City University London

Displaying 1-15 of 15 results

  • White Papers // Sep 2013

    A Survey of Intrusion Detection Techniques in Cloud

    Cloud computing provides scalable, virtualized on demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend...

    Provided By City University London

  • White Papers // Aug 2013

    Incremental Certification of Cloud Services

    Cloud is becoming fast a critical infrastructure. However, several recent incidents regarding the security of cloud services clearly demonstrate that security rightly remains one of the major concerns of enterprises and the general public regarding the use of the cloud. Despite advancements of research related to cloud security, the authors...

    Provided By City University London

  • White Papers // Nov 2012

    An Architecture for Certification-Aware Service Discovery

    Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization). Also, some of the key promises of service-orientation -...

    Provided By City University London

  • White Papers // Oct 2011

    Dynamic Virtual Private Network Provisioning From Multiple Cloud Infrastructure Service Providers

    The Cloud infrastructure service providers currently provision basic virtualized computing resources as on-demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across multiple cloud service providers, although this is not due to any inherent incompatibility or proprietary...

    Provided By City University London

  • White Papers // Apr 2011

    OS Diversity for Intrusion Tolerance: Myth or Reality?

    One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are...

    Provided By City University London

  • White Papers // Apr 2011

    A Pearl on SAT and SMT Solving in Prolog

    A succinct SAT solver is presented that exploits the control provided by delay declarations to implement watched literals and unit propagation. Despite its brevity the solver is surprisingly powerful and its elegant use of Prolog constructs is presented as a programming pearl. Furthermore, the SAT solver can be integrated into...

    Provided By City University London

  • White Papers // Feb 2011

    Joint Rate Control and Scheduling for Delay-Sensitive Traffic in Multihop Wireless Networks

    The prevalent assumption in the current utility maximisation-based rate control and scheduling solutions for multihop wireless networks has been that bounded packet end-to-end delay can be attained by guaranteeing a pre-specified bandwidth. However, in addition to the inherent complexities in determining the exact bandwidth, this approach requires an admission control...

    Provided By City University London

  • White Papers // Jan 2011

    Dynamic Bandwidth Control in Wireless Mesh Networks: A Quality of Experience Based Approach

    Wireless Mesh Networks (WMNs) are gaining an increasingly important role in next generation wireless networks. Due to their advantages over other wireless and wired networks, WMNs are undergoing rapid progress and are supposed to deliver wireless services for a large variety of applications. Especially real-time applications such as voice over...

    Provided By City University London

  • White Papers // Aug 2010

    Career Planning In A Competitive Job Market

    Establishing and developing a network of useful contacts is all the more important. Some jobs may never be advertised but are filled by individuals already known to the organization. Perhaps they have worked there e.g. in a paid or unpaid capacity, or they have had substantial contact with the organization...

    Provided By City University London

  • White Papers // Apr 2010

    Quality Ladders In A Ricardian Model Of Trade With Nonhomothetic Preferences

    The literature on North-South trade has explored conditions under which international trade might magnify income disparities between the advanced North and the backward South. Little attention has yet been placed on the effect of trade on countries that do not display substantial dissimilarities concerning aggregate capital endowments. The authors show...

    Provided By City University London

  • White Papers // Mar 2010

    QoSiLAN - A Heterogeneous Approach to Quality of Service in Local Area Networks

    Since most real-time audio and video applications lack Quality of Service (QoS) support and QoS-aware network hardware is not common in consumer grade networks, the Quality of Experience (QoE) of, for example, high definition Internet Protocol TeleVision (IPTV) is very limited. Therefore, this paper proposes a novel approach for enabling...

    Provided By City University London

  • White Papers // Mar 2010

    Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs

    Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home environments, a system was developed which enables self-organised QoS for unmanaged networks through host implementations - in contrast...

    Provided By City University London

  • White Papers // Jan 2010

    PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web

    Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have been proposals for a semantic web addressing these requirements. Promising approaches for such a semantic web are the integration of rules to specify and implement workflows and object-orientation to...

    Provided By City University London

  • White Papers // Oct 2009

    Rate Control for Delay-Sensitive Traffic in Multihop Wireless Networks

    The authors propose two multipath rate control algorithms that guarantee bounded end-to-end delay in multihop wireless networks. Their work extends the previous research on optimal rate control and scheduling in multihop wireless networks, to support inelastic delay requirements. Using the relationship between dual variables and packet delay, they develop two...

    Provided By City University London

  • White Papers // Jun 2009

    Fault Tolerance and Resilience: Meanings, Measures and Assessment

    In science and engineering, words may be re-assigned technical meanings that are more specific than their meanings in ordinary usage. Examples include "Reliability" and "Dependability". This practice is useful for more precise reasoning about complex problems involving subtle differences between concepts; but new specialised words are also sometimes adopted for...

