66 results on '"Pal, Ajit"'
Search Results
2. A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Sur, Chul, Jung, Ji Won, Yang, Jong-Phil, and Rhee, Kyung Hyune
- Abstract
In this paper we present a fair and reliable e-commerce model for P2P network, in which communication parties can buy and sell products by P2P contact. In particular, we focus on a fair exchange protocol that is based on collaboration with distributed communication parties and distinguished from the traditional fair exchange protocols based on a central trusted authority. This feature makes our model very attractive in P2P networking environment which does not depend on any central trusted authority for managing communication parties. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
3. Deadlock-Free Distributed Relaxed Mutual-Exclusion Without Revoke-Messages.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, and Kundu, Sukhamay
- Abstract
The revoke mechanism in generalized relaxed distributed mutual exclusion algorithm GRME [1] for eliminating a potential deadlock can cause extensive unnecessary revoke actions by the nodes which fail to receive the required granted-replies to their resource requests within a certain predefined time limit. It may happen that there is actually no deadlock present or that only a few nodes need to revoke some of their resource requests to eliminate the deadlock. We show that if the interference graph G is triangle-free (no three nodes are mutually adjacent), then we can choose the request-sets Ri in GRME in such a way that deadlocks are prevented altogether and there is no need to use revoke-messages, while keeping the resource-use decisions fully distributed and allowing non-interfering nodes to use the resource simultaneously. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
4. Using Inertia and Referrals to Facilitate Satisficing Distributions.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Candale, Teddy, Erete, Ikpeme, and Sen, Sandip
- Abstract
We study the problem of distributed, self-interested agents searching for high-quality service providers where the performance of a service provider depends on its work load. Agents use referrals from peers to locate satisfactory providers. While stable environments may facilitate fast convergence to satisfying states, greedy and myopic behaviors by distributed agents can lead to poor and variable performances for the entire community. We present mechanisms for resource discovery that involve learning, over interactions, both the performance levels of different service providers as well as the quality of referrals provided by other agents. We study parameters controlling system performance to better comprehend the reasons behind the observed performances of the proposed coordination schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
5. Network Mobility Management Using Predictive Binding Update.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Park, Hee-Dong, Kwon, Yong-Ha, Lee, Kang-Won, Choi, Young-Soo, Lee, Sung-Hyup, and Cho, You-Ze
- Abstract
This paper proposes an efficient network mobility management scheme for mobile networks such as trains and buses moving on the predetermined path. In this scheme, each mobile router maintains a database about the list of access routers, their network prefixes, and cell radii on the moving path. The mobile router therefore knows in advance network prefixes and its care-of addresses of all subnets without beacon signals. Using this database and current location information, the mobile router can prepare network layer hand-over with predictive binding update before link layer handover occurs, thereby the service disruption time due to handover will be reduced to the link layer handover latency. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
6. Planning in a Distributed System.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Niyogi, Rajdeep, and Balasubramaniam, Sundar
- Abstract
We identify a type of distributed system where the notion of space in planning is important. We give a formal modeling of the distributed system where planning is done. We show that several interesting planning goals in the model can be specified in a spatio-temporal logic STL. We develop an efficient planning procedure for these goals in the distributed setting. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
7. Mobile Agent Based Message Communication in Large Ad Hoc Networks Through Co-operative Routing Using Inter-agent Negotiation at Rendezvous Points.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Bhaumik, Parama, and Bandyopadhyay, Somprakash
- Abstract
The wide availability of mobile devices together with the technical possibility to form ad-hoc networks paves the way for building highly dynamic communicating communities of mobile users. A challenge is how to deliver messages in such networks incurring least routing overhead. Cooperative routing is a mobile-agent assisted team approach, which utilizes a set of fixed cluster head nodes to provide proper coordination and cooperation for exchanges and sharing of messages in the team. Our routing strategy aims at reducing routing overheads, message traffic and unnecessary random node visits in the network for delivering data. The main benefit provided by cooperative routing is considerable network traffic reduction at high load. We highlight the main components of the system and discuss the agent life cycle in detail together with the parameters and strategies governing the migration of agents, their merging and termination. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
8. Efficient Passive Clustering and Gateway Selection in MANETs.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Shivaprakash, T., Aravinda, C., Deepak, A.P., Kamal, S., Mahantesh, H.L., Venugopal, K.R., and Patnaik, L.M.
