Aachen University

Displaying 1-36 of 36 results

  • White Papers // Jan 2015

    Representing Organizational Structures in an Enterprise Architecture Language

    Enterprise Architecture (EA) promotes the establishment of a holistic view of the structure and way of working of an organization. One of the aspects covered in EA is associated with the organization's "Active structure", which concerns "Who" undertakes organizational activities. Several approaches have been proposed in order to provide a...

    Provided By Aachen University

  • White Papers // Dec 2014

    Discovery of Sequential Patterns with Quantity Factors

    The sequential pattern mining stems from the need to obtain patterns that are repeated in multiple transactions in a database of sequences, which are related to time, or another type of criterion. This paper presents the proposal of a new technique for the discovery of sequential patterns from a database...

    Provided By Aachen University

  • White Papers // Dec 2014

    Development of Framework System for Managing the Big Data From Scientific and Technological Text Archives

    In today's era of big data, increasing attention is being paid to the relationships among different types of data, and not just to those within one type of massive data, while processing and analyzing these data. To analyze and predict the trends of technologies from literatures on the basis of...

    Provided By Aachen University

  • White Papers // Nov 2014

    Business Process Measurement in Small Enterprises After the Installation of an ERP Software

    The authors report the observation of the first six months of operation after the installation of an ERP software in a group of small Italian enterprises (some dealers of various products and one manufacturer). Before the ERP, no explicit process descriptions existed within the companies: the operations were manually performed,...

    Provided By Aachen University

  • White Papers // Nov 2014

    An MDA Approach for Process-Based Collaborative Systems Development

    Since some years ago, an increased competition forces organizations to concentrate on core competencies and to collaborate closely with other organizations. The paper proposes a model-driven approach to design collaborative systems. This approach focuses on the collaborative business process modeling and the generation of the partner's private process models. To...

    Provided By Aachen University

  • White Papers // Oct 2014

    Changing In-Flight Business Processes Using PNMsoft's HotChange Technology

    PNMsoft Sequence is an iBPMS (intelligent Business Process Management Suite). This paper will show how PNMsoft Sequence's HotChange technology enables BPM customers to change processes which are already being run in the production environment. HotChange enables modifications to all aspects of a process including: flow, business rules, form fields, new...

    Provided By Aachen University

  • White Papers // Oct 2014

    Linked Open Data-Enabled Strategies for Top-N Recommendations

    The huge amount of interlinked information referring to different domains, provided by the Linked Open Data (LOD) initiative, could be effectively exploited by recommender systems to deal with the cold-start and sparsity problems. In this paper, the authors investigate the contribution of several features extracted from the Linked Open Data...

    Provided By Aachen University

  • White Papers // Sep 2014

    Visual Specification Language and Automatic Checking of Business Process

    In this paper, the authors propose a visual language for specifying behavioral properties of Business Processes (BP). They use Business Process Modeling Notation (BPMN) to modelize BP, Petri Net as underlying formal foundations, and SPIN model checker to validate the dynamic behaviors of this process. This paper is to propose...

    Provided By Aachen University

  • White Papers // Sep 2014

    Merging Closed Pattern Sets in Distributed Multi-Relational Data

    The authors consider the problem of mining closed patterns from multi-relational databases in a distributed environment. Given two local databases (horizontal partitions) and their sets of closed patterns (concepts), they generate the set of closed patterns in the global database by utilizing the merge (or sub-position) operator, studied in the...

    Provided By Aachen University

  • White Papers // Sep 2014

    Towards Visual EAM Analytics: Explorative Research Study with Master Students

    Enterprise Architectures (EA) consists of many architecture elements, which stand in manifold relationships to each other. Therefore Architecture Analysis is important and very difficult for stakeholders. Due changing an architecture element has impacts on other elements different stakeholders are involved. In practice EAs are often analyzed using visualizations. This paper...

    Provided By Aachen University

  • White Papers // Sep 2014

    Ontological Framework Aimed to Facilitate Business Transformations

    Information systems aimed for the analysis and management of enterprises perceive the reality through their embedded data patterns. These data patterns must be sufficient to store the information about transformations of business processes, products and organizational structure over time. Moreover, customization, extension and integration of data models have not to...

