Federal University of Pernambuco

Displaying 1-12 of 12 results

  • White Papers // Aug 2013

    A Systematic Mapping Study on Cloud Computing

    Cloud Computing emerges from the global economic crisis as an option to use computing resources from a more rational point of view. In other words, a cheaper way to have IT resources. However, issues as security and privacy, SLA (Service Layer Agreement), resource sharing, and billing has left open questions...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2013

    A Bi-Directional Mapping Between I and BPMN Models in the Context of Business Process Management

    Business Process Management (BPM) involves identifying, modeling, understanding, rethinking and redesigning business processes so that they can achieve the organization's goals. Using a goal oriented approach to model business process, such as i, can systematically guide the alignment of the business processes with the strategic goals of the organization. In...

    Provided By Federal University of Pernambuco

  • White Papers // Mar 2013

    Systematic Mapping Study on Security Threats in Cloud Computing

    Today, cloud computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the...

    Provided By Federal University of Pernambuco

  • White Papers // Feb 2013

    A Systematic Mapping Study on Business Process Variability

    Business Process Management aligns organizational strategy and business operation. The dynamic environment within which organizations operate promotes changes in business processes, in a phenomenon known as business process variability. The goal of this paper is reviewing business process variability literature to comprehend this phenomenon and analyze its theoretical foundation. Through...

    Provided By Federal University of Pernambuco

  • White Papers // Nov 2012

    Accounting Models for Cloud Computing: A Systematic Mapping Study

    Cloud services change the economics of computing by enabling users to pay only for the capacity that they actually use. In this paper, cloud providers have their own accounting models including their billing mechanisms and pricing schemes to achieve this efficient pay-as-you-go model. Thus it is important to study this...

    Provided By Federal University of Pernambuco

  • White Papers // Jul 2012

    Evaluating Eucalyptus Virtual Machine Instance Types: A Study Considering Distinct Workload Demand

    Cloud computing paradigm provides virtualized computing resources as a service on demand. This paradigm allows companies focus on their business issues rather than conceiving and managing complex infrastructures. As a consequence, performance evaluation of cloud computing infrastructures has been receiving considerable attention by service providers as a prominent activity for...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2012

    Multi-Instance Based Cryptographic Key Regeneration System

    This paper introduces a new multi-instance key regeneration system used to regenerate cryptographic keys from biometric data. The serial concatenation codes is used with a single mechanism that improves the biometric performance and security of the system, also making possible the regeneration of longer and higher entropy cryptographic keys. The...

    Provided By Federal University of Pernambuco

  • White Papers // May 2012

    Multiuser Communication Based on the Discrete Fractional Fourier Transform

    In this paper, a multiuser communication technique based on the Discrete Fractional Fourier Transform (DFrFT) is discussed. Eigenvectors of the DFrFT transform matrix are used as user sequences, which are transmitted over a real adder channel. Compared to other transforms used in the same context, the advantage of using the...

    Provided By Federal University of Pernambuco

  • White Papers // May 2012

    Dependability Assessment of Virtualized Networks

    One of the key characteristics of Virtual Networks (VN) is their intrinsic dynamical aspects. VNs allow network operators to have on-demand negotiation of a variety of services. Risks are inherent to virtualized infrastructures since the underlying physical network components are failure-prone. Therefore evaluation and analysis of risks in VNs, from...

    Provided By Federal University of Pernambuco

  • White Papers // Aug 2011

    Resource Allocation for Distributed Cloud: Concepts and Research Challenges

    In a cloud computing environment, dynamic resource allocation and reallocation are keys for accommodating unpredictable demands and, ultimately, contribute to investment return. This paper discusses this process in the context of distributed clouds, which are seen as systems where application developers can selectively lease geographically distributed resources. This paper highlights...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2011

    The Data Integration Research Group at UFPE

    One of the major database research areas is Data Integration, which refers to providing users with a uniform view over a set of heterogeneous, distributed and autonomous data sources. Data Integration settings concern, for instance, mediator-based integration systems and P2P ones (named Peer Data Management Systems). In these settings, users...

    Provided By Federal University of Pernambuco

  • White Papers // Dec 2010

    The Contract Enforcement Aspect Pattern

    The most fundamental motivation for employing contracts in the development of OO applications is to improve the reliability. Contract enforcement is a well-known established technique in Object-Oriented (OO) programming. However, the need to intercept well defined points in the execution of a program to check design constraints makes the enforcement...

