Aalto University

Displaying 41-73 of 73 results

  • White Papers // Feb 2012

    Energy-And Cost-Efficiency Analysis of ARM-Based Clusters

    General-purpose computing domain has experienced strategy transfer from scale-up to scale-out in the past decade. In this paper, the authors take a step further to analyze ARM-processor based cluster against Intel X86 workstation, from both energy-efficiency and cost-efficiency perspectives. Three applications are selected and evaluated to represent diversified applications, including...

    Provided By Aalto University

  • White Papers // Jan 2012

    Mobility and Service Discovery in Opportunistic Networks

    Past research on opportunistic communications has demonstrated the power of mobile phones as information mediators and content providers to co-located devices. As an extension of opportunistic communication paradigm, opportunistic computing and services research leverages the powerful capabilities and pervasive nature of modern Smartphones to provision services to nearby nodes. When...

    Provided By Aalto University

  • White Papers // Dec 2011

    Towards Mobile Device Cloud

    Although cloud computing has established itself as a novel paradigm, mobile devices have unique characteristics and capabilities that are not inherently made part of a cloud. This paper presents the notion of a mobile device cloud: mobile devices become active members in the cloud, sharing content, resources, and services with...

    Provided By Aalto University

  • White Papers // Dec 2011

    Different Faces of Information Centric Networking

    In this paper, the feasibility of current internet framework for future usage is investigated. Internet has been a huge success. However, the scale of its use has given rise to issues and challenges which were not taken into account when it was created. There is a strong perception in the...

    Provided By Aalto University

  • White Papers // Aug 2011

    A Synchronized Wireless Sensor Network for Experimental Modal Analysis in Structural Health Monitoring

    Structural health monitoring aims to provide an accurate diagnosis of the condition of civil infrastructures during their life span using data acquired by sensors. Wireless sensor networks represent a suitable monitoring technology to collect reliable information about the structure's condition, replacing visual inspections, and reducing installation and maintenance time and...

    Provided By Aalto University

  • White Papers // Jul 2011

    Controlling the Interference From Multiple Secondary Systems at the TV Cell Border

    The main requirement for secondary operation over the TV white spaces is interference control. In this paper, the authors propose an interference control scheme that allows multiple secondary systems to maintain their aggregate interference at the TV receivers under specific protection limits. The main characteristic of the proposed scheme is...

    Provided By Aalto University

  • White Papers // May 2011

    Bankruptcy Prediction with Missing Data

    Bankruptcy prediction has been widely studied as a binary classification problem using financial ratios methodologies. When calculating the ratios, it is common to confront missing data problem. Thus, this paper proposes a classification method Ensemble Nearest Neighbors (ENN) to solve it. ENN uses different nearest neighbors as ensemble classifiers then...

    Provided By Aalto University

  • White Papers // Mar 2011

    Using Buffer Space Advertisements to Avoid Congestion in Mobile Opportunistic DTNs

    This paper investigates congestion control in opportunistic networks that use Delay-Tolerant Networking (DTN) as a basis for communication. The authors propose a mechanism that advertises buffer occupancy information to adjacent nodes and avoids forwarding through nodes with high buffer occupancy. The nodes then achieve global congestion avoidance simply based on...

    Provided By Aalto University

  • White Papers // Feb 2011

    Real-Time and Reliable Wireless Sensor Networks for Smart Wireless Automation Applications

    Wireless Sensor Networks (WSNs) represent one of the candidate solutions in the field of wireless technologies for improving the efficiency and reducing the installation time and costs of large-scale industrial automation systems. The application of WSNs in industrial environment poses strict requirements in terms of energy efficiency, scalability, reliability, and...

    Provided By Aalto University

  • White Papers // Feb 2011

    Floating Content: Information Sharing in Urban Areas

    Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, the authors analyze...

    Provided By Aalto University

  • White Papers // Feb 2011

    Message Fragmentation for Disrupted Links

    In networks with unstable links the connection between the sender and the receiver may be cut before the entire message has been transmitted. Quantization of the message into blocks before its transmission enables message fragments consisting of one or more such blocks to be transmitted successfully, even if the connection...

