Helsinki University of Technology

Displaying 1-40 of 64 results

  • White Papers // Jan 2012

    Peer-to-Peer Communication

    Internet has changed a lot since its early days. At the beginning, goal of the Internet was to share computing resources between universities and scientists. In those days communication happened almost completely directly between computers or people. This is something the authors now call peer-to-peer communication. After the commercialization of...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2011

    Energy-Efficient Parallel Software for Mobile Hand-Held Devices

    Energy efficiency is an essential design criterion for mobile hand-held devices. The authors underline the issue that parallel programs for mobile devices must be efficiently executable on the development platforms in addition to their efficient execution on the target hardware. Further, they argue that with the proliferation of increasingly complex...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Grid Computing Aptitude of Well-Known Charity or Other Non-Profit Organizations

    Grid computing is a form of distributed computing where a centralized client computer distributes computations among a large number of server computers. There exists several grid computing projects that utilize computers of home users for applications that require a great amount of computing resources. The authors consider two charity and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Implementing an SPKI Certificate Repository Within the DNS

    Authorization certificates can be used to grant access rights from the owner of a resource to other entities and then to further share these rights with others using delegation. However, when access decisions are made, the delegated rights will not be acknowledged unless all the certificates iii the delegation chain...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    User-Centered Design of Secure Software

    With the advance of electronic commerce and other networked services there is a growing need for easy to use secure software. The problem with the security features and applications in much of today's software is that it is very technology-oriented. In order to correctly use it a basic knowledge of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems

    In distributed systems, the access control mechanism in is often modeled after stand-alone solutions, such as A CLs. Such arrangement, however, is not ideal as the system may be mirrored around the world and maintaining the A CLs becomes a problem. A new approach to this problem is using authorisation...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Real-Time Transport Protocol (RTP) Security

    This paper describes the Real-time Transport Protocol (RTP). The emphasis is on the security features like confidentiality, integrity and authentication. RTP security features are critically commented and alternative arrangements with their security implications are presented. RTP security is also discussed on multi protocol context where some of RTP's security services...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    MOBNET: The Design and Implementation of a Network Mobility Testbed for NEMO Protocol

    The inherent difficulty in faithfully modeling wireless channel characteristics in simulators has prompted researchers to build wireless network testbeds for realistic testing of protocols. While previous testbeds are mostly designed to provide a research environment of static wireless networks, the paper is aimed to assess protocols used for mobile wireless...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Impact of Size-Based Scheduling on Flow Level Performance in Wireless Downlink Data Channels

    The authors analyze the impact of size-based scheduling on the flow level performance of elastic traffic in wireless downlink data channels. The impact is assessed by comparing the flow level delay of the simple RR scheduler to two optimized non-anticipating schedulers (FB and FBffi) and SRPT. The optimized distance-aware scheduler...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Running an i3 Overlay Network on Top of AODV

    Mobile Ad hoc NETworks (MANETs) and Peer-To-Peer (P2P) overlay networks share many key features. Both can be viewed as decentralized self-organizing networks. Both usually have flat address spaces and their network topologies may change in unpredictable ways. Therefore there has lately been a lot of interest in how to take...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparison Between Security Solutions in Cloud and Grid Computing

    This paper helps Grid and Cloud system administrators and researchers to have a clear definition about Grid and Cloud computing and also wants to give clear differences between Cloud and Grid computing, define which the main security issues to be considered are, and how some of these security issues are...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Strong Authentication With Mobile Phones

    Many of the services that people use daily, for example banking, have transformed from traditional customer services into Internet services. In important services, such as the banking, a strong authentication is needed to protect both the users of the services and the service providers. Due very rapid technical progress mobile...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparing Various Realizations of the Cloud Computing Paradigm

    Cloud Computing is becoming attractive these days. Many big companies, such as Google, Amazon and IBM, have promoted their own cloud computing platforms for customers to deploy their web applications on these platforms. Besides some existing security risks for a traditional web server hosting company, some new security vulnerabilities appear...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Privacy Challenges of Open APIs: Case LBS

