IARIA

Displaying 1-40 of 1223 results

  • White Papers // May 2014

    MuTeBench: Turning OLTP-Bench into a Multi-Tenancy Database Benchmark Framework

    Database benchmarks have been used for decades to load test systems and to compare systems or system configurations with each other. However, their methods and assumptions are hardly suitable for multi-tenant cloud database services. Those systems have to provide both performance isolation of a lot of tenants with dynamic workloads...

    Provided By IARIA

  • White Papers // Jan 2014

    Easy Development of Web Applications using WebODRA2 and a Dedicated IDE

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database and a dedicated Integrated Development Environment (IDE). It makes it easier to develop web applications by rising the level of abstraction. In contrast to many existing solutions,...

    Provided By IARIA

  • White Papers // Jan 2014

    Multi-Version Databases on Flash: Append Storage and Access Paths

    New storage technologies, such as flash and non-volatile memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jan 2014

    A Diversified Set of Security Features for XMPP Communication Systems Useful in Cloud Computing Federation

    Now-a-days, in the panorama of cloud computing, finding a right compromise between interactivity and security is not trivial at all. Currently, most of cloud providers base their communication systems on the web service technology. The problem is that both cloud architectures and services have started as simple but they are...

    Provided By IARIA

  • White Papers // Jan 2014

    Security Considerations for Multicast Communication in Power Systems

    Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must...

    Provided By IARIA

  • White Papers // Nov 2013

    Integrated Technologies for Communication Security on Mobile Devices

    In this paper, the authors presented design decisions taken during the construction of a framework for cryptographically secure communication on Android devices. The early prototypes still have many challenges to be overtaken, as follows. The use of cryptosystems for short signatures, elliptic curve cryptography and pairings-based cryptography are some of...

    Provided By IARIA

  • White Papers // Nov 2013

    Towards a Framework for Designing Secure Mobile Enterprise Applications

    Mobile devices like Smartphone's and tablets are not only designed for private use, but also for business use as well. Mobile solutions, such as mobile enterprise resource planning and mobile business intelligence, are now-a-days becoming more common. However, without strong consideration of security, especially in mobile devices, these solutions would...

    Provided By IARIA

  • White Papers // Oct 2013

    Commercialized Practical Network Service Applications From the Integration of Network Distribution and High-Speed Cipher Technologies in Cloud Environments

    In this paper, the authors present the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. They have commercialized a disaster recovery system and evaluated the performance of the distributed engines...

    Provided By IARIA

  • White Papers // Oct 2013

    Kongdroid: A Proposal for a Cloud Service for Stress Testing on Android Applications

    In this paper, the authors propose a new and scalable service for stress testing on Android applications. This tool is available through cloud computing resources to support developers in their applications validation, aiming robustness, stability and compatibility, in different devices before commercial deployment. The solution focuses on the generation of...

    Provided By IARIA

  • White Papers // Oct 2013

    Towards a Smart City Security Model

    Even though concepts related to smart cities are well established and spread, those concepts are still very thin when related to Information Security. This paper will present some studies on smart cities, and will show that those studies are based on three macro concepts, system interoperability, applications and frameworks/platforms. Solutions...

    Provided By IARIA

  • White Papers // Oct 2013

    A Privacy-Enhanced User-Centric Identity and Access Management Based on Notary

    Identity and Access Management (IAM) systems aim to control of users' attributes for authentication, authorization and accountability processes. Public Key Certificates (PKCs), like the X.509 standard, use asymmetric key pairs to support digital signatures, authentication processes and to increase the trust in the communication. Nevertheless, the PKC does not concern...

    Provided By IARIA

  • White Papers // Oct 2013

    Pricing the Cloud: An Adaptive Brokerage for Cloud Computing

    Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand....

    Provided By IARIA

  • White Papers // Sep 2013

    Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems

    Embedded systems, such as Smartphone's, have become ubiquitous due to the versatility of these devices for various applications, which have varying application resource requirements. Due to these variances, system resources should be specialized to the executing applications' resource requirements in order to adhere to design/optimization goals. In multicore systems, core...

