IARIA

Displaying 761-800 of 1223 results

  • White Papers // Aug 2011

    End-to-End Secure Data Delivery in Wireless Sensor Networks

    Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of...

    Provided By IARIA

  • White Papers // Aug 2011

    A Pairing-Free ID-based One-Pass Authenticated Key Establishment Protocol for Wireless Sensor Networks

    Due to resource constraints and unique features of Wireless Sensor Networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, the authors propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user...

    Provided By IARIA

  • White Papers // Aug 2011

    Adaptive Security on Service-based SCM Control System

    On a large-scale application subject to dynamic interactions, the description and enforcement of security rules are complex tasks to handle, as they involve heterogeneous entities that do not have the same capabilities. In the context of SCM-application for example, the authors have different goods that are being transported across different...

    Provided By IARIA

  • White Papers // Aug 2011

    Supporting Synthetic Data-Driven Diagnosis Through Automated Fault-Injection

    The automotive industry has become steadily more reliant on software-intensive distributed systems to implement advanced vehicle features. In fact, it has been estimated that \"Up to 90% of all innovations are driven by electronics and software\". Given the lack of empirical data available from automotive serial-communication networks, an automated fault-injection...

    Provided By IARIA

  • White Papers // Aug 2011

    Towards Virtual Fault-Based Attacks for Security Validation

    Applications increasingly rely on secure embedded systems or \"Trusted hardware\". ASICs (or smart cards) are typically used for high security but SRAM-based FPGAs are also appealing to implement lower-cost and flexible systems. In both cases, designers need a validation of the achieved level of security before they undergo long and...

    Provided By IARIA

  • White Papers // Aug 2011

    On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records

    In the area of digital records management, the reliability of a digital record's operator varies over time, and consequently affects the trustworthiness of the record. The quality of the reliability of the operator is a measure of the quality of the record's evidential value that is, in turn, a measure...

    Provided By IARIA

  • White Papers // Jul 2011

    Tangible Applications for Regular Objects: An End-User Model for Pervasive Computing at Home

    This paper describes an end-user model for a domestic pervasive computing platform formed by regular home objects. The platform does not rely on pre-planned infrastructure; instead, it exploits objects that are already available in the home and exposes their joint sensing, actuating and computing capabilities to home automation applications. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Continuous Gesture Recognition for Resource Constrained Smart Objects

    Tangible User Interfaces (TUIs) feature physical objects that people can manipulate to interact with smart spaces. Smart objects used as TUIs can further improve user experience by recognizing and coupling natural gestures to commands issued to the computing system. Hidden Markov Models (HMM) are a typical approach to recognize gestures...

    Provided By IARIA

  • White Papers // Jul 2011

    SIREN: Mediated Informal Communication for Serendipity

    The process of education and innovation often involves individuals, whose expertise lies in diverse fields. Informal communication amongst them can prove to be invaluable towards the users collaboration, but rarely does it extend beyond one's already established social circle. This paper proposes SIREN, a system, which makes use of sensor...

    Provided By IARIA

  • White Papers // Jul 2011

    The Importance of Context Towards Mobile Services Adoption

    Along with the popularity of mobile devices and advances in wireless technology, mobile services have become more and more prevalent. Although many analysts have predicted that mobile systems will become mainstream, the adoption of mobile services has been slower than expected. This paper is to study the influence of context...

    Provided By IARIA

  • White Papers // Jul 2011

    Human Behaviour Detection Using GSM Location Patterns and Bluetooth Proximity Data

    Human behaviours are multifarious in nature and it is a challenging task to predict and learn from daily life activities. The profusion of Bluetooth enabled devices used in daily life has created new ways to analyze and model the behaviour of individuals. Bluetooth integrated into mobile handsets can be used...

    Provided By IARIA

  • White Papers // Jul 2011

    Modeling and Analyzing Ubiquitous Systems Using MDE Approach

    The growth of industrial activities during the last decades and the diversity of industrial products require standards and common methodologies for building and integrating different parts. It is also required that working groups use the same terminologies and concepts needed for each domain. The Model Driven Engineering approach aims to...

    Provided By IARIA

  • White Papers // Jul 2011

    Information Dissemination in WSNs Applied to Physical Phenomena Tracking

    Several works suggest the use of wireless sensor networks to manage crisis situations. An example of such scenarios is forest fire fighting. In these situations, it is necessary to use efficient mechanisms for disseminating the environmental information captured by sensors. This paper analyzes the behavior of some representative broadcasting techniques...

