Aalto University

Displaying 1-40 of 73 results

  • White Papers // Aug 2014

    Characterizing Internet Video for Large-Scale Active Measurements

    Internet Service Providers (ISPs) and application service providers have a strong interest in understanding network and application performance to make sure that their customers are satisfied. The availability of high definition video content on the web has brought about a significant change in the characteristics of Internet video, but not...

    Provided By Aalto University

  • White Papers // Apr 2014

    Space-Time Storage Codes for Wireless Distributed Storage Systems

    Distributed Storage Systems (DSSs) have gained a lot of interest recently, thanks to their robustness and scalability compared to single-device storage. Majority of the related research has exclusively concerned the network layer. At the same time, the number of users of, e.g., peer-to-peer (p2p) and device-to-device (d2d) networks as well...

    Provided By Aalto University

  • White Papers // Sep 2013

    Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

    The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates...

    Provided By Aalto University

  • White Papers // Sep 2013

    Device-to-Device Data Storage for Mobile Cellular Systems

    As an alternative to downloading content from a cellular access network, mobile devices could be used to store data files and distribute them through Device-To-Device (D2D) communication. The authors consider a D2D-based storage community that is comprised of mobile users. Assuming that transmitting data from a base station to a...

    Provided By Aalto University

  • White Papers // Sep 2013

    LCT: A Parallel Distributed Testing Tool for Multithreaded Java Programs

    LIME Concolic Tester (LCT) is an open source automated testing tool that allows testing both sequential and multithreaded Java programs. The tool uses concolic testing to handle input values and Dynamic Partial Order Reduction (DPOR) combined with sleep sets to avoid exploring unnecessary inter-leavings of threads. The LCT tool has...

    Provided By Aalto University

  • White Papers // May 2013

    Theoretical Elaboration of IT Enablement Model in the Era of Customer and Community Digital Innovation

    Research on information systems has demonstrated the strategic potential of Information Technology (IT) through the logic of IT enablement: synergistic relationship between IT assets with organizational resources ensuing IT-enabled resources capable of influencing competitive firm performance. However, this enablement view has largely focused on IT assets and organizational resources within...

    Provided By Aalto University

  • White Papers // Apr 2013

    Parametrised Compositional Verification with Multiple Process and Data Types

    The authors present an LTS-based (Labeled Transition System) CSP-like (Communicating Sequential Processes) formalism for expressing parameterized systems. The parameters are process types, which determine the number of replicated components, and data types, which enable components with a parameterized state space. They prove that the formalism is compositional and show how...

    Provided By Aalto University

  • White Papers // Mar 2013

    Asynchronous Multi-Core Incremental SAT Solving

    Solvers for propositional logic formulas, so called SAT solvers, are used in many practical applications. As multi-core and multi-processor hardware has become widely available, parallelizations of such solvers are actively researched. Such research typically ignores the incremental problem specification feature that modern SAT solvers possess. This feature is, however, crucial...

    Provided By Aalto University

  • White Papers // Mar 2013

    Distributed Precoding for MISO Interference Channels with Channel Mean Feedback: Algorithms and Analysis

    In this paper, the authors focuses on the design and analysis of distributed stochastic pre-coding algorithms for Multiple-Input Single-Output (MISO) interference channels, where each transmitter is provided with mean information of its intended channel and that of interfering channels. Unlike in cases where exact channel gains are known as in...

    Provided By Aalto University

  • White Papers // Feb 2013

    Characterizing Content Sharing Properties for Mobile Users in Open City Squares

    For mobile delay-tolerant networks, different mobility models have been utilized to assess the performance of routing algorithms and applications. Substantial work has gone into understanding the contact characteristics of mobile users to allow evaluation under conditions that approximate the real world. One important finding has been recognizing that contacts humans...

    Provided By Aalto University

  • White Papers // Feb 2013

    Authenticated Resource Management in Delay-Tolerant Networks Using Proxy Signatures

    In Delay-Tolerant Networks (DTN), individual nodes with much higher rates of sending new bundles than average can degrade the delivery rate of other nodes substantially. They have a much higher impact on the overall network fairness than in traditional networks because of DTN-specific properties, such as decentralized design and the...