    Provided By Aalto University

  • White Papers // Feb 2011

    Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, the authors propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed...

    Provided By Aalto University

  • White Papers // Feb 2011

    DVB-T Receiver Performance Measurements Under Secondary System Interference

    Interest to allow secondary use on television frequency bands has been growing and recently Federal Communications Commission (FCC) opened vacant TV channels for unlicensed use. Many countries, especially in Europe, are using DVB-T standard for providing terrestrial digital television transmissions, whereas countries like U.S. rely on ATSC standard. When assessing...

    Provided By Aalto University

  • White Papers // Dec 2010

    Voice Messaging for Mobile Delay-Tolerant Networks

    Mobile ad-hoc networks, especially when they are sparse, are not well suited for ad-hoc voice communication when using end-to-end real-time audio streams: as paths grow in length, stability and forwarding performance suffer, and sometimes paths may not exist at all. In this paper, the authors suggest using asynchronous voice messaging...

    Provided By Aalto University

  • White Papers // Nov 2010

    Security Challenges in Hybrid Cloud Infrastructures

    Cloud computing has the potential to significantly change the way enterprises and their IT (Information Technology) systems run, but in order to achieve this current cloud computing model needs to be changed according to the enterprise requirements. These modifications lead to the evolution of the hybrid cloud, which is a...

    Provided By Aalto University

  • White Papers // Nov 2010

    Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments

    Cloud computing is a new computing model. According to International Data Corporation (IDC) report, security is ranked first among challenges of the cloud model. In a perfect security solution, monitoring mechanisms play an important role. In the new model, security monitoring has not been discussed yet. This paper identified a...

    Provided By Aalto University

  • White Papers // Nov 2010

    Reputation in Cloud Computing

    Nowadays the concept of cloud computing is getting popular around the Net. The capacity and scalability that cloud computing offers is making it an alternative to consider when a good infrastructure is needed. It does not matter what kind of application it is, if a cloud is used with it...

    Provided By Aalto University

  • White Papers // Nov 2010

    Network Coding for DoS Resistance

    Denial of Service (DoS) attacks is a common problem in modern computer networks. There are many proposals trying to solve this problem in different cases, however no universal solution has appeared to date. Network Coding is a promising approach which could be used to increase network resistance to such attacks....

    Provided By Aalto University

  • White Papers // Nov 2010

    In-depth Breakdown of a 6LOWPAN Stack for Sensor Networks

    There exist several open source 6LoWPAN stacks for researchers to experiment with. However, they often lack sufficient and in-depth description of the internal operation, which makes extending the stacks difficult for many of one. This paper is an extended version of the previous work documenting the internal logic of an...

    Provided By Aalto University

  • White Papers // Oct 2010

    The PASSERINE Public Key Encryption and Authentication Mechanism

    PASSERINE is a lightweight public key encryption mechanism which is based on a hybrid, randomized variant of the Rabin public key encryption scheme. Its design is targeted for extremely low-resource applications such as wireless sensor networks, RFID tags, embedded systems, and smart cards. As is the case with the Rabin...

    Provided By Aalto University

  • White Papers // Sep 2010

    Media Sector Business Drivers In 2020

    In this paper, the authors assume that radical innovations, offering new meanings, supported by radically new technology, will support the most promising business models for the media sector. To facilitate the innovation process they identified the most significant business drivers. They are clustered in nine dimensions, of which the most...

    Provided By Aalto University

  • White Papers // Sep 2010

    Semantic Interoperability in Electronic Business

    E-business refers to the utilization of Information and Communication Technologies (ICT) in support of all the activities of business. The standards developed for e-business help to facilitate the deployment of e-business. In particular, several organizations in e-business sector have produced standards and representation forms using XML. It serves as an...

