French National Institute for Research in Computer Science and Control

Displaying 1-16 of 16 results

  • White Papers // Dec 2010

    Zero-Knowledge-Like Proof of Cryptanalysis of Bluetooth Encryption

    This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2010

    Combining Model-Driven Engineering and Cloud Computing

    Service-orientation and model-driven engineering are two of the most dominant software engineering paradigms nowadays. This position paper explores the synergies between them and shows how they can benefit from each other. In particular, the paper introduces the notion of Modeling as a Service (MaaS) as a way to provide modeling...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Mar 2010

    Polychronous Analysis of Timing Constraints in UML MARTE

    The UML Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) defines a broadly expressive Time Model to provide a generic timed interpretation for UML models. As a part of MARTE, Clock Constraint Specification Language (CCSL) allows the specification of systems with multiple clock domains as well as...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jul 2009

    SecSip: A Stateful Firewall for SIP-Based Networks

    SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches is rapidly increasing. This paper presents an original security management approach based on...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jul 2009

    IP Links in Multihop Ad Hoc Wireless Networks?

    A number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet. However, there is another independent and important issue, namely, how can existing Internet networks and ad hoc networks coexist coherently within the same protocol...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jun 2009

    Analysis of a Fountain Codes Based Transport in an 802.11 WLAN Cell

    Fountain Codes based Transport (FCT) protocol relies on an alternate paradigm to that of the ubiquitous TCP. It abolishes the need for a reverse feedback mechanism usually essential to provide reliability in packet data transmission. Absence of a reverse feedback mechanism can substantially improve the performance of networks with half-duplex...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2009

    Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives

    Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact is also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2009

    Safe and Efficient Strategies for Updating Firewall Policies

    Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require automated tools providing a user-friendly environment to specify configure and safely deploy a target policy. Much research has already addressed policy specification, conflict detection,...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Apr 2009

    Flexible Probabilistic QoS Management of Transaction Based Web Services Orchestrations

    In this paper authors extend the previous work on soft probabilistic contracts for QoS management, from the particular case of "Response time", to general QoS parameters. The study covers composite QoS parameters dealing not only with time aspects but also with Quality of Data. They also study contract composition (how...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Mar 2009

    Optimizing Peer-to-Peer Backup Using Lifetime Estimations

    This paper studies the viability of a peer-to-peer backup system on nowadays internet connections. In particular, the paper shows that peer lifetime estimation can be used to reduce the maintenance cost of peer-to-peer backup. Previous studies have shown that lifetimes in a peer-to-peer system follow a Pareto distribution. Consequently, peers...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Neighborhood Selection in Mobile P2P Networks

    A MANET is a set of mobile wireless devices that communicate directly with each other via multi-hop wireless links. They dynamically and arbitrary form a transient network without requiring any centralized administration or infrastructure. With the proliferation of small mobile devices (laptops, smartphones, PDAs, etc.), these networks gained lot of...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Cost-Benefit Analysis of Cloud Computing Versus Desktop Grids

    Cloud Computing has taken commercial computing by storm. However, adoption of cloud computing platforms and services by the scientific community is in its infancy as the performance and monetary cost-benefits for scientific applications are not perfectly clear. This is especially true for desktop grids (aka volunteer computing) applications. The paper...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Multi-Hop Wireless Networking With OSPF: MPR-Based Routing Extensions for MANETs

    Incorporating multi-hop wireless networks in the IP infrastructure is an effort to which a growing community participates. One instance of such activity is the extension of the routing protocol OSPF, for operation on MANETs. Such extension allows OSPF, the most widely deployed interior gateway routing protocol on the Internet, to...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jan 2009

    Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc Networks

    This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes forms a Delay Tolerant (ad hoc) Network (DTN). The goal of the paper is to study efficient ways...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jan 2009

    A New Approach to Construct Multicast Trees in MPLS Networks

    This paper presents a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to reduce forwarding states and enhance scalability. In authors approach only routers that are acting as multicast tree branching node for a group need...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Nov 2008

    An IEEE 802.16 WiMAX Module for the NS-3 Simulator

    ns-3 is a recently released next generation simulator intended as a replacement of the popular ns-2. It enables a highly rich set of features and is expected to become the first choice of the scientific community soon. ns-3 is in its evolution phase and work at different fronts is still...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2010