    Provided By Aalto University

  • White Papers // Feb 2013

    P2P Media Streaming With HTML5 and WebRTC

    Video-on-Demand (VoD) services, such as YouTube, generate most of the Internet traffic today, and the popularity of video services is growing. Service and CDN providers have to invest more and more in distribution networks, which create pressure to innovate novel approaches. Peer-To-Peer (P2P) streaming is a viable alternative that is...

    Provided By Aalto University

  • White Papers // Dec 2012

    Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock

    Zero-correlation linear attack is a new method for cryptanalysis of block ciphers developed by Bogdanov et al. in 2012. In this paper, the authors adapt the matrix method to find zero-correlation linear approximations. Then they present several zero-correlation linear approximations for 14 rounds of LBlock and describe a cryptanalysis for...

    Provided By Aalto University

  • White Papers // Dec 2012

    New Algorithms for Position Heaps

    Position heaps are data structures for indexed pattern matching in a string, recently introduced as an alternative to suffix trees and suffix arrays. In this paper, the authors show how to modify an algorithm by Bannai, Inenaga and Takeda for computing LZ78 parses, such that it builds position heaps in...

    Provided By Aalto University

  • White Papers // Sep 2012

    Marooned Magic Numbers - An Adaptive Congestion Control Architecture

    TCP and other Internet transport protocols rely on series of hard-coded initial values for their connection state, particularly for the congestion control parameters. For example, recently the initial value of congestion window has been under much debate, as there is a desire to make TCP more efficient for common use...

    Provided By Aalto University

  • White Papers // Sep 2012

    Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment

    Flexible allocation of resources is one of the main benefits of cloud computing. Virtualization is used to achieve this flexibility: one or more virtual machines run on a single physical machine. These virtual machines can be deployed and destroyed as needed. One obstacle to flexibility in current cloud systems is...

    Provided By Aalto University

  • White Papers // Sep 2012

    Energy Cost of Advertisements in Mobile Games on the Android Platform

    Advertisements (ads) are a common source of revenue for monetizing free mobile applications, but increase the energy consumption of a mobile device because the advertisement have to be fetched and displayed. In particular, the radio communication needed for the data transfer is power hungry and therefore advertisement sponsored free applications...

    Provided By Aalto University

  • White Papers // Sep 2012

    Design of Spectrum Sensing Policy for Multi-User Multi-Band Cognitive Radio Network

    Finding an optimal sensing policy for a particular access policy and sensing scheme is a laborious combinatorial problem that requires the system model parameters to be known. In practice the parameters or the model itself may not be completely known making reinforcement learning methods appealing. In this paper a non-parametric...

    Provided By Aalto University

  • White Papers // Aug 2012

    Per-Node Throughput Performance of Overlapping Cognitive Radio Networks

    Multiple Cognitive Radio (CR) networks may exist in the same spatial domain in many cases. In this paper, the authors consider two uncoordinated and geographically overlapping CR networks coexisting together with a primary network. They specifically study the achievable per-node throughput performance of the CR networks. Firstly, an interference model...

    Provided By Aalto University

  • White Papers // Aug 2012

    Follow @grandma: Long-Term Device-Free Localization for Residential Monitoring

    Device-Free Localization (DFL) enables localizing people by monitoring the changes in the Radio Frequency (RF) attenuation field of an area where a wireless network is deployed. Notably, this technology does not require people to participate in the localization effort by carrying any electronic device. This paper presents a DFL system...

    Provided By Aalto University

  • White Papers // Aug 2012

    Enhancing the Accuracy of Radio Tomographic Imaging Using Channel Diversity

    Radio Tomographic Imaging (RTI) is an emerging Device-Free Localization (DFL) technology enabling the localization of people and other objects without requiring them to carry any electronic device. Instead, the RF attenuation field of the deployment area of a wireless network is estimated using the changes in Received Signal Strength (RSS)...

    Provided By Aalto University

  • White Papers // Aug 2012

    Criticality of Large Delay Tolerant Networks Via Directed Continuum Percolation in Space-Time

    Delay-Tolerant Networking (DTN) is a last-resort networking paradigm for mobile nodes when direct and multi-hop connections are infeasible, i.e., the network is not connected and nodes have to carry the messages to the next node (store-carry-forward). The authors study the capacity of DTN to deliver a message to its destination(s)...

