Bogazici University

Displaying 1-17 of 17 results

  • White Papers // Dec 2013

    On the Security of Recently Proposed RFID Protocols

    RFID authentication protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentication protocols that try to provide key updating with lightweight cryptographic primitives. In this paper, the authors analyze the security...

    Provided By Bogazici University

  • White Papers // Sep 2012

    Using Software Architectural Patterns for Synthetic Embedded Multicore Benchmark Development

    Benchmarks capture the essence of many important real-world applications and allow performance, and power analysis while developing new systems. Synthetic benchmarks are a miniaturized form of benchmarks that allow high simulation speeds and act as proxies to proprietary applications. Software architecture principles guide the development of new applications and benchmarks....

    Provided By Bogazici University

  • White Papers // Feb 2012

    On the Complexity of Constructing Minimum Reload Cost Path-Trees

    The reload cost concept refers to the cost that occurs at a vertex along a path on an edge-colored graph when it traverses an internal vertex between two edges of different colors. The reload cost depends only on the colors of the traversed edges. Previous work on reload costs focuses...

    Provided By Bogazici University

  • White Papers // May 2011

    Developing a Framework for Integrating Knowledge Management and Decision Support Systems: Application to Time Series Forecasting

    This paper is to develop a framework that integrates Knowledge Management (KM) and Decision Support Systems (DSS) by using Knowledge Discovery Techniques (KDT). KDT are applied for achieving conversions among different types of knowledge and also creating new models from previously defined ones. Extracted neural network rules are stored into...

    Provided By Bogazici University

  • White Papers // May 2011

    Exploring Policy-Formulation for SMEs in Cloud Computing: The Case of Turkey

    The promise of competitiveness that clouds offer to enterprises creates a substantial part of the cloud phenomenon. 2010 European Union report on cloud computing identifies the strong commercial nature of clouds and addresses new policies and actions for the competitiveness of European industry. Today, European Union attributes competitiveness to the...

    Provided By Bogazici University

  • White Papers // Apr 2011

    Standardization of Information Systems Development Processes and Banking Industry Adaptations

    This paper examines the current system development processes of three major Turkish banks in terms of compliance to internationally accepted system development and software engineering standards to determine the common process problems of banks. After an in-depth investigation into system development and software engineering standards, related process-based standards were selected....

    Provided By Bogazici University

  • White Papers // Feb 2011

    A Salient Missing Link in RFID Security Protocols

    In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and...

    Provided By Bogazici University

  • White Papers // Feb 2011

    Assessing The Responsiveness Of Private Investment To Economic Reforms: The Case Of MENA Countries

    During the 1980s and the 1990s, private investment in the Middle East and North Africa (MENA) has on average shown a decreasing or stagnant trend. This contrasts with the situation of the Asian economies, where private investment has always been more dynamic. In this paper, it is empirically shown for...

    Provided By Bogazici University

  • White Papers // Jan 2011

    Governance And Private Investment In The Middle East And North Africa

    This paper addresses the issue of the low level of private investment in the Middle East and North Africa (MENA) region, with special emphasis on the role of governance. Based on the existing literature, the authors have categorized what types of governance institutions are more detrimental to entrepreneurial investments. They...

    Provided By Bogazici University

  • White Papers // Jan 2011

    Fast Data Collection in Tree-Based Wireless Sensor Networks

    The authors investigate the following fundamental question - how fast can information be collected from a wireless sensor network organized as tree? To address this, they explore and evaluate a number of different techniques using realistic simulation models under the many-to-one communication paradigm known as convergecast. They first consider time...

    Provided By Bogazici University

  • White Papers // May 2010

    Security Challenges in Cloud Computing

    Cloud Computing is one of the biggest buzzwords in the computer world these days. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Virtualization is the core technology behind cloud resource sharing. This environment strives to be dynamic, reliable, and customizable with a guaranteed quality...

