De Montfort University

Displaying 1-17 of 17 results

  • White Papers // Aug 2012

    Comparison Between Cloud and Grid Computing

    Cloud computing is the most recent announced technology that has been launched on the network world. Clouds are considered as a new generation of Grid computing. Clouds consist of data centres which are owned by the same institute. The homogeneity within each data centre in the infrastructure is the main...

    Provided By De Montfort University

  • White Papers // Jul 2012

    Mobile Learning (M-Learning) and Educational Environments

    Mobile devices show a dramatic departure from old-fashion of computing platforms as they no more represent a static or fixed notion of context, where changes are small, absent, or predictable. With this dramatic departure, the expansion and continued evolution of modern mobile devices an opportunity has arisen for much more...

    Provided By De Montfort University

  • White Papers // Feb 2012

    Data Confidentiality in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbors' data by sending and receiving packets to and...

    Provided By De Montfort University

  • White Papers // Mar 2011

    The Ethics of Cloud Computing

    Cloud computing can be described as a current buzz word and research fashion. It is gaining prominence in commercial mainstream computing and even among private end users who are not among early adopters. Cloud computing can raise ethical issues. In many cases these will depend on particular applications and circumstances....

    Provided By De Montfort University

  • White Papers // Jun 2010

    The Influence of Game in e-Learning: An Empirical Study

    A human-computer interface is an attempt to mimic human-human communication. In human-human communication, especially in learning, students interact emotionally either with each other or with their instructor in way that minimizes, to some extent, the formality of the learning arena/environment. In web based learning these emotions are usually not present...

    Provided By De Montfort University

  • White Papers // May 2010

    Runtime Monitoring of Information Flow Policies

    The run-time verification of security properties (Integrity, Availability and Confidentiality) received increased attention from researchers. In particular, security properties that relate to information that is made available by end users is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as banking data,...

    Provided By De Montfort University

  • White Papers // Mar 2010

    Critical Success Factors For Customer Relationship Management Implementations

    The growing forces of increasing global competition, continuing customer demands, and the significant revolution in Commercial Off The Shelf (COTS) solutions, especially Customer Relationship Management (CRM) applications, have together put pressure upon many organizations to implement CRM solutions and to switch their organizational processes from being product-centric to being customer-centric....

    Provided By De Montfort University

  • White Papers // Mar 2010

    Comparing Effectiveness and Efficiency Between Multimodal and Textual Note-Taking Interfaces

    In this paper, the authors describes an experimental study conducted to investigate the use of multimodal metaphors in the interface of elearning applications. This investigation involved two different interface versions of the experimental e-learning tool. In the first interface platform (textual interface), three input modalities, were used to deliver information...

    Provided By De Montfort University

  • White Papers // Mar 2010

    Information Fusion in Biometrics: A Case Study in Online Signature

    Biometrics is constantly evolving technology which has been widely used in many official and commercial identification applications. A biometric system is essentially a pattern recognition system which makes a personal identification decision by determining the authority of specific physiological or behavioral traits. Despite considerable advances in recent years, there are...

    Provided By De Montfort University

  • White Papers // Feb 2010

    Monitoring Explicit Information Flow Using Java Byte-Code Instrumentation

    Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. That is made available by the end users of the software is achievable only to a limited degree using static...

    Provided By De Montfort University

  • White Papers // Jun 2009

    Interactive Runtime Monitoring of Information Flow Policies

    Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific properties. Recently, the verification of security properties during run-time received increased attention from researchers. In particular, security properties that relate to information that is made available by the...

    Provided By De Montfort University

  • White Papers // Jun 2009

    Design of Domain-Specific Software Systems With Parametric Code Templates

    Domain-specific languages describe specific solutions to problems in the application domain. Traditionally they form a solution composing black-box together. This, usually, involves non-deep transformations over the target model. In this paper the authors argue that it is potentially powerful to operate with grey-box to build a domain-specific software system. The...

