York University

Displaying 1-30 of 30 results

  • White Papers // Aug 2012

    Partitioning Applications for Hybrid and Federated Clouds

    On-demand access to computing resources as-a-service has the potential to allow enterprises to temporarily scale out of their private data center into the infrastructure of a public cloud provider during times of peak demand. However, concerns about privacy and security may limit the adoption of this technique. The authors describe...

    Provided By York University

  • White Papers // Jul 2012

    The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?

    In this paper, the authors examine the impact of DNS TTL values on the overall user experience in accessing a web site. They demonstrate that a web-site that utilizes inappropriate DNS TTL values could experience damaging and costly consequences, especially if falling victim to a DDoS attack. Subsequently, they represent...

    Provided By York University

  • White Papers // May 2012

    Introducing STRATOS: A Cloud Broker Service

    This paper introduces a cloud broker service (STRATOS) which facilitates the deployment and runtime management of cloud application topologies using cloud elements/services sourced on the fly from multiple providers, based on requirements specified in higher level objectives. Its implementation and use is evaluated in a set of experiments. In the...

    Provided By York University

  • White Papers // May 2012

    A Web Service for Cloud Metadata

    Descriptive information about available cloud services (i.e., metadata) is required in order to make good decisions about which cloud service provider(s) to utilize when deploying an application topology to the cloud. Presently, there are no uniform mechanisms for describing these services. Further, there is no unifying process that aggregates this...

    Provided By York University

  • White Papers // Apr 2012

    Model-Based Adaptive DoS Attack Mitigation

    Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult...

    Provided By York University

  • White Papers // Apr 2012

    Data Overhead Impact of Multipath Routing for Multicast In Wireless Mesh Networks

    Multipath routing has been proved effective in Mobile Ad-hoc NETworks (MANETs) for coping with link failures resulting from node mobility. In Wireless Mesh Networks (WMNs) where routers are generally static, the traffic carried by the backup paths may adversely impact other flows and the multicast group itself, because these paths...

    Provided By York University

  • White Papers // Feb 2012

    Performance Evaluation of Network-Coded Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks

    Systems with multiple channels and multiple radios per node have been shown to enhance throughput of Wireless Mesh Networks (WMNs). Recently, network coding has also been proved to be a promising technique for improving network throughput of WMNs. However, the performance of network coding in the context of multicast in...

    Provided By York University

  • White Papers // Jan 2012

    Socellbot: A New Botnet Design to Infect Smartphones Via Online Social Networking

    Given the popularity of both Smartphones and online social networking, it is only a matter of time before attackers exploit both to launch new types of attacks. In this paper, the authors propose a new cellular botnet named SoCellBot that exploits Online Social Networks (OSNs) to recruit bots and uses...

    Provided By York University

  • White Papers // Jan 2012

    A Node Control Model for the Charging and Accounting Problem in MANETs

    Because of the lack of infrastructure in Mobile Ad hoc NETworks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and might be reluctant to forward packets for other nodes. In this paper, the authors address the charging and...

    Provided By York University

  • White Papers // Dec 2011

    Performance Modeling of Multicast With Network Coding in Multi-Channel Multi-Radio Wireless Mesh Networks

    Systems with multiple channels and multiple radios per node have been shown to enhance throughput of Wireless Mesh Networks (WMNs). Recently, network coding has also been proved to be a promising technique for improving network throughput of WMNs. However, the performance of network coding in the context of multicast, a...

    Provided By York University

  • White Papers // May 2011

    Networks Matter: Explaining How States Have Responded To The Global Financial Crisis

    The global financial crisis from 2007-2009 has generated countless conferences and studies, books, both from popular and academic presses, articles, and is shaping current and future research agenda. Financial services sector crisis are not new (Reinhart and Rogoff, 2009). Crises tend to follow similar patterns. Of interest, the response of...

    Provided By York University

  • White Papers // Mar 2011

    A Simple Mathematical Model for Information Rate of Active Transport Molecular Communication

    In molecular communication, gaps in the underlying theoretical and mathematical framework create numerous challenges. Currently, most researchers rely on simulations to study these systems. However, simulations can be time consuming and impractical. Moreover, due to the complexity and dependencies present in these systems, deriving a mathematical framework that can capture...

