Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Innovation (2)
- Telecommunications law and policy (2)
- VDSL (2)
- 4G LTE (1)
- 4G Long Term Evolution (LTE) (1)
-
- AERO (1)
- AODV (1)
- Altruism (1)
- Antitrust (1)
- Architectural features (1)
- Beamforming (1)
- Beneficiary effect (1)
- Broadband access and deployment (1)
- Broadband technology (1)
- Cable modem service (1)
- Cassandra (1)
- Client-to-client (1)
- Cloud computing (1)
- Cluster (1)
- Cognitive radio networks (1)
- Communications (1)
- Comparative public policy (1)
- Competition (1)
- Competitive arousal (1)
- Computer science (1)
- Cooperative communication (1)
- Copyright (1)
- Cross-domain (1)
- Crowdsourcing (1)
- DOCSIS 3 (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (7)
- All Faculty Scholarship (5)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (2)
- All Computer Science and Engineering Research (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
Articles 1 - 20 of 20
Full-Text Articles in Computer Engineering
Is The Smartphone Smart In Kathmandu?, Seth Bird
Is The Smartphone Smart In Kathmandu?, Seth Bird
Independent Study Project (ISP) Collection
This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …
Data Transport System, Rahav Dor
Data Transport System, Rahav Dor
All Computer Science and Engineering Research
To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …
Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan
Distributed Event Detection In Sensor Networks Under Random Spatial Deployment, P. Zhang, G. Peters, I. Nevat, G. Xiao, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
We present a novel event detection algorithm in sensor networks for the case where the sensors are randomly deployed in space. In particular we consider a random sensors deployment according to a Homogeneous Finite Binomial Point Process. We first derive the optimal event detection decision rule. We then develop a novel algorithm to evaluate the intractable marginal likelihood based on the Gram-Charlier series expansion. We evaluate our algorithms through extensive Monte Carlo simulations. Simulation results present the detection and false alarm rates for different system parameters such as number of sensors deployed, deployment region size etc.
Foss Big Data Storage Solution, Nurdeen Salami
Foss Big Data Storage Solution, Nurdeen Salami
STAR Program Research Presentations
NASA projects require a reliable approach to store large volumes of data. Accordingly, it is crucial to adopt a lightweight, reliable, and scalable database. Current NASA databases bear costly license fees with undesirable speed and flexibility. The purpose of utilizing the AERO Institute as an IT test bed, or “Sandbox,” is to design, build, test, and implement software solutions prior to transfer to NASA projects. Cassandra coupled with the Astyanax API is a viable solution for storing big data. Store a minimum of 2GB of C-FOSS data in multiple file formats (.csv, .log, .xml, and .jpg). Use benchmark tests to …
Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah
Performance Analysis Of Mobile Ad-Hoc Routing Protocols By Varying Mobility, Speed And Network Load, Nilotpal Sarmah
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
One of the most promising network that has emerged from the technology world is the mobile ad-hoc network or MANET. It is a type of multi-hop network. Wireless by nature, MANETs do not have a specific network infrastructure. It is a collection of wireless mobile devices that communicate with each other without the help of any third party backbone like a base-station or a router. It can be hard to imagine how every node in this type of network communicate with one another without having a router. In MANETs, nodes change locations with time, configure themselves and get the information …
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Research Collection School Of Computing and Information Systems
Influential user can play a crucial role in online social networks. This paper documents an empirical study aiming at exploring the effects of influential users in the context of music social network. To achieve this goal, music diffusion graph is developed to model how information propagates over network. We also propose a heuristic method to measure users' influences. Using the real data from Last. fm, our empirical test demonstrates key effects of influential users and reveals limitations of existing influence identification/characterization schemes.
