IARIA

Displaying 441-480 of 1223 results

  • White Papers // Feb 2012

    How Many Cores Does Parallel BGP Need in a High-Speed Router

    The performance problem of BGP has raised great concerns both in industry and research. With rapid expansion of Internet, how to improve the performance of BGP to support more BGP neighbors in a high-speed router is a practical urgent problem. In this paper, the authors presented a Minimal Cores Computing...

    Provided By IARIA

  • White Papers // Feb 2012

    TCP SYN Protection: An Evaluation

    The drop of initial TCP control packets can dramatically penalize flow performance. More the flow is small, more the penalty is important. This paper studies an Active Queue Management (AQM) aiming to protect TCP SYN and SYNACK from losses, and evaluates the improvements for short TCP flows and the impacts...

    Provided By IARIA

  • White Papers // Feb 2012

    Multi-Tenancy Authorization System With Federated Identity for Cloud-Based Environments Using Shibboleth

    The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client's domain. For these services...

    Provided By IARIA

  • White Papers // Feb 2012

    A SPIT Avoidance Workflow for SIP-Provider

    Voice-over-IP (VoIP) replaces traditional telephony network infrastructures in growing numbers. Along with this infrastructure change, SPam over Internet Telephony (SPIT) is likely to spread massively, similar to spam in e-mail infrastructures. Thus, it is necessary to develop appropriate countermeasures. Since, the request for a call, usually indicated by the ringing...

    Provided By IARIA

  • White Papers // Feb 2012

    Using PGP Signatures for Securing SIP Infrastructures

    Because of increasing bandwidth and decreasing costs for the provider, Voice-over-IP is an alternative to the Public Switched Telephone Network for many users. But with the propagation of Voice-over-IP new harassments and threats occur. Assuring the identity of communication partners is significant in this context. Without the authentication of communication...

    Provided By IARIA

  • White Papers // Feb 2012

    Developing Trust and Reputation Taxonomy for a Dynamic Network Environment

    Trust and reputation are the pillars of many social phenomena that shape the Internet socio-economic scene. The few existing taxonomies provide only initial insights into the ways trust benefits can be felt, but they are neither complete nor elaborated in a systemic manner. In this paper, the authors propose a...

    Provided By IARIA

  • White Papers // Feb 2012

    A Reference Model for Future Computer Networks

    Future Internet design demands revolutionary approaches unfettered by legacy constraints and concepts. This paper presents a clean-slate Concern-Oriented Reference Model (CORM) for architecting future computer networks based on novel network design principles. CORM realizes the network as a software-dependent complex system. It defines the network design space in terms of...

    Provided By IARIA

  • White Papers // Feb 2012

    Application Design Over Named Data Networking With Its Features in Mind

    Designed around host-reachability, today's Internet architecture faces many limitations while serving data-oriented applications, which produce most traffic load to the Internet. Many clean-slate designs of the content/data oriented network have emerged to adapt to these needs. Named Data Networking (also known as CCN) is one of these designs to address...

    Provided By IARIA

  • White Papers // Feb 2012

    Feedback, Transport Layer Protocols and Buffer Sizing

    A key aspect of network performance is coupled with the design of transport layer protocols, the choice of feedback from queues, and by the buffer sizing requirements at routers. In this paper, the authors consider some transport protocols which use different feedback mechanisms to manage their flow and congestion control....

    Provided By IARIA

  • White Papers // Feb 2012

    Towards Next Generation Malware Collection and Analysis

    The fast paced evolution of malware has demonstrated severe limitations of traditional collection and analysis concepts. However, a majority of the anti-malware industry still relies on such ineffective concepts and invests much effort into temporarily fixing most obvious shortcomings. Ultimately fixing outdated concepts is insufficient for combating highly sophisticated future...

    Provided By IARIA

  • White Papers // Feb 2012

    A Case for Inverted Indices in In-Memory Databases

    Recent database research has focused on in-memory databases, which can be used in mixed workload scenarios, enabling OLTP and OLAP queries on the same database engine. These compressed column-oriented database systems use a differential store concept to enable fast inserting and require a merge process to compact the data periodically...

