Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1328 Full-Text Articles 1322 Authors 243328 Downloads 78 Institutions

All Articles in OS and Networks

Faceted Search

1328 full-text articles. Page 1 of 37.

Quo Vadis-A Framework For Intelligent Routing In Large Communication Networks., Armin Mikler, Johnny S. Wong, Vasant Honavar 2017 Iowa State University

Quo Vadis-A Framework For Intelligent Routing In Large Communication Networks., Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

This paper presents Quo Vadis, an evolving framework for intelligent traffic management in very large communication networks. Quo Vadis is designed to exploit topological properties of large networks as well as their spatio-temporal dynamics to optimize multiple performance criteria through cooperation among nodes in the network. It employs a distributed representation of network state information using local load measurements supplemented by a less precise global summary. Routing decisions in Quo Vadis are based on parameterized heuristics designed to optimize various performance metrics in an anticipatory or pro-active as well as compensatory or reactive mode and to minimize the overhead associated ...


An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar 2017 Iowa State University

An Object Oriented Approach To Modeling And Simulation Of Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

The complexity (number of entities, interactions between entities, and resulting emergent dynamic behavior) of large communication environments which contain hundreds of nodes and links make simulation an important tool for the study of such systems. Given the difficulties associated with complete analytical treatment of complex dynamical systems, it is often the only practical tool that is available. This paper presents an example of a flexible, modular, object-oriented toolbox designed to support modeling and experimental analysis of a large family of heuristic knowledge representation and decision functions for adaptive self-managing communication networks with particular emphasis on routing strategies. It discusses in ...


Feature Selection In Intrusion Detection System Over Mobile Ad-Hoc Network, Xia Wang, Tu-liang Lin, Johnny S. Wong 2017 Iowa State University

Feature Selection In Intrusion Detection System Over Mobile Ad-Hoc Network, Xia Wang, Tu-Liang Lin, Johnny S. Wong

Johnny Wong

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people�s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitoring intrusion detection method. Further analysis shows that the features collected by each node are too many for wireless devices with limited capacity. We apply Markov Blanket algorithm [1] to the feature selection of the intrusion detection method. Experimental studies have shown that Markov Blanket algorithm ...


Quo Vadis - Adaptive Heuristics For Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar 2017 Iowa State University

Quo Vadis - Adaptive Heuristics For Routing In Large Communication Networks, Armin Mikler, Johnny S. Wong, Vasant Honavar

Johnny Wong

This paper presents Quo Vadis, an evolving framework for intelligent traffic management in very large communication networks. Quo Vadis is designed to exploit topological properties of large networks as well as their spatio-temporal dynamics to optimize multiple performance criteria through cooperation among nodes in the network. It employs a distributed representation of network state information using local load measurements supplemented by a less precise global summary. Routing decisions in Quo Vadis are based on parameterized heuristics designed to optimize various performance metrics in an anticipatory or pro-active as well as compensatory or reactive mode and to minimize the overhead associated ...


The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong 2017 Iowa State University

The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong

Johnny Wong

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to the detected attack was selected and deployed manually, in the recent years the focus has shifted towards developing automated and semi-automated methodologies for responding to intrusions. In this context, the cost-sensitive intrusion response models have gained the most interest mainly due to their emphasis on the balance between potential damage incurred by the intrusion and cost of the response. However, one of the challenges in applying this approach is defining consistent and adaptable measurement of these cost factors on the ...


Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong 2017 Iowa State University

Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong

Johnny Wong

This paper introduces an approach to automatic synthesis of the specification models of rout- ing protocol behavior from the observed flow of the network traffic. In particular, our technique generalizes the monitored sequences of routing messages constructing a high-level abstract view of the protocol. The basis of our method is similar to Inductive Logic Programming technique that derives a sound hypothesis from the individual examples. We conduct preliminary experi- ments on the example of AODV and DSR ad-hoc routing protocols and discuss the effectiveness of the generated specification models in detecting protocol misuses.


Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong 2017 Iowa State University

Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong

Johnny Wong

Utility theory offers an elegant and powerful theoretical framework for design and analysis of autonomous adaptive communication networks. Routing of messages in such networks presents a real-time instance of a multi-criterion quasi-optimization problem in a dynamic and uncertain environment. In this paper, we examine several heuristic decision functions that can be used to guide messages along a near-optimal (e.g., minimum delay) path in a large network. We present an analysis of properties of such heuristics under a set of simplifying assumptions about the network topology and load dynamics. In particular, we identify the conditions under which one such utility-theoretic ...


