IARIA

Displaying 161-200 of 1223 results

  • White Papers // Jan 2013

    Considerations About Implementation Variants for Position Lists

    Within \"Traditional\" database systems (row store), the values of a tuple are usually stored in a physically connected manner. In a column store by contrast, all values of each single column are stored one after another. This orthogonal storage organization has the advantage that only data from columns which are...

    Provided By IARIA

  • White Papers // Jan 2013

    Mapping XML to Key-Value Database

    XML is a popular data format used in many software applications. Native XML databases can be used for persistence of XML documents or the document can be stored in a relational database. In this paper, the authors propose an alternative storage for XML documents based on key-value databases. They propose...

    Provided By IARIA

  • White Papers // Jan 2013

    Typing XPath Subexpressions With Respect to an XML Schema

    This paper discusses typing XPath sub-expressions with respect to an XML schema, which is a new static analysis problem of XPath expressions. More formally, the typing problem is to decide whether there exists an XML document conforming to a given XML schema such that the nodes of the document matching...

    Provided By IARIA

  • White Papers // Jan 2013

    Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems

    Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Jan 2013

    Location-Aware Routing for Service-Oriented Opportunistic Computing

    Smartphones, tablets, netbooks and laptops are intensively used every day by a large part of the population. These devices which are equipped with Wi-Fi interfaces can form Disconnected Mobile Ad-hoc NETworks (DMANETs) dynamically. These networks may allow service providers, such as local authorities, to deliver new kinds of services in...

    Provided By IARIA

  • White Papers // Jan 2013

    Improving Fairness in QoS and QoE Domains for Adaptive Video Streaming

    In this paper, the authors present an enhancement to a category of Adaptive Video Streaming solutions aimed at improving both Quality of Service (QoS) and Quality of Experience (QoE). The specific solution used as baseline for the work is the Smooth Streaming framework from Microsoft. The presented enhancement relates to...

    Provided By IARIA

  • White Papers // Jan 2013

    NGS Workflow Optimization Using a Hybrid Cloud Infrastructure

    E-science applications involve great deal of data, to satisfy these processing requests, distributed computing paradigms, such as cluster, Grid, Virtual Grid, Cloud Computing, and Hybrid System are growing exponentially. Existing computing infrastructures, software system design, and use cases have to take into account the enormity in volume of requests, size...

    Provided By IARIA

  • White Papers // Jan 2013

    Enabling User Involvement in Trust Decision Making for Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in a specific collaboration, given the risks and incentives involved. The authors have built support for automating routine trust decisions based on a combination of risk, reputation and incentive information. To handle non-routine decisions, they...

    Provided By IARIA

  • White Papers // Nov 2012

    Automated Test Code Generation Based on Formalized Natural Language Business Rules

    The paper addresses two fundamental problems in requirements engineering. First, the conflict between understandability for non-programmers and a semantically well founded representation of business rules. Second, the verification of productive code against business rules in requirements documents. As a solution, a language to specify business rules that are close to...

    Provided By IARIA

  • White Papers // Nov 2012

    AgileKDD: An Agile Business Intelligence Process Model

    In a knowledge-based society, transforming data into information and knowledge to support the decision making process is a crucial success factor for all the organizations. In this paper, one mission of Software Engineering is to produce systems able to process large volumes of data, transform them into relevant knowledge and...

    Provided By IARIA

  • White Papers // Nov 2012

    Supporting Time Planning Aligned With CMMI-DEV and PMBOK

    Software projects often fail, because they are not adequately managed. The establishment of effective and efficient project management practices especially with respect to time management still remains a key challenge to software organizations. Striving to address these needs, \"Best practice\" models, such as, the Capability Maturity Model Integration (CMMI) or...

    Provided By IARIA

  • White Papers // Nov 2012

    User-Centric IT Security: How to Design Usable Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Nov 2012

    Software Architectural Drivers for Cloud Testing

    In this paper, the authors focus on the research issues that cloud computing imposes on software testing. For this purpose, cloud testing can be defined as a software testing method based on cloud computing technology. Software testing has been an important component within the development process. In order to face...