    Many of the most popular Location-Based Services (LBSs) have recently released open APIs for developers in order to extend their services to third party applications. With this strategy, LBSs try to exploit to the maximum the value of location information by helping the fast development of specific context-aware applications involving...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2010

    Forwarding Anomalies in Bloom Filter Based Multicast

    Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-flow state is required in the routers and because routing decisions can be made efficiently by simply checking for the presence of outbound links in the filter. Yet,...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2010

    A Long-Tail Model of Mobile Application Usage

    In management research, the long tail phenomenon is typically linked to the long-tail of product demand distribution, particularly under electronic distribution, storing and consumption of content. This paper discusses the role of open mobile software platforms in creating a market for niche mobile applications. Open software platforms of smartphones facilitate...

    Provided By Helsinki University of Technology

  • White Papers // May 2010

    Clustering Malware Executables

    Traditional signature based malware detection can easily be evaded by doing small changes to the malware code or le. As each new instance of the malware is slightly different, it becomes challenging to detect which malware les are part of the same family. An alternative approach to signature based detections...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Energy-Adaptive Scheduling and Queue Management in Wireless LAN Mesh Networks

    Energy efficiency is of critical importance in future wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. The authors present a novel cross-layer energy-adaptive scheduling and queue management framework EAED (Energy Aware Early Detection) for minimizing energy consumption in WLAN mesh networks. EAED...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Build Mobile Phone Connectivity Over IP Networks

    Connecting two mobile phones through IP networks is challenging since mobile phones usually don't have a specific IPv4 address and connected through NATs and firewalls. Various methods can be used to build up connections for mobile devices over IP networks, such as Teredo, IPsec tunneling, OpenVPN, ICE, STUN and TURN....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Access Control Based on Content

    Internet has become a significant platform for sharing personal information and opinions. Web-Based Social Networks (WBSN) are rapidly getting more users to their community, and unfortunately these users are usually not aware of the privacy risks related to sharing personal content. Current access control mechanisms in WBSNs rely heavily on...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    Matching Service Strategies, Business Models and Modular Business Processes

    In recent decades, supply chains have diverged and new types of services and operators have emerged in the logistics sector. This paper focused on analyzing service strategies and service-related business models, as well as their modular business processes in logistic services. The aims are to describe these three levels and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    MMS (Multimedia Messaging Service) Enabled Web Map Dispatching Solution for Location Enhanced Fieldwork Management

    Field workers, such as service men, perform every day many different tasks at different locations. Work-orders can be in well-known locations, e.g. weekly checks. But most service companies get work orders also as an alert in places where service men have not visited frequently or ever. In such cases navigation...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    Requirements On Unique Identifiers For Managing Product Lifecycle Information - Comparison Of Alternative Approaches

    Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. The main difficulty is to maintain a communication link between the product item and its associated information as the product item moves over organizational borders and between different users. As network...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    From Quality of Service to Quality of Experience

    This paper gives detail of the Dagstuhl Seminar 09192 on "From Quality of Service to Quality of Experience " held in Schloss Dagstuhl, Leibniz Center for Informatics from May 05 to May 08, 2009. The seminar was organized with a view to discuss the change in the notion of Quality...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Influence of Antenna Radiation Pattern on Accuracy of ToA Estimation

    Ultra-WideBand (UWB) signals have very large bandwidth which allow accurate ranging using time domain techniques. Precise UWB ranging requires accurate estimation of Time of Arrival (ToA). Several schemes have been reported for ToA estimation. Among these schemes, the threshold based ToA estimators have attracted interest due to simplicity of its...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy Over IPv4 and IPv6 Networks

    The Host Identity Protocol (HIP) is an internetworking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This...