    Provided By IARIA

  • White Papers // Sep 2013

    Novel Models and Architectures for Distributed Semantic Data Management

    Semantic data management refers to a range of techniques for the manipulation and usage of data based on its meaning and its rapid growth gives rise to the problems of building novel models and architectures for its distributed management allowing efficient query processing and reasoning. The first part of the...

    Provided By IARIA

  • White Papers // Sep 2013

    Key Performance Indicators for Cloud Computing SLAs

    Reducing IT costs by using cloud computing is tempting for many companies. As cloud rapidly is gaining momentum as alternative mean of providing IT resources, the need for regulated service qualities increases. To attract companies to outsource their services to clouds, providers need to offer service level objectives specified in...

    Provided By IARIA

  • White Papers // Sep 2013

    Discovering and Linking Financial Data on the Web

    The constant publishing of large volumes of financial information by various business sector organizations through its financial statements is a fact that must be exploited by using semantic technologies. This paper describes the use of Linked Data to generate a financial dataset that is part of the ongoing work of...

    Provided By IARIA

  • White Papers // Sep 2013

    The Data Checking Engine: Monitoring Data Quality

    In the context of data warehousing and business intelligence, data quality is of utmost importance. However, many mid-size Data WareHouse (DWH) projects do not implement a proper data quality process due to huge up-front investments. However, assessing and monitoring data quality is necessary to establish confidence in the DWH data....

    Provided By IARIA

  • White Papers // Sep 2013

    Exploiting Wiktionary for Lightweight Part-of-Speech Tagging for Machine Learning Tasks

    Part-of-speech (PoS) tagging is a crucial part in many natural language machine learning tasks. Current state-of-the-art PoS taggers exhibit excellent qualitative performance, but also contribute heavily to the total runtime of text preprocessing and feature generation, which makes feature engineering a time-consuming task. The authors propose a lightweight dictionary and...

    Provided By IARIA

  • White Papers // Aug 2013

    XMPP Distributed Topology as a Potential Solution for Fog Computing

    Fog computing is potentially harmful towards existing cloud computing systems as well as big data structures. Lack of privacy and potentially unauthorized content distribution are some of many issues to solve. As a possible solution, the authors propose in the following paper the definition of a new network topology as...

    Provided By IARIA

  • White Papers // Aug 2013

    Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation

    Cloud computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is...

    Provided By IARIA

  • White Papers // Aug 2013

    Policy-Aware Provisioning of Cloud Applications

    The automated provisioning of complex composite cloud applications is a major issue and of vital importance in cloud computing. It is key to enable cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords

    Robust and partially robust codes are used in cryptographic devices for detecting active side channel attacks on the hardware. The codes are usually designed for uniformly distributed code-words. In practice, however, there are code-words that are much more likely to appear than others. This paper addresses the question of how...

    Provided By IARIA

  • White Papers // Aug 2013

    Estimation of Performance and Availability of Cloud Application Servers Through External Clients

    This paper investigates two aspects of the QoS offered by some cloud providers on the Internet, the availability and the dedicated capacity in terms of how well a user process is isolated from other users of the same application server instance. By using standard components and software utilities, a small...

    Provided By IARIA

  • White Papers // Aug 2013

    Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails

    Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate...

    Provided By IARIA

  • White Papers // Jul 2013

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement...

    Provided By IARIA

  • White Papers // Jul 2013

    Protecting the Communication Structure in Sensor Networks

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, Denial...

    Provided By IARIA

  • White Papers // Jul 2013

    The Impact of Requirements on Software Quality Across Three Product Generations

    The authors presented data demonstrating the impact that a well-written and well-reviewed set of requirements had on software defects and other quality indicators between two generations of an Intel product. Quality indicators for the second software product all improved dramatically even with the increased complexity of the newer product. This...

    Provided By IARIA

  • White Papers // Jul 2013

    A New Bio-Crypto System Approach to Enhance Security of 4G Mobile Networks

    In this paper, the authors examine the vulnerable security elements that MAC management messages in WiMAX initial network entry faces. The paper proposes an innovative hybrid approach to resolve such vulnerability problem and establish secret communication channels via insecure domains. The proposed protocol is based on bio-crypto systems and to...

