Aalto University School of Science and Technology

Displaying 1-13 of 13 results

  • White Papers // Oct 2012

    Mobile Computation Offloading: A Context-Driven Approach

    Mobile computation offloading means transfer of execution of mobile software computation outside of the actual device. In this paper, the authors use a context-driven approach to analyze and design offloading systems. They conduct a literature survey of the types of offloading, supportive architectural models and existing frameworks to propose taxonomies...

    Provided By Aalto University School of Science and Technology

  • White Papers // Sep 2011

    Methodology for Behavioral-based Malware Analysis and Detection using Random Projections and K-Nearest Neighbors Classifiers

    In this paper, a two-stage methodology to analyze and detect behavioral-based malware is presented. In the first stage, a random projection is decreasing the variable dimensionality of the problem and is simultaneously reducing the computational time of the classification task by several orders of magnitude. In the second stage, a...

    Provided By Aalto University School of Science and Technology

  • White Papers // Aug 2011

    The Business Model as a Tool of Improving Value Creation in Complex Private Service System - Case: Value Network of Electric Mobility

    This paper shows how the concept of business model can be used as an analysis tool when attempting to understand and describe the complexity of the value creation of a developing industry, namely electric mobility. The business model concept is applied as a theoretical framework in action research based and...

    Provided By Aalto University School of Science and Technology

  • White Papers // Dec 2010

    Trustworthy Identity Management for Web Authentication

    Identity theft today is one of the major security issues on the Internet. Phishing and pharming are two of the most prominent web based attacks typically employed in order to direct users to fake websites for stealing critical user information. In addition to the web based attacks, malicious code residing...

    Provided By Aalto University School of Science and Technology

  • White Papers // Nov 2010

    Security Concerns in Commercial Cloud Computing

    Companies benefit from cloud computing services in terms of cost reduction and processes enhancement: enterprises are able to scale their systems easily and deploy new technologies more efficiently. Indeed, cloud computing allows businesses to become more flexible and to rapidly react to changes in the market, while focusing fully on...

    Provided By Aalto University School of Science and Technology

  • White Papers // Nov 2010

    Secure and Anonymous Communication in the Cloud

    Many communication systems provide confidentiality, integrity and availability to communicating parties, yet few can also provide anonymous communication in a way that allows communicating parties to authenticate each other while still preventing third parties from discovering the end points of a particular communication. Cloud based anonymizing systems provide one solution...

    Provided By Aalto University School of Science and Technology

  • White Papers // Oct 2010

    SPARQL to SQL Translation Based on an Intermediate Query Language

    The authors present a structured approach to SPARQL to SQL translation using AQL - a purpose-built intermediate query language. The approach produces a single SQL query for a single SPARQL query. Using AQL, they revisit the semantic mismatch between SPARQL and SQL and present query transformations on AQL presentation which...

    Provided By Aalto University School of Science and Technology

  • White Papers // Sep 2010

    Mobile Communications Industry Scenarios and Strategic Implications for Network Equipment Vendors

    Mobile infrastructure markets have changed dramatically during the past years. The industry is experiencing a shift from traditional large-scale, hardware-driven system roll-outs to software and services-driven business models. Also, the telecommunications and internet worlds are colliding in both mobile infrastructure and services domains requiring established network equipment vendors and mobile...

    Provided By Aalto University School of Science and Technology

  • White Papers // Aug 2010

    Bandwidth Extension of Telephone Speech Using a Filter Bank Implementation for Highband MEL Spectrum

    The limited audio bandwidth used in telephone systems degrades both the quality and the intelligibility of speech. This paper presents a new method for the bandwidth extension of telephone speech. Frequency components are added to the frequency band 4 - 8 kHz using only the information in the narrowband speech....

    Provided By Aalto University School of Science and Technology

  • White Papers // May 2010

    New Results on Instruction Cache Attacks

    The authors improve instruction cache data analysis techniques with a framework based on vector quantization and hidden markov models. As a result, they are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, they run an I-cache attack on OpenSSL's DSA implementation and...

    Provided By Aalto University School of Science and Technology

  • White Papers // Apr 2010

    Quality Development Of CRM Facilitated Business Processes

    This research paper is based on the qualitative approach that has known potential problems with the subjective and biased opinions of the researchers. Results of the qualitative study will be influenced by the researcher's opinions and interpretations (Leedy, Ormrod 2005). That aspect was notified during the study and the effects...

    Provided By Aalto University School of Science and Technology

  • White Papers // Feb 2010

    The Influence of Antenna Directivity on Accuracy of UWB Ranging

    Ultra-WideBand (UWB) technology has become an attractive choice for high precision indoor localization. Pulse based UWB is found to be suitable for overcoming the signal Time-of-Arrival (ToA) ambiguities due to multipath. Much work has been done on UWB ToA estimation in general. However, the effect of the radiation patterns of...

    Provided By Aalto University School of Science and Technology

  • White Papers // Dec 2009

    Information Retrieval Perspective to Nonlinear Dimensionality Reduction for Data Visualization

    Nonlinear dimensionality reduction methods are often used to visualize high-dimensional data, although the existing methods have been designed for other related tasks such as manifold learning. It has been difficult to assess the quality of visualizations since the task has not been well-defined. The author gives a rigorous definition for...