    Provided By IARIA

  • White Papers // Jul 2011

    Semantic P2P Overlay for Dynamic Context Lookup

    Context-aware applications generally need to retrieve various kinds of dynamic context data from a large number of context sources. A middleware managing context sources must provide an efficient context lookup mechanism to ease application development. In this paper, the authors categorize the context sources as operating spaces and propose semantic...

    Provided By IARIA

  • White Papers // Jul 2011

    The Design, Instantiation, and Usage of Information Security Measuring Ontology

    Measuring security is a complex task and requires a great deal of knowledge. Managing this knowledge and presenting it in a universal way is challenging. This paper describes the Information Security Measuring Ontology (ISMO) for measuring information security. The ontology combines existing measuring and security ontologies and instantiates it through...

    Provided By IARIA

  • White Papers // Jul 2011

    Formal Logic Based Configuration Modeling and Verification for Dynamic Component Systems

    Reconfigurable networked systems have often been developed via dynamically deployed software components that are executing on top of interconnected heterogenous hardware nodes. The challenges resulting from the complexity of those systems have been traditionally mitigated by creative ad-hoc solutions supported by domain specific modeling frameworks and methodologies. Targeting that deficiency,...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Semantic Interoperability of Graphical Domain Specific Modeling Languages for Telecommunications Service Design

    High competition pressures Telecommunications service providers to reduce their concept-to-market time. To manage more easily service complexity among several actors in the design process and to ensure a more flexible maintainability, service decomposition into stakeholder dedicated views is now largely investigated by companies. However, there is still a lack of...

    Provided By IARIA

  • White Papers // Jul 2011

    ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments

    With the advent of the smart energy grid - an energy transportation and distribution network being combined with an IT network for its monitoring and control - information security has gained tremendous importance for energy distribution and energy automation systems. Integrated security functionality is crucial to ensure a reliable and...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploiting Demand Response in Web-Based Energy-Aware Smart Homes

    Energy conservation is a global issue with tremendous environmental implications. By 2030, the global energy demand will double. High demands and environmental concerns, force the transformation of electricity grids into smart grids, towards more rational utilization of energy. Residential smart metering transforms homes into energy-aware environments, allowing residents to make...

    Provided By IARIA

  • White Papers // Jul 2011

    Using Multitasking and SSD Disks for Optimising Computing Cluster Energy-Efficiency

    The authors tested how Solid-State Drives (SSD) and multitasking, i.e., running more than one task per CPU core, affect performance and energy consumption in I/O intensive data analysis jobs in High-Energy Physics (HEP) computing. Their motivation for the study comes from the LHC experiment at CERN producing up to 15...

    Provided By IARIA

  • White Papers // Jul 2011

    Monitoring IT Power Consumption in a Research Center: Seven Facts

    The authors analyze the power consumption of several IT devices placed in a research center affiliated to the University. The data collection lasted about one year and the analysis let one identify: the average instant power consumption of each type of device, trends of the instant power consumption curves, usage...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Scheduling of Smart Homes Energy Consumption With Microgrid

    Microgrid is taken as the future Smart Grid, and can work as a local energy provider to domestic buildings and reduce energy expenses. To further lower the cost, a Smart Homes idea is suggested. Smart Homes of the future will include automation systems and could provide lower energy consumption costs...

    Provided By IARIA

  • White Papers // Jul 2011

    Smard Grid Software Applications for Distribution Network Load Forecasting

    This paper describes three software applications for distribution network load forecasting in a Smart Grid environment: short-term feeder load forecasting, short-term substation transformer load forecasting and transformer rating, and next-year load pocket forecasting. The short-term feeder load forecasting allows a utility to reduce the possibility of feeder overloading. The substation...

    Provided By IARIA

  • White Papers // Jul 2011

    Non-Intrusive Appliance Monitoring Now: Effective Data, Generative Modelling and LETE

    Monitoring energy consumption at appliance level is a necessary condition for many energy efficient applications. In this paper, the authors have identified Non-Intrusive Load Monitoring (NILM) as a transitional technology, and competing NILM methods must be evaluated not only on performance, but also economical feasibility and user usability of now....