    Provided By IARIA

  • White Papers // Nov 2012

    Group Key Establishment Scheme Using Wireless Channel Status

    Broadcast-based wireless communication is vulnerable to sniffing and eavesdropping by adversaries. Hence, wireless network security mechanisms have relied on cryptographic algorithms to protect information and support confidentiality. The authors propose a group key establishment scheme for secure wireless multicast services without a key management center. The proposed scheme exploits wireless...

    Provided By IARIA

  • White Papers // Oct 2012

    Enabling Dynamical Use of Integrated Systems and Scientific Supercomputing Resources for Archaeological Information Systems

    This paper presents the results from combining Integrated Information and Computing System components with classification for the purpose of enabling multidisciplinary and dynamical use of information systems and supercomputing resources for Archaeological Information Systems. The essential base are a flexible collaboration framework, suitable long-term documentation, structuring and classification of objects,...

    Provided By IARIA

  • White Papers // Oct 2012

    User Involvement and Social Networking for Information System Development

    Since the beginning of Business Information System (BIS) development, the problem of end-user involvement in the system design and implementation has been discussed. For years, BISs for users have been changed into the systems constructed by end-users. The Web 2.0 technologies should strongly support this tendency. The paper aims to...

    Provided By IARIA

  • White Papers // Oct 2012

    Biometric Security Systems for Mobile Devices Based on Fingerprint Recognition Algorithm

    In this paper, the authors propose a selective attention algorithm which increases the reliability of biometrics security system based on fingerprint recognition. They compare the existing fingerprint recognition algorithms and test their own algorithm on fingerprints database which changes in the structure as a result of physical damage. They propose...

    Provided By IARIA

  • White Papers // Oct 2012

    Oracle NoSQL Database - Scalable, Transactional Key-Value Store

    Oracle NoSQL Database is a highly scalable, highly available key-value database, designed to address the low latency data access needs of the \"Big data\" space. Among its unique features, Oracle NoSQL Database provides major and minor keys, flexible durability and consistency policies, and integration with both MapReduce infrastructure and conventional...

    Provided By IARIA

  • White Papers // Oct 2012

    Cloud Applications Versus Web Applications: A Differential Study

    Cloud computing revolution started reshaping the entire ICT industry and adding new concepts; cloud application is one of these new concepts. This paper aims at differentiating between cloud applications and web applications and to position on the question \"What are the differences between cloud applications and web applications?\" The paper...

    Provided By IARIA

  • White Papers // Oct 2012

    A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS

    Software-as-a-Service (SaaS) is emerging as a new model of delivering a software, where users utilize software over the internet as a hosted service rather than an installable product. Multi-tenancy is a core concept in SaaS. It is the principle of running a single instance of the software on a server...

    Provided By IARIA

  • White Papers // Sep 2012

    An Architecture for Semantically Enriched Data Stream Mining

    Data Stream Mining (DSM) techniques can be used to extract knowledge from continuous data streams. In this paper, the authors present an approach providing a modelling and execution architecture for networks of DSM operators. It can be applied in resource-constrained environments, and provides capabilities for semantic enrichment of data streams....

    Provided By IARIA

  • White Papers // Sep 2012

    Evaluating Data Minability Through Compression - An Experimental Study

    The authors' goal is to show that compression can be used as a tool to evaluate the potential of a data set of producing interesting results in a data mining process. The basic idea that data that displays repetitive patterns or patterns that occur with a certain regularity will be...

    Provided By IARIA

  • White Papers // Sep 2012

    Analysis of Streaming Service Quality Using Data Analytics of Network Parameters

    Quality of multimedia streaming service depends on network parameters such as bandwidth, delay, jitter and packet loss rate. In order to effectively improve the Quality of Service (QoS), it is needed to know which parameter is dominant in deterioration of the service quality at the moment. In the paper, the...

    Provided By IARIA

  • White Papers // Sep 2012

    Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application

    Large amount of traffic data are transmitted during day-to-day operation of wide area networks. Due to the increment of diversity in network applications, its traffic features have substantially changed. Data complexity and its diversity have been rapidly expanding with the changing nature of network applications. In addition, bandwidth and speed...