    Provided By Aalto University

  • White Papers // Aug 2010

    Holistic Model Of Network Management: Action Research In Elderly Health Care

    Network management is a topic of increasing interest and scope. Trust and commitment have been identified as basic elements of a functioning network and the authors know that there are certain factors that cultivate or discourage their existence. Research on network management has offered various but ultimately partial theoretical and...

    Provided By Aalto University

  • White Papers // Aug 2010

    Project-Ending Competence In Networks: Two Cases Of Large Inter-Organizational Projects

    Continuing restructure of business driven by global economic change and new technology often requires closure of existing manufacturing facilities. In cases where these terminations are unexpected and premature, the understanding and skills of project management can be applied to the closure. A network perspective that accounts for the influence of...

    Provided By Aalto University

  • White Papers // Aug 2010

    Malware Classification Based on Call Graph Clustering

    Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based...

    Provided By Aalto University

  • White Papers // Jul 2010

    ConTug: A Receiver-Driven Transport Protocol for Content-Centric Networks

    This paper presents ConTug, a new, receiver-driven transport protocol for content-centric networks. It discusses the specific constraints of content-centric networks and describes the design of ConTug, highlighting a number of general challenges encountered while designing a transport protocol for such networks. It also presents ns-3 simulations that study how ConTug...

    Provided By Aalto University

  • White Papers // May 2010

    Feasibility of Voice Service in Cognitive Networks Over the TV Spectrum

    The authors consider a cognitive network where the secondary users generate voice traffic and search for sharing opportunities over the TV spectrum. From the cognitive network perspective the TV bands can be idle, occupied or acceptable. A band is classified as acceptable when the TV signal is present but the...

    Provided By Aalto University

  • White Papers // Apr 2010

    Reliable Data Delivery for Publish/Subscribe Networks

    Network architectures built completely on publish and subscribe primitives instead of send and receive, have recently attracted many researchers. Pub/sub paradigm changes the networking completely: end-to-end principle breaks, communication channels become unidirectional, and multicast becomes a norm. Although pub/sub has attracted many, the research has been focusing on the network...

    Provided By Aalto University

  • White Papers // Mar 2010

    Competitive Actions And Dynamics In Project Marketing: Identifying Causal Mechanisms

    In project marketing research, there is limited understanding of the mechanisms of how central project marketing actions lead to success and good business performance of the project-based firm. The purpose of this conceptual paper is to extend the understanding of the content and repertoire of (competitive) actions along the project...

    Provided By Aalto University

  • White Papers // Feb 2010

    Mobile Networks Unplugged

    Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand are growing rapidly, both in the number of users and in capacity - since most Internet/web resources continue being tailored for fast fixed line access. A lot of engineering has...

    Provided By Aalto University

  • White Papers // Feb 2010

    Towards More Adaptive Voice Applications

    With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this purpose, congestion control mechanisms have been devised for various transport and (partly) application protocols, and application programs may present, e.g., data rate information to the...

    Provided By Aalto University

  • White Papers // Feb 2010

    Opportunistic Web Access Via WLAN Hotspots

    Mobile phones are becoming commonplace for consuming Internet content and services. However, availability, affordability, and quality of the supposedly ubiquitous cellular network infrastructure may be limited, so that delay-tolerant web access via WLAN hotspots becomes an interesting alternative, even in urban areas. In this paper, the authors explore mobile web...

    Provided By Aalto University

  • White Papers // Jan 2008

    Towards a Financial Ontology - A Comparison of e-Business Process Standards

    Currently, there are multiple standards to support business process integration in different industries, including the financial industry. However, the standards are designed for different purposes and support different processes. Generation of a high-level ontology would provide means to enhance the interoperability between standards and support streamlined processes within the financial...

    Provided By Aalto University

  • White Papers // Mar 2012

    Virtual RTCP: A Case Study of Monitoring and Repair for UDP-Based IPTV Systems

    IPTV systems have seen widespread deployment, but often lack robust mechanisms for monitoring the quality of experience. This makes it difficult for network operators to ensure that their services match the quality of traditional broadcast TV systems, leading to consumer dissatisfaction. The authors present a case study of virtual RTCP,...

