Dresden University of Technology

Displaying 1-40 of 89 results

  • White Papers // Oct 2013

    Elastic and Fault Tolerant Event Stream Processing Using StreamMine3G

    The massive amount of new data being generated each day by data sources such as Smartphone and sensor devices calls for new techniques to process such continues streams of data. Event Stream Processing (ESP) addresses this problem and enables users to process such data streams in (soft) real-time allowing the...

    Provided By Dresden University of Technology

  • White Papers // Jul 2013

    StreamMine3G OneClick Deploy & Monitor ESP Applications With A Single Click

    In this paper, the authors present StreamMine3G OneClick, a web based application relieving users from the burden of the complex installation and setup process of Event Stream Processing (ESP) systems such as StreamMine3G in cloud environments. Using StreamMine3G OneClick, users just upload their application logic and choose their favorite cloud...

    Provided By Dresden University of Technology

  • White Papers // Jun 2013

    Towards Flexible Data Sharing in Multi-Device Mobility Scenarios

    For most people, computers have evolved from large stationary machines into a multitude of interconnected personal and mobile devices which can be and are used at any convenient time. Likewise, the handling of data has evolved from the traditional input-processing-output chain into more sophisticated flows which involve splitting, joining, duplication,...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Integration of Information Systems in Cloud Computing for Establishing a Long-term Profitable Customer Portfolio

    Cloud service providers are interested both in a revenue maximizing allocation of their limited capacity resources (as goal of revenue management) and the establishment of long-term business relations with their clients (as goal of customer relationship management). Confronted with these partly diametric objectives, the paper introduces a framework for integrating...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Complexity in Enterprise Architectures - Conceptualization and Introduction of a Measure From a System Theoretic Perspective

    Measurability is the essential basis for management. Although the management of complexity is a central task of CIOs and IT-architects, literature has not proposed a concrete measure to quantify complexity in enterprise architectures so far. Against this background the contribution of this paper is the introduction of a system theoretic...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    The Blurring Boundaries of Work-Related and Personal Media Use: A Grounded Theory Study on the Employee's Perspective

    The ongoing consumerization of Information Technology (IT) demands to rethink the traditional paradigms of media use at the workplace. Past research has focused on the use of company IT resources for personal purposes (e.g., 'Cyber-loafing') and primarily emphasized the adverse effects. This study takes a wider perspective and includes the...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    An IT Architecture Enabling Flexible Adjustment of Exploration/exploitation Trade-Off

    The trade-off between exploration of new ideas and exploitation of certainties create a need for managing a balance between those two concepts within organizations. To align with an associated strategy, the authors suggest an IT architecture with an embedded mechanism to manage this balance when trying new approaches. A prototype...

    Provided By Dresden University of Technology

  • White Papers // Mar 2013

    Leveraging Transactional Memory for Energy-Efficient Computing Below Safe Operation Margins

    The power envelope has become a major issue for the design of computer systems. One way of reducing energy consumption is to downscale the voltage of microprocessors. However, this does not come without costs. By decreasing the voltage, the likelihood of failures increases drastically and without mechanisms for reliability, the...

    Provided By Dresden University of Technology

  • White Papers // Feb 2013

    Managing the Cloud Service Lifecycle From the User's View

    The concept of Cloud Computing has become indispensable in recent years. The use of distributed computing resources facilitates primarily infinite scalability and cost reductions by pay per use agreements. However, the management of cloud services is extensive with regard to the Cloud Service Lifecycle phases. The analysis of operational Cloud...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Personal Cloud Management Cockpit With Social or Market-Driven Asset Exchange

    Digital and physical assets such as software, data and hardware resources have historically been exchanged in a product-style wholesome transfer. Now, the rise of Cloud Computing and the increasing delivery of Everything-as-a-Service in an Internet of Services require new techniques for users to perform asset discovery, exchange and management. This...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Experimental Evaluation of NUMA Effects on Database Management Systems

    NUMA systems with multiple CPUs and large main memories are common today. Consequently, DataBase Management Systems (DBMSs) in data centers are deployed on NUMA systems. They serve a wide range of database use-cases, single large applications having high performance needs as well as many small applications that are consolidated on...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Does Live Migration of Virtual Machines Cost Energy?