    Provided By York University

  • White Papers // Jan 2011

    Algorithms for Bandwidth Efficient Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks

    Traditional multicast routing algorithms such as Shortest Path Tree (SPT) and Steiner Tree (MST) do not consider the wireless broadcast advantage or the underlying channel assignments in a Multi-Channel Multi-Radio (MCMR) Wireless Mesh Network (WMN). The authors propose multicast routing algorithms that take into account the above factors in order...

    Provided By York University

  • White Papers // Jan 2011

    Fast Authentication for Mobility Support in Wireless Mesh Networks

    The authors propose new authentication protocols that support fast hand-off for real-time applications such as voice over IP and audio/video conferencing in Wireless Mesh Networks (WMNs). A client and a Mesh Access Point (MAP) mutually authenticate each other using one-hop communications. The central authentication server is not involved during the...

    Provided By York University

  • White Papers // Nov 2010

    Goal-Based Behavioral Customization of Information Systems

    Customizing software to perfectly fit individual needs is becoming increasingly important in information systems engineering. Users want to be able to customize software behavior through reference to terms familiar to their experience and needs. In this paper, the authors present a requirements-driven approach to behavioral customization of software. Goal models...

    Provided By York University

  • White Papers // Nov 2010

    Autonomic Control of On-the-Cloud Applications for Distributed Collaborative Systems

    With the advent of new paradigms for the deployment and efficiency of application oriented software products, the IT departments have become more pervasive and more complex leading very often to unmanageable IT infrastructures. Failures of those infrastructures can have disastrous consequences for the company and sometimes for a region or...

    Provided By York University

  • White Papers // May 2010

    Secure Routing for Wireless Mesh Networks

    This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre-distribution scheme to compute the Pairwise Transient Key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the Group Transient Key (GTK). PTK and GTK...

    Provided By York University

  • White Papers // Apr 2010

    Touchscreens Vs. Traditional Controllers in Handheld

    The authors present a study which compares touchscreen-based controls and physical controls for game input using Ubisoft's Assassin's Creed: Altair's Chronicles. The study used the Apple iPhone as a representative touchscreen-based controller and the Nintendo DS for its physical control pad. Participants completed a game level four times on each...

    Provided By York University

  • White Papers // Mar 2010

    Fast Authentication for Mobile Hosts in Wireless Mesh Networks

    The authors aim at extending IEEE 802.11s standards to implement fast hand-off to support real-time applications such as VoIP and audio/video conferencing. They propose a novel trust model that represents the trust relationships among the entities of a WMN, and new authentication protocols based on that model. A client and...

    Provided By York University

  • White Papers // Feb 2010

    Resource Allocation Via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

    In a cooperative wireless network, there may be many potential relays within radio range of a source; similarly, there may be many potential sources seeking to use relays. Allocating these resources is a non-trivial optimization problem. In this paper, fractional cooperation is considered, where each potential relay only allocates a...

    Provided By York University

  • White Papers // Jan 2010

    Pricing Of Drugs With Heterogeneous Health Insurance Coverage

    In this paper, the authors examine the role of insurance coverage in explaining the generic competition paradox in a two-stage game involving a single producer of brand-name drugs and n quantity-competing producers of generic drugs. Independently of brand loyalty, which some studies rely upon to explain the paradox, they show...

    Provided By York University

  • White Papers // Jan 2010

    The Two-Handed Desktop Interface: Are We There Yet?

    Authors argue that today's desktop systems poorly engage the hands of users, and reveal a left-hand bias. Arguments are supported by examples and theory - by juxtaposing the affordances of keyboard/mouse technology with theories of bimanual skill. Scrolling is cited as a task in particularly bad repair. A design improvement...

    Provided By York University

  • White Papers // Aug 2009

    Ethical Leadership Training: An Aristotelian Approach

    When it comes to the establishment of an ethical corporate culture, there appears to be at least two inter-related foundational requirements: The existence of an explicit set of core ethical values; and the presence of ethical leadership. Some companies appear however to have been more successful than others when it...

    Provided By York University

  • White Papers // Apr 2009

    Reflective Thinking, Machine Learning, and User Authentication Via Artificial K-Lines

    Artificial K-Lines (AKL) is a structure that can be used to store different types of knowledge, as long as this knowledge is represented by series of events connected by causality. Unlike, and, perhaps, complementary to, Artificial Neural Networks (ANN), AKL can combine inter-domain knowledge and its knowledge base can be...