    Provided By Aachen University

  • White Papers // Sep 2014

    An Algorithm for the Multi-Relational Boolean Factor Analysis Based on Essential Elements

    The multi-relational Boolean factor analysis is a method from the family of matrix decomposition methods which enables the user analyze binary multi-relational data, i.e. binary data which are composed from many binary data tables interconnected via relation. In this paper, the authors present a new Boolean matrix factorization algorithm for...

    Provided By Aachen University

  • White Papers // Sep 2014

    How Can SMEs Assess the Risk of Organisational Knowledge?

    Understanding how processes are executed is essential for all companies. While a certain amount of this knowledge can be explicated, a considerable amount is tacit, thus, it is in the mind of the employees. If this knowledge is not shared between organizational members knowledge loss/knowledge attrition is likely to occur....

    Provided By Aachen University

  • White Papers // Sep 2014

    Mining Implications From Data

    Item Tree Analysis (ITA) can be used to mine deterministic relationships from noisy data. In the educational domain, it has been used to infer descriptions of student knowledge from test responses in order to discover the implications between test items, allowing researchers to gain insight into the structure of the...

    Provided By Aachen University

  • White Papers // Sep 2014

    Modeling and Monitoring Processes Exploiting Semantic Reasoning

    Data about process executions has witnessed a notable increase in the last decades, due to the growing adoption of information technology systems able to trace and store this information. Meanwhile, semantic web methodologies and technologies have become more and more robust and able to face the issues posed by a...

    Provided By Aachen University

  • White Papers // Aug 2014

    Towards an Ontological Analysis of BPMN

    Business Process (BP) modeling concerns the analysis and representation of the activities by which companies coordinate their organization and work, produce goods, interact with each other's and customers. The goal is a common conceptual modeling language that can be easily understood to facilitate business communication. BPMN is a de-facto standard...

    Provided By Aachen University

  • White Papers // Aug 2014

    Contextual Itemset Mining in DBpedia

    In this paper, the authors show the potential of contextual itemset mining in the context of Linked Open Data (LOD). Contextual itemset mining extracts frequent associations among items considering background information. In the case of Linked Open Data (LOD), the background information is represented by an ontology defined over the...

    Provided By Aachen University

  • White Papers // Apr 2014

    Programmable Analytics for Linked Open Data

    LOD initiative has made a major impact on data provision. Thus far, more than 800 datasets have been published, containing tens of billions of RDF triples. The sheer size of data has not resulted in a significant increase of data consumption. The authors contend that a new programming paradigm is...

    Provided By Aachen University

  • White Papers // Apr 2014

    Automating the Web Publishing Process of Environmental Data by Using Semantic Annotations

    Large amounts of environmental data are still hidden away in databases only accessible by domain experts. There is the need to make this data available to other experts for further data fusion. To implement standards like the Sensor Observation Service (SOS) huge efforts on the side of environmental agencies are...

    Provided By Aachen University

  • White Papers // Mar 2014

    Towards Process-Based Composition of Activities for Collecting Data in Supply Chains

    Manufacturing companies more and more face the challenge of ensuring sustainable production. In particular, they continuously need to report sustainability data about their products and manufacturing processes that is categorized by various sustainability indicators. However, in a supply chain, such data collection also involves the company's suppliers. Thus, companies must...

    Provided By Aachen University

  • White Papers // Dec 2013

    Provable Security Proofs and their Interpretation in the Real World

    In this paper the authors analyze provable security proofs, using the EDL signature scheme as its case study, and interpret their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential...

    Provided By Aachen University

  • White Papers // Nov 2013

    Modeling Cloud Architectures as Interactive Systems

    The development and maintenance of cloud software is complicated by complex but crucial technological requirements that are tightly coupled with each other and with the software's actual business functionality. Consequently, the complexity of design, implementation, deployment, and maintenance activities increases. The authors present an architecture description language that raises the...

    Provided By Aachen University

  • White Papers // Oct 2013

    Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

    The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far....

    Provided By Aachen University

  • White Papers // Feb 2013

    Malware Proof on Mobile Phone Exhibits Based on GSM/GPRS Traces

    In this paper, the authors present a system for proving the existence of malware on mobile phones that are exhibits in a criminal investigation. The system masquerades as legitimate GSM/GPRS network and thus is able to intercept and process all traffic sent from and received by the mobile. Eavesdropping the...