- Abstract
Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
9. Analysis of Hierarchical Multicast Protocol in IP Micro Mobility Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Yang, Seung Jei, and Park, Sung Han
- Abstract
In this paper, we analyze the performance of hierarchical multicast protocol in IP micro mobility networks. The most important parameters to provide multicast service in IP micro mobility networks are the connection recovery time and the reconstruction cost of multicast tree according to the host mobility. So we derive the average connection recovery time and total tree reconstruction cost due to the handoff of mobile hosts by considering the hierarchical structure of IP micro mobility networks. We also verify the analytical results by simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Chand, Narottam, Joshi, R.C., and Misra, Manoj
- Abstract
Caching has been widely used to improve system performance in wireless mobile environment. Mobility management is a key component in allowing a client to maintain normal communication with the server while on the move, independent of its location. A cache invalidation strategy ensures that any cached item by a client has same value as on the origin server. Mobility of clients makes the cache maintenance task more complex. This paper extends our previous caching strategy in a wireless environment to handle inter-cell clients' mobility. Experiments are performed to evaluate the proposed strategy and compare the results with other existing strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
11. SEBAG: A New Dynamic End-to-End Connection Management Scheme for Multihomed Mobile Hosts.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Manoj, B.S., Mishra, Rajesh, and Rao, Ramesh R.
- Abstract
The next generation wireless communication devices are expected to be capable of communicating with the best possible network as well as to utilize multiple networks, simultaneously. Existing solutions such as the interoperability mechanisms and the Always Best Connected (ABC) paradigm limit the access of wireless devices to only one, preferably the best possible network. Such schemes, though found to be better than the traditional single interface communication, are limited in their ability to utilize the services in the best possible way. Existing work focuses mainly on network layer or transport layer bandwidth aggregation mechanisms which either need to change the existing TCP protocol or require proxy nodes to perform the bandwidth scheduling process. We, in this paper, propose a new wireless access paradigm for multi-homed hosts based on a session layer bandwidth aggregation mechanism. The major advantages of our solution are the high end-to-end throughput, glitch free transition during both mobility and interface changes, dynamic selection of number of end-to-end paths, and above all our solution can work with existing transport and network layer protocols in today's Internet. In this paper, we provide the architectural and protocol solutions for the proposed scheme and results from extensive simulations and a Linux based implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
12. Tracking of Mobile Terminals Using Subscriber Mobility Pattern with Time-Bound Self Purging Indicators and Regional Route Maps.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Ghosh, R.K., Aggarwala, Saurabh, Mishra, Hemant, Sharma, Ashish, and Mohanty, Hrushikesha
- Abstract
This paper presents a new location management scheme that integrates two key ideas, namely, (i) Subscriber Movement Profile (SMP) based on spatial and temporal locality of the movement of a mobile terminal and (ii) localized updates known as Time-bound Self Purging Indicators (TSPI) generated by a probabilistic approach when a mobile terminal does not adhere to registered profile. The SMP registered by a mobile host is used to predict its cell location based on time specific movement history. The transient deviations from the registered SMP are handled efficiently by TSPIs using a Regional Route Map (RRM). [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
13. A Model for the Distribution Design of Distributed Databases and an Approach to Solve Large Instances.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Fraire H., Héctor, Castilla V., Guadalupe, Hernández R., Arturo, Gómez S., Claudia, Mora O., Graciela, and Godoy V., Arquimedes
- Abstract
In this paper we approach the solution of large instances of the distribution design problem. Traditional approaches do not consider that the size of the instances can significantly affect the efficiency of the solution process. This paper shows the feasibility to solve large scale instances of the distribution design problem by compressing the instance to be solved. The goal of the compression is to obtain a reduction in the amount of resources needed to solve the original instance, without significantly reducing the quality of its solution. In order to preserve the solution quality, the compression summarizes the access pattern of the original instance using clustering techniques. In order to validate the approach we tested it on a new model of the replicated version of the distribution design problem that incorporates generalized database objects. The experimental results show that our approach permits to reduce the computational resources needed for solving large instances, using an efficient clustering algorithm. We present experimental evidence of the clustering efficiency of the algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
14. A Memory Efficient Fast Distributed Real Time Commit Protocol.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Shanker, Udai, Misra, Manoj, and Sarje, A.K.
- Abstract
Most of the past researches [1], [2], [3] investigate the behavior of distributed real time commit protocols either under update or blind write model. The effect of both types of models has not been investigated collectively. These protocols also require a considerable amount of memory for maintaining temporary objects (data structure) created during execution of transactions and block the WORKDONE message if cohort is dependent. This paper presents an optimized distributed real time commit protocol (MEFCP) based on new locking scheme and write operation divided into update and blind write. The proposed protocol optimizes the memory required for maintaining the transient information of lender & borrower [1]. It also sends the WORKDONE message if borrower has locked the data in mode 2 only. We also compared MEFCP with PROMPT and 2SC commit protocols through simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
15. Optimistic Concurrency Control in Firm Real-Time Databases.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Jalal, Anand S., Tanwani, S., and Ramani, A.K.