    Provided By IARIA

  • White Papers // Feb 2012

    Operating on Hierarchical Enterprise Data in an In-Memory Column Store

    Enterprise data management is currently separated into On-Line Transactional Processing (OLTP) and On-Line Analytical Processing (OLAP). This separation brings disadvantages such as the need for costly data replication, maintaining redundant systems or the inability to run data reports on the latest transactional data. Academia and industry are working on a...

    Provided By IARIA

  • White Papers // Feb 2012

    About Top-K Flexible Queries in Large Databases

    The problem of obtaining efficient answers to top k queries has attracted a lot of research attention. Unfortunately, current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large Data Bases (DB) seen the gigantic number of data. In this paper, the authors propose a...

    Provided By IARIA

  • White Papers // Feb 2012

    A New Approach for Top-K Flexible Queries in Large Database Using the Knowledge Discovered

    In this paper, the authors propose their contribution to support top-k flexible query in large DB. Generally, the current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large DB seen the gigantic number of data. Their approach proposes to uses the generated knowledge result...

    Provided By IARIA

  • White Papers // Feb 2012

    OLAP Authentication and Authorization via Query Re-Writing

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Feb 2012

    The Multi-Tenant Data Placement Problem

    With the advent of the Software-as-a-Service (SaaS) deployment model, managing operational costs becomes more and more important for providers of hosted software. The cost for hosting and providing a service is directly proportional to the operational margin that can be achieved when running a SaaS business. Possible avenues for reducing...

    Provided By IARIA

  • White Papers // Feb 2012

    Dynamic Stream Allocation with the Discrepancy Between Data Access Time and CPU Usage Time

    Huge quantities of data arriving in chronological order are one of the most important information resources, and stream mining algorithms are developed especially for the analysis of the fast streams of data. A stream mining algorithm usually refers to the input data only once and never revisits them (read-once-write-once), while...

    Provided By IARIA

  • White Papers // Feb 2012

    Relevance of Quality Criteria According to the Type of Information Systems

    The analysis of data quality requires a number of indicators as a reference for the assessment of data quality. However, this is not an easy task for naive users with not enough experience. Data consumers of a Decision Support System (DSS) might prefer some data against other because of reputation...

    Provided By IARIA

  • White Papers // Feb 2012

    Algebraic Constructs for Querying Provenance

    Provenance that records the derivation history of data is useful for a wide variety of applications, including those where an audit trail needs to be provided, where the trust-level attributed to the sources contribute to determining the trust-level in results etc. There have been different efforts for representing provenance information,...

    Provided By IARIA

  • White Papers // Feb 2012

    Architecture of a Security and Surveillance System: The Benefits of an Open and Generic Approach

    During the recent years, it has been increasingly shown that open and generic system platforms exhibit considerable advantages over closed systems in different areas of security technology. With systems that are flexible and adaptable to emerging demands, it can avoid expensive dedicated solutions becoming useless when requirements change. In this...

    Provided By IARIA

  • White Papers // Feb 2012

    Sparse Dictionaries for In-Memory Column Stores

    A common approach to achieve high read and write performance for column-oriented in-memory databases is to separate the data store into a read-optimized main partition and a write-optimized differential buffer. The differential buffer has to be merged into the main partition periodically to preserve read performance and increase memory efficiency....

    Provided By IARIA

  • White Papers // Feb 2012

    Improving the Quality of Knowledge Discovery Process by Information Gain Computing

    Knowledge discovery process is one of the key activities in improving the quality of a system. This paper presents a custom approach for improving the quality of a knowledge discovery process based on information gain computing. The baseline knowledge discovery process is based of M Trees and is used to...

