IARIA

Displaying 1-40 of 1223 results

  • White Papers // May 2014

    MuTeBench: Turning OLTP-Bench into a Multi-Tenancy Database Benchmark Framework

    Database benchmarks have been used for decades to load test systems and to compare systems or system configurations with each other. However, their methods and assumptions are hardly suitable for multi-tenant cloud database services. Those systems have to provide both performance isolation of a lot of tenants with dynamic workloads...

    Provided By IARIA

  • White Papers // Jan 2014

    A Diversified Set of Security Features for XMPP Communication Systems Useful in Cloud Computing Federation

    Now-a-days, in the panorama of cloud computing, finding a right compromise between interactivity and security is not trivial at all. Currently, most of cloud providers base their communication systems on the web service technology. The problem is that both cloud architectures and services have started as simple but they are...

    Provided By IARIA

  • White Papers // Jan 2014

    Security Considerations for Multicast Communication in Power Systems

    Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must...

    Provided By IARIA

  • White Papers // Jan 2014

    Multi-Version Databases on Flash: Append Storage and Access Paths

    New storage technologies, such as flash and non-volatile memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jan 2014

    Easy Development of Web Applications using WebODRA2 and a Dedicated IDE

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database and a dedicated Integrated Development Environment (IDE). It makes it easier to develop web applications by rising the level of abstraction. In contrast to many existing solutions,...

    Provided By IARIA

  • White Papers // Nov 2013

    Towards a Framework for Designing Secure Mobile Enterprise Applications

    Mobile devices like Smartphone's and tablets are not only designed for private use, but also for business use as well. Mobile solutions, such as mobile enterprise resource planning and mobile business intelligence, are now-a-days becoming more common. However, without strong consideration of security, especially in mobile devices, these solutions would...

    Provided By IARIA

  • White Papers // Nov 2013

    Integrated Technologies for Communication Security on Mobile Devices

    In this paper, the authors presented design decisions taken during the construction of a framework for cryptographically secure communication on Android devices. The early prototypes still have many challenges to be overtaken, as follows. The use of cryptosystems for short signatures, elliptic curve cryptography and pairings-based cryptography are some of...

    Provided By IARIA

  • White Papers // Oct 2013

    Towards a Smart City Security Model

    Even though concepts related to smart cities are well established and spread, those concepts are still very thin when related to Information Security. This paper will present some studies on smart cities, and will show that those studies are based on three macro concepts, system interoperability, applications and frameworks/platforms. Solutions...

    Provided By IARIA

  • White Papers // Oct 2013

    Kongdroid: A Proposal for a Cloud Service for Stress Testing on Android Applications

    In this paper, the authors propose a new and scalable service for stress testing on Android applications. This tool is available through cloud computing resources to support developers in their applications validation, aiming robustness, stability and compatibility, in different devices before commercial deployment. The solution focuses on the generation of...

    Provided By IARIA

  • White Papers // Oct 2013

    Commercialized Practical Network Service Applications From the Integration of Network Distribution and High-Speed Cipher Technologies in Cloud Environments

    In this paper, the authors present the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. They have commercialized a disaster recovery system and evaluated the performance of the distributed engines...

    Provided By IARIA

  • White Papers // Oct 2013

    Pricing the Cloud: An Adaptive Brokerage for Cloud Computing

    Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand....

    Provided By IARIA

  • White Papers // Oct 2013

    A Privacy-Enhanced User-Centric Identity and Access Management Based on Notary

    Identity and Access Management (IAM) systems aim to control of users' attributes for authentication, authorization and accountability processes. Public Key Certificates (PKCs), like the X.509 standard, use asymmetric key pairs to support digital signatures, authentication processes and to increase the trust in the communication. Nevertheless, the PKC does not concern...

    Provided By IARIA

  • White Papers // Sep 2013

    Key Performance Indicators for Cloud Computing SLAs

    Reducing IT costs by using cloud computing is tempting for many companies. As cloud rapidly is gaining momentum as alternative mean of providing IT resources, the need for regulated service qualities increases. To attract companies to outsource their services to clouds, providers need to offer service level objectives specified in...