    Provided By IARIA

  • White Papers // Sep 2012

    How to Find Important Users in a Web Community? Mining Similarity Graphs

    In this paper, the authors provide a useful tool to the web site owner for enhancing her/his marketing strategies and rise as consequence the click rates on her/his web site. Their approach addresses the following research questions: which users are important for the web community? Which users have similar interests?...

    Provided By IARIA

  • White Papers // Sep 2012

    Building OLAP Data Analytics by Storing Path-Enumeration Keys Into Sorted Sets of Key-Value Store Databases

    In this paper, a novel approach that allows the retrieval of OLAP analytics by means of storing multidimensional data in key-value databases is described and evaluated. The proposed mechanism relies on generated keys based on the path-enumeration model built upon a tree representation of a relational database. Each key represents...

    Provided By IARIA

  • White Papers // Sep 2012

    A QoS Monitoring Framework for Composite Web Services in the Cloud

    Due to the dynamic nature of the cloud, continuous monitoring of QoS requirements is necessary to manage the cloud computing environment and enforce service level agreements. In this paper, the authors propose a QoS monitoring framework for composite web services implemented using the BPEL process and deployed in the cloud...

    Provided By IARIA

  • White Papers // Sep 2012

    Fighting Botnets - A Systematic Approach

    The increasing impact of Internet in the global economy has transformed botnets into one of the most feared security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to...

    Provided By IARIA

  • White Papers // Sep 2012

    Optimization of Proxy Caches using Proxy Filters

    Web proxy caches are a widely used tool to reduce the network load by storing often needed web pages. Increasing amounts of data transferred require new intelligent caching strategies with smarter replacement algorithms to predict, which web documents will be requested most likely in the future. However, these algorithms are...

    Provided By IARIA

  • White Papers // Sep 2012

    Towards an Agile E-Commerce

    Creating an agile e-commerce is still a challenging issue. The alignment between business and IT plays a key role as changing business demands must be implemented immediately. To avoid misunderstandings and to lead to a better business-IT alignment the authors provide an ontology model, describing enterprise objects and their relations....

    Provided By IARIA

  • White Papers // Sep 2012

    Semantic Supply Chain Management

    The efficiencies of Supply Chain Management (SCM) are often impaired by inconsistent exchange and sharing of information semantics among supply chain partners. Small and medium enterprises formed into a supply chain are working in a multi-cultural and multilingual environment. The eBEST platform equips these enterprises and their associations with state-of-the-art...

    Provided By IARIA

  • White Papers // Sep 2012

    The Open Data Interface (ODI) Framework for Public Utilization of Big Data

    In the paper, the Open Data Interface (ODI) framework for public utilization of Big Data was suggested. Comparing to conventional Web based open APIs which provide restricted access to the internal database of large data companies, the ODI provides multi-level access of data in public domain, ranging from copying plain...

    Provided By IARIA

  • White Papers // Sep 2012

    Ontology-Guided Data Acquisition and Analysis: Using Ontologies for Advanced Statistical Analysis

    The authors present an ontology-based, domain independent data acquisition and preparation system, which is able to process arbitrarily structured data. The system is fully generic and customizes itself automatically at runtime based on a user-defined ontology. So it can be instantiated for any domain of application by defining an ontology...

    Provided By IARIA

  • White Papers // Sep 2012

    Structured Data and Source Code Analysis for Financial Fraud Investigations

    Financial fraud investigations are becoming increasingly complex. The volume of data continues to increase along with the volume and complexity of underlying source code logic. As the volume and complexity increase, so too does the importance of identifying techniques for reducing the data to manageable sizes and identifying fraudulent activity...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Aug 2012

    Linking Sensor Data to a Cloud-based Storage Server Using a Smartphone Bridge

    There is a need for systems that unify the processes of collecting, storing and analyzing long-term sensor data in multi-user contexts. The ubiquity and communication features of Smartphone make them suitable as data aggregation platforms for standalone sensors. Cloud-based servers are advantageous for their centralization and scalability in the storage...

    Provided By IARIA

  • White Papers // Apr 2012

    CincoSecurity: Automating the Security of Java EE Applications with Fine-Grained Roles and Security Profiles

    Almost every software system must include a security module to authenticate users and to authorize what elements of the system can be accessed by each user. This paper describes a security model called \"Cinco-Security\" that follows the Role Based Access Control model (RBAC), but implementing fine-grained roles that can be...