    Provided By IARIA

  • White Papers // Jul 2011

    Energy Coupling Control of Telecommunication Network and Power Grid

    In this paper, the authors present a control architecture that allows to operate the energy storage facilities integrated into the wide area telecommunication network as mediators between the optimality criteria of the Smart Grid and the energy consumption modeling of the telecommunication network itself. Different control modes are discussed. In...

    Provided By IARIA

  • White Papers // Jul 2011

    A Bidirectional Semi-Passive DS-CDMA-RFID Transponder for the UHF Band

    This paper presents a first realization of a semi-passive UHF RFID transponder featuring a direct sequence code division multiple access channel access method for the RFID up-link, and, in addition, some limited down-link abilities, including carrier frequency and field strength measurements. The paper shows experimental results of the proposed transponder,...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficient Symbol Detector for MIMO Communication Systems

    In this paper, an area-efficient symbol detector is proposed for Multiple-Input Multiple-Output (MIMO) communication systems with two transmit and two receive antennas. The proposed symbol detector can support both the spatial multiplexing mode and spatial diversity mode in a single hardware, and shows the optimal Maximum Likelihood (ML) performance. By...

    Provided By IARIA

  • White Papers // Jul 2011

    Software Defined Radio as a DS-CDMA Receiver

    Programmable radio is one of the latest trends in the construction of multi-standard receivers. The technology, called Software Defined Radio (SDR), is also an ideal test platform that allows trying out different algorithms of signal receiving. This particular feature led to choose this platform to implement a DSCDMA receiver (Direct...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Improvements of Mobile SCTP During Handover Period

    Handling mobility at the transport layer is an interesting approach to attain seamless handover in the context of heterogeneous access networks. To support terminal mobility, an extension of SCTP called SCTP-DAR (SCTP Dynamic Address Reconfiguration) (a.k.a. mobile SCTP) has been defined allowing SCTP endpoints to update IP address and inform...

    Provided By IARIA

  • White Papers // Jul 2011

    Sink-Connected Barrier Coverage Optimization for Wireless Sensor Networks

    This paper addresses the sink-connected barrier coverage optimization problem, which is concerned with how to select randomly deployed sensor nodes of a Wireless Sensor Network (WSN) to reach two optimization goals: to maximize the degree of barrier coverage by the minimum number of detecting nodes, and to make the detecting...

    Provided By IARIA

  • White Papers // Jul 2011

    The Joint Probability Density Function of the SSC Combiner Output Signal at Two Time Instants in the Presence of Hoyt Fading

    In this paper, the probability density function of the Switch and Stay Combiner (SSC) output Signal to Noise Ratio (SNR) at one time instant and the joint probability density function of the SSC combiner output signal to noise ratio at two time instants, in the presence of Hoyt fading, are...

    Provided By IARIA

  • White Papers // Jul 2011

    Hybrid Log-MAP Algorithm for Turbo Decoding Over AWGN Channel

    In Log-MAP turbo decoding, the complicated log exponential sum is often simplified with the Jacobian logarithm which consists of the max operation along with an exponential correction function. Although the Max-Log-MAP reduces the complexity of the Jacobian logarithm implementation by omitting the correction function, its performance is inferior to the...

    Provided By IARIA

  • White Papers // Jul 2011

    Evaluating Transceiver Power Savings Produced by Connectivity Strategies for Infrastructure Wireless Mesh Networks

    Infrastructure Wireless Mesh Networks (I-WMNs) are increasingly used to bridge the digital divide in rural areas around the world. Rural African areas in particular require energy efficient I-WMNs as the nodes comprising the I-WMN backbone network may be battery-powered in the absence of reliable power supplies. A key requirement for...

    Provided By IARIA

  • White Papers // Jul 2011

    Spectrum Access During Cognitive Radio Mobiles' Handoff

    Cognitive radio is an emergent technology in wireless networks that aims to improve spectrum's use by allowing opportunist access. Recent research activities related to cognitive radio consider static terminals, neglecting the impact of user's mobility. In this paper, the authors are interested in the concept of mobility in cognitive radio...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficiently Using Bitmap Floorplans for Indoor Navigation on Mobile Phones

    Pedestrian navigation applications and especially indoor navigation applications need to describe a way in a form that is easy to understand, remember and follow. While in the case of outdoor vehicle navigation the distance in meter together with a turn hint is a good description such a description is merely...