    Provided By IARIA

  • White Papers // Sep 2013

    Novel Models and Architectures for Distributed Semantic Data Management

    Semantic data management refers to a range of techniques for the manipulation and usage of data based on its meaning and its rapid growth gives rise to the problems of building novel models and architectures for its distributed management allowing efficient query processing and reasoning. The first part of the...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems

    Embedded systems, such as Smartphone's, have become ubiquitous due to the versatility of these devices for various applications, which have varying application resource requirements. Due to these variances, system resources should be specialized to the executing applications' resource requirements in order to adhere to design/optimization goals. In multicore systems, core...

    Provided By IARIA

  • White Papers // Sep 2013

    Discovering and Linking Financial Data on the Web

    The constant publishing of large volumes of financial information by various business sector organizations through its financial statements is a fact that must be exploited by using semantic technologies. This paper describes the use of Linked Data to generate a financial dataset that is part of the ongoing work of...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploiting Wiktionary for Lightweight Part-of-Speech Tagging for Machine Learning Tasks

    Part-of-speech (PoS) tagging is a crucial part in many natural language machine learning tasks. Current state-of-the-art PoS taggers exhibit excellent qualitative performance, but also contribute heavily to the total runtime of text preprocessing and feature generation, which makes feature engineering a time-consuming task. The authors propose a lightweight dictionary and...

    Provided By IARIA

  • White Papers // Sep 2013

    The Data Checking Engine: Monitoring Data Quality

    In the context of data warehousing and business intelligence, data quality is of utmost importance. However, many mid-size Data WareHouse (DWH) projects do not implement a proper data quality process due to huge up-front investments. However, assessing and monitoring data quality is necessary to establish confidence in the DWH data....

    Provided By IARIA

  • White Papers // Aug 2013

    Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails

    Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate...

    Provided By IARIA

  • White Papers // Aug 2013

    Policy-Aware Provisioning of Cloud Applications

    The automated provisioning of complex composite cloud applications is a major issue and of vital importance in cloud computing. It is key to enable cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered...

    Provided By IARIA

  • White Papers // Aug 2013

    XMPP Distributed Topology as a Potential Solution for Fog Computing

    Fog computing is potentially harmful towards existing cloud computing systems as well as big data structures. Lack of privacy and potentially unauthorized content distribution are some of many issues to solve. As a possible solution, the authors propose in the following paper the definition of a new network topology as...

    Provided By IARIA

  • White Papers // Aug 2013

    Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation

    Cloud computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2013

    Estimation of Performance and Availability of Cloud Application Servers Through External Clients

    This paper investigates two aspects of the QoS offered by some cloud providers on the Internet, the availability and the dedicated capacity in terms of how well a user process is isolated from other users of the same application server instance. By using standard components and software utilities, a small...

    Provided By IARIA

  • White Papers // Aug 2013

    Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords

    Robust and partially robust codes are used in cryptographic devices for detecting active side channel attacks on the hardware. The codes are usually designed for uniformly distributed code-words. In practice, however, there are code-words that are much more likely to appear than others. This paper addresses the question of how...

    Provided By IARIA

  • White Papers // Jul 2013

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement...

    Provided By IARIA

  • White Papers // Jul 2013

    Protecting the Communication Structure in Sensor Networks

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, Denial...

    Provided By IARIA

  • White Papers // Jul 2013

    Experiments in Collaborative Cloud-Based Distance Learning

    Mobile devices have revolutionary changed the process of multimedia consumption in distance learning systems and provide flexible user-oriented experience. M-learning systems typically include different kinds of multimedia resources helping learners to be more interactive and interested in collaboration. The proposed multi-tenancy group collaboration within the cloud-based learning platform (as a...