- Abstract
Concurrency control algorithms for real-time database systems satisfy not only consistency requirements but also meet transaction-timing constraints. Two Phase Locking (2PL) is used often in traditional database systems. However, it has some inherent problems such as the possibility of deadlocks as well as long and unpredictable blocking times. Optimistic concurrency control protocols are non-blocking and deadlock free, but they have the problems of late conflict detection and transaction restarts. Other Concurrency Control techniques, such as Dynamic Adjustment of Serialization Order (DASO) have been found to be better at reducing number of transaction restarts. In this paper, we propose a new optimistic concurrency control algorithm based on DASO using firm deadline in order to effectively reduce number of unnecessary restarts. Since firm real time transaction imparts no value to the system once its deadline expires, therefore in our algorithm, we adjust the timestamp intervals of all conflicting active transactions only after the validating transaction is guaranteed to meet its deadline during the validation phase. A simulator is designed to verify the effectiveness of the proposed method. The simulation results show that the proposed method can significantly reduce the number of unnecessary restarts and thereby improve the miss ratio, commit ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
16. Stochastic Modeling and Performance Analysis for Video-On-Demand Systems.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Tokekar, Vrinda, Ramani, A.K., and Tokekar, Sanjiv
- Abstract
This study deals with the VOD system having limited number of channels and servicing of requests for mixed movies of different durations and popularity. The performance measures such as channel utilization, number of channels in use, blocking probability of channels, etc. are quantified in terms of various design parameters like, total number of channels, users request arrival rate, batching interval and request service rate etc. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
17. Fault Tolerant Routing in Star Graphs Using Fault Vector.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, and Das, Rajib K.
- Abstract
In this paper a fault tolerant routing algorithm for unicasting on star graph is proposed. The routing algorithm does not involve back tracking and uses fault-vectors. Each node in an n-star has a fault-vector of bits. The kth bit of a node's fault-vector is a measure of its routing ability to nodes which are at distance k from itself. The fault-vector of each node can easily be calculated through rounds of information exchanges among neighbor nodes. For a given source destination pair (u,v), the routing algorithm finds a path of length d + h where d is the length of the shortest path between u and v in a fault-free star graph and h = 0, 2 or 4. The space requirement for storing the fault vector is O(n) in each node. Simulation results show that the proposed algorithm far outperforms the routing algorithm based on safety vectors [13]. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
18. Impact of the Columbia Supercomputer on NASA Science and Engineering Applications.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Brooks, Walter, Aftosmis, Michael, Biegel, Bryan, Biswas, Rupak, Ciotti, Robert, Freeman, Kenneth, Henze, Christopher, Hinke, Thomas, Jin, Haoqiang, and Thigpen, William
- Abstract
Columbia is a 10,240-processor supercomputer consisting of 20 Altix nodes with 512 processors each, and currently ranked as one of the fastest in the world. In this paper, we briefly describe the Columbia system and its supporting infrastructure, the underlying Altix architecture, and benchmark performance on up to four nodes interconnected via the InfiniBand and NUMAlink4 communication fabrics. Additionally, three science and engineering applications from different disciplines running on multiple Columbia nodes are described and their performance results are presented. Overall, our results show promise for multi-node application scaling, allowing the ability to tackle compute-intensive scientific problems not previously solvable on available supercomputers. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
19. An Efficient Access Control Model for Highly Distributed Computing Environment.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, and Yang, Soomi
- Abstract
For a secure highly distributed computing environment, we suggest an efficient role based access control using attribute certificate. It reduces management cost and overhead incurred when we change the specification of the role. In this paper, we grouped roles and structured them into the role group relation tree. It results in secure and efficient role updating and distribution. For scalable role specification certificate distribution, multicasting packets are used. We take into account the packet loss and quantify performance enhancements of structuring role specification certificates. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
20. Programming Paradigms for Networked Sensing: A Distributed Systems' Perspective.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Bakshi, Amol, and Prasanna, Viktor K.