    Live migration, the process of moving a Virtual Machine (VM) interruption-free between physical hosts is a core concept in modern data centers. Power management strategies use live migration to consolidate services in a cluster environment and switch off underutilized machines to save power. However, most migration models do not consider...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Performance Analysis of a Handover Mechanism for a Mobile Wireless Sensor Network

    Several applications have been proposed for mobile wireless sensor networks. Some of these applications require the transfer of a large amount of data in a short period of time. This is challenging, since the mobile node may be required to repeatedly establish a link with multiple relay nodes which proceed...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Flexible Data Distribution Policy Language and Gateway Architecture

    Concerns about the security and reliability of data storage in online systems, alias cloud storage services, have led to the design of application-independent storage overlays and controllers which guarantee security and optimality with regards to the requirements of their users. In roaming and multi-user environments, the configuration and rules steering...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Analysis of Overhead and Profitability in Nested Cloud Environments

    The on-demand provisioning of computing and storage resources and the corresponding pay-as-you-go billing have made cloud computing a popular paradigm to achieve a high technological utility. While most use cases can adequately be covered by the offers of existing public cloud providers, the granularity in provisioning and pricing is not...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Dynamic Voltage and Frequency Scaling in Multimedia Servers

    In this paper, the authors experimentally investigate the scope and usefulness of Dynamic Voltage and Frequency Scaling (DVFS) in multimedia servers. For their experiment, they considered four scaling policies, two heterogeneous servers, and two different application scenarios. In the first scenario, they used an IO-Intensive multimedia downloading application while in...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Vertical Scaling for Prioritized VMs Provisioning

    The elastic scaling of services permits one to meet service provisioning requirements (i.e., not to violate its SLAs), and to efficiently use available resources (i.e., to minimize the cost of running the application). In this paper, the authors describe a novel online controller design built on top of the Xen...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Linear Precoding in MISO Cognitive Channels with Causal Primary Message

    The coexistence of a Single-Input Single-Output (SISO) primary link and a Multiple-Input Single-Output (MISO) secondary link is considered in an extended cognitive radio channel setup, where the secondary transmitter has to obtain ("Learn") the primary message in a first phase rather than having non-causal knowledge of it. An achievable rate...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Autonomous Participation in Cloud Services

    A Cyber-Physical System (CPS) is a combination of multiple physical devices connected and organized by a central controlling infrastructure using a feedback-loop mechanism. In order to increase the autonomy of CPS they must be connected to rich cloud services (e.g., social software and elastic resource services) enabling more sophisticated decision...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    A Highly-Virtualising Cloud Resource Broker

    Cloud computing infrastructure services encompass temporally, spatially and structurally coarse-grained access to computing resources. This prevents a genuine pay-per-use model for the consumer and effectively leads to over-reservation and inadequate tariffs especially for short-term, small-scale computations. The authors propose an economically motivated compensation approach to increase the granularity and utility...

    Provided By Dresden University of Technology

  • White Papers // Aug 2012

    Spot-On for Timed Instances: Striking a Balance Between Spot and On-Demand Instances

    Infrastructure as a Service (IaaS) providers currently have no knowledge of the time frame customers intend to lease resources. However, scheduling in the absence of lease time information leads to wasted resources in times of decreasing demand. The authors explore how IaaS providers can use lease times to optimize resource...

    Provided By Dresden University of Technology

  • White Papers // Jul 2012

    The Application of Business Intelligence to Higher Education: Technical and Managerial Perspectives

    Business-intelligence has proven to be an effective means of improving the decision-making within an organization. While traditionally applied to profit making private companies BI has recently been applied to public institutions as well. The authors present a case study of the application of BI to a public university. The details...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Universal Cheat-Proof Pricing for Multiple Access Channels Without SIC Under QoS Requirements

    This paper studies universal cheat-proof pricing by a repeated game for the general Multiple Access Channel (MAC) without Successive Interference Cancelation (SIC). The authors model the system by three entities: regulator, system optimizer and users. The regulator is designed to ensure the Signal-to-Interference plus Noise Ratio (SINR) based Quality-of-Service (QoS)...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Connecting Spatially Coupled LDPC Code Chains

    Recently, iterative processing on spatially coupled sparse graphs has received a lot of attention in the literature. Codes constructed from connected Spatially Coupled Low-Density Parity-Check Code (SC-LDPCC) chains are proposed and analyzed. It is demonstrated that connecting coupled chains results in improved iterative decoding performance. The constructed protograph ensembles have...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power Consumption of a Multimedia Server Under Different DVFS Policies