    Provided By IARIA

  • White Papers // Jul 2013

    A New Bio-Crypto System Approach to Enhance Security of 4G Mobile Networks

    In this paper, the authors examine the vulnerable security elements that MAC management messages in WiMAX initial network entry faces. The paper proposes an innovative hybrid approach to resolve such vulnerability problem and establish secret communication channels via insecure domains. The proposed protocol is based on bio-crypto systems and to...

    Provided By IARIA

  • White Papers // Jul 2013

    HMAC-Based RFID Authentication Protocol with Minimal Retrieval at Server

    In this paper, the authors propose a HMAC-based RFID mutual authentication protocol to improve performance at the back-end server. In existing hash-based protocols, the tag ID is a secret value for privacy, so the back-end server computes a lot of hash operations or modular operations to retrieve the tag ID....

    Provided By IARIA

  • White Papers // Jul 2013

    The Impact of Requirements on Software Quality Across Three Product Generations

    The authors presented data demonstrating the impact that a well-written and well-reviewed set of requirements had on software defects and other quality indicators between two generations of an Intel product. Quality indicators for the second software product all improved dramatically even with the increased complexity of the newer product. This...

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Jul 2013

    Maximizing Utilization in Private IaaS Clouds with Heterogenous Load Through Time Series Forecasting

    In this paper, the authors present ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. To this end, a queue engine...

    Provided By IARIA

  • White Papers // Jul 2013

    Detecting Pedestrian Flows on a Mobile Ad Hoc Network and Issues with Trends and Feasible Applications

    Due to the rapid development of mobile and ad hoc communication technology, research on extracting social contexts including the movement and density of pedestrians has also emerged in recent years. This paper explores methods to extract pedestrian flows in a distributive manner from Bluetooth detection logs. Bluetooth devices are widely...

    Provided By IARIA

  • White Papers // Jul 2013

    Application of the Simulation Attack on Entanglement Swapping Based QKD and QSS Protocols

    The authors discuss the security of quantum key distribution protocols based on entanglement swapping against collective attacks. Therefore, they apply a generic version of a collective attack strategy on the most general entanglement swapping scenario used for key distribution. Further, they focus on basis transformations, which are the most common...

    Provided By IARIA

  • White Papers // Jul 2013

    Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language

    Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology, mainly originating from an intransparency of...

    Provided By IARIA

  • White Papers // Jul 2011

    Customer Security Concerns in Cloud Computing

    There is no consensus about what exactly cloud computing is, but some characteristics are clearly repeated. It is a new distributed computing and business paradigm. It provides computing power, software and storage and even a distributed data center infrastructure on demand. In this paper, the authors investigated what are the...

    Provided By IARIA

  • White Papers // Jul 2011

    A Resource Management Strategy to Support VoIP Across Ad Hoc IEEE 802.11 Networks

    This paper describes the concept of the resource management strategy in ad hoc networks for rescue operations. The presented strategy is a result of the new outlook on the IEEE 802.11 networks capabilities and performance enhancement. The proposed solution is dedicated to real time services support and is based on...

    Provided By IARIA

  • White Papers // Jul 2011

    QoS Signaling for Service Delivery in NGN/NGS Context

    The evolution of next generation network raises the issue of exploiting customizable services for a nomadic user within the environment of heterogeneity and mobility. In this paper, the E2E QoS (Quality of Service) always remains as a challenge. In fact, the E2E supposes that apart the network resource, the service...

    Provided By IARIA

  • White Papers // Jul 2011

    Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes Under Time-Varying Jamming Links

    In order to provide reliable and secure communication against eavesdroppers and jammers over networks, Universal Secure Error-Correcting Network Codes (USECNC) based on Maximum-Rank-Distance (MRD) codes have been introduced. This code can be applied to any underlying network codes. However, Shioji et al. introduced a reasonable network model against the code....

    Provided By IARIA

  • White Papers // Jul 2011

    A Robust Periodogram-Based IFO Estimation Scheme for OFDM-Based Wireless Systems

    In this paper, the authors propose a new periodogram-based Integer Frequency Offset (IFO) estimation scheme robust to the Fractional Frequency Offset (FFO) variation. The authors first observe the reason why the conventional IFO estimation scheme in this paper, which is sensitive to the variation of the FFO, and then, propose...