    Provided By Aalto University

  • White Papers // Jul 2012

    Secure Networking for Virtual Machines in the Cloud

    Cloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs. However, cloud technology is still proprietary in many cases and is tainted by security issues rooted in the multi-tenant environment of the cloud. For instance, the virtual machines of two competing companies could be served...

    Provided By Aalto University

  • White Papers // Jul 2012

    Tag-Based Improved Search in Peer-to-Peer Overlays

    P2P based file sharing applications have gained immense popularity in recent years. Most content sharing applications search by matching the query with the file name. Some content sharing applications have gone a step further and used metadata assigned to it by the user who shared the content for searching the...

    Provided By Aalto University

  • White Papers // Jun 2012

    Mobile Computation Offloading - Factors Affecting Technology Evolution

    Compared to desktop devices, mobile devices have inherent constraints such as limited processing power, memory, and battery capacity. With the proliferation of resource-hungry applications, researchers are looking for new solutions to address these limitations. One such solution is Mobile Cloud Computing (MCC), which uses cloud infrastructure to enhance the capabilities...

    Provided By Aalto University

  • White Papers // May 2012

    The Linux Pseudorandom Number Generator Revisited

    The Linux PseudoRandom Number Generator (PRNG) is a PRNG with entropy inputs which is widely used in many security related applications and protocols. This PRNG is written as an open source code which is subject to regular changes. It was last analyzed in the work of Gutterman et al. in...

    Provided By Aalto University

  • White Papers // May 2012

    On the Exact Distribution of the Scaled Largest Eigenvalue

    In this paper, the authors study the distribution of the scaled largest eigenvalue of complex Wishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results...

    Provided By Aalto University

  • White Papers // May 2012

    On Finding Multicast Paths in the Internet

    This paper evaluates the so-called Multicasting Via Paths (MVP) protocol. Both an ILP-based (exact) algorithm and a greedy heuristic algorithm for finding MVP paths are presented. By numerical experiments, the authors find that MVP is usually cheaper than IP multicast within ISP networks (in terms of sum of edge costs),...

    Provided By Aalto University

  • White Papers // May 2012

    Towards Robust, Scalable, and Fast Internet Via Explicit Forwarding Engines (EFE)

    This paper argues that the scalability problems of the Internet could be solved, not only in the control plane, but also in the forwarding plane. To this end, an explicit forwarding scheme is presented. The authors' scheme alleviates the Internet routing scalability problem, and facilitates fast forwarding, enforcement of fine-grained...

    Provided By Aalto University

  • White Papers // May 2012

    Scaling Bloom Filter Based Multicast With Hierarchical Tree Splitting

    Bloom Filter based multicast has been proposed as a source-specific multicast solution to eliminate the multicast state requirements in the routers. However, the inherent limitation, the false positives, in the Bloom filter data structure amplifies the bandwidth wastage when the multicast tree scales to a large number of receivers. In...

    Provided By Aalto University

  • White Papers // May 2012

    Data Center Network Architectures

    Data centers have become increasingly essential part of Internet communications, thus there have been interest in understanding how to better design and manage data centers. In this paper, the authors explain a typical data center network architecture in the industry, the challenges modern data center networks encounter today and introduce...

    Provided By Aalto University

  • White Papers // May 2012

    Exploiting Hardware Heterogeneity Within the Same Instance Type of Amazon EC2

    Cloud computing providers might start with near homogeneous hardware environment. Over time, the homogeneous environment will most likely evolve into heterogeneous one because of possible upgrades and replacement of outdated hardware. In turn, the hardware heterogeneity will result into performance variation. In this paper, the authors look into the hardware...

    Provided By Aalto University

  • White Papers // May 2012

    Continuum Percolation Threshold for Permeable Aligned Cylinders and Opportunistic Networking

    In the continuum percolation problem, objects of given shape are placed according to a k-dimensional Poisson process. Two objects are neighbors if they overlap. The percolation is said to occur if with a positive probability a random object belongs to an infinite cluster, which exists only when the density of...

    Provided By Aalto University

  • White Papers // Apr 2012

    Floating Information With Stationary Nodes

    In the floating content application, mobile nodes collectively store and disseminate messages relevant to a certain area by using the principles of opportunistic networking. The system operates in best effort fashion relying solely on the nodes located in the area of interest, which is referred to as the anchor zone...