    Provided By Bogazici University

  • White Papers // Apr 2010

    Structural Change And Economic Growth: A Calibration Exercise For Turkey

    Using data for the years 1972-2006, the authors calibrate the dynamic general equilibrium model of structural change by Kongsamut et al. (2001) to Turkey. They then predict the shares of output and employment for the agricultural, manufacturing, and services sectors along the balanced growth path for Turkey until 2050. Similar...

    Provided By Bogazici University

  • White Papers // Feb 2010

    Bounded-Degree Minimum-Radius Spanning Trees for Fast Data Collection in Sensor Networks

    In sensor networks that require fast and timely collection of aggregated data to a common sink over a tree-based routing topology, the authors define aggregated sink throughput as the inverse of the total number of time slots required to schedule all the tree edges once per TDMA frame, and delay...

    Provided By Bogazici University

  • White Papers // Jan 2010

    Scalability and Security Conflict for RFID Authentication Protocols

    Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as...

    Provided By Bogazici University

  • White Papers // Oct 2009

    Secure RFID Authentication with Efficient Key-Lookup

    In this paper, the authors analyze Storage awareness RFID Authentication Protocol based on sparse tree structure (SAPA), which provides backward untraceability and reduces the space for storing key sequence. They discover that SAPA does not provide location and information privacy between successful authentication sessions and does not resist denial of...

    Provided By Bogazici University

  • White Papers // May 2009

    A Markov Decision Process based Flow Assignment Framework for Heterogeneous Network Access

    The authors consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, the authors address the problem of efficient utilization of multiple access networks (wireless and/or wireline) by devices via optimal assignment of traffic flows with given utilities to different networks. The...

    Provided By Bogazici University

  • White Papers // Mar 2008

    A Survey on Querying Encrypted XML Documents for Databases as a Service

    Recently a popular trend in business is \"To concentrate on their own business and outsource the rest\". This trend is also valid in information technology. \"Database as a service\" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the...

    Provided By Bogazici University

  • White Papers // May 2009

    A Markov Decision Process based Flow Assignment Framework for Heterogeneous Network Access

    The authors consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, the authors address the problem of efficient utilization of multiple access networks (wireless and/or wireline) by devices via optimal assignment of traffic flows with given utilities to different networks. The...

    Provided By Bogazici University

  • White Papers // Jan 2010

    Scalability and Security Conflict for RFID Authentication Protocols

    Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they cannot provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as...

    Provided By Bogazici University

  • White Papers // Jan 2011

    Governance And Private Investment In The Middle East And North Africa

    This paper addresses the issue of the low level of private investment in the Middle East and North Africa (MENA) region, with special emphasis on the role of governance. Based on the existing literature, the authors have categorized what types of governance institutions are more detrimental to entrepreneurial investments. They...

    Provided By Bogazici University

  • White Papers // Feb 2011

    Assessing The Responsiveness Of Private Investment To Economic Reforms: The Case Of MENA Countries

    During the 1980s and the 1990s, private investment in the Middle East and North Africa (MENA) has on average shown a decreasing or stagnant trend. This contrasts with the situation of the Asian economies, where private investment has always been more dynamic. In this paper, it is empirically shown for...

    Provided By Bogazici University

  • White Papers // Apr 2011

    Standardization of Information Systems Development Processes and Banking Industry Adaptations

    This paper examines the current system development processes of three major Turkish banks in terms of compliance to internationally accepted system development and software engineering standards to determine the common process problems of banks. After an in-depth investigation into system development and software engineering standards, related process-based standards were selected....

    Provided By Bogazici University

  • White Papers // Apr 2010

    Structural Change And Economic Growth: A Calibration Exercise For Turkey

    Using data for the years 1972-2006, the authors calibrate the dynamic general equilibrium model of structural change by Kongsamut et al. (2001) to Turkey. They then predict the shares of output and employment for the agricultural, manufacturing, and services sectors along the balanced growth path for Turkey until 2050. Similar...

