IARIA

Displaying 521-560 of 1223 results

  • White Papers // Nov 2011

    Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures

    The approach of users connected anytime, anywhere, has led to merging isolated islands of enriched services environments into the WEB, leaving the user free to choose among an huge number of services. In this context the introduction of ontologies and the creation of semantic Web services mainly focus on using...

    Provided By IARIA

  • White Papers // Nov 2011

    Performance Evaluation of Wireless IP Telephony (W-IPT) Over Wi-Fi Networks

    As one of the fastest growing voice service technologies, IP Telephony is currently the greatest benefactor of IP Convergence. Apart from the cost and management benefits of a converged network, the exciting array of productivity enabling applications such as unified messaging, collaboration, and presence services within an IP Telephony infrastructure...

    Provided By IARIA

  • White Papers // Nov 2011

    Capturing Mobile Devices Interactions Minimizing the External Influence

    Mobile computing has become an integral part of everyday life for the new 'Information and Knowledge Society'. The new generation of mobile devices and their full connection capabilities enable users to access a wide choice of services and knowledge from everywhere. Owing to this tendency, access to these services has...

    Provided By IARIA

  • White Papers // Nov 2011

    UbiPOL: A Platform for Context-Aware Mobile Device Applications in Policy Making

    UbiPOL is a context-aware platform for policy making. At its core, the UbiPOL platform has an essential framework of web services and APIs. It is intended to aid and support the development of location-based and context-aware applications in the field of policy making. Software developers can make use of UbiPOL...

    Provided By IARIA

  • White Papers // Nov 2011

    A Fast Bandwidth Request and Grant Method for IEEE 802.16 OFDMA/TDD Systems

    In the design of a contention-based bandwidth request scheme, decrease in data transmission delay is the most important factor. This paper proposes a new CDMA-based bandwidth request method in which the bandwidth request code contains the channel quality information and amount of bandwidth required by a mobile station. A mobile...

    Provided By IARIA

  • White Papers // Nov 2011

    External Interference-Aware Distributed Channel Assignment in Wireless Mesh Networks

    Interference is one of the major causes for performance degradation in wireless networks. Channel assignment algorithms have been proven successful to decrease the network-wide interference by using non-overlapping channels for otherwise interfering links. However, external co-located networks and devices are usually not considered in the channel assignment procedure, since they...

    Provided By IARIA

  • White Papers // Nov 2011

    Communication System With SISO Channel Decoding Using Bit Stuffing

    This paper introduces a communication system with typically wireless transmission, with SISO convolutional decoding using predefined reliability values at input of the SISO decoder. "Dummy" bits are stuffed into the information which is to be transmitted over a noisy channel and SISO decoded. Stuffed bits have to be known at...

    Provided By IARIA

  • White Papers // Nov 2011

    An Approach to Enhance the Timeliness of Wireless Communications

    Wireless technologies are the present and the future of network communications. However, the support of real-time data transmission in wireless communications - providing support for execution of well-timed networked operations - is still an open issue, not fully addressed by current wireless network standards and technologies. Thus, this paper proposes...

    Provided By IARIA

  • White Papers // Nov 2011

    Opportunistic Spectrum Sharing Scheme for Secondary WiFi-Like Devices in TV White Spaces

    Secondary spectrum access is a promising approach to improve spectrum utilization by enabling new wireless systems to opportunistically use and efficiently share the licensed bands. This paper targets a WiFi-like reuse of available spectrum in the TV bands and proposes a novel cooperative centralized spectrum sharing scheme that enables protection...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobility in a Personalized and Flexible Video-Based Transmedia Environment

    This paper addresses the effective design of Transmedia environments to generate personalized additional video information from iTV, PC and mobile devices with a special focus on mobile devices. It presents the opportunities and challenges of the inclusion of mobile devices on this ubiquitous environment, turning it into a true "Ecosystem...

    Provided By IARIA

  • White Papers // Nov 2011

    Pervasive Computing in Embedded Systems: Designing Cooperative Applications for Real Environments

    The dramatic growth of the amount of information that is made available through computer systems and the increasing need to access relevant information anywhere at any time are more and more overwhelming the cognitive capacity of human users. Instead of providing the right information at the right time, current computer...

    Provided By IARIA

  • White Papers // Nov 2011

    Challenges in the Planning, Deployment, Maintenance and Operation of Large-Scale Networked Heterogeneous Cooperating Objects

    Efficient deployment and management have been identified to be key challenges for the acceptance of solutions based on Cooperating Objects (COs). The operations for CO deployment and management can be classified into five phases in each of which several challenges and issues are emphasized. This paper presents the PLANET project...

    Provided By IARIA

  • White Papers // Nov 2011

    Locating Zigbee Devices in a Cluster-Tree Wireless Sensor Network: an ESD-Based Integrated Solution

    Recent advances in the technology of wireless electronic devices have made possible to build ad-hoc Wireless Sensor Networks (WSNs) using inexpensive nodes consisting of low power processors, a modest amount of memory and simple wireless transceivers. Over the last years, many novel applications have been envisaged for distributed WSNs in...

    Provided By IARIA

  • White Papers // Nov 2011

    An Adaptative Broadcast Scheme for VANET Applications in a High Density Context

    The efficient broadcast of messages in Vehicular Ad-hoc NETwork (VANET) still faces many challenges in current research. In this paper, the authors are interested in multihop broadcast communication for neighborhood discovery applications which increase driver visibility. These applications need to send information with a high rate causing congestion in the...

    Provided By IARIA

  • White Papers // Nov 2011

    Learning Enhanced Environment Perception for Cooperative Power Control

    The vast proliferation of wireless networking devices, coupled with the trend for short-range communications in dense residential environments, imposes new challenges for the efficient addressing of problems resulting from co-existence of heterogeneous devices (e.g., interference) under capacity and energy constraints. This paper proposes and evaluates a cooperative distributed algorithm for...

    Provided By IARIA

  • White Papers // Nov 2011

    Study on Secure Mobile Communication Based on the Hardware Security Module

    This paper presents a survey of information protection methods for secure mobile communication. Most existing software-based information protection systems have a greater risk for the loss or theft and have difficulty in maintaining. In order to solve these problems, the authors considered methods of information protection method based on hardware...

    Provided By IARIA

  • White Papers // Nov 2011

    MergeIA: A Service for Dynamic Merging of Interfering Adaptations in Ubiquitous System

    The composition of adaptations with system's application does not always yield to the desired behavior. Each adaptation occurs correctly when it is separated but it may interact with other adaptations when they are combined. These interactions can affect the final behavior after adaptation; the authors call this an interference. This...

    Provided By IARIA

  • White Papers // Nov 2011

    An Extension of RankBoost for Semi-Supervised Learning of Ranking Functions

    The purpose of this paper was a semi-supervised learning method of alternatives ranking functions. This method extends the supervised RankBoost algorithm to combines labeled and unlabeled data. RankBoost is a supervised boosting algorithm adapted to the ranking of instances. Previous work on ranking algorithms has focused on supervised learning (i.e.,...

    Provided By IARIA

  • White Papers // Nov 2011

    A DHT-Based Scalable and Fault-Tolerant Cloud Information Service

    In this paper, the authors present an Information Service designed for maintaining resource information in Cloud datacenters. They employ a P2P cluster of super-peers that share the resource information and load of related activities in a Distributed Hash Table (DHT) based manner. Their DHT does not employ the standard keyspace...

    Provided By IARIA

  • White Papers // Nov 2011

    A 3D Simulation Framework for Safe Ambient-Assisted Home Care

    The Safe Home Care project focuses on assembling safe home assisted-living environments built on autonomous Off-The-Shelf systems. The authors argue that these smart spaces will contribute to relieve the pressure on health systems by providing the means for ambulatory and daily life assistance. However, the integration of disparate sovereign systems...

    Provided By IARIA

  • White Papers // Nov 2011

    Context-Aware Multimedia Distribution to User Groups

    Increasingly, multimedia services require efficient delivery systems to support content distribution. If a service targets groups of users then a point-to-multipoint distribution technology is naturally more optimized. 3GPP has specified MBMS (Multimedia Broadcast Multicast Service) and E-MBMS (Evolved MBMS) systems to broadcast and multicast rich media contents to mobile communities...

    Provided By IARIA

  • White Papers // Nov 2011

    A TCP Service Migration Protocol for Single User Multiple Devices

    In this paper, the authors present a new transport protocol TSMP, which seeks to support data transfer for the emerging usage paradigm of "Single user, multiple devices" in a TCP compatible manner. Through its novel naming and proxy-based designs, TSMP is able to retain the current client and server protocol...

    Provided By IARIA

  • White Papers // Nov 2011

    ZeDDS - Fault-Tolerant Data Management in Wireless Sensor Networks with Mobile Users

    In application scenarios where sensor data is temporarily stored within the WSN - instead of transferring the data directly to a base station - data availability is an important factor. Ubiquitous Wireless Sensor Networks (WSNs) consist of sensor nodes which may communicate with each other via unreliable communication links. Furthermore,...

    Provided By IARIA

  • White Papers // Nov 2011

    Modular P2P-Based Approach for RDF Data Storage and Retrieval

    One of the key elements of the semantic web is the Resource Description Framework (RDF). Efficient storage and retrieval of RDF data in large scale settings is still challenging and existing solutions are monolithic and thus not very flexible from a software engineering point of view. In this paper, the...

    Provided By IARIA

  • White Papers // Nov 2011

    Building Virtual Private Clouds With Network-Aware Cloud

    Cloud computing presupposes on-demand network access to pool of computing resources. However, network access through the WAN is usually not compliant with any kind of service guarantees, including reliability, security and performance. In this paper, two types of network services able to fulfill cloud requirements are presented. In addition, an...

    Provided By IARIA

  • White Papers // Nov 2011

    Scalable Resource Provisioning in the Cloud Using Business Metrics

    Currently, cloud infrastructures are in the spotlight of computer science. Through offering on-demand resource provisioning capabilities and high flexibility of management cloud-based systems can seamlessly adjust to the constantly changing environment of the Internet. They can automatically scale according to a chosen policy. Despite the usefulness of the currently available...

    Provided By IARIA

  • White Papers // Oct 2011

    Software Product Line Agility

    Software reuse constitutes a significant challenge for different development communities, while systematic reuse is a difficult target to achieve. Software Product Line (SPL) has been nominated as one of the effective approaches promoting software reuse. In this paper, the authors propose the Enterprise Product Line Software Process (EPLSP) that integrates...

    Provided By IARIA

  • White Papers // Oct 2011

    An Agile Model-Driven Development Approach - A Case Study in a Finance Organization

    In the Sungard Front Arena, current software portfolio a business functionality called Market Server Capability (MSC) is embedded and duplicated in many components. By the application of Agile and Lean principles on model-driven development, the authors will get an Agile approach for constructing the architecture of a new MSC definition...

    Provided By IARIA

  • White Papers // Oct 2011

    A Planning Poker Tool for Supporting Collaborative Estimation in Distributed Agile Development

    Estimating and planning are critical to the success of any software project, also in the case of distributed agile development. Previous research has acknowledged that conventional agile methods need to be adjusted when applied in distributed contexts. However, the authors argue that also new tools are needed for enabling effective...

    Provided By IARIA

  • White Papers // Oct 2011

    Scrum Maturity Model: Validation for IT Organizations' Roadmap to Develop Software Centered on the Client Role

    Within the agile development methodologies context, the topic of client relationship management is strongly focused, mainly due to the importance of collaboration between the development team and its clients. Most clients avoid or are unable to develop a close cooperation with vendor organizations, since it requires a motivation and close...

    Provided By IARIA

  • White Papers // Oct 2011

    Usage of Robot Framework in Automation of Functional Test Regression

    Manual testing is a time consuming process. In addition, regression testing, because of its repetitive nature, is error-prone, so automation is highly desirable. Robot Framework is simple, yet powerful and easily extensible tool which utilizes the keyword driven testing approach. Easy to use tabular syntax enables creating test cases in...

    Provided By IARIA

  • White Papers // Oct 2011

    A Test Purpose and Test Case Generation Approach for SOAP Web

    SOA Web services are now supported by most of major software development companies and industry. To be reliable, these ones require to be developed with respect to a complete software development life cycle and, in particular, they need to be tested. Test purpose-based methods are black box testing techniques which...

    Provided By IARIA

  • White Papers // Oct 2011

    Ev-ADA: A Simulation-Driven Evaluation Architecture for Advanced Driving-Assistance Systems

    This paper reports the architecture of a simulator which is able to evaluate sensors, path planners and controllers of the Advanced Driving-Assistance Systems (ADAS). The outstanding feature of this simulator is that it is able to evaluate algorithms by giving scores. The implementation of the algorithms requires several tools such...

    Provided By IARIA

  • White Papers // Oct 2011

    On the Preliminary Adaptive Random Testing of Aspect-Oriented Programs

    Adaptive Random Testing (ART) is a new family of random-based test data generation and selection strategies that enhances the effectiveness of tests over the classical Random Testing (RT). ART has been widely investigated and studied in numerous research papers over the recent years. These studies have included proposing various techniques...

    Provided By IARIA

  • White Papers // Oct 2011

    Devising Mutant Operators for Dynamic Systems Models by Applying the HAZOP Study

    Embedded systems are increasingly present in many electronic devices. Therefore, it is necessary to use rigorous testing techniques aimed at ensuring that these systems behave as expected. The authors' contribution is the definition of mutant operators for the context of embedded systems models. They focus on dynamic systems models, specifically...

    Provided By IARIA

  • White Papers // Oct 2011

    A Static Robustness Grid Using MISRA C2 Language Rules

    Program robustness is the ability of software to behave correctly under stress. Measuring program robustness allows programmers to find the program's vulnerable points, repair them, and avoid similar mistakes in the future. In this paper, a Robustness Grid will be introduced as a program robustness measuring technique. A Robustness Grid...

    Provided By IARIA

  • White Papers // Oct 2011

    A Specifications-Based Mutation Engine for Testing Programs in C#

    This paper presents a simple and efficient engine which produces mutations of source code written in C#. The novelty of this engine is that it produces mutations that do not contradict with the specifications of the program. The latter are described by a set of pre- and post-conditions and invariants....

    Provided By IARIA

  • White Papers // Jul 2011

    Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-Based Scheme

    Practical implementations of identity based cryptosystems are faced to key escrow problem, which is not always a good property in many realistic scenarios. Thus, efficient key issuing protocols are needed to generate and deliver user's private keys in secure manner without leakage. Three major approaches exist in the literature, the...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficiency Optimisation of Tor Using Diffie-Hellman Chain

    Onion routing is the most common anonymous communication channel. Usually onion routing is specified through asymmetric cipher and thus is inefficient. In Tor (the second generation onion router), it is suggested to employ symmetric cipher to encrypt the packets in onion routing. Obviously, symmetric cipher is much more efficient than...

    Provided By IARIA

  • White Papers // Jul 2011

    StepRoute - A MultiRoute Variant Based on Congestion Intervals

    Congestion-aware routing protocols require network statistics which are timely and as precise as possible. Consequently, there is a need to represent congestion information efficiently and in a scalable manner. Based on the authors' previous work, they propose a routing protocol, called StepRoute, which achieves these objectives, while retaining the functionality...

    Provided By IARIA

  • White Papers // Jul 2011

    A Naming Scheme for Identifiers in a Locator/Identifier-Split Internet Architecture

    Many researchers agreed that splitting the IP address into a locator and an identifier seems to be a promising approach for a Future Internet Architecture. Although this solution addresses the most critical issues of today's architecture, new challenges arise through the mapping system which is necessary to resolve identifiers into...

    Provided By IARIA

  • White Papers // Jul 2011

    Address-Translation-Based Network Virtualization

    Two network-virtualization architectures, namely, network segmentation and network paging, were investigated. They are analogical to two memory-virtualization architectures: segmentation and paging. Network paging, which is relatively new and is based on a type of Network-Address Translation (NAT), is focused on. This architecture requires smaller packet size and has several more...

    Provided By IARIA

  • White Papers // Jul 2011

    Next Generation Access Networks (NGANs) and the Geographical Segmentation of Markets

    Telecom infrastructures are facing unprecedented challenges with increasing demands on network capacity. Next Generation Networks (NGN) allows consumers to choose between different access network technologies to access their service environment. The arrival of NGAN (Next Generation Access Network) has implications for the competitive conditions in access markets that are still...

    Provided By IARIA

  • White Papers // Jul 2011

    Does Cloud Computing Matter? Networking IT and Services Value in Organizations

    In this paper, the authors discuss cloud computing value generation through four company case studies. They argue that cloud computing value is generated through the interactions of organization, IT and services. They further analyze their value networking activities, and then propose ANT as a lens to interpret the cloud computing...

    Provided By IARIA

  • White Papers // Jul 2011

    Motivations and Challenges of Global Mobility With Universal Identity: A Review

    Mobility in the enterprise is derived by both technology availability and the increase in user demand. The merging of 4G and WLAN networks prompts the needs of operators to increase their coverage with a blended service offering that makes best use of their old investments in legacy infrastructure, low price...

    Provided By IARIA

  • White Papers // Jul 2011

    A New Hybrid SPD-Based Scheduling for EPONs

    Dynamic Bandwidth Allocation (DBA) is a key issue of Ethernet PONs. In order to get higher resource utilization and lower packet delay, the problem is always dissolved into grant sizing and grant scheduling. In this paper, the authors explore grant scheduling techniques. They propose a modified Hybrid online and offline...

    Provided By IARIA

  • White Papers // Jul 2011

    Link Emulation on the Data Link Layer in a Linux-Based Future Internet Testbed Environment

    Protocol design and development is not a straightforward process. Each approach must be validated for interactions and side-effects in the existing network environments. But the Internet itself is not a good test environment, since its components are not controllable and certain problem situations (like congestion or error conditions) are difficult...

    Provided By IARIA

  • White Papers // Jul 2011

    User Utility Function as Quality of Experience (QoE)

    The realization of a user-centric paradigm will revolutionize future wireless networks. For this innovative concept to materialize, a paradigm shift is required from a long-term contractual based service delivery to a short-term contractual and dynamic service delivery concept. However this necessitates that translation of user satisfaction into network technical indices,...

    Provided By IARIA

  • White Papers // Jul 2011

    Tuning Self-Similar Traffic to Improve Loss Performance in Small Buffer Routers

    The issue of router buffer sizing is an important research problem and is still open though researchers have debated this for many years. The research method can be classified into two kinds: one is based on queuing theory, the other uses TCP as model. From the point of TCP model,...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation of Burst Deflection in OBS Networks Using Multi-Topology Routing

    This paper evaluates the combination of Optical Burst Switching (OBS) and Multi-Topology (MT) routing. Using MT routing, a source router has a choice of sending IP packets on several different paths to the destination. In OBS networks, deflection may reduce burst loss rate. The authors evaluate a deflection method that...

    Provided By IARIA

  • White Papers // Jul 2011

    Modeling and Evaluation of SWAP Scheduling Policy Under Varying Job Size Distributions

    Size-based scheduling policies have been shown to be effective resource allocation policies in computing and networked environments. One of the recently proposed size-based scheduling policy is called SWAP. It is a non-preemptive, threshold based policy that was proposed to approximate the Shortest Job First (SJF) policy by introducing service differentiation...

    Provided By IARIA

  • White Papers // Jul 2011

    Design Experience With Routing SW and Related Applications

    This paper deals with the current software architectures for intermediate systems for Intranet and small-range wireless interconnection using case studies founded on real-world applications. The approach demonstrates another contribution to network convergence in interconnecting software architecture development, which stems from a design experience based on industrial network applications and on...

    Provided By IARIA

  • White Papers // Jul 2011

    Adaptive Load Balanced Routing for 2-Dilated Flattened Butterfly Switching Network

    High-radix networks such as folded-Clos outperform other low radix networks in terms of cost and latency. The 2-Dilated Flattened Butterfly (2DFB) network is a non-blocking high-radix network with better path diversity and reduced diameter compared to the folded-Clos network. In this paper, the authors introduce an adaptive load balanced routing...

    Provided By IARIA

  • White Papers // Jul 2011

    A Review of IPv6 Multihoming Solutions

    Multihoming is simply defined as having connection to the Internet through more than one Internet service provider. Multihoming is a desired functionality with a growing demand because it provides fault tolerance and guarantees a continuous service for users. In the current Internet, which employs IPv4 as the network layer protocol,...

    Provided By IARIA

  • White Papers // Jul 2011

    An Analytic and Experimental Study on the Impact of Jitter Playout Buffer on the E-Model in VoIP Quality Measurement

    Over the years, the quality in Voice over IP (VoIP) applications has been defined from the perspective of VoIP service providers but not necessarily from the perspective of end-users. Conversational quality as perceived by end-users is affected by a wide variety of factors that are not exclusive to network performance....

    Provided By IARIA

  • White Papers // Jul 2011

    SIP Providers' Awareness of Media Connectivity

    Voice-over-IP (VoIP) has become an important service in the Internet. In contrast to the Public Switched Telephone Network where the delivery of all messages and streams is the responsibility of the calling parties' providers, VoIP media data is sent directly between the user agents without provider interaction in most cases....

    Provided By IARIA

  • White Papers // Jul 2011

    Improving SIP Authentication

    The digest access authentication method used in the voice over IP signaling protocol, SIP, is weak. This authentication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation of Inter-Vehicle Communications Based on the Proposed IEEE 802.11p Physical and MAC Layers Specifications

    Traffic control, accidents prevention, vehicles automation and useful services to the drivers have always been goals of an intelligent traffic system. With this objective, the IEEE is finalizing its new standard: the IEEE 802.11p, which defines the vehicular ad-hoc networks physical and medium access control layers characteristics. This paper presents...

    Provided By IARIA

  • White Papers // Jul 2011

    Cooperative Vehicle Information Delivery Scheme for ITS Networks With OFDM Modulation Techniques

    Vehicular Ad hoc NETworks (VANETs) are new technologies that offer many opportunities to wide range interesting services. Safe driving applications in Intelligent Transport System (ITS) are major applications of VANETs. In the high-speed mobility environment of VANETs, failure transmission due to change of vehicle positions, fluctuation of channel condition and...

    Provided By IARIA

  • White Papers // Jul 2011

    An Adaptive Mechanism for Access Control in VANETs

    VANETs have the ability to transmit various types of information between a vehicle and another, or between a vehicle and a fixed station. However, transmission may be impaired due to long delays, quantity of collisions and signal noise. This is caused, in part, by abrupt changes in the network topology....

    Provided By IARIA

  • White Papers // Jul 2011

    Efficient Mid-End Spectrum Sensing Implementation for Cognitive Radio Applications Based on USRP2 Devices

    Spectrum sensing is a cornerstone task in cognitive radio environments supporting dynamic spectrum access by spectrum opportunities discovery. It must be reliable and accurate in order not to harm the primary system by incorrect spectrum opportunities decisions. Mid-end spectrum sensing devices are spectrum sensing devices with satisfactory signal detection performances...

    Provided By IARIA

  • White Papers // Feb 2012

    Strict Priority Scheduler for Rate Controlled Transmission

    The paper proposes a modification to the strict priority scheduler, to guarantee the Quality of Service (QoS) of a network with variable and undetermined bandwidth capacity. The proposed modifications make it possible to accomplish QoS along the path. The presented solution allows providing the minimum guaranteed transmission rates for all...

    Provided By IARIA

  • White Papers // Feb 2012

    Network and Services Monitoring: A Survey in Cloud Computing Environments

    Cloud Computing are currently seen as a trend in the computing area for companies, institutions and research groups that seek provision of computational resources on demand. This solution usually works out by means of virtual systems which are managed through a specific infrastructure, termed as Infrastructure-as-a-Service or IaaS in the...

    Provided By IARIA

  • White Papers // Feb 2012

    The Space-Time Information in the Access Management

    This paper deals with the possibility to employ the user's time and space position information in the access management. Using the time and space information as new factors for authentication process is discussed in this paper. The authors have also considered the issues of indoor localization and possible application scenarios...

    Provided By IARIA

  • White Papers // Feb 2012

    A High-Level Network-Wide Router Configuration Language

    In this paper, the authors discuss the design of a high-level network-wide router configuration language. At its current stage of development, the language enables them to specify basic routing and security configurations. A declarative nature of the language is supposed to be intuitive to network administrators. They have developed an...

    Provided By IARIA

  • White Papers // Feb 2012

    A New Approach to NGN Evaluation Integrating Simulation and Testbed Methodology

    Since, the beginning of Internet, network researchers have been proposing methodologies and tools to facilitate the design and development of new protocols for Internet. Analytical modeling, network simulation, network emulation, and more recently, testbeds, are being used in these researches. However, there are advantages and disadvantages in all these methodologies...