    Provided By IARIA

  • White Papers // Jul 2011

    Near Field Sensing in Wireless LANs

    Miscellaneous WLAN-based localization methods focus on preferably precise location estimation and tracking. However, the infrastructure of a WLAN system can also be utilized for relative spatial assessment within discrete zones, not using a reference coordinate system. This paper proposes a WLAN-based localization prototype that is capable of unambiguously distinguishing detached...

    Provided By IARIA

  • White Papers // Jul 2011

    Spectrum Sensing Measurement Using GNU Radio and USRP Software Radio Platform

    Spectrum utilization can be significantly improved by adopting Cognitive Radio (CR) technology. Such radios are able to sense the spectral environment and use this information to opportunistically provide wireless links that meet the user communications requirements optimally. To achieve the goal of cognitive radio, it is a fundamental requirement that...

    Provided By IARIA

  • White Papers // Jul 2011

    Seamless Multimedia Handoff for Hierarchical Mobile IPv6

    The majority of today's multimedia applications and content reside on the Internet. Since, the Internet Protocol (IP) is the "Glue" that holds the Internet together, there is enormous interest in extending IP to mobile multimedia networks. Handover is one of the most important factors that may degrade the performance of...

    Provided By IARIA

  • White Papers // Jul 2011

    Heterogeneous Networks Handover Decision Triggering Algorithm Based on Measurements Messages Transfer Using IP Option Header

    The handover issue is one of the most important challenges in the next generation mobile networks. Traditional handover triggering conditions mainly based on signal strength, while the requirements for other triggering conditions such as user controlled handover or service based handover become an urgent need; especially when the handover is...

    Provided By IARIA

  • White Papers // Jul 2011

    Cyclostationary Detection in Spectrum Pooling System of Undefined Secondary Users

    Spectrum sensing continuing to emerge as an essential topic for the cognitive networks where two kinds of users primary and secondary will share the band. This paper proposes a method for real-time detection of secondary users at the base stations. Cognitive Radios may hide themselves in between the primary users...

    Provided By IARIA

  • White Papers // Jan 2013

    Improving Fairness in QoS and QoE Domains for Adaptive Video Streaming

    In this paper, the authors present an enhancement to a category of Adaptive Video Streaming solutions aimed at improving both Quality of Service (QoS) and Quality of Experience (QoE). The specific solution used as baseline for the work is the Smooth Streaming framework from Microsoft. The presented enhancement relates to...

    Provided By IARIA

  • White Papers // Jan 2013

    Optimization of Wireless Sensor Network Using Network Coding Algorithm

    A Wireless Sensor Network is a kind of ad hoc network that can be used to monitor a variety of environmental characteristics aiming, for instance, military purposes, environmental purposes, etc. A typical application of these networks is to collect and send historical information from all network sensor nodes to the...

    Provided By IARIA

  • White Papers // Jan 2012

    Alteration Method of Schedule Information on Public Cloud for Preserving Privacy

    The authors are currently experiencing an explosion of cloud technologies. However, a cloud service administrator may be an untrustworthy third party. Therefore, companies dealing with confidential information cannot use a public cloud. In this paper, they propose a method for preventing the leakage of private information on a cloud schedule...

    Provided By IARIA

  • White Papers // Aug 2011

    Downtime Analysis of Virtual Machine Live Migration

    Virtual machine environments like VMware, XEN, KVM, and Hyper-V support live migration of guest operating systems, which is used in data centers to provide uninterrupted service during maintenance or to move computation away from failure-prone hosts. The duration of migration, as well as the virtual machine downtime during this process...

    Provided By IARIA

  • White Papers // May 2013

    On the Analytical Characterization of a Real Life Virtual Network Function: The Italtel Virtual Session Border Control

    In this paper, the authors analyze a real-life application of virtualization: the Italtel Virtual Session Border Controller (VSBC). The measurements obtained in ad hoc loading experiments show that the VSBC performance is not linear with respect to variations in the call rate. Such a behavior is not in accordance with...