    Provided By City University London

  • White Papers // Apr 2011

    A Pearl on SAT and SMT Solving in Prolog

    A succinct SAT solver is presented that exploits the control provided by delay declarations to implement watched literals and unit propagation. Despite its brevity the solver is surprisingly powerful and its elegant use of Prolog constructs is presented as a programming pearl. Furthermore, the SAT solver can be integrated into...

    Provided By City University London

  • White Papers // Oct 2011

    Dynamic Virtual Private Network Provisioning From Multiple Cloud Infrastructure Service Providers

    The Cloud infrastructure service providers currently provision basic virtualized computing resources as on-demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across multiple cloud service providers, although this is not due to any inherent incompatibility or proprietary...

    Provided By City University London

  • White Papers // Apr 2011

    OS Diversity for Intrusion Tolerance: Myth or Reality?

    One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are...

    Provided By City University London

  • White Papers // Jan 2010

    PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web

    Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have been proposals for a semantic web addressing these requirements. Promising approaches for such a semantic web are the integration of rules to specify and implement workflows and object-orientation to...

    Provided By City University London

  • White Papers // Aug 2010

    Career Planning In A Competitive Job Market

    Establishing and developing a network of useful contacts is all the more important. Some jobs may never be advertised but are filled by individuals already known to the organization. Perhaps they have worked there e.g. in a paid or unpaid capacity, or they have had substantial contact with the organization...

    Provided By City University London

  • White Papers // Jun 2009

    Fault Tolerance and Resilience: Meanings, Measures and Assessment

    In science and engineering, words may be re-assigned technical meanings that are more specific than their meanings in ordinary usage. Examples include "Reliability" and "Dependability". This practice is useful for more precise reasoning about complex problems involving subtle differences between concepts; but new specialised words are also sometimes adopted for...

    Provided By City University London

  • White Papers // Apr 2010

    Quality Ladders In A Ricardian Model Of Trade With Nonhomothetic Preferences

    The literature on North-South trade has explored conditions under which international trade might magnify income disparities between the advanced North and the backward South. Little attention has yet been placed on the effect of trade on countries that do not display substantial dissimilarities concerning aggregate capital endowments. The authors show...

    Provided By City University London

  • White Papers // Feb 2011

    Joint Rate Control and Scheduling for Delay-Sensitive Traffic in Multihop Wireless Networks

    The prevalent assumption in the current utility maximisation-based rate control and scheduling solutions for multihop wireless networks has been that bounded packet end-to-end delay can be attained by guaranteeing a pre-specified bandwidth. However, in addition to the inherent complexities in determining the exact bandwidth, this approach requires an admission control...

    Provided By City University London

  • White Papers // Mar 2010

    Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs

    Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home environments, a system was developed which enables self-organised QoS for unmanaged networks through host implementations - in contrast...

    Provided By City University London

  • White Papers // Mar 2010

    QoSiLAN - A Heterogeneous Approach to Quality of Service in Local Area Networks

    Since most real-time audio and video applications lack Quality of Service (QoS) support and QoS-aware network hardware is not common in consumer grade networks, the Quality of Experience (QoE) of, for example, high definition Internet Protocol TeleVision (IPTV) is very limited. Therefore, this paper proposes a novel approach for enabling...

    Provided By City University London

  • White Papers // Oct 2009

    Rate Control for Delay-Sensitive Traffic in Multihop Wireless Networks

    The authors propose two multipath rate control algorithms that guarantee bounded end-to-end delay in multihop wireless networks. Their work extends the previous research on optimal rate control and scheduling in multihop wireless networks, to support inelastic delay requirements. Using the relationship between dual variables and packet delay, they develop two...

    Provided By City University London

  • White Papers // Jan 2011

    Dynamic Bandwidth Control in Wireless Mesh Networks: A Quality of Experience Based Approach

    Wireless Mesh Networks (WMNs) are gaining an increasingly important role in next generation wireless networks. Due to their advantages over other wireless and wired networks, WMNs are undergoing rapid progress and are supposed to deliver wireless services for a large variety of applications. Especially real-time applications such as voice over...

    Provided By City University London

  • White Papers // Sep 2013

    A Survey of Intrusion Detection Techniques in Cloud

    Cloud computing provides scalable, virtualized on demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend...

    Provided By City University London

  • White Papers // Nov 2012

    An Architecture for Certification-Aware Service Discovery

    Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust domain (e.g., a single organization). Also, some of the key promises of service-orientation -...

    Provided By City University London

  • White Papers // Aug 2013

    Incremental Certification of Cloud Services

    Cloud is becoming fast a critical infrastructure. However, several recent incidents regarding the security of cloud services clearly demonstrate that security rightly remains one of the major concerns of enterprises and the general public regarding the use of the cloud. Despite advancements of research related to cloud security, the authors...

    Provided By City University London