    Provided By Aalto University School of Science and Technology

  • White Papers // Aug 2010

    Bandwidth Extension of Telephone Speech Using a Filter Bank Implementation for Highband MEL Spectrum

    The limited audio bandwidth used in telephone systems degrades both the quality and the intelligibility of speech. This paper presents a new method for the bandwidth extension of telephone speech. Frequency components are added to the frequency band 4 - 8 kHz using only the information in the narrowband speech....

    Provided By Aalto University School of Science and Technology

  • White Papers // Oct 2012

    Mobile Computation Offloading: A Context-Driven Approach

    Mobile computation offloading means transfer of execution of mobile software computation outside of the actual device. In this paper, the authors use a context-driven approach to analyze and design offloading systems. They conduct a literature survey of the types of offloading, supportive architectural models and existing frameworks to propose taxonomies...

    Provided By Aalto University School of Science and Technology

  • White Papers // Aug 2011

    The Business Model as a Tool of Improving Value Creation in Complex Private Service System - Case: Value Network of Electric Mobility

    This paper shows how the concept of business model can be used as an analysis tool when attempting to understand and describe the complexity of the value creation of a developing industry, namely electric mobility. The business model concept is applied as a theoretical framework in action research based and...

    Provided By Aalto University School of Science and Technology

  • White Papers // Dec 2010

    Trustworthy Identity Management for Web Authentication

    Identity theft today is one of the major security issues on the Internet. Phishing and pharming are two of the most prominent web based attacks typically employed in order to direct users to fake websites for stealing critical user information. In addition to the web based attacks, malicious code residing...

    Provided By Aalto University School of Science and Technology

  • White Papers // Sep 2011

    Methodology for Behavioral-based Malware Analysis and Detection using Random Projections and K-Nearest Neighbors Classifiers

    In this paper, a two-stage methodology to analyze and detect behavioral-based malware is presented. In the first stage, a random projection is decreasing the variable dimensionality of the problem and is simultaneously reducing the computational time of the classification task by several orders of magnitude. In the second stage, a...

    Provided By Aalto University School of Science and Technology

  • White Papers // May 2010

    New Results on Instruction Cache Attacks

    The authors improve instruction cache data analysis techniques with a framework based on vector quantization and hidden markov models. As a result, they are capable of carrying out efficient automated attacks using live I-cache timing data. Using this analysis technique, they run an I-cache attack on OpenSSL's DSA implementation and...

    Provided By Aalto University School of Science and Technology

  • White Papers // Oct 2010

    SPARQL to SQL Translation Based on an Intermediate Query Language

    The authors present a structured approach to SPARQL to SQL translation using AQL - a purpose-built intermediate query language. The approach produces a single SQL query for a single SPARQL query. Using AQL, they revisit the semantic mismatch between SPARQL and SQL and present query transformations on AQL presentation which...

    Provided By Aalto University School of Science and Technology

  • White Papers // Dec 2009

    Information Retrieval Perspective to Nonlinear Dimensionality Reduction for Data Visualization

    Nonlinear dimensionality reduction methods are often used to visualize high-dimensional data, although the existing methods have been designed for other related tasks such as manifold learning. It has been difficult to assess the quality of visualizations since the task has not been well-defined. The author gives a rigorous definition for...

    Provided By Aalto University School of Science and Technology

  • White Papers // Apr 2010

    Quality Development Of CRM Facilitated Business Processes

    This research paper is based on the qualitative approach that has known potential problems with the subjective and biased opinions of the researchers. Results of the qualitative study will be influenced by the researcher's opinions and interpretations (Leedy, Ormrod 2005). That aspect was notified during the study and the effects...

    Provided By Aalto University School of Science and Technology

  • White Papers // Nov 2010

    Security Concerns in Commercial Cloud Computing

    Companies benefit from cloud computing services in terms of cost reduction and processes enhancement: enterprises are able to scale their systems easily and deploy new technologies more efficiently. Indeed, cloud computing allows businesses to become more flexible and to rapidly react to changes in the market, while focusing fully on...

    Provided By Aalto University School of Science and Technology

  • White Papers // Nov 2010

    Secure and Anonymous Communication in the Cloud

    Many communication systems provide confidentiality, integrity and availability to communicating parties, yet few can also provide anonymous communication in a way that allows communicating parties to authenticate each other while still preventing third parties from discovering the end points of a particular communication. Cloud based anonymizing systems provide one solution...

    Provided By Aalto University School of Science and Technology

  • White Papers // Feb 2010

    The Influence of Antenna Directivity on Accuracy of UWB Ranging

    Ultra-WideBand (UWB) technology has become an attractive choice for high precision indoor localization. Pulse based UWB is found to be suitable for overcoming the signal Time-of-Arrival (ToA) ambiguities due to multipath. Much work has been done on UWB ToA estimation in general. However, the effect of the radiation patterns of...

    Provided By Aalto University School of Science and Technology

  • White Papers // Sep 2010

    Mobile Communications Industry Scenarios and Strategic Implications for Network Equipment Vendors

    Mobile infrastructure markets have changed dramatically during the past years. The industry is experiencing a shift from traditional large-scale, hardware-driven system roll-outs to software and services-driven business models. Also, the telecommunications and internet worlds are colliding in both mobile infrastructure and services domains requiring established network equipment vendors and mobile...

    Provided By Aalto University School of Science and Technology