    Provided By IARIA

  • White Papers // May 2013

    Trusted Computing on Heterogeneous Embedded Systems-on-Chip with Virtualization and Memory Protection

    The paper examines the architecture of a secure and trustworthy cloud platform, which ensures strong logical and physical security on the client devices using a two-layer security mechanism: a) a hardware security module located on the SoC of the client device that protects incoming and outgoing communications (e.g., to/from an...

    Provided By IARIA

  • White Papers // Jul 2011

    Connectivity Services Management in Multi-Domain Content-Aware Networks for Multimedia Applications

    This paper proposes a new framework, for connectivity services management in overlay Virtual Content Aware Networks (VCAN) built over multi-domain, multi-provider IP networks. The framework is part of a Future Internet-oriented Multimedia networked architecture developed inside a FP7 European ICT research project, ALICANTE. The VCAN new concept is a stronger...

    Provided By IARIA

  • White Papers // Mar 2013

    Survey on Survivable Virtual Network Embedding Problem and Solutions

    Survivability in networks has always been an important issue and lately becomes for network virtualization. Network virtualization provides to run multiple virtual networks on a shared physical network. Since a failure in the physical network can affect several virtual resources, therefore, the survivability has to be considered in the embedding...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems

    Embedded systems, such as Smartphone's, have become ubiquitous due to the versatility of these devices for various applications, which have varying application resource requirements. Due to these variances, system resources should be specialized to the executing applications' resource requirements in order to adhere to design/optimization goals. In multicore systems, core...

    Provided By IARIA

  • White Papers // May 2013

    Fuzzy Controled QoS for Scalable Cloud Computing Services

    An important characteristic of cloud infrastructures is scalability on demand. A scalability service monitors performance load metrics and decides to scale up or down, by provision or revoke of cloud resources. This could guarantee Quality of Service (QoS) and enforce Service Level Objectives (SLOs). The approach of this paper shows...

    Provided By IARIA

  • White Papers // May 2012

    A Gateway-Based Access Control Scheme for Collaborative Clouds

    A collaborative cloud, formed by private enterprise clouds, is usually task-oriented and tightly correlated. It brings new ways to build and manage computing systems in terms of software development, resource sharing, and maintenance. However, there is little research on the security of collaborative clouds. This paper presents a virtual private...

    Provided By IARIA

  • White Papers // Jul 2012

    Application of Scenario-Driven Role Engineering in Knowledge Management Systems - Requirements and Implementation

    Collaborative systems, which are often used in short-term virtual enterprises or long-term cooperation networks, often contain information about the manufacturing and fabrication competences of the participating technology partners. These should only be made available to a very restricted group of persons for example to support feasibility studies in the context...

    Provided By IARIA

  • White Papers // Jun 2012

    The Impact of a Requirements Specification on Software Defects and Quality Indicators

    Capturing requirements in a written, centralized specification is a recognized product development best practice. But, how does this document impact software defect rates and quality? Is there any correlation between a well-written, properly reviewed requirements specification and software defect levels and other quality indicators? This paper will present data from...

    Provided By IARIA

  • White Papers // Jan 2013

    Towards Online Engagement Via the Social Web

    The blossom of Web 2.0 has created new opportunities for the enterprises. Web users are disseminating more information than ever before about their interests, their experiences with products and services, their thoughts and whatever interacts with them in a daily basis. The challenge for the enterprise is to exploit and...

    Provided By IARIA

  • White Papers // Feb 2013

    Exploring Your Business Leaders Through Virtual Characters: Persona Design and Small Experiments

    The authors propose a novel method to identify desirable leader images in each situation. Leader's characteristics have been researched. However, many researchers could not find unique his/her characteristics. Therefore, desirable characteristics are different in each situation which he/her meets. In order to capture the desirable characters in each situation, they...

    Provided By IARIA

  • White Papers // May 2012

    Towards Agile Role-Based Decision Support for OPC UA Profiles

    Interoperability has become a key factor in modern automation systems. In this paper, the OPC (Open Productivity and Connectivity) standards are most prominent. The OPC Unified Architecture (UA) provides platform independent industrial communication using Web-based technologies. It also includes a meta-model guaranteeing interoperability not only at the protocol level but...

    Provided By IARIA

  • White Papers // Nov 2012

    Supporting Time Planning Aligned With CMMI-DEV and PMBOK

    Software projects often fail, because they are not adequately managed. The establishment of effective and efficient project management practices especially with respect to time management still remains a key challenge to software organizations. Striving to address these needs, \"Best practice\" models, such as, the Capability Maturity Model Integration (CMMI) or...

