City University

Displaying 1-18 of 18 results

  • White Papers // Apr 2012

    IT Migration - A Way to Business Sustainability

    Companies aiming to provide a value to the customers on a continuous basis are permanently facing threats caused by fast and never ending development of the IT environment. In order to overcome all obstacles and achieve better results they have regularly to undergo innovations which can be very expensive and...

    Provided By City University

  • White Papers // Jan 2012

    Capacity of Distributed Content Delivery in Large-Scale Wireless Ad Hoc Networks

    In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go through a few access points, which implies that the capacity of wireless network is limited by the aggregated transmission data rate of these...

    Provided By City University

  • White Papers // Sep 2011

    Capability-Based Cryptographic Data Access Control in Cloud Computing

    Cloud computing has emerged as a popular model in computing world to support processing large volumetric data using clusters of commodity computers. It is the latest effort in delivering computing resources as a service. It is used to describe both a platform and a type of application. A cloud computing...

    Provided By City University

  • White Papers // Jul 2011

    The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility

    Young people today want to work at a meaningful job and make a difference in the world. Information Technology (IT) is an effective enabler for all sorts of business strategies, so it comes as no surprise that IT is useful for implementing a firm's Corporate Social Responsibility (CSR) initiative as...

    Provided By City University

  • White Papers // Jun 2011

    Development of a Window Based Security System for Electronic Data Interchange

    The Electronic Data Interchange (EDI) is the exchange of standardized documents between computer systems for business use. This paper is to make Electronic Data Interchange secure to use and to eliminate human intervention in the transfer of data between business partners so that productivity and efficiency can be improved and...

    Provided By City University

  • White Papers // Feb 2011

    Interdisciplinary Collaboration Through Designing 3D Simulation Case Studies

    Interdisciplinary collaboration is essential for the advance of research. As domain subjects become more and more specialized, researchers need to cross disciplines for insights from peers in other areas to have a broader and deeper understand of a topic at micro- and macro-levels. The authors developed a 3D virtual learning...

    Provided By City University

  • White Papers // Jan 2011

    From Exponential to Polynomial-Time Security Typing Via Principal Types

    Hunt and Sands (POPL'06) studied a Flow Sensitive Type (FST) system for multi-level security, parametric in the choice of lattice of security levels. Choosing the powerset of program variables as the security lattice yields a system which was shown to be equivalent to Amtoft and Banerjee's Hoare-style independence logic (SAS'04)....

    Provided By City University

  • White Papers // Oct 2010

    Energy Aware Uniform Cluster-Head Distribution Technique for Hierarchal Wireless Sensor Networks

    Lifetime of a WSN is directly proportional to the energy consumption of its constituent nodes. In cluster-based routing, all the cluster-heads may be selected from one part of the network. Since routing in these networks are one of the major sources of energy drains, therefore Energy Aware Uniform Cluster-Head Distribution...

    Provided By City University

  • White Papers // Jun 2010

    Securing BGP Through Existing Infrastructure and Contractual Chains (CCBGP)

    In this paper, the authors propose a novel approach that draws upon the existing architecture and contractual relationships and compares the approach to the main existing techniques for securing BGP against prefix hijacking. They define prefix hijacking as usurping control of IP prefixes through the manipulation of BGP routing tables...

    Provided By City University

  • White Papers // Nov 2009

    SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS

    Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, the authors propose cross-layer design to achieve a reliable data transmission in MANET....

    Provided By City University

  • White Papers // Sep 2009

    The Effects of Perceived Visual Aesthetics on Process Satisfaction in GSS Use

    Although Group Support Systems (GSS) can potentially have tremendous impact in helping to solve the challenges faced by organizations and societies today, research to date has primarily focused on direct outcomes, with less research focusing on factors contributing to use and continuing use of GSS. Integrating hedonic elements into the...

    Provided By City University

  • White Papers // Jul 2009

    Ethernet Topology Discovery: A Survey

    Ethernet networks have undergone impressive growth since the past few decades. This growth can be appreciated in terms of the equipment, such as switches and links, that have been added, as well as in the number of users that it supports. In parallel to this expansion, over the past decade...