- Abstract
Research in embedded networked sensing has primarily focused on the design of hardware architectures for sensor nodes and infrastructure protocols for long lived operation of resource constrained sensor network deployments. There is now an increasing interest in the programming aspects of sensor networks, especially in the broader context of pervasive computing. This paper provides a brief overview of ongoing research in programming of sensor networks and classifies it into layers of abstraction that provide the application developer with progressively higher level primitives to express distributed, phenomenon-centric collaborative computation. As a specific instance of a macroprogramming methodology, we discuss the data driven Abstract Task Graph (ATaG) model and the structure of its underlying runtime system. ATaG separates the application functionality from non-functional aspects, thereby enabling end-to-end architecture-independent programming and automatic software synthesis for a class of networked sensor systems. A prototype visual programming, software synthesis, functional simulation and visualization environment for ATaG has been implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
21. eHSTCP: Enhanced Congestion Control Algorithm of TCP over High-Speed Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Choi, Young-Soo, Park, Hee-Dong, Lee, Sung-Hyup, and Cho, You-Ze
- Abstract
Current TCP congestion control can be inefficient and unstable in high-speed wide area networks due to its slow response with a large congestion window. Several congestion control proposals have already been suggested to solve these problems and two properties have been considered: TCP friendliness and scalability, to ensure that a protocol does not take away too much bandwidth from TCP, while utilizing a bandwidth of high speed networks efficiently. In this paper, we propose a new variant of TCP for a high-speed network which combines delay-based congestion control with loss-based congestion control. Our simulation results show that proposed scheme performs better than the existing high-speed TCP protocols in terms of fairness, stability and scalability, while providing friendliness at the same time. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
22. Effective Static Task Scheduling for Realistic Heterogeneous Environment.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Kim, Junghwan, Rho, Jungkyu, Lee, Jeong-Ook, and Ko, Myeong-Cheol
- Abstract
Effective task scheduling is crucial for achieving good performance in high performance computing. Many scheduling algorithms have been devised for heterogeneous computing, but most of algorithms have not been considered in realistic heterogeneous environments which are not arbitrarily heterogeneous but have locality in communication. In this paper we present new scheduling algorithms by considering the locality. It is thought that critical-path tasks are often important in reducing schedule length, however one of the previous scheduling algorithms, CPOP (Critical-Path-On-a-Processor) does not show good result against to expectation. Our first heuristic uses a cluster of processors for critical-path tasks while a single processor is used in the CPOP. This heuristic well exploits realistic computing environments in which communication costs are not arbitrarily heterogeneous. In an additional heuristic the critical-path tasks are considered to finish (or start) as early as possible when even non critical-path tasks are scheduled. For a performance study five scheduling algorithms are compared by experimenting on three different environments. The experimental results show our scheduling algorithm outperforms the others in the realistic heterogeneous environments. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
23. Semantic Overlay Based Services Routing Between MPLS Domains.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Cao, Chongying, Yang, Jing, and Zhang, Guoqing
- Abstract
Service routing across different MPLS and access networks domains is a critical issue in next generation networks. In spite of being a de facto inter domain routing standard, BGP can not fulfill the inter domain traffic engineering needs and it does not take into account service metrics, which results in the low routing efficiency of BGP. We set up a system model by decomposing the problem. Based on the model, we set up a service network reduction algorithm. At the initial stage we use a grid service instance to map service paths of different MPLS domains, then we construct service network graph, and set up index for service routing based on ontology. At the last stage, we get a single service metric to set up service routing by applying the service ontology metric function. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
24. New Anonymous User Identification and Key Establishment Protocol in Distributed Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Kim, Woo-Hun, and Yoo, Kee-Young
- Abstract
Recently, Wu and Hsu showed that Lee and Chang's anonymous user identification and key establishment protocol was insecure with regard to two attacks and proposed an improved protocol, called the WH protocol. In this paper, we show that the WH protocol is still vulnerable to an unknown-key share attack. Then, we propose an improved protocol to address this problem by applying a mutual authentication method. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
25. Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Das, Ashok Kumar, Das, Abhijit, Mohapatra, Surjyakanta, and Vavilapalli, Srihari
- Abstract
In this paper we propose an improved alternative for the path key establishment phase of bootstrapping in a sensor network. Our scheme lets the network adapt to the deployment configuration by secure transmission of predistributed keys. This results in better connectivity than what path key establishment can yield. The communication overhead for our scheme is comparable with that for path key establishment. Moreover, the assurance of good connectivity allows one to start with bigger key pools, thereby improving resilience against node capture. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
26. Cryptanalysis and Improvement of a Multisignature Scheme.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Das, Manik Lal, Saxena, Ashutosh, and Gulati, V.P.