    Provided By IARIA

  • White Papers // Apr 2012

    Advancement Towards Secure Authentication in the Session Initiation Protocol

    The digest access authentication method used in the voice over IP signaling protocol, SIP, is weak. This authentication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat...

    Provided By IARIA

  • White Papers // Jul 2012

    Advances in Protecting Remote Component Authentication

    Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These...

    Provided By IARIA

  • White Papers // Jul 2012

    A Scalability Analysis of an Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Jun 2010

    A Distributed Identity Handling Approach Enriched with Identity Semantics

    People rely on many forms of identities to access offline and online services. The inconvenience of possessing and using identities creates significant security vulnerability. This paper proposes an identity handling mechanism enriched with identity semantics which is believed to ease and secure identity usage. In this regard, user's identities are...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Feb 2013

    Starting a Spatially Enabled Society: a Web System for Collecting Volunteered Geographic Information in the Area of Public Security

    A spatially enabled society provides to citizens, businesses and government access to spatial data regardless of computing platform. The paper describes a collaborative Web system to gather geographic information about the area of public security and disseminate it at all levels of a society using Web 2.0 tools. The data...

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Jul 2011

    A Study of Dragon-Lab Federal Experiment Cloud and Network Contest

    Through the research and analysis on the contests of the IT organization management mode, operation platform and the trend of Network Contests (NC) development, the paper explores the issue about Dragon-lab federal experiment cloud and network contest environment construction, furthermore, it proposes a comprehensive solution for network contests layered management...

    Provided By IARIA

  • White Papers // Aug 2011

    Video Surveillance in the Cloud: Dependability Analysis

    Cloud computing with storage virtualization and new service-oriented architecture brings a new perspective to the aspect of dependability of video surveillance solutions and other safety-critical applications. The existing research is focused mainly on security challenges of cloud applications in general. The area of safety-critical systems is relatively unexplored especially beyond...

    Provided By IARIA

  • White Papers // Oct 2012

    Enabling Dynamical Use of Integrated Systems and Scientific Supercomputing Resources for Archaeological Information Systems

    This paper presents the results from combining Integrated Information and Computing System components with classification for the purpose of enabling multidisciplinary and dynamical use of information systems and supercomputing resources for Archaeological Information Systems. The essential base are a flexible collaboration framework, suitable long-term documentation, structuring and classification of objects,...

    Provided By IARIA

  • White Papers // May 2013

    CloudState: End-to-End WAN Monitoring for Cloud-Based Applications

    Modern data centres are increasingly moving towards more sophisticated cloud-based infrastructures, where servers are consolidated, backups are simplified and where resources can be scaled up, across distributed cloud sites, if necessary. Placing applications and data stores across sites has a cost, in terms of the hosting at a given site,...

    Provided By IARIA

  • White Papers // Oct 2012

    Cloud Applications Versus Web Applications: A Differential Study

    Cloud computing revolution started reshaping the entire ICT industry and adding new concepts; cloud application is one of these new concepts. This paper aims at differentiating between cloud applications and web applications and to position on the question \"What are the differences between cloud applications and web applications?\" The paper...

    Provided By IARIA

  • White Papers // May 2013

    Elastic-TOSCA: Supporting Elasticity of Cloud Application in TOSCA

    The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an emerging framework aiming at enhancing the portability of cloud applications by standardizing their life cycle management in a vendor-neutral way. TOSCA captures the description of cloud application and infrastructure services, the relationships between parts of the services, and the...

    Provided By IARIA

  • White Papers // May 2013

    Using Patterns to Move the Application Data Layer to the Cloud

    Cloud services allow for hosting applications partially or completely in the Cloud by migrating their components and data. Especially with respect to data migration, a series of functional and non-functional challenges like data confidentiality arise when considering private and public Cloud data stores. In this paper, the authors identify some...