    Provided By City University

  • White Papers // Jul 2009

    Graph Theory and Optimization Problems for Very Large Networks

    Graph theory provides a primary tool for analyzing and designing computer communication networks. In the past few decades, Graph theory has been used to study various types of networks, including the Internet, wide Area Networks, Local Area Networks, and networking protocols such as border Gateway Protocol, Open shortest Path Protocol,...

    Provided By City University

  • White Papers // Apr 2009

    Toward Ubiquitous Video-Based Cyber-Physical Systems

    Cyber-Physical Systems (CPS) is a new generation of engineered systems that integrate physical systems with the capability of networked computing and control. Real-time video capture and communication is expected to be an important function in many Cyber-Physical Systems that involve camera-equipped mobile phones. In this paper, the authors present AnySense,...

    Provided By City University

  • White Papers // Feb 2009

    Pension Fund Performance And Risk-Taking Under Decentralized Investment Management

    This paper uses a proprietary dataset to study two key shifts in the structure of the UK pension fund industry from 1984 to 2004. Specifically, most pension fund sponsors shifted from balanced managers (those managing across all asset classes) to specialist managers (those specializing within a single asset class), and...

    Provided By City University

  • White Papers // Nov 2008

    ?Market Liquidity And Stock Size Premia In Emerging Financial Markets: The Implications For Foreign Investment ?

    Equity markets are increasingly seen as important sources of investment funds in many emerging economies. Furthermore, many countries see the development of such markets as a means to facilitate both foreign equity portfolio investment and foreign direct investment (FDI). This may occur through acquisition of shareholdings in domestic companies, which...

    Provided By City University

  • White Papers // Oct 2008

    Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network

    In this paper, the authors present empirical results and speculative analysis based on observations collected over a two month period from studies with two high-interaction honeynets, deployed in a corporate and an SME (Small to Medium Enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of...

    Provided By City University

  • White Papers // Dec 2006

    Firewall Configuration: An Application of Multiagent Metalevel Argumentation

    Firewalls are an important tool in the provision of network security. Packet filtering firewalls are configured by providing a set of rules that identify how to handle individual data packets that arrive at the firewall. In large firewall configurations, conflicts may arise between these rules. Argumentation provides a way of...

    Provided By City University

  • White Papers // Jan 2012

    Capacity of Distributed Content Delivery in Large-Scale Wireless Ad Hoc Networks

    In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go through a few access points, which implies that the capacity of wireless network is limited by the aggregated transmission data rate of these...

    Provided By City University

  • White Papers // Nov 2008

    ?Market Liquidity And Stock Size Premia In Emerging Financial Markets: The Implications For Foreign Investment ?

    Equity markets are increasingly seen as important sources of investment funds in many emerging economies. Furthermore, many countries see the development of such markets as a means to facilitate both foreign equity portfolio investment and foreign direct investment (FDI). This may occur through acquisition of shareholdings in domestic companies, which...

    Provided By City University

  • White Papers // Jul 2009

    Ethernet Topology Discovery: A Survey

    Ethernet networks have undergone impressive growth since the past few decades. This growth can be appreciated in terms of the equipment, such as switches and links, that have been added, as well as in the number of users that it supports. In parallel to this expansion, over the past decade...

    Provided By City University

  • White Papers // Jul 2009

    Graph Theory and Optimization Problems for Very Large Networks

    Graph theory provides a primary tool for analyzing and designing computer communication networks. In the past few decades, Graph theory has been used to study various types of networks, including the Internet, wide Area Networks, Local Area Networks, and networking protocols such as border Gateway Protocol, Open shortest Path Protocol,...

    Provided By City University

  • White Papers // Feb 2011

    Interdisciplinary Collaboration Through Designing 3D Simulation Case Studies

    Interdisciplinary collaboration is essential for the advance of research. As domain subjects become more and more specialized, researchers need to cross disciplines for insights from peers in other areas to have a broader and deeper understand of a topic at micro- and macro-levels. The authors developed a 3D virtual learning...

    Provided By City University

  • White Papers // Nov 2009

    SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS

    Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, the authors propose cross-layer design to achieve a reliable data transmission in MANET....

    Provided By City University

  • White Papers // Sep 2009

    The Effects of Perceived Visual Aesthetics on Process Satisfaction in GSS Use

    Although Group Support Systems (GSS) can potentially have tremendous impact in helping to solve the challenges faced by organizations and societies today, research to date has primarily focused on direct outcomes, with less research focusing on factors contributing to use and continuing use of GSS. Integrating hedonic elements into the...