    Provided By Aachen University

  • White Papers // Oct 2012

    Profiling of OpenMP Tasks With Score-P

    With the task construct, the Open-MP 3.0 specification introduces an additional level of parallelism that challenges established schemes of performance profiling. First, a thread may execute a sequence of interleaved task fragments the profiling system must properly distinguish to enable correct performance analyses. Finally, as a new programming paradigm, tasking...

    Provided By Aachen University

  • White Papers // Oct 2011

    Further Improving the Scalability of the Scalasca Toolset

    Although, Scalasca was already successfully used with codes running with 294,912 cores on a 72-rack Blue Gene/P system, the current software design shows scalability limitations that adversely an affect user experience and that will present a serious obstacle on the way to mastering larger scales in the future. In this...

    Provided By Aachen University

  • White Papers // Jun 2011

    DYPROTO - Tools for Dynamic Business Processes

    In this paper, the authors present research results about tools for supporting dynamic business processes. This paper has been conducted in three-year cooperation between their department and an IT service provider for insurance companies. Their partner's Process Management System (PMS) is rather aligned with static processes, whose structure is not...

    Provided By Aachen University

  • White Papers // May 2011

    Benchmarking Inter and Intra Operator Parallelism on Contemporary Desktop Hardware

    Distributed DataBase Systems (DDBS) had appeared more than three decades ago and since that time there is constant demand in DDBS technologies. In this paper, the authors explore effects of threading regarding inter and intra operator parallelism in a distributed database system. They review several well-known join techniques and evaluate...

    Provided By Aachen University

  • White Papers // Apr 2011

    Bandwidth Assignment for Reliable Fixed Broadband Wireless Networks

    In this paper, the authors investigate on conceiving reliable fixed broadband wireless networks under outage probability constraints. They introduce a joint model of data routing and bandwidth assignment that minimizes the total renewal fees of licenses. This problem differs from classical capacity planning since the capacity of microwave links is...

    Provided By Aachen University

  • White Papers // Nov 2010

    From Cloud Computing to Mobile Internet, From User Focus to Culture and Hedonism The Crucible of Mobile Health Care and Wellness Applications

    With the rise of mobile Internet and cloud computing new ubiquitous medical services will emerge coinciding with changes in demographics and social structures. Mobile e-health and wellness applications can help relieving the burden of accelerating health care costs due to aging societies. In order to leverage these new innovations a...

    Provided By Aachen University

  • White Papers // Jan 2010

    Towards Architectural Programming of Embedded Systems

    Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statement, the authors motivate a combination of architectural description for distributed, asynchronously communicating systems and Java as an example for such an integration. The result is an...

    Provided By Aachen University

  • White Papers // Nov 2009

    On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks

    Wireless Local Area Networks (WLAN) still suffer from a severe performance discrepancy between different users in the uplink. This is because of the spatially varying channel conditions provided by the wireless medium. Cooperative Medium Access Control (MAC) protocols as for example CoopMAC were proposed to mitigate this problem. In this...

    Provided By Aachen University

  • White Papers // Sep 2009

    A High-Level Virtual Platform for Early MPSoC Software Development

    Multiprocessor System-on-Chips (MPSoCs) are nowadays widely used, but the problem of their software development persists to be one of the biggest challenges for developers. Virtual Platforms (VPs) are introduced to the industry, which allow MPSoC software development without a hardware prototype. Nevertheless, for developers in early design stage where no...

    Provided By Aachen University

  • White Papers // Jun 2009

    Mobile Enterprise - A Case Study of Enterprise Service Integration

    A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which provide web services from smart phones, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following the web service interfaces and standards, also on the radio link. Moreover, services...

    Provided By Aachen University

  • White Papers // Jun 2009

    Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls

    This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the...

    Provided By Aachen University

  • White Papers // May 2009

    Optimal Power Masking in Soft Frequency Reuse Based OFDMA Networks

    Soft frequency reuse is a strong tool for co-channel interference mitigation in cellular OFDMA/LTE networks. The performance of such networks significantly depends on the configuration of the power masks that implement the soft frequency reuse patterns. In this paper, the authors investigate the performance of different power mask configurations against...