    Provided By Aalto University

  • White Papers // Feb 2010

    Opportunistic Web Access Via WLAN Hotspots

    Mobile phones are becoming commonplace for consuming Internet content and services. However, availability, affordability, and quality of the supposedly ubiquitous cellular network infrastructure may be limited, so that delay-tolerant web access via WLAN hotspots becomes an interesting alternative, even in urban areas. In this paper, the authors explore mobile web...

    Provided By Aalto University

  • White Papers // Feb 2010

    Towards More Adaptive Voice Applications

    With the Internet designed to provide best-effort packet transmission, applications are expected to adapt dynamically to the operating conditions observed in the network. For this purpose, congestion control mechanisms have been devised for various transport and (partly) application protocols, and application programs may present, e.g., data rate information to the...

    Provided By Aalto University

  • White Papers // Feb 2010

    Mobile Networks Unplugged

    Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand are growing rapidly, both in the number of users and in capacity - since most Internet/web resources continue being tailored for fast fixed line access. A lot of engineering has...

    Provided By Aalto University

  • White Papers // Mar 2011

    Using Buffer Space Advertisements to Avoid Congestion in Mobile Opportunistic DTNs

    This paper investigates congestion control in opportunistic networks that use Delay-Tolerant Networking (DTN) as a basis for communication. The authors propose a mechanism that advertises buffer occupancy information to adjacent nodes and avoids forwarding through nodes with high buffer occupancy. The nodes then achieve global congestion avoidance simply based on...

    Provided By Aalto University

  • White Papers // Dec 2010

    Voice Messaging for Mobile Delay-Tolerant Networks

    Mobile ad-hoc networks, especially when they are sparse, are not well suited for ad-hoc voice communication when using end-to-end real-time audio streams: as paths grow in length, stability and forwarding performance suffer, and sometimes paths may not exist at all. In this paper, the authors suggest using asynchronous voice messaging...

    Provided By Aalto University

  • White Papers // Feb 2011

    Message Fragmentation for Disrupted Links

    In networks with unstable links the connection between the sender and the receiver may be cut before the entire message has been transmitted. Quantization of the message into blocks before its transmission enables message fragments consisting of one or more such blocks to be transmitted successfully, even if the connection...

    Provided By Aalto University

  • White Papers // Feb 2011

    Floating Content: Information Sharing in Urban Areas

    Content sharing using personal web pages, blogs, or online social networks is a common means for people to maintain contact with their friends, colleagues, and acquaintances. While such means are essential to overcome distances, using infrastructure services for location-based services may not be desirable. In this paper, the authors analyze...

    Provided By Aalto University

  • White Papers // May 2012

    Exploiting Hardware Heterogeneity Within the Same Instance Type of Amazon EC2

    Cloud computing providers might start with near homogeneous hardware environment. Over time, the homogeneous environment will most likely evolve into heterogeneous one because of possible upgrades and replacement of outdated hardware. In turn, the hardware heterogeneity will result into performance variation. In this paper, the authors look into the hardware...

    Provided By Aalto University

  • White Papers // Mar 2012

    Minimizing Slowdown in Heterogeneous Size-Aware Dispatching Systems

    The authors consider a system of parallel queues where tasks are assigned (dispatched) to one of the available servers upon arrival. The dispatching decision is based on the full state information, i.e., on the sizes of the new and existing jobs. They are interested in minimizing the so-called mean slowdown...

    Provided By Aalto University

  • White Papers // May 2012

    Continuum Percolation Threshold for Permeable Aligned Cylinders and Opportunistic Networking

    In the continuum percolation problem, objects of given shape are placed according to a k-dimensional Poisson process. Two objects are neighbors if they overlap. The percolation is said to occur if with a positive probability a random object belongs to an infinite cluster, which exists only when the density of...