    Dynamic Voltage and Frequency Scaling (DVFS) has been a useful power management strategy in embedded systems, mobile devices, and wireless sensor networks. Recently, it has also been proposed for servers and data centers in conjunction with service consolidation and optimal resource-pool sizing. In this paper, the authors experimentally investigate the...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power and Hardware Resource Consumption of Servers Under Different Load Balancing Policies

    Most Internet applications employ some kind of load balancing policies in a cluster setting to achieve reliable service provision as well as to deal with a resource bottleneck. However, these policies may not ensure the utilization of all of the hardware resources in a server equally efficiently. This paper experimentally...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Evaluation of the Reliability of RSSI for Indoor Localization

    In wireless sensor networks, nodes can be static or mobile, depending on the application requirements. Dealing with mobility can pose some formidable challenges in protocol design, particularly, at the link and network layers. These difficulties require mobility adaption algorithms to efficiently localize mobile nodes and predict the quality of link...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cooperative Feeder Links for Relay Enhanced Networks

    Heterogeneous networks are gaining more and more interest as one means to cope with the expected data rise in future mobile networks. The upgrade of cellular macro networks by placing relay nodes, as one option, has the benefit of avoiding any wired backhaul network, but has to be paid by...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cyclostationary Detection of Cognitive Radio Systems Using GFDM Modulation

    A cognitive radio should be able to detect unused spectrum band and to change its transmission parameters in order to transmit within these free bands. To achieve this, reliable detection of incumbent signals as well as of other opportunistic signals that are using the said spectrum, is necessary. Generalized Frequency...

    Provided By Dresden University of Technology

  • White Papers // Jan 2012

    A Semantic Extension of a Hierarchical Storage Management System for Small and Medium-Sized Enterprises

    The number of company data deposited in hierarchical storage management systems heavily increases. Thus, new approaches are necessary to keep track of a data pool. This paper introduces a Semantic Storage Extension (SSE) for existing hierarchical storage management systems that allows them to exploit semantic relations between files and use...

    Provided By Dresden University of Technology

  • White Papers // Dec 2011

    Dynamic Replication Technique for Micro-Clouds Based Distributed Storage System

    In this paper, the authors investigate a dynamic replica placement strategy to achieve minimum repair time during a complete loss of datacenter in large-scale distributed object storage systems while keeping the high availability and durability of the system as well as its balanced load and minimum network latency. Specifically, they...

    Provided By Dresden University of Technology

  • White Papers // Nov 2011

    AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware

    In the future, the authors expect commodity hardware to be used in safety-critical applications. However, in the future commodity hardware is expected to become less reliable and more susceptible to soft errors because of decreasing feature size and reduced power supply. Thus, software-implemented approaches to deal with unreliable hardware will...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    Information Dispersion Over Redundant Arrays of Optimal Cloud Storage for Desktop Users

    Data storage in cloud computing centers is gaining popularity for personal and institutional data backups as well as for highly scalable access from software applications running on attached compute servers. The data is usually access protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    EPASS-IoS 1.1: Enabling Inter-Enterprise Business Process Modeling by S-BPM and the Internet of Services Concept

    The future \"Internet of Services\" (IoS) will provide an open environment allowing market participants to offer and consume services over Internet marketplaces. It gives businesses the opportunity to outsource parts of their business processes. This leads to networks of cooperating businesses with a distributed execution of processes and provides a...

    Provided By Dresden University of Technology

  • White Papers // Aug 2011

    Scaling Non-Elastic Applications Using Virtual Machines

    Hardware virtualization is a cost effective mean to reduce the number of Physical Machines (PMs) required to handle computational tasks. Virtualization also guarantees high levels of isolation (performance and security wise) between virtual machines running on the same physical hardware. Besides enabling consolidation of workloads, Virtual Machine (VM) technology also...

    Provided By Dresden University of Technology

  • White Papers // Aug 2011

    User-Controlled Data Sovereignty in the Cloud

    Cloud computing plays an increasing role in the IT-market. Promised scalability and flexibility attracts enterprises as well as private end users. The loss of data sovereignty is seldom addressed but nevertheless a serious threat to users. The FlexCloud research group proposes an approach that enables users to profit from public...

    Provided By Dresden University of Technology

  • White Papers // Aug 2011

    Energy-Aware Service Execution

    The energy consumption of ICT infrastructures has increased considerably in the recent years. This has resulted in extensive research on dynamic power management strategies as well as data centre design and placement. The main problem with most of the proposed or existing approaches is that they do not fully take...