    Provided By York University

  • White Papers // Feb 2009

    Low-Complexity Cooperation With Correlated Sources: Diversity Order Analysis

    Wireless sensor networks, which consist of numerous devices that take measurements of a physical phenomenon, are commonly used to observe phenomena that are correlated in space. In this paper, the authors devise a low-complexity coding scheme for correlated sources based on Slepian-Wolf compression, and analyze its performance in terms of...

    Provided By York University

  • White Papers // Dec 2008

    Diverging Patterns: Discovering Significant Dissimilarities in Large Databases

    The problem of finding contrast patterns has recently attracted much attention. As a result, a number of promising methods have been proposed to capture significant differences or changes between two or more datasets. Such differences can be captured by emerging patterns and some other types of contrasts. In this paper,...

    Provided By York University

  • White Papers // Dec 2008

    JSCOOP: A High-Level Concurrency Framework for Java

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data races and atomicity violations by construction through a set of compiler rules. It attempts to guarantee fairness via...

    Provided By York University

  • White Papers // Nov 2008

    Wages, Benefits And Efficiency In Union-Firm Bargaining

    This paper provides an efficient union-firm bargaining solution within the right to manage framework, by separating efficiency and distributional considerations through bargaining over wage and non-wage benefits. The authors show that without insurance considerations, efficiency is achieved by equating the wage and workers' opportunity cost and providing the union with...

    Provided By York University

  • White Papers // Nov 2008

    A Call Admission Control Protocol for Multimedia Cellular Networks

    The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent by its Call Admission Control (CAC) protocol. As its name implies, the CAC determine if a new call request is granted,...

    Provided By York University

  • White Papers // Oct 2008

    Multicast Routing Algorithms

    Multicast is an efficient form of communication that delivers information from a source to multiple destinations simultaneously. Given a wide range of multicast applications, numerous multicast routing algorithms have been defined to satisfy different requirements of various applications. In addition, given a multicast routing algorithm and metric, the same application...

    Provided By York University

  • White Papers // Jan 2010

    The Two-Handed Desktop Interface: Are We There Yet?

    Authors argue that today's desktop systems poorly engage the hands of users, and reveal a left-hand bias. Arguments are supported by examples and theory - by juxtaposing the affordances of keyboard/mouse technology with theories of bimanual skill. Scrolling is cited as a task in particularly bad repair. A design improvement...

    Provided By York University

  • White Papers // Apr 2010

    Touchscreens Vs. Traditional Controllers in Handheld

    The authors present a study which compares touchscreen-based controls and physical controls for game input using Ubisoft's Assassin's Creed: Altair's Chronicles. The study used the Apple iPhone as a representative touchscreen-based controller and the Nintendo DS for its physical control pad. Participants completed a game level four times on each...

    Provided By York University

  • White Papers // Nov 2008

    Wages, Benefits And Efficiency In Union-Firm Bargaining

    This paper provides an efficient union-firm bargaining solution within the right to manage framework, by separating efficiency and distributional considerations through bargaining over wage and non-wage benefits. The authors show that without insurance considerations, efficiency is achieved by equating the wage and workers' opportunity cost and providing the union with...

    Provided By York University

  • White Papers // Dec 2008

    Diverging Patterns: Discovering Significant Dissimilarities in Large Databases

    The problem of finding contrast patterns has recently attracted much attention. As a result, a number of promising methods have been proposed to capture significant differences or changes between two or more datasets. Such differences can be captured by emerging patterns and some other types of contrasts. In this paper,...

    Provided By York University

  • White Papers // Dec 2008

    JSCOOP: A High-Level Concurrency Framework for Java

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data races and atomicity violations by construction through a set of compiler rules. It attempts to guarantee fairness via...

    Provided By York University

  • White Papers // Oct 2008

    Multicast Routing Algorithms

    Multicast is an efficient form of communication that delivers information from a source to multiple destinations simultaneously. Given a wide range of multicast applications, numerous multicast routing algorithms have been defined to satisfy different requirements of various applications. In addition, given a multicast routing algorithm and metric, the same application...

    Provided By York University

  • White Papers // Nov 2010

    Goal-Based Behavioral Customization of Information Systems

    Customizing software to perfectly fit individual needs is becoming increasingly important in information systems engineering. Users want to be able to customize software behavior through reference to terms familiar to their experience and needs. In this paper, the authors present a requirements-driven approach to behavioral customization of software. Goal models...