    Provided By IARIA

  • White Papers // Jul 2013

    Experiments in Collaborative Cloud-Based Distance Learning

    Mobile devices have revolutionary changed the process of multimedia consumption in distance learning systems and provide flexible user-oriented experience. M-learning systems typically include different kinds of multimedia resources helping learners to be more interactive and interested in collaboration. The proposed multi-tenancy group collaboration within the cloud-based learning platform (as a...

    Provided By IARIA

  • White Papers // Jul 2013

    HMAC-Based RFID Authentication Protocol with Minimal Retrieval at Server

    In this paper, the authors propose a HMAC-based RFID mutual authentication protocol to improve performance at the back-end server. In existing hash-based protocols, the tag ID is a secret value for privacy, so the back-end server computes a lot of hash operations or modular operations to retrieve the tag ID....

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Jul 2013

    Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language

    Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology, mainly originating from an intransparency of...

    Provided By IARIA

  • White Papers // Jul 2013

    Provenance Framework for the Cloud Infrastructure: Why and How?

    Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing, in-silico experiment and generally in e-science. On the other hand, Cloud computing is the business model of distributed computing and is considered the next generation of computing and storage platforms....

    Provided By IARIA

  • White Papers // Jul 2013

    Maximizing Utilization in Private IaaS Clouds with Heterogenous Load Through Time Series Forecasting

    In this paper, the authors present ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. To this end, a queue engine...

    Provided By IARIA

  • White Papers // Jul 2013

    Detecting Pedestrian Flows on a Mobile Ad Hoc Network and Issues with Trends and Feasible Applications

    Due to the rapid development of mobile and ad hoc communication technology, research on extracting social contexts including the movement and density of pedestrians has also emerged in recent years. This paper explores methods to extract pedestrian flows in a distributive manner from Bluetooth detection logs. Bluetooth devices are widely...

    Provided By IARIA

  • White Papers // Jul 2011

    Tangible Applications for Regular Objects: An End-User Model for Pervasive Computing at Home

    This paper describes an end-user model for a domestic pervasive computing platform formed by regular home objects. The platform does not rely on pre-planned infrastructure; instead, it exploits objects that are already available in the home and exposes their joint sensing, actuating and computing capabilities to home automation applications. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Continuous Gesture Recognition for Resource Constrained Smart Objects

    Tangible User Interfaces (TUIs) feature physical objects that people can manipulate to interact with smart spaces. Smart objects used as TUIs can further improve user experience by recognizing and coupling natural gestures to commands issued to the computing system. Hidden Markov Models (HMM) are a typical approach to recognize gestures...

    Provided By IARIA

  • White Papers // Jul 2011

    SIREN: Mediated Informal Communication for Serendipity

    The process of education and innovation often involves individuals, whose expertise lies in diverse fields. Informal communication amongst them can prove to be invaluable towards the users collaboration, but rarely does it extend beyond one's already established social circle. This paper proposes SIREN, a system, which makes use of sensor...

    Provided By IARIA

  • White Papers // Jul 2011

    The Importance of Context Towards Mobile Services Adoption

    Along with the popularity of mobile devices and advances in wireless technology, mobile services have become more and more prevalent. Although many analysts have predicted that mobile systems will become mainstream, the adoption of mobile services has been slower than expected. This paper is to study the influence of context...

    Provided By IARIA

  • White Papers // Jul 2011

    Human Behaviour Detection Using GSM Location Patterns and Bluetooth Proximity Data

    Human behaviours are multifarious in nature and it is a challenging task to predict and learn from daily life activities. The profusion of Bluetooth enabled devices used in daily life has created new ways to analyze and model the behaviour of individuals. Bluetooth integrated into mobile handsets can be used...

    Provided By IARIA

  • White Papers // Jul 2011

    Modeling and Analyzing Ubiquitous Systems Using MDE Approach

    The growth of industrial activities during the last decades and the diversity of industrial products require standards and common methodologies for building and integrating different parts. It is also required that working groups use the same terminologies and concepts needed for each domain. The Model Driven Engineering approach aims to...