    Provided By IARIA

  • White Papers // Jul 2011

    Testing Triple Play Services Over Open Source IMS Solution for Various Radio Access Networks

    Nowadays, with the development of next generation networks, new standards for voice and video services have been introduced, and VoIP (Voice over IP) has become a very popular protocol. It leads to the convergence of networks which provide voice and data transfer services with enhanced and improved applications for customers....

    Provided By IARIA

  • White Papers // Jul 2011

    Novel Load Balancing Scheduling Algorithms for Wireless Sensor Networks

    In this paper, optimal scheduling mechanisms are developed for packet forwarding in wireless sensor networks, where clusterheads are gathering information. The objective is to monitor real-life processes for a given time interval and forward packets with minimum loss probabilities to the base station. In order to achieve this objective the...

    Provided By IARIA

  • White Papers // Jul 2011

    The Impact of Control Information Prioritization on QoS Performance Metrics

    Real-time protocols such as Real-time Transport Protocol (RTP) and its companion protocol Real-time Transport Control Protocol (RTCP) are the solution for customers who have progressively come to desire real-time services. The characteristics of RTP and RTCP packets differ since they carry different content types, i.e., real-time data and control data,...

    Provided By IARIA

  • White Papers // Jul 2011

    Quality of Services Assurance for Multimedia Flows Based on Content-Aware Networking

    This paper proposes a new architectural solution to support Quality of Services (QoS) for real time media flows in a multi-domain system based on new concepts as Content-Aware Networks (CAN) and Network Aware Application (NAA). The system described, based on coupling between network and applications is focused, but not limited...

    Provided By IARIA

  • White Papers // Jul 2011

    Practical Performance Measurements and Analysis of IEEE 802.16 Networks

    IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHYsical (PHY) and media access control (MAC) layers. The WiMAX technology based on air interface standard 802.16 wireless Metropolitan Area Network (MAN) is configured in the same way...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation for DSRC Vehicular Safety Communication: A Semi-Markov Process Approach

    In this paper, an analytic model is proposed for the performance evaluation of vehicular safety related services in the Dedicated Short Range Communications (DSRC) system on highways. The generation and service of safety messages in each vehicle is modeled by an M/G/1 queue. A Semi-Markov Process (SMP) model is developed...

    Provided By IARIA

  • White Papers // Jun 2010

    QoS for Wireless Mesh: MAC Layer Enhancements

    Wireless mesh networks present MAC design challenges beyond those of WLANs. Abundant hidden nodes increase the number of collisions. This, combined with the correlated access needed when forwarding a multi-hop flow, degrades QoS. MAC enhancements for meshes are presented in this paper that reduce latency for mesh traffic while promoting...

    Provided By IARIA

  • White Papers // Jun 2010

    Interactive Internet Television for Mobile Devices and Large-Scale Areas

    In coming years it is supposed that importance of the Internet television technology will grow and also number of households and subscribers paying for this service will be increasing. It is also supposed that this technology will enable new kind of services, where one of them is an interaction of...

    Provided By IARIA

  • White Papers // Sep 2011

    Evaluating a Distributed Identity Provider Trusted Network With Delegated Authentications for Cloud Federation

    Federation offers an affordable opportunity for small and medium cloud providers to become as competitive as the biggest counterparts. However, in order to establish a federated cloud ecosystem, it is needed to rely on an efficient security infrastructure enabling authentication among clouds. Assuming a scalable federated cloud environment, the management...

    Provided By IARIA

  • White Papers // Oct 2011

    Mptrace: Characterizing Physical Memory Usage for Chip Multiprocessors

    The performance of high performance computing applications depends highly on how they are implemented. However, their runtime behavior is tightly coupled with the resources they are allocated such as in which cores the application threads run or in which memory devices their memory space is placed. Thus, depending on their...