    Provided By De Montfort University

  • White Papers // Apr 2009

    Analyser Framework to Verify Software Components

    Today, it is important for software companies to build software systems in a short time-interval, to reduce costs and to have a good market position. Therefore, well-organized and systematic development approaches are required. Reusing software components, which are well tested, can be a good solution to develop software applications in...

    Provided By De Montfort University

  • White Papers // Apr 2009

    Security Solution for Mobile Ad Hoc Network of Networks (MANoN)

    The authors' definition for Mobile Ad hoc Network of Networks (MANoNs) are a group of large autonomous wireless nodes communicating on a peer-to-peer basis in a heterogeneous environment with no pre-defined infrastructure. In fact, each node by itself is an ad hoc network with its own management. Based on the...

    Provided By De Montfort University

  • White Papers // Mar 2009

    Framework of Dynamic E-Learning Enviroment for Interactive Multimedia of Media Programming

    Using the Internet to enhance e-learning has become a trend in modern higher education institutes. E-learning platforms are increasingly becoming a significant part of the strategy for delivering online and flexible e-learning. The advance of the multimedia learning depends mainly on the development of the information technology. Recently, technological capabilities...

    Provided By De Montfort University

  • White Papers // Feb 2009

    A Property Based Framework for Trust and Reputation in Mobile Computing

    In this paper, the authors reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst they do not specify a trust model they provide a framework for property based trust, defining the observations which underpin many pre-existing trust models. This framework maintains subjectivity which should be the...

    Provided By De Montfort University

  • White Papers // Dec 2008

    Information Systems Security Management: A Critical Research Agenda

    Mainstream Information Systems Security (ISS) management research concentrates on ways of successfully securing systems from internal and external threats. Such work is legitimate and important but it often fails to explore alternative views of security. This paper builds on the critical research tradition in information systems to ask whether there...

    Provided By De Montfort University

  • White Papers // Jul 2012

    Mobile Learning (M-Learning) and Educational Environments

    Mobile devices show a dramatic departure from old-fashion of computing platforms as they no more represent a static or fixed notion of context, where changes are small, absent, or predictable. With this dramatic departure, the expansion and continued evolution of modern mobile devices an opportunity has arisen for much more...

    Provided By De Montfort University

  • White Papers // Mar 2010

    Comparing Effectiveness and Efficiency Between Multimodal and Textual Note-Taking Interfaces

    In this paper, the authors describes an experimental study conducted to investigate the use of multimodal metaphors in the interface of elearning applications. This investigation involved two different interface versions of the experimental e-learning tool. In the first interface platform (textual interface), three input modalities, were used to deliver information...

    Provided By De Montfort University

  • White Papers // Jun 2010

    The Influence of Game in e-Learning: An Empirical Study

    A human-computer interface is an attempt to mimic human-human communication. In human-human communication, especially in learning, students interact emotionally either with each other or with their instructor in way that minimizes, to some extent, the formality of the learning arena/environment. In web based learning these emotions are usually not present...

    Provided By De Montfort University

  • White Papers // Aug 2012

    Comparison Between Cloud and Grid Computing

    Cloud computing is the most recent announced technology that has been launched on the network world. Clouds are considered as a new generation of Grid computing. Clouds consist of data centres which are owned by the same institute. The homogeneity within each data centre in the infrastructure is the main...

    Provided By De Montfort University

  • White Papers // Mar 2011

    The Ethics of Cloud Computing

    Cloud computing can be described as a current buzz word and research fashion. It is gaining prominence in commercial mainstream computing and even among private end users who are not among early adopters. Cloud computing can raise ethical issues. In many cases these will depend on particular applications and circumstances....

    Provided By De Montfort University

  • White Papers // Dec 2008

    Information Systems Security Management: A Critical Research Agenda

    Mainstream Information Systems Security (ISS) management research concentrates on ways of successfully securing systems from internal and external threats. Such work is legitimate and important but it often fails to explore alternative views of security. This paper builds on the critical research tradition in information systems to ask whether there...