    Provided By Aalto University

  • White Papers // Mar 2012

    Minimizing Slowdown in Heterogeneous Size-Aware Dispatching Systems

    The authors consider a system of parallel queues where tasks are assigned (dispatched) to one of the available servers upon arrival. The dispatching decision is based on the full state information, i.e., on the sizes of the new and existing jobs. They are interested in minimizing the so-called mean slowdown...

    Provided By Aalto University

  • White Papers // Mar 2012

    Virtual RTCP: A Case Study of Monitoring and Repair for UDP-Based IPTV Systems

    IPTV systems have seen widespread deployment, but often lack robust mechanisms for monitoring the quality of experience. This makes it difficult for network operators to ensure that their services match the quality of traditional broadcast TV systems, leading to consumer dissatisfaction. The authors present a case study of virtual RTCP,...

    Provided By Aalto University

  • White Papers // Mar 2012

    Exploiting Traffic Scheduling Mechanisms to Reduce Transmission Cost on Mobile Devices

    Energy consumption of wireless data transmission heavily depends on the shape of the outgoing traffic of the mobile device. In this paper, the authors propose a traffic scheduler that shapes the packets into consistent bursts based on per-packet performance constraints in order to reduce the overall transmission cost. Their scheduler...

    Provided By Aalto University

  • White Papers // Mar 2012

    Device-to-Device Underlay Cellular Network Based on Rate Splitting

    The authors consider rate splitting and interference cancelation in Device-To-Device (D2D) communications underlaying a cellular network. They assume that a transmitted message is split into a private and a public part, as in Han-Kobayashi scheme. The private part is decodable only by the intended receiver, whereas the public part is...

    Provided By Aalto University

  • White Papers // Mar 2012

    Performance of Target Tracking Applications in Multi-Channel Wireless Sensor Networks

    Several future wireless communication systems will exploit multiple frequency channels simultaneously to reduce delay, enhance throughput and/or improve robustness. Nevertheless, the impact of multi-channel communications on different applications has not been comprehensively studied even though it is of significant importance to understand the interdependencies between the communication and application parameters....

    Provided By Aalto University

  • White Papers // Mar 2012

    Practical Realisation and Elimination of an ECC-Related Software Bug Attack

    The authors analyze and exploit implementation features in OpenSSL version 0:9:8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via 633 adaptive queries when the NIST curve P-256 is used. One can view it...

    Provided By Aalto University

  • White Papers // Dec 2012

    Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock

    Zero-correlation linear attack is a new method for cryptanalysis of block ciphers developed by Bogdanov et al. in 2012. In this paper, the authors adapt the matrix method to find zero-correlation linear approximations. Then they present several zero-correlation linear approximations for 14 rounds of LBlock and describe a cryptanalysis for...

    Provided By Aalto University

  • White Papers // May 2012

    The Linux Pseudorandom Number Generator Revisited

    The Linux PseudoRandom Number Generator (PRNG) is a PRNG with entropy inputs which is widely used in many security related applications and protocols. This PRNG is written as an open source code which is subject to regular changes. It was last analyzed in the work of Gutterman et al. in...

    Provided By Aalto University

  • White Papers // Aug 2012

    Follow @grandma: Long-Term Device-Free Localization for Residential Monitoring

    Device-Free Localization (DFL) enables localizing people by monitoring the changes in the Radio Frequency (RF) attenuation field of an area where a wireless network is deployed. Notably, this technology does not require people to participate in the localization effort by carrying any electronic device. This paper presents a DFL system...

    Provided By Aalto University

  • White Papers // Aug 2012

    Enhancing the Accuracy of Radio Tomographic Imaging Using Channel Diversity

    Radio Tomographic Imaging (RTI) is an emerging Device-Free Localization (DFL) technology enabling the localization of people and other objects without requiring them to carry any electronic device. Instead, the RF attenuation field of the deployment area of a wireless network is estimated using the changes in Received Signal Strength (RSS)...

    Provided By Aalto University

  • White Papers // Feb 2013

    Characterizing Content Sharing Properties for Mobile Users in Open City Squares

    For mobile delay-tolerant networks, different mobility models have been utilized to assess the performance of routing algorithms and applications. Substantial work has gone into understanding the contact characteristics of mobile users to allow evaluation under conditions that approximate the real world. One important finding has been recognizing that contacts humans...