    Provided By IARIA

  • White Papers // Sep 2012

    Optimization of Proxy Caches using Proxy Filters

    Web proxy caches are a widely used tool to reduce the network load by storing often needed web pages. Increasing amounts of data transferred require new intelligent caching strategies with smarter replacement algorithms to predict, which web documents will be requested most likely in the future. However, these algorithms are...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems

    Embedded systems, such as Smartphone's, have become ubiquitous due to the versatility of these devices for various applications, which have varying application resource requirements. Due to these variances, system resources should be specialized to the executing applications' resource requirements in order to adhere to design/optimization goals. In multicore systems, core...

    Provided By IARIA

  • White Papers // May 2013

    Fuzzy Controled QoS for Scalable Cloud Computing Services

    An important characteristic of cloud infrastructures is scalability on demand. A scalability service monitors performance load metrics and decides to scale up or down, by provision or revoke of cloud resources. This could guarantee Quality of Service (QoS) and enforce Service Level Objectives (SLOs). The approach of this paper shows...

    Provided By IARIA

  • White Papers // May 2014

    MuTeBench: Turning OLTP-Bench into a Multi-Tenancy Database Benchmark Framework

    Database benchmarks have been used for decades to load test systems and to compare systems or system configurations with each other. However, their methods and assumptions are hardly suitable for multi-tenant cloud database services. Those systems have to provide both performance isolation of a lot of tenants with dynamic workloads...

    Provided By IARIA

  • White Papers // Aug 2013

    Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails

    Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate...

    Provided By IARIA

  • White Papers // Nov 2011

    Scalable Resource Provisioning in the Cloud Using Business Metrics

    Currently, cloud infrastructures are in the spotlight of computer science. Through offering on-demand resource provisioning capabilities and high flexibility of management cloud-based systems can seamlessly adjust to the constantly changing environment of the Internet. They can automatically scale according to a chosen policy. Despite the usefulness of the currently available...

    Provided By IARIA

  • White Papers // Aug 2013

    Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation

    Cloud computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is...

    Provided By IARIA

  • White Papers // Aug 2013

    XMPP Distributed Topology as a Potential Solution for Fog Computing

    Fog computing is potentially harmful towards existing cloud computing systems as well as big data structures. Lack of privacy and potentially unauthorized content distribution are some of many issues to solve. As a possible solution, the authors propose in the following paper the definition of a new network topology as...

    Provided By IARIA

  • White Papers // May 2012

    A Gateway-Based Access Control Scheme for Collaborative Clouds

    A collaborative cloud, formed by private enterprise clouds, is usually task-oriented and tightly correlated. It brings new ways to build and manage computing systems in terms of software development, resource sharing, and maintenance. However, there is little research on the security of collaborative clouds. This paper presents a virtual private...

    Provided By IARIA

  • White Papers // Feb 2013

    RedNoCs: A Runtime Configurable Solution for Cluster-Based and Multi-Objective System Management in Networks-on-Chip

    Runtime-based monitoring and adaptation are indispensable system management tasks for efficient operation of complex heterogeneous Multi-Processor-System-on-Chip (MPSoC) under dynamic workloads. Thereby, runtime-adaptive mechanisms like application mapping, adaptive routing or thermal management will have their own parameter, requirements and information flows. The main contribution of this paper is the evaluation of...

    Provided By IARIA

  • White Papers // Nov 2012

    Automated Test Code Generation Based on Formalized Natural Language Business Rules

    The paper addresses two fundamental problems in requirements engineering. First, the conflict between understandability for non-programmers and a semantically well founded representation of business rules. Second, the verification of productive code against business rules in requirements documents. As a solution, a language to specify business rules that are close to...

    Provided By IARIA

  • White Papers // Sep 2011

    Reusable Decision Models Supporting Organizational Design in Business Process Management

    Transition towards a business process oriented enterprise is explored in research from different perspectives. One of the most popular approaches is Business Process Management. Its activities include process definition, execution, monitoring and analysis. Its implementation was studied in research and practice from the process and application related points of view....