    Provided By IARIA

  • White Papers // Jul 2011

    Streaming Cloud Service Concept by Peer-to-Peer Distributed Technology

    In this paper, the authors discuss management manner for streaming services provided on complex network environment, and propose streaming management platform for realizing streaming cloud services, which doesn't depend peer environments. These streaming service-based applications would be expected to diffuse more greatly as the next generational services, and have been...

    Provided By IARIA

  • White Papers // May 2013

    A Cloud Platform to Support User-Provided Mobile Services

    The rapid evolution of mobile computing, together with the spread of social networks is increasingly moving the role of users from information and services consumers to actual producers. Currently, since most of the critical aspects related to user generated contents have been addressed, the main issues related to service generation...

    Provided By IARIA

  • White Papers // Jul 2011

    Evaluating an Open Source EXtensible Resource Identifier Naming System for Cloud Computing Environments

    Clouds are continuously changing environments where services can be composed with other ones in order to provide many types of other services to their users. In order to enable cloud platforms to manage and control their assets, they need to name, identify, and retrieve data about their virtual resources in...

    Provided By IARIA

  • White Papers // May 2012

    Ontologies for Intelligent Provision of Logistics Services

    The 21st century global markets become increasingly turbulent and volatile: life-cycles shorten due to the global economic environment and ever growing individual customer demands, while competitive forces put additional pressure on companies supply chains. Lengthy and slow-moving supply chains bounded by rigid organizational structures endanger companies' competiveness. In such a...

    Provided By IARIA

  • White Papers // Jul 2011

    The Strategic Role of IT: An Empirical Study of Its Impact on IT Performance in Manufacturing SMEs

    The business value of Internet and Web applications for Small- and Medium-sized Enterprises (SMEs) is dependent upon how such applications \"Fit\" with the strategic orientation of these firms. Based on the strategic alignment of Information Technology (IT), this study uses a systemic approach to test the contribution of three predictors...

    Provided By IARIA

  • White Papers // May 2013

    Eliciting Risk, Quality and Cost Aspects in Multi-Cloud Environments

    With the increasing number of providers offering cloud-based services, new opportunities arise to build applications capable of avoiding vendor lock-in issues. Such applications are developed in multi-cloud environments that allow replacing services with those offered by alternative providers. While this may improve quality and provide independence from a single cloud...

    Provided By IARIA

  • White Papers // Jul 2011

    Object Security and Verification for Integrated Information and Computing Systems

    This paper presents the results of the development of techniques for implementing communication for complex integrated information and computing systems based on object envelopes. This provides means for flexible information exchange, namely objects, in mission critical environments, based on verification methods and cryptography. It covers some challenges of collaborative implementation,...

    Provided By IARIA

  • White Papers // Sep 2012

    Towards an Agile E-Commerce

    Creating an agile e-commerce is still a challenging issue. The alignment between business and IT plays a key role as changing business demands must be implemented immediately. To avoid misunderstandings and to lead to a better business-IT alignment the authors provide an ontology model, describing enterprise objects and their relations....

    Provided By IARIA

  • White Papers // Oct 2011

    Implementation of Integrated Systems and Resources for Information and Computing

    This paper presents the practical results from the real-life implementation of interactive complex systems in specialized high end computing environments. The successful implementation has been made possible using a new concept of higher-level data structures for dynamical applications and configuration of the resources. The discussion shows how an implementation of...

    Provided By IARIA

  • White Papers // Oct 2012

    A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS

    Software-as-a-Service (SaaS) is emerging as a new model of delivering a software, where users utilize software over the internet as a hosted service rather than an installable product. Multi-tenancy is a core concept in SaaS. It is the principle of running a single instance of the software on a server...

    Provided By IARIA

  • White Papers // Oct 2011

    Reasoning on High Performance Computing Resources an Urgent Computing Scenario

    The emergent growing amount of available information and data in the last decade has led to very large data stocks that express specific knowledge. This knowledge can be stored in ontologies. Reasoning strategies are then required to deal with a huge amount of data even if the allotted time frame...

    Provided By IARIA

  • White Papers // Mar 2012

    Resilience Issues for Application Workflows on Clouds

    Two areas are currently the focus of active research, namely cloud computing and high-performance computing. Their expected impact on business and scientific computing is such that most application areas are eagerly up taking or waiting for the associated infrastructures. However, open issues still remain. Resilience and load balancing are examples...