    Provided By Helsinki University of Technology

  • White Papers // Aug 2009

    Cache-Timing Template Attacks

    Cache-timing attacks are a serious threat to security-critical software. The authors show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. They demonstrate its effectiveness...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Query Significance in Databases Via Randomizations

    Many sorts of structured data are commonly stored in a multi-relational format of interrelated tables. Under this relational model, exploratory data analysis can be done by using relational queries. As an example, in the Internet Movie DataBase (IMDb) a query can be used to check whether the average rank of...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Mechanisms of Reducing Reauthetication Delay on IEEE 802.11 WLANs

    In this paper, the authors present of mechanisms for reducing re-authentication delay in Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Networks (WLAN). They survey some common re-authentication methods e.g. 802.11r and ERP and they compare the methods' efficiency. The focus is in managed networks, where client...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    A Comparison of Mobile Payment Procedures in Finnish and Chinese Markets

    Researchers are particularly interested in factors that affect the adoption, innovations and diffusion of mobile payment, which is a typical and wide application of ICTS (Information Communication Technology Services) in developed and developing countries. Though mobile payment is an exciting domain and rapidly evolved in recent years, the existence of...

    Provided By Helsinki University of Technology

  • White Papers // May 2009

    Scenario Analysis on Future Internet

    The Internet has grown out of its original scope and scale while its importance for the society has increased. This has raised considerable uncertainties and concerns about the future evolution. The authors apply Schoemaker's scenario planning method to identify and analyze the key trends and uncertainties and to create four...

    Provided By Helsinki University of Technology

  • White Papers // May 2009

    Gaussian Belief With Dynamic Data and in Dynamic Network

    Message-passing algorithms have over the last two decades turned out to be an important paradigm in fields as distant as iterative decoding, image processing and AI. It has been realized that systems where the message-passing algorithms are effective can often be assimilated to disordered systems in statistical physics, and that...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Practical Voice Communications in Challenged Networks

    Today's Push-To-Talk (PTT) services are infrastructure based and require stable end-to-end paths for successful communication. However, users with PTT enabled mobile devices may roam in challenged environments where infrastructure is not available. In such cases the traditional PTT services may exhibit poor performance or even fail completely. Delay-Tolerant Networking (DTN)...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Cloud Computing: Utility Computing Over the Internet

    Cloud computing has become a hot topic in the IT industry, as it allows people to buy computing resources in the same way as utility services like water and power. Cloud computing services are delivered over the Internet which makes them a viable alternative to building a own computing infrastructure....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Cloud Computing With the Azure Platform

    Software industry is heading towards centralized computing. Due to this trend data and programs are being taken away from traditional desktop PCs and placed in compute clouds instead. Compute clouds are enormous server farms packed with computing power and storage space accessible through the Internet. Instead of having to manage...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Adopting Internet Protocols to Sensor Internetworking

    Recent research in the area of the Wireless Sensor Networks (WSN) has shown that protocols most commonly used today in the Internet can be implemented within energy and memory constraints of the WSNs. This paper surveys recent research performed in the area of making IP protocols viable for WSNs. Lightweight...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    On Maximizing Throughput Under Optimum Energy With Inter-Session Network Coding in Wireless Networks

    Network Coding (NC) has emerged in the last couple of years as a significant mechanism to improve network throughput as well as to efficiently utilize the bandwidth in communication networks. Applying NC on Wireless Sensor Network (WSN)s have shown that it can improve throughput by intelligently mixing network packets at...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    An Evaluation Framework for Middleware Approaches on Wireless Sensor Networks

    This paper presents an evaluation framework for middleware designs on Wireless Sensor Networks (WSNs). There is lots of existing middleware solutions for WSNs; the authors introduced middleware approaches and classified them into logical categories according to mechanisms. Based on their evaluation criteria, existing middleware solutions are compared and analyzed in...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Middleware for Wireless Sensor Networks :Challenges and Approaches

    Nowadays, WSNs are becoming increasingly attractive to researchers and industries due to wide range of applications. A WSN is consists of large numbers of small scale sensing nodes capable of small computation and communication. But when they are combined, much more numerous advantages can be achieved over traditional networks, such...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Mobile Agent Based Architecture for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) has emerged as one of the key growth areas for wireless networking and computing technologies. Usually in sensor networking, traditional client-server computing architecture is employed where data at multiple nodes is transferred to a processing element. In the mobile-agent based computing paradigm, the motto is to...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2010

    Forwarding Anomalies in Bloom Filter Based Multicast

    Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast trees. These mechanisms are in principle highly scalable because no per-flow state is required in the routers and because routing decisions can be made efficiently by simply checking for the presence of outbound links in the filter. Yet,...