- Abstract
A multisignature scheme for implementing safe delivery rule in group communication systems (MSGC) was recently proposed by Rahul and Hansdah. In this paper we show that the MSGC scheme is insecure against forgery attack and signature integrity attack. We propose an improved scheme that resists the weaknesses of MSGC scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
27. A Power Aware Routing Strategy for Ad Hoc Networks with Directional Antenna Optimizing Control Traffic and Power Consumption.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Chatterjee, Sanjay, Roy, Siuli, Bandyopadhyay, Somprakash, Ueda, Tetsuro, Iwai, Hisato, and Obana, Sadao
- Abstract
This paper addresses the problem of power aware data routing strategies within ad hoc networks using directional antennas. Conventional routing strategies usually focus on minimizing the number of hops or route errors for transmission but they do not usually focus on the energy depletion of the nodes. In our proposal, if a node in the network has depleted its battery power, then an alternative node would be selected for routing so that not only the power is used optimally but there is an automatic load sharing or balancing among the nodes in the network. The usage of directional antenna in this scheme has some key advantages outperforming the omni-directional counterpart. The space division multiple access, range extension capabilities and power requirement of the directional antenna is itself a reason for its choice. We illustrate how directional antenna can be combined with the power aware routing strategy and using simulations, we quantify the energy benefits and protocol scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
28. A Clustering-Based Selective Probing Framework to Support Internet Quality of Service Routing.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Jariyakul, Nattaphol, and Znati, Taieb
- Abstract
Two Internet-based frameworks, IntServ and Differentiated DiffServ, have been proposed to support service guarantees in the Internet. Both frameworks focus on packet scheduling; as such, they decouple routing from QoS provisioning. This typically results in inefficient routes, thereby limiting the ability of the network to support QoS requirements and to manage resources efficiently. To address this shortcoming, we propose a scalable QoS routing framework to identify and select paths that are very likely to meet the QoS requirements of the underlying applications. Scalability is achieved using selective probing and clustering to reduce signaling and routers overhead. A thorough study to evaluate the performance of the proposed d-median clustering algorithm is conducted. The results of the study show that for power-law graphs the d-median clustering based approach outperforms the set covering method. The results of the study also show that the proposed clustering method, applied to power-law graphs, is robust to changes in size and delay distribution of the network. Finally, the results suggest that the delay bound input parameter of the d-median scheme should be no less than 1 and no more than 4 times of the average delay per one hop of the network. This is mostly due to the weak hierarchy of the Internet resulting from its power-law structure and the prevalence of the small-world property. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
29. Agglomerative Hierarchical Approach for Location Area Planning in a PCSN.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Nandi, Subrata, Mandal, Purna Ch., Halder, Pranab, and Basu, Ananya
- Abstract
Location area (LA) planning in PCSN is a NP-hard problem. In this paper we modeled it as a clustering problem where each LA is considered to be a cluster. Agglomerative Hierarchical Algorithm (AHA) is applied to form the cell clusters. The algorithm starts assuming each cell as a separate cluster. In successive iterations the clusters are merged randomly in a bottom up fashion based on a total cost function (TCF) till the desired numbers of clusters are obtained. Total Cost Evaluation Metric (TCEM) is proposedto compare AHA with other schemes. Experimental results show that AHA provides better results in most of the cases compared to Greedy Heuristic based approach. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
30. Protecting Multicast Sessions from Link and Node Failures in Sparse-Splitting WDM Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Sreenath, Niladhuri, and Prasad, T. Siva
- Abstract
Optical splitting capability at some nodes is necessary to get efficient multicast routing in the wavelength routed wavelength division multiplexing (WDM) networks. There is a growing interest in efficiently protecting multicast sessions against the failure of network components. We propose algorithms for protecting multicast sessions against failure of network components such as links and nodes in a network with sparse splitting and sparse wavelength conversion. The effectiveness of the proposed algorithms is verified through extensive simulation experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
31. Design of an Efficient Error Control Scheme for Time-Sensitive Application on the Wireless Sensor Network Based on IEEE 802.11 Standard.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Lee, Junghoon, Kang, Mikyung, Jin, Yongmoon, Park, Gyungleen, and Kim, Hanil
- Abstract
This paper proposes and analyzes the performance of an efficient error control scheme for time sensitive applications on wireless sensor networks. The proposed scheme divides DCF into HDCF and LDCF without changing PCF, aiming at maximizing the successful retransmission of a packet that carries critical data. While channel estimation obviates the unnecessary polls to the node in channel error during PCF, two level DCF enables prioritized error recovery by making only the high priority packet be retransmitted via HDCF. A good chop value can distribute the retransmission to each period, maximizing recovered weight, or criticality as well as keeping low the possible loss of network throughput. The simulation results show that the proposed scheme can improve recovered weight by 8% while showing 97% successful transmission at maximum for the given simulation parameter. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
32. An Efficient Social Network-Mobility Model for MANETs.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Ghosh, Rahul, Das, Aritra, Venkateswaran, P., Sanyal, S.K., and Nandi, R.