    Provided By IARIA

  • White Papers // Nov 2012

    AgileKDD: An Agile Business Intelligence Process Model

    In a knowledge-based society, transforming data into information and knowledge to support the decision making process is a crucial success factor for all the organizations. In this paper, one mission of Software Engineering is to produce systems able to process large volumes of data, transform them into relevant knowledge and...

    Provided By IARIA

  • White Papers // Jul 2012

    Workload Characterization for Stability-As-A-Service

    Stability-As-A-Service is critical for data centers and workload characterization is one of the essential services within Stability-As-A Service. Different solutions have been proposed in the past for characterizing various system properties, however most of these approaches often require high levels of instrumentation and intrusiveness. This makes their use difficult in...

    Provided By IARIA

  • White Papers // Jul 2012

    An Approach to Find Integration and Monitoring Points for Container Logistics Business Processes

    An end-to-end intermodal container transportation usually requires business processes of various enterprises to work together in a fast, accurate, reliable and secure way. This can be achieved with integrated business services, which are monitored constantly for the above mentioned quality objectives. Although there is academic research currently available for the...

    Provided By IARIA

  • White Papers // Jul 2012

    Community-Commerce Brokering Arena for Opportunistic Cloud Services Offerings

    Community clouds are formed when a cloud infrastructure is created to support the needs of multiple, independent service consumers that have shared concerns. Such infrastructures may allow member organizations to share resources on an opportunistic basis, i.e., one entity may provide services to the other members during off-peak times, and...

    Provided By IARIA

  • White Papers // May 2013

    Towards Semantic-Supported SmartLife System Architectures for Big Data Services in the Cloud

    SmartLife applications are emerging as intelligent user-centered systems that will shape future trends in technology and communication. The development of such applications integrates web services, cloud computing, and big data management, among other frameworks and methods. The authors' paper reports on new perspectives of services and cloud computing architectures for...

    Provided By IARIA

  • White Papers // Jul 2011

    Business Protocol Monitoring

    Because it is never sure that a business process successfully tested or statistically checked will have the expected behaviour during its execution, it is necessary to bring verification to the execution phase, by continuously observing and checking the correct behaviour of business processes during run-time. In this paper, the authors...

    Provided By IARIA

  • White Papers // Jul 2011

    Collaborative Digital Library Services in a Cloud

    The authors have developed a web-based system that allows users to collaboratively organize large online image collections according to an evolving faceted classification schema. One of the major issues identified in the early deployment and evaluation in a university setting is the scalability of the system on traditional server implementations....

    Provided By IARIA

  • White Papers // Jul 2011

    Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments

    Industrial control networks, e.g., for factory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While standard communication technologies...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    MBPR'A Business Process Repository Supporting Multi-Granularity Process Model Retrieval

    Business process repository aims at business process model discovery and reusing. However, most of current approaches for process matchmaking have the limitation that the process models should be in the same granularity, whereas a process repository with good support for multi-granularity business process retrieval is still rare. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector

    The IT society is absolutely reliant on communications infrastructure. Social infrastructures, including administration, transportation, healthcare and education, rely on the communications infrastructure to function. A breakdown of the communications infrastructure due to destruction or malfunction will result in other social infrastructures malfunctioning. Thus it can be said that the information...

    Provided By IARIA

  • White Papers // May 2012

    Unsupervised Activity Recognition using Temporal Data Mining

    Excellent results have been obtained from data mining techniques in many areas. This paper presents one such technique, in the context of activity recognition in a smart home. The authors use sequential pattern mining to analyze the history of information transmitted by the sensors, discovering thereby the frequent activities of...

    Provided By IARIA

  • White Papers // Jun 2013

    A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things

    The Internet Of Things (IoT) is an architecture in which billions of devices with computing capacities and communication interfaces are connected to the internet and perform collaborative tasks. In this context security is a major issue. In this paper, the authors focus on access control services to logical (OPENID) and...

    Provided By IARIA