    Provided By Dresden University of Technology

  • White Papers // Jul 2011

    SecCSIE: A Secure Cloud Storage Integrator for Enterprises

    Cloud computing services eliminate the need for local storage thereby lowering operational and maintenance costs. However, security and privacy concerns regarding the out-sourced data prevail. Especially in enterprise environments, sensitive internal and customer data accumulate, which are usually subject to strong legal regulations. Therefore, all the files and information need...

    Provided By Dresden University of Technology

  • White Papers // Jun 2011

    SIListra Compiler: Building Reliable Systems with Unreliable Hardware

    On one hand, hardware is expected to become more unreliable in future. On the other hand, more and more applications become safety critical, i.e., rely on the correct function of the underlying hardware. To close this gap the authors proposed to add error detection capabilities to the application with their...

    Provided By Dresden University of Technology

  • White Papers // Jun 2011

    Aaron: An Adaptable Execution Environment

    Software bugs and hardware errors are the largest contributors to downtime, and can be permanent (e.g. deterministic memory violations, broken memory modules) or transient (e.g. race conditions, bit-flips). Although a large variety of dependability mechanisms exist, only few are used in practice. The existing techniques do not prevail for several...

    Provided By Dresden University of Technology

  • White Papers // Jan 2009

    A Fully Programmable 40 GOPS SDR Single Chip Baseband for LTE/WiMAX Terminals

    The increasing number of radio protocols along with the need for multimedia support in mobile communication devices call for heterogeneous, programmable multi-core processors. This paper presents a fully programmable, heterogeneous single chip SDR platform with multimedia support, fabricated in a 0.13 ?m CMOS process. Running at 175 MHz, a peak...

    Provided By Dresden University of Technology

  • White Papers // Mar 2010

    Capability Wrangling Made Easy: Debugging on a Microkernel With Valgrind

    Not all operating systems are created equal. Contrasting traditional monolithic kernels, there is a class of systems called microkernels more prevalent in embedded systems like cellphones, chip cards or real-time controllers. These kernels offer an abstraction very different from the classical POSIX interface. The resulting unfamiliarity for programmers complicates development...

    Provided By Dresden University of Technology

  • White Papers // Sep 2009

    Energy Efficiency Improvements Through Micro Sites in Cellular Mobile Radio Networks

    Efforts to increase the energy efficiency of information and communication systems in general and cellular mobile radio networks in particular have recently gained momentum. Besides positive environmental effects, lowering the energy consumption of mobile radio systems appears beneficial from an economical perspective. In this regard, the deployment of small, low...

    Provided By Dresden University of Technology

  • White Papers // Feb 2010

    Traffic Demand and Energy Efficiency in Heterogeneous Cellular Mobile Radio Networks

    Optimization of the energy efficiency is considered not only to positively contribute to the ecological assessment, but gains in importance from operator's point of view as well, since energy costs for running a mobile radio network have an increasing share of the operational expenditure. From this perspective, the utilization of...

    Provided By Dresden University of Technology

  • White Papers // Dec 2009

    Closing the Gap Between Modelling and Java

    Model-Driven Software Development is based on standardised models that are refined, transformed and eventually translated into executable code using code generators. However, creating plain text from well-structured models creates a gap that implies several drawbacks: Developers cannot continue to use their model-based tool machinery, relations between model elements and code...

    Provided By Dresden University of Technology

  • White Papers // Aug 2009

    Faithful Virtualization on a Real-Time Operating System

    The combination of a real-time executive and off-the-shelf time-sharing operating systems has the potential of providing both predictability and the comfort of a large application base. Isolation between the components is required to protect the real-time subsystem from a significant class of faults in the (Ever-Growing) time-sharing operating systems but...

    Provided By Dresden University of Technology

  • White Papers // Oct 2008

    L4 - Virtualization and Beyond

    After being introduced by IBM in the 1960s, virtualization has experienced a renaissance in recent years. It has become a major industry trend in the server context and is also popular on consumer desktops. In addition to the well-known benefits of server consolidation and legacy preservation, virtualization is now considered...