    Provided By City University

  • White Papers // Feb 2009

    Pension Fund Performance And Risk-Taking Under Decentralized Investment Management

    This paper uses a proprietary dataset to study two key shifts in the structure of the UK pension fund industry from 1984 to 2004. Specifically, most pension fund sponsors shifted from balanced managers (those managing across all asset classes) to specialist managers (those specializing within a single asset class), and...

    Provided By City University

  • White Papers // Apr 2009

    Toward Ubiquitous Video-Based Cyber-Physical Systems

    Cyber-Physical Systems (CPS) is a new generation of engineered systems that integrate physical systems with the capability of networked computing and control. Real-time video capture and communication is expected to be an important function in many Cyber-Physical Systems that involve camera-equipped mobile phones. In this paper, the authors present AnySense,...

    Provided By City University

  • White Papers // Sep 2011

    Capability-Based Cryptographic Data Access Control in Cloud Computing

    Cloud computing has emerged as a popular model in computing world to support processing large volumetric data using clusters of commodity computers. It is the latest effort in delivering computing resources as a service. It is used to describe both a platform and a type of application. A cloud computing...

    Provided By City University

  • White Papers // Oct 2010

    Energy Aware Uniform Cluster-Head Distribution Technique for Hierarchal Wireless Sensor Networks

    Lifetime of a WSN is directly proportional to the energy consumption of its constituent nodes. In cluster-based routing, all the cluster-heads may be selected from one part of the network. Since routing in these networks are one of the major sources of energy drains, therefore Energy Aware Uniform Cluster-Head Distribution...

    Provided By City University

  • White Papers // Jan 2011

    From Exponential to Polynomial-Time Security Typing Via Principal Types

    Hunt and Sands (POPL'06) studied a Flow Sensitive Type (FST) system for multi-level security, parametric in the choice of lattice of security levels. Choosing the powerset of program variables as the security lattice yields a system which was shown to be equivalent to Amtoft and Banerjee's Hoare-style independence logic (SAS'04)....

    Provided By City University

  • White Papers // Jun 2011

    Development of a Window Based Security System for Electronic Data Interchange

    The Electronic Data Interchange (EDI) is the exchange of standardized documents between computer systems for business use. This paper is to make Electronic Data Interchange secure to use and to eliminate human intervention in the transfer of data between business partners so that productivity and efficiency can be improved and...

    Provided By City University

  • White Papers // Dec 2006

    Firewall Configuration: An Application of Multiagent Metalevel Argumentation

    Firewalls are an important tool in the provision of network security. Packet filtering firewalls are configured by providing a set of rules that identify how to handle individual data packets that arrive at the firewall. In large firewall configurations, conflicts may arise between these rules. Argumentation provides a way of...

    Provided By City University

  • White Papers // Jun 2010

    Securing BGP Through Existing Infrastructure and Contractual Chains (CCBGP)

    In this paper, the authors propose a novel approach that draws upon the existing architecture and contractual relationships and compares the approach to the main existing techniques for securing BGP against prefix hijacking. They define prefix hijacking as usurping control of IP prefixes through the manipulation of BGP routing tables...

    Provided By City University

  • White Papers // Jul 2011

    The Role of Information Technology in Fulfilling the Promise of Corporate Social Responsibility

    Young people today want to work at a meaningful job and make a difference in the world. Information Technology (IT) is an effective enabler for all sorts of business strategies, so it comes as no surprise that IT is useful for implementing a firm's Corporate Social Responsibility (CSR) initiative as...

    Provided By City University

  • White Papers // Oct 2008

    Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network

    In this paper, the authors present empirical results and speculative analysis based on observations collected over a two month period from studies with two high-interaction honeynets, deployed in a corporate and an SME (Small to Medium Enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of...

    Provided By City University

  • White Papers // Apr 2012

    IT Migration - A Way to Business Sustainability

    Companies aiming to provide a value to the customers on a continuous basis are permanently facing threats caused by fast and never ending development of the IT environment. In order to overcome all obstacles and achieve better results they have regularly to undergo innovations which can be very expensive and...

    Provided By City University