. The analysis indicates increasing dominance of Web traffic, emerging p2p applications consuming significant uplink...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Scalability and Robustness in the Domain of Web-Based Tutoring

    Web-based Intelligent Tutoring Systems distribute content using a server based infrastructure. These systems need to be easily accessible to provide a reliable and scalable architecture for students, teachers, parents, content creators, and researchers. Scaling up web-based applications requires a well designed system that distributes the load ac-cross multiple application servers...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2009

    Business Intelligence for Financial Risk Management

    This paper evaluated the implementation of Business Intelligence (BI) platforms and alternative visualization techniques for risk management in fixed income trading at the sponsor, BNP Paribas. The paper examined literature related to fixed income products and risk, the implementation of common BI solutions, analytical tools, and modeling techniques, as well...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    On Broadcast Authentication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have enabled data gathering from a vast geographical region, and present unprecedented opportunities for a wide range of tracking and monitoring applications from both civilian and military domains. In these applications, WSNs are expected to process, store and provide the sensed data to the network users...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    How's My Network? A Java Approach to Home Network Measurement

    As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. The authors have developed a Java applet tool to understand the capabilities of such a tool for...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2008

    Novel PUF-Based Error Detection Methods in Finite State Machines

    The authors propose a number of techniques for securing Finite State Machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on Physically Unclonable Functions (PUFs), and they address different fault injection threats on various parts of the FSM. The first mechanism targets the protection of state-transitions in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jul 2009

    Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

    Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to...

    Provided By Worcester Polytechnic Institute

  • White Papers // Sep 2009

    R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks With Unreliable Links

    Broadcast is an important primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software update require reliable reception of the content with low-latency and high scalability (i.e., utilizing little bandwidth resource). In reality, the link layer broadcast transmission in WMNs is unreliable, which makes these goals hard to be attained...

    Provided By Worcester Polytechnic Institute

  • White Papers // Aug 2010

    CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding

    Live Multimedia Streaming (LMS) services are important in Vehicular Ad hoc NETworks (VANETs) for their capability of providing comprehensive and user-friendly information. The fundamental challenges come from achieving stable and high streaming rate (smooth playback) for all the interested vehicles while using minimal bandwidth resources, especially under the highly dynamic...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2011

    Distributed Data Mining With Differential Privacy

    With recent advances in communication and data storage technology, an explosive amount of information is being collected and stored in the Internet. Even though such vast amount of information presents great opportunities for knowledge discovery, organizations might not want to share their data due to legal or competitive reasons. This...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    Packet Dispersion in IEEE 802.11 Wireless Networks

    Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network environments and can provide inaccurate results in wireless networks due to wireless capacity variability over short time scales. This paper develops an analytical model to investigate packet...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2010

    Energy Analysis of Four Wireless Sensor Network MAC Protocols

    Using the MAC Layer Architecture framework, four power-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single-hop network topology were conducted using three wireless sensor network traffic patterns (broadcast, convergecast and local gossip). AS-MAC was the most energy-efficient for convergecast and local gossip traffic,...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2008

    Access Point Tuning in Chaotic Wireless Networks

    In dense wireless environments a large number of WLANs may overlap and interfere with one another. This paper reports on two wireless measurement experiments designed to study Access Point (AP) interference. The first experiment shows that using only non-overlapping channels may not be optimal. The second experiment examines the relationship...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Impact of Group Cooperation Over Competitive Secondary Subnetworks

    In this paper, the authors examine dynamic spectrum sharing between several networks of licensed and unlicensed users wherein the unlicensed user subnetworks compete against other unlicensed subnetworks for spectrum access while nodes belonging to the same subnetwork cooperate with each other. In such a hostile transmission environment, they observe that...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Automatic Physical Database Tuning Middleware for Web-Based Applications

    In this paper, the authors conceptualize the database layout problem as a state space search problem. A state is a given assignment of tables to computer servers. They begin with a database and collect, for use as a workload input, a sequence of queries that were executed during normal usage...

    Provided By Worcester Polytechnic Institute