    Provided By IARIA

  • White Papers // Feb 2012

    Towards Accurate Electricity Load Forecasting in Smart Grids

    Smart grids, or intelligent electricity grids that utilize modern IT/communication/control technologies, become a global trend nowadays. Forecasting of future grid load (electricity usage) is an important task to provide intelligence to the smart gird. Accurate forecasting will enable a utility provider to plan the resources and also to take control...

    Provided By IARIA

  • White Papers // Feb 2012

    On Parallel Evaluation of SPARQL Queries

    The Semantic Web databases are growing bigger and much effort is given to introduce new approaches to querying them effectively. Most of the current approaches are based on query optimization or their parallel or distributed run. However, they do not fully benefit from potential of the modern, multicore computers in...

    Provided By IARIA

  • White Papers // Feb 2012

    Clustering Large-Scale, Distributed Software Component Repositories

    In software component repositories, search engines have to deal with challenges related to storage space requirements for indexing semi-structured data models, which are adopted for representing syntactic and semantic features of software assets. In such a context, clustering techniques seem to be attractive for reducing the number of assets in...

    Provided By IARIA

  • White Papers // Feb 2012

    Basic Components for Building Column Store-Based Applications

    A constantly increasing CPU-memory gap as well as steady growth of main memory capacities has increased interest in column store systems due to potential performance gains within the realm of database solutions. In the past several monolithic systems have reached maturity in the commercial and academic space. However a framework...

    Provided By IARIA

  • White Papers // Feb 2012

    Leveraging Compression in In-Memory Databases

    Recently, there has been a trend towards column-oriented databases, which in most cases apply lightweight compression techniques to improve read access. At the same time, in-memory databases become reality due to availability of huge amounts of main memory. In-memory databases achieve their optimal performance by building up cache-aware algorithms based...

    Provided By IARIA

  • White Papers // Feb 2012

    A System Overview for NetCDF-FastBit Integration

    As highly advanced sensors began to penetrate into the awareness of the disparate scientific fields, many researchers found themselves grappling with the need to store and usably interact with vast amounts of data. This paper discusses the creation of a FastBit bitmap index from the contents of a netCDF file....

    Provided By IARIA

  • White Papers // Jan 2012

    Mapping OBI and XPDL to a MDE Framework for Laboratory Information Processing

    Biomedical analyses are becoming increasingly complex, both for the type of data produced and the procedures necessary to obtain them. This trend is expected to continue; therefore the development of suitable systems for information and protocol management is becoming essential for the full exploitation of the field. Custom-built applications obtained...

    Provided By IARIA

  • White Papers // Jan 2012

    Modular Verification of Inter-Enterprise Business Processes

    In this paper, the authors propose to adapt the Symbolic Observation Graphs (SOG) based approach in order to abstract, to compose and to check Inter-Enterprise Business Processes (IEBP). Each component (local process) is represented by a SOG where only the collaboration actions of the process are visible while its local...

    Provided By IARIA

  • White Papers // Jan 2012

    Intranet 2.0 Based Knowledge Production: An Exploratory Case Study on Barriers for Social Software

    The evolution of static intranets to dynamic web 2.0 based information systems is one way to provide space for the collaborative production of knowledge within an enterprise. Despite the fact that social software is now commonly provided for intra-company usage, this usage is below expectations in many cases. This paper,...

    Provided By IARIA

  • White Papers // Jan 2012

    Semantic Search in a Process-Oriented Knowledge Base

    MinaBASE, a process-oriented knowledge management system, currently features a simple full-text search as well as a more sophisticated expert search. While the former is much easier to use, the latter has much higher precision and recall characteristics due to a more content-aware filter-mechanism. In this paper, the authors present a...

    Provided By IARIA

  • White Papers // Jan 2012

    Knowledge Discovery Using a Service Oriented Web Application

    The paper proposes a novel platform for knowledge discovery, which is based on modern web technologies, and is implemented as a web application. It is based on the principles of service-oriented knowledge discovery, and features interactive scientific workflows. In contrast to the few existing comparable platforms, their environment is suitable...