    Provided By IARIA

  • White Papers // Jul 2011

    Information Dissemination in WSNs Applied to Physical Phenomena Tracking

    Several works suggest the use of wireless sensor networks to manage crisis situations. An example of such scenarios is forest fire fighting. In these situations, it is necessary to use efficient mechanisms for disseminating the environmental information captured by sensors. This paper analyzes the behavior of some representative broadcasting techniques...

    Provided By IARIA

  • White Papers // Jul 2011

    Semantic P2P Overlay for Dynamic Context Lookup

    Context-aware applications generally need to retrieve various kinds of dynamic context data from a large number of context sources. A middleware managing context sources must provide an efficient context lookup mechanism to ease application development. In this paper, the authors categorize the context sources as operating spaces and propose semantic...

    Provided By IARIA

  • White Papers // Aug 2011

    Lightweight Detection of Spamming Botnets

    A botnet consists of the home and office computers infected with bot malware and controlled by a botmaster. Botnets are one of the largest problems against the Internet society since they are used to mount serious attacks such as Distributed Denial of Service (DDoS) and users' credentials stealing, and to...

    Provided By IARIA

  • White Papers // Aug 2011

    Detecting & Defeating Split Personality Malware

    Security analysts extensively use virtual machines to analyze sample programs and study them to determine if contain any malware. In the process, if the malware destabilizes the guest OS, the users simply discard it and load in a fresh image. This approach increases their productivity. Since, naive users do not...

    Provided By IARIA

  • White Papers // Aug 2011

    Proposal of N-Gram Based Algorithm for Malware Classification

    Obfuscation techniques degrade the n-gram features of binary form of the malware. In this paper, methodology to classify malware instances by using n-gram features of its disassembled code is presented. The presented statistical method uses the n-gram features of the malware to classify its instance with respect to their families....

    Provided By IARIA

  • White Papers // Aug 2011

    Extended Fault Based Attack Against Discrete Logarithm Based Public Key Cryptosystems

    Since, Bellcore's researchers proposed fault based attacks, these attacks have become serious threats to the implementation of cryptosystems. Boneh et al. first proposed a fault based attack against the exponentiation algorithm for RSA, and some variants of attack were proposed later. However, the previous variants of similar attack are applicable...

    Provided By IARIA

  • White Papers // Aug 2011

    Implementations of Block Cipher SEED on Smartphone Operating Systems

    As more and more people are using smartphones these days, a great deal of important information, such as personal information and the important documents of corporations among other things, are being saved on smartphones. Unlike a PC, people can access another person's smartphone without great difficulty, and there is a...

    Provided By IARIA

  • White Papers // Aug 2011

    An Approach for Enhancing the Security of Remotely Accessible, Sensitive Services With On-Site Monitoring

    Commonly, the deployment environment of software based services cannot be predicted in advance, which leads to need to have specific solutions to monitor their security and reliability during run-time. These services are also commonly accessed remotely, leading to further complexity in their monitoring and analysis. In this paper proposes a...

    Provided By IARIA

  • White Papers // Aug 2011

    Toward Engineering of Security of Information Systems: The Security Acts

    Business professionals and researchers have made considerable efforts and significant technical breakthroughs in information security in the last decades. Nevertheless, companies and organizations continue to incur losses associated with security issues. In order to remedy to this situation, the authors propose a new approach to information security engineering for companies...

    Provided By IARIA

  • White Papers // Aug 2011

    Establishing Authentication Trust in Open Environment Using Social Approach

    A trust metric is described for a user to ensure the authenticity of another user who is not known to system entities in an open environment. On the basis of the metric, an identity federation framework is proposed for propagating an authentication assertion for an unknown user across system entities....

    Provided By IARIA

  • White Papers // Aug 2011

    Migration Towards a More Secure Authentication in the Session Initiation Protocol

    This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, the authors add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual...