- Abstract
An efficient deployment of a mobile Ad Hoc network (MANET) requires a realistic approach towards the mobility of the hosts who want to communicate with each other over a wireless channel. Since Ad Hoc networks are driven by the human requirements, instead of considering the random movement of the mobile nodes, we concentrate on the social desire of the nodes for getting connected with one another and provide here a framework for the mobility model of the nodes based on Social Network Theory. In this paper, we capture the preferences in choosing destinations of pedestrian mobility pattern on the basis of social factor (ψF) and try to find out the essential impact of ψF on the pause time of the nodes. Further, our paper also provides a mobility distribution pattern, and a relative comparison has been done with Random Way- Point (RWP) Model under a certain constrained simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
33. Stochastic Rate-Control for Real-Time Video Transmission over Heterogeneous Network.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Yun, Jae-Woong, Kim, Hye-Soo, Kim, Jae-Won, Jang, Youn-Seon, and Ko, Sung-Jea
- Abstract
In this paper, we propose a stochastic rate control method to provide seamless video streaming for vertical handoff between WLAN and 3G cellular network. In the proposed method, we first estimate the channel rate by using the state transition probabilities that can be found from the relationship between the packet loss ratio (PLR) and the medium access control (MAC) layer parameters. The proposed method performs bit allocation at the frame level using the estimated channel rate, minimizing the average distortion over an entire sequence as well as variations in distortion between frames. Experimental results indicate that the proposed method provides better visual quality than the existing TMN8 rate control method in heterogeneous wireless network. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
34. Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Chakrabarti, Dibyendu, Maitra, Subhamoy, and Roy, Bimal
- Abstract
Key pre-distribution is an important area of research in Distributed Sensor Networks (DSN). Two sensor nodes are considered connected for secure communication if they share one or more common secret key(s). It is important to analyze the largest subset of nodes in a DSN where each node is connected to every other node in that subset (i.e., the largest clique). This parameter (largest clique size) is important in terms of resiliency and capability towards efficient distributed computing in a DSN. In this paper, we concentrate on the schemes where the key pre-distribution strategies are based on transversal design and study the largest clique sizes. We show that merging of blocks to construct a node provides larger clique sizes than considering a block itself as a node in a transversal design. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
35. On Lightweight Node Scheduling Scheme for Wireless Sensor Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Jiang, Jie, Song, Zhen, Zhang, Heying, and Dou, Wenhua
- Abstract
Energy efficient self-organization is a crucial method to prolong the lifetime of wireless sensor networks consisting of energy constrained sensor nodes. In this paper, we focus on a distributed node scheduling scheme to extend network lifespan. We discuss the network coverage performance when sensor nodes are deployed according to Poisson point process and reveal the internal relationship among the required coverage performance, expected network lifetime and the intensity of Poisson point process. Also the impact of uniformly distributed time asynchrony on network coverage performance is analyzed. Simulation results demonstrate that the proposed scheme works well in the presence of time asynchrony. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
36. Hierarchical Routing in Sensor Networks Using k-Dominating Sets.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Rieck, Michael Q., and Dhar, Subhankar
- Abstract
For a connected graph, representing a sensor network, distributed algorithms for the Set Covering Problem can be employed to construct reasonably small subsets of the nodes, called k-SPR sets. Such a set can serve as a virtual backbone to facilitate shortest path routing, as introduced in [4] and [14]. When employed in a hierarchical fashion, together with a hybrid (partly proactive, partly reactive) strategy, the k-SPR set methods become highly scalable, resulting in guaranteed minimal path routing, with comparatively little overhead. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
37. A New Routing Protocol in Ad Hoc Networks with Unidirectional Links.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Shrestha, Deepesh Man, and Ko, Young-Bae
- Abstract
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc networks, it is not necessary that all nodes have bidirectional link with each other and hence, those algorithms may not perform well while deployed in real situations. In this paper, we propose a scheme for an ad hoc on-demand routing protocol which utilizes the unidirectional links during the data transmission. Simulation shows that it is not only possible to use unidirectional links but it is also better in terms of performance metrics we defined in different situations. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
38. Power Aware Cluster Efficient Routing in Wireless Ad Hoc Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Dhurandher, Sanjay Kumar, and Singh, G.V.
- Abstract
In Ad Hoc networks a routing protocol is either proactive or reactive. The former maintains consistent up-to-date routing information from each node to every other node in the network, whereas the latter creates route to the destination only when desired by the source node using "flooding". In flooding packets are broadcast to all destinations with the expectation that they eventually reach their intended destination. This proves to be very costly in terms of the throughput efficiency and power consumption. For reactive protocols, researchers have tried to enhance the throughput efficiency and reduce power consumption using techniques that cut down flooding. In this paper we propose a routing protocol called Power Aware Cluster Efficient Routing (PACER) protocol for multi-hop wireless networks. In PACER, the network is dynamically organized into partitions called clusters with the objective of maintaining a relatively stable effective topology. The protocol uses the Weight Based Adaptive Clustering Algorithm (WBACA), developed by us for cluster formations. The main objective is to significantly reduce the number of overhead messages and the packet transfer delay. We demonstrate the efficiency of the proposed protocol with respect to average end-to-end delay, control overheads, throughput efficiency and the number of nodes involved in routing. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
39. Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, and Konorski, Jerzy
- Abstract