    Provided By IARIA

  • White Papers // Jan 2012

    Critical Dimension in Data Mining

    Data mining is an increasingly important means of knowledge acquisition for many applications in diverse fields such as biology, medicine, management, engineering, etc. When tackling a large-scale problem that involves a multitude of potentially relevant factors but lacking a precise formulation or mathematical characterization to allow formal approaches to solution,...

    Provided By IARIA

  • White Papers // Jan 2012

    Web Personalization Implications and Challenges

    Companies are under the pressure to provide tailor-made products or services that match customers' preferences better. Personalization from web mining is a significant tool to accommodate this trend by extracting patterns of customer's preferences and connecting them directly to production line and supply chain. However, with exception of companies like...

    Provided By IARIA

  • White Papers // Jan 2012

    Shadow IT Management and Control of Unofficial IT

    Shadow IT describes the supplement of \"Official\" IT by several, autonomous developed IT systems, processes and organizational units, which are located in the business departments. These systems are generally not known, accepted and supported by the official IT department. From the perspective of IT management and control it is necessary...

    Provided By IARIA

  • White Papers // Jan 2012

    Alteration Method of Schedule Information on Public Cloud for Preserving Privacy

    The authors are currently experiencing an explosion of cloud technologies. However, a cloud service administrator may be an untrustworthy third party. Therefore, companies dealing with confidential information cannot use a public cloud. In this paper, they propose a method for preventing the leakage of private information on a cloud schedule...

    Provided By IARIA

  • White Papers // Jan 2012

    Identifying Potentially Useful Email Header Features for Email Spam Filtering

    Email spam continues to be a major problem in the Internet. With the spread of malware combined with the power of botnets, spammers are now able to launch large scale spam campaigns causing major traffic increase and leading to enormous economical loss. In this paper, the authors identify potentially useful...

    Provided By IARIA

  • White Papers // Jan 2012

    Digital Investigations for Enterprise Information Architectures

    In this paper, the authors highlight the role of digital forensics in the enterprise information architecture. It presents a framework for embedding digital forensics analysis techniques at various stages of corporate Information and Communication Technologies (ICT) lifecycle. A set of best practices for the corporate ICT security policy is also...

    Provided By IARIA

  • White Papers // Jan 2012

    Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics

    Although it has become clear that digital forensics - the practical analysis of digital data following the acquisition of a bit-stream image of a suspect's hard disk - suffered a setback with the wide adoption of mobile devices and the increasing use of flash memory and encryption systems, it is...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Jul 2011

    Planning With Joint Clustering in Multi-Hop Wireless Mesh and Sensor Networks

    Wide spread deployment of wireless mesh networks for broadband access requires careful deployment and planning in terms of laying down the network infrastructure. Deploying such networks comes with some major inter-related issues including capacity planning, scalability and access reliability. Planning includes determining the number of gateways, optimal placement of gateways...

    Provided By IARIA

  • White Papers // Jul 2011

    Anomaly Detection Framework for Tracing Problems in Radio Networks

    This paper shows a novel concept of using diffusion maps for dimensionality reduction when tracing problems in 3G radio networks. The main goal of the paper is to identify abnormally behaving base station from a large set of data and find out reasons why the identified base stations behave differently....

    Provided By IARIA

  • White Papers // Jul 2011

    A New Path Failure Detection Method for Multi-Homed Transport Layer Protocol

    Through its support for multi-homing, the Stream Control Transmission Protocol (SCTP) is a suitable solution to implement and manage user's mobility by abstracting multiple physical paths into a single end-to-end association. In order to detect the primary path failure, SCTP uses a strategy defined in the RFC2960 and mainly based...