    Provided By Dresden University of Technology

  • White Papers // Jun 2009

    Pulsed Multi-Layered Image Filtering: A VLSI Implementation

    Image convolution similar to the receptive fields found in mammalian visual pathways has long been used in conventional image processing in the form of Gabor masks. However, no VLSI implementation of parallel, multi-layered pulsed processing has been brought forward which would emulate this property. The authors present a technical realization...

    Provided By Dresden University of Technology

  • White Papers // Dec 2010

    Multi-Case Multi-Objective Simulated Annealing (MC-MOSA): New Approach to Adapt Simulated Annealing to Multi-Objective Optimization

    In this paper a new approach is proposed for the adaptation of the simulated annealing search in the field of the Multi-Objective Optimization (MOO). This new approach is called Multi-Case Multi-Objective Simulated Annealing (MC-MOSA). It uses some basics of a well-known recent Multi-Objective Simulated Annealing proposed by Ulungu et al.,...

    Provided By Dresden University of Technology

  • White Papers // Jan 2010

    Liquidity Constrained Exporters: Trade And Futures Hedging

    The authors present a model of risk averse exporting firm subject to liquidity constraints. The firm enters an unbiased futures market to hedge exchange rate risk and may not be able to satisfy high margin calls. Then the firm is forced to prematurely liquidate the futures position. They show that...

    Provided By Dresden University of Technology

  • White Papers // Dec 2008

    Institutions, Trade, And Integration: What Can Be Expected Within The Enlarged EU?

    This paper investigates the potential for a further increase in trade between the fifteen old EU members and the twelve new countries having joined in 2004 and 2007 that results from a convergence of the new members' institutions towards the level of the EU-15 in accordance with the Acquis Communautaire....

    Provided By Dresden University of Technology

  • White Papers // Jul 2009

    Import Tariff Led Export Under-Invoicing

    Prolonged worldwide economic depression forces some economists and policy makers to demand for a tougher regulation to protect their domestic economy. If implemented, this may lead to a high tariff and non-tariff regime that ruled the pre-globalised world economy. This paper examines the consequences of a tariff protected trade regime....

    Provided By Dresden University of Technology

  • White Papers // May 2009

    Aid, Growth And Decentralization

    This paper examines whether the federal structure of aid-receiving countries matters in explaining aid effectiveness. Following the decentralization theorem, the devolution of powers should increase aid effectiveness, since local decision-makers are better informed about local needs. At the same time, decentralization has reverse effects, e.g., through coordination problems, excessive regulation,...

    Provided By Dresden University of Technology

  • White Papers // Jan 2011

    International Trade And The Role Of Market Transparency

    The paper examines the economic role of market transparency on the decision problems of an international firm. Transparency is described in terms of the informativeness of a publicly observable signal. With higher transparency, the signal conveys more precise information about the random foreign exchange rate. The authors analyze the interaction...

    Provided By Dresden University of Technology

  • White Papers // May 2008

    Export Production Under Exchange Rate Uncertainty

    Given that a multinational enterprise can react flexibly upon exchange rate movements, international trade flows may be interpreted as an option. An enterprise will opt to export if the profits obtained from exporting under given exchange rate developments are greater than if foreign subsidiary sales were opted. Naturally, given negative...

    Provided By Dresden University of Technology

  • White Papers // May 2010

    Tariffs And Imports Mis-Invoicing Under Oligopoly

    Mis-match of trade statistics between developed and developing countries indicate a substantial mis-invoicing of trade figures, primarily by developing country traders. This is due to the inflexible exchange rate regimes, severe import restrictions and export subsidies prevailing in LDCs. In this paper, the authors focus on the import under-invoicing due...

    Provided By Dresden University of Technology

  • White Papers // Apr 2009

    Regional Age Structure And Economic Growth: An Econometric Study For German Regions

    This paper analyses the impact of the regional age structure on growth of German regions. Based on a neoclassical growth model an augmented Solow model was derived and estimated in a spatial econometric approach. Besides labor and human capital, public spendings and urbanisation measures are controlled for. Adding the age...

    Provided By Dresden University of Technology

  • White Papers // Apr 2011

    Information Value, Export And Hedging

    The paper analyzes the interactions between the precision of information, trade and welfare within a decision framework of an exporting firm. Information in a financial market is described in terms of a publicly observable signal. With higher transparency, the signal conveys more precise information about the random foreign exchange rate....