    Provided By Aachen University

  • White Papers // May 2011

    Benchmarking Inter and Intra Operator Parallelism on Contemporary Desktop Hardware

    Distributed DataBase Systems (DDBS) had appeared more than three decades ago and since that time there is constant demand in DDBS technologies. In this paper, the authors explore effects of threading regarding inter and intra operator parallelism in a distributed database system. They review several well-known join techniques and evaluate...

    Provided By Aachen University

  • White Papers // Sep 2014

    Towards Visual EAM Analytics: Explorative Research Study with Master Students

    Enterprise Architectures (EA) consists of many architecture elements, which stand in manifold relationships to each other. Therefore Architecture Analysis is important and very difficult for stakeholders. Due changing an architecture element has impacts on other elements different stakeholders are involved. In practice EAs are often analyzed using visualizations. This paper...

    Provided By Aachen University

  • White Papers // Apr 2014

    Automating the Web Publishing Process of Environmental Data by Using Semantic Annotations

    Large amounts of environmental data are still hidden away in databases only accessible by domain experts. There is the need to make this data available to other experts for further data fusion. To implement standards like the Sensor Observation Service (SOS) huge efforts on the side of environmental agencies are...

    Provided By Aachen University

  • White Papers // Jan 2015

    Representing Organizational Structures in an Enterprise Architecture Language

    Enterprise Architecture (EA) promotes the establishment of a holistic view of the structure and way of working of an organization. One of the aspects covered in EA is associated with the organization's "Active structure", which concerns "Who" undertakes organizational activities. Several approaches have been proposed in order to provide a...

    Provided By Aachen University

  • White Papers // Aug 2014

    Towards an Ontological Analysis of BPMN

    Business Process (BP) modeling concerns the analysis and representation of the activities by which companies coordinate their organization and work, produce goods, interact with each other's and customers. The goal is a common conceptual modeling language that can be easily understood to facilitate business communication. BPMN is a de-facto standard...

    Provided By Aachen University

  • White Papers // Nov 2014

    Business Process Measurement in Small Enterprises After the Installation of an ERP Software

    The authors report the observation of the first six months of operation after the installation of an ERP software in a group of small Italian enterprises (some dealers of various products and one manufacturer). Before the ERP, no explicit process descriptions existed within the companies: the operations were manually performed,...

    Provided By Aachen University

  • White Papers // Nov 2014

    An MDA Approach for Process-Based Collaborative Systems Development

    Since some years ago, an increased competition forces organizations to concentrate on core competencies and to collaborate closely with other organizations. The paper proposes a model-driven approach to design collaborative systems. This approach focuses on the collaborative business process modeling and the generation of the partner's private process models. To...

    Provided By Aachen University

  • White Papers // Sep 2014

    How Can SMEs Assess the Risk of Organisational Knowledge?

    Understanding how processes are executed is essential for all companies. While a certain amount of this knowledge can be explicated, a considerable amount is tacit, thus, it is in the mind of the employees. If this knowledge is not shared between organizational members knowledge loss/knowledge attrition is likely to occur....

    Provided By Aachen University

  • White Papers // Sep 2014

    Modeling and Monitoring Processes Exploiting Semantic Reasoning

    Data about process executions has witnessed a notable increase in the last decades, due to the growing adoption of information technology systems able to trace and store this information. Meanwhile, semantic web methodologies and technologies have become more and more robust and able to face the issues posed by a...

    Provided By Aachen University

  • White Papers // Mar 2014

    Towards Process-Based Composition of Activities for Collecting Data in Supply Chains

    Manufacturing companies more and more face the challenge of ensuring sustainable production. In particular, they continuously need to report sustainability data about their products and manufacturing processes that is categorized by various sustainability indicators. However, in a supply chain, such data collection also involves the company's suppliers. Thus, companies must...

    Provided By Aachen University

  • White Papers // Sep 2014

    Ontological Framework Aimed to Facilitate Business Transformations

    Information systems aimed for the analysis and management of enterprises perceive the reality through their embedded data patterns. These data patterns must be sufficient to store the information about transformations of business processes, products and organizational structure over time. Moreover, customization, extension and integration of data models have not to...

    Provided By Aachen University

  • White Papers // Dec 2014

    Development of Framework System for Managing the Big Data From Scientific and Technological Text Archives

    In today's era of big data, increasing attention is being paid to the relationships among different types of data, and not just to those within one type of massive data, while processing and analyzing these data. To analyze and predict the trends of technologies from literatures on the basis of...