    Provided By De Montfort University

  • White Papers // Feb 2010

    Monitoring Explicit Information Flow Using Java Byte-Code Instrumentation

    Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific security properties such as Integrity, Availability and Confidentiality. That is made available by the end users of the software is achievable only to a limited degree using static...

    Provided By De Montfort University

  • White Papers // Mar 2010

    Critical Success Factors For Customer Relationship Management Implementations

    The growing forces of increasing global competition, continuing customer demands, and the significant revolution in Commercial Off The Shelf (COTS) solutions, especially Customer Relationship Management (CRM) applications, have together put pressure upon many organizations to implement CRM solutions and to switch their organizational processes from being product-centric to being customer-centric....

    Provided By De Montfort University

  • White Papers // Jun 2009

    Design of Domain-Specific Software Systems With Parametric Code Templates

    Domain-specific languages describe specific solutions to problems in the application domain. Traditionally they form a solution composing black-box together. This, usually, involves non-deep transformations over the target model. In this paper the authors argue that it is potentially powerful to operate with grey-box to build a domain-specific software system. The...

    Provided By De Montfort University

  • White Papers // Apr 2009

    Security Solution for Mobile Ad Hoc Network of Networks (MANoN)

    The authors' definition for Mobile Ad hoc Network of Networks (MANoNs) are a group of large autonomous wireless nodes communicating on a peer-to-peer basis in a heterogeneous environment with no pre-defined infrastructure. In fact, each node by itself is an ad hoc network with its own management. Based on the...

    Provided By De Montfort University

  • White Papers // Feb 2009

    A Property Based Framework for Trust and Reputation in Mobile Computing

    In this paper, the authors reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst they do not specify a trust model they provide a framework for property based trust, defining the observations which underpin many pre-existing trust models. This framework maintains subjectivity which should be the...

    Provided By De Montfort University

  • White Papers // Mar 2010

    Information Fusion in Biometrics: A Case Study in Online Signature

    Biometrics is constantly evolving technology which has been widely used in many official and commercial identification applications. A biometric system is essentially a pattern recognition system which makes a personal identification decision by determining the authority of specific physiological or behavioral traits. Despite considerable advances in recent years, there are...

    Provided By De Montfort University

  • White Papers // May 2010

    Runtime Monitoring of Information Flow Policies

    The run-time verification of security properties (Integrity, Availability and Confidentiality) received increased attention from researchers. In particular, security properties that relate to information that is made available by end users is achievable only to a limited degree using static verification techniques. The more sensitive the information, such as banking data,...

    Provided By De Montfort University

  • White Papers // Feb 2012

    Data Confidentiality in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbors' data by sending and receiving packets to and...

    Provided By De Montfort University

  • White Papers // Apr 2009

    Analyser Framework to Verify Software Components

    Today, it is important for software companies to build software systems in a short time-interval, to reduce costs and to have a good market position. Therefore, well-organized and systematic development approaches are required. Reusing software components, which are well tested, can be a good solution to develop software applications in...

    Provided By De Montfort University

  • White Papers // Mar 2009

    Framework of Dynamic E-Learning Enviroment for Interactive Multimedia of Media Programming

    Using the Internet to enhance e-learning has become a trend in modern higher education institutes. E-learning platforms are increasingly becoming a significant part of the strategy for delivering online and flexible e-learning. The advance of the multimedia learning depends mainly on the development of the information technology. Recently, technological capabilities...

    Provided By De Montfort University

  • White Papers // Jun 2009

    Interactive Runtime Monitoring of Information Flow Policies

    Computer systems are verified to check the correctness or validated to check the performance of the software system with respect to specific properties. Recently, the verification of security properties during run-time received increased attention from researchers. In particular, security properties that relate to information that is made available by the...

    Provided By De Montfort University