    Provided By Dresden University of Technology

  • White Papers // Feb 2009

    Modelling Information And Hedging: The Exporting Firm

    The paper examines the economic role of modelling information on the decision problem of an exporting firm under exchange rate risk and hedging. Information is described in terms of market transparency, i.e., a publicly observable signal conveys more information about the random foreign exchange rate. The authors analyze the interaction...

    Provided By Dresden University of Technology

  • White Papers // Dec 2008

    Culture as a Critical Success Factor for Successful Global Project Management in Multi-National IT Service Projects

    The concepts of globalization apply to both large multi-national corporations and local organizations buying goods or services from other countries or contracting people globally. IT services like application development or outsourcing services are delivered as projects using global resources from different cultures. Therefore, this paper analyses whether considering cultural management...

    Provided By Dresden University of Technology

  • White Papers // Aug 2010

    Applying TOGAF to Define and Govern a Service-Oriented Architecture in a Large-Scale Research Project

    The Service-oriented Architecture paradigm has become a widely adopted solution for enterprise application landscapes. SOA promises system integration improvement, business and IT alignment, applications reusability, and fast adaptability to changing requirements. Yet, the advantages that SOA offers lead to its main management challenges. An SOA consists not only of services....

    Provided By Dresden University of Technology

  • White Papers // Dec 2009

    Improving the Development of Service-Based Applications Through Service Annotations

    Following the concept of service-oriented architectures, applications can easily be built by selecting services and composing them in a loosely coupled manner. Because of the high flexibility and reusability of services the approach is well established for the implementation of business processes and software in business-to-business scenarios. However, SOA approaches...

    Provided By Dresden University of Technology

  • White Papers // May 2011

    Spaceflight - A Versatile Live Demonstrator and Teaching System for Advanced Service-Oriented Technologies

    New research advances in loosely-coupled, uniformly described service-oriented systems continue to appear at a high rate. Application areas such as enterprise information systems, cloud computing and programmable web applications benefit from these developments. Yet, it is hard for researchers, developers and students to understand the combined effect of methodologies, which...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    EPASS-IoS 1.1: Enabling Inter-Enterprise Business Process Modeling by S-BPM and the Internet of Services Concept

    The future \"Internet of Services\" (IoS) will provide an open environment allowing market participants to offer and consume services over Internet marketplaces. It gives businesses the opportunity to outsource parts of their business processes. This leads to networks of cooperating businesses with a distributed execution of processes and provides a...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Vertical Scaling for Prioritized VMs Provisioning

    The elastic scaling of services permits one to meet service provisioning requirements (i.e., not to violate its SLAs), and to efficiently use available resources (i.e., to minimize the cost of running the application). In this paper, the authors describe a novel online controller design built on top of the Xen...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Experimental Evaluation of NUMA Effects on Database Management Systems

    NUMA systems with multiple CPUs and large main memories are common today. Consequently, DataBase Management Systems (DBMSs) in data centers are deployed on NUMA systems. They serve a wide range of database use-cases, single large applications having high performance needs as well as many small applications that are consolidated on...

    Provided By Dresden University of Technology

  • White Papers // Jun 2013

    Towards Flexible Data Sharing in Multi-Device Mobility Scenarios

    For most people, computers have evolved from large stationary machines into a multitude of interconnected personal and mobile devices which can be and are used at any convenient time. Likewise, the handling of data has evolved from the traditional input-processing-output chain into more sophisticated flows which involve splitting, joining, duplication,...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Integration of Information Systems in Cloud Computing for Establishing a Long-term Profitable Customer Portfolio

    Cloud service providers are interested both in a revenue maximizing allocation of their limited capacity resources (as goal of revenue management) and the establishment of long-term business relations with their clients (as goal of customer relationship management). Confronted with these partly diametric objectives, the paper introduces a framework for integrating...

    Provided By Dresden University of Technology

  • White Papers // Dec 2011

    Dynamic Replication Technique for Micro-Clouds Based Distributed Storage System

    In this paper, the authors investigate a dynamic replica placement strategy to achieve minimum repair time during a complete loss of datacenter in large-scale distributed object storage systems while keeping the high availability and durability of the system as well as its balanced load and minimum network latency. Specifically, they...