    Provided By Aachen University

  • White Papers // Apr 2014

    Programmable Analytics for Linked Open Data

    LOD initiative has made a major impact on data provision. Thus far, more than 800 datasets have been published, containing tens of billions of RDF triples. The sheer size of data has not resulted in a significant increase of data consumption. The authors contend that a new programming paradigm is...

    Provided By Aachen University

  • White Papers // Sep 2014

    Merging Closed Pattern Sets in Distributed Multi-Relational Data

    The authors consider the problem of mining closed patterns from multi-relational databases in a distributed environment. Given two local databases (horizontal partitions) and their sets of closed patterns (concepts), they generate the set of closed patterns in the global database by utilizing the merge (or sub-position) operator, studied in the...

    Provided By Aachen University

  • White Papers // Sep 2014

    An Algorithm for the Multi-Relational Boolean Factor Analysis Based on Essential Elements

    The multi-relational Boolean factor analysis is a method from the family of matrix decomposition methods which enables the user analyze binary multi-relational data, i.e. binary data which are composed from many binary data tables interconnected via relation. In this paper, the authors present a new Boolean matrix factorization algorithm for...

    Provided By Aachen University

  • White Papers // Oct 2014

    Linked Open Data-Enabled Strategies for Top-N Recommendations

    The huge amount of interlinked information referring to different domains, provided by the Linked Open Data (LOD) initiative, could be effectively exploited by recommender systems to deal with the cold-start and sparsity problems. In this paper, the authors investigate the contribution of several features extracted from the Linked Open Data...

    Provided By Aachen University

  • White Papers // Dec 2014

    Discovery of Sequential Patterns with Quantity Factors

    The sequential pattern mining stems from the need to obtain patterns that are repeated in multiple transactions in a database of sequences, which are related to time, or another type of criterion. This paper presents the proposal of a new technique for the discovery of sequential patterns from a database...

    Provided By Aachen University

  • White Papers // Aug 2014

    Contextual Itemset Mining in DBpedia

    In this paper, the authors show the potential of contextual itemset mining in the context of Linked Open Data (LOD). Contextual itemset mining extracts frequent associations among items considering background information. In the case of Linked Open Data (LOD), the background information is represented by an ontology defined over the...

    Provided By Aachen University

  • White Papers // Sep 2014

    Mining Implications From Data

    Item Tree Analysis (ITA) can be used to mine deterministic relationships from noisy data. In the educational domain, it has been used to infer descriptions of student knowledge from test responses in order to discover the implications between test items, allowing researchers to gain insight into the structure of the...

    Provided By Aachen University

  • White Papers // Oct 2014

    Changing In-Flight Business Processes Using PNMsoft's HotChange Technology

    PNMsoft Sequence is an iBPMS (intelligent Business Process Management Suite). This paper will show how PNMsoft Sequence's HotChange technology enables BPM customers to change processes which are already being run in the production environment. HotChange enables modifications to all aspects of a process including: flow, business rules, form fields, new...

    Provided By Aachen University

  • White Papers // Sep 2014

    Visual Specification Language and Automatic Checking of Business Process

    In this paper, the authors propose a visual language for specifying behavioral properties of Business Processes (BP). They use Business Process Modeling Notation (BPMN) to modelize BP, Petri Net as underlying formal foundations, and SPIN model checker to validate the dynamic behaviors of this process. This paper is to propose...

    Provided By Aachen University

  • White Papers // Nov 2013

    Modeling Cloud Architectures as Interactive Systems

    The development and maintenance of cloud software is complicated by complex but crucial technological requirements that are tightly coupled with each other and with the software's actual business functionality. Consequently, the complexity of design, implementation, deployment, and maintenance activities increases. The authors present an architecture description language that raises the...

    Provided By Aachen University

  • White Papers // Jun 2009

    Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls

    This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the...

    Provided By Aachen University

  • White Papers // Sep 2009

    A High-Level Virtual Platform for Early MPSoC Software Development

    Multiprocessor System-on-Chips (MPSoCs) are nowadays widely used, but the problem of their software development persists to be one of the biggest challenges for developers. Virtual Platforms (VPs) are introduced to the industry, which allow MPSoC software development without a hardware prototype. Nevertheless, for developers in early design stage where no...