    Provided By Federal University of Pernambuco

  • White Papers // May 2012

    Multiuser Communication Based on the Discrete Fractional Fourier Transform

    In this paper, a multiuser communication technique based on the Discrete Fractional Fourier Transform (DFrFT) is discussed. Eigenvectors of the DFrFT transform matrix are used as user sequences, which are transmitted over a real adder channel. Compared to other transforms used in the same context, the advantage of using the...

    Provided By Federal University of Pernambuco

  • White Papers // May 2012

    Dependability Assessment of Virtualized Networks

    One of the key characteristics of Virtual Networks (VN) is their intrinsic dynamical aspects. VNs allow network operators to have on-demand negotiation of a variety of services. Risks are inherent to virtualized infrastructures since the underlying physical network components are failure-prone. Therefore evaluation and analysis of risks in VNs, from...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2012

    Multi-Instance Based Cryptographic Key Regeneration System

    This paper introduces a new multi-instance key regeneration system used to regenerate cryptographic keys from biometric data. The serial concatenation codes is used with a single mechanism that improves the biometric performance and security of the system, also making possible the regeneration of longer and higher entropy cryptographic keys. The...

    Provided By Federal University of Pernambuco

  • White Papers // Mar 2013

    Systematic Mapping Study on Security Threats in Cloud Computing

    Today, cloud computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the...

    Provided By Federal University of Pernambuco

  • White Papers // Jul 2012

    Evaluating Eucalyptus Virtual Machine Instance Types: A Study Considering Distinct Workload Demand

    Cloud computing paradigm provides virtualized computing resources as a service on demand. This paradigm allows companies focus on their business issues rather than conceiving and managing complex infrastructures. As a consequence, performance evaluation of cloud computing infrastructures has been receiving considerable attention by service providers as a prominent activity for...

    Provided By Federal University of Pernambuco

  • White Papers // Aug 2011

    Resource Allocation for Distributed Cloud: Concepts and Research Challenges

    In a cloud computing environment, dynamic resource allocation and reallocation are keys for accommodating unpredictable demands and, ultimately, contribute to investment return. This paper discusses this process in the context of distributed clouds, which are seen as systems where application developers can selectively lease geographically distributed resources. This paper highlights...

    Provided By Federal University of Pernambuco

  • White Papers // Dec 2010

    The Contract Enforcement Aspect Pattern

    The most fundamental motivation for employing contracts in the development of OO applications is to improve the reliability. Contract enforcement is a well-known established technique in Object-Oriented (OO) programming. However, the need to intercept well defined points in the execution of a program to check design constraints makes the enforcement...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2011

    The Data Integration Research Group at UFPE

    One of the major database research areas is Data Integration, which refers to providing users with a uniform view over a set of heterogeneous, distributed and autonomous data sources. Data Integration settings concern, for instance, mediator-based integration systems and P2P ones (named Peer Data Management Systems). In these settings, users...

    Provided By Federal University of Pernambuco

  • White Papers // Feb 2013

    A Systematic Mapping Study on Business Process Variability

    Business Process Management aligns organizational strategy and business operation. The dynamic environment within which organizations operate promotes changes in business processes, in a phenomenon known as business process variability. The goal of this paper is reviewing business process variability literature to comprehend this phenomenon and analyze its theoretical foundation. Through...

    Provided By Federal University of Pernambuco

  • White Papers // Jun 2013

    A Bi-Directional Mapping Between I and BPMN Models in the Context of Business Process Management

    Business Process Management (BPM) involves identifying, modeling, understanding, rethinking and redesigning business processes so that they can achieve the organization's goals. Using a goal oriented approach to model business process, such as i, can systematically guide the alignment of the business processes with the strategic goals of the organization. In...

    Provided By Federal University of Pernambuco

  • White Papers // Aug 2013

    A Systematic Mapping Study on Cloud Computing

    Cloud Computing emerges from the global economic crisis as an option to use computing resources from a more rational point of view. In other words, a cheaper way to have IT resources. However, issues as security and privacy, SLA (Service Layer Agreement), resource sharing, and billing has left open questions...

    Provided By Federal University of Pernambuco

  • White Papers // Nov 2012

    Accounting Models for Cloud Computing: A Systematic Mapping Study

    Cloud services change the economics of computing by enabling users to pay only for the capacity that they actually use. In this paper, cloud providers have their own accounting models including their billing mechanisms and pricing schemes to achieve this efficient pay-as-you-go model. Thus it is important to study this...

    Provided By Federal University of Pernambuco