    Provided By Helsinki University of Technology

  • White Papers // Sep 2009

    Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy Over IPv4 and IPv6 Networks

    The Host Identity Protocol (HIP) is an internetworking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This...

    Provided By Helsinki University of Technology

  • White Papers // May 2009

    Scenario Analysis on Future Internet

    The Internet has grown out of its original scope and scale while its importance for the society has increased. This has raised considerable uncertainties and concerns about the future evolution. The authors apply Schoemaker's scenario planning method to identify and analyze the key trends and uncertainties and to create four...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    A Survey of Software as a Service Delivery Paradigm

    Software as a Service (SaaS) is a novel model of software delivery. It has been gaining momentum in recent years. More and more SaaS adoption succeeds. This paper presents an overview of this emerging model. The authors compare SaaS with legacy software delivery model, and also with Service-oriented architecture (SOA)....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Energy-Adaptive Scheduling and Queue Management in Wireless LAN Mesh Networks

    Energy efficiency is of critical importance in future wireless communication systems where networked low-power devices relying on batteries should be able to communicate transparently. The authors present a novel cross-layer energy-adaptive scheduling and queue management framework EAED (Energy Aware Early Detection) for minimizing energy consumption in WLAN mesh networks. EAED...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    Query Significance in Databases Via Randomizations

    Many sorts of structured data are commonly stored in a multi-relational format of interrelated tables. Under this relational model, exploratory data analysis can be done by using relational queries. As an example, in the Internet Movie DataBase (IMDb) a query can be used to check whether the average rank of...

    Provided By Helsinki University of Technology

  • White Papers // Feb 2009

    Environmental Independence: BSD Kernel TCP/IP in Userspace

    Code is code. In the entire application stack only a very small fraction of code is special in the sense that it requires the hardware to run in privileged mode. In theory all the rest can run in either the kernel or user domain, with the tradeoffs being well-known. Engineering...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    From Quality of Service to Quality of Experience

    This paper gives detail of the Dagstuhl Seminar 09192 on "From Quality of Service to Quality of Experience " held in Schloss Dagstuhl, Leibniz Center for Informatics from May 05 to May 08, 2009. The seminar was organized with a view to discuss the change in the notion of Quality...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Design and Operation of Energy-Efficient Data Centers

    Data centers are facilities containing many server computers. Their financial and social importance is greater than ever due to growing amount of data and hosted applications used by millions of users. Consecutively, maintaining an infrastructure with such massive computing resources is energy intensive. The total amount of energy used by...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2009

    Requirements On Unique Identifiers For Managing Product Lifecycle Information - Comparison Of Alternative Approaches

    Managing product information for product items during their whole lifetime is challenging, especially during their usage and end-of-life phases. The main difficulty is to maintain a communication link between the product item and its associated information as the product item moves over organizational borders and between different users. As network...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Evaluation And Organization Of Futures Research Methodology

    This paper focuses on how to create value and meaning for users of the Millennium Project's "Futures Research Methodology - Version 3.0" report. The concept of a boundary object is used to provide a structuring focus throughout this paper. Boundary objects have a tangible form, and they belong to the...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2009

    A Comparison of Mobile Payment Procedures in Finnish and Chinese Markets

    Researchers are particularly interested in factors that affect the adoption, innovations and diffusion of mobile payment, which is a typical and wide application of ICTS (Information Communication Technology Services) in developed and developing countries. Though mobile payment is an exciting domain and rapidly evolved in recent years, the existence of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    MMS (Multimedia Messaging Service) Enabled Web Map Dispatching Solution for Location Enhanced Fieldwork Management

    Field workers, such as service men, perform every day many different tasks at different locations. Work-orders can be in well-known locations, e.g. weekly checks. But most service companies get work orders also as an alert in places where service men have not visited frequently or ever. In such cases navigation...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2008

    Business Models And Evolving Economic Paradigms: A Systems Science Approach

    In developed economies, however, the service sector now dominates the manufacturing sector, just as manufacturing prevailed over the agricultural sector after the industrial revolution. Simultaneously, as end products have transitioned from material outputs to information in digital form, traditional business models are under siege. The economic sociology in this new...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Grid Computing Aptitude of Well-Known Charity or Other Non-Profit Organizations