    Provided By IARIA

  • White Papers // Aug 2011

    PASER: Position Aware Secure and Efficient Route Discovery Protocol for Wireless Mesh Networks

    In this paper, the authors address an acceptable tradeoff between security and performance of the route discovery process in wireless mesh networks. They propose a Position Aware Secure and Efficient reactive hierarchical Route discovery protocol (PASER). The proposed protocol is tailored for rescue and emergency operations and aims to combat...

    Provided By IARIA

  • White Papers // Aug 2011

    Reliablity and Survivability of Wireless Sensor Network Using Security Adaptation Reference Monitor (SARM)

    Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN under attacks such as sinkhole. Therefore, new security mechanisms must be in accordance with energy...

    Provided By IARIA

  • White Papers // Aug 2011

    Federated Identity Management for Android

    A federated Identity Management system (IdM) must include mobile units and must provide mutual authentication for client-server connections. Existing frameworks for identity management like SAML are unlikely to apply well to resource constrained mobile terminals like Android. The contribution of this paper is an IdM with simpler data representation and...

    Provided By IARIA

  • White Papers // Aug 2011

    A Scalable Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Aug 2011

    A Framework for Protocol Vulnerability Condition Detection

    Intrusion Detection System (IDS) detects an intrusion by comparing with its attack signatures. The generation of IDS signatures is based on the analysis of attack traffic, which is a result of exploiting vulnerabilities in a network protocol. Thus, the protocol analysis becomes an effective method to find out protocol vulnerabilities...

    Provided By IARIA

  • White Papers // Aug 2011

    Enhancing System-Called-Based Intrusion Detection With Protocol Context

    Building an accurate program model is challenging but vital for the development of an effective host-based Intrusion Detection System (IDS). The model should be designed to precisely reveal the intrinsic semantic logic of a program, which not only contains control-flows (e.g., system call sequences), but also data-flows as well as...

    Provided By IARIA

  • White Papers // Aug 2011

    StegoWeb: Towards the Ideal Private Web Content Publishing Tool

    Privacy breaches through profiling constitute a considerable threat to users of Web 2.0 services. While many concepts have been proposed to address this issue by allowing users to encrypt, obfuscate, or otherwise conceal information of their choice, all have certain limitations. In this paper, the authors survey the available solutions,...

    Provided By IARIA

  • White Papers // Aug 2011

    End User Computing Environments for Improved Information Security

    Access control does not prevent an authorized "Insider" inadvertently or deliberately leaking information to an unauthorized external or internal party. The "Insider threat" is one of the greatest threats to enterprise security, and nearly 70% of recently surveyed organizations view Web 2.0 (and by extension cloud computing environments) as a...

    Provided By IARIA

  • White Papers // Aug 2011

    Using Avatars for Improved Authentication With Challenge Questions

    The authors present a novel method for improving the security of challenge question authentication, which traditionally requires a user to answer questions such as "What is your Mother's Maiden Name?". In their method, users create an Avatar representing a fictitious person, and later use the Avatar's information to authenticate themselves....

    Provided By IARIA

  • White Papers // Aug 2010

    Application of Scenario-Driven Role Engineering to the MinaBASE Process Knowledge Database

    Collaborative systems, which are often used in short-term virtual enterprises or long-term cooperation networks, often contain information's about the manufacturing and fabrication competences of the technology partners which should only be made available to a very restricted group of persons for example to support feasibility studies in the context of...

    Provided By IARIA

  • White Papers // Jul 2011

    The Design, Instantiation, and Usage of Information Security Measuring Ontology

    Measuring security is a complex task and requires a great deal of knowledge. Managing this knowledge and presenting it in a universal way is challenging. This paper describes the Information Security Measuring Ontology (ISMO) for measuring information security. The ontology combines existing measuring and security ontologies and instantiates it through...

    Provided By IARIA

  • White Papers // Jul 2011

    Formal Logic Based Configuration Modeling and Verification for Dynamic Component Systems

    Reconfigurable networked systems have often been developed via dynamically deployed software components that are executing on top of interconnected heterogenous hardware nodes. The challenges resulting from the complexity of those systems have been traditionally mitigated by creative ad-hoc solutions supported by domain specific modeling frameworks and methodologies. Targeting that deficiency,...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Semantic Interoperability of Graphical Domain Specific Modeling Languages for Telecommunications Service Design

    High competition pressures Telecommunications service providers to reduce their concept-to-market time. To manage more easily service complexity among several actors in the design process and to ensure a more flexible maintainability, service decomposition into stakeholder dedicated views is now largely investigated by companies. However, there is still a lack of...