    Provided By Aalto University

  • White Papers // Aug 2012

    Criticality of Large Delay Tolerant Networks Via Directed Continuum Percolation in Space-Time

    Delay-Tolerant Networking (DTN) is a last-resort networking paradigm for mobile nodes when direct and multi-hop connections are infeasible, i.e., the network is not connected and nodes have to carry the messages to the next node (store-carry-forward). The authors study the capacity of DTN to deliver a message to its destination(s)...

    Provided By Aalto University

  • White Papers // Aug 2012

    Per-Node Throughput Performance of Overlapping Cognitive Radio Networks

    Multiple Cognitive Radio (CR) networks may exist in the same spatial domain in many cases. In this paper, the authors consider two uncoordinated and geographically overlapping CR networks coexisting together with a primary network. They specifically study the achievable per-node throughput performance of the CR networks. Firstly, an interference model...

    Provided By Aalto University

  • White Papers // May 2012

    On the Exact Distribution of the Scaled Largest Eigenvalue

    In this paper, the authors study the distribution of the scaled largest eigenvalue of complex Wishart matrices, which has diverse applications both in statistics and wireless communications. Exact expressions, valid for any matrix dimensions, have been derived for the probability density function and the cumulative distribution function. The derived results...

    Provided By Aalto University

  • White Papers // May 2012

    On Finding Multicast Paths in the Internet

    This paper evaluates the so-called Multicasting Via Paths (MVP) protocol. Both an ILP-based (exact) algorithm and a greedy heuristic algorithm for finding MVP paths are presented. By numerical experiments, the authors find that MVP is usually cheaper than IP multicast within ISP networks (in terms of sum of edge costs),...

    Provided By Aalto University

  • White Papers // May 2012

    Towards Robust, Scalable, and Fast Internet Via Explicit Forwarding Engines (EFE)

    This paper argues that the scalability problems of the Internet could be solved, not only in the control plane, but also in the forwarding plane. To this end, an explicit forwarding scheme is presented. The authors' scheme alleviates the Internet routing scalability problem, and facilitates fast forwarding, enforcement of fine-grained...

    Provided By Aalto University

  • White Papers // May 2012

    Scaling Bloom Filter Based Multicast With Hierarchical Tree Splitting

    Bloom Filter based multicast has been proposed as a source-specific multicast solution to eliminate the multicast state requirements in the routers. However, the inherent limitation, the false positives, in the Bloom filter data structure amplifies the bandwidth wastage when the multicast tree scales to a large number of receivers. In...

    Provided By Aalto University

  • White Papers // Mar 2012

    Exploiting Traffic Scheduling Mechanisms to Reduce Transmission Cost on Mobile Devices

    Energy consumption of wireless data transmission heavily depends on the shape of the outgoing traffic of the mobile device. In this paper, the authors propose a traffic scheduler that shapes the packets into consistent bursts based on per-packet performance constraints in order to reduce the overall transmission cost. Their scheduler...

    Provided By Aalto University

  • White Papers // Mar 2012

    Device-to-Device Underlay Cellular Network Based on Rate Splitting

    The authors consider rate splitting and interference cancelation in Device-To-Device (D2D) communications underlaying a cellular network. They assume that a transmitted message is split into a private and a public part, as in Han-Kobayashi scheme. The private part is decodable only by the intended receiver, whereas the public part is...

    Provided By Aalto University

  • White Papers // Mar 2012

    Performance of Target Tracking Applications in Multi-Channel Wireless Sensor Networks

    Several future wireless communication systems will exploit multiple frequency channels simultaneously to reduce delay, enhance throughput and/or improve robustness. Nevertheless, the impact of multi-channel communications on different applications has not been comprehensively studied even though it is of significant importance to understand the interdependencies between the communication and application parameters....

    Provided By Aalto University

  • White Papers // Sep 2012

    Design of Spectrum Sensing Policy for Multi-User Multi-Band Cognitive Radio Network

    Finding an optimal sensing policy for a particular access policy and sensing scheme is a laborious combinatorial problem that requires the system model parameters to be known. In practice the parameters or the model itself may not be completely known making reinforcement learning methods appealing. In this paper a non-parametric...