    Provided By IARIA

  • White Papers // Jul 2011

    Moving E-Commerce Towards E-Commodity a Consequence of Cloud Computing

    Many people believe that nowadays everything can be purchased online, but the reality could not be further from the truth. A recent survey that the authors have conducted in two medium-sized German cities revealed that only about 12% of all businesses are able to accept online orders. While 100% of...

    Provided By IARIA

  • White Papers // Jul 2011

    Industrial Application of Ontologies

    The industrial application of ontologies is usually connected to a real life problem. Over the last 2 years the people used ontologies to solve problems in the areas of retail article management, contract and Request For Proposal (RFP) analysis, standard service catalogues and materials management. All these problems were either...

    Provided By IARIA

  • White Papers // Apr 2012

    The Strategic Role of IT as an Antecedent to the IT Sophistication and IT Performance of Manufacturing SMEs

    The business value of IT (Information Technology) applications for SMEs (Small- and Medium-sized Enterprises) is dependent upon how such applications \"Fit\" with the strategic orientation of these firms. Based on the strategic alignment of IT, this study uses a systemic approach to test the contribution of three predictors of IT...

    Provided By IARIA

  • White Papers // Feb 2013

    Merging Capabilities of the Social Web and the Semantic Web to Support Knowledge Management in Small and Medium-Sized Enterprises

    The research focuses on finding an interlinking solution for integration of the Social Web and the Semantic Web for knowledge management needs of small and medium-sized enterprises in respect to preserving their knowledge assets. The solution proposed includes a conceptual level framework for describing metadata of knowledge assets and a...

    Provided By IARIA

  • White Papers // Sep 2011

    The Deployment of Service Management Systems in SMEs - Three Case Studies

    Service management is a relatively new concept as regards business information systems. Only recently has it emerged as a separate software module, either as a specialist standalone offering (such as Solavista) or as a module in an integrated ERP package, such as SAP. Service management can be defined as "Monitoring...

    Provided By IARIA

  • White Papers // Feb 2013

    Security of Information System in View of Business Continuity Management

    In any type of company, the information system is one of the core systems in order to accomplish their business objectives. Exposure of its malfunction or defect sometimes causes critical damages to the company in view of business continuity and the company should form a plan consist of several measures...

    Provided By IARIA

  • White Papers // May 2012

    Optimal Supply Chain Services Management for SMEs Through Integrated Model-Driven Service System

    Due to the lack of funding and expertise, Small and Medium sized Enterprises (SMEs) have largely been excluded from benefiting the spill-over effect of web services-based supply chain systems. Theoretical and empirical researches are at a dearth in that the unmet needs of SMEs have not yet been promoted soundly....

    Provided By IARIA

  • White Papers // Jul 2012

    Learning as a Service - A Cloud-Based Approach for SMEs

    The paper deals with e-learning within Small and Medium sized Enterprises (SME). Previous experience of authors within EU-funded projects showed that SMEs need to adopt some organizational and technological measures in order to improve e-learning readiness. In the same time, these measures correspond to the stages in building a Life-Long...

    Provided By IARIA

  • White Papers // Jul 2012

    Guidelines for Increasing the Adoption of Cloud Computing Within SMEs

    Cloud computing is not a new technology, but rather a natural evolution of efficient using and combining several modern technologies. Computing power, data storage and internetworking resources have all been put into a novel context and consequently, transformed into services (either separately or taken together). The paradigm in cloud computing...

    Provided By IARIA

  • White Papers // Jul 2012

    Cloud Network Security Monitoring and Response System

    The public clouds network monitoring and response system, based on flow measurements, open source tools and CSMS (Cloud Security Monitoring System) module, is to be introduced in this paper. The main goal of the research is to develop an algorithm and to implement a system, which automatically detects and makes...

    Provided By IARIA

  • White Papers // Jul 2012

    Maximizing Utilization in Private IaaS Clouds With Heterogenous Load

    In this paper, the authors presents ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. The idea stems from the experience...

    Provided By IARIA

  • White Papers // Jul 2012

    Enhancing Mobile Device Security by Security Level Integration in a Cloud Proxy

    Smartphones, tablets, laptops and other mobile devices dominate the people every day life and became indispensable for many businessmen. But at the same time the number of security vulnerabilities has been increasing. To increase the security of such devices the paper proposes a proxy running in a cloud environment that...

