UBM: TECH DIGITAL RESOURCE LIBRARY

University of Illinois


Latest Content From University of Illinois

Whitepaper: Outsourcing Risk? The Regulation Of Occupational Health And Safety Where Subcontractors Are Employed

by University of IllinoisJan 01, 2008

Outsourcing has emerged as a major problem for OHS regulators in both Australia and the United States. It increases the likelihood of multi-employer worksites, corner-cutting, and dangerous forms of work disorganization, as well as situations where the legal responsibilities of employers are more ambiguous and attenuated. While subcontracting and the leasing of workers had been a long-term feature of the some industries (like construction), the expansion of these practices to other industries creates additional logistical demands on often already stretched inspectorates.


Whitepaper: Social Security For All: Global Trends And Challenges

by University of IllinoisJan 01, 2008

The universal right to social security is actually a fundamental aspect of the view of the world that emerged from World War II. Together with full employment, particularly for male breadwinners, social security is intended to give everyone socio-economic security and access to comprehensive medical care. Since then the world has undergone profound change, and the context in which the right to social security is to be implemented is very different. This is true both in industrialized world and in the developing countries, and is the result of large-scale economic, social, political transformations, and also of the dominance of economics.


Whitepaper: MTSF: A Timing Synchronization Protocol to Support Synchronous Operations in Multihop Wireless Networks

by University of IllinoisJan 01, 2008

This paper published by MTSF proposes a protocol for synchronizing time in multihop wireless networks. Protocols for power management or dynamic channel assignment often require synchronous operations, such as waking up at the same time or listening to a common channel. Having the nodes synchronized in time is often crucial for these protocols to work. The proposed synchronization protocol, called MTSF (Multihop Timing Synchronization Function), successfully synchronizes time in a multihop network, at a low cost.


Whitepaper: A Multi-Channel MAC Protocol for Ad Hoc Wireless Networks

by University of IllinoisJan 01, 2008

This paper presents a multi-channel MAC protocol that utilizes multiple channels to improve throughput in wireless networks. The proposed scheme requires only one transceiver for each host, while other multi-channel MAC protocols require multiple transceivers for each host. The nodes in the network are synchronized by beacons, and the channels are negotiated in the ATIM window using ATIM packets. After the ATIM window, nodes switch to their selected channel and exchange messages on that channel for the rest of the beacon interval.


Whitepaper: An Initial Assessment of Cooperative Action in Wi-Fi Networking

by University of IllinoisJan 01, 2008

In the development of past infrastructures, cooperative and amateur action has been a vehicle for diffusion, experimentation, innovation, popularization, and the provision of new features or services. 802.11 (""Wi-Fi"") cooperatives are now proliferating. This research paper from University of Illinois at Urbana-Champaign considers three cases of cooperative action in the discovery, development, and provision of 802.11 (Wi-Fi) networks: mapping and ""Warchalking,"" open-source portal software, and the provision of service as an alternative to paying for a commercial subscription.


Whitepaper: Report on HDF Browser Plug-In Project

by University of IllinoisJan 01, 2008

The NCSA HDF team provides a Java application, HDFview, that implements a graphical browse and editor, which works with HDF4, HDF5 and has optional plug-ins for HDF-EOS, FITS, and netCDF3. In other work, the author investigated Client-Server approaches, include Java Remote Method Invocation, CORBA, and Web Services. This paper discusses investigations of how to implement a Web browser plug-in that can browse Hierarchical Data Format (HDF) files. The HDFView browser and other tools provide stand-alone tools for accessing HDF files. The main goal of the HDF browser plug-in is to provide a similar ability to browse HDF using standard Web browsers.


Whitepaper: Selfish MAC Layer Misbehavior in Wireless Networks

by University of IllinoisJan 01, 2008

IEEE 802.11 requires hosts competing for access to the channel to wait for a ""Backoff"" interval, randomly selected from a specified range, before initiating a transmission. Selfish hosts may wait for smaller back off intervals than well-behaved hosts, thereby obtaining an unfair advantage. This paper published by MAC presents modifications to the IEEE 802.11 protocol to simplify detection of such selfish hosts, and analyze the optimality of the chosen strategy. It also presents a penalty scheme for punishing selfish misbehavior.


Whitepaper: Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

by University of IllinoisJan 01, 2008

The available network capacity can be increased by using multiple channels, but this requires the development of new protocols specifically designed for multi-channel operation. Here one gets to know the problem of improving the capacity of multi-channel wireless networks by using multiple interfaces. It proposes an interface assignment strategy that can be implemented over existing IEEE 802.11 hardware, and is well-suited for ad hoc networks. A new routing protocol is proposed that is specifically designed for multi-channel, multi-interface wireless networks.


Whitepaper: Hybrid Secure-Entry System

by University of IllinoisJan 01, 2008

A relatively low-cost secure-entry system is designed and built that can be applied to almost any door in need of controlled access. This system is a ""hybrid"" because it employs multiple forms of validation namely; Radio Frequency IDentification (RFID), voice recognition, and face recognition are used. The purpose of the project presented in this paper is to leverage the current knowledge of circuits and signal processing to engineer a more secure and stable security system that would not require the user to swipe a magnetic stripe card to unlock.


Whitepaper: Wireless B2B Mobile Commerce: A Study on the Usability, Acceptance, and Process Fit

by University of IllinoisJan 01, 2008

Mobile technologies have gained much attention recently, not only as part of consumer-oriented products and applications, but also as a tool to augment business strategies and to support organizational processes, in particular when integrated with Internet-based technologies (Economist 2001, Varshney and Vetter 2001, Barnes 2002, Smith et al. 2002). This research present an empirical study that investigates employees’ initial acceptance of mobile commerce solutions, as well as the relationships between organizational tasks and the use of different mobile applications in an enterprise setting.