    Grid computing is a form of distributed computing where a centralized client computer distributes computations among a large number of server computers. There exists several grid computing projects that utilize computers of home users for applications that require a great amount of computing resources. The authors consider two charity and...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2008

    Identity Federation and Identity Providers

    Identity management is one of the fastest growing areas in the security market. Currently organizations have several identity and access right repositories - often one for each IT system/application - which creates difficulties when identities and access rights need to be managed in each system and users have separate username-password...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Implementing an SPKI Certificate Repository Within the DNS

    Authorization certificates can be used to grant access rights from the owner of a resource to other entities and then to further share these rights with others using delegation. However, when access decisions are made, the delegated rights will not be acknowledged unless all the certificates iii the delegation chain...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    User-Centered Design of Secure Software

    With the advance of electronic commerce and other networked services there is a growing need for easy to use secure software. The problem with the security features and applications in much of today's software is that it is very technology-oriented. In order to correctly use it a basic knowledge of...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems

    In distributed systems, the access control mechanism in is often modeled after stand-alone solutions, such as A CLs. Such arrangement, however, is not ideal as the system may be mirrored around the world and maintaining the A CLs becomes a problem. A new approach to this problem is using authorisation...

    Provided By Helsinki University of Technology

  • White Papers // Jul 2008

    Implementing Cryptography for Packet Level Authentication

    Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and public key attached to it, allowing each hop along the route to verify the authenticity of packets. This requires high-speed Elliptic Curve Cryptography (ECC) to improve throughput....

    Provided By Helsinki University of Technology

  • White Papers // Oct 2008

    Attacks on Message Stream Encryption

    Message Stream Encryption (MSE) provides obfuscation, data confidentiality, and limited authentication to BitTorrent clients. Although obfuscation of header and payload data was the main design goal of MSE, users understandably still expect data confidentiality and authentication from their BitTorrent clients. In this paper, the authors present numerous attacks on the...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Real-Time Transport Protocol (RTP) Security

    This paper describes the Real-time Transport Protocol (RTP). The emphasis is on the security features like confidentiality, integrity and authentication. RTP security features are critically commented and alternative arrangements with their security implications are presented. RTP security is also discussed on multi protocol context where some of RTP's security services...

    Provided By Helsinki University of Technology

  • White Papers // May 2009

    Gaussian Belief With Dynamic Data and in Dynamic Network

    Message-passing algorithms have over the last two decades turned out to be an important paradigm in fields as distant as iterative decoding, image processing and AI. It has been realized that systems where the message-passing algorithms are effective can often be assimilated to disordered systems in statistical physics, and that...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    MOBNET: The Design and Implementation of a Network Mobility Testbed for NEMO Protocol

    The inherent difficulty in faithfully modeling wireless channel characteristics in simulators has prompted researchers to build wireless network testbeds for realistic testing of protocols. While previous testbeds are mostly designed to provide a research environment of static wireless networks, the paper is aimed to assess protocols used for mobile wireless...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Build Mobile Phone Connectivity Over IP Networks

    Connecting two mobile phones through IP networks is challenging since mobile phones usually don't have a specific IPv4 address and connected through NATs and firewalls. Various methods can be used to build up connections for mobile devices over IP networks, such as Teredo, IPsec tunneling, OpenVPN, ICE, STUN and TURN....

    Provided By Helsinki University of Technology

  • White Papers // Apr 2010

    Access Control Based on Content

    Internet has become a significant platform for sharing personal information and opinions. Web-Based Social Networks (WBSN) are rapidly getting more users to their community, and unfortunately these users are usually not aware of the privacy risks related to sharing personal content. Current access control mechanisms in WBSNs rely heavily on...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2010

    A Long-Tail Model of Mobile Application Usage

    In management research, the long tail phenomenon is typically linked to the long-tail of product demand distribution, particularly under electronic distribution, storing and consumption of content. This paper discusses the role of open mobile software platforms in creating a market for niche mobile applications. Open software platforms of smartphones facilitate...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparison Between Security Solutions in Cloud and Grid Computing

    This paper helps Grid and Cloud system administrators and researchers to have a clear definition about Grid and Cloud computing and also wants to give clear differences between Cloud and Grid computing, define which the main security issues to be considered are, and how some of these security issues are...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Strong Authentication With Mobile Phones

    Many of the services that people use daily, for example banking, have transformed from traditional customer services into Internet services. In important services, such as the banking, a strong authentication is needed to protect both the users of the services and the service providers. Due very rapid technical progress mobile...