    Provided By IARIA

  • White Papers // Jul 2012

    Provenance Framework for the Cloud Environment (IaaS)

    Cloud providers can optimize resource utilization and energy consumption by finding patterns in their usage. One way of finding such patterns is to study the history of Cloud resources activity. This approach is known as Cloud provenance. Provenance can also be used to track errors and faults in Cloud services....

    Provided By IARIA

  • White Papers // Jul 2012

    A Study of Cloud Mobility in a Mobile Cloud Network Based on Future Internet Approach

    In this paper, the authors extend the limited functionality of the GENI Cloud project as follows. First, they use the OpenStack cloud platform instead of the Eucalyptus cloud platform used in the GENI Cloud. Second, they develop the FiRST Cloud Aggregate Manager (AM) based on GENI AM Application Programming Interface...

    Provided By IARIA

  • White Papers // Jul 2012

    Simulation-based Evaluation of an Intercloud Service Broker

    The lack of common standards in a fast emerging Cloud computing market over the last years resulted in \"Vendor lock in\" and interoperability issues across heterogeneous Cloud platforms. Therefore, the Cloud user is facing now a challenging problem of selecting the Cloud provider that fits his needs. A new promising...

    Provided By IARIA

  • White Papers // Jul 2012

    De-Replication: A Dynamic Memory-Aware Mechanism

    Resource replication in distributed environment produces issues of secondary storage. De-replication of resources is required when replication mechanism is hindered due to lack of secondary storage. This paper introduces de-replication approaches that depend upon last modification time, number of replica available and resource size. Comparative study shows that de-replication can...

    Provided By IARIA

  • White Papers // Jul 2012

    Dynamic Scenarios of Trust Establishment in the Public Cloud Service Market

    The adoption of the public cloud by firms and individuals has been slowed because of the lack of trust. This research seeks the rules of trust establishment between the public cloud providers and users through signaling game theory, analyses dynamic scenarios in which the pervasive distrust arises, and suggests policy...

    Provided By IARIA

  • White Papers // Jul 2012

    A Secure Data Access Mechanism for Cloud Tenants

    As the future big data storage center for tenants, cloud computing has been a hot issue recently, it consists of many large datacenters which are usually geographically distributed and heterogeneous, secure data access from cloud computing platform is a big challenge for cloud tenants. In this paper, the authors present...

    Provided By IARIA

  • White Papers // Jul 2012

    Provenance in the Cloud: Why and How?

    Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in many fields ranging from art, food production, medical sciences, in-silico experiments, and distributed computing. On the other hand, Cloud computing is the business model of distributed computing and is considered the next...

    Provided By IARIA

  • White Papers // Jul 2012

    Mobile Cloud Computing Environment as a Support for Mobile Learning

    This paper presents a new model of Mobile Distance Learning system (MDL) in an extended Mobile Cloud Computing environment (MCC) by using High Performance Computing (HPC) Cluster Infrastructure, as well as some existing videoconferencing technologies enriched with mobile and wireless devices. This MCC model can be applied everywhere where there...

    Provided By IARIA

  • White Papers // Jul 2012

    Intercloud Object Storage Service: Colony

    Cloud computing has the potential to dramatically change software engineering. It allows the user to manage and use large-scale computing resources efficiently and easily. Moreover, it makes it possible to develop new software by using these resources for scalability and lowering costs. For example, users can prepare machine images of...

    Provided By IARIA

  • White Papers // Apr 2011

    An Evaluation of BOF4WSS and the Security Negotiations Model and Tool Used to Support It

    As online collaboration between businesses increases, securing these interactions becomes of utmost importance. Not only must entities protect themselves and their electronic collaborations, but they must also ensure compliance to a plethora of security-related laws and industry standards. The authors' research has focused in detail on the cross-enterprise security problems...

    Provided By IARIA

  • White Papers // May 2013

    Cloud Terminals for Ticketing Systems

    In this paper, the authors introduce the concept of a thin device implemented on a cloud platform for terminal devices on the front end of ticketing systems. Therefore, they propose the evolution of the traditional architecture of ticketing for a cloud based architecture in which the core processes of ticketing...

    Provided By IARIA