    Provided By IARIA

  • White Papers // Jul 2011

    A Mechanism for Semantic Web Services Discovery in Mobile Environments

    This paper describes SeMoSD (Semantic Mobile Service Discovery), a mechanism for discovery of services in mobile environments based on web services technology. The service discovery mechanism was designed taking into account the resource constraints of mobile devices. Through SeMoSD, mobile devices are able to profit from the use of semantic...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Efficient Energy Management: Defining HEMS, AMI and Smart Grid Objectives

    Energy consumption has increased considerably in the recent years. The way to reduce and make energy consumption more efficient has become of great interest for researchers. One of the research areas is the reduction of energy consumption in users' residences. Efficiently managing and distributing electricity in the grid will also...

    Provided By IARIA

  • White Papers // Jul 2011

    Scalability of Distributed Dynamic Load Balancing Mechanisms

    A load balancing mechanism for large-scale systems should be distributed and dynamic in order to accomplish scalability and high availability. Also, it should be autonomic in order to ease network management. The recent development in utility computing architectures, such as the so-called cloud computing platforms, has increased the demand for...

    Provided By IARIA

  • White Papers // Jul 2011

    Moving to the Cloud: New Vision Towards Collaborative Delivery for Open-IPTV

    This paper provides a short description and visions about the convergence network architecture for an Open-IPTV model based Cloud. Also, it counts the benefits which derived from adoption of this architecture to mobility and security issues. With the new Open-IPTV model, the migration towards convergence networks between different Content Providers...

    Provided By IARIA

  • White Papers // Jul 2011

    Half-Band FIR Filters for Signal Compression

    An efficient design of equiripple half-band FIR filters for signal compression is presented. Solution of the approximation problem in terms of generating function and zero phase transfer function for the equiripple half-band FIR filter is shown. The equiripple half-band FIR filters are optimal in the Chebyshev sense. The closed form...

    Provided By IARIA

  • White Papers // Jul 2011

    Comb Filters for Communication Technology

    An extension of the design of digital equi-ripple comb FIR filters is presented. The authors introduce the fifth type of comb FIR filter which complements the existing four standard types. The design runs from the filter specifications through the degree formula to the impulse response coefficients, which are evaluated by...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobility in a Personalized and Flexible Video-Based Transmedia Environment

    This paper addresses the effective design of Transmedia environments to generate personalized additional video information from iTV, PC and mobile devices with a special focus on mobile devices. It presents the opportunities and challenges of the inclusion of mobile devices on this ubiquitous environment, turning it into a true "Ecosystem...

    Provided By IARIA

  • White Papers // Nov 2011

    Pervasive Computing in Embedded Systems: Designing Cooperative Applications for Real Environments

    The dramatic growth of the amount of information that is made available through computer systems and the increasing need to access relevant information anywhere at any time are more and more overwhelming the cognitive capacity of human users. Instead of providing the right information at the right time, current computer...

    Provided By IARIA

  • White Papers // Nov 2011

    Challenges in the Planning, Deployment, Maintenance and Operation of Large-Scale Networked Heterogeneous Cooperating Objects

    Efficient deployment and management have been identified to be key challenges for the acceptance of solutions based on Cooperating Objects (COs). The operations for CO deployment and management can be classified into five phases in each of which several challenges and issues are emphasized. This paper presents the PLANET project...

    Provided By IARIA

  • White Papers // Jul 2011

    Improvement of Channel Decoding Using Block Cypher

    This paper introduces two methods for the improvement of performance of channel coding using cryptography, based on concatenation of codes. Cryptography as an outer code is combined with channel coding as an inner code. The first method improves decoding of cryptographic functions. The second one uses the first method for...

    Provided By IARIA

  • White Papers // Jul 2011

    Distortion Free Steganographic System Based on Genetic Algorithm

    Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not possess the right keys. This paper shows that most of the steganographic systems proposed during the past...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks

    Recent technological advancements and low price of deployment and maintenance of Wireless Sensor Networks (WSNs) allow their use in numerous applications in industry, research, and commerce, in order to gather environmental data in an unattended manner. Since, WSNs usually function in open environments, they may become a target of attacks...