    Provided By IARIA

  • White Papers // Feb 2012

    Impact of Propagation Factors on Routing Efficiency in Wireless Mesh Networks: A Simulation-Based Study

    The low installation and maintenance costs, self-healing abilities and the ease of development are some of the qualities that make the multi-hop wireless mesh network a promising alternative to conventional networking in both - rural and urban areas. This paper examines the performance of such a network depending on environmental...

    Provided By IARIA

  • White Papers // Feb 2012

    Comparison of Heuristic Methods Applied to Optimization of Computer Networks

    This paper presents an attempt to solve Capacity and Flow Assignment (CFA) problem, which is NP-complete. Meta-heuristic and heuristic algorithms are invented in order to find not only feasible but also effective solution. A set of test network instances, with provided dual bounds as a reference, is used to: tune...

    Provided By IARIA

  • White Papers // Feb 2012

    Wireless Home Automation Network Stability Testing

    This paper describes stability testing of the new wireless communication platform for home automation. In the paper is description of two test-cases for wireless communication parameters evaluation to determine the limits of stability and low error rate. The paper also describes used statistical method and discusses testing results together with...

    Provided By IARIA

  • White Papers // Feb 2012

    Comparison of the Fully-Differential and Single-Ended Solutions of the Frequency Filter With Current Followers and Adjustable Current Amplifier

    Two solutions of universal and adjustable current-mode filters are presented in this contribution. The first of them is able to process Single-Ended (S-E) signals in communications and the other can operate Fully-Differentially (F-D) and therefore is well applicable for balanced transmission lines. Both circuits have adjustable quality factor and both...

    Provided By IARIA

  • White Papers // Feb 2012

    How Many Cores Does Parallel BGP Need in a High-Speed Router

    The performance problem of BGP has raised great concerns both in industry and research. With rapid expansion of Internet, how to improve the performance of BGP to support more BGP neighbors in a high-speed router is a practical urgent problem. In this paper, the authors presented a Minimal Cores Computing...

    Provided By IARIA

  • White Papers // Feb 2012

    TCP SYN Protection: An Evaluation

    The drop of initial TCP control packets can dramatically penalize flow performance. More the flow is small, more the penalty is important. This paper studies an Active Queue Management (AQM) aiming to protect TCP SYN and SYNACK from losses, and evaluates the improvements for short TCP flows and the impacts...

    Provided By IARIA

  • White Papers // Feb 2012

    Multi-Tenancy Authorization System With Federated Identity for Cloud-Based Environments Using Shibboleth

    The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client's domain. For these services...

    Provided By IARIA

  • White Papers // Feb 2012

    A SPIT Avoidance Workflow for SIP-Provider

    Voice-over-IP (VoIP) replaces traditional telephony network infrastructures in growing numbers. Along with this infrastructure change, SPam over Internet Telephony (SPIT) is likely to spread massively, similar to spam in e-mail infrastructures. Thus, it is necessary to develop appropriate countermeasures. Since, the request for a call, usually indicated by the ringing...

    Provided By IARIA

  • White Papers // Feb 2012

    Using PGP Signatures for Securing SIP Infrastructures

    Because of increasing bandwidth and decreasing costs for the provider, Voice-over-IP is an alternative to the Public Switched Telephone Network for many users. But with the propagation of Voice-over-IP new harassments and threats occur. Assuring the identity of communication partners is significant in this context. Without the authentication of communication...

    Provided By IARIA

  • White Papers // Feb 2012

    Developing Trust and Reputation Taxonomy for a Dynamic Network Environment

    Trust and reputation are the pillars of many social phenomena that shape the Internet socio-economic scene. The few existing taxonomies provide only initial insights into the ways trust benefits can be felt, but they are neither complete nor elaborated in a systemic manner. In this paper, the authors propose a...

    Provided By IARIA

  • White Papers // Feb 2012

    A Reference Model for Future Computer Networks

    Future Internet design demands revolutionary approaches unfettered by legacy constraints and concepts. This paper presents a clean-slate Concern-Oriented Reference Model (CORM) for architecting future computer networks based on novel network design principles. CORM realizes the network as a software-dependent complex system. It defines the network design space in terms of...

    Provided By IARIA