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan
Sew-Ing A Simple Endorsement Web To Incentivize Trustworthy Participatory Sensing, T. Luo, S. Kanhere, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Two crucial issues to the success of participatory sensing are (a) how to incentivize the large crowd of mobile users to participate and (b) how to ensure the sensing data to be trustworthy. While they are traditionally being studied separately in the literature, this paper proposes a Simple Endorsement Web (SEW) to address both issues in a synergistic manner. The key idea is (a) introducing a social concept called nepotism into participatory sensing, by linking mobile users into a social “web of participants” with endorsement relations, and (b) overlaying this network with investment-like economic implications. The social and economic layers …
Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures
Security Analysis Of Phasor Measurement Units In Smart Grid Communication Infrastructures
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. By utilizing GPS receivers, PMUs can take a wide area snapshot of power systems. Thus, the possibility of blackouts in the smart grid, the next generation power grid, will be reduced. As the main enabler of Wide Area Measurement Systems (WAMS), PMUs transmit measured values to Phasor Data Concentrators (PDCs) by the synchrophasor standard IEEE C37.118. IEC 61850 and IEC 62351 are the communication protocols for the substation automation system and the security …
Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan
Qos-Aware Data Transmission And Wireless Energy Transfer: Performance Modeling And Optimization, D. Niyato, P. Wang, W. L. Yeow, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
With wireless energy transfer, a mobile node can operate perpetually without having a wired connection to charge its battery. In this paper, we present a quality of service (QoS) aware data transmission and wireless energy transfer for the mobile node. The node can request for wireless energy transfer or transmit a packet when the node is in a coverage area of an access point. The node supports service differentiation for different type of traffic (i.e., low and high priority data). To meet the QoS requirement of each traffic type, we present the performance modeling and optimization framework. The objective is …
A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan
A Lightweight And Robust Interference Mitigation Scheme For Wireless Body Sensor Networks In Realistic Environments, S. Liang, Y. Ge, S. Jiang, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
In dense deployments of Wireless Body Sensor Networks (WBSNs), inter-user interference significantly degrades network performance when multiple WBSN users stay in a small area such as hospitals. Due to the high dynamics of the environments, it is usually hard to schedule the transmissions of multiple WBSNs without a central controller. In this paper, we propose a robust and lightweight interference mitigation scheme for realistic WBSN systems through adaptive channel hopping. A WBSN testbed is set up to investigate the impact of inter-user interference on various performance metrics when different severity levels of interference are present. Based on the measurement results, …
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
All Faculty Scholarship
Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …
A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo
A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo
All Faculty Scholarship
NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.
NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Research outputs 2014 to 2021
With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …
Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen
Efficient Cooperative Mimo Paradigms For Cognitive Radio Networks, Wei Chen, Liang Hong, Xiaoqian Chen
Computer Science Faculty Research
This paper investigates the benefits that cooperative communication brings to cognitive radio networks. We focus on cooperative Multiple Input Multiple Output (MIMO) technology, where multiple distributed single-antenna secondary users cooperate on data transmission and reception. Three cooperative MIMO paradigms are proposed to maximize the diversity gain and significantly improve the performance of overlay, underlay and interweave systems. In the paradigm for overlay systems the secondary users can assist (relay) the primary transmissions even when they are far away from the primary users. In the paradigm for underlay systems the secondary users can share the primary users’ frequency resources without any …
New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar
New Operations On Intuitionistic Fuzzy Soft Sets Based On First Zadeh's Logical Operators, Florentin Smarandache, Said Broumi, Pinaki Majumdar
Branch Mathematics and Statistics Faculty and Staff Publications
In this paper , we have defined First Zadeh’s implication , First Zadeh’s intuitionistic fuzzy conjunction and intuitionistic fuzzy disjunction of two intuitionistic fuzzy soft sets and some their basic properties are studied with proofs and examples.
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang
Cross-Domain Password-Based Authenticated Key Exchange Revisited, Liqun Chen, Hoon Wei Lim, Guomin Yang
Research Collection School Of Computing and Information Systems
We revisit the problem of secure cross-domain communication between two users belonging to different security domains within an open and distributed environment. Existing approaches presuppose that either the users are in possession of public key certificates issued by a trusted certificate authority (CA), or the associated domain authentication servers share a long-term secret key. In this article, we propose a generic framework for designing four-party password-based authenticated key exchange (4PAKE) protocols. Our framework takes a different approach from previous work. The users are not required to have public key certificates, but they simply reuse their login passwords, which they share …
Technological Determinism And Its Discontents, Christopher S. Yoo
Technological Determinism And Its Discontents, Christopher S. Yoo
All Faculty Scholarship
This book review takes a critical review of the claim advanced by Susan Crawford in Captive Audience that the merger between Comcast and NBC Universal would harm consumers and that policymakers should instead promote common carriage regulation and subsidize municipal symmetrical gigabit fiber-to-the-home (FTTH). First it evaluates the extent to which next-generation digital subscriber lines (DSL) and wireless broadband technologies can serve as effective substitutes for cable modem service, identifying FCC data showing that the market has become increasingly competitive and likely to continue to do so. Furthermore, the market is not structured in a way that would permit the …
Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez
Evaluating Electronic Market Designs: The Effects Of Competitive Arousal And Social Facilitation On Electronic Group Buying, Yuecheng Yu, Karl R. Lang, Alex Pelaez
Research Collection School Of Computing and Information Systems
This article presents an evaluation approach foralternative electronic market designs and examines theimpact of competitive arousal under time pressure onmarket performance in a group-buying setting. Drawingon theory from economics, decision theory, andinformation systems, we present a competitive arousalmodel for a social buying setting that posits thatintroducing competitive arousal among buyers reducesbuyer profits and that social facilitation can mitigate thesecosts through better task completion and time tocompletion rates. Using an economic experiment, wefound that rivalry has a negative effect on buyer profitsbut also that competitive arousal increases the efficiencyof social facilitation in terms of group formation. Wediscuss the implications of these …