    Provided By IARIA

  • White Papers // Jul 2011

    GeCSen - A Generic and Cross-Platform Sensor Framework for LocON

    In this paper, the authors present a generic and crossplatform sensor framework for the LocON location and sensor middleware. This framework is developed using C++/Qt. Sensor information is rapidly gaining importance in automating processes and ubiquitous computing, and so it is for projects like FP7 LocON where the main goal...

    Provided By IARIA

  • White Papers // Jul 2011

    Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards

    The Security-by-Contract (SC) framework has recently been proposed to support applications' evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    MagiSign: User Identification/Authentication Based on 3D Around Device Magnetic Signatures

    In this paper, the authors present "MagiSign", a new user identification/authentication technique based on 3D magnetic signatures created in the space around a (mobile) device. The main idea is to influence magnetic (compass) sensor embedded in some mobile devices (e.g., iPhone 3GS, G1/2 Android) using a properly shaped magnet. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Classification of Mobile P2P Malware Based on Propagation Behaviour

    With a multifold increase in the number of mobile users over past few years, mobile malware has emerged as a serious threat for resource constrained handheld devices. From experience of the Internet malware attacks like CodeRed and Slammer, it may not be difficult to predict the extent of devastation mobile...

    Provided By IARIA

  • White Papers // Jul 2011

    Outage Performance Analysis of Alamouti STBC in Backward Link for Wireless Cooperative Networks

    In this paper, the authors propose a cooperative diversity scheme to improve the end-to-end outage performance via Alamouti space-time block coding with two transmit antennas at a source node in a backward link and a best-relay selection scheme in a forward link. They derive an exact closed-form expression of the...

    Provided By IARIA

  • White Papers // Jul 2011

    Exact Error Probabilities Analysis of Arbitrary 2-D Modulation-OFDM Systems With I/Q Imbalances in Frequency-Flat Rayleigh Fading Channel

    In-phase and Quadrature (I/Q) amplitude and phase imbalances are inevitably caused by signal processing in the analog components such as I/Q mixers, phase shifters, filters, and analog/digital converters within I/Q branches. In the implementation of a modern wireless communication system, I/Q imbalances act as one of the main impairments degrading...

    Provided By IARIA

  • White Papers // Jul 2011

    Layer Optimization for DHT-Based Peer-to-Peer Network

    Hierarchical architecture has been found to facilitate effective search in P2P network and ensure system scalability in P2P application deployment. However, the lack of appropriate size ratio of super nodes layer and ordinary nodes layer makes the system search performance far from being optimal. Taking advantage of node heterogeneity, this...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation of Split Connection Methods for Session-Based Group-Oriented Communications

    Group-oriented communication services have become more attractive due to the diversifying demands of Internet users. In these services, the bandwidth available to the link in the network is inefficiently consumed by multiple TCP connections and these individual connections compete against each other. Thus, current group-oriented services cannot use network resources...

    Provided By IARIA

  • White Papers // Jul 2011

    I2P Data Communication System

    As communication becomes more and more an integral part of the people day to day lives, the need to access information increases as well. Security is currently one of the most important factors to consider in the authors' aim to achieve ubiquitous computing, and with it raises the problem of...

    Provided By IARIA

  • White Papers // Jul 2011

    Experimental IPTV and IPv6 Extended Provisioning in a Virtual Testbed

    The increasing interest in Internet Protocol TeleVision (IPTV) and Internet Protocol Version 6 (IPv6) has driven the need to find a solution to run IPTV and IPv6 outside of a normal public access network. To find new solutions a virtual testbed based on Virtual Private Network (VPN) was built. VPN...

    Provided By IARIA

  • White Papers // Jul 2011

    Analysis of the Implementation of Utility Functions to Define an Optimal Partition of a Multicast Group

    As the optimal use of network resources is a major issue for telecoms operators, the authors started works aiming to, firstly, improve the utilization of network resources by transmitting the IP packets in multicast when possible, secondly, to adapt the format of the data transmitted in multicast to take into...