    Provided By Aalto University

  • White Papers // Feb 2013

    Authenticated Resource Management in Delay-Tolerant Networks Using Proxy Signatures

    In Delay-Tolerant Networks (DTN), individual nodes with much higher rates of sending new bundles than average can degrade the delivery rate of other nodes substantially. They have a much higher impact on the overall network fairness than in traditional networks because of DTN-specific properties, such as decentralized design and the...

    Provided By Aalto University

  • White Papers // Sep 2012

    Marooned Magic Numbers - An Adaptive Congestion Control Architecture

    TCP and other Internet transport protocols rely on series of hard-coded initial values for their connection state, particularly for the congestion control parameters. For example, recently the initial value of congestion window has been under much debate, as there is a desire to make TCP more efficient for common use...

    Provided By Aalto University

  • White Papers // Apr 2012

    Floating Information With Stationary Nodes

    In the floating content application, mobile nodes collectively store and disseminate messages relevant to a certain area by using the principles of opportunistic networking. The system operates in best effort fashion relying solely on the nodes located in the area of interest, which is referred to as the anchor zone...

    Provided By Aalto University

  • White Papers // Jan 2012

    Mobility and Service Discovery in Opportunistic Networks

    Past research on opportunistic communications has demonstrated the power of mobile phones as information mediators and content providers to co-located devices. As an extension of opportunistic communication paradigm, opportunistic computing and services research leverages the powerful capabilities and pervasive nature of modern Smartphones to provision services to nearby nodes. When...

    Provided By Aalto University

  • White Papers // Jul 2010

    ConTug: A Receiver-Driven Transport Protocol for Content-Centric Networks

    This paper presents ConTug, a new, receiver-driven transport protocol for content-centric networks. It discusses the specific constraints of content-centric networks and describes the design of ConTug, highlighting a number of general challenges encountered while designing a transport protocol for such networks. It also presents ns-3 simulations that study how ConTug...

    Provided By Aalto University

  • White Papers // Jul 2012

    Tag-Based Improved Search in Peer-to-Peer Overlays

    P2P based file sharing applications have gained immense popularity in recent years. Most content sharing applications search by matching the query with the file name. Some content sharing applications have gone a step further and used metadata assigned to it by the user who shared the content for searching the...

    Provided By Aalto University

  • White Papers // Sep 2012

    Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment

    Flexible allocation of resources is one of the main benefits of cloud computing. Virtualization is used to achieve this flexibility: one or more virtual machines run on a single physical machine. These virtual machines can be deployed and destroyed as needed. One obstacle to flexibility in current cloud systems is...

    Provided By Aalto University

  • White Papers // Feb 2013

    P2P Media Streaming With HTML5 and WebRTC

    Video-on-Demand (VoD) services, such as YouTube, generate most of the Internet traffic today, and the popularity of video services is growing. Service and CDN providers have to invest more and more in distribution networks, which create pressure to innovate novel approaches. Peer-To-Peer (P2P) streaming is a viable alternative that is...

    Provided By Aalto University

  • White Papers // Sep 2012

    Energy Cost of Advertisements in Mobile Games on the Android Platform

    Advertisements (ads) are a common source of revenue for monetizing free mobile applications, but increase the energy consumption of a mobile device because the advertisement have to be fetched and displayed. In particular, the radio communication needed for the data transfer is power hungry and therefore advertisement sponsored free applications...

    Provided By Aalto University

  • White Papers // Jun 2012

    Mobile Computation Offloading - Factors Affecting Technology Evolution

    Compared to desktop devices, mobile devices have inherent constraints such as limited processing power, memory, and battery capacity. With the proliferation of resource-hungry applications, researchers are looking for new solutions to address these limitations. One such solution is Mobile Cloud Computing (MCC), which uses cloud infrastructure to enhance the capabilities...

    Provided By Aalto University

  • White Papers // Dec 2011

    Different Faces of Information Centric Networking

    In this paper, the feasibility of current internet framework for future usage is investigated. Internet has been a huge success. However, the scale of its use has given rise to issues and challenges which were not taken into account when it was created. There is a strong perception in the...

    Provided By Aalto University

  • White Papers // May 2011

    Bankruptcy Prediction with Missing Data

    Bankruptcy prediction has been widely studied as a binary classification problem using financial ratios methodologies. When calculating the ratios, it is common to confront missing data problem. Thus, this paper proposes a classification method Ensemble Nearest Neighbors (ENN) to solve it. ENN uses different nearest neighbors as ensemble classifiers then...

    Provided By Aalto University

  • White Papers // Mar 2013

    Distributed Precoding for MISO Interference Channels with Channel Mean Feedback: Algorithms and Analysis

    In this paper, the authors focuses on the design and analysis of distributed stochastic pre-coding algorithms for Multiple-Input Single-Output (MISO) interference channels, where each transmitter is provided with mean information of its intended channel and that of interfering channels. Unlike in cases where exact channel gains are known as in...

    Provided By Aalto University

  • White Papers // May 2012

    Data Center Network Architectures

    Data centers have become increasingly essential part of Internet communications, thus there have been interest in understanding how to better design and manage data centers. In this paper, the authors explain a typical data center network architecture in the industry, the challenges modern data center networks encounter today and introduce...

    Provided By Aalto University

  • White Papers // Apr 2010

    Reliable Data Delivery for Publish/Subscribe Networks

    Network architectures built completely on publish and subscribe primitives instead of send and receive, have recently attracted many researchers. Pub/sub paradigm changes the networking completely: end-to-end principle breaks, communication channels become unidirectional, and multicast becomes a norm. Although pub/sub has attracted many, the research has been focusing on the network...

    Provided By Aalto University

  • White Papers // Feb 2012

    Energy-And Cost-Efficiency Analysis of ARM-Based Clusters

    General-purpose computing domain has experienced strategy transfer from scale-up to scale-out in the past decade. In this paper, the authors take a step further to analyze ARM-processor based cluster against Intel X86 workstation, from both energy-efficiency and cost-efficiency perspectives. Three applications are selected and evaluated to represent diversified applications, including...

    Provided By Aalto University

  • White Papers // May 2013

    Theoretical Elaboration of IT Enablement Model in the Era of Customer and Community Digital Innovation

    Research on information systems has demonstrated the strategic potential of Information Technology (IT) through the logic of IT enablement: synergistic relationship between IT assets with organizational resources ensuing IT-enabled resources capable of influencing competitive firm performance. However, this enablement view has largely focused on IT assets and organizational resources within...

    Provided By Aalto University

  • White Papers // Oct 2010

    The PASSERINE Public Key Encryption and Authentication Mechanism

    PASSERINE is a lightweight public key encryption mechanism which is based on a hybrid, randomized variant of the Rabin public key encryption scheme. Its design is targeted for extremely low-resource applications such as wireless sensor networks, RFID tags, embedded systems, and smart cards. As is the case with the Rabin...

    Provided By Aalto University

  • White Papers // Nov 2010

    In-depth Breakdown of a 6LOWPAN Stack for Sensor Networks

    There exist several open source 6LoWPAN stacks for researchers to experiment with. However, they often lack sufficient and in-depth description of the internal operation, which makes extending the stacks difficult for many of one. This paper is an extended version of the previous work documenting the internal logic of an...

    Provided By Aalto University

  • White Papers // Sep 2010

    Semantic Interoperability in Electronic Business

    E-business refers to the utilization of Information and Communication Technologies (ICT) in support of all the activities of business. The standards developed for e-business help to facilitate the deployment of e-business. In particular, several organizations in e-business sector have produced standards and representation forms using XML. It serves as an...

    Provided By Aalto University

  • White Papers // Mar 2010

    Competitive Actions And Dynamics In Project Marketing: Identifying Causal Mechanisms

    In project marketing research, there is limited understanding of the mechanisms of how central project marketing actions lead to success and good business performance of the project-based firm. The purpose of this conceptual paper is to extend the understanding of the content and repertoire of (competitive) actions along the project...

    Provided By Aalto University

  • White Papers // Aug 2010

    Holistic Model Of Network Management: Action Research In Elderly Health Care

    Network management is a topic of increasing interest and scope. Trust and commitment have been identified as basic elements of a functioning network and the authors know that there are certain factors that cultivate or discourage their existence. Research on network management has offered various but ultimately partial theoretical and...

    Provided By Aalto University

  • White Papers // Aug 2010

    Project-Ending Competence In Networks: Two Cases Of Large Inter-Organizational Projects

    Continuing restructure of business driven by global economic change and new technology often requires closure of existing manufacturing facilities. In cases where these terminations are unexpected and premature, the understanding and skills of project management can be applied to the closure. A network perspective that accounts for the influence of...