    Provided By Bogazici University

  • White Papers // Jan 2011

    Fast Data Collection in Tree-Based Wireless Sensor Networks

    The authors investigate the following fundamental question - how fast can information be collected from a wireless sensor network organized as tree? To address this, they explore and evaluate a number of different techniques using realistic simulation models under the many-to-one communication paradigm known as convergecast. They first consider time...

    Provided By Bogazici University

  • White Papers // Feb 2010

    Bounded-Degree Minimum-Radius Spanning Trees for Fast Data Collection in Sensor Networks

    In sensor networks that require fast and timely collection of aggregated data to a common sink over a tree-based routing topology, the authors define aggregated sink throughput as the inverse of the total number of time slots required to schedule all the tree edges once per TDMA frame, and delay...

    Provided By Bogazici University

  • White Papers // Feb 2011

    A Salient Missing Link in RFID Security Protocols

    In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and...

    Provided By Bogazici University

  • White Papers // Feb 2012

    On the Complexity of Constructing Minimum Reload Cost Path-Trees

    The reload cost concept refers to the cost that occurs at a vertex along a path on an edge-colored graph when it traverses an internal vertex between two edges of different colors. The reload cost depends only on the colors of the traversed edges. Previous work on reload costs focuses...

    Provided By Bogazici University

  • White Papers // Oct 2009

    Secure RFID Authentication with Efficient Key-Lookup

    In this paper, the authors analyze Storage awareness RFID Authentication Protocol based on sparse tree structure (SAPA), which provides backward untraceability and reduces the space for storing key sequence. They discover that SAPA does not provide location and information privacy between successful authentication sessions and does not resist denial of...

    Provided By Bogazici University

  • White Papers // May 2011

    Exploring Policy-Formulation for SMEs in Cloud Computing: The Case of Turkey

    The promise of competitiveness that clouds offer to enterprises creates a substantial part of the cloud phenomenon. 2010 European Union report on cloud computing identifies the strong commercial nature of clouds and addresses new policies and actions for the competitiveness of European industry. Today, European Union attributes competitiveness to the...

    Provided By Bogazici University

  • White Papers // May 2011

    Developing a Framework for Integrating Knowledge Management and Decision Support Systems: Application to Time Series Forecasting

    This paper is to develop a framework that integrates Knowledge Management (KM) and Decision Support Systems (DSS) by using Knowledge Discovery Techniques (KDT). KDT are applied for achieving conversions among different types of knowledge and also creating new models from previously defined ones. Extracted neural network rules are stored into...

    Provided By Bogazici University

  • White Papers // Dec 2013

    On the Security of Recently Proposed RFID Protocols

    RFID authentication protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentication protocols that try to provide key updating with lightweight cryptographic primitives. In this paper, the authors analyze the security...

    Provided By Bogazici University

  • White Papers // Mar 2008

    A Survey on Querying Encrypted XML Documents for Databases as a Service

    Recently a popular trend in business is \"To concentrate on their own business and outsource the rest\". This trend is also valid in information technology. \"Database as a service\" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the...

    Provided By Bogazici University

  • White Papers // Sep 2012

    Using Software Architectural Patterns for Synthetic Embedded Multicore Benchmark Development

    Benchmarks capture the essence of many important real-world applications and allow performance, and power analysis while developing new systems. Synthetic benchmarks are a miniaturized form of benchmarks that allow high simulation speeds and act as proxies to proprietary applications. Software architecture principles guide the development of new applications and benchmarks....

    Provided By Bogazici University

  • White Papers // May 2010

    Security Challenges in Cloud Computing

    Cloud Computing is one of the biggest buzzwords in the computer world these days. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Virtualization is the core technology behind cloud resource sharing. This environment strives to be dynamic, reliable, and customizable with a guaranteed quality...

    Provided By Bogazici University