    Provided By IARIA

  • White Papers // Jul 2011

    A Survey on Robust Wireless JPEG 2000 Images and Video Transmission Systems

    This paper proposes a survey of robust wireless JPEG 2000 images and video transmission systems. The performance of the presented systems is discussed and compared both in terms of time consumption and in terms of robustness against transmission errors. Some opened tracks are then discuss with a special emphasis on...

    Provided By IARIA

  • White Papers // Jul 2011

    Analysis of Reliable and Scalable Video-On-Demand Networks

    Various architectures have been proposed and implemented to handle the rapid growth in demand for video delivering technologies. This paper implements and thoroughly examines various Video-on-Demand (VoD) architectures using the NS2 simulation tool. The simulation tool used for the project provides an efficient platform to analyze different architectures and obtain...

    Provided By IARIA

  • White Papers // Jul 2011

    Usability Evaluation and Study of a Video-Conferencing Service Provided Via the Virtual Conference Centre

    Usability evaluation is a core component of User-Centred Design (UCD) approach and aims primarily to evaluate effectiveness, efficiency and satisfaction when users interacting with a product/service to achieve their goals and needs, influencing their decision to its future adoption (i.e., user acceptance). The focus of this research paper was to...

    Provided By IARIA

  • White Papers // Jul 2011

    Multi-Episodic Dependability Assessments for Large-Scale Networks

    As a network infrastructure expands in size, the number of concurrent outages can be expected to grow in frequency. The purpose of this paper is to investigate through simulation the characteristics of concurrent network outages and how they impact network operators' perspective of network dependability. The dependability investigated includes network...

    Provided By IARIA

  • White Papers // Oct 2011

    Software Product Line Agility

    Software reuse constitutes a significant challenge for different development communities, while systematic reuse is a difficult target to achieve. Software Product Line (SPL) has been nominated as one of the effective approaches promoting software reuse. In this paper, the authors propose the Enterprise Product Line Software Process (EPLSP) that integrates...

    Provided By IARIA

  • White Papers // Oct 2011

    An Agile Model-Driven Development Approach - A Case Study in a Finance Organization

    In the Sungard Front Arena, current software portfolio a business functionality called Market Server Capability (MSC) is embedded and duplicated in many components. By the application of Agile and Lean principles on model-driven development, the authors will get an Agile approach for constructing the architecture of a new MSC definition...

    Provided By IARIA

  • White Papers // Oct 2011

    A Planning Poker Tool for Supporting Collaborative Estimation in Distributed Agile Development

    Estimating and planning are critical to the success of any software project, also in the case of distributed agile development. Previous research has acknowledged that conventional agile methods need to be adjusted when applied in distributed contexts. However, the authors argue that also new tools are needed for enabling effective...

    Provided By IARIA

  • White Papers // Oct 2011

    Scrum Maturity Model: Validation for IT Organizations' Roadmap to Develop Software Centered on the Client Role

    Within the agile development methodologies context, the topic of client relationship management is strongly focused, mainly due to the importance of collaboration between the development team and its clients. Most clients avoid or are unable to develop a close cooperation with vendor organizations, since it requires a motivation and close...

    Provided By IARIA

  • White Papers // Oct 2011

    Usage of Robot Framework in Automation of Functional Test Regression

    Manual testing is a time consuming process. In addition, regression testing, because of its repetitive nature, is error-prone, so automation is highly desirable. Robot Framework is simple, yet powerful and easily extensible tool which utilizes the keyword driven testing approach. Easy to use tabular syntax enables creating test cases in...

    Provided By IARIA

  • White Papers // Aug 2011

    Federated Identity Management for Android

    A federated Identity Management system (IdM) must include mobile units and must provide mutual authentication for client-server connections. Existing frameworks for identity management like SAML are unlikely to apply well to resource constrained mobile terminals like Android. The contribution of this paper is an IdM with simpler data representation and...

    Provided By IARIA

  • White Papers // Aug 2011

    A Scalable Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA