Aachen University

Displaying 1-16 of 16 results

  • White Papers // Dec 2013

    Provable Security Proofs and their Interpretation in the Real World

    In this paper the authors analyze provable security proofs, using the EDL signature scheme as its case study, and interpret their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential...

    Provided By Aachen University

  • White Papers // Nov 2013

    Modeling Cloud Architectures as Interactive Systems

    The development and maintenance of cloud software is complicated by complex but crucial technological requirements that are tightly coupled with each other and with the software's actual business functionality. Consequently, the complexity of design, implementation, deployment, and maintenance activities increases. The authors present an architecture description language that raises the...

    Provided By Aachen University

  • White Papers // Oct 2013

    Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

    The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far....

    Provided By Aachen University

  • White Papers // Feb 2013

    Malware Proof on Mobile Phone Exhibits Based on GSM/GPRS Traces

    In this paper, the authors present a system for proving the existence of malware on mobile phones that are exhibits in a criminal investigation. The system masquerades as legitimate GSM/GPRS network and thus is able to intercept and process all traffic sent from and received by the mobile. Eavesdropping the...

    Provided By Aachen University

  • White Papers // Oct 2012

    Profiling of OpenMP Tasks With Score-P

    With the task construct, the Open-MP 3.0 specification introduces an additional level of parallelism that challenges established schemes of performance profiling. First, a thread may execute a sequence of interleaved task fragments the profiling system must properly distinguish to enable correct performance analyses. Finally, as a new programming paradigm, tasking...

    Provided By Aachen University

  • White Papers // Oct 2011

    Further Improving the Scalability of the Scalasca Toolset

    Although, Scalasca was already successfully used with codes running with 294,912 cores on a 72-rack Blue Gene/P system, the current software design shows scalability limitations that adversely an affect user experience and that will present a serious obstacle on the way to mastering larger scales in the future. In this...

    Provided By Aachen University

  • White Papers // Jun 2011

    DYPROTO - Tools for Dynamic Business Processes

    In this paper, the authors present research results about tools for supporting dynamic business processes. This paper has been conducted in three-year cooperation between their department and an IT service provider for insurance companies. Their partner's Process Management System (PMS) is rather aligned with static processes, whose structure is not...

    Provided By Aachen University

  • White Papers // May 2011

    Benchmarking Inter and Intra Operator Parallelism on Contemporary Desktop Hardware

    Distributed DataBase Systems (DDBS) had appeared more than three decades ago and since that time there is constant demand in DDBS technologies. In this paper, the authors explore effects of threading regarding inter and intra operator parallelism in a distributed database system. They review several well-known join techniques and evaluate...

    Provided By Aachen University

  • White Papers // Apr 2011

    Bandwidth Assignment for Reliable Fixed Broadband Wireless Networks

    In this paper, the authors investigate on conceiving reliable fixed broadband wireless networks under outage probability constraints. They introduce a joint model of data routing and bandwidth assignment that minimizes the total renewal fees of licenses. This problem differs from classical capacity planning since the capacity of microwave links is...

    Provided By Aachen University

  • White Papers // Nov 2010

    From Cloud Computing to Mobile Internet, From User Focus to Culture and Hedonism The Crucible of Mobile Health Care and Wellness Applications

    With the rise of mobile Internet and cloud computing new ubiquitous medical services will emerge coinciding with changes in demographics and social structures. Mobile e-health and wellness applications can help relieving the burden of accelerating health care costs due to aging societies. In order to leverage these new innovations a...

    Provided By Aachen University

  • White Papers // Jan 2010

    Towards Architectural Programming of Embedded Systems

    Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statement, the authors motivate a combination of architectural description for distributed, asynchronously communicating systems and Java as an example for such an integration. The result is an...

    Provided By Aachen University

  • White Papers // Nov 2009

    On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks

    Wireless Local Area Networks (WLAN) still suffer from a severe performance discrepancy between different users in the uplink. This is because of the spatially varying channel conditions provided by the wireless medium. Cooperative Medium Access Control (MAC) protocols as for example CoopMAC were proposed to mitigate this problem. In this...

    Provided By Aachen University

  • White Papers // Sep 2009

    A High-Level Virtual Platform for Early MPSoC Software Development

    Multiprocessor System-on-Chips (MPSoCs) are nowadays widely used, but the problem of their software development persists to be one of the biggest challenges for developers. Virtual Platforms (VPs) are introduced to the industry, which allow MPSoC software development without a hardware prototype. Nevertheless, for developers in early design stage where no...

    Provided By Aachen University

  • White Papers // Jun 2009

    Mobile Enterprise - A Case Study of Enterprise Service Integration

    A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which provide web services from smart phones, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following the web service interfaces and standards, also on the radio link. Moreover, services...

    Provided By Aachen University

  • White Papers // Jun 2009

    Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls

    This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the...

    Provided By Aachen University

  • White Papers // May 2009

    Optimal Power Masking in Soft Frequency Reuse Based OFDMA Networks

    Soft frequency reuse is a strong tool for co-channel interference mitigation in cellular OFDMA/LTE networks. The performance of such networks significantly depends on the configuration of the power masks that implement the soft frequency reuse patterns. In this paper, the authors investigate the performance of different power mask configurations against...