    Provided By Aalto University

  • White Papers // Nov 2010

    Security Challenges in Hybrid Cloud Infrastructures

    Cloud computing has the potential to significantly change the way enterprises and their IT (Information Technology) systems run, but in order to achieve this current cloud computing model needs to be changed according to the enterprise requirements. These modifications lead to the evolution of the hybrid cloud, which is a...

    Provided By Aalto University

  • White Papers // Nov 2010

    Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments

    Cloud computing is a new computing model. According to International Data Corporation (IDC) report, security is ranked first among challenges of the cloud model. In a perfect security solution, monitoring mechanisms play an important role. In the new model, security monitoring has not been discussed yet. This paper identified a...

    Provided By Aalto University

  • White Papers // Nov 2010

    Reputation in Cloud Computing

    Nowadays the concept of cloud computing is getting popular around the Net. The capacity and scalability that cloud computing offers is making it an alternative to consider when a good infrastructure is needed. It does not matter what kind of application it is, if a cloud is used with it...

    Provided By Aalto University

  • White Papers // Aug 2011

    A Synchronized Wireless Sensor Network for Experimental Modal Analysis in Structural Health Monitoring

    Structural health monitoring aims to provide an accurate diagnosis of the condition of civil infrastructures during their life span using data acquired by sensors. Wireless sensor networks represent a suitable monitoring technology to collect reliable information about the structure's condition, replacing visual inspections, and reducing installation and maintenance time and...

    Provided By Aalto University

  • White Papers // Feb 2011

    Real-Time and Reliable Wireless Sensor Networks for Smart Wireless Automation Applications

    Wireless Sensor Networks (WSNs) represent one of the candidate solutions in the field of wireless technologies for improving the efficiency and reducing the installation time and costs of large-scale industrial automation systems. The application of WSNs in industrial environment poses strict requirements in terms of energy efficiency, scalability, reliability, and...

    Provided By Aalto University

  • White Papers // Feb 2011

    Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, the authors propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed...

    Provided By Aalto University

  • White Papers // Jul 2011

    Controlling the Interference From Multiple Secondary Systems at the TV Cell Border

    The main requirement for secondary operation over the TV white spaces is interference control. In this paper, the authors propose an interference control scheme that allows multiple secondary systems to maintain their aggregate interference at the TV receivers under specific protection limits. The main characteristic of the proposed scheme is...

    Provided By Aalto University

  • White Papers // Feb 2011

    DVB-T Receiver Performance Measurements Under Secondary System Interference

    Interest to allow secondary use on television frequency bands has been growing and recently Federal Communications Commission (FCC) opened vacant TV channels for unlicensed use. Many countries, especially in Europe, are using DVB-T standard for providing terrestrial digital television transmissions, whereas countries like U.S. rely on ATSC standard. When assessing...

    Provided By Aalto University

  • White Papers // May 2010

    Feasibility of Voice Service in Cognitive Networks Over the TV Spectrum

    The authors consider a cognitive network where the secondary users generate voice traffic and search for sharing opportunities over the TV spectrum. From the cognitive network perspective the TV bands can be idle, occupied or acceptable. A band is classified as acceptable when the TV signal is present but the...

    Provided By Aalto University

  • White Papers // Nov 2010

    Network Coding for DoS Resistance

    Denial of Service (DoS) attacks is a common problem in modern computer networks. There are many proposals trying to solve this problem in different cases, however no universal solution has appeared to date. Network Coding is a promising approach which could be used to increase network resistance to such attacks....

    Provided By Aalto University

  • White Papers // Dec 2011

    Towards Mobile Device Cloud

    Although cloud computing has established itself as a novel paradigm, mobile devices have unique characteristics and capabilities that are not inherently made part of a cloud. This paper presents the notion of a mobile device cloud: mobile devices become active members in the cloud, sharing content, resources, and services with...

    Provided By Aalto University

  • White Papers // Mar 2012

    Practical Realisation and Elimination of an ECC-Related Software Bug Attack

    The authors analyze and exploit implementation features in OpenSSL version 0:9:8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via 633 adaptive queries when the NIST curve P-256 is used. One can view it...

    Provided By Aalto University