Ad Hoc LAN systems are noncooperative MAC settings where regular stations are prone to "bandwidth stealing" by greedy ones. The paper formulates a minimum-information model of a LAN populated by mutually impenetrable groups. A framework for a noncooperative setting and suitable MAC protocol is proposed, introducing the notions of verifiability, feedback compatibility and incentive compatibility. For Random Token MAC protocols based on voluntary deferment of packet transmissions, a family of winner policies called RT/ECD-Z is presented that guarantees regular stations a close-to-fair bandwidth share under heavy load. The proposed policies make it hard for greedy stations to select short deferments, therefore they resort to smarter strategies, and the winner policy should leave the regular stations the possibility of adopting a regular strategy that holds its own against any greedy strategy. We have formalized this idea by requiring evolutionary stability and high guaranteed regular bandwidth shares within a set of heuristic strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
40. Optimal Time Slot Assignment for Mobile Ad Hoc Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, and Sinha, Koushik
- Abstract
We present a new approach to find a collision-free transmission schedule for mobile ad hoc networks (MANETs) in a TDM environment. A hexagonal cellular structure is overlaid on the MANET and then the actual demand for the number of slots in each cell is found out. We assume a 2-cell buffering in which the interference among different mobile nodes do not extend beyond cells more than distance 2 apart. Based on the instantaneous cell demands, we propose optimal slot assignment schemes for both homogeneous (all cells have the same demand) and non-homogeneous cell demands by a clever reuse of the time slots, without causing any interference. The proposed algorithms exploit the hexagonal symmetry of the cells requiring time, where m is the number of mobile nodes in the ad hoc network, n and D being the number of cells and diameter of the cellular graph. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
41. Uinta: A P2P Routing Algorithm Based on the User's Interest and the Network Topology.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Jin, Hai, Xu, Jie, Zou, Bin, and Zhang, Hao
- Abstract
Peer-to-peer (P2P) overlay networks, such as CAN, Chord, Pastry and Tapestry, lead to high latency and low efficiency because they are independent of underlying physical networks. A well-routed lookup path in an overlay network with a small number of logical hops can result in a long delay and excessive traffic due to undesirably long distances in some physical links. In these DHT-based P2P systems, each data item is associated with a key and the key/value pair is stored in the node to which the key maps, not considering the data semantic. In this paper, we propose an effective P2P routing algorithm, called Uinta, to adaptively construct a structured P2P overlay network. Uinta not only takes advantages of physical characteristics of the network, but also places data belonging to the same semantic into a cluster and employs a class cache scheme to reduce the lookup routing latency. Simulations make some comparisons between Chord and our Uinta algorithm all running on the GT-ITM transit stub topology. The results show Uinta routing algorithm significantly improves P2P system lookup performance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
42. Churn Resilience of Peer-to-Peer Group Membership: A Performance Analysis.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Baldoni, Roberto, Mian, Adnan Noor, Scipioni, Sirio, and Tucci-Piergiovanni, Sara
- Abstract
Partitioning is one of the main problems in p2p group membership. This problem rises when failures and dynamics of peer participation, or churn, occur in the overlay topology created by a group membership protocol connecting the group of peers. Solutions based on Gossip-based Group Membership (GGM) cope well with the failures while suffer from network dynamics. This paper shows a performance evaluation of SCAMP, one of the most interesting GGM protocol. The analysis points out that the probability of partitioning of the overlay topology created by SCAMP increases with the churn rate. We also compare SCAMP with DET - another membership protocol that deterministically avoids partitions of the overlay. The comparison points out an interesting trade-off between (i) reliability, in terms of guaranteeing overlay connectivity at any churn rate, and (ii) scalability in terms of creating scalable overlay topologies where latencies experienced by a peer during join and leave operations do not increase linearly with the number of peers in the group. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
43. Oasis: A Hierarchical EMST Based P2P Network.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Ghanshani, Pankaj, and Bansal, Tarun
- Abstract
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and event notification services. P2P systems based on Distributed Hash Table (DHT) such as CAN, Chord, Pastry and Tapestry, use uniform hash functions to ensure load balance in the participant nodes. But their evenly distributed behaviour in the virtual space destroys the locality between participant nodes. The topology-based hierarchical overlay networks like Grapes and Jelly, exploit the physical distance information among the nodes to construct a two-layered hierarchy. This highly improves the locality property, but disturbs the concept of decentralization as the leaders in the top layer get accessed very frequently, becoming a performance bottleneck and resulting in a single point of failure. In this paper, we propose an enhanced m-way search tree (EMST) based P2P overlay infrastructure, called Oasis. It is shown through simulation that Oasis can achieve both the decentralization and locality properties along with high fault tolerance and a logarithmic data lookup time. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
44. GToS: Examining the Role of Overlay Topology on System Performance Improvement.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Huang, Xinli, Li, Yin, and Ma, Fanyuan
- Abstract
Gnutella's notoriously poor scaling led some to propose distributed hash table solutions to the wide-area file search problem. Contrary to that trend, in this paper, we advocate retaining Gnutella's simplicity while proposing GToS, a Gnutella-like Topology- oriented Search protocol for high-performance distributed file sharing, by examining the role of overlay topology on system performance improvement. Building upon prior research [10], we propose several modifications as enhancements and then refine these novel ideas, with the aim of trying to remedy the "mismatch" between the logical overlay topology and its projection on the underlying network. We test our design through extensive simulations and the results show a significant system performance improvement. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. Distributed Dynamic Lightpath Allocation in Survivable WDM Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Jaekel, A., and Chen, Y.