    Provided By Helsinki University of Technology

  • White Papers // Dec 2010

    Comparing Various Realizations of the Cloud Computing Paradigm

    Cloud Computing is becoming attractive these days. Many big companies, such as Google, Amazon and IBM, have promoted their own cloud computing platforms for customers to deploy their web applications on these platforms. Besides some existing security risks for a traditional web server hosting company, some new security vulnerabilities appear...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    Security of Wireless Sensor Network

    Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to...

    Provided By Helsinki University of Technology

  • White Papers // Jun 2008

    Implementing Prioritized Circumscription by Computing Disjunctive Stable Models

    The stable model semantics of disjunctive logic programs is based on minimal models which assign atoms false by default. While this feature is highly useful and leads to concise problem encodings, it occasionally makes knowledge representation with disjunctive rules difficult. Lifschitz' parallel circumscription provides a remedy by introducing atoms that...

    Provided By Helsinki University of Technology

  • White Papers // Mar 2009

    On the Optimality of Field-Line Routing in Massively Dense Wireless Multi-Hop Networks

    The authors consider the load balancing problem in large wireless multi-hop networks by applying the continuum approximation. The task is to find routes, geometric curves, such that the maximal traffic load in the network is minimized. In finite fixed networks, multi-path routes generally yield a lower congestion and thus allow...

    Provided By Helsinki University of Technology

  • White Papers // Feb 2009

    Approximating Maximum Directed Flow in a Large Wireless Network

    The authors study the maximum forwarding capacity for the relay traffic that can be transmitted through a wireless multi-hop network in a single direction. The problem appears as the microscopic level problem in a dense multi-hop network where the routing and forwarding tasks can be considered independently (separation of scales)....

    Provided By Helsinki University of Technology

  • White Papers // Jan 2011

    Impact of Size-Based Scheduling on Flow Level Performance in Wireless Downlink Data Channels

    The authors analyze the impact of size-based scheduling on the flow level performance of elastic traffic in wireless downlink data channels. The impact is assessed by comparing the flow level delay of the simple RR scheduler to two optimized non-anticipating schedulers (FB and FBffi) and SRPT. The optimized distance-aware scheduler...

    Provided By Helsinki University of Technology

  • White Papers // Apr 2009

    An Evaluation of Security Protocols on Wireless Sensor Network

    In recent years, Wireless Sensor Network (WSN) is employed in many application areas such as environmental monitoring, and battle field strategy planning. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2010

    Matching Service Strategies, Business Models and Modular Business Processes

    In recent decades, supply chains have diverged and new types of services and operators have emerged in the logistics sector. This paper focused on analyzing service strategies and service-related business models, as well as their modular business processes in logistic services. The aims are to describe these three levels and...

    Provided By Helsinki University of Technology

  • White Papers // Jan 2007

    A Method for B2B Process Design and Implementation

    Starting from the practical needs of one case company and assumed scenario of implementing a Business-To-Business (B2B) process, the authors explored business process management from business process (re)design viewpoint and from business process support and automation implementation viewpoint. The main result of their paper is a new method for B2B...

    Provided By Helsinki University of Technology

  • White Papers // May 2010

    Clustering Malware Executables

    Traditional signature based malware detection can easily be evaded by doing small changes to the malware code or le. As each new instance of the malware is slightly different, it becomes challenging to detect which malware les are part of the same family. An alternative approach to signature based detections...

    Provided By Helsinki University of Technology

  • White Papers // Aug 2009

    Cache-Timing Template Attacks

    Cache-timing attacks are a serious threat to security-critical software. The authors show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. They demonstrate its effectiveness...

    Provided By Helsinki University of Technology