    Provided By Aachen University

  • White Papers // Nov 2009

    On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks

    Wireless Local Area Networks (WLAN) still suffer from a severe performance discrepancy between different users in the uplink. This is because of the spatially varying channel conditions provided by the wireless medium. Cooperative Medium Access Control (MAC) protocols as for example CoopMAC were proposed to mitigate this problem. In this...

    Provided By Aachen University

  • White Papers // Jan 2010

    Towards Architectural Programming of Embedded Systems

    Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statement, the authors motivate a combination of architectural description for distributed, asynchronously communicating systems and Java as an example for such an integration. The result is an...

    Provided By Aachen University

  • White Papers // Nov 2010

    From Cloud Computing to Mobile Internet, From User Focus to Culture and Hedonism The Crucible of Mobile Health Care and Wellness Applications

    With the rise of mobile Internet and cloud computing new ubiquitous medical services will emerge coinciding with changes in demographics and social structures. Mobile e-health and wellness applications can help relieving the burden of accelerating health care costs due to aging societies. In order to leverage these new innovations a...

    Provided By Aachen University

  • White Papers // Apr 2011

    Bandwidth Assignment for Reliable Fixed Broadband Wireless Networks

    In this paper, the authors investigate on conceiving reliable fixed broadband wireless networks under outage probability constraints. They introduce a joint model of data routing and bandwidth assignment that minimizes the total renewal fees of licenses. This problem differs from classical capacity planning since the capacity of microwave links is...

    Provided By Aachen University

  • White Papers // Jun 2009

    Mobile Enterprise - A Case Study of Enterprise Service Integration

    A Mobile Enterprise can be established in a cellular network by participating Mobile Hosts, which provide web services from smart phones, and their clients. Mobile Hosts enable seamless integration of user-specific services to the enterprise, by following the web service interfaces and standards, also on the radio link. Moreover, services...

    Provided By Aachen University

  • White Papers // May 2009

    Optimal Power Masking in Soft Frequency Reuse Based OFDMA Networks

    Soft frequency reuse is a strong tool for co-channel interference mitigation in cellular OFDMA/LTE networks. The performance of such networks significantly depends on the configuration of the power masks that implement the soft frequency reuse patterns. In this paper, the authors investigate the performance of different power mask configurations against...

    Provided By Aachen University

  • White Papers // Oct 2011

    Further Improving the Scalability of the Scalasca Toolset

    Although, Scalasca was already successfully used with codes running with 294,912 cores on a 72-rack Blue Gene/P system, the current software design shows scalability limitations that adversely an affect user experience and that will present a serious obstacle on the way to mastering larger scales in the future. In this...

    Provided By Aachen University

  • White Papers // Oct 2012

    Profiling of OpenMP Tasks With Score-P

    With the task construct, the Open-MP 3.0 specification introduces an additional level of parallelism that challenges established schemes of performance profiling. First, a thread may execute a sequence of interleaved task fragments the profiling system must properly distinguish to enable correct performance analyses. Finally, as a new programming paradigm, tasking...

    Provided By Aachen University

  • White Papers // Jun 2011

    DYPROTO - Tools for Dynamic Business Processes

    In this paper, the authors present research results about tools for supporting dynamic business processes. This paper has been conducted in three-year cooperation between their department and an IT service provider for insurance companies. Their partner's Process Management System (PMS) is rather aligned with static processes, whose structure is not...

    Provided By Aachen University

  • White Papers // Feb 2013

    Malware Proof on Mobile Phone Exhibits Based on GSM/GPRS Traces

    In this paper, the authors present a system for proving the existence of malware on mobile phones that are exhibits in a criminal investigation. The system masquerades as legitimate GSM/GPRS network and thus is able to intercept and process all traffic sent from and received by the mobile. Eavesdropping the...

    Provided By Aachen University

  • White Papers // Oct 2013

    Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model

    The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far....

    Provided By Aachen University

  • White Papers // Dec 2013

    Provable Security Proofs and their Interpretation in the Real World

    In this paper the authors analyze provable security proofs, using the EDL signature scheme as its case study, and interpret their benefits and drawbacks when applied to the real world. Provable security has been an area of contention. Some, such as Koblitz and Menezes, give little credit to the potential...

    Provided By Aachen University