    Provided By York University

  • White Papers // Mar 2010

    Fast Authentication for Mobile Hosts in Wireless Mesh Networks

    The authors aim at extending IEEE 802.11s standards to implement fast hand-off to support real-time applications such as VoIP and audio/video conferencing. They propose a novel trust model that represents the trust relationships among the entities of a WMN, and new authentication protocols based on that model. A client and...

    Provided By York University

  • White Papers // Aug 2009

    Ethical Leadership Training: An Aristotelian Approach

    When it comes to the establishment of an ethical corporate culture, there appears to be at least two inter-related foundational requirements: The existence of an explicit set of core ethical values; and the presence of ethical leadership. Some companies appear however to have been more successful than others when it...

    Provided By York University

  • White Papers // Apr 2009

    Reflective Thinking, Machine Learning, and User Authentication Via Artificial K-Lines

    Artificial K-Lines (AKL) is a structure that can be used to store different types of knowledge, as long as this knowledge is represented by series of events connected by causality. Unlike, and, perhaps, complementary to, Artificial Neural Networks (ANN), AKL can combine inter-domain knowledge and its knowledge base can be...

    Provided By York University

  • White Papers // Jan 2010

    Pricing Of Drugs With Heterogeneous Health Insurance Coverage

    In this paper, the authors examine the role of insurance coverage in explaining the generic competition paradox in a two-stage game involving a single producer of brand-name drugs and n quantity-competing producers of generic drugs. Independently of brand loyalty, which some studies rely upon to explain the paradox, they show...

    Provided By York University

  • White Papers // Nov 2010

    Autonomic Control of On-the-Cloud Applications for Distributed Collaborative Systems

    With the advent of new paradigms for the deployment and efficiency of application oriented software products, the IT departments have become more pervasive and more complex leading very often to unmanageable IT infrastructures. Failures of those infrastructures can have disastrous consequences for the company and sometimes for a region or...

    Provided By York University

  • White Papers // May 2011

    Networks Matter: Explaining How States Have Responded To The Global Financial Crisis

    The global financial crisis from 2007-2009 has generated countless conferences and studies, books, both from popular and academic presses, articles, and is shaping current and future research agenda. Financial services sector crisis are not new (Reinhart and Rogoff, 2009). Crises tend to follow similar patterns. Of interest, the response of...

    Provided By York University

  • White Papers // Feb 2010

    Resource Allocation Via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

    In a cooperative wireless network, there may be many potential relays within radio range of a source; similarly, there may be many potential sources seeking to use relays. Allocating these resources is a non-trivial optimization problem. In this paper, fractional cooperation is considered, where each potential relay only allocates a...

    Provided By York University

  • White Papers // Mar 2011

    A Simple Mathematical Model for Information Rate of Active Transport Molecular Communication

    In molecular communication, gaps in the underlying theoretical and mathematical framework create numerous challenges. Currently, most researchers rely on simulations to study these systems. However, simulations can be time consuming and impractical. Moreover, due to the complexity and dependencies present in these systems, deriving a mathematical framework that can capture...

    Provided By York University

  • White Papers // Feb 2009

    Low-Complexity Cooperation With Correlated Sources: Diversity Order Analysis

    Wireless sensor networks, which consist of numerous devices that take measurements of a physical phenomenon, are commonly used to observe phenomena that are correlated in space. In this paper, the authors devise a low-complexity coding scheme for correlated sources based on Slepian-Wolf compression, and analyze its performance in terms of...

    Provided By York University

  • White Papers // Jan 2011

    Algorithms for Bandwidth Efficient Multicast Routing in Multi-Channel Multi-Radio Wireless Mesh Networks

    Traditional multicast routing algorithms such as Shortest Path Tree (SPT) and Steiner Tree (MST) do not consider the wireless broadcast advantage or the underlying channel assignments in a Multi-Channel Multi-Radio (MCMR) Wireless Mesh Network (WMN). The authors propose multicast routing algorithms that take into account the above factors in order...

    Provided By York University

  • White Papers // Jan 2011

    Fast Authentication for Mobility Support in Wireless Mesh Networks

    The authors propose new authentication protocols that support fast hand-off for real-time applications such as voice over IP and audio/video conferencing in Wireless Mesh Networks (WMNs). A client and a Mesh Access Point (MAP) mutually authenticate each other using one-hop communications. The central authentication server is not involved during the...