    Provided By IARIA

  • White Papers // Apr 2012

    Cloud Computing Ontologies: A Systematic Review

    This paper is to obtain a holistic view of Cloud Computing ontologies, their applications and focuses. The identification of primary studies in this systematic review is based on a pre-defined research protocol with a research question, inclusion and exclusion criteria and a search strategy. The authors summarize the selected studies...

    Provided By IARIA

  • White Papers // Apr 2012

    An Ontology-Based Reperesentation of the Google+ API

    Social Networking Services (SNS) provide users with functionalities for developing their on line social networks, connecting with other users, sharing and consuming content. While most of popular SNS provide open Web 2.0 APIs, they remain disconnected from each other thus fragmenting user's data, social network and content. Semantic social web...

    Provided By IARIA

  • White Papers // Jul 2011

    ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments

    With the advent of the smart energy grid - an energy transportation and distribution network being combined with an IT network for its monitoring and control - information security has gained tremendous importance for energy distribution and energy automation systems. Integrated security functionality is crucial to ensure a reliable and...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploiting Demand Response in Web-Based Energy-Aware Smart Homes

    Energy conservation is a global issue with tremendous environmental implications. By 2030, the global energy demand will double. High demands and environmental concerns, force the transformation of electricity grids into smart grids, towards more rational utilization of energy. Residential smart metering transforms homes into energy-aware environments, allowing residents to make...

    Provided By IARIA

  • White Papers // Jul 2011

    Using Multitasking and SSD Disks for Optimising Computing Cluster Energy-Efficiency

    The authors tested how Solid-State Drives (SSD) and multitasking, i.e., running more than one task per CPU core, affect performance and energy consumption in I/O intensive data analysis jobs in High-Energy Physics (HEP) computing. Their motivation for the study comes from the LHC experiment at CERN producing up to 15...

    Provided By IARIA

  • White Papers // Jul 2011

    Monitoring IT Power Consumption in a Research Center: Seven Facts

    The authors analyze the power consumption of several IT devices placed in a research center affiliated to the University. The data collection lasted about one year and the analysis let one identify: the average instant power consumption of each type of device, trends of the instant power consumption curves, usage...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Scheduling of Smart Homes Energy Consumption With Microgrid

    Microgrid is taken as the future Smart Grid, and can work as a local energy provider to domestic buildings and reduce energy expenses. To further lower the cost, a Smart Homes idea is suggested. Smart Homes of the future will include automation systems and could provide lower energy consumption costs...

    Provided By IARIA

  • White Papers // Jul 2011

    Smard Grid Software Applications for Distribution Network Load Forecasting

    This paper describes three software applications for distribution network load forecasting in a Smart Grid environment: short-term feeder load forecasting, short-term substation transformer load forecasting and transformer rating, and next-year load pocket forecasting. The short-term feeder load forecasting allows a utility to reduce the possibility of feeder overloading. The substation...

    Provided By IARIA

  • White Papers // Jul 2011

    Non-Intrusive Appliance Monitoring Now: Effective Data, Generative Modelling and LETE

    Monitoring energy consumption at appliance level is a necessary condition for many energy efficient applications. In this paper, the authors have identified Non-Intrusive Load Monitoring (NILM) as a transitional technology, and competing NILM methods must be evaluated not only on performance, but also economical feasibility and user usability of now....

    Provided By IARIA

  • White Papers // Jul 2011

    Energy Coupling Control of Telecommunication Network and Power Grid

    In this paper, the authors present a control architecture that allows to operate the energy storage facilities integrated into the wide area telecommunication network as mediators between the optimality criteria of the Smart Grid and the energy consumption modeling of the telecommunication network itself. Different control modes are discussed. In...

    Provided By IARIA