    Provided By Aachen University

  • White Papers // Oct 2011

    Further Improving the Scalability of the Scalasca Toolset

    Although, Scalasca was already successfully used with codes running with 294,912 cores on a 72-rack Blue Gene/P system, the current software design shows scalability limitations that adversely an affect user experience and that will present a serious obstacle on the way to mastering larger scales in the future. In this...

    Provided By Aachen University

  • White Papers // Oct 2012

    Profiling of OpenMP Tasks With Score-P

    With the task construct, the Open-MP 3.0 specification introduces an additional level of parallelism that challenges established schemes of performance profiling. First, a thread may execute a sequence of interleaved task fragments the profiling system must properly distinguish to enable correct performance analyses. Finally, as a new programming paradigm, tasking...

    Provided By Aachen University

  • White Papers // Jun 2009

    Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls

    This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the...

    Provided By Aachen University

  • White Papers // Sep 2009

    A High-Level Virtual Platform for Early MPSoC Software Development

    Multiprocessor System-on-Chips (MPSoCs) are nowadays widely used, but the problem of their software development persists to be one of the biggest challenges for developers. Virtual Platforms (VPs) are introduced to the industry, which allow MPSoC software development without a hardware prototype. Nevertheless, for developers in early design stage where no...

    Provided By Aachen University

  • White Papers // Nov 2009

    On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks

    Wireless Local Area Networks (WLAN) still suffer from a severe performance discrepancy between different users in the uplink. This is because of the spatially varying channel conditions provided by the wireless medium. Cooperative Medium Access Control (MAC) protocols as for example CoopMAC were proposed to mitigate this problem. In this...

    Provided By Aachen University

  • White Papers // Jan 2010

    Towards Architectural Programming of Embedded Systems

    Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statement, the authors motivate a combination of architectural description for distributed, asynchronously communicating systems and Java as an example for such an integration. The result is an...

    Provided By Aachen University

  • White Papers // Nov 2010

    From Cloud Computing to Mobile Internet, From User Focus to Culture and Hedonism The Crucible of Mobile Health Care and Wellness Applications

    With the rise of mobile Internet and cloud computing new ubiquitous medical services will emerge coinciding with changes in demographics and social structures. Mobile e-health and wellness applications can help relieving the burden of accelerating health care costs due to aging societies. In order to leverage these new innovations a...

    Provided By Aachen University

  • White Papers // Apr 2011

    Bandwidth Assignment for Reliable Fixed Broadband Wireless Networks

    In this paper, the authors investigate on conceiving reliable fixed broadband wireless networks under outage probability constraints. They introduce a joint model of data routing and bandwidth assignment that minimizes the total renewal fees of licenses. This problem differs from classical capacity planning since the capacity of microwave links is...

    Provided By Aachen University

  • White Papers // May 2009

    Optimal Power Masking in Soft Frequency Reuse Based OFDMA Networks

    Soft frequency reuse is a strong tool for co-channel interference mitigation in cellular OFDMA/LTE networks. The performance of such networks significantly depends on the configuration of the power masks that implement the soft frequency reuse patterns. In this paper, the authors investigate the performance of different power mask configurations against...

    Provided By Aachen University

  • White Papers // Jun 2009

    Mobile Enterprise - A Case Study of Enterprise Service Integration

    A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which provide web services from smart phones, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following the web service interfaces and standards, also on the radio link. Moreover, services...

    Provided By Aachen University

  • White Papers // Dec 2013

    Provable Security Proofs and their Interpretation in the Real World

    In this paper the authors analyze provable security proofs, using the EDL signature scheme as its case study, and interpret their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential...

    Provided By Aachen University

  • White Papers // Feb 2013

    Malware Proof on Mobile Phone Exhibits Based on GSM/GPRS Traces

    In this paper, the authors present a system for proving the existence of malware on mobile phones that are exhibits in a criminal investigation. The system masquerades as legitimate GSM/GPRS network and thus is able to intercept and process all traffic sent from and received by the mobile. Eavesdropping the...

    Provided By Aachen University

  • White Papers // Nov 2013

    Modeling Cloud Architectures as Interactive Systems

    The development and maintenance of cloud software is complicated by complex but crucial technological requirements that are tightly coupled with each other and with the software's actual business functionality. Consequently, the complexity of design, implementation, deployment, and maintenance activities increases. The authors present an architecture description language that raises the...

    Provided By Aachen University

  • White Papers // Oct 2013

    Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

    The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far....

    Provided By Aachen University

  • White Papers // May 2011

    Benchmarking Inter and Intra Operator Parallelism on Contemporary Desktop Hardware

    Distributed DataBase Systems (DDBS) had appeared more than three decades ago and since that time there is constant demand in DDBS technologies. In this paper, the authors explore effects of threading regarding inter and intra operator parallelism in a distributed database system. They review several well-known join techniques and evaluate...

    Provided By Aachen University

  • White Papers // Jun 2011

    DYPROTO - Tools for Dynamic Business Processes

    In this paper, the authors present research results about tools for supporting dynamic business processes. This paper has been conducted in three-year cooperation between their department and an IT service provider for insurance companies. Their partner's Process Management System (PMS) is rather aligned with static processes, whose structure is not...

    Provided By Aachen University