    Provided By York University

  • White Papers // May 2010

    Secure Routing for Wireless Mesh Networks

    This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre-distribution scheme to compute the Pairwise Transient Key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the Group Transient Key (GTK). PTK and GTK...

    Provided By York University

  • White Papers // Aug 2012

    Partitioning Applications for Hybrid and Federated Clouds

    On-demand access to computing resources as-a-service has the potential to allow enterprises to temporarily scale out of their private data center into the infrastructure of a public cloud provider during times of peak demand. However, concerns about privacy and security may limit the adoption of this technique. The authors describe...

    Provided By York University

  • White Papers // Nov 2008

    A Call Admission Control Protocol for Multimedia Cellular Networks

    The performance of any cellular wireless network, as well as its revenue (number of customers using the network, and their degree of satisfaction) is determined to a great extent by its Call Admission Control (CAC) protocol. As its name implies, the CAC determine if a new call request is granted,...

    Provided By York University

  • White Papers // Jul 2012

    The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?

    In this paper, the authors examine the impact of DNS TTL values on the overall user experience in accessing a web site. They demonstrate that a web-site that utilizes inappropriate DNS TTL values could experience damaging and costly consequences, especially if falling victim to a DDoS attack. Subsequently, they represent...

    Provided By York University

  • White Papers // Dec 2011

    Performance Modeling of Multicast With Network Coding in Multi-Channel Multi-Radio Wireless Mesh Networks

    Systems with multiple channels and multiple radios per node have been shown to enhance throughput of Wireless Mesh Networks (WMNs). Recently, network coding has also been proved to be a promising technique for improving network throughput of WMNs. However, the performance of network coding in the context of multicast, a...

    Provided By York University

  • White Papers // Feb 2012

    Performance Evaluation of Network-Coded Multicast in Multi-Channel Multi-Radio Wireless Mesh Networks

    Systems with multiple channels and multiple radios per node have been shown to enhance throughput of Wireless Mesh Networks (WMNs). Recently, network coding has also been proved to be a promising technique for improving network throughput of WMNs. However, the performance of network coding in the context of multicast in...

    Provided By York University

  • White Papers // Apr 2012

    Data Overhead Impact of Multipath Routing for Multicast In Wireless Mesh Networks

    Multipath routing has been proved effective in Mobile Ad-hoc NETworks (MANETs) for coping with link failures resulting from node mobility. In Wireless Mesh Networks (WMNs) where routers are generally static, the traffic carried by the backup paths may adversely impact other flows and the multicast group itself, because these paths...

    Provided By York University

  • White Papers // Jan 2012

    A Node Control Model for the Charging and Accounting Problem in MANETs

    Because of the lack of infrastructure in Mobile Ad hoc NETworks (MANETs), their proper functioning must rely on co-operations among mobile nodes. However, mobile nodes tend to save their own resources and might be reluctant to forward packets for other nodes. In this paper, the authors address the charging and...

    Provided By York University

  • White Papers // Jan 2012

    Socellbot: A New Botnet Design to Infect Smartphones Via Online Social Networking

    Given the popularity of both Smartphones and online social networking, it is only a matter of time before attackers exploit both to launch new types of attacks. In this paper, the authors propose a new cellular botnet named SoCellBot that exploits Online Social Networks (OSNs) to recruit bots and uses...

    Provided By York University

  • White Papers // Apr 2012

    Model-Based Adaptive DoS Attack Mitigation

    Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult...

    Provided By York University

  • White Papers // May 2012

    A Web Service for Cloud Metadata

    Descriptive information about available cloud services (i.e., metadata) is required in order to make good decisions about which cloud service provider(s) to utilize when deploying an application topology to the cloud. Presently, there are no uniform mechanisms for describing these services. Further, there is no unifying process that aggregates this...

    Provided By York University

  • White Papers // May 2012

    Introducing STRATOS: A Cloud Broker Service

    This paper introduces a cloud broker service (STRATOS) which facilitates the deployment and runtime management of cloud application topologies using cloud elements/services sourced on the fly from multiple providers, based on requirements specified in higher level objectives. Its implementation and use is evaluated in a set of experiments. In the...

    Provided By York University