- Abstract
There has been considerable research interest in the use of path protection techniques for the design of survivable WDM networks. In this paper, we present a distributed algorithm for dynamic lightpath allocation, using both dedicated and shared path protection. The objective is to minimize the amount of resources (wavelength-links) needed to accommodate the new connection. We have tested our algorithms on a number of well-known networks and compared their performance to "optimal" solutions generated by ILPs. Experimental results show that our algorithm generates solutions that are comparable to the optimal, but are significantly faster and more scalable than corresponding ILP formulations. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. On the Implementation of Links in Multi-mesh Networks Using WDM Optical Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Afroz, Nahid, Bandyopadhyay, Subir, Islam, Rabiul, and Sinha, Bhabani P.
- Abstract
In this paper, we have suggested a novel way to implement the interconnections in the Multi-Mesh (MM) network using optical devices. In a traditional, copper-based approach, the long connections between processors in an interconnection network create major limitations with respect to the speed of communication. Our approach for inter-block communication in a MM uses optical communication using Wavelength Division Multiplexing (WDM). Rather than passive stars or free-space optics, used to implement some recent optoelectronic communication schemes for interconnection networks, this design uses wavelength routed fiber-based networks. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
47. Modeling and Evaluation of a Reconfiguration Framework in WDM Optical Networks.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Tak, Sungwoo, Lee, Donggeun, Prathombutr, Passakon, and Park, E.K.
- Abstract
This paper studies a series of reconfiguration processes corresponding to a series of traffic demand changes in a WDM (Wavelength Division Multiplexing) optical network. The proposed reconfiguration framework consists of two objective functions, a reconfiguration process, and a reconfiguration policy. The two objective functions are AHT (objective function of minimizing Average Hop distance of Traffic) and NLC (objective function of minimizing Number of Lightpath routing Changes). The reconfiguration process finds a set of non-dominated solutions using the PEAP (Pareto Evolutionary Algorithm adapting the Penalty method) that optimizes two objective functions by using the concept of Pareto optimality. The reconfiguration policy picks a solution from the set of non-dominated solutions using the MDA (Markov Decision Action). Experimental results show that our reconfiguration framework incorporating the PEAP and the MDA yields efficient performance in the entire series of reconfiguration processes. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
48. In-Band Crosstalk Performance of WDM Optical Networks Under Different Routing and Wavelength Assignment Algorithms.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Saminadan, V., and Meenakshi, M.
- Abstract
The impact of different routing and wavelength assignment algorithms on the in-band crosstalk performance of a 4 x 4 mesh-torus and a 15-node network has been studied. This paper considers both switch-induced crosstalk and the crosstalk induced by the multiplexers and demultiplexers. Fixed routing and fixed-alternate routing of connection requests have been considered. First-fit and random wavelength assignment algorithms have been employed. A crosstalk-aware wavelength assignment has also been considered. In-band crosstalk leads to poor received signal quality at the destination node. This results in increased receiver bit error rate (BER). This implies that some of the routes will deliver a signal quality which is unsatisfactory. To ensure that no resources are wasted on those connections which cannot deliver an unacceptable signal quality, this paper uses an event-driven simulation which incorporates on-line BER calculations. A call request is accepted only if the BER at the destination node is less than 10-12; otherwise it is rejected. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
49. Self-refined Fault Tolerance in HPC Using Dynamic Dependent Process Groups.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Gopalan, N.P., and Nagarajan, K.
- Abstract
This paper proposes a novel method for achieving a distributed self-refined fault tolerance by dynamically partitioning the processes into smaller groups, which are mutually disjoint and collectively exhaustive of the whole system. The present model provides tolerance for frequent faults, makes the roll back recovery simple and less time consuming. An optimal checkpoint interval is found using a mathematical approximation and a spare process is made to capture all the in-transit messages when a process fails at its ends. Piggybacking the events of dependent processes on the outgoing messages is used for process grouping. A process with maximum information can scatter chunk values to the other dependent processes in its group. Each process constructs a checkpoint when the received chunk matches with its log. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
50. Performance Comparison of Majority Voting with ROWA Replication Method over PlanetLab.
- Author
-
Pal, Ajit, Kshemkalyani, Ajay D., Kumar, Rajeev, Gupta, Arobinda, Bhadoria, Ranjana, Das, Shukti, Misra, Manoj, and Sarje, A.K.
- Abstract
Since the Web started in 1990, it has shown an exponential growth. It is essential that the Web's scalability and performance keep up with increased demand and expectations. The key to achieving these goals of scalability, robustness and responsiveness lies in the practices of caching and replication. Quorum Consensus is a popular protocol used for data replication. This paper describes an implementation of two special cases of Quorum Consensus protocol, namely Majority Voting and Read-One-Write-All (ROWA) and compares their performance. The performance evaluation was done using a number of systems located at PlanetLab member institutions at different locations over the world. This enabled simulation of real world Internet conditions. The study shows that the ROWA protocol performs better than the Majority Voting under no-site-failure conditions in terms of response time, communication overhead and growing number of users. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.