Worcester Polytechnic Institute

Displaying 1-13 of 13 results

  • White Papers // Jun 2011

    Automatic Physical Database Tuning Middleware for Web-Based Applications

    In this paper, the authors conceptualize the database layout problem as a state space search problem. A state is a given assignment of tables to computer servers. They begin with a database and collect, for use as a workload input, a sequence of queries that were executed during normal usage...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Impact of Group Cooperation Over Competitive Secondary Subnetworks

    In this paper, the authors examine dynamic spectrum sharing between several networks of licensed and unlicensed users wherein the unlicensed user subnetworks compete against other unlicensed subnetworks for spectrum access while nodes belonging to the same subnetwork cooperate with each other. In such a hostile transmission environment, they observe that...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2011

    Distributed Data Mining With Differential Privacy

    With recent advances in communication and data storage technology, an explosive amount of information is being collected and stored in the Internet. Even though such vast amount of information presents great opportunities for knowledge discovery, organizations might not want to share their data due to legal or competitive reasons. This...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    Packet Dispersion in IEEE 802.11 Wireless Networks

    Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network environments and can provide inaccurate results in wireless networks due to wireless capacity variability over short time scales. This paper develops an analytical model to investigate packet...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    On Broadcast Authentication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have enabled data gathering from a vast geographical region, and present unprecedented opportunities for a wide range of tracking and monitoring applications from both civilian and military domains. In these applications, WSNs are expected to process, store and provide the sensed data to the network users...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    How's My Network? A Java Approach to Home Network Measurement

    As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. The authors have developed a Java applet tool to understand the capabilities of such a tool for...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2010

    Energy Analysis of Four Wireless Sensor Network MAC Protocols

    Using the MAC Layer Architecture framework, four power-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single-hop network topology were conducted using three wireless sensor network traffic patterns (broadcast, convergecast and local gossip). AS-MAC was the most energy-efficient for convergecast and local gossip traffic,...

    Provided By Worcester Polytechnic Institute

  • White Papers // Aug 2010

    CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding

    Live Multimedia Streaming (LMS) services are important in Vehicular Ad hoc NETworks (VANETs) for their capability of providing comprehensive and user-friendly information. The fundamental challenges come from achieving stable and high streaming rate (smooth playback) for all the interested vehicles while using minimal bandwidth resources, especially under the highly dynamic...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2010

    Analysis of an IEEE 802.11 Network Activity During a Small Workshop

    Understanding current performance and usage of IEEE 802.11 networks is valuable for effectively managing and deploying wireless networks in the future. This paper analyzes a wireless trace from NetGames'08 and compares the results with previous research. The analysis indicates increasing dominance of Web traffic, emerging p2p applications consuming significant uplink...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2009

    Network Performance Evaluation in a Web Browser

    The Web browser is increasingly used for emerging applications such as online games and streaming audio/ video. End users seeking better quality for these applications need methods to ascertain network performance in a simple manner. This work investigates methods for measuring network performance through a Web browser and Flash plug-in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Oct 2009

    Elliptic Curve Cryptography on Smart Cardswithout Coprocessors

    This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. They focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost sensitive devices. The implementation is based on the use of the finite...

    Provided By Worcester Polytechnic Institute

  • White Papers // Sep 2009

    R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks With Unreliable Links

    Broadcast is an important primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software update require reliable reception of the content with low-latency and high scalability (i.e., utilizing little bandwidth resource). In reality, the link layer broadcast transmission in WMNs is unreliable, which makes these goals hard to be attained...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jul 2009

    Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

    Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to...

    Provided By Worcester Polytechnic Institute

  • White Papers // Nov 2009

    Network Performance Evaluation in a Web Browser

    The Web browser is increasingly used for emerging applications such as online games and streaming audio/ video. End users seeking better quality for these applications need methods to ascertain network performance in a simple manner. This work investigates methods for measuring network performance through a Web browser and Flash plug-in...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    On Broadcast Authentication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have enabled data gathering from a vast geographical region, and present unprecedented opportunities for a wide range of tracking and monitoring applications from both civilian and military domains. In these applications, WSNs are expected to process, store and provide the sensed data to the network users...

    Provided By Worcester Polytechnic Institute

  • White Papers // Oct 2009

    Elliptic Curve Cryptography on Smart Cardswithout Coprocessors

    This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. They focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost sensitive devices. The implementation is based on the use of the finite...

    Provided By Worcester Polytechnic Institute

  • White Papers // Apr 2010

    Analysis of an IEEE 802.11 Network Activity During a Small Workshop

    Understanding current performance and usage of IEEE 802.11 networks is valuable for effectively managing and deploying wireless networks in the future. This paper analyzes a wireless trace from NetGames'08 and compares the results with previous research. The analysis indicates increasing dominance of Web traffic, emerging p2p applications consuming significant uplink...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jul 2009

    Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

    Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    How's My Network? A Java Approach to Home Network Measurement

    As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. The authors have developed a Java applet tool to understand the capabilities of such a tool for...

    Provided By Worcester Polytechnic Institute

  • White Papers // Sep 2009

    R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks With Unreliable Links

    Broadcast is an important primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software update require reliable reception of the content with low-latency and high scalability (i.e., utilizing little bandwidth resource). In reality, the link layer broadcast transmission in WMNs is unreliable, which makes these goals hard to be attained...

    Provided By Worcester Polytechnic Institute

  • White Papers // Aug 2010

    CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding

    Live Multimedia Streaming (LMS) services are important in Vehicular Ad hoc NETworks (VANETs) for their capability of providing comprehensive and user-friendly information. The fundamental challenges come from achieving stable and high streaming rate (smooth playback) for all the interested vehicles while using minimal bandwidth resources, especially under the highly dynamic...

    Provided By Worcester Polytechnic Institute

  • White Papers // Feb 2011

    Distributed Data Mining With Differential Privacy

    With recent advances in communication and data storage technology, an explosive amount of information is being collected and stored in the Internet. Even though such vast amount of information presents great opportunities for knowledge discovery, organizations might not want to share their data due to legal or competitive reasons. This...

    Provided By Worcester Polytechnic Institute

  • White Papers // Dec 2010

    Energy Analysis of Four Wireless Sensor Network MAC Protocols

    Using the MAC Layer Architecture framework, four power-aware MAC protocols were implemented in TinyOS on TelosB motes. Indoor energy measurements over a single-hop network topology were conducted using three wireless sensor network traffic patterns (broadcast, convergecast and local gossip). AS-MAC was the most energy-efficient for convergecast and local gossip traffic,...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jan 2011

    Packet Dispersion in IEEE 802.11 Wireless Networks

    Packet dispersion techniques have been commonly used to estimate bandwidth in wired networks. However, current packet dispersion techniques were developed for wired network environments and can provide inaccurate results in wireless networks due to wireless capacity variability over short time scales. This paper develops an analytical model to investigate packet...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Automatic Physical Database Tuning Middleware for Web-Based Applications

    In this paper, the authors conceptualize the database layout problem as a state space search problem. A state is a given assignment of tables to computer servers. They begin with a database and collect, for use as a workload input, a sequence of queries that were executed during normal usage...

    Provided By Worcester Polytechnic Institute

  • White Papers // Jun 2011

    Impact of Group Cooperation Over Competitive Secondary Subnetworks

    In this paper, the authors examine dynamic spectrum sharing between several networks of licensed and unlicensed users wherein the unlicensed user subnetworks compete against other unlicensed subnetworks for spectrum access while nodes belonging to the same subnetwork cooperate with each other. In such a hostile transmission environment, they observe that...

    Provided By Worcester Polytechnic Institute