    Provided By Aalto University

  • White Papers // Dec 2012

    New Algorithms for Position Heaps

    Position heaps are data structures for indexed pattern matching in a string, recently introduced as an alternative to suffix trees and suffix arrays. In this paper, the authors show how to modify an algorithm by Bannai, Inenaga and Takeda for computing LZ78 parses, such that it builds position heaps in...

    Provided By Aalto University

  • White Papers // Mar 2013

    Asynchronous Multi-Core Incremental SAT Solving

    Solvers for propositional logic formulas, so called SAT solvers, are used in many practical applications. As multi-core and multi-processor hardware has become widely available, parallelizations of such solvers are actively researched. Such research typically ignores the incremental problem specification feature that modern SAT solvers possess. This feature is, however, crucial...

    Provided By Aalto University

  • White Papers // Aug 2010

    Malware Classification Based on Call Graph Clustering

    Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based...

    Provided By Aalto University

  • White Papers // Sep 2013

    Device-to-Device Data Storage for Mobile Cellular Systems

    As an alternative to downloading content from a cellular access network, mobile devices could be used to store data files and distribute them through Device-To-Device (D2D) communication. The authors consider a D2D-based storage community that is comprised of mobile users. Assuming that transmitting data from a base station to a...

    Provided By Aalto University

  • White Papers // Jan 2008

    Towards a Financial Ontology - A Comparison of e-Business Process Standards

    Currently, there are multiple standards to support business process integration in different industries, including the financial industry. However, the standards are designed for different purposes and support different processes. Generation of a high-level ontology would provide means to enhance the interoperability between standards and support streamlined processes within the financial...

    Provided By Aalto University

  • White Papers // Jul 2012

    Secure Networking for Virtual Machines in the Cloud

    Cloud computing improves utilization and flexibility of allocating computing resources while reducing the infrastructural costs. However, cloud technology is still proprietary in many cases and is tainted by security issues rooted in the multi-tenant environment of the cloud. For instance, the virtual machines of two competing companies could be served...

    Provided By Aalto University

  • White Papers // Apr 2013

    Parametrised Compositional Verification with Multiple Process and Data Types

    The authors present an LTS-based (Labeled Transition System) CSP-like (Communicating Sequential Processes) formalism for expressing parameterized systems. The parameters are process types, which determine the number of replicated components, and data types, which enable components with a parameterized state space. They prove that the formalism is compositional and show how...

    Provided By Aalto University

  • White Papers // Sep 2013

    LCT: A Parallel Distributed Testing Tool for Multithreaded Java Programs

    LIME Concolic Tester (LCT) is an open source automated testing tool that allows testing both sequential and multithreaded Java programs. The tool uses concolic testing to handle input values and Dynamic Partial Order Reduction (DPOR) combined with sleep sets to avoid exploring unnecessary inter-leavings of threads. The LCT tool has...

    Provided By Aalto University

  • White Papers // Sep 2013

    Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications

    The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates...

    Provided By Aalto University

  • White Papers // Apr 2014

    Space-Time Storage Codes for Wireless Distributed Storage Systems

    Distributed Storage Systems (DSSs) have gained a lot of interest recently, thanks to their robustness and scalability compared to single-device storage. Majority of the related research has exclusively concerned the network layer. At the same time, the number of users of, e.g., peer-to-peer (p2p) and device-to-device (d2d) networks as well...

    Provided By Aalto University

  • White Papers // Sep 2010

    Media Sector Business Drivers In 2020

    In this paper, the authors assume that radical innovations, offering new meanings, supported by radically new technology, will support the most promising business models for the media sector. To facilitate the innovation process they identified the most significant business drivers. They are clustered in nine dimensions, of which the most...

    Provided By Aalto University

  • White Papers // Aug 2014

    Characterizing Internet Video for Large-Scale Active Measurements

    Internet Service Providers (ISPs) and application service providers have a strong interest in understanding network and application performance to make sure that their customers are satisfied. The availability of high definition video content on the web has brought about a significant change in the characteristics of Internet video, but not...

    Provided By Aalto University