    Provided By IARIA

  • White Papers // Oct 2011

    Real-Time Processing and Archiving Strategies

    Today due to huge data growth, more digitization needs, mobile devices producing more data, faster supercomputer power, and applications, end user expect to store and archive their data in real-time and have continuously real-time access to that data. Keeping up with this fast growing demand of user behavior of \"Self-service\"...

    Provided By IARIA

  • White Papers // Jul 2011

    Automated Organizational Network Analysis for Enterprise 2.0

    Social networking sites have recently become a mainstream communications technology for many people around the world. Major IT vendors are releasing social software designed for use in a business/commercial context. These Enterprise 2.0 technologies have impressive collaboration and information sharing functionality, but so far they do not have any Organizational...

    Provided By IARIA

  • White Papers // Jan 2012

    Comparison of Stacking Methods Regarding Processing and Computing of Geoscientific Depth Data

    This paper presents a comparison of different stacking methods available for processing and computing of geo-scientific depth data for use with various high level applications and computing architectures. These methods are used with seismics and comparable geophysical techniques for example. Today's resources enable to use these methods for more than...

    Provided By IARIA

  • White Papers // Sep 2011

    Open Environment for Collaborative Cloud Ecosystems

    Cloud computing can be defined as accessing and utilizing third party software, services and resources and paying as per usage. It facilitates scalability and virtualized resources over the Internet as a service; providing cost effective and scalable solution to customers. There are two emerging methodologies for constructing infrastructure: \"Cloudcenters\" and...

    Provided By IARIA

  • White Papers // Apr 2012

    Towards Distributing Multimedia Applications on a Virtualized Cloud Infrastructure

    The authors examine some technological aspects of cloud computing, focusing on virtualization applied to various data types including multimedia and identify the benefits & security concerns for a modern IT infrastructure. An experiment to migrate a live company server consisting of Microsoft Exchange e-mail and file server to a cloud...

    Provided By IARIA

  • White Papers // Mar 2012

    Fault Tolerant Approaches in Cloud Computing Infrastructures

    Based on the pay-as-you-go strategy, cloud computing platforms are spreading very rapidly. One of the main characteristics of cloud computing is the splitting into many layers. From a technical point of view, most cloud computing platforms exploit virtualization, which implies that they are split into 3 layers: hosts, virtual machines...

    Provided By IARIA

  • White Papers // Jul 2011

    Cloud Computing: Issues in Data Mobility and Security

    Cloud Computing is a generic term for anything that involves delivering hosted services over the internet, based on a pay-as-you-go approach. Cloud Computing offers numerous benefits and, therefore, many large enterprises have embraced the cloud technologies and infrastructures. Vendors are also developing tools and applications to fulfill the demand and...

    Provided By IARIA

  • White Papers // Jul 2013

    Provenance Framework for the Cloud Infrastructure: Why and How?

    Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing, in-silico experiment and generally in e-science. On the other hand, Cloud computing is the business model of distributed computing and is considered the next generation of computing and storage platforms....

    Provided By IARIA

  • White Papers // Aug 2012

    Experimental Evaluations of the Impact of High Availability on the Quality of Protection of Hybrid Clouds

    A common perception of security services is an overhead on distributed system's performance that exponentially increases with scale and heterogeneity of the system's components. While this perception is not untrue, there is no precedence of experimenting the exact impact on its overall performance in terms of quality of protection. This...

    Provided By IARIA

  • White Papers // Sep 2012

    Semantic Supply Chain Management

    The efficiencies of Supply Chain Management (SCM) are often impaired by inconsistent exchange and sharing of information semantics among supply chain partners. Small and medium enterprises formed into a supply chain are working in a multi-cultural and multilingual environment. The eBEST platform equips these enterprises and their associations with state-of-the-art...

    Provided By IARIA

  • White Papers // Jul 2012

    User as Innovator in IT Development Process

    Encouraging users to be value creators in IT development processes is an important step in the competitive effectiveness increase activity. Many authors argue the user involvement in IT process is critical for IT implementation success because under the service-dominant logic users are contributing to the process of IT exploitation. In...

    Provided By IARIA