    Combining Model-Driven Engineering and Cloud Computing

    Service-orientation and model-driven engineering are two of the most dominant software engineering paradigms nowadays. This position paper explores the synergies between them and shows how they can benefit from each other. In particular, the paper introduces the notion of Modeling as a Service (MaaS) as a way to provide modeling...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Apr 2009

    Flexible Probabilistic QoS Management of Transaction Based Web Services Orchestrations

    In this paper authors extend the previous work on soft probabilistic contracts for QoS management, from the particular case of "Response time", to general QoS parameters. The study covers composite QoS parameters dealing not only with time aspects but also with Quality of Data. They also study contract composition (how...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Dec 2010

    Zero-Knowledge-Like Proof of Cryptanalysis of Bluetooth Encryption

    This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jan 2009

    A New Approach to Construct Multicast Trees in MPLS Networks

    This paper presents a new approach to construct multicast trees in MPLS networks. This approach utilizes MPLS LSPs between multicast tree branching node routers in order to reduce forwarding states and enhance scalability. In authors approach only routers that are acting as multicast tree branching node for a group need...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Nov 2008

    An IEEE 802.16 WiMAX Module for the NS-3 Simulator

    ns-3 is a recently released next generation simulator intended as a replacement of the popular ns-2. It enables a highly rich set of features and is expected to become the first choice of the scientific community soon. ns-3 is in its evolution phase and work at different fronts is still...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2009

    Economics of Malware: Epidemic Risks Model, Network Externalities and Incentives

    Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact is also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jul 2009

    SecSip: A Stateful Firewall for SIP-Based Networks

    SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches is rapidly increasing. This paper presents an original security management approach based on...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Cost-Benefit Analysis of Cloud Computing Versus Desktop Grids

    Cloud Computing has taken commercial computing by storm. However, adoption of cloud computing platforms and services by the scientific community is in its infancy as the performance and monetary cost-benefits for scientific applications are not perfectly clear. This is especially true for desktop grids (aka volunteer computing) applications. The paper...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Neighborhood Selection in Mobile P2P Networks

    A MANET is a set of mobile wireless devices that communicate directly with each other via multi-hop wireless links. They dynamically and arbitrary form a transient network without requiring any centralized administration or infrastructure. With the proliferation of small mobile devices (laptops, smartphones, PDAs, etc.), these networks gained lot of...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jul 2009

    IP Links in Multihop Ad Hoc Wireless Networks?

    A number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet. However, there is another independent and important issue, namely, how can existing Internet networks and ad hoc networks coexist coherently within the same protocol...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Feb 2009

    Multi-Hop Wireless Networking With OSPF: MPR-Based Routing Extensions for MANETs

    Incorporating multi-hop wireless networks in the IP infrastructure is an effort to which a growing community participates. One instance of such activity is the extension of the routing protocol OSPF, for operation on MANETs. Such extension allows OSPF, the most widely deployed interior gateway routing protocol on the Internet, to...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jun 2009

    Analysis of a Fountain Codes Based Transport in an 802.11 WLAN Cell

    Fountain Codes based Transport (FCT) protocol relies on an alternate paradigm to that of the ubiquitous TCP. It abolishes the need for a reverse feedback mechanism usually essential to provide reliability in packet data transmission. Absence of a reverse feedback mechanism can substantially improve the performance of networks with half-duplex...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // May 2009

    Safe and Efficient Strategies for Updating Firewall Policies

    Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require automated tools providing a user-friendly environment to specify configure and safely deploy a target policy. Much research has already addressed policy specification, conflict detection,...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Jan 2009

    Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc Networks

    This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes forms a Delay Tolerant (ad hoc) Network (DTN). The goal of the paper is to study efficient ways...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Mar 2010

    Polychronous Analysis of Timing Constraints in UML MARTE

    The UML Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) defines a broadly expressive Time Model to provide a generic timed interpretation for UML models. As a part of MARTE, Clock Constraint Specification Language (CCSL) allows the specification of systems with multiple clock domains as well as...

    Provided By French National Institute for Research in Computer Science and Control

  • White Papers // Mar 2009

    Optimizing Peer-to-Peer Backup Using Lifetime Estimations

    This paper studies the viability of a peer-to-peer backup system on nowadays internet connections. In particular, the paper shows that peer lifetime estimation can be used to reduce the maintenance cost of peer-to-peer backup. Previous studies have shown that lifetimes in a peer-to-peer system follow a Pareto distribution. Consequently, peers...

    Provided By French National Institute for Research in Computer Science and Control