Community Detection In Social Networks, Ketki Kulkarni 2017 San Jose State University

Community Detection In Social Networks, Ketki Kulkarni

Master's Projects

The rise of the Internet has brought people closer. The number of interactions between people across the globe has gone substantially up due to social awareness, the advancements of the technology, and digital interaction. Social networking sites have built societies, communities virtually. Often these societies are displayed as a network of nodes depicting people and edges depicting relationships, links. This is a good and e cient way to store, model and represent systems which have a complex and rich information. Towards that goal we need to nd e ective, quick methods to analyze social networks. One of the possible solution ...


Influence Detection And Spread Estimation In Social Networks, Madhura Kaple 2017 San Jose State University

Influence Detection And Spread Estimation In Social Networks, Madhura Kaple

Master's Projects

A social network is an online platform, where people communicate and share information with each other. Popular social network features, which make them di erent from traditional communication platforms, are: following a user, re-tweeting a post, liking and commenting on a post etc. Many companies use various social networking platforms extensively as a medium for marketing their products. A xed amount of budget is alloted by the companies to maximize the positive in uence of their product. Every social network consists of a set of users (people) with connections between them. Each user has the potential to extend its in ...


Comparative Analysis Of Graph Partitioning Algorithms In Context Of Computation Offloading, San Ha Seo, Jeremy Straub 2017 North Dakota State University--Fargo

Comparative Analysis Of Graph Partitioning Algorithms In Context Of Computation Offloading, San Ha Seo, Jeremy Straub

Jeremy Straub

This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.


Socket Golf - Building A Google Cardboard Game In Unity, Caleb P. Carlson 2017 University of Wyoming

Socket Golf - Building A Google Cardboard Game In Unity, Caleb P. Carlson

Honors Theses AY 16/17

Virtual reality is a new and emerging technology in the field of computer science designed to immerse the consumer into the product. To study and learn more about this technology, a four-person team of graduating seniors set out to build a mobile game for Google Cardboard. The game that was created uses the Unity game engine along with Unity multiplayer servers for the development tools. The application was designed to be run using both a Google Cardboard headset and an android controller to allow the user to control the game without removing themselves from the immersive experience.

The idea for ...


Monitoring The Dark Web, John Schriner 2017 CUNY Queensborough Community College

Monitoring The Dark Web, John Schriner

Publications and Research

This paper focuses on how researchers monitor the Dark Web. After defining what onion services and Tor are, we discuss tools for monitoring and securing onion services. As Tor Project itself is research-driven, we find that the development and use of these tools help us to project where use of the Dark Web is headed.


Eassistant: Cognitive Assistance For Identification And Auto-Triage Of Actionable Conversations, Hamid R. Motahari Nezhad, Kalpa Gunaratna, Juan Cappi 2017 Wright State University - Main Campus

Eassistant: Cognitive Assistance For Identification And Auto-Triage Of Actionable Conversations, Hamid R. Motahari Nezhad, Kalpa Gunaratna, Juan Cappi

Kno.e.sis Publications

The browser and screen have been the main user interfaces of the Web and mobile apps. The notification mechanism is an evolution in the user interaction paradigm by keeping users updated without checking applications. Conversational agents are posed to be the next revolution in user interaction paradigms. However, without intelligence on the triage of content served by the interaction and content differentiation in applications, interaction paradigms may still place the burden of information overload on users. In this paper, we focus on the problem of intelligent identification of actionable information in the content served by applications, and in particular in ...


An Indoor Navigation System Using A Sensor Fusion Scheme On Android Platform, Jiayi Xin 2017 Marquette University

An Indoor Navigation System Using A Sensor Fusion Scheme On Android Platform, Jiayi Xin

Master's Theses (2009 -)

With the development of wireless communication networks, smart phones have become a necessity for people’s daily lives, and they meet not only the needs of basic functions for users such as sending a message or making a phone call, but also the users’ demands for entertainment, surfing the Internet and socializing. Navigation functions have been commonly utilized, however the navigation function is often based on GPS (Global Positioning System) in outdoor environments, whereas a number of applications need to navigate indoors. This paper presents a system to achieve high accurate indoor navigation based on Android platform. To do this ...


Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge 2017 Marquette University

Network-On-Chip Based H.264 Video Decoder On A Field Programmable Gate Array, Ian Barge

Master's Theses (2009 -)

This thesis develops the first fully network-on-chip (NoC) based h.264 video decoder implemented in real hardware on a field programmable gate array (FPGA). This thesis starts with an overview of the h.264 video coding standard and an introduction to the NoC communication paradigm. Following this, a series of processing elements (PEs) are developed which implement the component algorithms making up the h.264 video decoder. These PEs, described primarily in VHDL with some Verilog and C, are then mapped to an NoC which is generated using the CONNECT NoC generation tool. To demonstrate the scalability of the proposed ...


A Comprehensive Context-Aware Interruption Management System, April Chunjiao Song 2017 Marquette University

A Comprehensive Context-Aware Interruption Management System, April Chunjiao Song

Master's Theses (2009 -)

The interruption system is an application that prevents the user from noticing phone calls when he/she is busy, by turning off the ringtone. In a previous project, the user can enter his/her class and work schedule on Google Calendar. The intelligent interruption system can detect if the current time matches the range of one of the events in the user's Google Calendar. Other contexts considered were: driving, relationship of the callers, and proximity of Bluetooth devices. This project is a continuation of the interruption system. We consider additional context, social media such as Twitter. Research is done ...


Java Server Reliability In The Presence Of Failures, Rich Coe 2017 Marquette University

Java Server Reliability In The Presence Of Failures, Rich Coe

Master's Theses (2009 -)

A design for the separation of a server interface and work processing. Numerous sources, Tanenbaum (Tanenbaum Modern Operating Systems, 493), Goscinski (Goscinski Distributed operating systems, 203), and Birman (Birman Reliable distributed systems, 265), all discuss the concept of Two-Phase Commit, where a coordinator directs one or more processes to perform a transaction. If the transaction or any of the processes fail, the coordinator can decide how to proceed by either retrying or aborting the request. The popular web browser Chrome utilizes a separate process for each tab displayed. Should the rendering and display of a web page cause a crash ...


Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian WU, Akshat KUMAR, Daniel SHELDON 2017 Singapore Management University

Robust Optimization For Tree-Structured Stochastic Network Design, Xiaojian Wu, Akshat Kumar, Daniel Sheldon

Research Collection School Of Information Systems

Stochastic network design is a general framework for optimizing network connectivity. It has several applications in computational sustainability including spatial conservation planning, pre-disaster network preparation, and river network optimization. A common assumption in previous work has been made that network parameters (e.g., probability of species colonization) are precisely known, which is unrealistic in real- world settings. We therefore address the robust river network design problem where the goal is to optimize river connectivity for fish movement by removing barriers. We assume that fish passability probabilities are known only imprecisely, but are within some interval bounds. We then develop a ...


Streaming Classification With Emerging New Class By Class Matrix Sketching, Xin MU, Feida ZHU, Juan Du, Ee-peng LIM, Zhi-Hua ZHOU 2017 Singapore Management University

Streaming Classification With Emerging New Class By Class Matrix Sketching, Xin Mu, Feida Zhu, Juan Du, Ee-Peng Lim, Zhi-Hua Zhou

Research Collection School Of Information Systems

Streaming classification with emerging new class is an important problem of great research challenge and practical value. In many real applications, the task often needs to handle large matrices issues such as textual data in the bag-of-words model and large-scale image analysis. However, the methodologies and approaches adopted by the existing solutions, most of which involve massive distance calculation, have so far fallen short of successfully addressing a real-time requested task. In this paper, the proposed method dynamically maintains two low-dimensional matrix sketches to 1) detect emerging new classes; 2) classify known classes; and 3) update the model in the ...


Recurrent Neural Networks With Auxiliary Labels For Cross-Domain Opinion Target Extraction, DING YING, YU, JIANFEI, Jing JIANG 2017 Singapore Management University

Recurrent Neural Networks With Auxiliary Labels For Cross-Domain Opinion Target Extraction, Ding Ying, Yu, Jianfei, Jing Jiang

Research Collection School Of Information Systems

Opinion target extractionis a fundamental task in opinion mining. In recent years,neural network based supervised learning methods haveachieved competitive performance on this task. However, aswith any supervised learning method, neural network basedmethods for this task cannot work well when the training datacomes from a different domain than the test data. On the otherhand, some rule-based unsupervisedmethods have shown to berobust when applied to different domains. In this work, weuse rule-based unsupervised methods to create auxiliary labelsand use neural network models to learn a hiddenrepresentation that works well for different domains. When this hiddenrepresentation is used for opinion target extraction ...


Digital Commons powered by bepress