    Provided By Dresden University of Technology

  • White Papers // Jun 2010

    Asymptotically Good LDPC Convolutional Codes With AWGN Channel Thresholds Close to the Shannon Limit

    Ensembles of asymptotically regular Low-Density ParityCheck (LDPC) block codes can be obtained by terminating regular LDPC Convolutional (LDPCC) codes,. The slight irregularity resulting from the termination of the convolutional codes leads to substantially better Belief Propagation (BP) decoding thresholds compared to their tail-biting version or the block codes they are...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Universal Cheat-Proof Pricing for Multiple Access Channels Without SIC Under QoS Requirements

    This paper studies universal cheat-proof pricing by a repeated game for the general Multiple Access Channel (MAC) without Successive Interference Cancelation (SIC). The authors model the system by three entities: regulator, system optimizer and users. The regulator is designed to ensure the Signal-to-Interference plus Noise Ratio (SINR) based Quality-of-Service (QoS)...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Connecting Spatially Coupled LDPC Code Chains

    Recently, iterative processing on spatially coupled sparse graphs has received a lot of attention in the literature. Codes constructed from connected Spatially Coupled Low-Density Parity-Check Code (SC-LDPCC) chains are proposed and analyzed. It is demonstrated that connecting coupled chains results in improved iterative decoding performance. The constructed protograph ensembles have...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cyclostationary Detection of Cognitive Radio Systems Using GFDM Modulation

    A cognitive radio should be able to detect unused spectrum band and to change its transmission parameters in order to transmit within these free bands. To achieve this, reliable detection of incumbent signals as well as of other opportunistic signals that are using the said spectrum, is necessary. Generalized Frequency...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Linear Precoding in MISO Cognitive Channels with Causal Primary Message

    The coexistence of a Single-Input Single-Output (SISO) primary link and a Multiple-Input Single-Output (MISO) secondary link is considered in an extended cognitive radio channel setup, where the secondary transmitter has to obtain ("Learn") the primary message in a first phase rather than having non-causal knowledge of it. An achievable rate...

    Provided By Dresden University of Technology

  • White Papers // Jan 2012

    A Semantic Extension of a Hierarchical Storage Management System for Small and Medium-Sized Enterprises

    The number of company data deposited in hierarchical storage management systems heavily increases. Thus, new approaches are necessary to keep track of a data pool. This paper introduces a Semantic Storage Extension (SSE) for existing hierarchical storage management systems that allows them to exploit semantic relations between files and use...

    Provided By Dresden University of Technology

  • White Papers // Jun 2009

    Analysis of Time and Frequency Domain Features of Accelerometer Measurements

    This paper addresses the signal processing aspect of wireless sensor networks. It analyzes several time and frequency domain features of measurements that are taken from 3D accelerometer sensors. The measurements represent various types of movements related to humans and cars. The aim is to obtain quantitative as well as qualitative...

    Provided By Dresden University of Technology

  • White Papers // Jan 2011

    Large Scale Field Trial Results on Different Uplink Coordinated Multi-Point (CoMP) Concepts in an Urban Environment

    Coordinated Multi-Point (CoMP) concepts such as multi-cell joint detection and transmission, promising large improvements in spectral efficiency and fairness, appears to be an effective option to combat inter-cell interference in mobile communications. One major drawback of uplink joint detection is the large additional backhaul required when compared to a non-cooperative...

    Provided By Dresden University of Technology

  • White Papers // Oct 2010

    Uplink Ad Hoc Cooperation by Distributed Equalization Under a Constrained Backhaul

    Theoretical analysis of base station cooperation methods have proven their potential for solving interference limitation in today's cellular networks by showing immense capacity and fairness gains. However, a major downside of base station cooperation is the additional information exchanged amongst base stations which has been the motivation for recent work...

    Provided By Dresden University of Technology

  • White Papers // Sep 2009

    Correlation Properties of Large and Small-Scale Parameters From Multicell Channel Measurements

    Based on two multi-cell measurement campaigns in Berlin and Dresden, correlation properties for channel parameters to different sites and to adjacent sectors of the same site are investigated. Results indicate that the assumptions in the widely used 3GPP Spatial Channel Model (SCM) form an upper bound for the multi-cell correlations...

    Provided By Dresden University of Technology

  • White Papers // Jan 2009

    Joint Detection and CFO Compensation in Asynchronous Multi-User MIMO OFDM Systems

    It is well known that carrier frequency offsets caused by inaccuracies of local oscillators between transmitter and receiver stations destroy the orthogonality among OFDM subcarriers and induce additional inter-carrier interference. In conjunction with MIMO transmission where different users interfere with each other, this effect strongly degrades the signal detection performance...

    Provided By Dresden University of Technology